2014-11-22 04:39:52 +01:00
|
|
|
package storage
|
|
|
|
|
|
|
|
import (
|
2015-01-14 21:02:43 +01:00
|
|
|
"bytes"
|
2015-01-17 03:24:07 +01:00
|
|
|
"io"
|
2014-11-22 04:39:52 +01:00
|
|
|
"reflect"
|
|
|
|
"testing"
|
|
|
|
|
2015-04-02 01:41:33 +02:00
|
|
|
"github.com/docker/distribution/registry/storage/cache"
|
|
|
|
|
2015-02-13 22:59:50 +01:00
|
|
|
"github.com/docker/distribution"
|
2014-12-24 01:01:38 +01:00
|
|
|
"github.com/docker/distribution/digest"
|
2015-01-02 22:21:29 +01:00
|
|
|
"github.com/docker/distribution/manifest"
|
2015-02-27 00:47:04 +01:00
|
|
|
"github.com/docker/distribution/registry/storage/driver"
|
2015-02-11 03:14:23 +01:00
|
|
|
"github.com/docker/distribution/registry/storage/driver/inmemory"
|
2015-02-09 23:44:58 +01:00
|
|
|
"github.com/docker/distribution/testutil"
|
2015-01-02 22:21:29 +01:00
|
|
|
"github.com/docker/libtrust"
|
2015-02-09 23:44:58 +01:00
|
|
|
"golang.org/x/net/context"
|
2014-11-22 04:39:52 +01:00
|
|
|
)
|
|
|
|
|
2015-02-27 00:47:04 +01:00
|
|
|
type manifestStoreTestEnv struct {
|
|
|
|
ctx context.Context
|
|
|
|
driver driver.StorageDriver
|
|
|
|
registry distribution.Registry
|
|
|
|
repository distribution.Repository
|
|
|
|
name string
|
|
|
|
tag string
|
|
|
|
}
|
|
|
|
|
|
|
|
func newManifestStoreTestEnv(t *testing.T, name, tag string) *manifestStoreTestEnv {
|
2015-02-09 23:44:58 +01:00
|
|
|
ctx := context.Background()
|
2015-01-17 03:24:07 +01:00
|
|
|
driver := inmemory.New()
|
2015-04-02 01:41:33 +02:00
|
|
|
registry := NewRegistryWithDriver(driver, cache.NewInMemoryLayerInfoCache())
|
2015-02-27 00:47:04 +01:00
|
|
|
|
2015-02-13 22:59:50 +01:00
|
|
|
repo, err := registry.Repository(ctx, name)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error getting repo: %v", err)
|
|
|
|
}
|
2014-11-22 04:39:52 +01:00
|
|
|
|
2015-02-27 00:47:04 +01:00
|
|
|
return &manifestStoreTestEnv{
|
|
|
|
ctx: ctx,
|
|
|
|
driver: driver,
|
|
|
|
registry: registry,
|
|
|
|
repository: repo,
|
|
|
|
name: name,
|
|
|
|
tag: tag,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestManifestStorage(t *testing.T) {
|
|
|
|
env := newManifestStoreTestEnv(t, "foo/bar", "thetag")
|
|
|
|
ms := env.repository.Manifests()
|
|
|
|
|
|
|
|
exists, err := ms.ExistsByTag(env.tag)
|
2014-11-22 04:39:52 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error checking manifest existence: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if exists {
|
|
|
|
t.Fatalf("manifest should not exist")
|
|
|
|
}
|
|
|
|
|
2015-02-27 00:47:04 +01:00
|
|
|
if _, err := ms.GetByTag(env.tag); true {
|
2014-11-26 21:52:52 +01:00
|
|
|
switch err.(type) {
|
2015-02-13 22:59:50 +01:00
|
|
|
case distribution.ErrManifestUnknown:
|
2014-11-26 21:52:52 +01:00
|
|
|
break
|
|
|
|
default:
|
|
|
|
t.Fatalf("expected manifest unknown error: %#v", err)
|
|
|
|
}
|
2014-11-22 04:39:52 +01:00
|
|
|
}
|
|
|
|
|
2015-01-03 00:46:47 +01:00
|
|
|
m := manifest.Manifest{
|
2015-01-02 22:21:29 +01:00
|
|
|
Versioned: manifest.Versioned{
|
2014-11-22 04:39:52 +01:00
|
|
|
SchemaVersion: 1,
|
|
|
|
},
|
2015-02-27 00:47:04 +01:00
|
|
|
Name: env.name,
|
|
|
|
Tag: env.tag,
|
2015-01-17 03:24:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Build up some test layers and add them to the manifest, saving the
|
|
|
|
// readseekers for upload later.
