mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-10-30 14:01:02 +00:00 
			
		
		
		
	This reverts commit a239d6c4a9.
Refs: https://codeberg.org/forgejo/forgejo/issues/334
	
	
This commit is contained in:
		
					parent
					
						
							
								9a28d844d6
							
						
					
				
			
			
				commit
				
					
						1184fa36a3
					
				
			
		
					 12 changed files with 326 additions and 90 deletions
				
			
		
							
								
								
									
										10
									
								
								assets/go-licenses.json
									
										
									
										generated
									
									
									
								
							
							
						
						
									
										10
									
								
								assets/go-licenses.json
									
										
									
										generated
									
									
									
								
							
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							
							
								
								
									
										2
									
								
								go.mod
									
										
									
									
									
								
							
							
						
						
									
										2
									
								
								go.mod
									
										
									
									
									
								
							|  | @ -75,8 +75,6 @@ require ( | ||||||
| 	github.com/niklasfasching/go-org v1.6.5 | 	github.com/niklasfasching/go-org v1.6.5 | ||||||
| 	github.com/oliamb/cutter v0.2.2 | 	github.com/oliamb/cutter v0.2.2 | ||||||
| 	github.com/olivere/elastic/v7 v7.0.32 | 	github.com/olivere/elastic/v7 v7.0.32 | ||||||
| 	github.com/opencontainers/go-digest v1.0.0 |  | ||||||
| 	github.com/opencontainers/image-spec v1.1.0-rc2 |  | ||||||
| 	github.com/pkg/errors v0.9.1 | 	github.com/pkg/errors v0.9.1 | ||||||
| 	github.com/pquerna/otp v1.3.0 | 	github.com/pquerna/otp v1.3.0 | ||||||
| 	github.com/prometheus/client_golang v1.13.0 | 	github.com/prometheus/client_golang v1.13.0 | ||||||
|  |  | ||||||
							
								
								
									
										4
									
								
								go.sum
									
										
									
									
									
								
							
							
						
						
									
										4
									
								
								go.sum
									
										
									
									
									
								
							|  | @ -1174,10 +1174,6 @@ github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1y | ||||||
| github.com/onsi/gomega v1.10.3/go.mod h1:V9xEwhxec5O8UDM77eCW8vLymOMltsqPVYWrpDsH8xc= | github.com/onsi/gomega v1.10.3/go.mod h1:V9xEwhxec5O8UDM77eCW8vLymOMltsqPVYWrpDsH8xc= | ||||||
| github.com/onsi/gomega v1.18.1 h1:M1GfJqGRrBrrGGsbxzV5dqM2U2ApXefZCQpkukxYRLE= | github.com/onsi/gomega v1.18.1 h1:M1GfJqGRrBrrGGsbxzV5dqM2U2ApXefZCQpkukxYRLE= | ||||||
| github.com/op/go-logging v0.0.0-20160315200505-970db520ece7/go.mod h1:HzydrMdWErDVzsI23lYNej1Htcns9BCg93Dk0bBINWk= | github.com/op/go-logging v0.0.0-20160315200505-970db520ece7/go.mod h1:HzydrMdWErDVzsI23lYNej1Htcns9BCg93Dk0bBINWk= | ||||||
| github.com/opencontainers/go-digest v1.0.0 h1:apOUWs51W5PlhuyGyz9FCeeBIOUDA/6nW8Oi/yOhh5U= |  | ||||||
| github.com/opencontainers/go-digest v1.0.0/go.mod h1:0JzlMkj0TRzQZfJkVvzbP0HBR3IKzErnv2BNG4W4MAM= |  | ||||||
| github.com/opencontainers/image-spec v1.1.0-rc2 h1:2zx/Stx4Wc5pIPDvIxHXvXtQFW/7XWJGmnM7r3wg034= |  | ||||||
| github.com/opencontainers/image-spec v1.1.0-rc2/go.mod h1:3OVijpioIKYWTqjiG0zfF6wvoJ4fAXGbjdZuI2NgsRQ= |  | ||||||
| github.com/opentracing-contrib/go-observer v0.0.0-20170622124052-a52f23424492/go.mod h1:Ngi6UdF0k5OKD5t5wlmGhe/EDKPoUM3BXZSSfIuJbis= | github.com/opentracing-contrib/go-observer v0.0.0-20170622124052-a52f23424492/go.mod h1:Ngi6UdF0k5OKD5t5wlmGhe/EDKPoUM3BXZSSfIuJbis= | ||||||
| github.com/opentracing/basictracer-go v1.0.0/go.mod h1:QfBfYuafItcjQuMwinw9GhYKwFXS9KnPs5lxoYwgW74= | github.com/opentracing/basictracer-go v1.0.0/go.mod h1:QfBfYuafItcjQuMwinw9GhYKwFXS9KnPs5lxoYwgW74= | ||||||
| github.com/opentracing/opentracing-go v1.0.2/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o= | github.com/opentracing/opentracing-go v1.0.2/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o= | ||||||
