Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat!: implement artifact manifest handler in the storage package #30

Merged
merged 6 commits into from
Nov 3, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 8 additions & 0 deletions registry/storage/manifeststore.go
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ import (
dcontext "github.com/distribution/distribution/v3/context"
"github.com/distribution/distribution/v3/manifest"
"github.com/distribution/distribution/v3/manifest/manifestlist"
"github.com/distribution/distribution/v3/manifest/ociartifact"
"github.com/distribution/distribution/v3/manifest/ocischema"
"github.com/distribution/distribution/v3/manifest/schema1"
"github.com/distribution/distribution/v3/manifest/schema2"
Expand Down Expand Up @@ -51,6 +52,7 @@ type manifestStore struct {
schema1Handler ManifestHandler
schema2Handler ManifestHandler
ocischemaHandler ManifestHandler
ociartifactHandler ManifestHandler
manifestListHandler ManifestHandler
}

Expand Down Expand Up @@ -94,6 +96,10 @@ func (ms *manifestStore) Get(ctx context.Context, dgst digest.Digest, options ..
return nil, err
}

if versioned.MediaType == v1.MediaTypeArtifactManifest {
return ms.ociartifactHandler.Unmarshal(ctx, dgst, content)
}

switch versioned.SchemaVersion {
case 1:
return ms.schema1Handler.Unmarshal(ctx, dgst, content)
Expand Down Expand Up @@ -136,6 +142,8 @@ func (ms *manifestStore) Put(ctx context.Context, manifest distribution.Manifest
return ms.schema2Handler.Put(ctx, manifest, ms.skipDependencyVerification)
case *ocischema.DeserializedManifest:
return ms.ocischemaHandler.Put(ctx, manifest, ms.skipDependencyVerification)
case *ociartifact.DeserializedManifest:
return ms.ociartifactHandler.Put(ctx, manifest, ms.skipDependencyVerification)
case *manifestlist.DeserializedManifestList:
return ms.manifestListHandler.Put(ctx, manifest, ms.skipDependencyVerification)
}
Expand Down
81 changes: 81 additions & 0 deletions registry/storage/manifeststore_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,13 +3,15 @@ package storage
import (
"bytes"
"context"
"encoding/json"
"io"
"reflect"
"testing"

"github.com/distribution/distribution/v3"
"github.com/distribution/distribution/v3/manifest"
"github.com/distribution/distribution/v3/manifest/manifestlist"
"github.com/distribution/distribution/v3/manifest/ociartifact"
"github.com/distribution/distribution/v3/manifest/ocischema"
"github.com/distribution/distribution/v3/manifest/schema1"
"github.com/distribution/distribution/v3/reference"
Expand Down Expand Up @@ -543,6 +545,85 @@ func testOCIManifestStorage(t *testing.T, testname string, includeMediaTypes boo

}

func TestOCIArtifactManifestStorage(t *testing.T) {
repoName, _ := reference.WithName("foo/woo/loo/koo")
env := newManifestStoreTestEnv(t, repoName, "ociartifact",
BlobDescriptorCacheProvider(memory.NewInMemoryBlobDescriptorCacheProvider(memory.UnlimitedSize)),
EnableDelete, EnableRedirect)

ctx := context.Background()
ms, err := env.repository.Manifests(ctx)
if err != nil {
t.Fatal(err)
}

bs := env.repository.Blobs(ctx)

// create and push the blob and subject manifests into the storage first
blob, _ := json.Marshal(ociartifact.Manifest{
MediaType: v1.MediaTypeArtifactManifest,
ArtifactType: "test/blob",
})
blobDesc, err := bs.Put(ctx, v1.MediaTypeArtifactManifest, blob) // push blob manifest into the storage
if err != nil {
t.Fatal(err)
}

subjectAM := ociartifact.Manifest{
MediaType: v1.MediaTypeArtifactManifest,
ArtifactType: "test/subject",
}
subject, err := ociartifact.FromStruct(subjectAM)
if err != nil {
t.Fatal(err)
}
subjectDigest, err := ms.Put(ctx, subject) // push subject manifest into the storage
if err != nil {
t.Fatal(err)
}

