2015-11-04 08:03:12 +03:00
|
|
|
package distribution
|
|
|
|
|
|
|
|
import (
|
2016-12-12 11:28:32 +03:00
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
2015-11-04 08:03:12 +03:00
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
2016-02-18 03:53:25 +03:00
|
|
|
"net/url"
|
2015-11-04 08:03:12 +03:00
|
|
|
"os"
|
2016-12-12 11:28:32 +03:00
|
|
|
"runtime"
|
2015-11-04 08:03:12 +03:00
|
|
|
"strings"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/Sirupsen/logrus"
|
2016-09-06 21:18:12 +03:00
|
|
|
"github.com/docker/docker/api/types"
|
|
|
|
registrytypes "github.com/docker/docker/api/types/registry"
|
2016-12-12 11:28:32 +03:00
|
|
|
"github.com/docker/docker/pkg/archive"
|
|
|
|
"github.com/docker/docker/pkg/stringid"
|
2015-12-05 00:55:15 +03:00
|
|
|
"github.com/docker/docker/reference"
|
2015-11-04 08:03:12 +03:00
|
|
|
"github.com/docker/docker/registry"
|
2015-11-14 03:59:01 +03:00
|
|
|
"golang.org/x/net/context"
|
2015-11-04 08:03:12 +03:00
|
|
|
)
|
|
|
|
|
2016-01-27 01:14:13 +03:00
|
|
|
const secretRegistryToken = "mysecrettoken"
|
|
|
|
|
|
|
|
type tokenPassThruHandler struct {
|
|
|
|
reached bool
|
|
|
|
gotToken bool
|
|
|
|
shouldSend401 func(url string) bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *tokenPassThruHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
|
|
h.reached = true
|
|
|
|
if strings.Contains(r.Header.Get("Authorization"), secretRegistryToken) {
|
|
|
|
logrus.Debug("Detected registry token in auth header")
|
|
|
|
h.gotToken = true
|
2015-11-04 08:03:12 +03:00
|
|
|
}
|
2016-01-27 01:14:13 +03:00
|
|
|
if h.shouldSend401 == nil || h.shouldSend401(r.RequestURI) {
|
|
|
|
w.Header().Set("WWW-Authenticate", `Bearer realm="foorealm"`)
|
|
|
|
w.WriteHeader(401)
|
2015-11-04 08:03:12 +03:00
|
|
|
}
|
2016-01-27 01:14:13 +03:00
|
|
|
}
|
2015-11-04 08:03:12 +03:00
|
|
|
|
2016-01-27 01:14:13 +03:00
|
|
|
func testTokenPassThru(t *testing.T, ts *httptest.Server) {
|
2016-12-12 11:28:32 +03:00
|
|
|
tmp, err := testDirectory("")
|
2015-11-04 08:03:12 +03:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmp)
|
|
|
|
|
2016-02-18 03:53:25 +03:00
|
|
|
uri, err := url.Parse(ts.URL)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("could not parse url from test server: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-11-04 08:03:12 +03:00
|
|
|
endpoint := registry.APIEndpoint{
|
|
|
|
Mirror: false,
|
2016-02-18 03:53:25 +03:00
|
|
|
URL: uri,
|
2015-11-04 08:03:12 +03:00
|
|
|
Version: 2,
|
|
|
|
Official: false,
|
|
|
|
TrimHostname: false,
|
|
|
|
TLSConfig: nil,
|
|
|
|
}
|
|
|
|
n, _ := reference.ParseNamed("testremotename")
|
|
|
|
repoInfo := ®istry.RepositoryInfo{
|
2015-12-11 22:00:13 +03:00
|
|
|
Named: n,
|
2015-12-12 05:14:52 +03:00
|
|
|
Index: ®istrytypes.IndexInfo{
|
2015-11-04 08:03:12 +03:00
|
|
|
Name: "testrepo",
|
|
|
|
Mirrors: nil,
|
|
|
|
Secure: false,
|
|
|
|
Official: false,
|
|
|
|
},
|
2015-12-11 22:00:13 +03:00
|
|
|
Official: false,
|
2015-11-04 08:03:12 +03:00
|
|
|
}
|
|
|
|
imagePullConfig := &ImagePullConfig{
|
2016-12-16 22:19:05 +03:00
|
|
|
Config: Config{
|
|
|
|
MetaHeaders: http.Header{},
|
|
|
|
AuthConfig: &types.AuthConfig{
|
|
|
|
RegistryToken: secretRegistryToken,
|
|
|
|
},
|
2016-01-27 01:14:13 +03:00
|
|
|
},
|
2016-12-16 22:19:05 +03:00
|
|
|
Schema2Types: ImageTypes,
|
2015-11-04 08:03:12 +03:00
|
|
|
}
|
2015-11-14 03:59:01 +03:00
|
|
|
puller, err := newPuller(endpoint, repoInfo, imagePullConfig)
|
