2018-02-05 21:05:59 +00:00
package registry // import "github.com/docker/docker/registry"
2014-10-07 01:54:52 +00:00
import (
2017-05-09 21:00:31 +00:00
"reflect"
"sort"
2017-01-09 03:30:58 +00:00
"strings"
2014-10-07 01:54:52 +00:00
"testing"
2017-09-01 14:35:04 +00:00
2020-02-07 13:39:24 +00:00
"gotest.tools/v3/assert"
is "gotest.tools/v3/assert/cmp"
2014-10-07 01:54:52 +00:00
)
2017-05-09 21:00:31 +00:00
func TestLoadAllowNondistributableArtifacts ( t * testing . T ) {
testCases := [ ] struct {
registries [ ] string
cidrStrs [ ] string
hostnames [ ] string
err string
} {
{
registries : [ ] string { "1.2.3.0/24" } ,
cidrStrs : [ ] string { "1.2.3.0/24" } ,
} ,
{
registries : [ ] string { "2001:db8::/120" } ,
cidrStrs : [ ] string { "2001:db8::/120" } ,
} ,
{
registries : [ ] string { "127.0.0.1" } ,
hostnames : [ ] string { "127.0.0.1" } ,
} ,
{
registries : [ ] string { "127.0.0.1:8080" } ,
hostnames : [ ] string { "127.0.0.1:8080" } ,
} ,
{
registries : [ ] string { "2001:db8::1" } ,
hostnames : [ ] string { "2001:db8::1" } ,
} ,
{
registries : [ ] string { "[2001:db8::1]:80" } ,
hostnames : [ ] string { "[2001:db8::1]:80" } ,
} ,
{
registries : [ ] string { "[2001:db8::1]:80" } ,
hostnames : [ ] string { "[2001:db8::1]:80" } ,
} ,
{
registries : [ ] string { "1.2.3.0/24" , "2001:db8::/120" , "127.0.0.1" , "127.0.0.1:8080" } ,
cidrStrs : [ ] string { "1.2.3.0/24" , "2001:db8::/120" } ,
hostnames : [ ] string { "127.0.0.1" , "127.0.0.1:8080" } ,
} ,
{
registries : [ ] string { "http://mytest.com" } ,
err : "allow-nondistributable-artifacts registry http://mytest.com should not contain '://'" ,
} ,
{
registries : [ ] string { "https://mytest.com" } ,
err : "allow-nondistributable-artifacts registry https://mytest.com should not contain '://'" ,
} ,
{
registries : [ ] string { "HTTP://mytest.com" } ,
err : "allow-nondistributable-artifacts registry HTTP://mytest.com should not contain '://'" ,
} ,
{
registries : [ ] string { "svn://mytest.com" } ,
err : "allow-nondistributable-artifacts registry svn://mytest.com should not contain '://'" ,
} ,
{
registries : [ ] string { "-invalid-registry" } ,
err : "Cannot begin or end with a hyphen" ,
} ,
{
registries : [ ] string { ` mytest-.com ` } ,
err : ` allow-nondistributable-artifacts registry mytest-.com is not valid: invalid host "mytest-.com" ` ,
} ,
{
registries : [ ] string { ` 1200:0000:AB00:1234:0000:2552:7777:1313:8080 ` } ,
err : ` allow-nondistributable-artifacts registry 1200:0000:AB00:1234:0000:2552:7777:1313:8080 is not valid: invalid host "1200:0000:AB00:1234:0000:2552:7777:1313:8080" ` ,
} ,
{
registries : [ ] string { ` mytest.com:500000 ` } ,
err : ` allow-nondistributable-artifacts registry mytest.com:500000 is not valid: invalid port "500000" ` ,
} ,
{
registries : [ ] string { ` "mytest.com" ` } ,
err : ` allow-nondistributable-artifacts registry "mytest.com" is not valid: invalid host "\"mytest.com\"" ` ,
} ,
{
registries : [ ] string { ` "mytest.com:5000" ` } ,
err : ` allow-nondistributable-artifacts registry "mytest.com:5000" is not valid: invalid host "\"mytest.com" ` ,
} ,
}
for _ , testCase := range testCases {
2017-09-01 14:35:04 +00:00
config := emptyServiceConfig
2017-05-09 21:00:31 +00:00
err := config . LoadAllowNondistributableArtifacts ( testCase . registries )
if testCase . err == "" {
if err != nil {
t . Fatalf ( "expect no error, got '%s'" , err )
}
2018-05-19 11:38:54 +00:00
var cidrStrs [ ] string
2017-05-09 21:00:31 +00:00
for _ , c := range config . AllowNondistributableArtifactsCIDRs {
cidrStrs = append ( cidrStrs , c . String ( ) )
}
sort . Strings ( testCase . cidrStrs )
sort . Strings ( cidrStrs )
