Replace WithName with CreateNamed

WithName is poorly named function and already has a similar
role to ParseNamed without enforcement for normalization and
no support for tags or canonical values. For places that require
creating a raw named value it is cleaner to explicitly pass in
the domain and path needed to create a fully parsed and normalized
value. The registry does not use domain and will explicitly pass in
the empty string while clients such as the Docker Engine will likely
have no use for CreateNamed.

Signed-off-by: Derek McGowan <derek@mcgstyle.net> (github: dmcgowan)
Signed-off-by: David van der Spek <vanderspek.david@gmail.com>
This commit is contained in:
Derek McGowan 2023-05-03 19:27:02 +02:00 committed by David van der Spek
parent 4adbb690c1
commit f7b911e955
23 changed files with 201 additions and 128 deletions

View file

@ -183,7 +183,7 @@ func TestConfigBuilder(t *testing.T) {
bs := &mockBlobService{descriptors: make(map[digest.Digest]distribution.Descriptor)}
ref, err := reference.WithName("testrepo")
ref, err := reference.CreateNamed("", "testrepo")
if err != nil {
t.Fatalf("could not parse reference: %v", err)
}

View file

@ -55,7 +55,7 @@ func TestReferenceBuilder(t *testing.T) {
handCrafted := makeSignedManifest(t, pk, []Reference{r1, r2})
ref, err := reference.WithName(handCrafted.Manifest.Name)
ref, err := reference.CreateNamed("", handCrafted.Manifest.Name)
if err != nil {
t.Fatalf("could not parse reference: %v", err)
}

View file

@ -53,7 +53,7 @@ func TestEventBridgeManifestPulled(t *testing.T) {
return nil
}))
repoRef, _ := reference.WithName(repo)
repoRef, _ := reference.CreateNamed("", repo)
if err := l.ManifestPulled(repoRef, sm); err != nil {
t.Fatalf("unexpected error notifying manifest pull: %v", err)
}
@ -66,7 +66,7 @@ func TestEventBridgeManifestPushed(t *testing.T) {
return nil
}))
repoRef, _ := reference.WithName(repo)
repoRef, _ := reference.CreateNamed("", repo)
if err := l.ManifestPushed(repoRef, sm); err != nil {
t.Fatalf("unexpected error notifying manifest pull: %v", err)
}
@ -82,7 +82,7 @@ func TestEventBridgeManifestPushedWithTag(t *testing.T) {
return nil
}))
repoRef, _ := reference.WithName(repo)
repoRef, _ := reference.CreateNamed("", repo)
if err := l.ManifestPushed(repoRef, sm, distribution.WithTag(m.Tag)); err != nil {
t.Fatalf("unexpected error notifying manifest pull: %v", err)
}
@ -98,7 +98,7 @@ func TestEventBridgeManifestPulledWithTag(t *testing.T) {
return nil
}))
repoRef, _ := reference.WithName(repo)
repoRef, _ := reference.CreateNamed("", repo)
if err := l.ManifestPulled(repoRef, sm, distribution.WithTag(m.Tag)); err != nil {
t.Fatalf("unexpected error notifying manifest pull: %v", err)
}
@ -113,7 +113,7 @@ func TestEventBridgeManifestDeleted(t *testing.T) {
return nil
}))
repoRef, _ := reference.WithName(repo)
repoRef, _ := reference.CreateNamed("", repo)
if err := l.ManifestDeleted(repoRef, dgst); err != nil {
t.Fatalf("unexpected error notifying manifest pull: %v", err)
}
@ -188,7 +188,7 @@ func checkCommonManifest(t *testing.T, action string, event events.Event) {
t.Fatalf("unexpected event action: %q != %q", event.(Event).Action, action)
}
repoRef, _ := reference.WithName(repo)
repoRef, _ := reference.CreateNamed("", repo)
ref, _ := reference.WithDigest(repoRef, dgst)
u, err := ub.BuildManifestURL(ref)
if err != nil {

View file

@ -33,7 +33,7 @@ func TestListener(t *testing.T) {
ops: make(map[string]int),
}
repoRef, _ := reference.WithName("foo/bar")
repoRef, _ := reference.CreateNamed("", "foo/bar")
repository, err := registry.Repository(ctx, repoRef)
if err != nil {
t.Fatalf("unexpected error getting repo: %v", err)

