mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-31 21:28:11 +09:00 
			
		
		
		
	* Added package store settings. * Added models. * Added generic package registry. * Added tests. * Added NuGet package registry. * Moved service index to api file. * Added NPM package registry. * Added Maven package registry. * Added PyPI package registry. * Summary is deprecated. * Changed npm name. * Sanitize project url. * Allow only scoped packages. * Added user interface. * Changed method name. * Added missing migration file. * Set page info. * Added documentation. * Added documentation links. * Fixed wrong error message. * Lint template files. * Fixed merge errors. * Fixed unit test storage path. * Switch to json module. * Added suggestions. * Added package webhook. * Add package api. * Fixed swagger file. * Fixed enum and comments. * Fixed NuGet pagination. * Print test names. * Added api tests. * Fixed access level. * Fix User unmarshal. * Added RubyGems package registry. * Fix lint. * Implemented io.Writer. * Added support for sha256/sha512 checksum files. * Improved maven-metadata.xml support. * Added support for symbol package uploads. * Added tests. * Added overview docs. * Added npm dependencies and keywords. * Added no-packages information. * Display file size. * Display asset count. * Fixed filter alignment. * Added package icons. * Formatted instructions. * Allow anonymous package downloads. * Fixed comments. * Fixed postgres test. * Moved file. * Moved models to models/packages. * Use correct error response format per client. * Use simpler search form. * Fixed IsProd. * Restructured data model. * Prevent empty filename. * Fix swagger. * Implemented user/org registry. * Implemented UI. * Use GetUserByIDCtx. * Use table for dependencies. * make svg * Added support for unscoped npm packages. * Add support for npm dist tags. * Added tests for npm tags. * Unlink packages if repository gets deleted. * Prevent user/org delete if a packages exist. * Use package unlink in repository service. * Added support for composer packages. * Restructured package docs. * Added missing tests. * Fixed generic content page. * Fixed docs. * Fixed swagger. * Added missing type. * Fixed ambiguous column. * Organize content store by sha256 hash. * Added admin package management. * Added support for sorting. * Add support for multiple identical versions/files. * Added missing repository unlink. * Added file properties. * make fmt * lint * Added Conan package registry. * Updated docs. * Unify package names. * Added swagger enum. * Use longer TEXT column type. * Removed version composite key. * Merged package and container registry. * Removed index. * Use dedicated package router. * Moved files to new location. * Updated docs. * Fixed JOIN order. * Fixed GROUP BY statement. * Fixed GROUP BY #2. * Added symbol server support. * Added more tests. * Set NOT NULL. * Added setting to disable package registries. * Moved auth into service. * refactor * Use ctx everywhere. * Added package cleanup task. * Changed packages path. * Added container registry. * Refactoring * Updated comparison. * Fix swagger. * Fixed table order. * Use token auth for npm routes. * Enabled ReverseProxy auth. * Added packages link for orgs. * Fixed anonymous org access. * Enable copy button for setup instructions. * Merge error * Added suggestions. * Fixed merge. * Handle "generic". * Added link for TODO. * Added suggestions. * Changed temporary buffer filename. * Added suggestions. * Apply suggestions from code review Co-authored-by: Thomas Boerger <thomas@webhippie.de> * Update docs/content/doc/packages/nuget.en-us.md Co-authored-by: wxiaoguang <wxiaoguang@gmail.com> Co-authored-by: Thomas Boerger <thomas@webhippie.de>
		
			
				
	
	
		
