2015-09-03 00:56:01 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2015-12-19 00:03:38 +00:00
|
|
|
"encoding/json"
|
2015-09-03 00:56:01 +00:00
|
|
|
"fmt"
|
2015-12-19 00:03:38 +00:00
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"runtime"
|
2015-08-25 21:23:52 +00:00
|
|
|
"strings"
|
2015-09-03 00:56:01 +00:00
|
|
|
|
2015-12-19 00:03:38 +00:00
|
|
|
"github.com/docker/distribution"
|
|
|
|
"github.com/docker/distribution/manifest"
|
|
|
|
"github.com/docker/distribution/manifest/manifestlist"
|
|
|
|
"github.com/docker/distribution/manifest/schema2"
|
2016-12-30 17:23:00 +00:00
|
|
|
"github.com/docker/docker/integration-cli/checker"
|
2017-01-05 18:08:24 +00:00
|
|
|
icmd "github.com/docker/docker/pkg/testutil/cmd"
|
2015-09-03 00:56:01 +00:00
|
|
|
"github.com/go-check/check"
|
2017-01-07 01:23:18 +00:00
|
|
|
"github.com/opencontainers/go-digest"
|
2015-09-03 00:56:01 +00:00
|
|
|
)
|
|
|
|
|
2015-12-18 23:06:23 +00:00
|
|
|
// testPullImageWithAliases pulls a specific image tag and verifies that any aliases (i.e., other
|
2015-09-03 00:56:01 +00:00
|
|
|
// tags for the same image) are not also pulled down.
|
|
|
|
//
|
|
|
|
// Ref: docker/docker#8141
|
2015-12-18 23:06:23 +00:00
|
|
|
func testPullImageWithAliases(c *check.C) {
|
2015-09-03 00:56:01 +00:00
|
|
|
repoName := fmt.Sprintf("%v/dockercli/busybox", privateRegistryURL)
|
|
|
|
|
|
|
|
repos := []string{}
|
|
|
|
for _, tag := range []string{"recent", "fresh"} {
|
|
|
|
repos = append(repos, fmt.Sprintf("%v:%v", repoName, tag))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Tag and push the same image multiple times.
|
|
|
|
for _, repo := range repos {
|
|
|
|
dockerCmd(c, "tag", "busybox", repo)
|
|
|
|
dockerCmd(c, "push", repo)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Clear local images store.
|
|
|
|
args := append([]string{"rmi"}, repos...)
|
|
|
|
dockerCmd(c, args...)
|
|
|
|
|
|
|
|
// Pull a single tag and verify it doesn't bring down all aliases.
|
|
|
|
dockerCmd(c, "pull", repos[0])
|
|
|
|
dockerCmd(c, "inspect", repos[0])
|
|
|
|
for _, repo := range repos[1:] {
|
2015-10-10 01:09:53 +00:00
|
|
|
_, _, err := dockerCmdWithError("inspect", repo)
|
2015-11-24 17:47:35 +00:00
|
|
|
c.Assert(err, checker.NotNil, check.Commentf("Image %v shouldn't have been pulled down", repo))
|
2015-09-03 00:56:01 +00:00
|
|
|
}
|
|
|
|
}
|
2015-08-25 21:23:52 +00:00
|
|
|
|
2015-12-18 23:06:23 +00:00
|
|
|
func (s *DockerRegistrySuite) TestPullImageWithAliases(c *check.C) {
|
|
|
|
testPullImageWithAliases(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *DockerSchema1RegistrySuite) TestPullImageWithAliases(c *check.C) {
|
|
|
|
testPullImageWithAliases(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
// testConcurrentPullWholeRepo pulls the same repo concurrently.