if ( len ( testCase . cidrStrs ) > 0 || len ( cidrStrs ) > 0 ) && ! reflect . DeepEqual ( testCase . cidrStrs , cidrStrs ) {
t . Fatalf ( "expect AllowNondistributableArtifactsCIDRs to be '%+v', got '%+v'" , testCase . cidrStrs , cidrStrs )
}
sort . Strings ( testCase . hostnames )
sort . Strings ( config . AllowNondistributableArtifactsHostnames )
if ( len ( testCase . hostnames ) > 0 || len ( config . AllowNondistributableArtifactsHostnames ) > 0 ) && ! reflect . DeepEqual ( testCase . hostnames , config . AllowNondistributableArtifactsHostnames ) {
t . Fatalf ( "expect AllowNondistributableArtifactsHostnames to be '%+v', got '%+v'" , testCase . hostnames , config . AllowNondistributableArtifactsHostnames )
}
} else {
if err == nil {
t . Fatalf ( "expect error '%s', got no error" , testCase . err )
}
if ! strings . Contains ( err . Error ( ) , testCase . err ) {
t . Fatalf ( "expect error '%s', got '%s'" , testCase . err , err )
}
}
}
}
2014-10-07 01:54:52 +00:00
func TestValidateMirror ( t * testing . T ) {
valid := [ ] string {
"http://mirror-1.com" ,
2016-12-21 10:31:05 +00:00
"http://mirror-1.com/" ,
2014-10-07 01:54:52 +00:00
"https://mirror-1.com" ,
2016-12-21 10:31:05 +00:00
"https://mirror-1.com/" ,
2014-10-07 01:54:52 +00:00
"http://localhost" ,
"https://localhost" ,
"http://localhost:5000" ,
"https://localhost:5000" ,
"http://127.0.0.1" ,
"https://127.0.0.1" ,
"http://127.0.0.1:5000" ,
"https://127.0.0.1:5000" ,
}
invalid := [ ] string {
"!invalid!://%as%" ,
"ftp://mirror-1.com" ,
"http://mirror-1.com/?q=foo" ,
"http://mirror-1.com/v1/" ,
"http://mirror-1.com/v1/?q=foo" ,
"http://mirror-1.com/v1/?q=foo#frag" ,
"http://mirror-1.com?q=foo" ,
"https://mirror-1.com#frag" ,
"https://mirror-1.com/#frag" ,
2016-12-21 10:31:05 +00:00
"http://foo:bar@mirror-1.com/" ,
2014-10-07 01:54:52 +00:00
"https://mirror-1.com/v1/" ,
"https://mirror-1.com/v1/#" ,
"https://mirror-1.com?q" ,
}
for _ , address := range valid {
if ret , err := ValidateMirror ( address ) ; err != nil || ret == "" {
t . Errorf ( "ValidateMirror(`" + address + "`) got %s %s" , ret , err )
}
}
for _ , address := range invalid {
if ret , err := ValidateMirror ( address ) ; err == nil || ret != "" {
t . Errorf ( "ValidateMirror(`" + address + "`) got %s %s" , ret , err )
}
}
}
2017-01-09 03:30:58 +00:00
func TestLoadInsecureRegistries ( t * testing . T ) {
testCases := [ ] struct {
registries [ ] string
index string
err string
} {
2017-02-05 07:58:12 +00:00
{
registries : [ ] string { "127.0.0.1" } ,
index : "127.0.0.1" ,
} ,
{
registries : [ ] string { "127.0.0.1:8080" } ,
index : "127.0.0.1:8080" ,
} ,
{
registries : [ ] string { "2001:db8::1" } ,
index : "2001:db8::1" ,
} ,
{
registries : [ ] string { "[2001:db8::1]:80" } ,
index : "[2001:db8::1]:80" ,
} ,
2017-01-09 03:30:58 +00:00
{
registries : [ ] string { "http://mytest.com" } ,
index : "mytest.com" ,
} ,
{
registries : [ ] string { "https://mytest.com" } ,
index : "mytest.com" ,
} ,
{
registries : [ ] string { "HTTP://mytest.com" } ,
index : "mytest.com" ,
} ,
{
registries : [ ] string { "svn://mytest.com" } ,
err : "insecure registry svn://mytest.com should not contain '://'" ,
} ,
{
registries : [ ] string { "-invalid-registry" } ,
err : "Cannot begin or end with a hyphen" ,
} ,
2017-02-05 07:58:12 +00:00
{
registries : [ ] string { ` mytest-.com ` } ,
err : ` insecure registry mytest-.com is not valid: invalid host "mytest-.com" ` ,
} ,
{
registries : [ ] string { ` 1200:0000:AB00:1234:0000:2552:7777:1313:8080 ` } ,
err : ` insecure registry 1200:0000:AB00:1234:0000:2552:7777:1313:8080 is not valid: invalid host "1200:0000:AB00:1234:0000:2552:7777:1313:8080" ` ,
} ,
{
registries : [ ] string { ` mytest.com:500000 ` } ,
err : ` insecure registry mytest.com:500000 is not valid: invalid port "500000" ` ,
