mirror of
https://github.com/go-gitea/gitea.git
synced 2024-12-04 14:46:57 -05:00
Use import of OCI structs (#22765)
Fixes #22758 Otherwise we would need to rewrite the structs in `oci.go`.
This commit is contained in:
parent
361d807274
commit
f8c1e14a13
10
assets/go-licenses.json
generated
10
assets/go-licenses.json
generated
File diff suppressed because one or more lines are too long
2
go.mod
2
go.mod
@ -82,6 +82,8 @@ require (
|
|||||||
github.com/niklasfasching/go-org v1.6.5
|
github.com/niklasfasching/go-org v1.6.5
|
||||||
github.com/oliamb/cutter v0.2.2
|
github.com/oliamb/cutter v0.2.2
|
||||||
github.com/olivere/elastic/v7 v7.0.32
|
github.com/olivere/elastic/v7 v7.0.32
|
||||||
|
github.com/opencontainers/go-digest v1.0.0
|
||||||
|
github.com/opencontainers/image-spec v1.1.0-rc2
|
||||||
github.com/pkg/errors v0.9.1
|
github.com/pkg/errors v0.9.1
|
||||||
github.com/pquerna/otp v1.4.0
|
github.com/pquerna/otp v1.4.0
|
||||||
github.com/prometheus/client_golang v1.14.0
|
github.com/prometheus/client_golang v1.14.0
|
||||||
|
4
go.sum
4
go.sum
@ -1009,6 +1009,10 @@ github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1y
|
|||||||
github.com/onsi/gomega v1.10.3/go.mod h1:V9xEwhxec5O8UDM77eCW8vLymOMltsqPVYWrpDsH8xc=
|
github.com/onsi/gomega v1.10.3/go.mod h1:V9xEwhxec5O8UDM77eCW8vLymOMltsqPVYWrpDsH8xc=
|
||||||
github.com/onsi/gomega v1.18.1 h1:M1GfJqGRrBrrGGsbxzV5dqM2U2ApXefZCQpkukxYRLE=
|
github.com/onsi/gomega v1.18.1 h1:M1GfJqGRrBrrGGsbxzV5dqM2U2ApXefZCQpkukxYRLE=
|
||||||
github.com/op/go-logging v0.0.0-20160315200505-970db520ece7/go.mod h1:HzydrMdWErDVzsI23lYNej1Htcns9BCg93Dk0bBINWk=
|
github.com/op/go-logging v0.0.0-20160315200505-970db520ece7/go.mod h1:HzydrMdWErDVzsI23lYNej1Htcns9BCg93Dk0bBINWk=
|
||||||
|
github.com/opencontainers/go-digest v1.0.0 h1:apOUWs51W5PlhuyGyz9FCeeBIOUDA/6nW8Oi/yOhh5U=
|
||||||
|
github.com/opencontainers/go-digest v1.0.0/go.mod h1:0JzlMkj0TRzQZfJkVvzbP0HBR3IKzErnv2BNG4W4MAM=
|
||||||
|
github.com/opencontainers/image-spec v1.1.0-rc2 h1:2zx/Stx4Wc5pIPDvIxHXvXtQFW/7XWJGmnM7r3wg034=
|
||||||
|
github.com/opencontainers/image-spec v1.1.0-rc2/go.mod h1:3OVijpioIKYWTqjiG0zfF6wvoJ4fAXGbjdZuI2NgsRQ=
|
||||||
github.com/opentracing-contrib/go-observer v0.0.0-20170622124052-a52f23424492/go.mod h1:Ngi6UdF0k5OKD5t5wlmGhe/EDKPoUM3BXZSSfIuJbis=
|
github.com/opentracing-contrib/go-observer v0.0.0-20170622124052-a52f23424492/go.mod h1:Ngi6UdF0k5OKD5t5wlmGhe/EDKPoUM3BXZSSfIuJbis=
|
||||||
github.com/opentracing/basictracer-go v1.0.0/go.mod h1:QfBfYuafItcjQuMwinw9GhYKwFXS9KnPs5lxoYwgW74=
|
github.com/opentracing/basictracer-go v1.0.0/go.mod h1:QfBfYuafItcjQuMwinw9GhYKwFXS9KnPs5lxoYwgW74=
|
||||||
github.com/opentracing/opentracing-go v1.0.2/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
|
github.com/opentracing/opentracing-go v1.0.2/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
|
||||||
|
@ -10,8 +10,9 @@ import (
|
|||||||
|
|
||||||
"code.gitea.io/gitea/modules/json"
|
"code.gitea.io/gitea/modules/json"
|
||||||
"code.gitea.io/gitea/modules/packages/container/helm"
|
"code.gitea.io/gitea/modules/packages/container/helm"
|
||||||
"code.gitea.io/gitea/modules/packages/container/oci"
|
|
||||||
"code.gitea.io/gitea/modules/validation"
|
"code.gitea.io/gitea/modules/validation"
|
||||||
|
|
||||||
|
oci "github.com/opencontainers/image-spec/specs-go/v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@ -65,8 +66,8 @@ type Metadata struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// ParseImageConfig parses the metadata of an image config
|
// ParseImageConfig parses the metadata of an image config
|
||||||
func ParseImageConfig(mediaType oci.MediaType, r io.Reader) (*Metadata, error) {
|
func ParseImageConfig(mt string, r io.Reader) (*Metadata, error) {
|
||||||
if strings.EqualFold(string(mediaType), helm.ConfigMediaType) {
|
if strings.EqualFold(mt, helm.ConfigMediaType) {
|
||||||
return parseHelmConfig(r)
|
return parseHelmConfig(r)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -8,8 +8,8 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"code.gitea.io/gitea/modules/packages/container/helm"
|
"code.gitea.io/gitea/modules/packages/container/helm"
|
||||||
"code.gitea.io/gitea/modules/packages/container/oci"
|
|
||||||
|
|
||||||
|
oci "github.com/opencontainers/image-spec/specs-go/v1"
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -23,7 +23,7 @@ func TestParseImageConfig(t *testing.T) {
|
|||||||
|
|
||||||
configOCI := `{"config": {"labels": {"` + labelAuthors + `": "` + author + `", "` + labelLicenses + `": "` + license + `", "` + labelURL + `": "` + projectURL + `", "` + labelSource + `": "` + repositoryURL + `", "` + labelDocumentation + `": "` + documentationURL + `", "` + labelDescription + `": "` + description + `"}}, "history": [{"created_by": "do it 1"}, {"created_by": "dummy #(nop) do it 2"}]}`