|
|
|
|
func testConcurrentPullWholeRepo(c *check.C) {
|
2015-08-25 21:23:52 +00:00
|
|
|
repoName := fmt.Sprintf("%v/dockercli/busybox", privateRegistryURL)
|
|
|
|
|
|
|
|
repos := []string{}
|
|
|
|
for _, tag := range []string{"recent", "fresh", "todays"} {
|
|
|
|
repo := fmt.Sprintf("%v:%v", repoName, tag)
|
|
|
|
_, err := buildImage(repo, fmt.Sprintf(`
|
|
|
|
FROM busybox
|
|
|
|
ENTRYPOINT ["/bin/echo"]
|
|
|
|
ENV FOO foo
|
|
|
|
ENV BAR bar
|
|
|
|
CMD echo %s
|
|
|
|
`, repo), true)
|
2015-11-24 17:47:35 +00:00
|
|
|
c.Assert(err, checker.IsNil)
|
2015-08-25 21:23:52 +00:00
|
|
|
dockerCmd(c, "push", repo)
|
|
|
|
repos = append(repos, repo)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Clear local images store.
|
|
|
|
args := append([]string{"rmi"}, repos...)
|
|
|
|
dockerCmd(c, args...)
|
|
|
|
|
|
|
|
// Run multiple re-pulls concurrently
|
|
|
|
results := make(chan error)
|
|
|
|
numPulls := 3
|
|
|
|
|
|
|
|
for i := 0; i != numPulls; i++ {
|
|
|
|
go func() {
|
2017-01-05 11:38:34 +00:00
|
|
|
result := icmd.RunCommand(dockerBinary, "pull", "-a", repoName)
|
|
|
|
results <- result.Error
|
2015-08-25 21:23:52 +00:00
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
// These checks are separate from the loop above because the check
|
|
|
|
// package is not goroutine-safe.
|
|
|
|
for i := 0; i != numPulls; i++ {
|
|
|
|
err := <-results
|
2015-11-24 17:47:35 +00:00
|
|
|
c.Assert(err, checker.IsNil, check.Commentf("concurrent pull failed with error: %v", err))
|
2015-08-25 21:23:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure all tags were pulled successfully
|
|
|
|
for _, repo := range repos {
|
|
|
|
dockerCmd(c, "inspect", repo)
|
|
|
|
out, _ := dockerCmd(c, "run", "--rm", repo)
|
2015-11-27 16:10:01 +00:00
|
|
|
c.Assert(strings.TrimSpace(out), checker.Equals, "/bin/sh -c echo "+repo)
|
2015-08-25 21:23:52 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-12-18 23:06:23 +00:00
|
|
|
func (s *DockerRegistrySuite) testConcurrentPullWholeRepo(c *check.C) {
|
|
|
|
testConcurrentPullWholeRepo(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *DockerSchema1RegistrySuite) testConcurrentPullWholeRepo(c *check.C) {
|
|
|
|
testConcurrentPullWholeRepo(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
// testConcurrentFailingPull tries a concurrent pull that doesn't succeed.
|
|
|
|
func testConcurrentFailingPull(c *check.C) {
|
2015-08-25 21:23:52 +00:00
|
|
|
repoName := fmt.Sprintf("%v/dockercli/busybox", privateRegistryURL)
|
|
|
|
|
|
|
|
// Run multiple pulls concurrently
|
|
|
|
results := make(chan error)
|
|
|
|
numPulls := 3
|
|
|
|
|
|
|
|
for i := 0; i != numPulls; i++ {
|
|
|
|
go func() {
|
2017-01-05 11:38:34 +00:00
|
|
|
result := icmd.RunCommand(dockerBinary, "pull", repoName+":asdfasdf")
|
|
|
|
results <- result.Error
|
2015-08-25 21:23:52 +00:00
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
// These checks are separate from the loop above because the check
|
|
|
|
// package is not goroutine-safe.