} ,
{
registries : [ ] string { ` "mytest.com" ` } ,
err : ` insecure registry "mytest.com" is not valid: invalid host "\"mytest.com\"" ` ,
} ,
{
registries : [ ] string { ` "mytest.com:5000" ` } ,
err : ` insecure registry "mytest.com:5000" is not valid: invalid host "\"mytest.com" ` ,
} ,
2017-01-09 03:30:58 +00:00
}
for _ , testCase := range testCases {
2017-09-01 14:35:04 +00:00
config := emptyServiceConfig
2017-01-09 03:30:58 +00:00
err := config . LoadInsecureRegistries ( testCase . registries )
if testCase . err == "" {
if err != nil {
t . Fatalf ( "expect no error, got '%s'" , err )
}
match := false
for index := range config . IndexConfigs {
if index == testCase . index {
match = true
}
}
if ! match {
t . Fatalf ( "expect index configs to contain '%s', got %+v" , testCase . index , config . IndexConfigs )
}
} else {
if err == nil {
t . Fatalf ( "expect error '%s', got no error" , testCase . err )
}
if ! strings . Contains ( err . Error ( ) , testCase . err ) {
t . Fatalf ( "expect error '%s', got '%s'" , testCase . err , err )
}
}
}
}
2017-09-01 14:35:04 +00:00
func TestNewServiceConfig ( t * testing . T ) {
testCases := [ ] struct {
opts ServiceOptions
errStr string
} {
{
ServiceOptions { } ,
"" ,
} ,
{
ServiceOptions {
Mirrors : [ ] string { "example.com:5000" } ,
} ,
` invalid mirror: unsupported scheme "example.com" in "example.com:5000" ` ,
} ,
{
ServiceOptions {
Mirrors : [ ] string { "http://example.com:5000" } ,
} ,
"" ,
} ,
{
ServiceOptions {
InsecureRegistries : [ ] string { "[fe80::]/64" } ,
} ,
` insecure registry [fe80::]/64 is not valid: invalid host "[fe80::]/64" ` ,
} ,
{
ServiceOptions {
InsecureRegistries : [ ] string { "102.10.8.1/24" } ,
} ,
"" ,
} ,
{
ServiceOptions {
AllowNondistributableArtifacts : [ ] string { "[fe80::]/64" } ,
} ,
` allow-nondistributable-artifacts registry [fe80::]/64 is not valid: invalid host "[fe80::]/64" ` ,
} ,
{
ServiceOptions {
AllowNondistributableArtifacts : [ ] string { "102.10.8.1/24" } ,
} ,
"" ,
} ,
}
for _ , testCase := range testCases {
_ , err := newServiceConfig ( testCase . opts )
if testCase . errStr != "" {
2018-03-13 19:28:34 +00:00
assert . Check ( t , is . Error ( err , testCase . errStr ) )
2017-09-01 14:35:04 +00:00
} else {
2018-03-13 19:28:34 +00:00
assert . Check ( t , err )
2017-09-01 14:35:04 +00:00
}
}
}
2017-10-12 03:05:38 +00:00
func TestValidateIndexName ( t * testing . T ) {
valid := [ ] struct {
index string
expect string
} {
{
index : "index.docker.io" ,
expect : "docker.io" ,
} ,
{
index : "example.com" ,
expect : "example.com" ,
} ,
{
index : "127.0.0.1:8080" ,
expect : "127.0.0.1:8080" ,
} ,
{
index : "mytest-1.com" ,
expect : "mytest-1.com" ,
} ,
{
index : "mirror-1.com/v1/?q=foo" ,
expect : "mirror-1.com/v1/?q=foo" ,
} ,
}
for _ , testCase := range valid {
result , err := ValidateIndexName ( testCase . index )
2018-03-13 19:28:34 +00:00
if assert . Check ( t , err ) {
assert . Check ( t , is . Equal ( testCase . expect , result ) )
2017-10-12 03:05:38 +00:00
}
}
}
func TestValidateIndexNameWithError ( t * testing . T ) {
invalid := [ ] struct {
index string
err string
} {
{
index : "docker.io-" ,
err : "invalid index name (docker.io-). Cannot begin or end with a hyphen" ,
} ,
{
index : "-example.com" ,
err : "invalid index name (-example.com). Cannot begin or end with a hyphen" ,
} ,
{
index : "mirror-1.com/v1/?q=foo-" ,
err : "invalid index name (mirror-1.com/v1/?q=foo-). Cannot begin or end with a hyphen" ,
} ,
}
for _ , testCase := range invalid {
_ , err := ValidateIndexName ( testCase . index )
2018-03-13 19:28:34 +00:00
assert . Check ( t , is . Error ( err , testCase . err ) )
2017-10-12 03:05:38 +00:00
}
}