|  |  | ||||||
|  | @ -11,9 +11,8 @@ import ( | ||||||
| 
 | 
 | ||||||
| 	"code.gitea.io/gitea/modules/json" | 	"code.gitea.io/gitea/modules/json" | ||||||
| 	"code.gitea.io/gitea/modules/packages/container/helm" | 	"code.gitea.io/gitea/modules/packages/container/helm" | ||||||
|  | 	"code.gitea.io/gitea/modules/packages/container/oci" | ||||||
| 	"code.gitea.io/gitea/modules/validation" | 	"code.gitea.io/gitea/modules/validation" | ||||||
| 
 |  | ||||||
| 	oci "github.com/opencontainers/image-spec/specs-go/v1" |  | ||||||
| ) | ) | ||||||
| 
 | 
 | ||||||
| const ( | const ( | ||||||
|  | @ -67,8 +66,8 @@ type Metadata struct { | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| // ParseImageConfig parses the metadata of an image config | // ParseImageConfig parses the metadata of an image config | ||||||
| func ParseImageConfig(mt string, r io.Reader) (*Metadata, error) { | func ParseImageConfig(mediaType oci.MediaType, r io.Reader) (*Metadata, error) { | ||||||
| 	if strings.EqualFold(mt, helm.ConfigMediaType) { | 	if strings.EqualFold(string(mediaType), helm.ConfigMediaType) { | ||||||
| 		return parseHelmConfig(r) | 		return parseHelmConfig(r) | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
|  | @ -9,8 +9,8 @@ import ( | ||||||
| 	"testing" | 	"testing" | ||||||
| 
 | 
 | ||||||
| 	"code.gitea.io/gitea/modules/packages/container/helm" | 	"code.gitea.io/gitea/modules/packages/container/helm" | ||||||
|  | 	"code.gitea.io/gitea/modules/packages/container/oci" | ||||||
| 
 | 
 | ||||||
| 	oci "github.com/opencontainers/image-spec/specs-go/v1" |  | ||||||
| 	"github.com/stretchr/testify/assert" | 	"github.com/stretchr/testify/assert" | ||||||
| ) | ) | ||||||
| 
 | 
 | ||||||
|  | @ -24,7 +24,7 @@ func TestParseImageConfig(t *testing.T) { | ||||||
| 
 | 
 | ||||||
| 	configOCI := `{"config": {"labels": {"` + labelAuthors + `": "` + author + `", "` + labelLicenses + `": "` + license + `", "` + labelURL + `": "` + projectURL + `", "` + labelSource + `": "` + repositoryURL + `", "` + labelDocumentation + `": "` + documentationURL + `", "` + labelDescription + `": "` + description + `"}}, "history": [{"created_by": "do it 1"}, {"created_by": "dummy #(nop) do it 2"}]}` | 	configOCI := `{"config": {"labels": {"` + labelAuthors + `": "` + author + `", "` + labelLicenses + `": "` + license + `", "` + labelURL + `": "` + projectURL + `", "` + labelSource + `": "` + repositoryURL + `", "` + labelDocumentation + `": "` + documentationURL + `", "` + labelDescription + `": "` + description + `"}}, "history": [{"created_by": "do it 1"}, {"created_by": "dummy #(nop) do it 2"}]}` | ||||||
| 
 | 
 | ||||||
| 	metadata, err := ParseImageConfig(oci.MediaTypeImageManifest, strings.NewReader(configOCI)) | 	metadata, err := ParseImageConfig(oci.MediaType(oci.MediaTypeImageManifest), strings.NewReader(configOCI)) | ||||||
| 	assert.NoError(t, err) | 	assert.NoError(t, err) | ||||||
| 
 | 
 | ||||||
| 	assert.Equal(t, TypeOCI, metadata.Type) | 	assert.Equal(t, TypeOCI, metadata.Type) | ||||||
|  | @ -51,7 +51,7 @@ func TestParseImageConfig(t *testing.T) { | ||||||
| 
 | 
 | ||||||
| 	configHelm := `{"description":"` + description + `", "home": "` + projectURL + `", "sources": ["` + repositoryURL + `"], "maintainers":[{"name":"` + author + `"}]}` | 	configHelm := `{"description":"` + description + `", "home": "` + projectURL + `", "sources": ["` + repositoryURL + `"], "maintainers":[{"name":"` + author + `"}]}` | ||||||
| 
 | 
 | ||||||
| 	metadata, err = ParseImageConfig(helm.ConfigMediaType, strings.NewReader(configHelm)) | 	metadata, err = ParseImageConfig(oci.MediaType(helm.ConfigMediaType), strings.NewReader(configHelm)) | ||||||
| 	assert.NoError(t, err) | 	assert.NoError(t, err) | ||||||
| 
 | 
 | ||||||
| 	assert.Equal(t, TypeHelm, metadata.Type) | 	assert.Equal(t, TypeHelm, metadata.Type) | ||||||
|  |  | ||||||
							