|
|
|
|
for i := 0; i != numPulls; i++ {
|
|
|
|
err := <-results
|
2015-11-24 17:47:35 +00:00
|
|
|
c.Assert(err, checker.NotNil, check.Commentf("expected pull to fail"))
|
2015-08-25 21:23:52 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-12-18 23:06:23 +00:00
|
|
|
func (s *DockerRegistrySuite) testConcurrentFailingPull(c *check.C) {
|
|
|
|
testConcurrentFailingPull(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *DockerSchema1RegistrySuite) testConcurrentFailingPull(c *check.C) {
|
|
|
|
testConcurrentFailingPull(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
// testConcurrentPullMultipleTags pulls multiple tags from the same repo
|
2015-08-25 21:23:52 +00:00
|
|
|
// concurrently.
|
2015-12-18 23:06:23 +00:00
|
|
|
func testConcurrentPullMultipleTags(c *check.C) {
|
2015-08-25 21:23:52 +00:00
|
|
|
repoName := fmt.Sprintf("%v/dockercli/busybox", privateRegistryURL)
|
|
|
|
|
|
|
|
repos := []string{}
|
|
|
|
for _, tag := range []string{"recent", "fresh", "todays"} {
|
|
|
|
repo := fmt.Sprintf("%v:%v", repoName, tag)
|
|
|
|
_, err := buildImage(repo, fmt.Sprintf(`
|
|
|
|
FROM busybox
|
|
|
|
ENTRYPOINT ["/bin/echo"]
|
|
|
|
ENV FOO foo
|
|
|
|
ENV BAR bar
|
|
|
|
CMD echo %s
|
|
|
|
`, repo), true)
|
2015-11-24 17:47:35 +00:00
|
|
|
c.Assert(err, checker.IsNil)
|
2015-08-25 21:23:52 +00:00
|
|
|
dockerCmd(c, "push", repo)
|
|
|
|
repos = append(repos, repo)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Clear local images store.
|
|
|
|
args := append([]string{"rmi"}, repos...)
|
|
|
|
dockerCmd(c, args...)
|
|
|
|
|
|
|
|
// Re-pull individual tags, in parallel
|
|
|
|
results := make(chan error)
|
|
|
|
|
|
|
|
for _, repo := range repos {
|
|
|
|
go func(repo string) {
|
2017-01-05 11:38:34 +00:00
|
|
|
result := icmd.RunCommand(dockerBinary, "pull", repo)
|
|
|
|
results <- result.Error
|
2015-08-25 21:23:52 +00:00
|
|
|
}(repo)
|
|
|
|
}
|
|
|
|
|
|
|
|
// These checks are separate from the loop above because the check
|
|
|
|
// package is not goroutine-safe.
|
|
|
|
for range repos {
|
|
|
|
err := <-results
|
2015-11-24 17:47:35 +00:00
|
|
|
c.Assert(err, checker.IsNil, check.Commentf("concurrent pull failed with error: %v", err))
|
2015-08-25 21:23:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure all tags were pulled successfully
|
|
|
|
for _, repo := range repos {
|
|
|
|
dockerCmd(c, "inspect", repo)
|
|
|
|
out, _ := dockerCmd(c, "run", "--rm", repo)
|
2015-11-27 16:10:01 +00:00
|
|
|
c.Assert(strings.TrimSpace(out), checker.Equals, "/bin/sh -c echo "+repo)
|
2015-08-25 21:23:52 +00:00
|
|
|
}
|
|
|
|
}
|
2015-11-18 22:20:54 +00:00
|
|
|
|
2015-12-18 23:06:23 +00:00
|
|
|
func (s *DockerRegistrySuite) TestConcurrentPullMultipleTags(c *check.C) {
|
|
|
|
testConcurrentPullMultipleTags(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *DockerSchema1RegistrySuite) TestConcurrentPullMultipleTags(c *check.C) {
|
|
|
|
testConcurrentPullMultipleTags(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
// testPullIDStability verifies that pushing an image and pulling it back
|
2015-11-18 22:20:54 +00:00
|
|
|
// preserves the image ID.
