image_search_test.go 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165
  1. package client // import "github.com/docker/docker/client"
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/json"
  6. "fmt"
  7. "io"
  8. "net/http"
  9. "strings"
  10. "testing"
  11. "github.com/docker/docker/api/types"
  12. "github.com/docker/docker/api/types/filters"
  13. "github.com/docker/docker/api/types/registry"
  14. "github.com/docker/docker/errdefs"
  15. )
  16. func TestImageSearchAnyError(t *testing.T) {
  17. client := &Client{
  18. client: newMockClient(errorMock(http.StatusInternalServerError, "Server error")),
  19. }
  20. _, err := client.ImageSearch(context.Background(), "some-image", types.ImageSearchOptions{})
  21. if !errdefs.IsSystem(err) {
  22. t.Fatalf("expected a Server Error, got %[1]T: %[1]v", err)
  23. }
  24. }
  25. func TestImageSearchStatusUnauthorizedError(t *testing.T) {
  26. client := &Client{
  27. client: newMockClient(errorMock(http.StatusUnauthorized, "Unauthorized error")),
  28. }
  29. _, err := client.ImageSearch(context.Background(), "some-image", types.ImageSearchOptions{})
  30. if !errdefs.IsUnauthorized(err) {
  31. t.Fatalf("expected a Unauthorized Error, got %[1]T: %[1]v", err)
  32. }
  33. }
  34. func TestImageSearchWithUnauthorizedErrorAndPrivilegeFuncError(t *testing.T) {
  35. client := &Client{
  36. client: newMockClient(errorMock(http.StatusUnauthorized, "Unauthorized error")),
  37. }
  38. privilegeFunc := func() (string, error) {
  39. return "", fmt.Errorf("Error requesting privilege")
  40. }
  41. _, err := client.ImageSearch(context.Background(), "some-image", types.ImageSearchOptions{
  42. PrivilegeFunc: privilegeFunc,
  43. })
  44. if err == nil || err.Error() != "Error requesting privilege" {
  45. t.Fatalf("expected an error requesting privilege, got %v", err)
  46. }
  47. }
  48. func TestImageSearchWithUnauthorizedErrorAndAnotherUnauthorizedError(t *testing.T) {
  49. client := &Client{
  50. client: newMockClient(errorMock(http.StatusUnauthorized, "Unauthorized error")),
  51. }
  52. privilegeFunc := func() (string, error) {
  53. return "a-auth-header", nil
  54. }
  55. _, err := client.ImageSearch(context.Background(), "some-image", types.ImageSearchOptions{
  56. PrivilegeFunc: privilegeFunc,
  57. })
  58. if !errdefs.IsUnauthorized(err) {
  59. t.Fatalf("expected a Unauthorized Error, got %[1]T: %[1]v", err)
  60. }
  61. }
  62. func TestImageSearchWithPrivilegedFuncNoError(t *testing.T) {
  63. expectedURL := "/images/search"
  64. client := &Client{
  65. client: newMockClient(func(req *http.Request) (*http.Response, error) {
  66. if !strings.HasPrefix(req.URL.Path, expectedURL) {
  67. return nil, fmt.Errorf("Expected URL '%s', got '%s'", expectedURL, req.URL)
  68. }
  69. auth := req.Header.Get("X-Registry-Auth")
  70. if auth == "NotValid" {
  71. return &http.Response{
  72. StatusCode: http.StatusUnauthorized,
  73. Body: io.NopCloser(bytes.NewReader([]byte("Invalid credentials"))),
  74. }, nil
  75. }
  76. if auth != "IAmValid" {
  77. return nil, fmt.Errorf("Invalid auth header : expected 'IAmValid', got %s", auth)
  78. }
  79. query := req.URL.Query()
  80. term := query.Get("term")
  81. if term != "some-image" {
  82. return nil, fmt.Errorf("term not set in URL query properly. Expected 'some-image', got %s", term)
  83. }
  84. content, err := json.Marshal([]registry.SearchResult{
  85. {
  86. Name: "anything",
  87. },
  88. })
  89. if err != nil {
  90. return nil, err
  91. }
  92. return &http.Response{
  93. StatusCode: http.StatusOK,
  94. Body: io.NopCloser(bytes.NewReader(content)),
  95. }, nil
  96. }),
  97. }
  98. privilegeFunc := func() (string, error) {
  99. return "IAmValid", nil
  100. }
  101. results, err := client.ImageSearch(context.Background(), "some-image", types.ImageSearchOptions{
  102. RegistryAuth: "NotValid",
  103. PrivilegeFunc: privilegeFunc,
  104. })
  105. if err != nil {
  106. t.Fatal(err)
  107. }
  108. if len(results) != 1 {
  109. t.Fatalf("expected 1 result, got %v", results)
  110. }
  111. }
  112. func TestImageSearchWithoutErrors(t *testing.T) {
  113. expectedURL := "/images/search"
  114. filterArgs := filters.NewArgs()
  115. filterArgs.Add("is-automated", "true")
  116. filterArgs.Add("stars", "3")
  117. expectedFilters := `{"is-automated":{"true":true},"stars":{"3":true}}`
  118. client := &Client{
  119. client: newMockClient(func(req *http.Request) (*http.Response, error) {
  120. if !strings.HasPrefix(req.URL.Path, expectedURL) {
  121. return nil, fmt.Errorf("Expected URL '%s', got '%s'", expectedURL, req.URL)
  122. }
  123. query := req.URL.Query()
  124. term := query.Get("term")
  125. if term != "some-image" {
  126. return nil, fmt.Errorf("term not set in URL query properly. Expected 'some-image', got %s", term)
  127. }
  128. filters := query.Get("filters")
  129. if filters != expectedFilters {
  130. return nil, fmt.Errorf("filters not set in URL query properly. Expected '%s', got %s", expectedFilters, filters)
  131. }
  132. content, err := json.Marshal([]registry.SearchResult{
  133. {
  134. Name: "anything",
  135. },
  136. })
  137. if err != nil {
  138. return nil, err
  139. }
  140. return &http.Response{
  141. StatusCode: http.StatusOK,
  142. Body: io.NopCloser(bytes.NewReader(content)),
  143. }, nil
  144. }),
  145. }
  146. results, err := client.ImageSearch(context.Background(), "some-image", types.ImageSearchOptions{
  147. Filters: filterArgs,
  148. })
  149. if err != nil {
  150. t.Fatal(err)
  151. }
  152. if len(results) != 1 {
  153. t.Fatalf("expected a result, got %v", results)
  154. }
  155. }