|
|
|
|
testLayers := map[digest.Digest]io.ReadSeeker{}
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
rs, ds, err := testutil.CreateRandomTarFile()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error generating test layer file")
|
|
|
|
}
|
|
|
|
dgst := digest.Digest(ds)
|
|
|
|
|
|
|
|
testLayers[digest.Digest(dgst)] = rs
|
|
|
|
m.FSLayers = append(m.FSLayers, manifest.FSLayer{
|
|
|
|
BlobSum: dgst,
|
|
|
|
})
|
2014-11-22 04:39:52 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
pk, err := libtrust.GenerateECP256PrivateKey()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error generating private key: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-01-03 00:46:47 +01:00
|
|
|
sm, err := manifest.Sign(&m, pk)
|
2014-11-22 04:39:52 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error signing manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-02-27 00:47:04 +01:00
|
|
|
err = ms.Put(sm)
|
2014-11-22 04:39:52 +01:00
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected errors putting manifest")
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(stevvooe): We expect errors describing all of the missing layers.
|
|
|
|
|
2015-01-17 03:24:07 +01:00
|
|
|
// Now, upload the layers that were missing!
|
|
|
|
for dgst, rs := range testLayers {
|
2015-02-27 00:47:04 +01:00
|
|
|
upload, err := env.repository.Layers().Upload()
|
2015-01-17 03:24:07 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error creating test upload: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := io.Copy(upload, rs); err != nil {
|
|
|
|
t.Fatalf("unexpected error copying to upload: %v", err)
|
|
|
|
}
|
2014-11-22 04:39:52 +01:00
|
|
|
|
2015-01-17 03:24:07 +01:00
|
|
|
if _, err := upload.Finish(dgst); err != nil {
|
|
|
|
t.Fatalf("unexpected error finishing upload: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-27 00:47:04 +01:00
|
|
|
if err = ms.Put(sm); err != nil {
|
2014-11-22 04:39:52 +01:00
|
|
|
t.Fatalf("unexpected error putting manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-02-27 00:47:04 +01:00
|
|
|
exists, err = ms.ExistsByTag(env.tag)
|
2014-11-22 04:39:52 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error checking manifest existence: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !exists {
|
|
|
|
t.Fatalf("manifest should exist")
|
|
|
|
}
|
|
|
|
|
2015-02-27 00:47:04 +01:00
|
|
|
fetchedManifest, err := ms.GetByTag(env.tag)
|
2014-11-22 04:39:52 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error fetching manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !reflect.DeepEqual(fetchedManifest, sm) {
|
|
|
|
t.Fatalf("fetched manifest not equal: %#v != %#v", fetchedManifest, sm)
|
|
|
|
}
|
2014-12-09 20:06:51 +01:00
|
|
|
|
2015-01-14 21:02:43 +01:00
|
|
|
fetchedJWS, err := libtrust.ParsePrettySignature(fetchedManifest.Raw, "signatures")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error parsing jws: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
payload, err := fetchedJWS.Payload()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error extracting payload: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-02-27 00:47:04 +01:00
|
|
|
// Now that we have a payload, take a moment to check that the manifest is
|
|
|
|
// return by the payload digest.
