Add support for manifest list ("fat manifest")
Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
This commit is contained in:
parent
9284810356
commit
9c416f0e94
@ -86,7 +86,7 @@ image manifest based on the Content-Type returned in the HTTP response.
|
|||||||
|
|
||||||
- **`os`** *string*
|
- **`os`** *string*
|
||||||
|
|
||||||
The architecture field specifies the operating system, for example
|
The os field specifies the operating system, for example
|
||||||
`linux` or `windows`.
|
`linux` or `windows`.
|
||||||
|
|
||||||
- **`variant`** *string*
|
- **`variant`** *string*
|
||||||
|
151
manifest/manifestlist/manifestlist.go
Normal file
151
manifest/manifestlist/manifestlist.go
Normal file
@ -0,0 +1,151 @@
|
|||||||
|
package manifestlist
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/docker/distribution"
|
||||||
|
"github.com/docker/distribution/digest"
|
||||||
|
"github.com/docker/distribution/manifest"
|
||||||
|
)
|
||||||
|
|
||||||
|
// MediaTypeManifestList specifies the mediaType for manifest lists.
|
||||||
|
const MediaTypeManifestList = "application/vnd.docker.distribution.manifest.list.v2+json"
|
||||||
|
|
||||||
|
// SchemaVersion provides a pre-initialized version structure for this
|
||||||
|
// packages version of the manifest.
|
||||||
|
var SchemaVersion = manifest.Versioned{
|
||||||
|
SchemaVersion: 2,
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
manifestListFunc := func(b []byte) (distribution.Manifest, distribution.Descriptor, error) {
|
||||||
|
m := new(DeserializedManifestList)
|
||||||
|
err := m.UnmarshalJSON(b)
|
||||||
|
if err != nil {
|
||||||
|
return nil, distribution.Descriptor{}, err
|
||||||
|
}
|
||||||
|
|
||||||
|
dgst := digest.FromBytes(b)
|
||||||
|
return m, distribution.Descriptor{Digest: dgst, Size: int64(len(b)), MediaType: MediaTypeManifestList}, err
|
||||||
|
}
|
||||||
|
err := distribution.RegisterManifestSchema(MediaTypeManifestList, manifestListFunc)
|
||||||
|
if err != nil {
|
||||||
|
panic(fmt.Sprintf("Unable to register manifest: %s", err))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// PlatformSpec specifies a platform where a particular image manifest is
|
||||||
|
// applicable.
|
||||||
|
type PlatformSpec struct {
|
||||||
|
// Architecture field specifies the CPU architecture, for example
|
||||||
|
// `amd64` or `ppc64`.
|
||||||
|
Architecture string `json:"architecture"`
|
||||||
|
|
||||||
|
// OS specifies the operating system, for example `linux` or `windows`.
|
||||||
|
OS string `json:"os"`
|
||||||
|
|
||||||
|
// Variant is an optional field specifying a variant of the CPU, for
|
||||||
|
// example `ppc64le` to specify a little-endian version of a PowerPC CPU.
|
||||||
|
Variant string `json:"variant,omitempty"`
|
||||||
|
|
||||||
|
// Features is an optional field specifuing an array of strings, each
|
||||||
|
// listing a required CPU feature (for example `sse4` or `aes`).
|
||||||
|
Features []string `json:"features,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// A ManifestDescriptor references a platform-specific manifest.
|
||||||
|
type ManifestDescriptor struct {
|
||||||
|
distribution.Descriptor
|
||||||
|
|
||||||
|
// Platform specifies which platform the manifest pointed to by the
|
||||||
|
// descriptor runs on.
|
||||||
|
Platform PlatformSpec `json:"platform"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ManifestList references manifests for various platforms.
|
||||||
|
type ManifestList struct {
|
||||||
|
manifest.Versioned
|
||||||
|
|
||||||
|
// MediaType is the media type of this document. It should always
|
||||||
|
// be set to MediaTypeManifestList.
|
||||||
|
MediaType string `json:"mediaType"`
|
||||||
|
|
||||||
|
// Config references the image configuration as a blob.
|
||||||
|
Manifests []ManifestDescriptor `json:"manifests"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// References returnes the distribution descriptors for the referenced image
|
||||||
|
// manifests.