								
								
									
										27
									
								
								modules/packages/container/oci/digest.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										27
									
								
								modules/packages/container/oci/digest.go
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,27 @@ | ||||||
|  | // Copyright 2022 The Gitea Authors. All rights reserved. | ||||||
|  | // Use of this source code is governed by a MIT-style | ||||||
|  | // license that can be found in the LICENSE file. | ||||||
|  | 
 | ||||||
|  | package oci | ||||||
|  | 
 | ||||||
|  | import ( | ||||||
|  | 	"regexp" | ||||||
|  | 	"strings" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | var digestPattern = regexp.MustCompile(`\Asha256:[a-f0-9]{64}\z`) | ||||||
|  | 
 | ||||||
|  | type Digest string | ||||||
|  | 
 | ||||||
|  | // Validate checks if the digest has a valid SHA256 signature | ||||||
|  | func (d Digest) Validate() bool { | ||||||
|  | 	return digestPattern.MatchString(string(d)) | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | func (d Digest) Hash() string { | ||||||
|  | 	p := strings.SplitN(string(d), ":", 2) | ||||||
|  | 	if len(p) != 2 { | ||||||
|  | 		return "" | ||||||
|  | 	} | ||||||
|  | 	return p[1] | ||||||
|  | } | ||||||
							
								
								
									
										36
									
								
								modules/packages/container/oci/mediatype.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										36
									
								
								modules/packages/container/oci/mediatype.go
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,36 @@ | ||||||
|  | // Copyright 2022 The Gitea Authors. All rights reserved. | ||||||
|  | // Use of this source code is governed by a MIT-style | ||||||
|  | // license that can be found in the LICENSE file. | ||||||
|  | 
 | ||||||
|  | package oci | ||||||
|  | 
 | ||||||
|  | import ( | ||||||
|  | 	"strings" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | const ( | ||||||
|  | 	MediaTypeImageManifest      = "application/vnd.oci.image.manifest.v1+json" | ||||||
|  | 	MediaTypeImageIndex         = "application/vnd.oci.image.index.v1+json" | ||||||
|  | 	MediaTypeDockerManifest     = "application/vnd.docker.distribution.manifest.v2+json" | ||||||
|  | 	MediaTypeDockerManifestList = "application/vnd.docker.distribution.manifest.list.v2+json" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | type MediaType string | ||||||
|  | 
 | ||||||
|  | // IsValid tests if the media type is in the OCI or Docker namespace | ||||||
|  | func (m MediaType) IsValid() bool { | ||||||
|  | 	s := string(m) | ||||||
|  | 	return strings.HasPrefix(s, "application/vnd.docker.") || strings.HasPrefix(s, "application/vnd.oci.") | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | // IsImageManifest tests if the media type is an image manifest | ||||||
|  | func (m MediaType) IsImageManifest() bool { | ||||||
|  | 	s := string(m) | ||||||
|  | 	return strings.EqualFold(s, MediaTypeDockerManifest) || strings.EqualFold(s, MediaTypeImageManifest) | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | // IsImageIndex tests if the media type is an image index | ||||||
|  | func (m MediaType) IsImageIndex() bool { | ||||||
|  | 	s := string(m) | ||||||
|  | 	return strings.EqualFold(s, MediaTypeDockerManifestList) || strings.EqualFold(s, MediaTypeImageIndex) | ||||||
|  | } | ||||||
							