// create the main artifact manifest that has the blob and subject as references
am := ociartifact.Manifest{
MediaType: v1.MediaTypeArtifactManifest,
ArtifactType: "test/main",
Blobs: []distribution.Descriptor{blobDesc},
Subject: &distribution.Descriptor{MediaType: v1.MediaTypeArtifactManifest, Digest: subjectDigest},
}
manifest, err := ociartifact.FromStruct(am)
if err != nil {
t.Fatal(err)
}

var manifestDigest digest.Digest
if manifestDigest, err = ms.Put(ctx, manifest); err != nil {
t.Fatal(err)
}

// Now check that we can retrieve the manifest
fromStore, err := ms.Get(ctx, manifestDigest)
if err != nil {
t.Fatalf("unexpected error fetching manifest: %v", err)
}

fetchedManifest, ok := fromStore.(*ociartifact.DeserializedManifest)
if !ok {
t.Fatalf("unexpected type for fetched manifest")
}

if fetchedManifest.MediaType != v1.MediaTypeArtifactManifest {
t.Fatalf("unexpected MediaType for result, %s", fetchedManifest.MediaType)
}

payloadMediaType, _, err := fromStore.Payload()
if err != nil {
t.Fatalf("error getting payload %v", err)
}

if payloadMediaType != v1.MediaTypeArtifactManifest {
t.Fatalf("unexpected MediaType for manifest payload, %s", payloadMediaType)
}
}

// TestLinkPathFuncs ensures that the link path functions behavior are locked
// down and implemented as expected.
func TestLinkPathFuncs(t *testing.T) {
Expand Down
114 changes: 114 additions & 0 deletions registry/storage/ociartifactmanifesthandler.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,114 @@
package storage

import (
"context"
"fmt"

"github.com/distribution/distribution/v3"
dcontext "github.com/distribution/distribution/v3/context"
"github.com/distribution/distribution/v3/manifest/ociartifact"
"github.com/opencontainers/go-digest"
v1 "github.com/opencontainers/image-spec/specs-go/v1"
)

// ociArtifactManifestHandler is a ManifestHandler that covers oci artifact manifests.
type ociArtifactManifestHandler struct {
repository distribution.Repository
blobStore distribution.BlobStore
ctx context.Context
}

var _ ManifestHandler = &ociArtifactManifestHandler{}

func (ms *ociArtifactManifestHandler) Unmarshal(ctx context.Context, dgst digest.Digest, content []byte) (distribution.Manifest, error) {
dcontext.GetLogger(ms.ctx).Debug("(*ociArtifactManifestHandler).Unmarshal")

m := &ociartifact.DeserializedManifest{}
if err := m.UnmarshalJSON(content); err != nil {
return nil, err
}

return m, nil
}

func (ms *ociArtifactManifestHandler) Put(ctx context.Context, manifest distribution.Manifest, skipDependencyVerification bool) (digest.Digest, error) {
dcontext.GetLogger(ms.ctx).Debug("(*ociArtifactManifestHandler).Put")

m, ok := manifest.(*ociartifact.DeserializedManifest)
if !ok {
return "", fmt.Errorf("non-oci artifact manifest put to ociArtifactManifestHandler: %T", manifest)
}

if err := ms.verifyArtifactManifest(ms.ctx, m, skipDependencyVerification); err != nil {
return "", err
}

mt, payload, err := m.Payload()
if err != nil {
return "", err
}

revision, err := ms.blobStore.Put(ctx, mt, payload)
if err != nil {
dcontext.GetLogger(ctx).Errorf("error putting payload into blobstore: %v", err)
return "", err
}

return revision.Digest, nil
}

// verifyArtifactManifest ensures that the manifest content is valid from the
// perspective of the registry. As a policy, the registry only tries to store
// valid content, leaving trust policies of that content up to consumers.
func (ms *ociArtifactManifestHandler) verifyArtifactManifest(ctx context.Context, mnfst *ociartifact.DeserializedManifest, skipDependencyVerification bool) error {
var errs distribution.ErrManifestVerification

if mnfst.MediaType != v1.MediaTypeArtifactManifest {
return fmt.Errorf("unrecognized manifest media type %s", mnfst.MediaType)
}

if skipDependencyVerification {
return nil
}

// validate the subject
if mnfst.Subject != nil {
// check if the digest is valid
err := mnfst.Subject.Digest.Validate()
if err != nil {
errs = append(errs, err, distribution.ErrManifestBlobUnknown{Digest: mnfst.Subject.Digest})
} else {
// check the presence
manifestService, err := ms.repository.Manifests(ctx)
if err != nil {
return err
}
exists, err := manifestService.Exists(ctx, mnfst.Subject.Digest)
if err != nil || !exists {
errs = append(errs, distribution.ErrManifestBlobUnknown{Digest: mnfst.Subject.Digest})
}
}
}