|
2015-12-18 23:06:23 +00:00
|
|
|
func testPullIDStability(c *check.C) {
|
2015-11-18 22:20:54 +00:00
|
|
|
derivedImage := privateRegistryURL + "/dockercli/id-stability"
|
|
|
|
baseImage := "busybox"
|
|
|
|
|
|
|
|
_, err := buildImage(derivedImage, fmt.Sprintf(`
|
|
|
|
FROM %s
|
|
|
|
ENV derived true
|
|
|
|
ENV asdf true
|
|
|
|
RUN dd if=/dev/zero of=/file bs=1024 count=1024
|
|
|
|
CMD echo %s
|
|
|
|
`, baseImage, derivedImage), true)
|
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
originalID, err := getIDByName(derivedImage)
|
|
|
|
if err != nil {
|
|
|
|
c.Fatalf("error inspecting: %v", err)
|
|
|
|
}
|
|
|
|
dockerCmd(c, "push", derivedImage)
|
|
|
|
|
|
|
|
// Pull
|
|
|
|
out, _ := dockerCmd(c, "pull", derivedImage)
|
|
|
|
if strings.Contains(out, "Pull complete") {
|
|
|
|
c.Fatalf("repull redownloaded a layer: %s", out)
|
|
|
|
}
|
|
|
|
|
|
|
|
derivedIDAfterPull, err := getIDByName(derivedImage)
|
|
|
|
if err != nil {
|
|
|
|
c.Fatalf("error inspecting: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if derivedIDAfterPull != originalID {
|
|
|
|
c.Fatal("image's ID unexpectedly changed after a repush/repull")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure the image runs correctly
|
|
|
|
out, _ = dockerCmd(c, "run", "--rm", derivedImage)
|
|
|
|
if strings.TrimSpace(out) != derivedImage {
|
|
|
|
c.Fatalf("expected %s; got %s", derivedImage, out)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Confirm that repushing and repulling does not change the computed ID
|
|
|
|
dockerCmd(c, "push", derivedImage)
|
|
|
|
dockerCmd(c, "rmi", derivedImage)
|
|
|
|
dockerCmd(c, "pull", derivedImage)
|
|
|
|
|
|
|
|
derivedIDAfterPull, err = getIDByName(derivedImage)
|
|
|
|
if err != nil {
|
|
|
|
c.Fatalf("error inspecting: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if derivedIDAfterPull != originalID {
|
|
|
|
c.Fatal("image's ID unexpectedly changed after a repush/repull")
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
c.Fatalf("error inspecting: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure the image still runs
|
|
|
|
out, _ = dockerCmd(c, "run", "--rm", derivedImage)
|
|
|
|
if strings.TrimSpace(out) != derivedImage {
|
|
|
|
c.Fatalf("expected %s; got %s", derivedImage, out)
|
|
|
|
}
|
|
|
|
}
|
2015-12-21 23:42:04 +00:00
|
|
|
|
2015-12-18 23:06:23 +00:00
|
|
|
func (s *DockerRegistrySuite) TestPullIDStability(c *check.C) {
|
|
|
|
testPullIDStability(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *DockerSchema1RegistrySuite) TestPullIDStability(c *check.C) {
|
|
|
|
testPullIDStability(c)
|
|
|
|
}
|
|
|
|
|
2016-03-15 18:10:03 +00:00
|
|
|
// #21213
|
|
|
|
func testPullNoLayers(c *check.C) {
|
|
|
|
repoName := fmt.Sprintf("%v/dockercli/scratch", privateRegistryURL)
|
|
|
|
|
|
|
|
_, err := buildImage(repoName, `
|
|
|
|
FROM scratch
|
|
|
|
ENV foo bar`,
|
|
|
|
true)
|
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
dockerCmd(c, "push", repoName)
|
|
|
|
dockerCmd(c, "rmi", repoName)
|
|
|
|
dockerCmd(c, "pull", repoName)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *DockerRegistrySuite) TestPullNoLayers(c *check.C) {
|
|
|
|
