|
|
@@ -97,14 +97,10 @@ func TestUpdateRegistryToken(t *testing.T) {
|
|
|
reg := &models.Registry{
|
|
|
Name: "registry-test",
|
|
|
ProjectID: tester.initProjects[0].Model.ID,
|
|
|
- IntTokenCache: ints.TokenCache{
|
|
|
+ TokenCache: ints.RegTokenCache{
|
|
|
Token: []byte("token-1"),
|
|
|
Expiry: time.Now().Add(-1 * time.Hour),
|
|
|
},
|
|
|
- DockerTokenCache: ints.RegTokenCache{
|
|
|
- Token: []byte("docker-token-1"),
|
|
|
- Expiry: time.Now().Add(-1 * time.Hour),
|
|
|
- },
|
|
|
}
|
|
|
|
|
|
reg, err := tester.repo.Registry.CreateRegistry(reg)
|
|
|
@@ -120,67 +116,23 @@ func TestUpdateRegistryToken(t *testing.T) {
|
|
|
}
|
|
|
|
|
|
// make sure registry id of token is 1
|
|
|
- if reg.IntTokenCache.RegistryID != 1 {
|
|
|
- t.Fatalf("incorrect registry id in token cache: expected %d, got %d\n", 1, reg.IntTokenCache.RegistryID)
|
|
|
- }
|
|
|
-
|
|
|
- // make sure old token is expired
|
|
|
- if isExpired := reg.IntTokenCache.IsExpired(); !isExpired {
|
|
|
- t.Fatalf("token was not expired\n")
|
|
|
- }
|
|
|
-
|
|
|
- if string(reg.IntTokenCache.Token) != "token-1" {
|
|
|
- t.Errorf("incorrect token in cache: expected %s, got %s\n", "token-1", reg.IntTokenCache.Token)
|
|
|
- }
|
|
|
-
|
|
|
- reg.IntTokenCache.Token = []byte("token-2")
|
|
|
- reg.IntTokenCache.Expiry = time.Now().Add(24 * time.Hour)
|
|
|
-
|
|
|
- reg, err = tester.repo.Registry.UpdateRegistryIntTokenCache(®.IntTokenCache)
|
|
|
- if err != nil {
|
|
|
- t.Fatalf("%v\n", err)
|
|
|
- }
|
|
|
- reg, err = tester.repo.Registry.ReadRegistry(reg.Model.ID)
|
|
|
- if err != nil {
|
|
|
- t.Fatalf("%v\n", err)
|
|
|
- }
|
|
|
-
|
|
|
- // make sure id is 1
|
|
|
- if reg.Model.ID != 1 {
|
|
|
- t.Errorf("incorrect registry ID: expected %d, got %d\n", 1, reg.Model.ID)
|
|
|
- }
|
|
|
-
|
|
|
- // make sure new token is correct and not expired
|
|
|
- if reg.IntTokenCache.RegistryID != 1 {
|
|
|
- t.Fatalf("incorrect registry ID in token cache: expected %d, got %d\n", 1, reg.IntTokenCache.RegistryID)
|
|
|
- }
|
|
|
-
|
|
|
- if isExpired := reg.IntTokenCache.IsExpired(); isExpired {
|
|
|
- t.Fatalf("token was expired\n")
|
|
|
- }
|
|
|
-
|
|
|
- if string(reg.IntTokenCache.Token) != "token-2" {
|
|
|
- t.Errorf("incorrect token in cache: expected %s, got %s\n", "token-2", reg.IntTokenCache.Token)
|
|
|
- }
|
|
|
-
|
|
|
- // make sure registry id of docker token is 1
|
|
|
- if reg.DockerTokenCache.RegistryID != 1 {
|
|
|
- t.Fatalf("incorrect registry id in token cache: expected %d, got %d\n", 1, reg.DockerTokenCache.RegistryID)
|
|
|
+ if reg.TokenCache.RegistryID != 1 {
|
|
|
+ t.Fatalf("incorrect registry id in token cache: expected %d, got %d\n", 1, reg.TokenCache.RegistryID)
|
|
|
}
|
|
|
|
|
|
// make sure old token is expired
|
|
|
- if isExpired := reg.DockerTokenCache.IsExpired(); !isExpired {
|
|
|
+ if isExpired := reg.TokenCache.IsExpired(); !isExpired {
|
|
|
t.Fatalf("token was not expired\n")
|
|
|
}
|
|
|
|
|
|
- if string(reg.DockerTokenCache.Token) != "docker-token-1" {
|
|
|
- t.Errorf("incorrect token in cache: expected %s, got %s\n", "docker-token-1", reg.DockerTokenCache.Token)
|
|
|
+ if string(reg.TokenCache.Token) != "token-1" {
|
|
|
+ t.Errorf("incorrect token in cache: expected %s, got %s\n", "token-1", reg.TokenCache.Token)
|
|
|
}
|
|
|
|
|
|
- reg.DockerTokenCache.Token = []byte("docker-token-2")
|
|
|
- reg.DockerTokenCache.Expiry = time.Now().Add(24 * time.Hour)
|
|
|
+ reg.TokenCache.Token = []byte("token-2")
|
|
|
+ reg.TokenCache.Expiry = time.Now().Add(24 * time.Hour)
|
|
|
|
|
|
- reg, err = tester.repo.Registry.UpdateRegistryDockerTokenCache(®.DockerTokenCache)
|
|
|
+ reg, err = tester.repo.Registry.UpdateRegistryTokenCache(®.TokenCache)
|
|
|
if err != nil {
|
|
|
t.Fatalf("%v\n", err)
|
|
|
}
|
|
|
@@ -195,15 +147,15 @@ func TestUpdateRegistryToken(t *testing.T) {
|
|
|
}
|
|
|
|
|
|
// make sure new token is correct and not expired
|
|
|
- if reg.DockerTokenCache.RegistryID != 1 {
|
|
|
- t.Fatalf("incorrect registry ID in token cache: expected %d, got %d\n", 1, reg.DockerTokenCache.RegistryID)
|
|
|
+ if reg.TokenCache.RegistryID != 1 {
|
|
|
+ t.Fatalf("incorrect registry ID in token cache: expected %d, got %d\n", 1, reg.TokenCache.RegistryID)
|
|
|
}
|
|
|
|
|
|
- if isExpired := reg.DockerTokenCache.IsExpired(); isExpired {
|
|
|
+ if isExpired := reg.TokenCache.IsExpired(); isExpired {
|
|
|
t.Fatalf("token was expired\n")
|
|
|
}
|
|
|
|
|
|
- if string(reg.DockerTokenCache.Token) != "docker-token-2" {
|
|
|
- t.Errorf("incorrect token in cache: expected %s, got %s\n", "docker-token-2", reg.DockerTokenCache.Token)
|
|
|
+ if string(reg.TokenCache.Token) != "token-2" {
|
|
|
+ t.Errorf("incorrect token in cache: expected %s, got %s\n", "token-2", reg.TokenCache.Token)
|
|
|
}
|
|
|
}
|