								
								
									
										191
									
								
								modules/packages/container/oci/oci.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										191
									
								
								modules/packages/container/oci/oci.go
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,191 @@ | ||||||
|  | // Copyright 2022 The Gitea Authors. All rights reserved. | ||||||
|  | // Use of this source code is governed by a MIT-style | ||||||
|  | // license that can be found in the LICENSE file. | ||||||
|  | 
 | ||||||
|  | package oci | ||||||
|  | 
 | ||||||
|  | import ( | ||||||
|  | 	"time" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | // https://github.com/opencontainers/image-spec/tree/main/specs-go/v1 | ||||||
|  | 
 | ||||||
|  | // ImageConfig defines the execution parameters which should be used as a base when running a container using an image. | ||||||
|  | type ImageConfig struct { | ||||||
|  | 	// User defines the username or UID which the process in the container should run as. | ||||||
|  | 	User string `json:"User,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// ExposedPorts a set of ports to expose from a container running this image. | ||||||
|  | 	ExposedPorts map[string]struct{} `json:"ExposedPorts,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Env is a list of environment variables to be used in a container. | ||||||
|  | 	Env []string `json:"Env,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Entrypoint defines a list of arguments to use as the command to execute when the container starts. | ||||||
|  | 	Entrypoint []string `json:"Entrypoint,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Cmd defines the default arguments to the entrypoint of the container. | ||||||
|  | 	Cmd []string `json:"Cmd,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Volumes is a set of directories describing where the process is likely write data specific to a container instance. | ||||||
|  | 	Volumes map[string]struct{} `json:"Volumes,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// WorkingDir sets the current working directory of the entrypoint process in the container. | ||||||
|  | 	WorkingDir string `json:"WorkingDir,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Labels contains arbitrary metadata for the container. | ||||||
|  | 	Labels map[string]string `json:"Labels,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// StopSignal contains the system call signal that will be sent to the container to exit. | ||||||
|  | 	StopSignal string `json:"StopSignal,omitempty"` | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | // RootFS describes a layer content addresses | ||||||
|  | type RootFS struct { | ||||||
|  | 	// Type is the type of the rootfs. | ||||||
|  | 	Type string `json:"type"` | ||||||
|  | 
 | ||||||
|  | 	// DiffIDs is an array of layer content hashes, in order from bottom-most to top-most. | ||||||
|  | 	DiffIDs []string `json:"diff_ids"` | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | // History describes the history of a layer. | ||||||
|  | type History struct { | ||||||
|  | 	// Created is the combined date and time at which the layer was created, formatted as defined by RFC 3339, section 5.6. | ||||||
|  | 	Created *time.Time `json:"created,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// CreatedBy is the command which created the layer. | ||||||
|  | 	CreatedBy string `json:"created_by,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Author is the author of the build point. | ||||||
|  | 	Author string `json:"author,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Comment is a custom message set when creating the layer. | ||||||
|  | 	Comment string `json:"comment,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// EmptyLayer is used to mark if the history item created a filesystem diff. | ||||||
|  | 	EmptyLayer bool `json:"empty_layer,omitempty"` | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | // Image is the JSON structure which describes some basic information about the image. | ||||||
|  | // This provides the `application/vnd.oci.image.config.v1+json` mediatype when marshalled to JSON. | ||||||
|  | type Image struct { | ||||||
|  | 	// Created is the combined date and time at which the image was created, formatted as defined by RFC 3339, section 5.6. | ||||||
|  | 	Created *time.Time `json:"created,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Author defines the name and/or email address of the person or entity which created and is responsible for maintaining the image. | ||||||
|  | 	Author string `json:"author,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Architecture is the CPU architecture which the binaries in this image are built to run on. | ||||||
|  | 	Architecture string `json:"architecture"` | ||||||
|  | 
 | ||||||
|  | 	// Variant is the variant of the specified CPU architecture which image binaries are intended to run on. | ||||||
|  | 	Variant string `json:"variant,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// OS is the name of the operating system which the image is built to run on. | ||||||
|  | 	OS string `json:"os"` | ||||||
|  | 
 | ||||||
|  | 	// OSVersion is an optional field specifying the operating system | ||||||
|  | 	// version, for example on Windows `10.0.14393.1066`. | ||||||
|  | 	OSVersion string `json:"os.version,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// OSFeatures is an optional field specifying an array of strings, | ||||||
|  | 	// each listing a required OS feature (for example on Windows `win32k`). | ||||||
|  | 	OSFeatures []string `json:"os.features,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Config defines the execution parameters which should be used as a base when running a container using the image. | ||||||
|  | 	Config ImageConfig `json:"config,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// RootFS references the layer content addresses used by the image. | ||||||
|  | 	RootFS RootFS `json:"rootfs"` | ||||||
|  | 
 | ||||||
|  | 	// History describes the history of each layer. | ||||||
|  | 	History []History `json:"history,omitempty"` | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | // Descriptor describes the disposition of targeted content. | ||||||
|  | // This structure provides `application/vnd.oci.descriptor.v1+json` mediatype | ||||||
|  | // when marshalled to JSON. | ||||||
|  | type Descriptor struct { | ||||||
|  | 	// MediaType is the media type of the object this schema refers to. | ||||||
|  | 	MediaType MediaType `json:"mediaType,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Digest is the digest of the targeted content. | ||||||
|  | 	Digest Digest `json:"digest"` | ||||||
|  | 
 | ||||||
|  | 	// Size specifies the size in bytes of the blob. | ||||||
|  | 	Size int64 `json:"size"` | ||||||
|  | 
 | ||||||
|  | 	// URLs specifies a list of URLs from which this object MAY be downloaded | ||||||
|  | 	URLs []string `json:"urls,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Annotations contains arbitrary metadata relating to the targeted content. | ||||||
|  | 	Annotations map[string]string `json:"annotations,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Data is an embedding of the targeted content. This is encoded as a base64 | ||||||
|  | 	// string when marshalled to JSON (automatically, by encoding/json). If | ||||||
|  | 	// present, Data can be used directly to avoid fetching the targeted content. | ||||||
|  | 	Data []byte `json:"data,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Platform describes the platform which the image in the manifest runs on. | ||||||
|  | 	// | ||||||
|  | 	// This should only be used when referring to a manifest. | ||||||
|  | 	Platform *Platform `json:"platform,omitempty"` | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | // Platform describes the platform which the image in the manifest runs on. | ||||||
|  | type Platform struct { | ||||||
|  | 	// Architecture field specifies the CPU architecture, for example | ||||||
|  | 	// `amd64` or `ppc64`. | ||||||
|  | 	Architecture string `json:"architecture"` | ||||||
|  | 
 | ||||||
|  | 	// OS specifies the operating system, for example `linux` or `windows`. | ||||||
|  | 	OS string `json:"os"` | ||||||
|  | 
 | ||||||
|  | 	// OSVersion is an optional field specifying the operating system | ||||||
|  | 	// version, for example on Windows `10.0.14393.1066`. | ||||||
|  | 	OSVersion string `json:"os.version,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// OSFeatures is an optional field specifying an array of strings, | ||||||
|  | 	// each listing a required OS feature (for example on Windows `win32k`). | ||||||
|  | 	OSFeatures []string `json:"os.features,omitempty"` | ||||||
|  | 
 | ||||||
|  | 	// Variant is an optional field specifying a variant of the CPU, for | ||||||
|  | 	// example `v7` to specify ARMv7 when architecture is `arm`. | ||||||
|  | 	Variant string `json:"variant,omitempty"` | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | type SchemaMediaBase struct { | ||||||
|  | 	// SchemaVersion is the image manifest schema that this image follows | ||||||
|  | 	SchemaVersion int `json:"schemaVersion"` | ||||||
|  | 
 | ||||||
|  | 	// MediaType specifies the type of this document data structure e.g. `application/vnd.oci.image.manifest.v1+json` | ||||||
|  | 	MediaType MediaType `json:"mediaType,omitempty"` | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | // Manifest provides `application/vnd.oci.image.manifest.v1+json` mediatype structure when marshalled to JSON. | ||||||
|  | type Manifest struct { | ||||||
|  | 	SchemaMediaBase | ||||||
|  | 
 | ||||||
|  | 	// Config references a configuration object for a container, by digest. | ||||||
|  | 	// The referenced configuration object is a JSON blob that the runtime uses to set up the container. | ||||||
|  | 	Config Descriptor `json:"config"` | ||||||
|  | 
 | ||||||
|  | 	// Layers is an indexed list of layers referenced by the manifest. | ||||||
|  | 	Layers []Descriptor `json:"layers"` | ||||||
|  | 
 | ||||||
|  | 	// Annotations contains arbitrary metadata for the image manifest. | ||||||
|  | 	Annotations map[string]string `json:"annotations,omitempty"` | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | // Index references manifests for various platforms. | ||||||
|  | // This structure provides `application/vnd.oci.image.index.v1+json` mediatype when marshalled to JSON. | ||||||
|  | type Index struct { | ||||||
|  | 	SchemaMediaBase | ||||||
|  | 
 | ||||||
|  | 	// Manifests references platform specific manifests. | ||||||
|  | 	Manifests []Descriptor `json:"manifests"` | ||||||
|  | 
 | ||||||
|  | 	// Annotations contains arbitrary metadata for the image index. | ||||||
|  | 	Annotations map[string]string `json:"annotations,omitempty"` | ||||||
|  | } | ||||||
							