testPullNoLayers(c)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *DockerSchema1RegistrySuite) TestPullNoLayers(c *check.C) {
|
|
|
|
testPullNoLayers(c)
|
|
|
|
}
|
|
|
|
|
2015-12-19 00:03:38 +00:00
|
|
|
func (s *DockerRegistrySuite) TestPullManifestList(c *check.C) {
|
2015-11-25 23:38:33 +00:00
|
|
|
testRequires(c, NotArm)
|
2015-12-19 00:03:38 +00:00
|
|
|
pushDigest, err := setupImage(c)
|
|
|
|
c.Assert(err, checker.IsNil, check.Commentf("error setting up image"))
|
|
|
|
|
|
|
|
// Inject a manifest list into the registry
|
|
|
|
manifestList := &manifestlist.ManifestList{
|
|
|
|
Versioned: manifest.Versioned{
|
|
|
|
SchemaVersion: 2,
|
|
|
|
MediaType: manifestlist.MediaTypeManifestList,
|
|
|
|
},
|
|
|
|
Manifests: []manifestlist.ManifestDescriptor{
|
|
|
|
{
|
|
|
|
Descriptor: distribution.Descriptor{
|
|
|
|
Digest: "sha256:1a9ec845ee94c202b2d5da74a24f0ed2058318bfa9879fa541efaecba272e86b",
|
|
|
|
Size: 3253,
|
|
|
|
MediaType: schema2.MediaTypeManifest,
|
|
|
|
},
|
|
|
|
Platform: manifestlist.PlatformSpec{
|
|
|
|
Architecture: "bogus_arch",
|
|
|
|
OS: "bogus_os",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Descriptor: distribution.Descriptor{
|
|
|
|
Digest: pushDigest,
|
|
|
|
Size: 3253,
|
|
|
|
MediaType: schema2.MediaTypeManifest,
|
|
|
|
},
|
|
|
|
Platform: manifestlist.PlatformSpec{
|
|
|
|
Architecture: runtime.GOARCH,
|
|
|
|
OS: runtime.GOOS,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
manifestListJSON, err := json.MarshalIndent(manifestList, "", " ")
|
|
|
|
c.Assert(err, checker.IsNil, check.Commentf("error marshalling manifest list"))
|
|
|
|
|
|
|
|
manifestListDigest := digest.FromBytes(manifestListJSON)
|
|
|
|
hexDigest := manifestListDigest.Hex()
|
|
|
|
|
2016-12-30 18:10:04 +00:00
|
|
|
registryV2Path := s.reg.Path()
|
2015-12-19 00:03:38 +00:00
|
|
|
|
|
|
|
// Write manifest list to blob store
|
|
|
|
blobDir := filepath.Join(registryV2Path, "blobs", "sha256", hexDigest[:2], hexDigest)
|
|
|
|
err = os.MkdirAll(blobDir, 0755)
|
|
|
|
c.Assert(err, checker.IsNil, check.Commentf("error creating blob dir"))
|
|
|
|
blobPath := filepath.Join(blobDir, "data")
|
|
|
|
err = ioutil.WriteFile(blobPath, []byte(manifestListJSON), 0644)
|
|
|
|
c.Assert(err, checker.IsNil, check.Commentf("error writing manifest list"))
|
|
|
|
|
|
|
|
// Add to revision store
|
|
|
|
revisionDir := filepath.Join(registryV2Path, "repositories", remoteRepoName, "_manifests", "revisions", "sha256", hexDigest)
|
|
|
|
err = os.Mkdir(revisionDir, 0755)
|
|
|
|
c.Assert(err, checker.IsNil, check.Commentf("error creating revision dir"))
|
|
|
|
revisionPath := filepath.Join(revisionDir, "link")
|
|
|
|
err = ioutil.WriteFile(revisionPath, []byte(manifestListDigest.String()), 0644)
|
|
|
|
c.Assert(err, checker.IsNil, check.Commentf("error writing revision link"))
|
|
|
|
|
|
|
|
// Update tag
|
|
|
|
tagPath := filepath.Join(registryV2Path, "repositories", remoteRepoName, "_manifests", "tags", "latest", "current", "link")
|
|
|
|
err = ioutil.WriteFile(tagPath, []byte(manifestListDigest.String()), 0644)
|
|
|
|
c.Assert(err, checker.IsNil, check.Commentf("error writing tag link"))
|
|
|
|
|
|
|
|
// Verify that the image can be pulled through the manifest list.
|
|
|
|
out, _ := dockerCmd(c, "pull", repoName)
|
|
|
|
|
|
|
|
// The pull output includes "Digest: <digest>", so find that
|
|
|
|
matches := digestRegex.FindStringSubmatch(out)
|
|
|
|
c.Assert(matches, checker.HasLen, 2, check.Commentf("unable to parse digest from pull output: %s", out))
|
|
|
|
pullDigest := matches[1]
|
|
|
|
|
|
|
|
// Make sure the pushed and pull digests match
|
|
|
|
c.Assert(manifestListDigest.String(), checker.Equals, pullDigest)
|
|
|
|
|
|
|
|
// Was the image actually created?
|
|
|
|
dockerCmd(c, "inspect", repoName)
|
|
|
|
|
|
|
|
dockerCmd(c, "rmi", repoName)
|
|
|
|
}
|
2016-02-08 00:55:17 +00:00
|
|
|
|
2016-05-30 10:47:49 +00:00
|
|
|
// #23100
|
|
|
|
func (s *DockerRegistryAuthHtpasswdSuite) TestPullWithExternalAuthLoginWithScheme(c *check.C) {
|
|
|
|
osPath := os.Getenv("PATH")
|
|
|
|
defer os.Setenv("PATH", osPath)
|
|
|
|
|
|
|
|
workingDir, err := os.Getwd()
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
absolute, err := filepath.Abs(filepath.Join(workingDir, "fixtures", "auth"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
testPath := fmt.Sprintf("%s%c%s", osPath, filepath.ListSeparator, absolute)
|
|
|
|
|
|
|
|
os.Setenv("PATH", testPath)
|
|
|
|
|
|
|
|
repoName := fmt.Sprintf("%v/dockercli/busybox:authtest", privateRegistryURL)
|
|
|
|
|
|
|
|
tmp, err := ioutil.TempDir("", "integration-cli-")
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
externalAuthConfig := `{ "credsStore": "shell-test" }`
|
|
|
|
|
|
|
|
configPath := filepath.Join(tmp, "config.json")
|
|
|
|
err = ioutil.WriteFile(configPath, []byte(externalAuthConfig), 0644)
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
2016-12-30 18:10:04 +00:00
|
|
|
dockerCmd(c, "--config", tmp, "login", "-u", s.reg.Username(), "-p", s.reg.Password(), privateRegistryURL)
|
2016-05-30 10:47:49 +00:00
|
|
|
|
|
|
|
b, err := ioutil.ReadFile(configPath)
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
c.Assert(string(b), checker.Not(checker.Contains), "\"auth\":")
|
|
|
|
|
|
|
|
dockerCmd(c, "--config", tmp, "tag", "busybox", repoName)
|
|
|
|
dockerCmd(c, "--config", tmp, "push", repoName)
|
|
|
|
|
|
|
|
dockerCmd(c, "--config", tmp, "logout", privateRegistryURL)
|
2016-12-30 18:10:04 +00:00
|
|
|
dockerCmd(c, "--config", tmp, "login", "-u", s.reg.Username(), "-p", s.reg.Password(), "https://"+privateRegistryURL)
|
2016-05-30 10:47:49 +00:00
|
|
|
dockerCmd(c, "--config", tmp, "pull", repoName)
|
|
|
|
|
|
|
|
// likewise push should work
|
|
|
|
repoName2 := fmt.Sprintf("%v/dockercli/busybox:nocreds", privateRegistryURL)
|
|
|
|
dockerCmd(c, "tag", repoName, repoName2)
|
|
|
|
dockerCmd(c, "--config", tmp, "push", repoName2)
|
|
|
|
|
|
|
|
// logout should work w scheme also because it will be stripped
|
|
|
|
dockerCmd(c, "--config", tmp, "logout", "https://"+privateRegistryURL)
