mirror of https://github.com/docker/docs.git
Server propogates validation failures in the 400 response.
Previously, it just said that the update was invalid, but not why. Signed-off-by: Ying Li <ying.li@docker.com>
This commit is contained in:
parent
3aa13e6645
commit
fb9afbc5d8
|
@ -18,6 +18,7 @@ import (
|
|||
"github.com/docker/notary/server/timestamp"
|
||||
"github.com/docker/notary/tuf/data"
|
||||
"github.com/docker/notary/tuf/signed"
|
||||
"github.com/docker/notary/tuf/validation"
|
||||
)
|
||||
|
||||
// MainHandler is the default handler for the server
|
||||
|
@ -87,11 +88,15 @@ func atomicUpdateHandler(ctx context.Context, w http.ResponseWriter, r *http.Req
|
|||
}
|
||||
updates, err = validateUpdate(cryptoService, gun, updates, store)
|
||||
if err != nil {
|
||||
return errors.ErrInvalidUpdate.WithDetail(err)
|
||||
serializable, serializableError := validation.NewSerializableError(err)
|
||||
if serializableError != nil {
|
||||
return errors.ErrInvalidUpdate.WithDetail(nil)
|
||||
}
|
||||
return errors.ErrInvalidUpdate.WithDetail(serializable)
|
||||
}
|
||||
err = store.UpdateMany(gun, updates)
|
||||
if err != nil {
|
||||
return errors.ErrUpdating.WithDetail(err)
|
||||
return errors.ErrUpdating.WithDetail(nil)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
|
|
@ -3,6 +3,7 @@ package handlers
|
|||
import (
|
||||
"bytes"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
|
@ -11,9 +12,13 @@ import (
|
|||
"golang.org/x/net/context"
|
||||
|
||||
ctxu "github.com/docker/distribution/context"
|
||||
"github.com/docker/distribution/registry/api/errcode"
|
||||
"github.com/docker/notary/server/errors"
|
||||
"github.com/docker/notary/server/storage"
|
||||
"github.com/docker/notary/tuf/data"
|
||||
"github.com/docker/notary/tuf/signed"
|
||||
"github.com/docker/notary/tuf/store"
|
||||
"github.com/docker/notary/tuf/validation"
|
||||
|
||||
"github.com/docker/notary/tuf/testutils"
|
||||
"github.com/docker/notary/utils"
|
||||
|
@ -167,16 +172,16 @@ func TestGetKeyHandlerCreatesOnce(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestGetHandlerRoot(t *testing.T) {
|
||||
store := storage.NewMemStorage()
|
||||
metaStore := storage.NewMemStorage()
|
||||
_, repo, _ := testutils.EmptyRepo()
|
||||
|
||||
ctx := context.Background()
|
||||
ctx = context.WithValue(ctx, "metaStore", store)
|
||||
ctx = context.WithValue(ctx, "metaStore", metaStore)
|
||||
|
||||
root, err := repo.SignRoot(data.DefaultExpires("root"))
|
||||
rootJSON, err := json.Marshal(root)
|
||||
assert.NoError(t, err)
|
||||
store.UpdateCurrent("gun", storage.MetaUpdate{Role: "root", Version: 1, Data: rootJSON})
|
||||
metaStore.UpdateCurrent("gun", storage.MetaUpdate{Role: "root", Version: 1, Data: rootJSON})
|
||||
|
||||
req := &http.Request{
|
||||
Body: ioutil.NopCloser(bytes.NewBuffer(nil)),
|
||||
|
@ -194,20 +199,22 @@ func TestGetHandlerRoot(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestGetHandlerTimestamp(t *testing.T) {
|
||||
store := storage.NewMemStorage()
|
||||
metaStore := storage.NewMemStorage()
|
||||
_, repo, crypto := testutils.EmptyRepo()
|
||||
|
||||
ctx := getContext(handlerState{store: store, crypto: crypto})
|
||||
ctx := getContext(handlerState{store: metaStore, crypto: crypto})
|
||||
|
||||
sn, err := repo.SignSnapshot(data.DefaultExpires("snapshot"))
|
||||
snJSON, err := json.Marshal(sn)
|
||||
assert.NoError(t, err)
|
||||
store.UpdateCurrent("gun", storage.MetaUpdate{Role: "snapshot", Version: 1, Data: snJSON})
|
||||
metaStore.UpdateCurrent(
|
||||
"gun", storage.MetaUpdate{Role: "snapshot", Version: 1, Data: snJSON})
|
||||
|
||||
ts, err := repo.SignTimestamp(data.DefaultExpires("timestamp"))
|
||||
tsJSON, err := json.Marshal(ts)
|
||||
assert.NoError(t, err)
|
||||
store.UpdateCurrent("gun", storage.MetaUpdate{Role: "timestamp", Version: 1, Data: tsJSON})
|
||||
metaStore.UpdateCurrent(