								
								
									
										17
									
								
								modules/packages/container/oci/reference.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										17
									
								
								modules/packages/container/oci/reference.go
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,17 @@ | ||||||
|  | // Copyright 2022 The Gitea Authors. All rights reserved. | ||||||
|  | // Use of this source code is governed by a MIT-style | ||||||
|  | // license that can be found in the LICENSE file. | ||||||
|  | 
 | ||||||
|  | package oci | ||||||
|  | 
 | ||||||
|  | import ( | ||||||
|  | 	"regexp" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | var referencePattern = regexp.MustCompile(`\A[a-zA-Z0-9_][a-zA-Z0-9._-]{0,127}\z`) | ||||||
|  | 
 | ||||||
|  | type Reference string | ||||||
|  | 
 | ||||||
|  | func (r Reference) Validate() bool { | ||||||
|  | 	return referencePattern.MatchString(string(r)) | ||||||
|  | } | ||||||
|  | @ -23,23 +23,19 @@ import ( | ||||||
| 	"code.gitea.io/gitea/modules/log" | 	"code.gitea.io/gitea/modules/log" | ||||||
| 	packages_module "code.gitea.io/gitea/modules/packages" | 	packages_module "code.gitea.io/gitea/modules/packages" | ||||||
| 	container_module "code.gitea.io/gitea/modules/packages/container" | 	container_module "code.gitea.io/gitea/modules/packages/container" | ||||||
|  | 	"code.gitea.io/gitea/modules/packages/container/oci" | ||||||
| 	"code.gitea.io/gitea/modules/setting" | 	"code.gitea.io/gitea/modules/setting" | ||||||
| 	"code.gitea.io/gitea/modules/util" | 	"code.gitea.io/gitea/modules/util" | ||||||
| 	"code.gitea.io/gitea/routers/api/packages/helper" | 	"code.gitea.io/gitea/routers/api/packages/helper" | ||||||
| 	packages_service "code.gitea.io/gitea/services/packages" | 	packages_service "code.gitea.io/gitea/services/packages" | ||||||
| 	container_service "code.gitea.io/gitea/services/packages/container" | 	container_service "code.gitea.io/gitea/services/packages/container" | ||||||
| 
 |  | ||||||
| 	digest "github.com/opencontainers/go-digest" |  | ||||||
| ) | ) | ||||||
| 
 | 
 | ||||||
| // maximum size of a container manifest | // maximum size of a container manifest | ||||||
| // https://github.com/opencontainers/distribution-spec/blob/main/spec.md#pushing-manifests | // https://github.com/opencontainers/distribution-spec/blob/main/spec.md#pushing-manifests | ||||||
| const maxManifestSize = 10 * 1024 * 1024 | const maxManifestSize = 10 * 1024 * 1024 | ||||||
| 
 | 
 | ||||||
| var ( | var imageNamePattern = regexp.MustCompile(`\A[a-z0-9]+([._-][a-z0-9]+)*(/[a-z0-9]+([._-][a-z0-9]+)*)*\z`) | ||||||
| 	imageNamePattern = regexp.MustCompile(`\A[a-z0-9]+([._-][a-z0-9]+)*(/[a-z0-9]+([._-][a-z0-9]+)*)*\z`) |  | ||||||
| 	referencePattern = regexp.MustCompile(`\A[a-zA-Z0-9_][a-zA-Z0-9._-]{0,127}\z`) |  | ||||||
| ) |  | ||||||
| 
 | 
 | ||||||
| type containerHeaders struct { | type containerHeaders struct { | ||||||
| 	Status        int | 	Status        int | ||||||
|  | @ -411,16 +407,16 @@ func CancelUploadBlob(ctx *context.Context) { | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| func getBlobFromContext(ctx *context.Context) (*packages_model.PackageFileDescriptor, error) { | func getBlobFromContext(ctx *context.Context) (*packages_model.PackageFileDescriptor, error) { | ||||||
| 	d := ctx.Params("digest") | 	digest := ctx.Params("digest") | ||||||
| 
 | 
 | ||||||
| 	if digest.Digest(d).Validate() != nil { | 	if !oci.Digest(digest).Validate() { | ||||||
| 		return nil, container_model.ErrContainerBlobNotExist | 		return nil, container_model.ErrContainerBlobNotExist | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	return workaroundGetContainerBlob(ctx, &container_model.BlobSearchOptions{ | 	return workaroundGetContainerBlob(ctx, &container_model.BlobSearchOptions{ | ||||||
| 		OwnerID: ctx.Package.Owner.ID, | 		OwnerID: ctx.Package.Owner.ID, | ||||||
| 		Image:   ctx.Params("image"), | 		Image:   ctx.Params("image"), | ||||||
| 		Digest:  d, | 		Digest:  digest, | ||||||
| 	}) | 	}) | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
|  | @ -475,14 +471,14 @@ func GetBlob(ctx *context.Context) { | ||||||
| 
 | 
 | ||||||
| // https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-blobs | // https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-blobs | ||||||
| func DeleteBlob(ctx *context.Context) { | func DeleteBlob(ctx *context.Context) { | ||||||
| 	d := ctx.Params("digest") | 	digest := ctx.Params("digest") | ||||||
| 
 | 
 | ||||||
| 	if digest.Digest(d).Validate() != nil { | 	if !oci.Digest(digest).Validate() { | ||||||
| 		apiErrorDefined(ctx, errBlobUnknown) | 		apiErrorDefined(ctx, errBlobUnknown) | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	if err := deleteBlob(ctx.Package.Owner.ID, ctx.Params("image"), d); err != nil { | 	if err := deleteBlob(ctx.Package.Owner.ID, ctx.Params("image"), digest); err != nil { | ||||||
| 		apiError(ctx, http.StatusInternalServerError, err) | 		apiError(ctx, http.StatusInternalServerError, err) | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  | @ -497,15 +493,15 @@ func UploadManifest(ctx *context.Context) { | ||||||
| 	reference := ctx.Params("reference") | 	reference := ctx.Params("reference") | ||||||
| 
 | 
 | ||||||
| 	mci := &manifestCreationInfo{ | 	mci := &manifestCreationInfo{ | ||||||
| 		MediaType: ctx.Req.Header.Get("Content-Type"), | 		MediaType: oci.MediaType(ctx.Req.Header.Get("Content-Type")), | ||||||
| 		Owner:     ctx.Package.Owner, | 		Owner:     ctx.Package.Owner, | ||||||
| 		Creator:   ctx.Doer, | 		Creator:   ctx.Doer, | ||||||
| 		Image:     ctx.Params("image"), | 		Image:     ctx.Params("image"), | ||||||
| 		Reference: reference, | 		Reference: reference, | ||||||
| 		IsTagged:  digest.Digest(reference).Validate() != nil, | 		IsTagged:  !oci.Digest(reference).Validate(), | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	if mci.IsTagged && !referencePattern.MatchString(reference) { | 	if mci.IsTagged && !oci.Reference(reference).Validate() { | ||||||
| 		apiErrorDefined(ctx, errManifestInvalid.WithMessage("Tag is invalid")) | 		apiErrorDefined(ctx, errManifestInvalid.WithMessage("Tag is invalid")) | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  | @ -543,7 +539,7 @@ func UploadManifest(ctx *context.Context) { | ||||||