|
configOCI := `{"config": {"labels": {"` + labelAuthors + `": "` + author + `", "` + labelLicenses + `": "` + license + `", "` + labelURL + `": "` + projectURL + `", "` + labelSource + `": "` + repositoryURL + `", "` + labelDocumentation + `": "` + documentationURL + `", "` + labelDescription + `": "` + description + `"}}, "history": [{"created_by": "do it 1"}, {"created_by": "dummy #(nop) do it 2"}]}`
|
||||||
|
|
||||||
metadata, err := ParseImageConfig(oci.MediaType(oci.MediaTypeImageManifest), strings.NewReader(configOCI))
|
metadata, err := ParseImageConfig(oci.MediaTypeImageManifest, strings.NewReader(configOCI))
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
|
|
||||||
assert.Equal(t, TypeOCI, metadata.Type)
|
assert.Equal(t, TypeOCI, metadata.Type)
|
||||||
@ -50,7 +50,7 @@ func TestParseImageConfig(t *testing.T) {
|
|||||||
|
|
||||||
configHelm := `{"description":"` + description + `", "home": "` + projectURL + `", "sources": ["` + repositoryURL + `"], "maintainers":[{"name":"` + author + `"}]}`
|
configHelm := `{"description":"` + description + `", "home": "` + projectURL + `", "sources": ["` + repositoryURL + `"], "maintainers":[{"name":"` + author + `"}]}`
|
||||||
|
|
||||||
metadata, err = ParseImageConfig(oci.MediaType(helm.ConfigMediaType), strings.NewReader(configHelm))
|
metadata, err = ParseImageConfig(helm.ConfigMediaType, strings.NewReader(configHelm))
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
|
|
||||||
assert.Equal(t, TypeHelm, metadata.Type)
|
assert.Equal(t, TypeHelm, metadata.Type)
|
||||||
|
@ -1,26 +0,0 @@
|
|||||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
|
||||||
// SPDX-License-Identifier: MIT
|
|
||||||
|
|
||||||
package oci
|
|
||||||
|
|
||||||
import (
|
|
||||||
"regexp"
|
|
||||||
"strings"
|
|
||||||
)
|
|
||||||
|
|
||||||
var digestPattern = regexp.MustCompile(`\Asha256:[a-f0-9]{64}\z`)
|
|
||||||
|
|
||||||
type Digest string
|
|
||||||
|
|
||||||
// Validate checks if the digest has a valid SHA256 signature
|
|
||||||
func (d Digest) Validate() bool {
|
|
||||||
return digestPattern.MatchString(string(d))
|
|
||||||
}
|
|
||||||
|
|
||||||
func (d Digest) Hash() string {
|
|
||||||
p := strings.SplitN(string(d), ":", 2)
|
|
||||||
if len(p) != 2 {
|
|
||||||
return ""
|
|
||||||
}
|
|
||||||
return p[1]
|
|
||||||
}
|
|
@ -1,35 +0,0 @@
|
|||||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
|
||||||
// SPDX-License-Identifier: MIT
|
|
||||||
|
|
||||||
package oci
|
|
||||||
|
|
||||||
import (
|
|
||||||
"strings"
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
MediaTypeImageManifest = "application/vnd.oci.image.manifest.v1+json"
|
|
||||||
MediaTypeImageIndex = "application/vnd.oci.image.index.v1+json"
|
|
||||||
MediaTypeDockerManifest = "application/vnd.docker.distribution.manifest.v2+json"
|
|
||||||
MediaTypeDockerManifestList = "application/vnd.docker.distribution.manifest.list.v2+json"
|
|
||||||
)
|
|
||||||
|
|
||||||
type MediaType string
|
|
||||||
|
|
||||||
// IsValid tests if the media type is in the OCI or Docker namespace
|
|
||||||
func (m MediaType) IsValid() bool {
|
|
||||||
s := string(m)
|
|
||||||
return strings.HasPrefix(s, "application/vnd.docker.") || strings.HasPrefix(s, "application/vnd.oci.")
|
|
||||||
}
|
|
||||||
|
|
||||||
// IsImageManifest tests if the media type is an image manifest
|
|
||||||
func (m MediaType) IsImageManifest() bool {
|
|
||||||
s := string(m)
|
|
||||||
return strings.EqualFold(s, MediaTypeDockerManifest) || strings.EqualFold(s, MediaTypeImageManifest)
|
|
||||||
}
|
|
||||||
|
|
||||||
// IsImageIndex tests if the media type is an image index
|
|
||||||
func (m MediaType) IsImageIndex() bool {
|
|
||||||
s := string(m)
|
|
||||||
return strings.EqualFold(s, MediaTypeDockerManifestList) || strings.EqualFold(s, MediaTypeImageIndex)
|
|
||||||
}
|
|
@ -1,190 +0,0 @@
|
|||||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
|
||||||
// SPDX-License-Identifier: MIT
|
|
||||||
|
|
||||||
package oci
|
|
||||||
|
|
||||||
import (
|
|
||||||
"time"
|
|
||||||
)
|
|
||||||
|
|
||||||
// https://github.com/opencontainers/image-spec/tree/main/specs-go/v1
|
|
||||||
|
|
||||||
// ImageConfig defines the execution parameters which should be used as a base when running a container using an image.
|
|
||||||
type ImageConfig struct {
|
|
||||||
// User defines the username or UID which the process in the container should run as.
|
|
||||||
User string `json:"User,omitempty"`
|
|
||||||
|
|
||||||
// ExposedPorts a set of ports to expose from a container running this image.
|
|
||||||
ExposedPorts map[string]struct{} `json:"ExposedPorts,omitempty"`
|
|
||||||
|
|
||||||
// Env is a list of environment variables to be used in a container.
|
|
||||||
Env []string `json:"Env,omitempty"`
|
|
||||||
|
|
||||||
// Entrypoint defines a list of arguments to use as the command to execute when the container starts.
|
|
||||||
Entrypoint []string `json:"Entrypoint,omitempty"`
|
|
||||||
|
|
||||||
// Cmd defines the default arguments to the entrypoint of the container.
|
|
||||||
Cmd []string `json:"Cmd,omitempty"`
|
|
||||||
|
|
||||||
// Volumes is a set of directories describing where the process is likely write data specific to a container instance.
|
|
||||||
Volumes map[string]struct{} `json:"Volumes,omitempty"`
|
|
||||||
|
|
||||||
// WorkingDir sets the current working directory of the entrypoint process in the container.
|
|
||||||
WorkingDir string `json:"WorkingDir,omitempty"`
|
|
||||||
|
|
||||||
// Labels contains arbitrary metadata for the container.
|
|
||||||
Labels map[string]string `json:"Labels,omitempty"`
|
|
||||||
|
|
||||||
// StopSignal contains the system call signal that will be sent to the container to exit.
|
|
||||||
StopSignal string `json:"StopSignal,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// RootFS describes a layer content addresses
|
|
||||||
type RootFS struct {
|
|
||||||
// Type is the type of the rootfs.
|
|
||||||
Type string `json:"type"`
|
|
||||||
|
|
||||||
// DiffIDs is an array of layer content hashes, in order from bottom-most to top-most.
|
|
||||||
DiffIDs []string `json:"diff_ids"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// History describes the history of a layer.
|
|
||||||
type History struct {
|
|
||||||
// Created is the combined date and time at which the layer was created, formatted as defined by RFC 3339, section 5.6.
|
|
||||||
Created *time.Time `json:"created,omitempty"`
|
|
||||||
|
|
||||||
// CreatedBy is the command which created the layer.
|
|
||||||
CreatedBy string `json:"created_by,omitempty"`
|
|
||||||
|
|
||||||
// Author is the author of the build point.
|
|
||||||
Author string `json:"author,omitempty"`
|
|
||||||
|
|
||||||
// Comment is a custom message set when creating the layer.
|
|
||||||
Comment string `json:"comment,omitempty"`
|
|
||||||
|
|
||||||
// EmptyLayer is used to mark if the history item created a filesystem diff.
|
|
||||||
EmptyLayer bool `json:"empty_layer,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Image is the JSON structure which describes some basic information about the image.
|
|
||||||
// This provides the `application/vnd.oci.image.config.v1+json` mediatype when marshalled to JSON.
|
|
||||||
type Image struct {
|
|
||||||
// Created is the combined date and time at which the image was created, formatted as defined by RFC 3339, section 5.6.
|
|
||||||
Created *time.Time `json:"created,omitempty"`
|
|
||||||
|
|
||||||
// Author defines the name and/or email address of the person or entity which created and is responsible for maintaining the image.
|
|
||||||
Author string `json:"author,omitempty"`
|
|
||||||
|
|
||||||
// Architecture is the CPU architecture which the binaries in this image are built to run on.
|
|
||||||
Architecture string `json:"architecture"`
|
|
||||||
|
|
||||||
// Variant is the variant of the specified CPU architecture which image binaries are intended to run on.
|
|
||||||
Variant string `json:"variant,omitempty"`
|
|
||||||
|
|
||||||
// OS is the name of the operating system which the image is built to run on.
|
|
||||||
OS string `json:"os"`
|
|
||||||
|
|
||||||
// OSVersion is an optional field specifying the operating system
|
|
||||||
// version, for example on Windows `10.0.14393.1066`.
|
|
||||||
OSVersion string `json:"os.version,omitempty"`
|
|
||||||
|
|
||||||
// OSFeatures is an optional field specifying an array of strings,
|
|
||||||
// each listing a required OS feature (for example on Windows `win32k`).
|
|
||||||
OSFeatures []string `json:"os.features,omitempty"`
|
|
||||||
|
|
||||||
// Config defines the execution parameters which should be used as a base when running a container using the image.
|
|
||||||
Config ImageConfig `json:"config,omitempty"`
|
|
||||||
|
|
||||||
// RootFS references the layer content addresses used by the image.
|
|
||||||
RootFS RootFS `json:"rootfs"`
|
|
||||||
|
|
||||||
// History describes the history of each layer.
|
|
||||||
History []History `json:"history,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Descriptor describes the disposition of targeted content.
|
|
||||||
// This structure provides `application/vnd.oci.descriptor.v1+json` mediatype
|
|
||||||
// when marshalled to JSON.
|
|
||||||
type Descriptor struct {
|
|
||||||
// MediaType is the media type of the object this schema refers to.
|
|
||||||
MediaType MediaType `json:"mediaType,omitempty"`
|
|
||||||
|
|
||||||
// Digest is the digest of the targeted content.
|
|
||||||
Digest Digest `json:"digest"`
|
|
||||||
|
|
||||||
// Size specifies the size in bytes of the blob.
|
|
||||||
Size int64 `json:"size"`
|
|
||||||
|
|
||||||
// URLs specifies a list of URLs from which this object MAY be downloaded
|
|
||||||
URLs []string `json:"urls,omitempty"`
|
|
||||||
|
|
||||||
// Annotations contains arbitrary metadata relating to the targeted content.
|
|
||||||
Annotations map[string]string `json:"annotations,omitempty"`
|
|
||||||
|
|
||||||
// Data is an embedding of the targeted content. This is encoded as a base64
|
|
||||||
// string when marshalled to JSON (automatically, by encoding/json). If
|
|
||||||
// present, Data can be used directly to avoid fetching the targeted content.
|
|
||||||
Data []byte `json:"data,omitempty"`
|
|
||||||
|
|
||||||
// Platform describes the platform which the image in the manifest runs on.
|
|
||||||
//
|
|
||||||
// This should only be used when referring to a manifest.