|
|
|
|
}
|
|
|
|
|
2016-03-14 20:11:35 +00:00
|
|
|
func (s *DockerRegistryAuthHtpasswdSuite) TestPullWithExternalAuth(c *check.C) {
|
2016-02-08 00:55:17 +00:00
|
|
|
osPath := os.Getenv("PATH")
|
|
|
|
defer os.Setenv("PATH", osPath)
|
|
|
|
|
|
|
|
workingDir, err := os.Getwd()
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
absolute, err := filepath.Abs(filepath.Join(workingDir, "fixtures", "auth"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
testPath := fmt.Sprintf("%s%c%s", osPath, filepath.ListSeparator, absolute)
|
|
|
|
|
|
|
|
os.Setenv("PATH", testPath)
|
|
|
|
|
|
|
|
repoName := fmt.Sprintf("%v/dockercli/busybox:authtest", privateRegistryURL)
|
|
|
|
|
|
|
|
tmp, err := ioutil.TempDir("", "integration-cli-")
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
externalAuthConfig := `{ "credsStore": "shell-test" }`
|
|
|
|
|
|
|
|
configPath := filepath.Join(tmp, "config.json")
|
|
|
|
err = ioutil.WriteFile(configPath, []byte(externalAuthConfig), 0644)
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
2016-12-30 18:10:04 +00:00
|
|
|
dockerCmd(c, "--config", tmp, "login", "-u", s.reg.Username(), "-p", s.reg.Password(), privateRegistryURL)
|
2016-02-08 00:55:17 +00:00
|
|
|
|
|
|
|
b, err := ioutil.ReadFile(configPath)
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
c.Assert(string(b), checker.Not(checker.Contains), "\"auth\":")
|
|
|
|
|
|
|
|
dockerCmd(c, "--config", tmp, "tag", "busybox", repoName)
|
|
|
|
dockerCmd(c, "--config", tmp, "push", repoName)
|
|
|
|
|
|
|
|
dockerCmd(c, "--config", tmp, "pull", repoName)
|
|
|
|
}
|
2016-05-02 22:23:22 +00:00
|
|
|
|
2016-05-19 22:52:42 +00:00
|
|
|
// TestRunImplicitPullWithNoTag should pull implicitly only the default tag (latest)
|
2016-05-02 22:23:22 +00:00
|
|
|
func (s *DockerRegistrySuite) TestRunImplicitPullWithNoTag(c *check.C) {
|
|
|
|
testRequires(c, DaemonIsLinux)
|
|
|
|
repo := fmt.Sprintf("%v/dockercli/busybox", privateRegistryURL)
|
|
|
|
repoTag1 := fmt.Sprintf("%v:latest", repo)
|
|
|
|
repoTag2 := fmt.Sprintf("%v:t1", repo)
|
|
|
|
// tag the image and upload it to the private registry
|
|
|
|
dockerCmd(c, "tag", "busybox", repoTag1)
|
|
|
|
dockerCmd(c, "tag", "busybox", repoTag2)
|
|
|
|
dockerCmd(c, "push", repo)
|
|
|
|
dockerCmd(c, "rmi", repoTag1)
|
|
|
|
dockerCmd(c, "rmi", repoTag2)
|
|
|
|
|
|
|
|
out, _, err := dockerCmdWithError("run", repo)
|
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
c.Assert(out, checker.Contains, fmt.Sprintf("Unable to find image '%s:latest' locally", repo))
|
|
|
|
|
|
|
|
// There should be only one line for repo, the one with repo:latest
|
|
|
|
outImageCmd, _, err := dockerCmdWithError("images", repo)
|
|
|
|
splitOutImageCmd := strings.Split(strings.TrimSpace(outImageCmd), "\n")
|
|
|
|
c.Assert(splitOutImageCmd, checker.HasLen, 2)
|
|
|
|
}
|