			535 lines
		
	
	
		
			23 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			535 lines
		
	
	
		
			23 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2022 The Gitea Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package integrations
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"encoding/base64"
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 
 | |
| 	"code.gitea.io/gitea/models/db"
 | |
| 	packages_model "code.gitea.io/gitea/models/packages"
 | |
| 	container_model "code.gitea.io/gitea/models/packages/container"
 | |
| 	"code.gitea.io/gitea/models/unittest"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	container_module "code.gitea.io/gitea/modules/packages/container"
 | |
| 	"code.gitea.io/gitea/modules/packages/container/oci"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| )
 | |
| 
 | |
| func TestPackageContainer(t *testing.T) {
 | |
| 	defer prepareTestEnv(t)()
 | |
| 	user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User)
 | |
| 
 | |
| 	has := func(l packages_model.PackagePropertyList, name string) bool {
 | |
| 		for _, pp := range l {
 | |
| 			if pp.Name == name {
 | |
| 				return true
 | |
| 			}
 | |
| 		}
 | |
| 		return false
 | |
| 	}
 | |
| 
 | |
| 	images := []string{"test", "te/st"}
 | |
| 	tags := []string{"latest", "main"}
 | |
| 	multiTag := "multi"
 | |
| 
 | |
| 	unknownDigest := "sha256:0000000000000000000000000000000000000000000000000000000000000000"
 | |
| 
 | |
| 	blobDigest := "sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4"
 | |
| 	blobContent, _ := base64.StdEncoding.DecodeString(`H4sIAAAJbogA/2IYBaNgFIxYAAgAAP//Lq+17wAEAAA=`)
 | |
| 
 | |
| 	configDigest := "sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d"
 | |
| 	configContent := `{"architecture":"amd64","config":{"Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/true"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"container":"b89fe92a887d55c0961f02bdfbfd8ac3ddf66167db374770d2d9e9fab3311510","container_config":{"Hostname":"b89fe92a887d","Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/bin/sh","-c","#(nop) ","CMD [\"/true\"]"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"created":"2022-01-01T00:00:00.000000000Z","docker_version":"20.10.12","history":[{"created":"2022-01-01T00:00:00.000000000Z","created_by":"/bin/sh -c #(nop) COPY file:0e7589b0c800daaf6fa460d2677101e4676dd9491980210cb345480e513f3602 in /true "},{"created":"2022-01-01T00:00:00.000000001Z","created_by":"/bin/sh -c #(nop)  CMD [\"/true\"]","empty_layer":true}],"os":"linux","rootfs":{"type":"layers","diff_ids":["sha256:0ff3b91bdf21ecdf2f2f3d4372c2098a14dbe06cd678e8f0a85fd4902d00e2e2"]}}`
 | |
| 
 | |
| 	manifestDigest := "sha256:4f10484d1c1bb13e3956b4de1cd42db8e0f14a75be1617b60f2de3cd59c803c6"
 | |
| 	manifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeDockerManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}`
 | |
| 
 | |
| 	untaggedManifestDigest := "sha256:4305f5f5572b9a426b88909b036e52ee3cf3d7b9c1b01fac840e90747f56623d"
 | |
| 	untaggedManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}`
 | |
| 
 | |
| 	indexManifestDigest := "sha256:bab112d6efb9e7f221995caaaa880352feb5bd8b1faf52fae8d12c113aa123ec"
 | |
| 	indexManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageIndex + `","manifests":[{"mediaType":"` + oci.MediaTypeDockerManifest + `","digest":"` + manifestDigest + `","platform":{"os":"linux","architecture":"arm","variant":"v7"}},{"mediaType":"` + oci.MediaTypeImageManifest + `","digest":"` + untaggedManifestDigest + `","platform":{"os":"linux","architecture":"arm64","variant":"v8"}}]}`
 | |
| 
 | |