|
||||||
|
func (m ManifestList) References() []distribution.Descriptor {
|
||||||
|
dependencies := make([]distribution.Descriptor, len(m.Manifests))
|
||||||
|
for i := range m.Manifests {
|
||||||
|
dependencies[i] = m.Manifests[i].Descriptor
|
||||||
|
}
|
||||||
|
|
||||||
|
return dependencies
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeserializedManifestList wraps ManifestList with a copy of the original
|
||||||
|
// JSON.
|
||||||
|
type DeserializedManifestList struct {
|
||||||
|
ManifestList
|
||||||
|
|
||||||
|
// canonical is the canonical byte representation of the Manifest.
|
||||||
|
canonical []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
// FromDescriptors takes a slice of descriptors, and returns a
|
||||||
|
// DeserializedManifestList which contains the resulting manifest list
|
||||||
|
// and its JSON representation.
|
||||||
|
func FromDescriptors(descriptors []ManifestDescriptor) (*DeserializedManifestList, error) {
|
||||||
|
m := ManifestList{
|
||||||
|
Versioned: SchemaVersion,
|
||||||
|
MediaType: MediaTypeManifestList,
|
||||||
|
}
|
||||||
|
|
||||||
|
m.Manifests = make([]ManifestDescriptor, len(descriptors), len(descriptors))
|
||||||
|
copy(m.Manifests, descriptors)
|
||||||
|
|
||||||
|
deserialized := DeserializedManifestList{
|
||||||
|
ManifestList: m,
|
||||||
|
}
|
||||||
|
|
||||||
|
var err error
|
||||||
|
deserialized.canonical, err = json.MarshalIndent(&m, "", " ")
|
||||||
|
return &deserialized, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// UnmarshalJSON populates a new ManifestList struct from JSON data.
|
||||||
|
func (m *DeserializedManifestList) UnmarshalJSON(b []byte) error {
|
||||||
|
m.canonical = make([]byte, len(b), len(b))
|
||||||
|
// store manifest list in canonical
|
||||||
|
copy(m.canonical, b)
|
||||||
|
|
||||||
|
// Unmarshal canonical JSON into ManifestList object
|
||||||
|
var manifestList ManifestList
|
||||||
|
if err := json.Unmarshal(m.canonical, &manifestList); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
m.ManifestList = manifestList
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// MarshalJSON returns the contents of canonical. If canonical is empty,
|
||||||
|
// marshals the inner contents.
|
||||||
|
func (m *DeserializedManifestList) MarshalJSON() ([]byte, error) {
|
||||||
|
if len(m.canonical) > 0 {
|
||||||
|
return m.canonical, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil, errors.New("JSON representation not initialized in DeserializedManifestList")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Payload returns the raw content of the manifest list. The contents can be
|
||||||
|
// used to calculate the content identifier.
|
||||||
|
func (m DeserializedManifestList) Payload() (string, []byte, error) {
|
||||||
|
return m.MediaType, m.canonical, nil
|
||||||
|
}
|
111
manifest/manifestlist/manifestlist_test.go
Normal file
111
manifest/manifestlist/manifestlist_test.go
Normal file
@ -0,0 +1,111 @@
|
|||||||
|
package manifestlist
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/json"
|
||||||
|
"reflect"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/docker/distribution"
|
||||||
|
)
|
||||||
|
|
||||||
|
var expectedManifestListSerialization = []byte(`{
|
||||||
|
"schemaVersion": 2,
|
||||||
|
"mediaType": "application/vnd.docker.distribution.manifest.list.v2+json",
|
||||||
|
"manifests": [
|
||||||
|
{
|
||||||
|
"mediaType": "application/vnd.docker.distribution.manifest.v2+json",
|
||||||
|
"size": 985,
|
||||||
|
"digest": "sha256:1a9ec845ee94c202b2d5da74a24f0ed2058318bfa9879fa541efaecba272e86b",
|
||||||
|
"platform": {
|
||||||
|
"architecture": "amd64",
|
||||||
|
"os": "linux",
|
||||||
|
"features": [
|
||||||
|
"sse4"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"mediaType": "application/vnd.docker.distribution.manifest.v2+json",
|
||||||
|
"size": 2392,
|
||||||
|
"digest": "sha256:6346340964309634683409684360934680934608934608934608934068934608",
|
||||||
|
"platform": {
|
||||||
|
"architecture": "sun4m",
|