|
||||
"gun", storage.MetaUpdate{Role: "timestamp", Version: 1, Data: tsJSON})
|
||||
|
||||
req := &http.Request{
|
||||
Body: ioutil.NopCloser(bytes.NewBuffer(nil)),
|
||||
|
@ -225,15 +232,16 @@ func TestGetHandlerTimestamp(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestGetHandlerSnapshot(t *testing.T) {
|
||||
store := storage.NewMemStorage()
|
||||
metaStore := storage.NewMemStorage()
|
||||
_, repo, crypto := testutils.EmptyRepo()
|
||||
|
||||
ctx := getContext(handlerState{store: store, crypto: crypto})
|
||||
ctx := getContext(handlerState{store: metaStore, crypto: crypto})
|
||||
|
||||
sn, err := repo.SignSnapshot(data.DefaultExpires("snapshot"))
|
||||
snJSON, err := json.Marshal(sn)
|
||||
assert.NoError(t, err)
|
||||
store.UpdateCurrent("gun", storage.MetaUpdate{Role: "snapshot", Version: 1, Data: snJSON})
|
||||
metaStore.UpdateCurrent(
|
||||
"gun", storage.MetaUpdate{Role: "snapshot", Version: 1, Data: snJSON})
|
||||
|
||||
req := &http.Request{
|
||||
Body: ioutil.NopCloser(bytes.NewBuffer(nil)),
|
||||
|
@ -251,10 +259,10 @@ func TestGetHandlerSnapshot(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestGetHandler404(t *testing.T) {
|
||||
store := storage.NewMemStorage()
|
||||
metaStore := storage.NewMemStorage()
|
||||
|
||||
ctx := context.Background()
|
||||
ctx = context.WithValue(ctx, "metaStore", store)
|
||||
ctx = context.WithValue(ctx, "metaStore", metaStore)
|
||||
|
||||
req := &http.Request{
|
||||
Body: ioutil.NopCloser(bytes.NewBuffer(nil)),
|
||||
|
@ -272,11 +280,11 @@ func TestGetHandler404(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestGetHandlerNilData(t *testing.T) {
|
||||
store := storage.NewMemStorage()
|
||||
store.UpdateCurrent("gun", storage.MetaUpdate{Role: "root", Version: 1, Data: nil})
|
||||
metaStore := storage.NewMemStorage()
|
||||
metaStore.UpdateCurrent("gun", storage.MetaUpdate{Role: "root", Version: 1, Data: nil})
|
||||
|
||||
ctx := context.Background()
|
||||
ctx = context.WithValue(ctx, "metaStore", store)
|
||||
ctx = context.WithValue(ctx, "metaStore", metaStore)
|
||||
|
||||
req := &http.Request{
|
||||
Body: ioutil.NopCloser(bytes.NewBuffer(nil)),
|
||||
|
@ -303,3 +311,77 @@ func TestGetHandlerNoStorage(t *testing.T) {
|
|||
err := GetHandler(ctx, nil, req)
|
||||
assert.Error(t, err)
|
||||
}
|
||||
|
||||
// a validation failure, such as a snapshots file being missing, will be
|
||||
// propogated as a detail in the error (which gets serialized as the body of the
|
||||
// response)
|
||||
func TestAtomicUpdateValidationFailurePropogated(t *testing.T) {
|
||||
metaStore := storage.NewMemStorage()
|
||||
gun := "testGUN"
|
||||
vars := map[string]string{"imageName": gun}
|
||||
|
||||
kdb, repo, cs := testutils.EmptyRepo()
|
||||
copyTimestampKey(t, kdb, metaStore, gun)
|
||||
state := handlerState{store: metaStore, crypto: cs}
|
||||
|
||||
r, tg, sn, ts, err := testutils.Sign(repo)
|
||||
assert.NoError(t, err)
|
||||
rs, tgs, _, _, err := testutils.Serialize(r, tg, sn, ts)
|
||||
assert.NoError(t, err)
|
||||
|
||||
req, err := store.NewMultiPartMetaRequest("", map[string][]byte{
|
||||
data.CanonicalRootRole: rs,
|
||||
data.CanonicalTargetsRole: tgs,
|
||||
})
|
||||
|
||||
rw := httptest.NewRecorder()
|
||||
|
||||
err = atomicUpdateHandler(getContext(state), rw, req, vars)
|
||||
assert.Error(t, err)
|
||||
errorObj, ok := err.(errcode.Error)
|
||||
assert.True(t, ok, "Expected an errcode.Error, got %v", err)
|
||||
assert.Equal(t, errors.ErrInvalidUpdate, errorObj.Code)
|
||||
serializable, ok := errorObj.Detail.(*validation.SerializableError)
|
||||
assert.True(t, ok, "Expected a SerializableObject, got %v", errorObj.Detail)
|
||||
assert.IsType(t, validation.ErrBadHierarchy{}, serializable.Error)
|
||||
}
|
||||
|
||||
type failStore struct {
|
||||
storage.MemStorage
|
||||
}
|
||||
|
||||
func (s failStore) GetCurrent(_, _ string) ([]byte, error) {
