97a5b797b6
Some tests were using domain names that were intended to be "fake", but are actually registered domain names (such as domain.com, registry.com, mytest.com). Even though we were not actually making connections to these domains, it's better to use domains that are designated for testing/examples in RFC2606: https://tools.ietf.org/html/rfc2606 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
106 lines
2.7 KiB
Go
106 lines
2.7 KiB
Go
package registry // import "github.com/docker/docker/registry"
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/docker/docker/api/types"
|
|
registrytypes "github.com/docker/docker/api/types/registry"
|
|
)
|
|
|
|
func buildAuthConfigs() map[string]types.AuthConfig {
|
|
authConfigs := map[string]types.AuthConfig{}
|
|
|
|
for _, registry := range []string{"testIndex", IndexServer} {
|
|
authConfigs[registry] = types.AuthConfig{
|
|
Username: "docker-user",
|
|
Password: "docker-pass",
|
|
}
|
|
}
|
|
|
|
return authConfigs
|
|
}
|
|
|
|
func TestResolveAuthConfigIndexServer(t *testing.T) {
|
|
authConfigs := buildAuthConfigs()
|
|
indexConfig := authConfigs[IndexServer]
|
|
|
|
officialIndex := ®istrytypes.IndexInfo{
|
|
Official: true,
|
|
}
|
|
privateIndex := ®istrytypes.IndexInfo{
|
|
Official: false,
|
|
}
|
|
|
|
resolved := ResolveAuthConfig(authConfigs, officialIndex)
|
|
assertEqual(t, resolved, indexConfig, "Expected ResolveAuthConfig to return IndexServer")
|
|
|
|
resolved = ResolveAuthConfig(authConfigs, privateIndex)
|
|
assertNotEqual(t, resolved, indexConfig, "Expected ResolveAuthConfig to not return IndexServer")
|
|
}
|
|
|
|
func TestResolveAuthConfigFullURL(t *testing.T) {
|
|
authConfigs := buildAuthConfigs()
|
|
|
|
registryAuth := types.AuthConfig{
|
|
Username: "foo-user",
|
|
Password: "foo-pass",
|
|
}
|
|
localAuth := types.AuthConfig{
|
|
Username: "bar-user",
|
|
Password: "bar-pass",
|
|
}
|
|
officialAuth := types.AuthConfig{
|
|
Username: "baz-user",
|
|
Password: "baz-pass",
|
|
}
|
|
authConfigs[IndexServer] = officialAuth
|
|
|
|
expectedAuths := map[string]types.AuthConfig{
|
|
"registry.example.com": registryAuth,
|
|
"localhost:8000": localAuth,
|
|
"example.com": localAuth,
|
|
}
|
|
|
|
validRegistries := map[string][]string{
|
|
"registry.example.com": {
|
|
"https://registry.example.com/v1/",
|
|
"http://registry.example.com/v1/",
|
|
"registry.example.com",
|
|
"registry.example.com/v1/",
|
|
},
|
|
"localhost:8000": {
|
|
"https://localhost:8000/v1/",
|
|
"http://localhost:8000/v1/",
|
|
"localhost:8000",
|
|
"localhost:8000/v1/",
|
|
},
|
|
"example.com": {
|
|
"https://example.com/v1/",
|
|
"http://example.com/v1/",
|
|
"example.com",
|
|
"example.com/v1/",
|
|
},
|
|
}
|
|
|
|
for configKey, registries := range validRegistries {
|
|
configured, ok := expectedAuths[configKey]
|
|
if !ok {
|
|
t.Fail()
|
|
}
|
|
index := ®istrytypes.IndexInfo{
|
|
Name: configKey,
|
|
}
|
|
for _, registry := range registries {
|
|
authConfigs[registry] = configured
|
|
resolved := ResolveAuthConfig(authConfigs, index)
|
|
if resolved.Username != configured.Username || resolved.Password != configured.Password {
|
|
t.Errorf("%s -> %v != %v\n", registry, resolved, configured)
|
|
}
|
|
delete(authConfigs, registry)
|
|
resolved = ResolveAuthConfig(authConfigs, index)
|
|
if resolved.Username == configured.Username || resolved.Password == configured.Password {
|
|
t.Errorf("%s -> %v == %v\n", registry, resolved, configured)
|
|
}
|
|
}
|
|
}
|
|
}
|