||||||
|
"os": "sunos"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}`)
|
||||||
|
|
||||||
|
func TestManifestList(t *testing.T) {
|
||||||
|
manifestDescriptors := []ManifestDescriptor{
|
||||||
|
{
|
||||||
|
Descriptor: distribution.Descriptor{
|
||||||
|
Digest: "sha256:1a9ec845ee94c202b2d5da74a24f0ed2058318bfa9879fa541efaecba272e86b",
|
||||||
|
Size: 985,
|
||||||
|
MediaType: "application/vnd.docker.distribution.manifest.v2+json",
|
||||||
|
},
|
||||||
|
Platform: PlatformSpec{
|
||||||
|
Architecture: "amd64",
|
||||||
|
OS: "linux",
|
||||||
|
Features: []string{"sse4"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Descriptor: distribution.Descriptor{
|
||||||
|
Digest: "sha256:6346340964309634683409684360934680934608934608934608934068934608",
|
||||||
|
Size: 2392,
|
||||||
|
MediaType: "application/vnd.docker.distribution.manifest.v2+json",
|
||||||
|
},
|
||||||
|
Platform: PlatformSpec{
|
||||||
|
Architecture: "sun4m",
|
||||||
|
OS: "sunos",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
deserialized, err := FromDescriptors(manifestDescriptors)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error creating DeserializedManifestList: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
mediaType, canonical, err := deserialized.Payload()
|
||||||
|
|
||||||
|
if mediaType != MediaTypeManifestList {
|
||||||
|
t.Fatalf("unexpected media type: %s", mediaType)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check that the canonical field is the same as json.MarshalIndent
|
||||||
|
// with these parameters.
|
||||||
|
p, err := json.MarshalIndent(&deserialized.ManifestList, "", " ")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error marshaling manifest list: %v", err)
|
||||||
|
}
|
||||||
|
if !bytes.Equal(p, canonical) {
|
||||||
|
t.Fatalf("manifest bytes not equal: %q != %q", string(canonical), string(p))
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check that the canonical field has the expected value.
|
||||||
|
if !bytes.Equal(expectedManifestListSerialization, canonical) {
|
||||||
|
t.Fatalf("manifest bytes not equal: %q != %q", string(canonical), string(expectedManifestListSerialization))
|
||||||
|
}
|
||||||
|
|
||||||
|
var unmarshalled DeserializedManifestList
|
||||||
|
if err := json.Unmarshal(deserialized.canonical, &unmarshalled); err != nil {
|
||||||
|
t.Fatalf("error unmarshaling manifest: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !reflect.DeepEqual(&unmarshalled, deserialized) {
|
||||||
|
t.Fatalf("manifests are different after unmarshaling: %v != %v", unmarshalled, *deserialized)
|
||||||
|
}
|
||||||
|
|
||||||
|
references := deserialized.References()
|
||||||
|
if len(references) != 2 {
|
||||||
|
t.Fatalf("unexpected number of references: %d", len(references))
|
||||||
|
}
|
||||||
|
for i := range references {
|
||||||
|
if !reflect.DeepEqual(references[i], manifestDescriptors[i].Descriptor) {
|
||||||
|
t.Fatalf("unexpected value %d returned by References: %v", i, references[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -23,6 +23,7 @@ import (
|
|||||||
"github.com/docker/distribution/context"
|
"github.com/docker/distribution/context"
|
||||||
"github.com/docker/distribution/digest"
|
"github.com/docker/distribution/digest"
|
||||||
"github.com/docker/distribution/manifest"
|
"github.com/docker/distribution/manifest"
|
||||||
|
"github.com/docker/distribution/manifest/manifestlist"
|
||||||
"github.com/docker/distribution/manifest/schema1"
|
"github.com/docker/distribution/manifest/schema1"
|
||||||
"github.com/docker/distribution/manifest/schema2"
|
"github.com/docker/distribution/manifest/schema2"
|
||||||
"github.com/docker/distribution/registry/api/errcode"
|
"github.com/docker/distribution/registry/api/errcode"
|
||||||
@ -702,12 +703,14 @@ func TestManifestAPI(t *testing.T) {
|
|||||||
deleteEnabled := false
|
deleteEnabled := false
|
||||||
env := newTestEnv(t, deleteEnabled)
|
env := newTestEnv(t, deleteEnabled)
|
||||||
testManifestAPISchema1(t, env, "foo/schema1")
|