| 	anonymousToken := ""
 | |
| 	userToken := ""
 | |
| 
 | |
| 	t.Run("Authenticate", func(t *testing.T) {
 | |
| 		type TokenResponse struct {
 | |
| 			Token string `json:"token"`
 | |
| 		}
 | |
| 
 | |
| 		authenticate := []string{
 | |
| 			`Bearer realm="` + setting.AppURL + `v2/token"`,
 | |
| 			`Basic`,
 | |
| 		}
 | |
| 
 | |
| 		t.Run("Anonymous", func(t *testing.T) {
 | |
| 			defer PrintCurrentTest(t)()
 | |
| 
 | |
| 			req := NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
 | |
| 			resp := MakeRequest(t, req, http.StatusUnauthorized)
 | |
| 
 | |
| 			assert.ElementsMatch(t, authenticate, resp.Header().Values("WWW-Authenticate"))
 | |
| 
 | |
| 			req = NewRequest(t, "GET", fmt.Sprintf("%sv2/token", setting.AppURL))
 | |
| 			resp = MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 			tokenResponse := &TokenResponse{}
 | |
| 			DecodeJSON(t, resp, &tokenResponse)
 | |
| 
 | |
| 			assert.NotEmpty(t, tokenResponse.Token)
 | |
| 
 | |
| 			anonymousToken = fmt.Sprintf("Bearer %s", tokenResponse.Token)
 | |
| 
 | |
| 			req = NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
 | |
| 			addTokenAuthHeader(req, anonymousToken)
 | |
| 			resp = MakeRequest(t, req, http.StatusOK)
 | |
| 		})
 | |
| 
 | |
| 		t.Run("User", func(t *testing.T) {
 | |
| 			defer PrintCurrentTest(t)()
 | |
| 
 | |
| 			req := NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
 | |
| 			resp := MakeRequest(t, req, http.StatusUnauthorized)
 | |
| 
 | |
| 			assert.ElementsMatch(t, authenticate, resp.Header().Values("WWW-Authenticate"))
 | |
| 
 | |
| 			req = NewRequest(t, "GET", fmt.Sprintf("%sv2/token", setting.AppURL))
 | |
| 			req = AddBasicAuthHeader(req, user.Name)
 | |
| 			resp = MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 			tokenResponse := &TokenResponse{}
 | |
| 			DecodeJSON(t, resp, &tokenResponse)
 | |
| 
 | |
| 			assert.NotEmpty(t, tokenResponse.Token)
 | |
| 
 | |
| 			userToken = fmt.Sprintf("Bearer %s", tokenResponse.Token)
 | |
| 
 | |
| 			req = NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
 | |
| 			addTokenAuthHeader(req, userToken)
 | |
| 			resp = MakeRequest(t, req, http.StatusOK)
 | |
| 		})
 | |
| 	})
 | |
| 
 | |
| 	t.Run("DetermineSupport", func(t *testing.T) {
 | |
| 		defer PrintCurrentTest(t)()
 | |
| 
 | |
| 		req := NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
 | |
| 		addTokenAuthHeader(req, userToken)
 | |
| 		resp := MakeRequest(t, req, http.StatusOK)
 | |
| 		assert.Equal(t, "registry/2.0", resp.Header().Get("Docker-Distribution-Api-Version"))
 | |
| 	})
 | |
| 
 | |
| 	for _, image := range images {
 | |
| 		t.Run(fmt.Sprintf("[Image:%s]", image), func(t *testing.T) {
 | |
| 			url := fmt.Sprintf("%sv2/%s/%s", setting.AppURL, user.Name, image)
 | |
| 
 | |
| 			t.Run("UploadBlob/Monolithic", func(t *testing.T) {
 | |
| 				defer PrintCurrentTest(t)()
 | |
| 
 | |
| 				req := NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads", url))
 | |
| 				addTokenAuthHeader(req, anonymousToken)
 | |
| 				MakeRequest(t, req, http.StatusUnauthorized)
 | |
| 
 | |
| 				req = NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, unknownDigest), bytes.NewReader(blobContent))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				MakeRequest(t, req, http.StatusBadRequest)
 | |
| 
 | |
| 				req = NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, blobDigest), bytes.NewReader(blobContent))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				resp := MakeRequest(t, req, http.StatusCreated)
 | |
| 
 | |
| 				assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location"))
 | |
| 				assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
 | |
| 
 | |
