manifest_test.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422
  1. package distribution
  2. import (
  3. "context"
  4. "encoding/json"
  5. "os"
  6. "strings"
  7. "sync"
  8. "testing"
  9. "github.com/containerd/containerd/content"
  10. "github.com/containerd/containerd/content/local"
  11. "github.com/containerd/containerd/errdefs"
  12. "github.com/containerd/containerd/remotes"
  13. "github.com/docker/distribution"
  14. "github.com/docker/distribution/manifest/manifestlist"
  15. "github.com/docker/distribution/manifest/ocischema"
  16. "github.com/docker/distribution/manifest/schema1"
  17. "github.com/docker/distribution/manifest/schema2"
  18. "github.com/google/go-cmp/cmp/cmpopts"
  19. "github.com/opencontainers/go-digest"
  20. specs "github.com/opencontainers/image-spec/specs-go/v1"
  21. "github.com/pkg/errors"
  22. "gotest.tools/v3/assert"
  23. "gotest.tools/v3/assert/cmp"
  24. )
  25. type mockManifestGetter struct {
  26. manifests map[digest.Digest]distribution.Manifest
  27. gets int
  28. }
  29. func (m *mockManifestGetter) Get(ctx context.Context, dgst digest.Digest, options ...distribution.ManifestServiceOption) (distribution.Manifest, error) {
  30. m.gets++
  31. manifest, ok := m.manifests[dgst]
  32. if !ok {
  33. return nil, distribution.ErrManifestUnknown{Tag: dgst.String()}
  34. }
  35. return manifest, nil
  36. }
  37. type memoryLabelStore struct {
  38. mu sync.Mutex
  39. labels map[digest.Digest]map[string]string
  40. }
  41. // Get returns all the labels for the given digest
  42. func (s *memoryLabelStore) Get(dgst digest.Digest) (map[string]string, error) {
  43. s.mu.Lock()
  44. labels := s.labels[dgst]
  45. s.mu.Unlock()
  46. return labels, nil
  47. }
  48. // Set sets all the labels for a given digest
  49. func (s *memoryLabelStore) Set(dgst digest.Digest, labels map[string]string) error {
  50. s.mu.Lock()
  51. if s.labels == nil {
  52. s.labels = make(map[digest.Digest]map[string]string)
  53. }
  54. s.labels[dgst] = labels
  55. s.mu.Unlock()
  56. return nil
  57. }
  58. // Update replaces the given labels for a digest,
  59. // a key with an empty value removes a label.
  60. func (s *memoryLabelStore) Update(dgst digest.Digest, update map[string]string) (map[string]string, error) {
  61. s.mu.Lock()
  62. defer s.mu.Unlock()
  63. labels, ok := s.labels[dgst]
  64. if !ok {
  65. labels = map[string]string{}
  66. }
  67. for k, v := range update {
  68. labels[k] = v
  69. }
  70. s.labels[dgst] = labels
  71. return labels, nil
  72. }
  73. type testingContentStoreWrapper struct {
  74. ContentStore
  75. errorOnWriter error
  76. errorOnCommit error
  77. }
  78. func (s *testingContentStoreWrapper) Writer(ctx context.Context, opts ...content.WriterOpt) (content.Writer, error) {
  79. if s.errorOnWriter != nil {
  80. return nil, s.errorOnWriter
  81. }
  82. w, err := s.ContentStore.Writer(ctx, opts...)
  83. if err != nil {
  84. return nil, err
  85. }
  86. if s.errorOnCommit != nil {
  87. w = &testingContentWriterWrapper{w, s.errorOnCommit}
  88. }
  89. return w, nil
  90. }
  91. type testingContentWriterWrapper struct {
  92. content.Writer
  93. err error
  94. }
  95. func (w *testingContentWriterWrapper) Commit(ctx context.Context, size int64, dgst digest.Digest, opts ...content.Opt) error {
  96. if w.err != nil {
  97. // The contract for `Commit` is to always close.
  98. // Since this is returning early before hitting the real `Commit`, we should close it here.
  99. w.Close()
  100. return w.err
  101. }
  102. return w.Writer.Commit(ctx, size, dgst, opts...)
  103. }
  104. func TestManifestStore(t *testing.T) {
  105. ociManifest := &specs.Manifest{}
  106. serialized, err := json.Marshal(ociManifest)
  107. assert.NilError(t, err)
  108. dgst := digest.Canonical.FromBytes(serialized)
  109. setupTest := func(t *testing.T) (specs.Descriptor, *mockManifestGetter, *manifestStore, content.Store, func(*testing.T)) {
  110. root, err := os.MkdirTemp("", strings.ReplaceAll(t.Name(), "/", "_"))
  111. assert.NilError(t, err)
  112. defer func() {
  113. if t.Failed() {
  114. os.RemoveAll(root)
  115. }
  116. }()
  117. cs, err := local.NewLabeledStore(root, &memoryLabelStore{})
  118. assert.NilError(t, err)
  119. mg := &mockManifestGetter{manifests: make(map[digest.Digest]distribution.Manifest)}
  120. store := &manifestStore{local: cs, remote: mg}
  121. desc := specs.Descriptor{Digest: dgst, MediaType: specs.MediaTypeImageManifest, Size: int64(len(serialized))}
  122. return desc, mg, store, cs, func(t *testing.T) {
  123. assert.Check(t, os.RemoveAll(root))
  124. }
  125. }
  126. ctx := context.Background()
  127. m, _, err := distribution.UnmarshalManifest(specs.MediaTypeImageManifest, serialized)
  128. assert.NilError(t, err)
  129. writeManifest := func(t *testing.T, cs ContentStore, desc specs.Descriptor, opts ...content.Opt) {
  130. ingestKey := remotes.MakeRefKey(ctx, desc)
  131. w, err := cs.Writer(ctx, content.WithDescriptor(desc), content.WithRef(ingestKey))
  132. assert.NilError(t, err)
  133. defer func() {
  134. if err := w.Close(); err != nil {
  135. t.Log(err)
  136. }
  137. if t.Failed() {
  138. if err := cs.Abort(ctx, ingestKey); err != nil {
  139. t.Log(err)
  140. }
  141. }
  142. }()
  143. _, err = w.Write(serialized)
  144. assert.NilError(t, err)
  145. err = w.Commit(ctx, desc.Size, desc.Digest, opts...)
  146. assert.NilError(t, err)
  147. }
  148. // All tests should end up with no active ingest
  149. checkIngest := func(t *testing.T, cs content.Store, desc specs.Descriptor) {
  150. ingestKey := remotes.MakeRefKey(ctx, desc)
  151. _, err := cs.Status(ctx, ingestKey)
  152. assert.Check(t, errdefs.IsNotFound(err), err)
  153. }
  154. t.Run("no remote or local", func(t *testing.T) {
  155. desc, _, store, cs, teardown := setupTest(t)
  156. defer teardown(t)
  157. _, err = store.Get(ctx, desc)
  158. checkIngest(t, cs, desc)
  159. // This error is what our digest getter returns when it doesn't know about the manifest
  160. assert.Error(t, err, distribution.ErrManifestUnknown{Tag: dgst.String()}.Error())
  161. })
  162. t.Run("no local cache", func(t *testing.T) {
  163. desc, mg, store, cs, teardown := setupTest(t)
  164. defer teardown(t)
  165. mg.manifests[desc.Digest] = m
  166. m2, err := store.Get(ctx, desc)
  167. checkIngest(t, cs, desc)
  168. assert.NilError(t, err)
  169. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  170. assert.Check(t, cmp.Equal(mg.gets, 1))
  171. i, err := cs.Info(ctx, desc.Digest)
  172. assert.NilError(t, err)
  173. assert.Check(t, cmp.Equal(i.Digest, desc.Digest))
  174. // Now check again, this should not hit the remote
  175. m2, err = store.Get(ctx, desc)
  176. checkIngest(t, cs, desc)
  177. assert.NilError(t, err)
  178. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  179. assert.Check(t, cmp.Equal(mg.gets, 1))
  180. })
  181. t.Run("with local cache", func(t *testing.T) {
  182. desc, mg, store, cs, teardown := setupTest(t)
  183. defer teardown(t)
  184. // first add the manifest to the coontent store
  185. writeManifest(t, cs, desc)
  186. // now do the get
  187. m2, err := store.Get(ctx, desc)
  188. checkIngest(t, cs, desc)
  189. assert.NilError(t, err)
  190. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  191. assert.Check(t, cmp.Equal(mg.gets, 0))
  192. i, err := cs.Info(ctx, desc.Digest)
  193. assert.NilError(t, err)
  194. assert.Check(t, cmp.Equal(i.Digest, desc.Digest))
  195. })
  196. // This is for the case of pull by digest where we don't know the media type of the manifest until it's actually pulled.
