mirror of https://github.com/docker/docs.git
				
				
				
			
		
			
				
	
	
		
			365 lines
		
	
	
		
			9.0 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			365 lines
		
	
	
		
			9.0 KiB
		
	
	
	
		
			Go
		
	
	
	
| package storage
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"io"
 | |
| 	"reflect"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/docker/distribution"
 | |
| 	"github.com/docker/distribution/context"
 | |
| 	"github.com/docker/distribution/digest"
 | |
| 	"github.com/docker/distribution/manifest"
 | |
| 	"github.com/docker/distribution/registry/storage/cache/memory"
 | |
| 	"github.com/docker/distribution/registry/storage/driver"
 | |
| 	"github.com/docker/distribution/registry/storage/driver/inmemory"
 | |
| 	"github.com/docker/distribution/testutil"
 | |
| 	"github.com/docker/libtrust"
 | |
| )
 | |
| 
 | |
| type manifestStoreTestEnv struct {
 | |
| 	ctx        context.Context
 | |
| 	driver     driver.StorageDriver
 | |
| 	registry   distribution.Namespace
 | |
| 	repository distribution.Repository
 | |
| 	name       string
 | |
| 	tag        string
 | |
| }
 | |
| 
 | |
| func newManifestStoreTestEnv(t *testing.T, name, tag string) *manifestStoreTestEnv {
 | |
| 	ctx := context.Background()
 | |
| 	driver := inmemory.New()
 | |
| 	registry := NewRegistryWithDriver(ctx, driver, memory.NewInMemoryBlobDescriptorCacheProvider(), true, true)
 | |
| 
 | |
| 	repo, err := registry.Repository(ctx, name)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error getting repo: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	return &manifestStoreTestEnv{
 | |
| 		ctx:        ctx,
 | |
| 		driver:     driver,
 | |
| 		registry:   registry,
 | |
| 		repository: repo,
 | |
| 		name:       name,
 | |
| 		tag:        tag,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestManifestStorage(t *testing.T) {
 | |
| 	env := newManifestStoreTestEnv(t, "foo/bar", "thetag")
 | |
| 	ctx := context.Background()
 | |
| 	ms, err := env.repository.Manifests(ctx)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	exists, err := ms.ExistsByTag(env.tag)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error checking manifest existence: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if exists {
 | |
| 		t.Fatalf("manifest should not exist")
 | |
| 	}
 | |
| 
 | |
| 	if _, err := ms.GetByTag(env.tag); true {
 | |
| 		switch err.(type) {
 | |
| 		case distribution.ErrManifestUnknown:
 | |
| 			break
 | |
| 		default:
 | |
| 			t.Fatalf("expected manifest unknown error: %#v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	m := manifest.Manifest{
 | |
| 		Versioned: manifest.Versioned{
 | |
| 			SchemaVersion: 1,
 | |
| 		},
 | |
| 		Name: env.name,
 | |
| 		Tag:  env.tag,
 | |
| 	}
 | |
| 
 | |
| 	// Build up some test layers and add them to the manifest, saving the
 | |
| 	// readseekers for upload later.
 | |
| 	testLayers := map[digest.Digest]io.ReadSeeker{}
 | |
| 	for i := 0; i < 2; i++ {
 | |
| 		rs, ds, err := testutil.CreateRandomTarFile()
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("unexpected error generating test layer file")
 | |
| 		}
 | |
| 		dgst := digest.Digest(ds)
 | |
| 
 | |
| 		testLayers[digest.Digest(dgst)] = rs
 | |
| 		m.FSLayers = append(m.FSLayers, manifest.FSLayer{
 | |
| 			BlobSum: dgst,
 | |
| 		})
 | |
| 	}
 | |
| 
 | |
| 	pk, err := libtrust.GenerateECP256PrivateKey()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error generating private key: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	sm, merr := manifest.Sign(&m, pk)
 | |
| 	if merr != nil {
 | |
| 		t.Fatalf("error signing manifest: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	err = ms.Put(sm)
 | |
| 	if err == nil {
 | |
| 		t.Fatalf("expected errors putting manifest with full verification")
 | |
| 	}
 | |
| 
 | |
| 	switch err := err.(type) {
 | |
| 	case distribution.ErrManifestVerification:
 | |
| 		if len(err) != 2 {
 | |
| 			t.Fatalf("expected 2 verification errors: %#v", err)
 | |
| 		}
 | |
| 
 | |
| 		for _, err := range err {
 | |
| 			if _, ok := err.(distribution.ErrManifestBlobUnknown); !ok {
 | |
| 				t.Fatalf("unexpected error type: %v", err)