|
|
||||||
Platform *Platform `json:"platform,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Platform describes the platform which the image in the manifest runs on.
|
|
||||||
type Platform struct {
|
|
||||||
// Architecture field specifies the CPU architecture, for example
|
|
||||||
// `amd64` or `ppc64`.
|
|
||||||
Architecture string `json:"architecture"`
|
|
||||||
|
|
||||||
// OS specifies the operating system, for example `linux` or `windows`.
|
|
||||||
OS string `json:"os"`
|
|
||||||
|
|
||||||
// OSVersion is an optional field specifying the operating system
|
|
||||||
// version, for example on Windows `10.0.14393.1066`.
|
|
||||||
OSVersion string `json:"os.version,omitempty"`
|
|
||||||
|
|
||||||
// OSFeatures is an optional field specifying an array of strings,
|
|
||||||
// each listing a required OS feature (for example on Windows `win32k`).
|
|
||||||
OSFeatures []string `json:"os.features,omitempty"`
|
|
||||||
|
|
||||||
// Variant is an optional field specifying a variant of the CPU, for
|
|
||||||
// example `v7` to specify ARMv7 when architecture is `arm`.
|
|
||||||
Variant string `json:"variant,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
type SchemaMediaBase struct {
|
|
||||||
// SchemaVersion is the image manifest schema that this image follows
|
|
||||||
SchemaVersion int `json:"schemaVersion"`
|
|
||||||
|
|
||||||
// MediaType specifies the type of this document data structure e.g. `application/vnd.oci.image.manifest.v1+json`
|
|
||||||
MediaType MediaType `json:"mediaType,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Manifest provides `application/vnd.oci.image.manifest.v1+json` mediatype structure when marshalled to JSON.
|
|
||||||
type Manifest struct {
|
|
||||||
SchemaMediaBase
|
|
||||||
|
|
||||||
// Config references a configuration object for a container, by digest.
|
|
||||||
// The referenced configuration object is a JSON blob that the runtime uses to set up the container.
|
|
||||||
Config Descriptor `json:"config"`
|
|
||||||
|
|
||||||
// Layers is an indexed list of layers referenced by the manifest.
|
|
||||||
Layers []Descriptor `json:"layers"`
|
|
||||||
|
|
||||||
// Annotations contains arbitrary metadata for the image manifest.
|
|
||||||
Annotations map[string]string `json:"annotations,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Index references manifests for various platforms.
|
|
||||||
// This structure provides `application/vnd.oci.image.index.v1+json` mediatype when marshalled to JSON.
|
|
||||||
type Index struct {
|
|
||||||
SchemaMediaBase
|
|
||||||
|
|
||||||
// Manifests references platform specific manifests.
|
|
||||||
Manifests []Descriptor `json:"manifests"`
|
|
||||||
|
|
||||||
// Annotations contains arbitrary metadata for the image index.
|
|
||||||
Annotations map[string]string `json:"annotations,omitempty"`
|
|
||||||
}
|
|
@ -1,16 +0,0 @@
|
|||||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
|
||||||
// SPDX-License-Identifier: MIT
|
|
||||||
|
|
||||||
package oci
|
|
||||||
|
|
||||||
import (
|
|
||||||
"regexp"
|
|
||||||
)
|
|
||||||
|
|
||||||
var referencePattern = regexp.MustCompile(`\A[a-zA-Z0-9_][a-zA-Z0-9._-]{0,127}\z`)
|
|
||||||
|
|
||||||
type Reference string
|
|
||||||
|
|
||||||
func (r Reference) Validate() bool {
|
|
||||||
return referencePattern.MatchString(string(r))
|
|
||||||
}
|
|
@ -22,19 +22,23 @@ import (
|
|||||||
"code.gitea.io/gitea/modules/log"
|
"code.gitea.io/gitea/modules/log"
|
||||||
packages_module "code.gitea.io/gitea/modules/packages"
|
packages_module "code.gitea.io/gitea/modules/packages"
|
||||||
container_module "code.gitea.io/gitea/modules/packages/container"
|
container_module "code.gitea.io/gitea/modules/packages/container"
|
||||||
"code.gitea.io/gitea/modules/packages/container/oci"
|
|
||||||
"code.gitea.io/gitea/modules/setting"
|
"code.gitea.io/gitea/modules/setting"
|
||||||
"code.gitea.io/gitea/modules/util"
|
"code.gitea.io/gitea/modules/util"
|
||||||
"code.gitea.io/gitea/routers/api/packages/helper"
|
"code.gitea.io/gitea/routers/api/packages/helper"
|
||||||
packages_service "code.gitea.io/gitea/services/packages"
|
packages_service "code.gitea.io/gitea/services/packages"
|
||||||
container_service "code.gitea.io/gitea/services/packages/container"
|
container_service "code.gitea.io/gitea/services/packages/container"
|
||||||
|
|
||||||
|
digest "github.com/opencontainers/go-digest"
|
||||||
)
|
)
|
||||||
|
|
||||||
// maximum size of a container manifest
|
// maximum size of a container manifest
|
||||||
// https://github.com/opencontainers/distribution-spec/blob/main/spec.md#pushing-manifests
|
// https://github.com/opencontainers/distribution-spec/blob/main/spec.md#pushing-manifests
|
||||||
const maxManifestSize = 10 * 1024 * 1024
|
const maxManifestSize = 10 * 1024 * 1024
|
||||||
|
|
||||||
var imageNamePattern = regexp.MustCompile(`\A[a-z0-9]+([._-][a-z0-9]+)*(/[a-z0-9]+([._-][a-z0-9]+)*)*\z`)
|
var (
|
||||||
|
imageNamePattern = regexp.MustCompile(`\A[a-z0-9]+([._-][a-z0-9]+)*(/[a-z0-9]+([._-][a-z0-9]+)*)*\z`)
|
||||||
|
referencePattern = regexp.MustCompile(`\A[a-zA-Z0-9_][a-zA-Z0-9._-]{0,127}\z`)
|
||||||
|
)
|
||||||
|
|
||||||
type containerHeaders struct {
|
type containerHeaders struct {
|
||||||
Status int
|
Status int
|
||||||
@ -434,16 +438,16 @@ func CancelUploadBlob(ctx *context.Context) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func getBlobFromContext(ctx *context.Context) (*packages_model.PackageFileDescriptor, error) {
|
func getBlobFromContext(ctx *context.Context) (*packages_model.PackageFileDescriptor, error) {
|
||||||
digest := ctx.Params("digest")
|
d := ctx.Params("digest")
|
||||||
|
|
||||||
if !oci.Digest(digest).Validate() {
|
if digest.Digest(d).Validate() != nil {
|
||||||
return nil, container_model.ErrContainerBlobNotExist
|
return nil, container_model.ErrContainerBlobNotExist
|
||||||
}
|
}
|
||||||
|
|
||||||
return workaroundGetContainerBlob(ctx, &container_model.BlobSearchOptions{
|