  197. t.Run("unknown media type", func(t *testing.T) {
  198. t.Run("no cache", func(t *testing.T) {
  199. desc, mg, store, cs, teardown := setupTest(t)
  200. defer teardown(t)
  201. mg.manifests[desc.Digest] = m
  202. desc.MediaType = ""
  203. m2, err := store.Get(ctx, desc)
  204. checkIngest(t, cs, desc)
  205. assert.NilError(t, err)
  206. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  207. assert.Check(t, cmp.Equal(mg.gets, 1))
  208. })
  209. t.Run("with cache", func(t *testing.T) {
  210. t.Run("cached manifest has media type", func(t *testing.T) {
  211. desc, mg, store, cs, teardown := setupTest(t)
  212. defer teardown(t)
  213. writeManifest(t, cs, desc)
  214. desc.MediaType = ""
  215. m2, err := store.Get(ctx, desc)
  216. checkIngest(t, cs, desc)
  217. assert.NilError(t, err)
  218. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  219. assert.Check(t, cmp.Equal(mg.gets, 0))
  220. })
  221. t.Run("cached manifest has no media type", func(t *testing.T) {
  222. desc, mg, store, cs, teardown := setupTest(t)
  223. defer teardown(t)
  224. desc.MediaType = ""
  225. writeManifest(t, cs, desc)
  226. m2, err := store.Get(ctx, desc)
  227. checkIngest(t, cs, desc)
  228. assert.NilError(t, err)
  229. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  230. assert.Check(t, cmp.Equal(mg.gets, 0))
  231. })
  232. })
  233. })
  234. // Test that if there is an error with the content store, for whatever
  235. // reason, that doesn't stop us from getting the manifest.
  236. //
  237. // Also makes sure the ingests are aborted.
  238. t.Run("error persisting manifest", func(t *testing.T) {
  239. t.Run("error on writer", func(t *testing.T) {
  240. desc, mg, store, cs, teardown := setupTest(t)
  241. defer teardown(t)
  242. mg.manifests[desc.Digest] = m
  243. csW := &testingContentStoreWrapper{ContentStore: store.local, errorOnWriter: errors.New("random error")}
  244. store.local = csW
  245. m2, err := store.Get(ctx, desc)
  246. checkIngest(t, cs, desc)
  247. assert.NilError(t, err)
  248. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  249. assert.Check(t, cmp.Equal(mg.gets, 1))
  250. _, err = cs.Info(ctx, desc.Digest)
  251. // Nothing here since we couldn't persist
  252. assert.Check(t, errdefs.IsNotFound(err), err)
  253. })
  254. t.Run("error on commit", func(t *testing.T) {
  255. desc, mg, store, cs, teardown := setupTest(t)
  256. defer teardown(t)
  257. mg.manifests[desc.Digest] = m
  258. csW := &testingContentStoreWrapper{ContentStore: store.local, errorOnCommit: errors.New("random error")}
  259. store.local = csW
  260. m2, err := store.Get(ctx, desc)
  261. checkIngest(t, cs, desc)
  262. assert.NilError(t, err)
  263. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  264. assert.Check(t, cmp.Equal(mg.gets, 1))
  265. _, err = cs.Info(ctx, desc.Digest)
  266. // Nothing here since we couldn't persist
  267. assert.Check(t, errdefs.IsNotFound(err), err)
  268. })
  269. })
  270. }
  271. func TestDetectManifestBlobMediaType(t *testing.T) {
  272. type testCase struct {
  273. json []byte
  274. expected string
  275. }
  276. cases := map[string]testCase{
  277. "mediaType is set": {[]byte(`{"mediaType": "bananas"}`), "bananas"},
  278. "oci manifest": {[]byte(`{"config": {}}`), specs.MediaTypeImageManifest},
  279. "schema1": {[]byte(`{"fsLayers": []}`), schema1.MediaTypeManifest},
  280. "oci index fallback": {[]byte(`{}`), specs.MediaTypeImageIndex},
  281. // Make sure we prefer mediaType
  282. "mediaType and config set": {[]byte(`{"mediaType": "bananas", "config": {}}`), "bananas"},
  283. "mediaType and fsLayers set": {[]byte(`{"mediaType": "bananas", "fsLayers": []}`), "bananas"},
  284. }
  285. for name, tc := range cases {
  286. t.Run(name, func(t *testing.T) {
  287. mt, err := detectManifestBlobMediaType(tc.json)
  288. assert.NilError(t, err)
  289. assert.Equal(t, mt, tc.expected)
  290. })
  291. }
  292. }
  293. func TestDetectManifestBlobMediaTypeInvalid(t *testing.T) {
  294. type testCase struct {
  295. json []byte
  296. expected string
  297. }
  298. cases := map[string]testCase{
  299. "schema 1 mediaType with manifests": {
  300. []byte(`{"mediaType": "` + schema1.MediaTypeManifest + `","manifests":[]}`),
  301. `media-type: "application/vnd.docker.distribution.manifest.v1+json" should not have "manifests" or "layers"`,
  302. },
  303. "schema 1 mediaType with layers": {
  304. []byte(`{"mediaType": "` + schema1.MediaTypeManifest + `","layers":[]}`),
  305. `media-type: "application/vnd.docker.distribution.manifest.v1+json" should not have "manifests" or "layers"`,
  306. },
  307. "schema 2 mediaType with manifests": {
  308. []byte(`{"mediaType": "` + schema2.MediaTypeManifest + `","manifests":[]}`),
  309. `media-type: "application/vnd.docker.distribution.manifest.v2+json" should not have "manifests" or "fsLayers"`,
  310. },
  311. "schema 2 mediaType with fsLayers": {
  312. []byte(`{"mediaType": "` + schema2.MediaTypeManifest + `","fsLayers":[]}`),
  313. `media-type: "application/vnd.docker.distribution.manifest.v2+json" should not have "manifests" or "fsLayers"`,
  314. },
  315. "oci manifest mediaType with manifests": {
  316. []byte(`{"mediaType": "` + specs.MediaTypeImageManifest + `","manifests":[]}`),
  317. `media-type: "application/vnd.oci.image.manifest.v1+json" should not have "manifests" or "fsLayers"`,
  318. },
  319. "manifest list mediaType with fsLayers": {
  320. []byte(`{"mediaType": "` + manifestlist.MediaTypeManifestList + `","fsLayers":[]}`),
  321. `media-type: "application/vnd.docker.distribution.manifest.list.v2+json" should not have "config", "layers", or "fsLayers"`,
  322. },
  323. "index mediaType with layers": {
  324. []byte(`{"mediaType": "` + specs.MediaTypeImageIndex + `","layers":[]}`),
  325. `media-type: "application/vnd.oci.image.index.v1+json" should not have "config", "layers", or "fsLayers"`,
  326. },
  327. "index mediaType with config": {
  328. []byte(`{"mediaType": "` + specs.MediaTypeImageIndex + `","config":{}}`),
  329. `media-type: "application/vnd.oci.image.index.v1+json" should not have "config", "layers", or "fsLayers"`,
  330. },
  331. "config and manifests": {
  332. []byte(`{"config":{}, "manifests":[]}`),
  333. `media-type: cannot determine`,
  334. },
  335. "layers and manifests": {
  336. []byte(`{"layers":[], "manifests":[]}`),
  337. `media-type: cannot determine`,
  338. },
  339. "layers and fsLayers": {
  340. []byte(`{"layers":[], "fsLayers":[]}`),
  341. `media-type: cannot determine`,
  342. },
  343. "fsLayers and manifests": {
  344. []byte(`{"fsLayers":[], "manifests":[]}`),
  345. `media-type: cannot determine`,
  346. },
  347. "config and fsLayers": {
  348. []byte(`{"config":{}, "fsLayers":[]}`),
  349. `media-type: cannot determine`,
  350. },
  351. }
  352. for name, tc := range cases {
  353. t.Run(name, func(t *testing.T) {
  354. mt, err := detectManifestBlobMediaType(tc.json)
  355. assert.Error(t, err, tc.expected)
  356. assert.Equal(t, mt, "")
  357. })
  358. }
  359. }