| 	}) | 	}) | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| func getBlobSearchOptionsFromContext(ctx *context.Context) (*container_model.BlobSearchOptions, error) { | func getManifestFromContext(ctx *context.Context) (*packages_model.PackageFileDescriptor, error) { | ||||||
| 	reference := ctx.Params("reference") | 	reference := ctx.Params("reference") | ||||||
| 
 | 
 | ||||||
| 	opts := &container_model.BlobSearchOptions{ | 	opts := &container_model.BlobSearchOptions{ | ||||||
|  | @ -551,24 +547,14 @@ func getBlobSearchOptionsFromContext(ctx *context.Context) (*container_model.Blo | ||||||
| 		Image:      ctx.Params("image"), | 		Image:      ctx.Params("image"), | ||||||
| 		IsManifest: true, | 		IsManifest: true, | ||||||
| 	} | 	} | ||||||
| 
 | 	if oci.Digest(reference).Validate() { | ||||||
| 	if digest.Digest(reference).Validate() == nil { |  | ||||||
| 		opts.Digest = reference | 		opts.Digest = reference | ||||||
| 	} else if referencePattern.MatchString(reference) { | 	} else if oci.Reference(reference).Validate() { | ||||||
| 		opts.Tag = reference | 		opts.Tag = reference | ||||||
| 	} else { | 	} else { | ||||||
| 		return nil, container_model.ErrContainerBlobNotExist | 		return nil, container_model.ErrContainerBlobNotExist | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	return opts, nil |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func getManifestFromContext(ctx *context.Context) (*packages_model.PackageFileDescriptor, error) { |  | ||||||
| 	opts, err := getBlobSearchOptionsFromContext(ctx) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, err |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	return workaroundGetContainerBlob(ctx, opts) | 	return workaroundGetContainerBlob(ctx, opts) | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
|  | @ -625,8 +611,18 @@ func GetManifest(ctx *context.Context) { | ||||||
| // https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-tags | // https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-tags | ||||||
| // https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-manifests | // https://github.com/opencontainers/distribution-spec/blob/main/spec.md#deleting-manifests | ||||||
| func DeleteManifest(ctx *context.Context) { | func DeleteManifest(ctx *context.Context) { | ||||||
| 	opts, err := getBlobSearchOptionsFromContext(ctx) | 	reference := ctx.Params("reference") | ||||||
| 	if err != nil { | 
 | ||||||
|  | 	opts := &container_model.BlobSearchOptions{ | ||||||
|  | 		OwnerID:    ctx.Package.Owner.ID, | ||||||
|  | 		Image:      ctx.Params("image"), | ||||||
|  | 		IsManifest: true, | ||||||
|  | 	} | ||||||
|  | 	if oci.Digest(reference).Validate() { | ||||||
|  | 		opts.Digest = reference | ||||||
|  | 	} else if oci.Reference(reference).Validate() { | ||||||
|  | 		opts.Tag = reference | ||||||
|  | 	} else { | ||||||
| 		apiErrorDefined(ctx, errManifestUnknown) | 		apiErrorDefined(ctx, errManifestUnknown) | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|  | @ -20,28 +20,14 @@ import ( | ||||||
| 	"code.gitea.io/gitea/modules/log" | 	"code.gitea.io/gitea/modules/log" | ||||||
| 	packages_module "code.gitea.io/gitea/modules/packages" | 	packages_module "code.gitea.io/gitea/modules/packages" | ||||||
| 	container_module "code.gitea.io/gitea/modules/packages/container" | 	container_module "code.gitea.io/gitea/modules/packages/container" | ||||||
|  | 	"code.gitea.io/gitea/modules/packages/container/oci" | ||||||
| 	"code.gitea.io/gitea/modules/util" | 	"code.gitea.io/gitea/modules/util" | ||||||
| 	packages_service "code.gitea.io/gitea/services/packages" | 	packages_service "code.gitea.io/gitea/services/packages" | ||||||
| 
 |  | ||||||
| 	digest "github.com/opencontainers/go-digest" |  | ||||||
| 	oci "github.com/opencontainers/image-spec/specs-go/v1" |  | ||||||
| ) | ) | ||||||
| 
 | 
 | ||||||
| func isValidMediaType(mt string) bool { |  | ||||||
| 	return strings.HasPrefix(mt, "application/vnd.docker.") || strings.HasPrefix(mt, "application/vnd.oci.") |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func isImageManifestMediaType(mt string) bool { |  | ||||||
| 	return strings.EqualFold(mt, oci.MediaTypeImageManifest) || strings.EqualFold(mt, "application/vnd.docker.distribution.manifest.v2+json") |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func isImageIndexMediaType(mt string) bool { |  | ||||||
| 	return strings.EqualFold(mt, oci.MediaTypeImageIndex) || strings.EqualFold(mt, "application/vnd.docker.distribution.manifest.list.v2+json") |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| // manifestCreationInfo describes a manifest to create | // manifestCreationInfo describes a manifest to create | ||||||
| type manifestCreationInfo struct { | type manifestCreationInfo struct { | ||||||
| 	MediaType  string | 	MediaType  oci.MediaType | ||||||
| 	Owner      *user_model.User | 	Owner      *user_model.User | ||||||
| 	Creator    *user_model.User | 	Creator    *user_model.User | ||||||
| 	Image      string | 	Image      string | ||||||
|  | @ -51,12 +37,12 @@ type manifestCreationInfo struct { | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| func processManifest(mci *manifestCreationInfo, buf *packages_module.HashedBuffer) (string, error) { | func processManifest(mci *manifestCreationInfo, buf *packages_module.HashedBuffer) (string, error) { | ||||||
| 	var index oci.Index | 	var schema oci.SchemaMediaBase | ||||||
| 	if err := json.NewDecoder(buf).Decode(&index); err != nil { | 	if err := json.NewDecoder(buf).Decode(&schema); err != nil { | ||||||
| 		return "", err | 		return "", err | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	if index.SchemaVersion != 2 { | 	if schema.SchemaVersion != 2 { | ||||||
| 		return "", errUnsupported.WithMessage("Schema version is not supported") | 		return "", errUnsupported.WithMessage("Schema version is not supported") | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
|  | @ -64,17 +50,17 @@ func processManifest(mci *manifestCreationInfo, buf *packages_module.HashedBuffe | ||||||
| 		return "", err | 		return "", err | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	if !isValidMediaType(mci.MediaType) { | 	if !mci.MediaType.IsValid() { | ||||||