 | |
| 			}
 | |
| 		}
 | |
| 	default:
 | |
| 		t.Fatalf("unexpected error verifying manifest: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	// Now, upload the layers that were missing!
 | |
| 	for dgst, rs := range testLayers {
 | |
| 		wr, err := env.repository.Blobs(env.ctx).Create(env.ctx)
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("unexpected error creating test upload: %v", err)
 | |
| 		}
 | |
| 
 | |
| 		if _, err := io.Copy(wr, rs); err != nil {
 | |
| 			t.Fatalf("unexpected error copying to upload: %v", err)
 | |
| 		}
 | |
| 
 | |
| 		if _, err := wr.Commit(env.ctx, distribution.Descriptor{Digest: dgst}); err != nil {
 | |
| 			t.Fatalf("unexpected error finishing upload: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if err = ms.Put(sm); err != nil {
 | |
| 		t.Fatalf("unexpected error putting manifest: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	exists, err = ms.ExistsByTag(env.tag)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error checking manifest existence: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if !exists {
 | |
| 		t.Fatalf("manifest should exist")
 | |
| 	}
 | |
| 
 | |
| 	fetchedManifest, err := ms.GetByTag(env.tag)
 | |
| 
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error fetching manifest: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if !reflect.DeepEqual(fetchedManifest, sm) {
 | |
| 		t.Fatalf("fetched manifest not equal: %#v != %#v", fetchedManifest, sm)
 | |
| 	}
 | |
| 
 | |
| 	fetchedJWS, err := libtrust.ParsePrettySignature(fetchedManifest.Raw, "signatures")
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error parsing jws: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	payload, err := fetchedJWS.Payload()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error extracting payload: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	// Now that we have a payload, take a moment to check that the manifest is
 | |
| 	// return by the payload digest.
 | |
| 	dgst, err := digest.FromBytes(payload)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("error getting manifest digest: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	exists, err = ms.Exists(dgst)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("error checking manifest existence by digest: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if !exists {
 | |
| 		t.Fatalf("manifest %s should exist", dgst)
 | |
| 	}
 | |
| 
 | |
| 	fetchedByDigest, err := ms.Get(dgst)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error fetching manifest by digest: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if !reflect.DeepEqual(fetchedByDigest, fetchedManifest) {
 | |
| 		t.Fatalf("fetched manifest not equal: %#v != %#v", fetchedByDigest, fetchedManifest)
 | |
| 	}
 | |
| 
 | |
| 	sigs, err := fetchedJWS.Signatures()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unable to extract signatures: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if len(sigs) != 1 {
 | |
| 		t.Fatalf("unexpected number of signatures: %d != %d", len(sigs), 1)
 | |
| 	}
 | |
| 
 | |
| 	// Grabs the tags and check that this tagged manifest is present
 | |
| 	tags, err := ms.Tags()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error fetching tags: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if len(tags) != 1 {
 | |
| 		t.Fatalf("unexpected tags returned: %v", tags)
 | |
| 	}
 | |
| 
 | |
| 	if tags[0] != env.tag {
 | |
| 		t.Fatalf("unexpected tag found in tags: %v != %v", tags, []string{env.tag})
 | |
| 	}
 | |
| 
 | |
| 	// Now, push the same manifest with a different key
 | |
| 	pk2, err := libtrust.GenerateECP256PrivateKey()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error generating private key: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	sm2, err := manifest.Sign(&m, pk2)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error signing manifest: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	jws2, err := libtrust.ParsePrettySignature(sm2.Raw, "signatures")