|
||||
return nil, fmt.Errorf("oh no! storage has failed")
|
||||
}
|
||||
|
||||
// a non-validation failure, such as the storage failing, will not be propogated
|
||||
// as a detail in the error (which gets serialized as the body of the response)
|
||||
func TestAtomicUpdateNonValidationFailureNotPropogated(t *testing.T) {
|
||||
metaStore := storage.NewMemStorage()
|
||||
gun := "testGUN"
|
||||
vars := map[string]string{"imageName": gun}
|
||||
|
||||
kdb, repo, cs := testutils.EmptyRepo()
|
||||
copyTimestampKey(t, kdb, metaStore, gun)
|
||||
state := handlerState{store: &failStore{*metaStore}, crypto: cs}
|
||||
|
||||
r, tg, sn, ts, err := testutils.Sign(repo)
|
||||
assert.NoError(t, err)
|
||||
rs, tgs, sns, _, err := testutils.Serialize(r, tg, sn, ts)
|
||||
assert.NoError(t, err)
|
||||
|
||||
req, err := store.NewMultiPartMetaRequest("", map[string][]byte{
|
||||
data.CanonicalRootRole: rs,
|
||||
data.CanonicalTargetsRole: tgs,
|
||||
data.CanonicalSnapshotRole: sns,
|
||||
})
|
||||
|
||||
rw := httptest.NewRecorder()
|
||||
|
||||
err = atomicUpdateHandler(getContext(state), rw, req, vars)
|
||||
assert.Error(t, err)
|
||||
errorObj, ok := err.(errcode.Error)
|
||||
assert.True(t, ok, "Expected an errcode.Error, got %v", err)
|
||||
assert.Equal(t, errors.ErrInvalidUpdate, errorObj.Code)
|
||||
assert.Nil(t, errorObj.Detail)
|
||||
}
|
||||
|
|
|
@ -172,7 +172,9 @@ func generateSnapshot(gun string, kdb *keys.KeyDB, repo *tuf.Repo, store storage
|
|||
}
|
||||
}
|
||||
if !validKey {
|
||||
return nil, validation.ErrBadHierarchy{Msg: "no snapshot was included in update and server does not hold current snapshot key for repository"}
|
||||
return nil, validation.ErrBadHierarchy{
|
||||
Missing: data.CanonicalSnapshotRole,
|
||||
Msg: "no snapshot was included in update and server does not hold current snapshot key for repository"}
|
||||
}
|
||||
|
||||
currentJSON, err := store.GetCurrent(gun, data.CanonicalSnapshotRole)
|
||||
|
|
|
@ -147,6 +147,30 @@ func (s HTTPStore) SetMeta(name string, blob []byte) error {
|
|||
return translateStatusToError(resp)
|
||||
}
|
||||
|
||||
// NewMultiPartMetaRequest builds a request with the provided metadata updates
|
||||
// in multipart form
|
||||
func NewMultiPartMetaRequest(url string, metas map[string][]byte) (*http.Request, error) {
|
||||
body := &bytes.Buffer{}
|
||||
writer := multipart.NewWriter(body)
|
||||
for role, blob := range metas {
|
||||
part, err := writer.CreateFormFile("files", role)
|
||||
_, err = io.Copy(part, bytes.NewBuffer(blob))
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
err := writer.Close()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
req, err := http.NewRequest("POST", url, body)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
req.Header.Set("Content-Type", writer.FormDataContentType())
|
||||
return req, nil
|
||||
}
|
||||
|
||||
// SetMultiMeta does a single batch upload of multiple pieces of TUF metadata.
|
||||
// This should be preferred for updating a remote server as it enable the server
|
||||
// to remain consistent, either accepting or rejecting the complete update.
|
||||
|
@ -155,21 +179,7 @@ func (s HTTPStore) SetMultiMeta(metas map[string][]byte) error {
|
|||
if err != nil {
|
||||
return err
|
||||
}
|
||||
body := &bytes.Buffer{}
|
||||
writer := multipart.NewWriter(body)
|
||||
for role, blob := range metas {
|
||||
part, err := writer.CreateFormFile("files", role)
|
||||
_, err = io.Copy(part, bytes.NewBuffer(blob))
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
err = writer.Close()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
req, err := http.NewRequest("POST", url.String(), body)
|
||||
req.Header.Set("Content-Type", writer.FormDataContentType())
|
||||
req, err := NewMultiPartMetaRequest(url.String(), metas)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue