manifest_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441
  1. package distribution
  2. import (
  3. "context"
  4. "encoding/json"
  5. "os"
  6. "strings"
  7. "sync"
  8. "testing"
  9. "github.com/containerd/containerd/content"
  10. "github.com/containerd/containerd/content/local"
  11. cerrdefs "github.com/containerd/containerd/errdefs"
  12. "github.com/containerd/containerd/remotes"
  13. "github.com/distribution/reference"
  14. "github.com/docker/distribution"
  15. "github.com/docker/distribution/manifest/manifestlist"
  16. "github.com/docker/distribution/manifest/ocischema"
  17. "github.com/docker/distribution/manifest/schema1"
  18. "github.com/docker/distribution/manifest/schema2"
  19. "github.com/google/go-cmp/cmp/cmpopts"
  20. "github.com/opencontainers/go-digest"
  21. ocispec "github.com/opencontainers/image-spec/specs-go/v1"
  22. "github.com/pkg/errors"
  23. "gotest.tools/v3/assert"
  24. "gotest.tools/v3/assert/cmp"
  25. )
  26. type mockManifestGetter struct {
  27. manifests map[digest.Digest]distribution.Manifest
  28. gets int
  29. }
  30. func (m *mockManifestGetter) Get(ctx context.Context, dgst digest.Digest, options ...distribution.ManifestServiceOption) (distribution.Manifest, error) {
  31. m.gets++
  32. manifest, ok := m.manifests[dgst]
  33. if !ok {
  34. return nil, distribution.ErrManifestUnknown{Tag: dgst.String()}
  35. }
  36. return manifest, nil
  37. }
  38. func (m *mockManifestGetter) Exists(ctx context.Context, dgst digest.Digest) (bool, error) {
  39. _, ok := m.manifests[dgst]
  40. return ok, nil
  41. }
  42. type memoryLabelStore struct {
  43. mu sync.Mutex
  44. labels map[digest.Digest]map[string]string
  45. }
  46. // Get returns all the labels for the given digest
  47. func (s *memoryLabelStore) Get(dgst digest.Digest) (map[string]string, error) {
  48. s.mu.Lock()
  49. labels := s.labels[dgst]
  50. s.mu.Unlock()
  51. return labels, nil
  52. }
  53. // Set sets all the labels for a given digest
  54. func (s *memoryLabelStore) Set(dgst digest.Digest, labels map[string]string) error {
  55. s.mu.Lock()
  56. if s.labels == nil {
  57. s.labels = make(map[digest.Digest]map[string]string)
  58. }
  59. s.labels[dgst] = labels
  60. s.mu.Unlock()
  61. return nil
  62. }
  63. // Update replaces the given labels for a digest,
  64. // a key with an empty value removes a label.
  65. func (s *memoryLabelStore) Update(dgst digest.Digest, update map[string]string) (map[string]string, error) {
  66. s.mu.Lock()
  67. defer s.mu.Unlock()
  68. labels, ok := s.labels[dgst]
  69. if !ok {
  70. labels = map[string]string{}
  71. }
  72. for k, v := range update {
  73. labels[k] = v
  74. }
  75. if s.labels == nil {
  76. s.labels = map[digest.Digest]map[string]string{}
  77. }
  78. s.labels[dgst] = labels
  79. return labels, nil
  80. }
  81. type testingContentStoreWrapper struct {
  82. ContentStore
  83. errorOnWriter error
  84. errorOnCommit error
  85. }
  86. func (s *testingContentStoreWrapper) Writer(ctx context.Context, opts ...content.WriterOpt) (content.Writer, error) {
  87. if s.errorOnWriter != nil {
  88. return nil, s.errorOnWriter
  89. }
  90. w, err := s.ContentStore.Writer(ctx, opts...)
  91. if err != nil {
  92. return nil, err
  93. }
  94. if s.errorOnCommit != nil {
  95. w = &testingContentWriterWrapper{w, s.errorOnCommit}
  96. }
  97. return w, nil
  98. }
  99. type testingContentWriterWrapper struct {
  100. content.Writer
  101. err error
  102. }
  103. func (w *testingContentWriterWrapper) Commit(ctx context.Context, size int64, dgst digest.Digest, opts ...content.Opt) error {
  104. if w.err != nil {
  105. // The contract for `Commit` is to always close.
  106. // Since this is returning early before hitting the real `Commit`, we should close it here.
  107. w.Close()
  108. return w.err
  109. }
  110. return w.Writer.Commit(ctx, size, dgst, opts...)
  111. }
  112. func TestManifestStore(t *testing.T) {
  113. ociManifest := &ocispec.Manifest{}
  114. serialized, err := json.Marshal(ociManifest)
  115. assert.NilError(t, err)
  116. dgst := digest.Canonical.FromBytes(serialized)
  117. setupTest := func(t *testing.T) (reference.Named, ocispec.Descriptor, *mockManifestGetter, *manifestStore, content.Store, func(*testing.T)) {
  118. root, err := os.MkdirTemp("", strings.ReplaceAll(t.Name(), "/", "_"))
  119. assert.NilError(t, err)
  120. defer func() {
  121. if t.Failed() {
  122. os.RemoveAll(root)
  123. }
  124. }()
  125. cs, err := local.NewLabeledStore(root, &memoryLabelStore{})
  126. assert.NilError(t, err)
  127. mg := &mockManifestGetter{manifests: make(map[digest.Digest]distribution.Manifest)}
  128. store := &manifestStore{local: cs, remote: mg}
  129. desc := ocispec.Descriptor{Digest: dgst, MediaType: ocispec.MediaTypeImageManifest, Size: int64(len(serialized))}
  130. ref, err := reference.Parse("foo/bar")
  131. assert.NilError(t, err)
  132. return ref.(reference.Named), desc, mg, store, cs, func(t *testing.T) {
  133. assert.Check(t, os.RemoveAll(root))
  134. }
  135. }
  136. ctx := context.Background()
  137. m, _, err := distribution.UnmarshalManifest(ocispec.MediaTypeImageManifest, serialized)
  138. assert.NilError(t, err)
  139. writeManifest := func(t *testing.T, cs ContentStore, desc ocispec.Descriptor, opts ...content.Opt) {
  140. ingestKey := remotes.MakeRefKey(ctx, desc)
  141. w, err := cs.Writer(ctx, content.WithDescriptor(desc), content.WithRef(ingestKey))
  142. assert.NilError(t, err)
  143. defer func() {
  144. if err := w.Close(); err != nil {
  145. t.Log(err)
  146. }
  147. if t.Failed() {
  148. if err := cs.Abort(ctx, ingestKey); err != nil {
  149. t.Log(err)
  150. }
  151. }
  152. }()
  153. _, err = w.Write(serialized)
  154. assert.NilError(t, err)
  155. err = w.Commit(ctx, desc.Size, desc.Digest, opts...)
  156. assert.NilError(t, err)
  157. }
  158. // All tests should end up with no active ingest
  159. checkIngest := func(t *testing.T, cs content.Store, desc ocispec.Descriptor) {
  160. ingestKey := remotes.MakeRefKey(ctx, desc)
  161. _, err := cs.Status(ctx, ingestKey)
  162. assert.Check(t, cerrdefs.IsNotFound(err), err)
  163. }
  164. t.Run("no remote or local", func(t *testing.T) {
  165. ref, desc, _, store, cs, teardown := setupTest(t)
  166. defer teardown(t)
  167. _, err = store.Get(ctx, desc, ref)
  168. checkIngest(t, cs, desc)
  169. // This error is what our digest getter returns when it doesn't know about the manifest
  170. assert.Error(t, err, distribution.ErrManifestUnknown{Tag: dgst.String()}.Error())
  171. })
  172. t.Run("no local cache", func(t *testing.T) {
  173. ref, desc, mg, store, cs, teardown := setupTest(t)
  174. defer teardown(t)
  175. mg.manifests[desc.Digest] = m
  176. m2, err := store.Get(ctx, desc, ref)
  177. checkIngest(t, cs, desc)
  178. assert.NilError(t, err)
  179. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  180. assert.Check(t, cmp.Equal(mg.gets, 1))
  181. i, err := cs.Info(ctx, desc.Digest)
  182. assert.NilError(t, err)
  183. assert.Check(t, cmp.Equal(i.Digest, desc.Digest))
  184. distKey, distSource := makeDistributionSourceLabel(ref)
  185. assert.Check(t, hasDistributionSource(i.Labels[distKey], distSource))
  186. // Now check again, this should not hit the remote
  187. m2, err = store.Get(ctx, desc, ref)
  188. checkIngest(t, cs, desc)
  189. assert.NilError(t, err)
  190. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  191. assert.Check(t, cmp.Equal(mg.gets, 1))
  192. t.Run("digested", func(t *testing.T) {
  193. ref, err := reference.WithDigest(ref, desc.Digest)
  194. assert.NilError(t, err)
  195. _, err = store.Get(ctx, desc, ref)
  196. assert.NilError(t, err)
  197. })
  198. })
  199. t.Run("with local cache", func(t *testing.T) {
  200. ref, desc, mg, store, cs, teardown := setupTest(t)
  201. defer teardown(t)
  202. // first add the manifest to the coontent store
  203. writeManifest(t, cs, desc)
  204. // now do the get
  205. m2, err := store.Get(ctx, desc, ref)
  206. checkIngest(t, cs, desc)
  207. assert.NilError(t, err)
  208. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  209. assert.Check(t, cmp.Equal(mg.gets, 0))
  210. i, err := cs.Info(ctx, desc.Digest)
  211. assert.NilError(t, err)
  212. assert.Check(t, cmp.Equal(i.Digest, desc.Digest))
  213. })
  214. // This is for the case of pull by digest where we don't know the media type of the manifest until it's actually pulled.
  215. t.Run("unknown media type", func(t *testing.T) {
  216. t.Run("no cache", func(t *testing.T) {
  217. ref, desc, mg, store, cs, teardown := setupTest(t)
  218. defer teardown(t)
  219. mg.manifests[desc.Digest] = m
  220. desc.MediaType = ""
  221. m2, err := store.Get(ctx, desc, ref)
  222. checkIngest(t, cs, desc)
  223. assert.NilError(t, err)
  224. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  225. assert.Check(t, cmp.Equal(mg.gets, 1))
  226. })
  227. t.Run("with cache", func(t *testing.T) {
  228. t.Run("cached manifest has media type", func(t *testing.T) {
  229. ref, desc, mg, store, cs, teardown := setupTest(t)
  230. defer teardown(t)
  231. writeManifest(t, cs, desc)
  232. desc.MediaType = ""
  233. m2, err := store.Get(ctx, desc, ref)
  234. checkIngest(t, cs, desc)
  235. assert.NilError(t, err)
  236. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  237. assert.Check(t, cmp.Equal(mg.gets, 0))
  238. })
  239. t.Run("cached manifest has no media type", func(t *testing.T) {
  240. ref, desc, mg, store, cs, teardown := setupTest(t)
  241. defer teardown(t)
  242. desc.MediaType = ""
  243. writeManifest(t, cs, desc)
  244. m2, err := store.Get(ctx, desc, ref)
  245. checkIngest(t, cs, desc)
  246. assert.NilError(t, err)
  247. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  248. assert.Check(t, cmp.Equal(mg.gets, 0))
  249. })
  250. })
  251. })
  252. // Test that if there is an error with the content store, for whatever
  253. // reason, that doesn't stop us from getting the manifest.
  254. //
  255. // Also makes sure the ingests are aborted.
  256. t.Run("error persisting manifest", func(t *testing.T) {
  257. t.Run("error on writer", func(t *testing.T) {
  258. ref, desc, mg, store, cs, teardown := setupTest(t)
  259. defer teardown(t)
  260. mg.manifests[desc.Digest] = m
  261. csW := &testingContentStoreWrapper{ContentStore: store.local, errorOnWriter: errors.New("random error")}
  262. store.local = csW
  263. m2, err := store.Get(ctx, desc, ref)
  264. checkIngest(t, cs, desc)
  265. assert.NilError(t, err)
  266. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  267. assert.Check(t, cmp.Equal(mg.gets, 1))
  268. _, err = cs.Info(ctx, desc.Digest)
  269. // Nothing here since we couldn't persist
  270. assert.Check(t, cerrdefs.IsNotFound(err), err)
  271. })
  272. t.Run("error on commit", func(t *testing.T) {
  273. ref, desc, mg, store, cs, teardown := setupTest(t)
  274. defer teardown(t)
  275. mg.manifests[desc.Digest] = m
  276. csW := &testingContentStoreWrapper{ContentStore: store.local, errorOnCommit: errors.New("random error")}
  277. store.local = csW
  278. m2, err := store.Get(ctx, desc, ref)
  279. checkIngest(t, cs, desc)
  280. assert.NilError(t, err)
  281. assert.Check(t, cmp.DeepEqual(m, m2, cmpopts.IgnoreUnexported(ocischema.DeserializedManifest{})))
  282. assert.Check(t, cmp.Equal(mg.gets, 1))
  283. _, err = cs.Info(ctx, desc.Digest)
  284. // Nothing here since we couldn't persist
  285. assert.Check(t, cerrdefs.IsNotFound(err), err)
  286. })
  287. })
  288. }
  289. func TestDetectManifestBlobMediaType(t *testing.T) {
  290. type testCase struct {
  291. json []byte
  292. expected string
  293. }
  294. cases := map[string]testCase{
  295. "mediaType is set": {[]byte(`{"mediaType": "bananas"}`), "bananas"},
  296. "oci manifest": {[]byte(`{"config": {}}`), ocispec.MediaTypeImageManifest},
  297. "schema1": {[]byte(`{"fsLayers": []}`), schema1.MediaTypeManifest},
  298. "oci index fallback": {[]byte(`{}`), ocispec.MediaTypeImageIndex},
  299. // Make sure we prefer mediaType
  300. "mediaType and config set": {[]byte(`{"mediaType": "bananas", "config": {}}`), "bananas"},
  301. "mediaType and fsLayers set": {[]byte(`{"mediaType": "bananas", "fsLayers": []}`), "bananas"},
  302. }
  303. for name, tc := range cases {
  304. t.Run(name, func(t *testing.T) {
  305. mt, err := detectManifestBlobMediaType(tc.json)
  306. assert.NilError(t, err)
  307. assert.Equal(t, mt, tc.expected)
  308. })
  309. }
  310. }
  311. func TestDetectManifestBlobMediaTypeInvalid(t *testing.T) {
  312. type testCase struct {
  313. json []byte
  314. expected string
  315. }
  316. cases := map[string]testCase{
  317. "schema 1 mediaType with manifests": {
  318. []byte(`{"mediaType": "` + schema1.MediaTypeManifest + `","manifests":[]}`),
  319. `media-type: "application/vnd.docker.distribution.manifest.v1+json" should not have "manifests" or "layers"`,
  320. },
  321. "schema 1 mediaType with layers": {
  322. []byte(`{"mediaType": "` + schema1.MediaTypeManifest + `","layers":[]}`),
  323. `media-type: "application/vnd.docker.distribution.manifest.v1+json" should not have "manifests" or "layers"`,
  324. },
  325. "schema 2 mediaType with manifests": {
  326. []byte(`{"mediaType": "` + schema2.MediaTypeManifest + `","manifests":[]}`),
  327. `media-type: "application/vnd.docker.distribution.manifest.v2+json" should not have "manifests" or "fsLayers"`,
  328. },
  329. "schema 2 mediaType with fsLayers": {
  330. []byte(`{"mediaType": "` + schema2.MediaTypeManifest + `","fsLayers":[]}`),
  331. `media-type: "application/vnd.docker.distribution.manifest.v2+json" should not have "manifests" or "fsLayers"`,
  332. },
  333. "oci manifest mediaType with manifests": {
  334. []byte(`{"mediaType": "` + ocispec.MediaTypeImageManifest + `","manifests":[]}`),
  335. `media-type: "application/vnd.oci.image.manifest.v1+json" should not have "manifests" or "fsLayers"`,
  336. },
  337. "manifest list mediaType with fsLayers": {
  338. []byte(`{"mediaType": "` + manifestlist.MediaTypeManifestList + `","fsLayers":[]}`),
  339. `media-type: "application/vnd.docker.distribution.manifest.list.v2+json" should not have "config", "layers", or "fsLayers"`,
  340. },
  341. "index mediaType with layers": {
  342. []byte(`{"mediaType": "` + ocispec.MediaTypeImageIndex + `","layers":[]}`),
  343. `media-type: "application/vnd.oci.image.index.v1+json" should not have "config", "layers", or "fsLayers"`,
  344. },
  345. "index mediaType with config": {
  346. []byte(`{"mediaType": "` + ocispec.MediaTypeImageIndex + `","config":{}}`),
  347. `media-type: "application/vnd.oci.image.index.v1+json" should not have "config", "layers", or "fsLayers"`,
  348. },
  349. "config and manifests": {
  350. []byte(`{"config":{}, "manifests":[]}`),
  351. `media-type: cannot determine`,
  352. },
  353. "layers and manifests": {
  354. []byte(`{"layers":[], "manifests":[]}`),
  355. `media-type: cannot determine`,
  356. },
  357. "layers and fsLayers": {
  358. []byte(`{"layers":[], "fsLayers":[]}`),
  359. `media-type: cannot determine`,
  360. },
  361. "fsLayers and manifests": {
  362. []byte(`{"fsLayers":[], "manifests":[]}`),
  363. `media-type: cannot determine`,
  364. },
  365. "config and fsLayers": {
  366. []byte(`{"config":{}, "fsLayers":[]}`),
  367. `media-type: cannot determine`,
  368. },
  369. }
  370. for name, tc := range cases {
  371. t.Run(name, func(t *testing.T) {
  372. mt, err := detectManifestBlobMediaType(tc.json)
  373. assert.Error(t, err, tc.expected)
  374. assert.Equal(t, mt, "")
  375. })
  376. }
  377. }