Some tests were using domain names that were intended to be "fake", but are
actually registered domain names (such as mycorp.com).
Even though we were not actually making connections to these domains, it's
better to use domains that are designated for testing/examples in RFC2606:
https://tools.ietf.org/html/rfc2606
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit f3886f354a)
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
64 lines
2.1 KiB
Go
64 lines
2.1 KiB
Go
package image
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"os"
|
|
"testing"
|
|
|
|
"github.com/docker/cli/cli/trust"
|
|
registrytypes "github.com/docker/docker/api/types/registry"
|
|
"github.com/theupdateframework/notary/client"
|
|
"github.com/theupdateframework/notary/passphrase"
|
|
"github.com/theupdateframework/notary/trustpinning"
|
|
"gotest.tools/v3/assert"
|
|
"gotest.tools/v3/env"
|
|
)
|
|
|
|
func TestENVTrustServer(t *testing.T) {
|
|
defer env.PatchAll(t, map[string]string{"DOCKER_CONTENT_TRUST_SERVER": "https://notary-test.example.com:5000"})()
|
|
indexInfo := ®istrytypes.IndexInfo{Name: "testserver"}
|
|
output, err := trust.Server(indexInfo)
|
|
expectedStr := "https://notary-test.example.com:5000"
|
|
if err != nil || output != expectedStr {
|
|
t.Fatalf("Expected server to be %s, got %s", expectedStr, output)
|
|
}
|
|
}
|
|
|
|
func TestHTTPENVTrustServer(t *testing.T) {
|
|
defer env.PatchAll(t, map[string]string{"DOCKER_CONTENT_TRUST_SERVER": "http://notary-test.example.com:5000"})()
|
|
indexInfo := ®istrytypes.IndexInfo{Name: "testserver"}
|
|
_, err := trust.Server(indexInfo)
|
|
if err == nil {
|
|
t.Fatal("Expected error with invalid scheme")
|
|
}
|
|
}
|
|
|
|
func TestOfficialTrustServer(t *testing.T) {
|
|
indexInfo := ®istrytypes.IndexInfo{Name: "testserver", Official: true}
|
|
output, err := trust.Server(indexInfo)
|
|
if err != nil || output != trust.NotaryServer {
|
|
t.Fatalf("Expected server to be %s, got %s", trust.NotaryServer, output)
|
|
}
|
|
}
|
|
|
|
func TestNonOfficialTrustServer(t *testing.T) {
|
|
indexInfo := ®istrytypes.IndexInfo{Name: "testserver", Official: false}
|
|
output, err := trust.Server(indexInfo)
|
|
expectedStr := "https://" + indexInfo.Name
|
|
if err != nil || output != expectedStr {
|
|
t.Fatalf("Expected server to be %s, got %s", expectedStr, output)
|
|
}
|
|
}
|
|
|
|
func TestAddTargetToAllSignableRolesError(t *testing.T) {
|
|
tmpDir, err := ioutil.TempDir("", "notary-test-")
|
|
assert.NilError(t, err)
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
notaryRepo, err := client.NewFileCachedRepository(tmpDir, "gun", "https://localhost", nil, passphrase.ConstantRetriever("password"), trustpinning.TrustPinConfig{})
|
|
assert.NilError(t, err)
|
|
target := client.Target{}
|
|
err = AddTargetToAllSignableRoles(notaryRepo, &target)
|
|
assert.Error(t, err, "client is offline")
|
|
}
|