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("error parsing signature: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	sigs2, err := jws2.Signatures()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unable to extract signatures: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if len(sigs2) != 1 {
 | |
| 		t.Fatalf("unexpected number of signatures: %d != %d", len(sigs2), 1)
 | |
| 	}
 | |
| 
 | |
| 	if err = ms.Put(sm2); err != nil {
 | |
| 		t.Fatalf("unexpected error putting manifest: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	fetched, err := ms.GetByTag(env.tag)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error fetching manifest: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if _, err := manifest.Verify(fetched); err != nil {
 | |
| 		t.Fatalf("unexpected error verifying manifest: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	// Assemble our payload and two signatures to get what we expect!
 | |
| 	expectedJWS, err := libtrust.NewJSONSignature(payload, sigs[0], sigs2[0])
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error merging jws: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	expectedSigs, err := expectedJWS.Signatures()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error getting expected signatures: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	receivedJWS, err := libtrust.ParsePrettySignature(fetched.Raw, "signatures")
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error parsing jws: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	receivedPayload, err := receivedJWS.Payload()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error extracting received payload: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if !bytes.Equal(receivedPayload, payload) {
 | |
| 		t.Fatalf("payloads are not equal")
 | |
| 	}
 | |
| 
 | |
| 	receivedSigs, err := receivedJWS.Signatures()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("error getting signatures: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	for i, sig := range receivedSigs {
 | |
| 		if !bytes.Equal(sig, expectedSigs[i]) {
 | |
| 			t.Fatalf("mismatched signatures from remote: %v != %v", string(sig), string(expectedSigs[i]))
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Test deleting manifests
 | |
| 	err = ms.Delete(dgst)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected an error deleting manifest by digest: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	exists, err = ms.Exists(dgst)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Error querying manifest existence")
 | |
| 	}
 | |
| 	if exists {
 | |
| 		t.Errorf("Deleted manifest should not exist")
 | |
| 	}
 | |
| 
 | |
| 	deletedManifest, err := ms.Get(dgst)
 | |
| 	if err == nil {
 | |
| 		t.Errorf("Unexpected success getting deleted manifest")
 | |
| 	}
 | |
| 	switch err.(type) {
 | |
| 	case distribution.ErrManifestUnknownRevision:
 | |
| 		break
 | |
| 	default:
 | |
| 		t.Errorf("Unexpected error getting deleted manifest: %s", reflect.ValueOf(err).Type())
 | |
| 	}
 | |
| 
 | |
| 	if deletedManifest != nil {
 | |
| 		t.Errorf("Deleted manifest get returned non-nil")
 | |
| 	}
 | |
| 
 | |
| 	// Re-upload should restore manifest to a good state
 | |
| 	err = ms.Put(sm)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Error re-uploading deleted manifest")
 | |
| 	}
 | |
| 
 | |
| 	exists, err = ms.Exists(dgst)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Error querying manifest existence")
 | |
| 	}
 | |
| 	if !exists {
 | |
| 		t.Errorf("Restored manifest should exist")
 | |
| 	}
 | |
| 
 | |
| 	deletedManifest, err = ms.Get(dgst)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Unexpected error getting manifest")
 | |
| 	}
 | |
| 	if deletedManifest == nil {
 | |
| 		t.Errorf("Deleted manifest get returned non-nil")
 | |
| 	}
 | |
| 
 | |
| 	r := NewRegistryWithDriver(ctx, env.driver, memory.NewInMemoryBlobDescriptorCacheProvider(), false, true)
 | |
| 	repo, err := r.Repository(ctx, env.name)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error getting repo: %v", err)
 | |
| 	}
 | |
| 	ms, err = repo.Manifests(ctx)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	err = ms.Delete(dgst)
 | |
| 	if err == nil {
 | |
| 		t.Errorf("Unexpected success deleting while disabled")
 | |
| 	}
 | |
| }
 |