testManifestAPISchema1(t, env, "foo/schema1")
|
||||||
testManifestAPISchema2(t, env, "foo/schema2")
|
schema2Args := testManifestAPISchema2(t, env, "foo/schema2")
|
||||||
|
testManifestAPIManifestList(t, env, schema2Args)
|
||||||
|
|
||||||
deleteEnabled = true
|
deleteEnabled = true
|
||||||
env = newTestEnv(t, deleteEnabled)
|
env = newTestEnv(t, deleteEnabled)
|
||||||
testManifestAPISchema1(t, env, "foo/schema1")
|
testManifestAPISchema1(t, env, "foo/schema1")
|
||||||
testManifestAPISchema2(t, env, "foo/schema2")
|
schema2Args = testManifestAPISchema2(t, env, "foo/schema2")
|
||||||
|
testManifestAPIManifestList(t, env, schema2Args)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestManifestDelete(t *testing.T) {
|
func TestManifestDelete(t *testing.T) {
|
||||||
@ -1393,6 +1396,179 @@ func testManifestAPISchema2(t *testing.T, env *testEnv, imageName string) manife
|
|||||||
return args
|
return args
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func testManifestAPIManifestList(t *testing.T, env *testEnv, args manifestArgs) {
|
||||||
|
imageName := args.imageName
|
||||||
|
tag := "manifestlisttag"
|
||||||
|
|
||||||
|
manifestURL, err := env.builder.BuildManifestURL(imageName, tag)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error getting manifest url: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// --------------------------------
|
||||||
|
// Attempt to push manifest list that refers to an unknown manifest
|
||||||
|
manifestList := &manifestlist.ManifestList{
|
||||||
|
Versioned: manifest.Versioned{
|
||||||
|
SchemaVersion: 2,
|
||||||
|
},
|
||||||
|
MediaType: manifestlist.MediaTypeManifestList,
|
||||||
|
Manifests: []manifestlist.ManifestDescriptor{
|
||||||
|
{
|
||||||
|
Descriptor: distribution.Descriptor{
|
||||||
|
Digest: "sha256:1a9ec845ee94c202b2d5da74a24f0ed2058318bfa9879fa541efaecba272e86b",
|
||||||
|
Size: 3253,
|
||||||
|
MediaType: schema2.MediaTypeManifest,
|
||||||
|
},
|
||||||
|
Platform: manifestlist.PlatformSpec{
|
||||||
|
Architecture: "amd64",
|
||||||
|
OS: "linux",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
resp := putManifest(t, "putting missing manifest manifestlist", manifestURL, manifestlist.MediaTypeManifestList, manifestList)
|
||||||
|
defer resp.Body.Close()
|
||||||
|
checkResponse(t, "putting missing manifest manifestlist", resp, http.StatusBadRequest)
|
||||||
|
_, p, counts := checkBodyHasErrorCodes(t, "putting missing manifest manifestlist", resp, v2.ErrorCodeManifestBlobUnknown)
|
||||||
|
|
||||||
|
expectedCounts := map[errcode.ErrorCode]int{
|
||||||
|
v2.ErrorCodeManifestBlobUnknown: 1,
|
||||||
|
}
|
||||||
|
|
||||||
|
if !reflect.DeepEqual(counts, expectedCounts) {
|
||||||
|
t.Fatalf("unexpected number of error codes encountered: %v\n!=\n%v\n---\n%s", counts, expectedCounts, string(p))
|
||||||
|
}
|
||||||
|
|
||||||
|
// -------------------
|
||||||
|
// Push a manifest list that references an actual manifest
|
||||||
|
manifestList.Manifests[0].Digest = args.dgst
|
||||||
|
deserializedManifestList, err := manifestlist.FromDescriptors(manifestList.Manifests)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("could not create DeserializedManifestList: %v", err)
|
||||||
|
}
|
||||||
|
_, canonical, err := deserializedManifestList.Payload()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("could not get manifest list payload: %v", err)
|
||||||
|
}
|
||||||
|
dgst := digest.FromBytes(canonical)
|
||||||
|
|
||||||
|
manifestDigestURL, err := env.builder.BuildManifestURL(imageName, dgst.String())
|
||||||
|
checkErr(t, err, "building manifest url")
|
||||||
|
|
||||||
|
resp = putManifest(t, "putting manifest list no error", manifestURL, manifestlist.MediaTypeManifestList, deserializedManifestList)
|
||||||
|
checkResponse(t, "putting manifest list no error", resp, http.StatusCreated)
|
||||||
|
checkHeaders(t, resp, http.Header{
|
||||||
|
"Location": []string{manifestDigestURL},
|
||||||
|
"Docker-Content-Digest": []string{dgst.String()},
|
||||||
|
})
|
||||||
|
|
||||||
|
// --------------------
|
||||||
|
// Push by digest -- should get same result
|
||||||
|
resp = putManifest(t, "putting manifest list by digest", manifestDigestURL, manifestlist.MediaTypeManifestList, deserializedManifestList)
|
||||||
|
checkResponse(t, "putting manifest list by digest", resp, http.StatusCreated)
|
||||||
|
checkHeaders(t, resp, http.Header{
|
||||||
|
"Location": []string{manifestDigestURL},
|
||||||
|
"Docker-Content-Digest": []string{dgst.String()},
|
||||||
|
})
|
||||||
|
|
||||||
|
// ------------------
|
||||||
|
// Fetch by tag name
|
||||||
|
req, err := http.NewRequest("GET", manifestURL, nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Error constructing request: %s", err)
|
||||||
|
}
|
||||||
|
req.Header.Set("Accept", manifestlist.MediaTypeManifestList)
|
||||||
|
req.Header.Add("Accept", schema1.MediaTypeManifest)
|
||||||
|
req.Header.Add("Accept", schema2.MediaTypeManifest)
|
||||||
|
resp, err = http.DefaultClient.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error fetching manifest list: %v", err)
|
||||||
|
}
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
checkResponse(t, "fetching uploaded manifest list", resp, http.StatusOK)
|
||||||
|
checkHeaders(t, resp, http.Header{
|
||||||
|
"Docker-Content-Digest": []string{dgst.String()},
|
||||||
|
"ETag": []string{fmt.Sprintf(`"%s"`, dgst)},
|
||||||
|
})
|
||||||
|
|
||||||
|
var fetchedManifestList manifestlist.DeserializedManifestList
|
||||||
|
dec := json.NewDecoder(resp.Body)
|
||||||
|
|
||||||
|
if err := dec.Decode(&fetchedManifestList); err != nil {
|
||||||
|
t.Fatalf("error decoding fetched manifest list: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, fetchedCanonical, err := fetchedManifestList.Payload()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error getting manifest list payload: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !bytes.Equal(fetchedCanonical, canonical) {
|
||||||
|
t.Fatalf("manifest lists do not match")
|
||||||
|
}
|
||||||
|
|
||||||
|
// ---------------
|
||||||
|
// Fetch by digest
|
||||||
|
req, err = http.NewRequest("GET", manifestDigestURL, nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Error constructing request: %s", err)
|
||||||
|
}
|
||||||
|
req.Header.Set("Accept", manifestlist.MediaTypeManifestList)
|
||||||
|
resp, err = http.DefaultClient.Do(req)
|
||||||
|
checkErr(t, err, "fetching manifest list by digest")
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
checkResponse(t, "fetching uploaded manifest list", resp, http.StatusOK)
|
||||||
|
checkHeaders(t, resp, http.Header{
|
||||||
|
"Docker-Content-Digest": []string{dgst.String()},
|
||||||
|
"ETag": []string{fmt.Sprintf(`"%s"`, dgst)},
|
||||||
|
})
|
||||||
|
|
||||||
|
var fetchedManifestListByDigest manifestlist.DeserializedManifestList
|
||||||
|
dec = json.NewDecoder(resp.Body)
|
||||||
|
if err := dec.Decode(&fetchedManifestListByDigest); err != nil {
|
||||||
|
t.Fatalf("error decoding fetched manifest: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, fetchedCanonical, err = fetchedManifestListByDigest.Payload()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error getting manifest list payload: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !bytes.Equal(fetchedCanonical, canonical) {
|
||||||
|
t.Fatalf("manifests do not match")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get by name with etag, gives 304
|
||||||
|
etag := resp.Header.Get("Etag")
|
||||||
|
req, err = http.NewRequest("GET", manifestURL, nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Error constructing request: %s", err)
|
||||||
|
}
|
||||||
|
req.Header.Set("If-None-Match", etag)
|
||||||
|
resp, err = http.DefaultClient.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Error constructing request: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
checkResponse(t, "fetching manifest by name with etag", resp, http.StatusNotModified)
|
||||||
|
|
||||||
|
// Get by digest with etag, gives 304
|
||||||
|
req, err = http.NewRequest("GET", manifestDigestURL, nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Error constructing request: %s", err)
|
||||||
|
}
|
||||||
|
req.Header.Set("If-None-Match", etag)
|
||||||
|
resp, err = http.DefaultClient.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Error constructing request: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
checkResponse(t, "fetching manifest by dgst with etag", resp, http.StatusNotModified)
|
||||||
|
}
|
||||||
|
|
||||||
func testManifestDelete(t *testing.T, env *testEnv, args manifestArgs) {
|
func testManifestDelete(t *testing.T, env *testEnv, args manifestArgs) {
|
||||||
imageName := args.imageName
|
imageName := args.imageName
|
||||||
dgst := args.dgst
|
dgst := args.dgst
|
||||||
@ -1521,13 +1697,20 @@ func newTestEnvWithConfig(t *testing.T, config *configuration.Configuration) *te
|
|||||||
func putManifest(t *testing.T, msg, url, contentType string, v interface{}) *http.Response {
|
func putManifest(t *testing.T, msg, url, contentType string, v interface{}) *http.Response {
|
||||||
var body []byte
|
var body []byte
|
||||||
|
|
||||||
if sm, ok := v.(*schema1.SignedManifest); ok {
|
switch m := v.(type) {
|
||||||
_, pl, err := sm.Payload()
|
case *schema1.SignedManifest:
|
||||||
|
_, pl, err := m.Payload()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("error getting payload: %v", err)
|
t.Fatalf("error getting payload: %v", err)
|
||||||
}
|
}
|
||||||
body = pl
|
body = pl
|
||||||
} else {
|
case *manifestlist.DeserializedManifestList:
|
||||||
|
_, pl, err := m.Payload()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error getting payload: %v", err)
|
||||||
|
}
|
||||||
|
body = pl
|
||||||
|
default:
|
||||||
var err error
|
var err error
|
||||||
body, err = json.MarshalIndent(v, "", " ")
|
body, err = json.MarshalIndent(v, "", " ")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
96
registry/storage/manifestlisthandler.go
Normal file
96
registry/storage/manifestlisthandler.go
Normal file
@ -0,0 +1,96 @@
|
|||||||
|
package storage
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"encoding/json"
|
||||||
|
"github.com/docker/distribution"
|
||||||
|
"github.com/docker/distribution/context"
|
||||||
|
"github.com/docker/distribution/digest"
|
||||||
|
"github.com/docker/distribution/manifest/manifestlist"
|
||||||
|
)
|
||||||
|
|
||||||
|
// manifestListHandler is a ManifestHandler that covers schema2 manifest lists.
|
||||||
|
type manifestListHandler struct {
|
||||||
|
repository *repository
|
||||||
|
blobStore *linkedBlobStore
|
||||||
|
ctx context.Context
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ ManifestHandler = &manifestListHandler{}
|
||||||
|
|
||||||
|
func (ms *manifestListHandler) Unmarshal(ctx context.Context, dgst digest.Digest, content []byte) (distribution.Manifest, error) {
|
||||||
|
context.GetLogger(ms.ctx).Debug("(*manifestListHandler).Unmarshal")
|
||||||
|
|
||||||
|
var m manifestlist.DeserializedManifestList
|
||||||
|
if err := json.Unmarshal(content, &m); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &m, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ms *manifestListHandler) Put(ctx context.Context, manifestList distribution.Manifest, skipDependencyVerification bool) (digest.Digest, error) {
|
||||||
|
context.GetLogger(ms.ctx).Debug("(*manifestListHandler).Put")
|
||||||
|
|
||||||
|
m, ok := manifestList.(*manifestlist.DeserializedManifestList)
|
||||||
|
if !ok {
|
||||||
|
return "", fmt.Errorf("wrong type put to manifestListHandler: %T", manifestList)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := ms.verifyManifest(ms.ctx, *m, skipDependencyVerification); err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
mt, payload, err := m.Payload()
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
revision, err := ms.blobStore.Put(ctx, mt, payload)
|
||||||
|
if err != nil {
|
||||||
|
context.GetLogger(ctx).Errorf("error putting payload into blobstore: %v", err)
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Link the revision into the repository.