| 		mci.MediaType = index.MediaType | 		mci.MediaType = schema.MediaType | ||||||
| 		if !isValidMediaType(mci.MediaType) { | 		if !mci.MediaType.IsValid() { | ||||||
| 			return "", errManifestInvalid.WithMessage("MediaType not recognized") | 			return "", errManifestInvalid.WithMessage("MediaType not recognized") | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	if isImageManifestMediaType(mci.MediaType) { | 	if mci.MediaType.IsImageManifest() { | ||||||
| 		d, err := processImageManifest(mci, buf) | 		d, err := processImageManifest(mci, buf) | ||||||
| 		return d, err | 		return d, err | ||||||
| 	} else if isImageIndexMediaType(mci.MediaType) { | 	} else if mci.MediaType.IsImageIndex() { | ||||||
| 		d, err := processImageManifestIndex(mci, buf) | 		d, err := processImageManifestIndex(mci, buf) | ||||||
| 		return d, err | 		return d, err | ||||||
| 	} | 	} | ||||||
|  | @ -219,7 +205,7 @@ func processImageManifestIndex(mci *manifestCreationInfo, buf *packages_module.H | ||||||
| 		} | 		} | ||||||
| 
 | 
 | ||||||
| 		for _, manifest := range index.Manifests { | 		for _, manifest := range index.Manifests { | ||||||
| 			if !isImageManifestMediaType(manifest.MediaType) { | 			if !manifest.MediaType.IsImageManifest() { | ||||||
| 				return errManifestInvalid | 				return errManifestInvalid | ||||||
| 			} | 			} | ||||||
| 
 | 
 | ||||||
|  | @ -359,8 +345,8 @@ func createPackageAndVersion(ctx context.Context, mci *manifestCreationInfo, met | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| type blobReference struct { | type blobReference struct { | ||||||
| 	Digest       digest.Digest | 	Digest       oci.Digest | ||||||
| 	MediaType    string | 	MediaType    oci.MediaType | ||||||
| 	Name         string | 	Name         string | ||||||
| 	File         *packages_model.PackageFileDescriptor | 	File         *packages_model.PackageFileDescriptor | ||||||
| 	ExpectedSize int64 | 	ExpectedSize int64 | ||||||
|  | @ -394,7 +380,7 @@ func createFileFromBlobReference(ctx context.Context, pv, uploadVersion *package | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	props := map[string]string{ | 	props := map[string]string{ | ||||||
| 		container_module.PropertyMediaType: ref.MediaType, | 		container_module.PropertyMediaType: string(ref.MediaType), | ||||||
| 		container_module.PropertyDigest:    string(ref.Digest), | 		container_module.PropertyDigest:    string(ref.Digest), | ||||||
| 	} | 	} | ||||||
| 	for name, value := range props { | 	for name, value := range props { | ||||||
|  | @ -439,7 +425,7 @@ func createManifestBlob(ctx context.Context, mci *manifestCreationInfo, pv *pack | ||||||
| 
 | 
 | ||||||
| 	manifestDigest := digestFromHashSummer(buf) | 	manifestDigest := digestFromHashSummer(buf) | ||||||
| 	err = createFileFromBlobReference(ctx, pv, nil, &blobReference{ | 	err = createFileFromBlobReference(ctx, pv, nil, &blobReference{ | ||||||
| 		Digest:       digest.Digest(manifestDigest), | 		Digest:       oci.Digest(manifestDigest), | ||||||
| 		MediaType:    mci.MediaType, | 		MediaType:    mci.MediaType, | ||||||
| 		Name:         container_model.ManifestFilename, | 		Name:         container_model.ManifestFilename, | ||||||
| 		File:         &packages_model.PackageFileDescriptor{Blob: pb}, | 		File:         &packages_model.PackageFileDescriptor{Blob: pb}, | ||||||
|  |  | ||||||
|  | @ -20,11 +20,11 @@ import ( | ||||||
| 	"code.gitea.io/gitea/models/unittest" | 	"code.gitea.io/gitea/models/unittest" | ||||||
| 	user_model "code.gitea.io/gitea/models/user" | 	user_model "code.gitea.io/gitea/models/user" | ||||||
| 	container_module "code.gitea.io/gitea/modules/packages/container" | 	container_module "code.gitea.io/gitea/modules/packages/container" | ||||||
|  | 	"code.gitea.io/gitea/modules/packages/container/oci" | ||||||
| 	"code.gitea.io/gitea/modules/setting" | 	"code.gitea.io/gitea/modules/setting" | ||||||
| 	api "code.gitea.io/gitea/modules/structs" | 	api "code.gitea.io/gitea/modules/structs" | ||||||
| 	"code.gitea.io/gitea/tests" | 	"code.gitea.io/gitea/tests" | ||||||
| 
 | 
 | ||||||
| 	oci "github.com/opencontainers/image-spec/specs-go/v1" |  | ||||||
| 	"github.com/stretchr/testify/assert" | 	"github.com/stretchr/testify/assert" | ||||||
| ) | ) | ||||||
| 
 | 
 | ||||||
|  | @ -64,13 +64,13 @@ func TestPackageContainer(t *testing.T) { | ||||||
| 	configContent := `{"architecture":"amd64","config":{"Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/true"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"container":"b89fe92a887d55c0961f02bdfbfd8ac3ddf66167db374770d2d9e9fab3311510","container_config":{"Hostname":"b89fe92a887d","Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/bin/sh","-c","#(nop) ","CMD [\"/true\"]"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"created":"2022-01-01T00:00:00.000000000Z","docker_version":"20.10.12","history":[{"created":"2022-01-01T00:00:00.000000000Z","created_by":"/bin/sh -c #(nop) COPY file:0e7589b0c800daaf6fa460d2677101e4676dd9491980210cb345480e513f3602 in /true "},{"created":"2022-01-01T00:00:00.000000001Z","created_by":"/bin/sh -c #(nop)  CMD [\"/true\"]","empty_layer":true}],"os":"linux","rootfs":{"type":"layers","diff_ids":["sha256:0ff3b91bdf21ecdf2f2f3d4372c2098a14dbe06cd678e8f0a85fd4902d00e2e2"]}}` | 	configContent := `{"architecture":"amd64","config":{"Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/true"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"container":"b89fe92a887d55c0961f02bdfbfd8ac3ddf66167db374770d2d9e9fab3311510","container_config":{"Hostname":"b89fe92a887d","Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/bin/sh","-c","#(nop) ","CMD [\"/true\"]"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"created":"2022-01-01T00:00:00.000000000Z","docker_version":"20.10.12","history":[{"created":"2022-01-01T00:00:00.000000000Z","created_by":"/bin/sh -c #(nop) COPY file:0e7589b0c800daaf6fa460d2677101e4676dd9491980210cb345480e513f3602 in /true "},{"created":"2022-01-01T00:00:00.000000001Z","created_by":"/bin/sh -c #(nop)  CMD [\"/true\"]","empty_layer":true}],"os":"linux","rootfs":{"type":"layers","diff_ids":["sha256:0ff3b91bdf21ecdf2f2f3d4372c2098a14dbe06cd678e8f0a85fd4902d00e2e2"]}}` | ||||||
| 
 | 
 | ||||||