View file

@ -109,11 +109,19 @@ func ParseDockerRef(ref string) (Named, error) {
if err != nil {
return nil, err
}
if canonical, ok := named.(namedTaggedDigested); ok {
// The reference is both tagged and digested; only return digested.
newNamed, err := WithName(canonical.Name())
if err != nil {
return nil, err
if _, ok := named.(NamedTagged); ok {
if canonical, ok := named.(Canonical); ok {
// The reference is both tagged and digested, only
// return digested.
newNamed, err := CreateNamed(Domain(canonical), Path(canonical))
if err != nil {
return nil, err
}
newCanonical, err := WithDigest(newNamed, canonical.Digest())
if err != nil {
return nil, err
}
return newCanonical, nil
}
return WithDigest(newNamed, canonical.Digest())
}

View file

@ -325,14 +325,14 @@ func TestParseReferenceWithTagAndDigest(t *testing.T) {
func TestInvalidReferenceComponents(t *testing.T) {
t.Parallel()
if _, err := ParseNormalizedNamed("-foo"); err == nil {
t.Fatal("Expected WithName to detect invalid name")
t.Fatal("Expected ParseNormalizedNamed to detect invalid name")
}
ref, err := ParseNormalizedNamed("busybox")
if err != nil {
t.Fatal(err)
}
if _, err := WithTag(ref, "-foo"); err == nil {
t.Fatal("Expected WithName to detect invalid tag")
t.Fatal("Expected ParseNormalizedNamed to detect invalid tag")
}
if _, err := WithDigest(ref, digest.Digest("foo")); err == nil {
t.Fatal("Expected WithDigest to detect invalid digest")

View file

@ -250,21 +250,29 @@ func ParseNamed(s string) (Named, error) {
return named, nil
}
// WithName returns a named object representing the given string. If the input
// is invalid ErrReferenceInvalidFormat will be returned.
func WithName(name string) (Named, error) {
if len(name) > NameTotalLengthMax {
// CreateNamed returns a named object using the given domain and path. If the
// input is invalid ErrReferenceInvalidFormat will be returned.
func CreateNamed(domain, path string) (Named, error) {
repo := repository{
domain: domain,
path: path,
}
if repo.domain != "" {
if !anchoredDomainRegexp.MatchString(repo.domain) {
return nil, ErrReferenceInvalidFormat
}
}
if !anchoredPathRegexp.MatchString(repo.path) {
return nil, ErrReferenceInvalidFormat
}
if len(repo.String()) > NameTotalLengthMax {
return nil, ErrNameTooLong
}
match := anchoredNameRegexp.FindStringSubmatch(name)
if match == nil || len(match) != 3 {
return nil, ErrReferenceInvalidFormat
}
return repository{
domain: match[1],
path: match[2],
}, nil
return repo, nil
}
// WithTag combines the name from "name" and the tag from "tag" to form a

View file

@ -328,51 +328,67 @@ func TestReferenceParse(t *testing.T) {
}
}
// TestWithNameFailure tests cases where WithName should fail. Cases where it
// TestCreateNamedFailure tests cases where CreateNamed should fail. Cases where it
// should succeed are covered by TestSplitHostname, below.
func TestWithNameFailure(t *testing.T) {
t.Parallel()
func TestCreateNamedFailure(t *testing.T) {
testcases := []struct {
input string
err error
domain string
path string
err error
}{
{
input: "",
err: ErrNameEmpty,
err: ErrNameEmpty,
},
{
input: ":justtag",
err: ErrReferenceInvalidFormat,
path: ":justtag",
err: ErrReferenceInvalidFormat,
},
{
input: "@sha256:ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
err: ErrReferenceInvalidFormat,
path: "@sha256:ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
err: ErrReferenceInvalidFormat,
},
{
input: "validname@invaliddigest:ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
err: ErrReferenceInvalidFormat,
path: "validname@invaliddigest:ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
err: ErrReferenceInvalidFormat,
},
{
input: strings.Repeat("a/", 128) + "a:tag",
err: ErrNameTooLong,
path: strings.Repeat("a/", 128) + "a",
err: ErrNameTooLong,
},
{
input: "aa/asdf$$^/aa",
err: ErrReferenceInvalidFormat,
domain: "aaaaaaaaaaaaaaaaaaaa",
path: strings.Repeat("a/", 120) + "a",
err: ErrNameTooLong,
},
{
domain: "aa",
path: "asdf$$^/aa",
err: ErrReferenceInvalidFormat,
},
}
for _, testcase := range testcases {
testcase := testcase
t.Run(testcase.input, func(t *testing.T) {
t.Parallel()
_, err := WithName(testcase.input)
if err == nil {
t.Errorf("no error parsing name. expected: %s", testcase.err)
}
})
failf := func(format string, v ...interface{}) {
t.Logf(strconv.Quote(testcase.domain)+" / "+strconv.Quote(testcase.path)+": "+format, v...)
t.Fail()
}
_, err := CreateNamed(testcase.domain, testcase.path)
if err == nil {
failf("no error parsing name. expected: %s", testcase.err)
}
}
}
type testNamed string
func (n testNamed) String() string {
return string(n)
}
func (n testNamed) Name() string {
return string(n)
}
func TestSplitHostname(t *testing.T) {
t.Parallel()
testcases := []struct {
@ -412,21 +428,18 @@ func TestSplitHostname(t *testing.T) {
},
}
for _, testcase := range testcases {
testcase := testcase
t.Run(testcase.input, func(t *testing.T) {
t.Parallel()
named, err := WithName(testcase.input)
if err != nil {
t.Errorf("error parsing name: %s", err)
}
domain, name := SplitHostname(named)
if domain != testcase.domain {
t.Errorf("unexpected domain: got %q, expected %q", domain, testcase.domain)
}
if name != testcase.name {
t.Errorf("unexpected name: got %q, expected %q", name, testcase.name)
}
})
failf := func(format string, v ...interface{}) {
t.Logf(strconv.Quote(testcase.input)+": "+format, v...)
t.Fail()
}
domain, name := SplitHostname(testNamed(testcase.input))
if domain != testcase.domain {
failf("unexpected domain: got %q, expected %q", domain, testcase.domain)
}
if name != testcase.name {
failf("unexpected name: got %q, expected %q", name, testcase.name)
}
}
}
@ -594,10 +607,14 @@ func TestWithTag(t *testing.T) {
},
}
for _, testcase := range testcases {
testcase := testcase
t.Run(testcase.combined, func(t *testing.T) {
t.Parallel()
named, err := WithName(testcase.name)
failf := func(format string, v ...interface{}) {
t.Logf(strconv.Quote(testcase.name)+": "+format, v...)
t.Fail()
}
var named Named = testNamed(testcase.name)
if testcase.digest != "" {
canonical, err := WithDigest(named, testcase.digest)
if err != nil {
t.Errorf("error parsing name: %s", err)
}
@ -651,10 +668,14 @@ func TestWithDigest(t *testing.T) {
},
}
for _, testcase := range testcases {
testcase := testcase
t.Run(testcase.combined, func(t *testing.T) {
t.Parallel()
named, err := WithName(testcase.name)
failf := func(format string, v ...interface{}) {
t.Logf(strconv.Quote(testcase.name)+": "+format, v...)
t.Fail()
}
var named Named = testNamed(testcase.name)
if testcase.tag != "" {
tagged, err := WithTag(named, testcase.tag)
if err != nil {
t.Errorf("error parsing name: %s", err)
}

View file

@ -56,6 +56,13 @@ const (
// domain-name without a "." or a ":port" are considered a path component.
localhost = `localhost`
// pathComponentRegexp restricts registry path component names to start
// with at least one letter or number, with following parts able to be
// separated by one period, one or two underscore and multiple dashes.
pathComponentRegexp = expression(
alphaNumericRegexp,
optional(repeated(separatorRegexp, alphaNumericRegexp)))
// domainNameComponent restricts the registry domain component of a
// repository name to start with a component as defined by DomainRegexp.
domainNameComponent = `(?:[a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9-]*[a-zA-Z0-9])`
@ -109,6 +116,15 @@ var (
// compatibility with Docker image names.
domainAndPort = host + optionalPort
// pathRegexp defines the structure of path components that must
// be part of image names.
pathRegexp = expression(
pathComponentRegexp,
optional(repeated(literal(`/`), pathComponentRegexp)))
// TagRegexp matches valid tag names. From docker/docker:graph/tags.go.
TagRegexp = match(`[\w][\w.-]{0,127}`)
// anchoredTagRegexp matches valid tag names, anchored at the start and
// end of the matched string.
anchoredTagRegexp = regexp.MustCompile(anchored(tag))
@ -129,9 +145,24 @@ var (
remoteName = pathComponent + anyTimes(`/`+pathComponent)
namePat = optional(domainAndPort+`/`) + remoteName
// NameRegexp is the format for the name component of references. The
// regexp has capturing groups for the domain and name part omitting
// the separating forward slash from either.
NameRegexp = expression(
optional(DomainRegexp, literal(`/`)),
pathRegexp)
// anchoredNameRegexp is used to parse a name value, capturing the
// domain and trailing components.
anchoredNameRegexp = regexp.MustCompile(anchored(optional(capture(domainAndPort), `/`), capture(remoteName)))
anchoredNameRegexp = anchored(
optional(capture(DomainRegexp), literal(`/`)),
capture(pathRegexp))
// anchoredDomainRegexp is used to validate a domain value of reference.
anchoredDomainRegexp = anchored(DomainRegexp)
// anchoredPathRegexp is used to validate a path value of reference.
anchoredPathRegexp = anchored(pathRegexp)
referencePat = anchored(capture(namePat), optional(`:`, capture(tag)), optional(`@`, capture(digestPat)))

View file

@ -18,7 +18,7 @@ type urlBuilderTestCase struct {
}
func makeURLBuilderTestCases(urlBuilder *URLBuilder) []urlBuilderTestCase {
fooBarRef, _ := reference.WithName("foo/bar")
fooBarRef, _ := reference.CreateNamed("", "foo/bar")
return []urlBuilderTestCase{
{
description: "test base url",

View file

@ -291,7 +291,7 @@ func TestBlobResume(t *testing.T) {
func TestBlobDelete(t *testing.T) {
dgst, _ := newRandomBlob(1024)
var m testutil.RequestResponseMap
repo, _ := reference.WithName("test.example.com/repo1")
repo, _ := reference.CreateNamed("test.example.com", "repo1")
m = append(m, testutil.RequestResponseMapping{
Request: testutil.Request{
Method: http.MethodDelete,
@ -329,8 +329,13 @@ func TestBlobFetch(t *testing.T) {
defer c()
ctx := context.Background()
<<<<<<< HEAD
repo, _ := reference.WithName("test.example.com/repo1")
r, err := NewRepository(repo, e, nil)
=======
repo, _ := reference.CreateNamed("test.example.com", "repo1")
r, err := NewRepository(ctx, repo, e, nil)
>>>>>>> ce6bd261 (Replace WithName with CreateNamed)
if err != nil {
t.Fatal(err)
}
@ -350,7 +355,7 @@ func TestBlobFetch(t *testing.T) {
func TestBlobExistsNoContentLength(t *testing.T) {
var m testutil.RequestResponseMap
repo, _ := reference.WithName("biff")
repo, _ := reference.CreateNamed("", "biff")
dgst, content := newRandomBlob(1024)
m = append(m, testutil.RequestResponseMapping{
Request: testutil.Request{
@ -408,7 +413,7 @@ func TestBlobExists(t *testing.T) {
defer c()
ctx := context.Background()
repo, _ := reference.WithName("test.example.com/repo1")
repo, _ := reference.CreateNamed("test.example.com", "repo1")
r, err := NewRepository(repo, e, nil)
if err != nil {
t.Fatal(err)
@ -440,7 +445,7 @@ func TestBlobUploadChunked(t *testing.T) {
b1[512:513],
b1[513:1024],
}
repo, _ := reference.WithName("test.example.com/uploadrepo")
repo, _ := reference.CreateNamed("test.example.com", "uploadrepo")
uuids := []string{uuid.Generate().String()}
m = append(m, testutil.RequestResponseMapping{
Request: testutil.Request{
@ -555,7 +560,7 @@ func TestBlobUploadChunked(t *testing.T) {
func TestBlobUploadMonolithic(t *testing.T) {
dgst, b1 := newRandomBlob(1024)
var m testutil.RequestResponseMap
repo, _ := reference.WithName("test.example.com/uploadrepo")
repo, _ := reference.CreateNamed("", "test.example.com/uploadrepo")
uploadID := uuid.Generate().String()
m = append(m, testutil.RequestResponseMapping{
Request: testutil.Request{
@ -855,9 +860,9 @@ func TestBlobUploadMonolithicNoDockerUploadUUID(t *testing.T) {
func TestBlobMount(t *testing.T) {
dgst, content := newRandomBlob(1024)
var m testutil.RequestResponseMap
repo, _ := reference.WithName("test.example.com/uploadrepo")
repo, _ := reference.CreateNamed("test.example.com", "uploadrepo")
sourceRepo, _ := reference.WithName("test.example.com/sourcerepo")
sourceRepo, _ := reference.CreateNamed("test.example.com", "sourcerepo")
canonicalRef, _ := reference.WithDigest(sourceRepo, dgst)
m = append(m, testutil.RequestResponseMapping{
@ -1089,7 +1094,7 @@ func checkEqualManifest(m1, m2 *schema1.SignedManifest) error {
func TestV1ManifestFetch(t *testing.T) {
ctx := context.Background()
repo, _ := reference.WithName("test.example.com/repo")
repo, _ := reference.CreateNamed("test.example.com", "repo")
m1, dgst, _ := newRandomSchemaV1Manifest(repo, "latest", 6)
var m testutil.RequestResponseMap
_, pl, err := m1.Payload()
@ -1166,7 +1171,7 @@ func TestV1ManifestFetch(t *testing.T) {
}
func TestManifestFetchWithEtag(t *testing.T) {
repo, _ := reference.WithName("test.example.com/repo/by/tag")
repo, _ := reference.CreateNamed("test.example.com", "repo/by/tag")
_, d1, p1 := newRandomSchemaV1Manifest(repo, "latest", 6)
var m testutil.RequestResponseMap
addTestManifestWithEtag(repo, "latest", p1, &m, d1.String())
@ -1255,7 +1260,7 @@ func TestManifestFetchWithAccept(t *testing.T) {
}
func TestManifestDelete(t *testing.T) {
repo, _ := reference.WithName("test.example.com/repo/delete")
repo, _ := reference.CreateNamed("test.example.com", "repo/delete")
_, dgst1, _ := newRandomSchemaV1Manifest(repo, "latest", 6)
_, dgst2, _ := newRandomSchemaV1Manifest(repo, "latest", 6)
var m testutil.RequestResponseMap
@ -1295,7 +1300,7 @@ func TestManifestDelete(t *testing.T) {
}
func TestManifestPut(t *testing.T) {
repo, _ := reference.WithName("test.example.com/repo/delete")
repo, _ := reference.CreateNamed("test.example.com", "repo/delete")
m1, dgst, _ := newRandomSchemaV1Manifest(repo, "other", 6)
_, payload, err := m1.Payload()
@ -1360,7 +1365,7 @@ func TestManifestPut(t *testing.T) {
}
func TestManifestTags(t *testing.T) {
repo, _ := reference.WithName("test.example.com/repo/tags/list")
repo, _ := reference.CreateNamed("test.example.com", "repo/tags/list")
tagsList := []byte(strings.TrimSpace(`
{
"name": "test.example.com/repo/tags/list",
@ -1459,7 +1464,7 @@ func TestTagDelete(t *testing.T) {
}
func TestObtainsErrorForMissingTag(t *testing.T) {
repo, _ := reference.WithName("test.example.com/repo")
repo, _ := reference.CreateNamed("test.example.com", "repo")
var m testutil.RequestResponseMap
var errors errcode.Errors
@ -1536,7 +1541,7 @@ func TestManifestTagsPaginated(t *testing.T) {
s := httptest.NewServer(http.NotFoundHandler())
defer s.Close()
repo, _ := reference.WithName("test.example.com/repo/tags/list")
repo, _ := reference.CreateNamed("test.example.com", "repo/tags/list")
tagsList := []string{"tag1", "tag2", "funtag"}
var m testutil.RequestResponseMap
for i := 0; i < 3; i++ {
@ -1619,7 +1624,7 @@ func TestManifestTagsPaginated(t *testing.T) {
}
func TestManifestUnauthorized(t *testing.T) {
repo, _ := reference.WithName("test.example.com/repo")
repo, _ := reference.CreateNamed("test.example.com", "repo")
_, dgst, _ := newRandomSchemaV1Manifest(repo, "latest", 6)
var m testutil.RequestResponseMap

View file

@ -436,7 +436,7 @@ func makeBlobArgs(t *testing.T) blobArgs {
layerFile: layerFile,
layerDigest: layerDigest,
}
args.imageName, _ = reference.WithName("foo/bar")
args.imageName, _ = reference.CreateNamed("", "foo/bar")
return args
}
@ -478,7 +478,7 @@ func TestRelativeURL(t *testing.T) {
config.HTTP.RelativeURLs = false
env := newTestEnvWithConfig(t, &config)
defer env.Shutdown()
ref, _ := reference.WithName("foo/bar")
ref, _ := reference.CreateNamed("", "foo/bar")
uploadURLBaseAbs, _ := startPushLayer(t, env, ref)
u, err := url.Parse(uploadURLBaseAbs)
@ -897,7 +897,7 @@ func TestDeleteDisabled(t *testing.T) {
env := newTestEnv(t, false)
defer env.Shutdown()
imageName, _ := reference.WithName("foo/bar")
imageName, _ := reference.CreateNamed("", "foo/bar")
// "build" our layer file
layerFile, layerDigest, err := testutil.CreateRandomTarFile()
if err != nil {
@ -924,7 +924,7 @@ func TestDeleteReadOnly(t *testing.T) {
env := newTestEnv(t, true)
defer env.Shutdown()
imageName, _ := reference.WithName("foo/bar")
imageName, _ := reference.CreateNamed("", "foo/bar")
// "build" our layer file
layerFile, layerDigest, err := testutil.CreateRandomTarFile()
if err != nil {
@ -954,7 +954,7 @@ func TestStartPushReadOnly(t *testing.T) {
defer env.Shutdown()
env.app.readOnly = true
imageName, _ := reference.WithName("foo/bar")
imageName, _ := reference.CreateNamed("", "foo/bar")
layerUploadURL, err := env.builder.BuildBlobUploadURL(imageName)
if err != nil {
@ -992,8 +992,8 @@ type manifestArgs struct {
}
func TestManifestAPI(t *testing.T) {
schema1Repo, _ := reference.WithName("foo/schema1")
schema2Repo, _ := reference.WithName("foo/schema2")
schema1Repo, _ := reference.CreateNamed("", "foo/schema1")
schema2Repo, _ := reference.CreateNamed("", "foo/schema2")
deleteEnabled := false
env1 := newTestEnv(t, deleteEnabled)
@ -1171,22 +1171,22 @@ func TestGetManifestWithStorageError(t *testing.T) {
env1 := newTestEnvWithConfig(t, &config)
defer env1.Shutdown()
repo, _ := reference.WithName(repositoryWithManifestNotFound)
repo, _ := reference.CreateNamed("", repositoryWithManifestNotFound)
testManifestWithStorageError(t, env1, repo, http.StatusNotFound, v2.ErrorCodeManifestUnknown)
repo, _ = reference.WithName(repositoryWithGenericStorageError)
repo, _ = reference.CreateNamed("", repositoryWithGenericStorageError)
testManifestWithStorageError(t, env1, repo, http.StatusInternalServerError, errcode.ErrorCodeUnknown)
repo, _ = reference.WithName(repositoryWithManifestInvalidPath)
repo, _ = reference.CreateNamed("", repositoryWithManifestInvalidPath)
testManifestWithStorageError(t, env1, repo, http.StatusInternalServerError, errcode.ErrorCodeUnknown)
repo, _ = reference.WithName(repositoryWithManifestBadLink)
repo, _ = reference.CreateNamed("", repositoryWithManifestBadLink)
testManifestWithStorageError(t, env1, repo, http.StatusInternalServerError, errcode.ErrorCodeUnknown)
}
func TestManifestDelete(t *testing.T) {
schema1Repo, _ := reference.WithName("foo/schema1")
schema2Repo, _ := reference.WithName("foo/schema2")
schema1Repo, _ := reference.CreateNamed("", "foo/schema1")
schema2Repo, _ := reference.CreateNamed("", "foo/schema2")
deleteEnabled := true
env := newTestEnv(t, deleteEnabled)
@ -1198,7 +1198,7 @@ func TestManifestDelete(t *testing.T) {
}
func TestManifestDeleteDisabled(t *testing.T) {
schema1Repo, _ := reference.WithName("foo/schema1")
schema1Repo, _ := reference.CreateNamed("", "foo/schema1")
deleteEnabled := false
env := newTestEnv(t, deleteEnabled)
defer env.Shutdown()
@ -2705,7 +2705,7 @@ func checkErr(t *testing.T, err error, msg string) {
}
func createRepository(env *testEnv, t *testing.T, imageName string, tag string) digest.Digest {
imageNameRef, err := reference.WithName(imageName)
imageNameRef, err := reference.CreateNamed("", imageName)
if err != nil {
t.Fatalf("unable to parse reference: %v", err)
}
@ -2775,7 +2775,7 @@ func TestRegistryAsCacheMutationAPIs(t *testing.T) {
env := newTestEnvMirror(t, deleteEnabled)
defer env.Shutdown()
imageName, _ := reference.WithName("foo/bar")
imageName, _ := reference.CreateNamed("", "foo/bar")
tag := "latest"
tagRef, _ := reference.WithTag(imageName, tag)
manifestURL, err := env.builder.BuildManifestURL(tagRef)
@ -2839,7 +2839,7 @@ func TestProxyManifestGetByTag(t *testing.T) {
truthConfig.Compatibility.Schema1.Enabled = true
truthConfig.HTTP.Headers = headerConfig
imageName, _ := reference.WithName("foo/bar")
imageName, _ := reference.CreateNamed("", "foo/bar")
tag := "latest"
truthEnv := newTestEnvWithConfig(t, &truthConfig)