2015-11-04 08:03:12 +03:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
p := puller.(*v2Puller)
|
2015-12-05 00:42:33 +03:00
|
|
|
ctx := context.Background()
|
|
|
|
p.repo, _, err = NewV2Repository(ctx, p.repoInfo, p.endpoint, p.config.MetaHeaders, p.config.AuthConfig, "pull")
|
2015-11-04 08:03:12 +03:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
logrus.Debug("About to pull")
|
|
|
|
// We expect it to fail, since we haven't mock'd the full registry exchange in our handler above
|
|
|
|
tag, _ := reference.WithTag(n, "tag_goes_here")
|
2015-12-05 00:42:33 +03:00
|
|
|
_ = p.pullV2Repository(ctx, tag)
|
2016-01-27 01:14:13 +03:00
|
|
|
}
|
2015-11-04 08:03:12 +03:00
|
|
|
|
2016-01-27 01:14:13 +03:00
|
|
|
func TestTokenPassThru(t *testing.T) {
|
|
|
|
handler := &tokenPassThruHandler{shouldSend401: func(url string) bool { return url == "/v2/" }}
|
|
|
|
ts := httptest.NewServer(handler)
|
|
|
|
defer ts.Close()
|
|
|
|
|
|
|
|
testTokenPassThru(t, ts)
|
|
|
|
|
|
|
|
if !handler.reached {
|
|
|
|
t.Fatal("Handler not reached")
|
|
|
|
}
|
|
|
|
if !handler.gotToken {
|
2015-11-04 08:03:12 +03:00
|
|
|
t.Fatal("Failed to receive registry token")
|
|
|
|
}
|
2016-01-27 01:14:13 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestTokenPassThruDifferentHost(t *testing.T) {
|
|
|
|
handler := new(tokenPassThruHandler)
|
|
|
|
ts := httptest.NewServer(handler)
|
|
|
|
defer ts.Close()
|
|
|
|
|
|
|
|
tsredirect := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if r.RequestURI == "/v2/" {
|
|
|
|
w.Header().Set("WWW-Authenticate", `Bearer realm="foorealm"`)
|
|
|
|
w.WriteHeader(401)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
http.Redirect(w, r, ts.URL+r.URL.Path, http.StatusMovedPermanently)
|
|
|
|
}))
|
|
|
|
defer tsredirect.Close()
|
2015-11-04 08:03:12 +03:00
|
|
|
|
2016-01-27 01:14:13 +03:00
|
|
|
testTokenPassThru(t, tsredirect)
|
|
|
|
|
|
|
|
if !handler.reached {
|
|
|
|
t.Fatal("Handler not reached")
|
|
|
|
}
|
|
|
|
if handler.gotToken {
|
|
|
|
t.Fatal("Redirect should not forward Authorization header to another host")
|
|
|
|
}
|
2015-11-04 08:03:12 +03:00
|
|
|
}
|
2016-12-12 11:28:32 +03:00
|
|
|
|
2016-12-27 22:20:41 +03:00
|
|
|
// testDirectory creates a new temporary directory and returns its path.
|
2016-12-12 11:28:32 +03:00
|
|
|
// The contents of directory at path `templateDir` is copied into the
|
|
|
|
// new directory.
|
|
|
|
func testDirectory(templateDir string) (dir string, err error) {
|
|
|
|
testID := stringid.GenerateNonCryptoID()[:4]
|
|
|
|
prefix := fmt.Sprintf("docker-test%s-%s-", testID, getCallerName(2))
|
|
|
|
if prefix == "" {
|
|
|
|
prefix = "docker-test-"
|
|
|
|
}
|
|
|
|
dir, err = ioutil.TempDir("", prefix)
|
|
|
|
if err = os.Remove(dir); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if templateDir != "" {
|
|
|
|
if err = archive.CopyWithTar(templateDir, dir); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// getCallerName introspects the call stack and returns the name of the
|
|
|
|
// function `depth` levels down in the stack.
|
|
|
|
func getCallerName(depth int) string {
|
|
|
|
// Use the caller function name as a prefix.
|
|
|
|
// This helps trace temp directories back to their test.
|
|
|
|
pc, _, _, _ := runtime.Caller(depth + 1)
|
|
|
|
callerLongName := runtime.FuncForPC(pc).Name()
|
|
|
|
parts := strings.Split(callerLongName, ".")
|
|
|
|
callerShortName := parts[len(parts)-1]
|
|
|
|
return callerShortName
|
|
|
|
}
|