|
|
|
|
dgst, err := digest.FromBytes(payload)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error getting manifest digest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
exists, err = ms.Exists(dgst)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error checking manifest existence by digest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !exists {
|
|
|
|
t.Fatalf("manifest %s should exist", dgst)
|
|
|
|
}
|
|
|
|
|
|
|
|
fetchedByDigest, err := ms.Get(dgst)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error fetching manifest by digest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !reflect.DeepEqual(fetchedByDigest, fetchedManifest) {
|
|
|
|
t.Fatalf("fetched manifest not equal: %#v != %#v", fetchedByDigest, fetchedManifest)
|
|
|
|
}
|
|
|
|
|
2015-01-14 21:02:43 +01:00
|
|
|
sigs, err := fetchedJWS.Signatures()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to extract signatures: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(sigs) != 1 {
|
|
|
|
t.Fatalf("unexpected number of signatures: %d != %d", len(sigs), 1)
|
|
|
|
}
|
|
|
|
|
2014-12-09 20:06:51 +01:00
|
|
|
// Grabs the tags and check that this tagged manifest is present
|
2015-01-17 03:24:07 +01:00
|
|
|
tags, err := ms.Tags()
|
2014-12-09 20:06:51 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error fetching tags: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(tags) != 1 {
|
|
|
|
t.Fatalf("unexpected tags returned: %v", tags)
|
|
|
|
}
|
|
|
|
|
2015-02-27 00:47:04 +01:00
|
|
|
if tags[0] != env.tag {
|
|
|
|
t.Fatalf("unexpected tag found in tags: %v != %v", tags, []string{env.tag})
|
2014-12-09 20:06:51 +01:00
|
|
|
}
|
2015-01-14 21:02:43 +01:00
|
|
|
|
|
|
|
// Now, push the same manifest with a different key
|
|
|
|
pk2, err := libtrust.GenerateECP256PrivateKey()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error generating private key: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sm2, err := manifest.Sign(&m, pk2)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error signing manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
jws2, err := libtrust.ParsePrettySignature(sm2.Raw, "signatures")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error parsing signature: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sigs2, err := jws2.Signatures()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to extract signatures: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(sigs2) != 1 {
|
|
|
|
t.Fatalf("unexpected number of signatures: %d != %d", len(sigs2), 1)
|
|
|
|
}
|
|
|
|
|
2015-02-27 00:47:04 +01:00
|
|
|
if err = ms.Put(sm2); err != nil {
|
2015-01-14 21:02:43 +01:00
|
|
|
t.Fatalf("unexpected error putting manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-02-27 00:47:04 +01:00
|
|
|
fetched, err := ms.GetByTag(env.tag)
|
2015-01-14 21:02:43 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error fetching manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := manifest.Verify(fetched); err != nil {
|
|
|
|
t.Fatalf("unexpected error verifying manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assemble our payload and two signatures to get what we expect!
|
|
|
|
expectedJWS, err := libtrust.NewJSONSignature(payload, sigs[0], sigs2[0])
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error merging jws: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
expectedSigs, err := expectedJWS.Signatures()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error getting expected signatures: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
receivedJWS, err := libtrust.ParsePrettySignature(fetched.Raw, "signatures")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error parsing jws: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
receivedPayload, err := receivedJWS.Payload()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error extracting received payload: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(receivedPayload, payload) {
|
|
|
|
t.Fatalf("payloads are not equal")
|
|
|
|
}
|
|
|
|
|
|
|
|
receivedSigs, err := receivedJWS.Signatures()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error getting signatures: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, sig := range receivedSigs {
|
|
|
|
if !bytes.Equal(sig, expectedSigs[i]) {
|
|
|
|
t.Fatalf("mismatched signatures from remote: %v != %v", string(sig), string(expectedSigs[i]))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-27 00:47:04 +01:00
|
|
|
// TODO(stevvooe): Currently, deletes are not supported due to some
|
|
|
|
// complexity around managing tag indexes. We'll add this support back in
|
|
|
|
// when the manifest format has settled. For now, we expect an error for
|
|
|
|
// all deletes.
|
|
|
|
if err := ms.Delete(dgst); err == nil {
|
|
|
|
t.Fatalf("unexpected an error deleting manifest by digest: %v", err)
|
2015-01-14 21:02:43 +01:00
|
|
|
}
|
2014-11-22 04:39:52 +01:00
|
|
|
}
|