| 	manifestDigest := "sha256:4f10484d1c1bb13e3956b4de1cd42db8e0f14a75be1617b60f2de3cd59c803c6" | 	manifestDigest := "sha256:4f10484d1c1bb13e3956b4de1cd42db8e0f14a75be1617b60f2de3cd59c803c6" | ||||||
| 	manifestContent := `{"schemaVersion":2,"mediaType":"application/vnd.docker.distribution.manifest.v2+json","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}` | 	manifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeDockerManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}` | ||||||
| 
 | 
 | ||||||
| 	untaggedManifestDigest := "sha256:4305f5f5572b9a426b88909b036e52ee3cf3d7b9c1b01fac840e90747f56623d" | 	untaggedManifestDigest := "sha256:4305f5f5572b9a426b88909b036e52ee3cf3d7b9c1b01fac840e90747f56623d" | ||||||
| 	untaggedManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}` | 	untaggedManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}` | ||||||
| 
 | 
 | ||||||
| 	indexManifestDigest := "sha256:bab112d6efb9e7f221995caaaa880352feb5bd8b1faf52fae8d12c113aa123ec" | 	indexManifestDigest := "sha256:bab112d6efb9e7f221995caaaa880352feb5bd8b1faf52fae8d12c113aa123ec" | ||||||
| 	indexManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageIndex + `","manifests":[{"mediaType":"application/vnd.docker.distribution.manifest.v2+json","digest":"` + manifestDigest + `","platform":{"os":"linux","architecture":"arm","variant":"v7"}},{"mediaType":"` + oci.MediaTypeImageManifest + `","digest":"` + untaggedManifestDigest + `","platform":{"os":"linux","architecture":"arm64","variant":"v8"}}]}` | 	indexManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageIndex + `","manifests":[{"mediaType":"` + oci.MediaTypeDockerManifest + `","digest":"` + manifestDigest + `","platform":{"os":"linux","architecture":"arm","variant":"v7"}},{"mediaType":"` + oci.MediaTypeImageManifest + `","digest":"` + untaggedManifestDigest + `","platform":{"os":"linux","architecture":"arm64","variant":"v8"}}]}` | ||||||
| 
 | 
 | ||||||
| 	anonymousToken := "" | 	anonymousToken := "" | ||||||
| 	userToken := "" | 	userToken := "" | ||||||
|  | @ -294,12 +294,12 @@ func TestPackageContainer(t *testing.T) { | ||||||
| 
 | 
 | ||||||
| 						req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent)) | 						req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent)) | ||||||
| 						addTokenAuthHeader(req, anonymousToken) | 						addTokenAuthHeader(req, anonymousToken) | ||||||
| 						req.Header.Set("Content-Type", "application/vnd.docker.distribution.manifest.v2+json") | 						req.Header.Set("Content-Type", oci.MediaTypeDockerManifest) | ||||||
| 						MakeRequest(t, req, http.StatusUnauthorized) | 						MakeRequest(t, req, http.StatusUnauthorized) | ||||||
| 
 | 
 | ||||||
| 						req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent)) | 						req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent)) | ||||||
| 						addTokenAuthHeader(req, userToken) | 						addTokenAuthHeader(req, userToken) | ||||||
| 						req.Header.Set("Content-Type", "application/vnd.docker.distribution.manifest.v2+json") | 						req.Header.Set("Content-Type", oci.MediaTypeDockerManifest) | ||||||
| 						resp := MakeRequest(t, req, http.StatusCreated) | 						resp := MakeRequest(t, req, http.StatusCreated) | ||||||
| 
 | 
 | ||||||
| 						assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest")) | 						assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest")) | ||||||
|  | @ -326,7 +326,7 @@ func TestPackageContainer(t *testing.T) { | ||||||
| 							switch pfd.File.Name { | 							switch pfd.File.Name { | ||||||
| 							case container_model.ManifestFilename: | 							case container_model.ManifestFilename: | ||||||
| 								assert.True(t, pfd.File.IsLead) | 								assert.True(t, pfd.File.IsLead) | ||||||
| 								assert.Equal(t, "application/vnd.docker.distribution.manifest.v2+json", pfd.Properties.GetByName(container_module.PropertyMediaType)) | 								assert.Equal(t, oci.MediaTypeDockerManifest, pfd.Properties.GetByName(container_module.PropertyMediaType)) | ||||||
| 								assert.Equal(t, manifestDigest, pfd.Properties.GetByName(container_module.PropertyDigest)) | 								assert.Equal(t, manifestDigest, pfd.Properties.GetByName(container_module.PropertyDigest)) | ||||||
| 							case strings.Replace(configDigest, ":", "_", 1): | 							case strings.Replace(configDigest, ":", "_", 1): | ||||||
| 								assert.False(t, pfd.File.IsLead) | 								assert.False(t, pfd.File.IsLead) | ||||||
|  | @ -352,7 +352,7 @@ func TestPackageContainer(t *testing.T) { | ||||||
| 						// Overwrite existing tag should keep the download count | 						// Overwrite existing tag should keep the download count | ||||||
| 						req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent)) | 						req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent)) | ||||||
| 						addTokenAuthHeader(req, userToken) | 						addTokenAuthHeader(req, userToken) | ||||||
| 						req.Header.Set("Content-Type", oci.MediaTypeImageManifest) | 						req.Header.Set("Content-Type", oci.MediaTypeDockerManifest) | ||||||
| 						MakeRequest(t, req, http.StatusCreated) | 						MakeRequest(t, req, http.StatusCreated) | ||||||
| 
 | 
 | ||||||
| 						pv, err = packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, tag) | 						pv, err = packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, tag) | ||||||
|  | @ -387,7 +387,7 @@ func TestPackageContainer(t *testing.T) { | ||||||
| 						resp := MakeRequest(t, req, http.StatusOK) | 						resp := MakeRequest(t, req, http.StatusOK) | ||||||
| 
 | 
 | ||||||
| 						assert.Equal(t, fmt.Sprintf("%d", len(manifestContent)), resp.Header().Get("Content-Length")) | 						assert.Equal(t, fmt.Sprintf("%d", len(manifestContent)), resp.Header().Get("Content-Length")) | ||||||
| 						assert.Equal(t, oci.MediaTypeImageManifest, resp.Header().Get("Content-Type")) | 						assert.Equal(t, oci.MediaTypeDockerManifest, resp.Header().Get("Content-Type")) | ||||||
| 						assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest")) | 						assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest")) | ||||||
| 						assert.Equal(t, manifestContent, resp.Body.String()) | 						assert.Equal(t, manifestContent, resp.Body.String()) | ||||||
| 					}) | 					}) | ||||||
|  |  | ||||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue