195 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			Go
		
	
	
			
		
		
	
	
			195 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			Go
		
	
	
package registry
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/json"
 | 
						|
	"net/http"
 | 
						|
	"net/http/httptest"
 | 
						|
	"net/url"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"github.com/docker/distribution/api/v2"
 | 
						|
	_ "github.com/docker/distribution/auth/silly"
 | 
						|
	"github.com/docker/distribution/configuration"
 | 
						|
)
 | 
						|
 | 
						|
// TestAppDispatcher builds an application with a test dispatcher and ensures
 | 
						|
// that requests are properly dispatched and the handlers are constructed.
 | 
						|
// This only tests the dispatch mechanism. The underlying dispatchers must be
 | 
						|
// tested individually.
 | 
						|
func TestAppDispatcher(t *testing.T) {
 | 
						|
	app := &App{
 | 
						|
		Config: configuration.Configuration{},
 | 
						|
		router: v2.Router(),
 | 
						|
	}
 | 
						|
	server := httptest.NewServer(app)
 | 
						|
	router := v2.Router()
 | 
						|
 | 
						|
	serverURL, err := url.Parse(server.URL)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("error parsing server url: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	varCheckingDispatcher := func(expectedVars map[string]string) dispatchFunc {
 | 
						|
		return func(ctx *Context, r *http.Request) http.Handler {
 | 
						|
			// Always checks the same name context
 | 
						|
			if ctx.Name != ctx.vars["name"] {
 | 
						|
				t.Fatalf("unexpected name: %q != %q", ctx.Name, "foo/bar")
 | 
						|
			}
 | 
						|
 | 
						|
			// Check that we have all that is expected
 | 
						|
			for expectedK, expectedV := range expectedVars {
 | 
						|
				if ctx.vars[expectedK] != expectedV {
 | 
						|
					t.Fatalf("unexpected %s in context vars: %q != %q", expectedK, ctx.vars[expectedK], expectedV)
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			// Check that we only have variables that are expected
 | 
						|
			for k, v := range ctx.vars {
 | 
						|
				_, ok := expectedVars[k]
 | 
						|
 | 
						|
				if !ok { // name is checked on context
 | 
						|
					// We have an unexpected key, fail
 | 
						|
					t.Fatalf("unexpected key %q in vars with value %q", k, v)
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
						|
				w.WriteHeader(http.StatusOK)
 | 
						|
			})
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// unflatten a list of variables, suitable for gorilla/mux, to a map[string]string
 | 
						|
	unflatten := func(vars []string) map[string]string {
 | 
						|
		m := make(map[string]string)
 | 
						|
		for i := 0; i < len(vars)-1; i = i + 2 {
 | 
						|
			m[vars[i]] = vars[i+1]
 | 
						|
		}
 | 
						|
 | 
						|
		return m
 | 
						|
	}
 | 
						|
 | 
						|
	for _, testcase := range []struct {
 | 
						|
		endpoint string
 | 
						|
		vars     []string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			endpoint: v2.RouteNameManifest,
 | 
						|
			vars: []string{
 | 
						|
				"name", "foo/bar",
 | 
						|
				"tag", "sometag",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			endpoint: v2.RouteNameTags,
 | 
						|
			vars: []string{
 | 
						|
				"name", "foo/bar",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			endpoint: v2.RouteNameBlob,
 | 
						|
			vars: []string{
 | 
						|
				"name", "foo/bar",
 | 
						|
				"digest", "tarsum.v1+bogus:abcdef0123456789",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			endpoint: v2.RouteNameBlobUpload,
 | 
						|
			vars: []string{
 | 
						|
				"name", "foo/bar",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			endpoint: v2.RouteNameBlobUploadChunk,
 | 
						|
			vars: []string{
 | 
						|
				"name", "foo/bar",
 | 
						|
				"uuid", "theuuid",
 | 
						|
			},
 | 
						|
		},
 | 
						|
	} {
 | 
						|
		app.register(testcase.endpoint, varCheckingDispatcher(unflatten(testcase.vars)))
 | 
						|
		route := router.GetRoute(testcase.endpoint).Host(serverURL.Host)
 | 
						|
		u, err := route.URL(testcase.vars...)
 | 
						|
 | 
						|
		if err != nil {
 | 
						|
			t.Fatal(err)
 | 
						|
		}
 | 
						|
 | 
						|
		resp, err := http.Get(u.String())
 | 
						|
 | 
						|
		if err != nil {
 | 
						|
			t.Fatal(err)
 | 
						|
		}
 | 
						|
 | 
						|
		if resp.StatusCode != http.StatusOK {
 | 
						|
			t.Fatalf("unexpected status code: %v != %v", resp.StatusCode, http.StatusOK)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// TestNewApp covers the creation of an application via NewApp with a
 | 
						|
// configuration.
 | 
						|
func TestNewApp(t *testing.T) {
 | 
						|
	config := configuration.Configuration{
 | 
						|
		Storage: configuration.Storage{
 | 
						|
			"inmemory": nil,
 | 
						|
		},
 | 
						|
		Auth: configuration.Auth{
 | 
						|
			// For now, we simply test that new auth results in a viable
 | 
						|
			// application.
 | 
						|
			"silly": {
 | 
						|
				"realm":   "realm-test",
 | 
						|
				"service": "service-test",
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	// Mostly, with this test, given a sane configuration, we are simply
 | 
						|
	// ensuring that NewApp doesn't panic. We might want to tweak this
 | 
						|
	// behavior.
 | 
						|
	app := NewApp(config)
 | 
						|
 | 
						|
	server := httptest.NewServer(app)
 | 
						|
	builder, err := v2.NewURLBuilderFromString(server.URL)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("error creating urlbuilder: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	baseURL, err := builder.BuildBaseURL()
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("error creating baseURL: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	// TODO(stevvooe): The rest of this test might belong in the API tests.
 | 
						|
 | 
						|
	// Just hit the app and make sure we get a 401 Unauthorized error.
 | 
						|
	req, err := http.Get(baseURL)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("unexpected error during GET: %v", err)
 | 
						|
	}
 | 
						|
	defer req.Body.Close()
 | 
						|
 | 
						|
	if req.StatusCode != http.StatusUnauthorized {
 | 
						|
		t.Fatalf("unexpected status code during request: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if req.Header.Get("Content-Type") != "application/json; charset=utf-8" {
 | 
						|
		t.Fatalf("unexpected content-type: %v != %v", req.Header.Get("Content-Type"), "application/json; charset=utf-8")
 | 
						|
	}
 | 
						|
 | 
						|
	expectedAuthHeader := "Bearer realm=\"realm-test\",service=\"service-test\""
 | 
						|
	if req.Header.Get("Authorization") != expectedAuthHeader {
 | 
						|
		t.Fatalf("unexpected authorization header: %q != %q", req.Header.Get("Authorization"), expectedAuthHeader)
 | 
						|
	}
 | 
						|
 | 
						|
	var errs v2.Errors
 | 
						|
	dec := json.NewDecoder(req.Body)
 | 
						|
	if err := dec.Decode(&errs); err != nil {
 | 
						|
		t.Fatalf("error decoding error response: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if errs.Errors[0].Code != v2.ErrorCodeUnauthorized {
 | 
						|
		t.Fatalf("unexpected error code: %v != %v", errs.Errors[0].Code, v2.ErrorCodeUnauthorized)
 | 
						|
	}
 | 
						|
}
 |