|
||||||
|
if err := ms.blobStore.linkBlob(ctx, revision); err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
return revision.Digest, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// verifyManifest ensures that the manifest content is valid from the
|
||||||
|
// perspective of the registry. As a policy, the registry only tries to
|
||||||
|
// store valid content, leaving trust policies of that content up to
|
||||||
|
// consumers.
|
||||||
|
func (ms *manifestListHandler) verifyManifest(ctx context.Context, mnfst manifestlist.DeserializedManifestList, skipDependencyVerification bool) error {
|
||||||
|
var errs distribution.ErrManifestVerification
|
||||||
|
|
||||||
|
if !skipDependencyVerification {
|
||||||
|
// This manifest service is different from the blob service
|
||||||
|
// returned by Blob. It uses a linked blob store to ensure that
|
||||||
|
// only manifests are accessible.
|
||||||
|
manifestService, err := ms.repository.Manifests(ctx)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, manifestDescriptor := range mnfst.References() {
|
||||||
|
exists, err := manifestService.Exists(ctx, manifestDescriptor.Digest)
|
||||||
|
if err != nil && err != distribution.ErrBlobUnknown {
|
||||||
|
errs = append(errs, err)
|
||||||
|
}
|
||||||
|
if err != nil || !exists {
|
||||||
|
// On error here, we always append unknown blob errors.
|
||||||
|
errs = append(errs, distribution.ErrManifestBlobUnknown{Digest: manifestDescriptor.Digest})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(errs) != 0 {
|
||||||
|
return errs
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
@ -8,6 +8,7 @@ import (
|
|||||||
"github.com/docker/distribution/context"
|
"github.com/docker/distribution/context"
|
||||||
"github.com/docker/distribution/digest"
|
"github.com/docker/distribution/digest"
|
||||||
"github.com/docker/distribution/manifest"
|
"github.com/docker/distribution/manifest"
|
||||||
|
"github.com/docker/distribution/manifest/manifestlist"
|
||||||
"github.com/docker/distribution/manifest/schema1"
|
"github.com/docker/distribution/manifest/schema1"
|
||||||
"github.com/docker/distribution/manifest/schema2"
|
"github.com/docker/distribution/manifest/schema2"
|
||||||
)
|
)
|
||||||
@ -46,6 +47,7 @@ type manifestStore struct {
|
|||||||
|
|
||||||
schema1Handler ManifestHandler
|
schema1Handler ManifestHandler
|
||||||
schema2Handler ManifestHandler
|
schema2Handler ManifestHandler
|
||||||
|
manifestListHandler ManifestHandler
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ distribution.ManifestService = &manifestStore{}
|
var _ distribution.ManifestService = &manifestStore{}
|
||||||
@ -92,7 +94,21 @@ func (ms *manifestStore) Get(ctx context.Context, dgst digest.Digest, options ..
|
|||||||
case 1:
|
case 1:
|
||||||
return ms.schema1Handler.Unmarshal(ctx, dgst, content)
|
return ms.schema1Handler.Unmarshal(ctx, dgst, content)
|
||||||
case 2:
|
case 2:
|
||||||
|
// This can be an image manifest or a manifest list
|
||||||
|
var mediaType struct {
|
||||||
|
MediaType string `json:"mediaType"`
|
||||||
|
}
|
||||||
|
if err = json.Unmarshal(content, &mediaType); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
switch mediaType.MediaType {
|
||||||
|
case schema2.MediaTypeManifest:
|
||||||
return ms.schema2Handler.Unmarshal(ctx, dgst, content)
|
return ms.schema2Handler.Unmarshal(ctx, dgst, content)
|
||||||
|
case manifestlist.MediaTypeManifestList:
|
||||||
|
return ms.manifestListHandler.Unmarshal(ctx, dgst, content)
|
||||||
|
default:
|
||||||
|
return nil, distribution.ErrManifestVerification{fmt.Errorf("unrecognized manifest content type %s", mediaType.MediaType)}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil, fmt.Errorf("unrecognized manifest schema version %d", versioned.SchemaVersion)
|
return nil, fmt.Errorf("unrecognized manifest schema version %d", versioned.SchemaVersion)
|
||||||
@ -106,6 +122,8 @@ func (ms *manifestStore) Put(ctx context.Context, manifest distribution.Manifest
|
|||||||
return ms.schema1Handler.Put(ctx, manifest, ms.skipDependencyVerification)
|
return ms.schema1Handler.Put(ctx, manifest, ms.skipDependencyVerification)
|
||||||
case *schema2.DeserializedManifest:
|
case *schema2.DeserializedManifest:
|
||||||
return ms.schema2Handler.Put(ctx, manifest, ms.skipDependencyVerification)
|
return ms.schema2Handler.Put(ctx, manifest, ms.skipDependencyVerification)
|
||||||
|
case *manifestlist.DeserializedManifestList:
|
||||||
|
return ms.manifestListHandler.Put(ctx, manifest, ms.skipDependencyVerification)
|
||||||
}
|
}
|
||||||
|
|
||||||
return "", fmt.Errorf("unrecognized manifest type %T", manifest)
|
return "", fmt.Errorf("unrecognized manifest type %T", manifest)
|
||||||
|
@ -200,6 +200,11 @@ func (repo *repository) Manifests(ctx context.Context, options ...distribution.M
|
|||||||
repository: repo,
|
repository: repo,
|
||||||
blobStore: blobStore,
|
blobStore: blobStore,
|
||||||
},
|
},
|
||||||
|
manifestListHandler: &manifestListHandler{
|
||||||
|
ctx: ctx,
|
||||||
|
repository: repo,
|
||||||
|
blobStore: blobStore,
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
// Apply options
|
// Apply options
|
||||||
|
@ -62,9 +62,8 @@ func (ms *schema2ManifestHandler) Put(ctx context.Context, manifest distribution
|
|||||||
}
|
}
|
||||||
|
|
||||||
// verifyManifest ensures that the manifest content is valid from the
|
// verifyManifest ensures that the manifest content is valid from the
|
||||||
// perspective of the registry. It ensures that the signature is valid for the
|
// perspective of the registry. As a policy, the registry only tries to store
|
||||||
// enclosed payload. As a policy, the registry only tries to store valid
|
// valid content, leaving trust policies of that content up to consumers.
|
||||||
// content, leaving trust policies of that content up to consumems.
|
|
||||||
func (ms *schema2ManifestHandler) verifyManifest(ctx context.Context, mnfst schema2.DeserializedManifest, skipDependencyVerification bool) error {
|
func (ms *schema2ManifestHandler) verifyManifest(ctx context.Context, mnfst schema2.DeserializedManifest, skipDependencyVerification bool) error {
|
||||||
var errs distribution.ErrManifestVerification
|
var errs distribution.ErrManifestVerification
|
||||||
|
|
||||||
|
@ -91,7 +91,7 @@ func (ms *signedManifestHandler) Put(ctx context.Context, manifest distribution.
|
|||||||
// verifyManifest ensures that the manifest content is valid from the
|
// verifyManifest ensures that the manifest content is valid from the
|
||||||
// perspective of the registry. It ensures that the signature is valid for the
|
// perspective of the registry. It ensures that the signature is valid for the
|
||||||
// enclosed payload. As a policy, the registry only tries to store valid
|
// enclosed payload. As a policy, the registry only tries to store valid
|
||||||
// content, leaving trust policies of that content up to consumems.
|
// content, leaving trust policies of that content up to consumers.
|
||||||
func (ms *signedManifestHandler) verifyManifest(ctx context.Context, mnfst schema1.SignedManifest, skipDependencyVerification bool) error {
|
func (ms *signedManifestHandler) verifyManifest(ctx context.Context, mnfst schema1.SignedManifest, skipDependencyVerification bool) error {
|
||||||
var errs distribution.ErrManifestVerification
|
var errs distribution.ErrManifestVerification
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user