// validate the blobs
blobsService := ms.repository.Blobs(ctx)
for _, descriptor := range mnfst.Blobs {
// check if the digest is valid
err := descriptor.Digest.Validate()
if err != nil {
errs = append(errs, err, distribution.ErrManifestBlobUnknown{Digest: descriptor.Digest})
shizhMSFT marked this conversation as resolved.
Show resolved Hide resolved
continue
}

_, err = blobsService.Stat(ctx, descriptor.Digest)
if err != nil {
errs = append(errs, distribution.ErrManifestBlobUnknown{Digest: descriptor.Digest})
}
}

if len(errs) != 0 {
return errs
}

return nil
}
112 changes: 112 additions & 0 deletions registry/storage/ociartifactmanifesthandler_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,112 @@
package storage

import (
"context"
"strings"
"testing"

"github.com/distribution/distribution/v3"
"github.com/distribution/distribution/v3/manifest/ociartifact"
"github.com/distribution/distribution/v3/registry/storage/driver/inmemory"
"github.com/opencontainers/go-digest"
v1 "github.com/opencontainers/image-spec/specs-go/v1"
)

func TestVerifyOCIArtifactManifestBlobsAndSubject(t *testing.T) {
ctx := context.Background()
inmemoryDriver := inmemory.New()
registry := createRegistry(t, inmemoryDriver)
repo := makeRepository(t, registry, strings.ToLower(t.Name()))
manifestService := makeManifestService(t, repo)

subject, err := repo.Blobs(ctx).Put(ctx, v1.MediaTypeImageManifest, nil)
if err != nil {
t.Fatal(err)
}

blob, err := repo.Blobs(ctx).Put(ctx, v1.MediaTypeImageLayer, nil)
if err != nil {
t.Fatal(err)
}

template := ociartifact.Manifest{
MediaType: v1.MediaTypeArtifactManifest,
}

checkFn := func(m ociartifact.Manifest, rerr error) {
dm, err := ociartifact.FromStruct(m)
if err != nil {
t.Error(err)
return
}
_, err = manifestService.Put(ctx, dm)
if verr, ok := err.(distribution.ErrManifestVerification); ok {
// Extract the first error
if len(verr) == 2 {
if _, ok = verr[1].(distribution.ErrManifestBlobUnknown); ok {
err = verr[0]
}
} else if len(verr) == 1 {
err = verr[0]
}
}
if err != rerr {
t.Errorf("%#v: expected %v, got %v", m, rerr, err)
}
}

type testcase struct {
Desc distribution.Descriptor
Err error
}

layercases := []testcase{
// normal blob with media type v1.MediaTypeImageLayer
{
blob,
nil,
},
// blob with empty media type but valid digest
{
distribution.Descriptor{Digest: blob.Digest},
nil,
},
// blob with invalid digest
{
distribution.Descriptor{Digest: digest.Digest("invalid")},
digest.ErrDigestInvalidFormat,
},
// empty descriptor
{
distribution.Descriptor{},
digest.ErrDigestInvalidFormat,
},
}

for _, c := range layercases {
m := template
m.Subject = &subject
m.Blobs = []distribution.Descriptor{c.Desc}
checkFn(m, c.Err)
}

subjectcases := []testcase{
// normal subject
{
subject,
nil,
},
// subject with invalid digest
{
distribution.Descriptor{Digest: digest.Digest("invalid")},
digest.ErrDigestInvalidFormat,
},
}

for _, c := range subjectcases {
m := template
m.Subject = &c.Desc
m.Blobs = []distribution.Descriptor{blob}
checkFn(m, c.Err)
}
}
5 changes: 5 additions & 0 deletions registry/storage/registry.go
Original file line number Diff line number Diff line change
Expand Up @@ -288,6 +288,11 @@ func (repo *repository) Manifests(ctx context.Context, options ...distribution.M
blobStore: blobStore,
manifestURLs: repo.registry.manifestURLs,
},
ociartifactHandler: &ociArtifactManifestHandler{
repository: repo,
blobStore: blobStore,
ctx: ctx,
},
}

// Apply options
Expand Down