View file

@ -695,7 +695,7 @@ func (app *App) dispatcher(dispatch dispatchFunc) http.Handler {
r = r.WithContext(context)
if app.nameRequired(r) {
nameRef, err := reference.WithName(getName(context))
nameRef, err := reference.CreateNamed("", getName(context))
if err != nil {
dcontext.GetLogger(context).Errorf("error parsing reference from context: %v", err)
context.Errors = append(context.Errors, distribution.ErrRepositoryNameInvalid{

View file

@ -369,7 +369,7 @@ func (buh *blobUploadHandler) createBlobMountOption(fromRepo, mountDigest string
return nil, err
}
ref, err := reference.WithName(fromRepo)
ref, err := reference.CreateNamed("", fromRepo)
if err != nil {
return nil, err
}

View file

@ -116,7 +116,7 @@ func (te *testEnv) RemoteStats() *map[string]int {
func makeTestEnv(t *testing.T, name string) *testEnv {
t.Helper()
nameRef, err := reference.WithName(name)
nameRef, err := reference.CreateNamed("", name)
if err != nil {
t.Fatalf("unable to parse reference: %s", err)
}

View file

@ -83,7 +83,7 @@ func (m *mockChallenger) challengeManager() challenge.Manager {
}
func newManifestStoreTestEnv(t *testing.T, name, tag string) *manifestStoreTestEnv {
nameRef, err := reference.WithName(name)
nameRef, err := reference.CreateNamed("", name)
if err != nil {
t.Fatalf("unable to parse reference: %s", err)
}

View file

@ -22,7 +22,7 @@ import (
// obtained using Seek
func TestWriteSeek(t *testing.T) {
ctx := context.Background()
imageName, _ := reference.WithName("foo/bar")
imageName, _ := reference.CreateNamed("", "foo/bar")
driver := testdriver.New()
registry, err := NewRegistry(ctx, driver, BlobDescriptorCacheProvider(memory.NewInMemoryBlobDescriptorCacheProvider(memory.UnlimitedSize)), EnableDelete, EnableRedirect)
if err != nil {
@ -56,7 +56,7 @@ func TestSimpleBlobUpload(t *testing.T) {
}
ctx := context.Background()
imageName, _ := reference.WithName("foo/bar")
imageName, _ := reference.CreateNamed("", "foo/bar")
driver := testdriver.New()
registry, err := NewRegistry(ctx, driver, BlobDescriptorCacheProvider(memory.NewInMemoryBlobDescriptorCacheProvider(memory.UnlimitedSize)), EnableDelete, EnableRedirect)
if err != nil {
@ -250,7 +250,7 @@ func TestSimpleBlobUpload(t *testing.T) {
// other tests.
func TestSimpleBlobRead(t *testing.T) {
ctx := context.Background()
imageName, _ := reference.WithName("foo/bar")
imageName, _ := reference.CreateNamed("", "foo/bar")
driver := testdriver.New()
registry, err := NewRegistry(ctx, driver, BlobDescriptorCacheProvider(memory.NewInMemoryBlobDescriptorCacheProvider(memory.UnlimitedSize)), EnableDelete, EnableRedirect)
if err != nil {
@ -361,8 +361,8 @@ func TestBlobMount(t *testing.T) {
}
ctx := context.Background()
imageName, _ := reference.WithName("foo/bar")
sourceImageName, _ := reference.WithName("foo/source")
imageName, _ := reference.CreateNamed("", "foo/bar")
sourceImageName, _ := reference.CreateNamed("", "foo/source")
driver := testdriver.New()
registry, err := NewRegistry(ctx, driver, BlobDescriptorCacheProvider(memory.NewInMemoryBlobDescriptorCacheProvider(memory.UnlimitedSize)), EnableDelete, EnableRedirect)
if err != nil {
@ -512,7 +512,7 @@ func TestBlobMount(t *testing.T) {
// TestLayerUploadZeroLength uploads zero-length
func TestLayerUploadZeroLength(t *testing.T) {
ctx := context.Background()
imageName, _ := reference.WithName("foo/bar")
imageName, _ := reference.CreateNamed("", "foo/bar")
driver := testdriver.New()
registry, err := NewRegistry(ctx, driver, BlobDescriptorCacheProvider(memory.NewInMemoryBlobDescriptorCacheProvider(memory.UnlimitedSize)), EnableDelete, EnableRedirect)
if err != nil {

View file

@ -68,7 +68,7 @@ func setupFS(t *testing.T) *setupEnv {
}
func makeRepo(ctx context.Context, t *testing.T, name string, reg distribution.Namespace) {
named, err := reference.WithName(name)
named, err := reference.CreateNamed("", name)
if err != nil {
t.Fatal(err)
}

View file

@ -41,7 +41,7 @@ func MarkAndSweep(ctx context.Context, storageDriver driver.StorageDriver, regis
emit(repoName)
var err error
named, err := reference.WithName(repoName)
named, err := reference.CreateNamed("", repoName)
if err != nil {
return fmt.Errorf("failed to parse repo name %s: %v", repoName, err)
}

View file

@ -39,7 +39,7 @@ func makeRepository(t *testing.T, registry distribution.Namespace, name string)
ctx := context.Background()
// Initialize a dummy repository
named, err := reference.WithName(name)
named, err := reference.CreateNamed("", name)
if err != nil {
t.Fatalf("Failed to parse name %s: %v", name, err)
}

View file

@ -64,7 +64,7 @@ func TestLinkedBlobStoreEnumerator(t *testing.T) {
}
func TestLinkedBlobStoreCreateWithMountFrom(t *testing.T) {
fooRepoName, _ := reference.WithName("nm/foo")
fooRepoName, _ := reference.CreateNamed("", "nm/foo")
fooEnv := newManifestStoreTestEnv(t, fooRepoName, "thetag")
ctx := context.Background()
stats, err := mockRegistry(t, fooEnv.registry)
@ -101,7 +101,7 @@ func TestLinkedBlobStoreCreateWithMountFrom(t *testing.T) {
}
// create another repository nm/bar
barRepoName, _ := reference.WithName("nm/bar")
barRepoName, _ := reference.CreateNamed("", "nm/bar")
barRepo, err := fooEnv.registry.Repository(ctx, barRepoName)
if err != nil {
t.Fatalf("unexpected error getting repo: %v", err)
@ -141,7 +141,7 @@ func TestLinkedBlobStoreCreateWithMountFrom(t *testing.T) {
clearStats(stats)
// create yet another repository nm/baz
bazRepoName, _ := reference.WithName("nm/baz")
bazRepoName, _ := reference.CreateNamed("", "nm/baz")
bazRepo, err := fooEnv.registry.Repository(ctx, bazRepoName)
if err != nil {
t.Fatalf("unexpected error getting repo: %v", err)

View file

@ -71,7 +71,7 @@ func TestManifestStorageV1Unsupported(t *testing.T) {
}
func testManifestStorage(t *testing.T, schema1Enabled bool, options ...RegistryOption) {
repoName, _ := reference.WithName("foo/bar")
repoName, _ := reference.CreateNamed("", "foo/bar")
env := newManifestStoreTestEnv(t, repoName, "thetag", options...)
ctx := context.Background()
ms, err := env.repository.Manifests(ctx)

View file

@ -29,7 +29,7 @@ func testTagStore(t *testing.T) *tagsTestEnv {
t.Fatal(err)
}
repoRef, _ := reference.WithName("a/b")
repoRef, _ := reference.CreateNamed("", "a/b")
repo, err := reg.Repository(ctx, repoRef)
if err != nil {
t.Fatal(err)