return workaroundGetContainerBlob(ctx, &container_model.BlobSearchOptions{
|
||||||
OwnerID: ctx.Package.Owner.ID,
|
OwnerID: ctx.Package.Owner.ID,
|
||||||
Image: ctx.Params("image"),
|
Image: ctx.Params("image"),
|
||||||
Digest: digest,
|
Digest: d,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -498,14 +502,14 @@ func GetBlob(ctx *context.Context) {
|
|||||||
|
|
||||||
// https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-blobs
|
// https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-blobs
|
||||||
func DeleteBlob(ctx *context.Context) {
|
func DeleteBlob(ctx *context.Context) {
|
||||||
digest := ctx.Params("digest")
|
d := ctx.Params("digest")
|
||||||
|
|
||||||
if !oci.Digest(digest).Validate() {
|
if digest.Digest(d).Validate() != nil {
|
||||||
apiErrorDefined(ctx, errBlobUnknown)
|
apiErrorDefined(ctx, errBlobUnknown)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := deleteBlob(ctx.Package.Owner.ID, ctx.Params("image"), digest); err != nil {
|
if err := deleteBlob(ctx.Package.Owner.ID, ctx.Params("image"), d); err != nil {
|
||||||
apiError(ctx, http.StatusInternalServerError, err)
|
apiError(ctx, http.StatusInternalServerError, err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@ -520,15 +524,15 @@ func UploadManifest(ctx *context.Context) {
|
|||||||
reference := ctx.Params("reference")
|
reference := ctx.Params("reference")
|
||||||
|
|
||||||
mci := &manifestCreationInfo{
|
mci := &manifestCreationInfo{
|
||||||
MediaType: oci.MediaType(ctx.Req.Header.Get("Content-Type")),
|
MediaType: ctx.Req.Header.Get("Content-Type"),
|
||||||
Owner: ctx.Package.Owner,
|
Owner: ctx.Package.Owner,
|
||||||
Creator: ctx.Doer,
|
Creator: ctx.Doer,
|
||||||
Image: ctx.Params("image"),
|
Image: ctx.Params("image"),
|
||||||
Reference: reference,
|
Reference: reference,
|
||||||
IsTagged: !oci.Digest(reference).Validate(),
|
IsTagged: digest.Digest(reference).Validate() != nil,
|
||||||
}
|
}
|
||||||
|
|
||||||
if mci.IsTagged && !oci.Reference(reference).Validate() {
|
if mci.IsTagged && !referencePattern.MatchString(reference) {
|
||||||
apiErrorDefined(ctx, errManifestInvalid.WithMessage("Tag is invalid"))
|
apiErrorDefined(ctx, errManifestInvalid.WithMessage("Tag is invalid"))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@ -571,7 +575,7 @@ func UploadManifest(ctx *context.Context) {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func getManifestFromContext(ctx *context.Context) (*packages_model.PackageFileDescriptor, error) {
|
func getBlobSearchOptionsFromContext(ctx *context.Context) (*container_model.BlobSearchOptions, error) {
|
||||||
reference := ctx.Params("reference")
|
reference := ctx.Params("reference")
|
||||||
|
|
||||||
opts := &container_model.BlobSearchOptions{
|
opts := &container_model.BlobSearchOptions{
|
||||||
@ -579,14 +583,24 @@ func getManifestFromContext(ctx *context.Context) (*packages_model.PackageFileDe
|
|||||||
Image: ctx.Params("image"),
|
Image: ctx.Params("image"),
|
||||||
IsManifest: true,
|
IsManifest: true,
|
||||||
}
|
}
|
||||||
if oci.Digest(reference).Validate() {
|
|
||||||
|
if digest.Digest(reference).Validate() == nil {
|
||||||
opts.Digest = reference
|
opts.Digest = reference
|
||||||
} else if oci.Reference(reference).Validate() {
|
} else if referencePattern.MatchString(reference) {
|
||||||
opts.Tag = reference
|
opts.Tag = reference
|
||||||
} else {
|
} else {
|
||||||
return nil, container_model.ErrContainerBlobNotExist
|
return nil, container_model.ErrContainerBlobNotExist
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return opts, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getManifestFromContext(ctx *context.Context) (*packages_model.PackageFileDescriptor, error) {
|
||||||
|
opts, err := getBlobSearchOptionsFromContext(ctx)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
return workaroundGetContainerBlob(ctx, opts)
|
return workaroundGetContainerBlob(ctx, opts)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -643,18 +657,8 @@ func GetManifest(ctx *context.Context) {
|
|||||||
// https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-tags
|
// https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-tags
|
||||||
// https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-manifests
|
// https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-manifests
|
||||||
func DeleteManifest(ctx *context.Context) {
|
func DeleteManifest(ctx *context.Context) {
|
||||||
reference := ctx.Params("reference")
|
opts, err := getBlobSearchOptionsFromContext(ctx)
|
||||||
|
if err != nil {
|
||||||
opts := &container_model.BlobSearchOptions{
|
|
||||||
OwnerID: ctx.Package.Owner.ID,
|
|
||||||
Image: ctx.Params("image"),
|
|
||||||
IsManifest: true,
|
|
||||||
}
|
|
||||||
if oci.Digest(reference).Validate() {
|
|
||||||
opts.Digest = reference
|
|
||||||
} else if oci.Reference(reference).Validate() {
|
|
||||||
opts.Tag = reference
|
|
||||||
} else {
|
|
||||||
apiErrorDefined(ctx, errManifestUnknown)
|
apiErrorDefined(ctx, errManifestUnknown)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -19,14 +19,28 @@ import (
|
|||||||
"code.gitea.io/gitea/modules/log"
|
"code.gitea.io/gitea/modules/log"
|
||||||
packages_module "code.gitea.io/gitea/modules/packages"
|
packages_module "code.gitea.io/gitea/modules/packages"
|
||||||
container_module "code.gitea.io/gitea/modules/packages/container"
|
container_module "code.gitea.io/gitea/modules/packages/container"
|
||||||
"code.gitea.io/gitea/modules/packages/container/oci"
|
|
||||||
"code.gitea.io/gitea/modules/util"
|
"code.gitea.io/gitea/modules/util"
|
||||||
packages_service "code.gitea.io/gitea/services/packages"
|
packages_service "code.gitea.io/gitea/services/packages"
|
||||||
|
|
||||||
|
digest "github.com/opencontainers/go-digest"
|
||||||
|
oci "github.com/opencontainers/image-spec/specs-go/v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func isValidMediaType(mt string) bool {
|
||||||
|
return strings.HasPrefix(mt, "application/vnd.docker.") || strings.HasPrefix(mt, "application/vnd.oci.")
|
||||||
|
}
|
||||||
|
|
||||||
|
func isImageManifestMediaType(mt string) bool {
|
||||||
|
return strings.EqualFold(mt, oci.MediaTypeImageManifest) || strings.EqualFold(mt, "application/vnd.docker.distribution.manifest.v2+json")
|
||||||
|
}
|
||||||
|
|
||||||
|
func isImageIndexMediaType(mt string) bool {
|
||||||
|
return strings.EqualFold(mt, oci.MediaTypeImageIndex) || strings.EqualFold(mt, "application/vnd.docker.distribution.manifest.list.v2+json")
|
||||||
|
}
|
||||||
|
|
||||||
// manifestCreationInfo describes a manifest to create
|
// manifestCreationInfo describes a manifest to create
|
||||||
type manifestCreationInfo struct {
|
type manifestCreationInfo struct {
|
||||||
MediaType oci.MediaType
|
MediaType string
|
||||||
Owner *user_model.User
|
Owner *user_model.User
|
||||||
Creator *user_model.User
|
Creator *user_model.User
|
||||||
Image string
|
Image string
|
||||||
@ -36,12 +50,12 @@ type manifestCreationInfo struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func processManifest(mci *manifestCreationInfo, buf *packages_module.HashedBuffer) (string, error) {
|
func processManifest(mci *manifestCreationInfo, buf *packages_module.HashedBuffer) (string, error) {
|
||||||
var schema oci.SchemaMediaBase
|
var index oci.Index
|
||||||
if err := json.NewDecoder(buf).Decode(&schema); err != nil {
|
if err := json.NewDecoder(buf).Decode(&index); err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
|
||||||
if schema.SchemaVersion != 2 {
|
if index.SchemaVersion != 2 {
|
||||||
return "", errUnsupported.WithMessage("Schema version is not supported")
|
return "", errUnsupported.WithMessage("Schema version is not supported")
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -49,17 +63,17 @@ func processManifest(mci *manifestCreationInfo, buf *packages_module.HashedBuffe
|
|||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
|
||||||
if !mci.MediaType.IsValid() {
|
if !isValidMediaType(mci.MediaType) {
|
||||||
mci.MediaType = schema.MediaType
|
mci.MediaType = index.MediaType
|
||||||
if !mci.MediaType.IsValid() {
|
if !isValidMediaType(mci.MediaType) {
|
||||||
return "", errManifestInvalid.WithMessage("MediaType not recognized")
|
return "", errManifestInvalid.WithMessage("MediaType not recognized")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if mci.MediaType.IsImageManifest() {
|
if isImageManifestMediaType(mci.MediaType) {
|
||||||
d, err := processImageManifest(mci, buf)
|
d, err := processImageManifest(mci, buf)
|
||||||
return d, err
|
return d, err
|
||||||
} else if mci.MediaType.IsImageIndex() {
|
} else if isImageIndexMediaType(mci.MediaType) {
|
||||||
d, err := processImageManifestIndex(mci, buf)
|
d, err := processImageManifestIndex(mci, buf)
|
||||||
return d, err
|
return d, err
|
||||||
}
|
}
|
||||||
@ -204,7 +218,7 @@ func processImageManifestIndex(mci *manifestCreationInfo, buf *packages_module.H
|
|||||||
}
|
}
|
||||||
|
|
||||||
for _, manifest := range index.Manifests {
|
for _, manifest := range index.Manifests {
|
||||||
if !manifest.MediaType.IsImageManifest() {
|
if !isImageManifestMediaType(manifest.MediaType) {
|
||||||
return errManifestInvalid
|
return errManifestInvalid
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -348,8 +362,8 @@ func createPackageAndVersion(ctx context.Context, mci *manifestCreationInfo, met
|
|||||||
}
|
}
|
||||||
|
|
||||||
type blobReference struct {
|
type blobReference struct {
|
||||||
Digest oci.Digest
|
Digest digest.Digest
|
||||||
MediaType oci.MediaType
|
MediaType string
|
||||||
Name string
|
Name string
|
||||||
File *packages_model.PackageFileDescriptor
|
File *packages_model.PackageFileDescriptor
|
||||||
ExpectedSize int64
|
ExpectedSize int64
|
||||||
@ -383,7 +397,7 @@ func createFileFromBlobReference(ctx context.Context, pv, uploadVersion *package
|
|||||||
}
|
}
|
||||||
|
|
||||||
props := map[string]string{
|
props := map[string]string{
|
||||||
container_module.PropertyMediaType: string(ref.MediaType),
|
container_module.PropertyMediaType: ref.MediaType,
|
||||||
container_module.PropertyDigest: string(ref.Digest),
|
container_module.PropertyDigest: string(ref.Digest),
|
||||||
}
|
}
|
||||||
for name, value := range props {
|
for name, value := range props {
|
||||||
@ -428,7 +442,7 @@ func createManifestBlob(ctx context.Context, mci *manifestCreationInfo, pv *pack
|
|||||||
|
|
||||||
manifestDigest := digestFromHashSummer(buf)
|
manifestDigest := digestFromHashSummer(buf)
|
||||||
err = createFileFromBlobReference(ctx, pv, nil, &blobReference{
|
err = createFileFromBlobReference(ctx, pv, nil, &blobReference{
|
||||||
Digest: oci.Digest(manifestDigest),
|
Digest: digest.Digest(manifestDigest),
|
||||||
MediaType: mci.MediaType,
|
MediaType: mci.MediaType,
|
||||||
Name: container_model.ManifestFilename,
|
Name: container_model.ManifestFilename,
|
||||||
File: &packages_model.PackageFileDescriptor{Blob: pb},
|
File: &packages_model.PackageFileDescriptor{Blob: pb},
|
||||||
|
@ -10,8 +10,9 @@ import (
|
|||||||
packages_model "code.gitea.io/gitea/models/packages"
|
packages_model "code.gitea.io/gitea/models/packages"
|
||||||
container_model "code.gitea.io/gitea/models/packages/container"
|
container_model "code.gitea.io/gitea/models/packages/container"
|
||||||
container_module "code.gitea.io/gitea/modules/packages/container"
|
container_module "code.gitea.io/gitea/modules/packages/container"
|
||||||
"code.gitea.io/gitea/modules/packages/container/oci"
|
|
||||||
"code.gitea.io/gitea/modules/util"
|
"code.gitea.io/gitea/modules/util"
|
||||||
|
|
||||||
|
digest "github.com/opencontainers/go-digest"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Cleanup removes expired container data
|
// Cleanup removes expired container data
|
||||||
@ -87,7 +88,7 @@ func ShouldBeSkipped(ctx context.Context, pcr *packages_model.PackageCleanupRule
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Check if the version is a digest (or untagged)
|
// Check if the version is a digest (or untagged)
|
||||||
if oci.Digest(pv.LowerVersion).Validate() {
|
if digest.Digest(pv.LowerVersion).Validate() == nil {
|
||||||
// Check if there is another manifest referencing this version
|
// Check if there is another manifest referencing this version
|
||||||
has, err := packages_model.ExistVersion(ctx, &packages_model.PackageSearchOptions{
|
has, err := packages_model.ExistVersion(ctx, &packages_model.PackageSearchOptions{
|
||||||
PackageID: p.ID,
|
PackageID: p.ID,
|
||||||
|
@ -20,11 +20,11 @@ import (
|
|||||||
"code.gitea.io/gitea/models/unittest"
|
"code.gitea.io/gitea/models/unittest"
|
||||||
user_model "code.gitea.io/gitea/models/user"
|
user_model "code.gitea.io/gitea/models/user"
|
||||||
container_module "code.gitea.io/gitea/modules/packages/container"
|
container_module "code.gitea.io/gitea/modules/packages/container"
|
||||||
"code.gitea.io/gitea/modules/packages/container/oci"
|
|
||||||
"code.gitea.io/gitea/modules/setting"
|
"code.gitea.io/gitea/modules/setting"
|
||||||
api "code.gitea.io/gitea/modules/structs"
|
api "code.gitea.io/gitea/modules/structs"
|
||||||
"code.gitea.io/gitea/tests"
|
"code.gitea.io/gitea/tests"
|
||||||
|
|
||||||
|
oci "github.com/opencontainers/image-spec/specs-go/v1"
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -66,13 +66,13 @@ func TestPackageContainer(t *testing.T) {
|
|||||||
configContent := `{"architecture":"amd64","config":{"Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/true"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"container":"b89fe92a887d55c0961f02bdfbfd8ac3ddf66167db374770d2d9e9fab3311510","container_config":{"Hostname":"b89fe92a887d","Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/bin/sh","-c","#(nop) ","CMD [\"/true\"]"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"created":"2022-01-01T00:00:00.000000000Z","docker_version":"20.10.12","history":[{"created":"2022-01-01T00:00:00.000000000Z","created_by":"/bin/sh -c #(nop) COPY file:0e7589b0c800daaf6fa460d2677101e4676dd9491980210cb345480e513f3602 in /true "},{"created":"2022-01-01T00:00:00.000000001Z","created_by":"/bin/sh -c #(nop) CMD [\"/true\"]","empty_layer":true}],"os":"linux","rootfs":{"type":"layers","diff_ids":["sha256:0ff3b91bdf21ecdf2f2f3d4372c2098a14dbe06cd678e8f0a85fd4902d00e2e2"]}}`
|
configContent := `{"architecture":"amd64","config":{"Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/true"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"container":"b89fe92a887d55c0961f02bdfbfd8ac3ddf66167db374770d2d9e9fab3311510","container_config":{"Hostname":"b89fe92a887d","Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/bin/sh","-c","#(nop) ","CMD [\"/true\"]"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"created":"2022-01-01T00:00:00.000000000Z","docker_version":"20.10.12","history":[{"created":"2022-01-01T00:00:00.000000000Z","created_by":"/bin/sh -c #(nop) COPY file:0e7589b0c800daaf6fa460d2677101e4676dd9491980210cb345480e513f3602 in /true "},{"created":"2022-01-01T00:00:00.000000001Z","created_by":"/bin/sh -c #(nop) CMD [\"/true\"]","empty_layer":true}],"os":"linux","rootfs":{"type":"layers","diff_ids":["sha256:0ff3b91bdf21ecdf2f2f3d4372c2098a14dbe06cd678e8f0a85fd4902d00e2e2"]}}`
|
||||||
|
|
||||||
manifestDigest := "sha256:4f10484d1c1bb13e3956b4de1cd42db8e0f14a75be1617b60f2de3cd59c803c6"
|
manifestDigest := "sha256:4f10484d1c1bb13e3956b4de1cd42db8e0f14a75be1617b60f2de3cd59c803c6"
|
||||||
manifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeDockerManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}`
|
manifestContent := `{"schemaVersion":2,"mediaType":"application/vnd.docker.distribution.manifest.v2+json","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}`
|
||||||
|
|
||||||
untaggedManifestDigest := "sha256:4305f5f5572b9a426b88909b036e52ee3cf3d7b9c1b01fac840e90747f56623d"
|
untaggedManifestDigest := "sha256:4305f5f5572b9a426b88909b036e52ee3cf3d7b9c1b01fac840e90747f56623d"
|
||||||
untaggedManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}`
|
untaggedManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}`
|
||||||
|
|
||||||
indexManifestDigest := "sha256:bab112d6efb9e7f221995caaaa880352feb5bd8b1faf52fae8d12c113aa123ec"
|
indexManifestDigest := "sha256:bab112d6efb9e7f221995caaaa880352feb5bd8b1faf52fae8d12c113aa123ec"
|
||||||
indexManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageIndex + `","manifests":[{"mediaType":"` + oci.MediaTypeDockerManifest + `","digest":"` + manifestDigest + `","platform":{"os":"linux","architecture":"arm","variant":"v7"}},{"mediaType":"` + oci.MediaTypeImageManifest + `","digest":"` + untaggedManifestDigest + `","platform":{"os":"linux","architecture":"arm64","variant":"v8"}}]}`
|
indexManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageIndex + `","manifests":[{"mediaType":"application/vnd.docker.distribution.manifest.v2+json","digest":"` + manifestDigest + `","platform":{"os":"linux","architecture":"arm","variant":"v7"}},{"mediaType":"` + oci.MediaTypeImageManifest + `","digest":"` + untaggedManifestDigest + `","platform":{"os":"linux","architecture":"arm64","variant":"v8"}}]}`
|
||||||
|
|
||||||
anonymousToken := ""
|
anonymousToken := ""
|
||||||
userToken := ""
|
userToken := ""
|
||||||
@ -296,12 +296,12 @@ func TestPackageContainer(t *testing.T) {
|
|||||||
|
|
||||||
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
|
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
|
||||||
addTokenAuthHeader(req, anonymousToken)
|
addTokenAuthHeader(req, anonymousToken)
|
||||||
req.Header.Set("Content-Type", oci.MediaTypeDockerManifest)
|
req.Header.Set("Content-Type", "application/vnd.docker.distribution.manifest.v2+json")
|
||||||
MakeRequest(t, req, http.StatusUnauthorized)
|
MakeRequest(t, req, http.StatusUnauthorized)
|
||||||
|
|
||||||
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
|
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
|
||||||
addTokenAuthHeader(req, userToken)
|
addTokenAuthHeader(req, userToken)
|
||||||
req.Header.Set("Content-Type", oci.MediaTypeDockerManifest)
|
req.Header.Set("Content-Type", "application/vnd.docker.distribution.manifest.v2+json")
|
||||||
resp := MakeRequest(t, req, http.StatusCreated)
|
resp := MakeRequest(t, req, http.StatusCreated)
|
||||||
|
|
||||||
assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
|
assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
|
||||||
@ -328,7 +328,7 @@ func TestPackageContainer(t *testing.T) {
|
|||||||
switch pfd.File.Name {
|
switch pfd.File.Name {
|
||||||
case container_model.ManifestFilename:
|
case container_model.ManifestFilename:
|
||||||
assert.True(t, pfd.File.IsLead)
|
assert.True(t, pfd.File.IsLead)
|
||||||
assert.Equal(t, oci.MediaTypeDockerManifest, pfd.Properties.GetByName(container_module.PropertyMediaType))
|
assert.Equal(t, "application/vnd.docker.distribution.manifest.v2+json", pfd.Properties.GetByName(container_module.PropertyMediaType))
|
||||||
assert.Equal(t, manifestDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
|
assert.Equal(t, manifestDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
|
||||||
case strings.Replace(configDigest, ":", "_", 1):
|
case strings.Replace(configDigest, ":", "_", 1):
|
||||||
assert.False(t, pfd.File.IsLead)
|
assert.False(t, pfd.File.IsLead)
|
||||||
@ -354,7 +354,7 @@ func TestPackageContainer(t *testing.T) {
|
|||||||
// Overwrite existing tag should keep the download count
|
// Overwrite existing tag should keep the download count
|
||||||
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
|
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
|
||||||
addTokenAuthHeader(req, userToken)
|
addTokenAuthHeader(req, userToken)
|
||||||
req.Header.Set("Content-Type", oci.MediaTypeDockerManifest)
|
req.Header.Set("Content-Type", oci.MediaTypeImageManifest)
|
||||||
MakeRequest(t, req, http.StatusCreated)
|
MakeRequest(t, req, http.StatusCreated)
|
||||||
|
|
||||||
pv, err = packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, tag)
|
pv, err = packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, tag)
|
||||||
@ -389,7 +389,7 @@ func TestPackageContainer(t *testing.T) {
|
|||||||
resp := MakeRequest(t, req, http.StatusOK)
|
resp := MakeRequest(t, req, http.StatusOK)
|
||||||
|
|
||||||
assert.Equal(t, fmt.Sprintf("%d", len(manifestContent)), resp.Header().Get("Content-Length"))
|
assert.Equal(t, fmt.Sprintf("%d", len(manifestContent)), resp.Header().Get("Content-Length"))
|
||||||
assert.Equal(t, oci.MediaTypeDockerManifest, resp.Header().Get("Content-Type"))
|
assert.Equal(t, oci.MediaTypeImageManifest, resp.Header().Get("Content-Type"))
|
||||||
assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
|
assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
|
||||||
assert.Equal(t, manifestContent, resp.Body.String())
|
assert.Equal(t, manifestContent, resp.Body.String())
|
||||||
})
|
})
|
||||||
|
Loading…
Reference in New Issue
Block a user