| 				pv, err := packages_model.GetInternalVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, container_model.UploadVersion)
 | |
| 				assert.NoError(t, err)
 | |
| 
 | |
| 				pfs, err := packages_model.GetFilesByVersionID(db.DefaultContext, pv.ID)
 | |
| 				assert.NoError(t, err)
 | |
| 				assert.Len(t, pfs, 1)
 | |
| 
 | |
| 				pb, err := packages_model.GetBlobByID(db.DefaultContext, pfs[0].BlobID)
 | |
| 				assert.NoError(t, err)
 | |
| 				assert.EqualValues(t, len(blobContent), pb.Size)
 | |
| 			})
 | |
| 
 | |
| 			t.Run("UploadBlob/Chunked", func(t *testing.T) {
 | |
| 				defer PrintCurrentTest(t)()
 | |
| 
 | |
| 				req := NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads", url))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				resp := MakeRequest(t, req, http.StatusAccepted)
 | |
| 
 | |
| 				uuid := resp.Header().Get("Docker-Upload-Uuid")
 | |
| 				assert.NotEmpty(t, uuid)
 | |
| 
 | |
| 				pbu, err := packages_model.GetBlobUploadByID(db.DefaultContext, uuid)
 | |
| 				assert.NoError(t, err)
 | |
| 				assert.EqualValues(t, 0, pbu.BytesReceived)
 | |
| 
 | |
| 				uploadURL := resp.Header().Get("Location")
 | |
| 				assert.NotEmpty(t, uploadURL)
 | |
| 
 | |
| 				req = NewRequestWithBody(t, "PATCH", setting.AppURL+uploadURL[1:]+"000", bytes.NewReader(blobContent))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				MakeRequest(t, req, http.StatusNotFound)
 | |
| 
 | |
| 				req = NewRequestWithBody(t, "PATCH", setting.AppURL+uploadURL[1:], bytes.NewReader(blobContent))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 
 | |
| 				req.Header.Set("Content-Range", "1-10")
 | |
| 				MakeRequest(t, req, http.StatusRequestedRangeNotSatisfiable)
 | |
| 
 | |
| 				contentRange := fmt.Sprintf("0-%d", len(blobContent)-1)
 | |
| 				req.Header.Set("Content-Range", contentRange)
 | |
| 				resp = MakeRequest(t, req, http.StatusAccepted)
 | |
| 
 | |
| 				assert.Equal(t, uuid, resp.Header().Get("Docker-Upload-Uuid"))
 | |
| 				assert.Equal(t, contentRange, resp.Header().Get("Range"))
 | |
| 
 | |
| 				pbu, err = packages_model.GetBlobUploadByID(db.DefaultContext, uuid)
 | |
| 				assert.NoError(t, err)
 | |
| 				assert.EqualValues(t, len(blobContent), pbu.BytesReceived)
 | |
| 
 | |
| 				uploadURL = resp.Header().Get("Location")
 | |
| 
 | |
| 				req = NewRequest(t, "PUT", fmt.Sprintf("%s?digest=%s", setting.AppURL+uploadURL[1:], blobDigest))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				resp = MakeRequest(t, req, http.StatusCreated)
 | |
| 
 | |
| 				assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location"))
 | |
| 				assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
 | |
| 			})
 | |
| 
 | |
| 			for _, tag := range tags {
 | |
| 				t.Run(fmt.Sprintf("[Tag:%s]", tag), func(t *testing.T) {
 | |
| 					t.Run("UploadManifest", func(t *testing.T) {
 | |
| 						defer PrintCurrentTest(t)()
 | |
| 
 | |
| 						req := NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, configDigest), strings.NewReader(configContent))
 | |
| 						addTokenAuthHeader(req, userToken)
 | |
| 						MakeRequest(t, req, http.StatusCreated)
 | |
| 
 | |
| 						req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
 | |
| 						addTokenAuthHeader(req, anonymousToken)
 | |
| 						req.Header.Set("Content-Type", oci.MediaTypeDockerManifest)
 | |
| 						MakeRequest(t, req, http.StatusUnauthorized)
 | |
| 
 | |
| 						req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
 | |
| 						addTokenAuthHeader(req, userToken)
 | |
| 						req.Header.Set("Content-Type", oci.MediaTypeDockerManifest)
 | |
| 						resp := MakeRequest(t, req, http.StatusCreated)
 | |
| 
 | |
| 						assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
 | |
| 
 | |
| 						pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, tag)
 | |
| 						assert.NoError(t, err)
 | |
| 
 | |
| 						pd, err := packages_model.GetPackageDescriptor(db.DefaultContext, pv)
 | |
| 						assert.NoError(t, err)
 | |
| 						assert.Nil(t, pd.SemVer)
 | |
| 						assert.Equal(t, image, pd.Package.Name)
 | |
| 						assert.Equal(t, tag, pd.Version.Version)
 | |
| 						assert.True(t, has(pd.Properties, container_module.PropertyManifestTagged))
 | |
| 
 | |
| 						assert.IsType(t, &container_module.Metadata{}, pd.Metadata)
 | |
| 						metadata := pd.Metadata.(*container_module.Metadata)
 | |
| 						assert.Equal(t, container_module.TypeOCI, metadata.Type)
 | |
| 						assert.Len(t, metadata.ImageLayers, 2)
 | |
| 						assert.Empty(t, metadata.MultiArch)
 | |
| 
 | |
| 						assert.Len(t, pd.Files, 3)
 | |
| 						for _, pfd := range pd.Files {
 | |
| 							switch pfd.File.Name {
 | |
| 							case container_model.ManifestFilename:
 | |
| 								assert.True(t, pfd.File.IsLead)
 | |
| 								assert.Equal(t, oci.MediaTypeDockerManifest, pfd.Properties.GetByName(container_module.PropertyMediaType))
 | |
| 								assert.Equal(t, manifestDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
 | |
| 							case strings.Replace(configDigest, ":", "_", 1):
 | |
| 								assert.False(t, pfd.File.IsLead)
 | |
| 								assert.Equal(t, "application/vnd.docker.container.image.v1+json", pfd.Properties.GetByName(container_module.PropertyMediaType))
 | |
| 								assert.Equal(t, configDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
 | |
| 							case strings.Replace(blobDigest, ":", "_", 1):
 | |
| 								assert.False(t, pfd.File.IsLead)
 | |
| 								assert.Equal(t, "application/vnd.docker.image.rootfs.diff.tar.gzip", pfd.Properties.GetByName(container_module.PropertyMediaType))
 | |
| 								assert.Equal(t, blobDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
 | |
| 							default:
 | |
| 								assert.Fail(t, "unknown file: %s", pfd.File.Name)
 | |
| 							}
 | |
| 						}
 | |
| 
 | |
| 						// Overwrite existing tag
 | |
| 						req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
 | |
| 						addTokenAuthHeader(req, userToken)
 | |
| 						req.Header.Set("Content-Type", oci.MediaTypeDockerManifest)
 | |
| 						MakeRequest(t, req, http.StatusCreated)
 | |
| 					})
 | |
| 
 | |
| 					t.Run("HeadManifest", func(t *testing.T) {
 | |
| 						defer PrintCurrentTest(t)()
 | |
| 
 | |
| 						req := NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/unknown-tag", url))
 | |
| 						addTokenAuthHeader(req, userToken)
 | |
| 						MakeRequest(t, req, http.StatusNotFound)
 | |
| 
 | |
| 						req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, tag))
 | |
| 						addTokenAuthHeader(req, userToken)
 | |
| 						resp := MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 						assert.Equal(t, fmt.Sprintf("%d", len(manifestContent)), resp.Header().Get("Content-Length"))
 | |
| 						assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
 | |
| 					})
 | |
| 
 | |
| 					t.Run("GetManifest", func(t *testing.T) {
 | |
| 						defer PrintCurrentTest(t)()
 | |
| 
 | |
| 						req := NewRequest(t, "GET", fmt.Sprintf("%s/manifests/unknown-tag", url))
 | |
| 						addTokenAuthHeader(req, userToken)
 | |
| 						MakeRequest(t, req, http.StatusNotFound)
 | |
| 
 | |
| 						req = NewRequest(t, "GET", fmt.Sprintf("%s/manifests/%s", url, tag))
 | |
| 						addTokenAuthHeader(req, userToken)
 | |
| 						resp := MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 						assert.Equal(t, fmt.Sprintf("%d", len(manifestContent)), resp.Header().Get("Content-Length"))
 | |
| 						assert.Equal(t, oci.MediaTypeDockerManifest, resp.Header().Get("Content-Type"))
 | |
| 						assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
 | |
| 						assert.Equal(t, manifestContent, resp.Body.String())
 | |
| 					})
 | |
| 				})
 | |
| 			}
 | |
| 
 | |
| 			t.Run("UploadUntaggedManifest", func(t *testing.T) {
 | |
| 				defer PrintCurrentTest(t)()
 | |
| 
 | |
| 				req := NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest), strings.NewReader(untaggedManifestContent))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				req.Header.Set("Content-Type", oci.MediaTypeImageManifest)
 | |
| 				resp := MakeRequest(t, req, http.StatusCreated)
 | |
| 
 | |
| 				assert.Equal(t, untaggedManifestDigest, resp.Header().Get("Docker-Content-Digest"))
 | |
| 
 | |
| 				req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				resp = MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 				assert.Equal(t, fmt.Sprintf("%d", len(untaggedManifestContent)), resp.Header().Get("Content-Length"))
 | |
| 				assert.Equal(t, untaggedManifestDigest, resp.Header().Get("Docker-Content-Digest"))
 | |
| 
 | |
| 				pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, untaggedManifestDigest)
 | |
| 				assert.NoError(t, err)
 | |
| 
 | |
| 				pd, err := packages_model.GetPackageDescriptor(db.DefaultContext, pv)
 | |
| 				assert.NoError(t, err)
 | |
| 				assert.Nil(t, pd.SemVer)
 | |
| 				assert.Equal(t, image, pd.Package.Name)
 | |
| 				assert.Equal(t, untaggedManifestDigest, pd.Version.Version)
 | |
| 				assert.False(t, has(pd.Properties, container_module.PropertyManifestTagged))
 | |
| 
 | |
| 				assert.IsType(t, &container_module.Metadata{}, pd.Metadata)
 | |
| 
 | |
| 				assert.Len(t, pd.Files, 3)
 | |
| 				for _, pfd := range pd.Files {
 | |
| 					if pfd.File.Name == container_model.ManifestFilename {
 | |
| 						assert.True(t, pfd.File.IsLead)
 | |
| 						assert.Equal(t, oci.MediaTypeImageManifest, pfd.Properties.GetByName(container_module.PropertyMediaType))
 | |
| 						assert.Equal(t, untaggedManifestDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
 | |
| 					}
 | |
| 				}
 | |
| 			})
 | |
| 
 | |
| 			t.Run("UploadIndexManifest", func(t *testing.T) {
 | |
| 				defer PrintCurrentTest(t)()
 | |
| 
 | |
| 				req := NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, multiTag), strings.NewReader(indexManifestContent))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				req.Header.Set("Content-Type", oci.MediaTypeImageIndex)
 | |
| 				resp := MakeRequest(t, req, http.StatusCreated)
 | |
| 
 | |
| 				assert.Equal(t, indexManifestDigest, resp.Header().Get("Docker-Content-Digest"))
 | |
| 
 | |
| 				pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, multiTag)
 | |
| 				assert.NoError(t, err)
 | |
| 
 | |
| 				pd, err := packages_model.GetPackageDescriptor(db.DefaultContext, pv)
 | |
| 				assert.NoError(t, err)
 | |
| 				assert.Nil(t, pd.SemVer)
 | |
| 				assert.Equal(t, image, pd.Package.Name)
 | |
| 				assert.Equal(t, multiTag, pd.Version.Version)
 | |
| 				assert.True(t, has(pd.Properties, container_module.PropertyManifestTagged))
 | |
| 
 | |
| 				getAllByName := func(l packages_model.PackagePropertyList, name string) []string {
 | |
| 					values := make([]string, 0, len(l))
 | |
| 					for _, pp := range l {
 | |
| 						if pp.Name == name {
 | |
| 							values = append(values, pp.Value)
 | |
| 						}
 | |
| 					}
 | |
| 					return values
 | |
| 				}
 | |
| 				assert.ElementsMatch(t, []string{manifestDigest, untaggedManifestDigest}, getAllByName(pd.Properties, container_module.PropertyManifestReference))
 | |
| 
 | |
| 				assert.IsType(t, &container_module.Metadata{}, pd.Metadata)
 | |
| 				metadata := pd.Metadata.(*container_module.Metadata)
 | |
| 				assert.Equal(t, container_module.TypeOCI, metadata.Type)
 | |
| 				assert.Contains(t, metadata.MultiArch, "linux/arm/v7")
 | |
| 				assert.Equal(t, manifestDigest, metadata.MultiArch["linux/arm/v7"])
 | |
| 				assert.Contains(t, metadata.MultiArch, "linux/arm64/v8")
 | |
| 				assert.Equal(t, untaggedManifestDigest, metadata.MultiArch["linux/arm64/v8"])
 | |
| 
 | |
| 				assert.Len(t, pd.Files, 1)
 | |
| 				assert.True(t, pd.Files[0].File.IsLead)
 | |
| 				assert.Equal(t, oci.MediaTypeImageIndex, pd.Files[0].Properties.GetByName(container_module.PropertyMediaType))
 | |
| 				assert.Equal(t, indexManifestDigest, pd.Files[0].Properties.GetByName(container_module.PropertyDigest))
 | |
| 			})
 | |
| 
 | |
| 			t.Run("UploadBlob/Mount", func(t *testing.T) {
 | |
| 				defer PrintCurrentTest(t)()
 | |
| 
 | |
| 				req := NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads?mount=%s", url, unknownDigest))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				MakeRequest(t, req, http.StatusAccepted)
 | |
| 
 | |
| 				req = NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads?mount=%s", url, blobDigest))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				resp := MakeRequest(t, req, http.StatusCreated)
 | |
| 
 | |
| 				assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location"))
 | |
| 				assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
 | |
| 			})
 | |
| 
 | |
| 			t.Run("HeadBlob", func(t *testing.T) {
 | |
| 				defer PrintCurrentTest(t)()
 | |
| 
 | |
| 				req := NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, unknownDigest))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				MakeRequest(t, req, http.StatusNotFound)
 | |
| 
 | |
| 				req = NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				resp := MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 				assert.Equal(t, fmt.Sprintf("%d", len(blobContent)), resp.Header().Get("Content-Length"))
 | |
| 				assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
 | |
| 			})
 | |
| 
 | |
| 			t.Run("GetBlob", func(t *testing.T) {
 | |
| 				defer PrintCurrentTest(t)()
 | |
| 
 | |
| 				req := NewRequest(t, "GET", fmt.Sprintf("%s/blobs/%s", url, unknownDigest))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				MakeRequest(t, req, http.StatusNotFound)
 | |
| 
 | |
| 				req = NewRequest(t, "GET", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
 | |
| 				addTokenAuthHeader(req, userToken)
 | |
| 				resp := MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 				assert.Equal(t, fmt.Sprintf("%d", len(blobContent)), resp.Header().Get("Content-Length"))
 | |
| 				assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
 | |
| 				assert.Equal(t, blobContent, resp.Body.Bytes())
 | |
| 			})
 | |
| 
 | |
| 			t.Run("GetTagList", func(t *testing.T) {
 | |
| 				defer PrintCurrentTest(t)()
 | |
| 
 | |
| 				cases := []struct {
 | |
| 					URL          string
 | |
| 					ExpectedTags []string
 | |
| 					ExpectedLink string
 | |
| 				}{
 | |
| 					{
 | |
| 						URL:          fmt.Sprintf("%s/tags/list", url),
 | |
| 						ExpectedTags: []string{"latest", "main", "multi"},
 | |
| 						ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=multi>; rel="next"`, user.Name, image),
 | |
| 					},
 | |
| 					{
 | |
| 						URL:          fmt.Sprintf("%s/tags/list?n=0", url),
 | |
| 						ExpectedTags: []string{},
 | |
| 						ExpectedLink: "",
 | |
| 					},
 | |
| 					{
 | |
| 						URL:          fmt.Sprintf("%s/tags/list?n=2", url),
 | |
| 						ExpectedTags: []string{"latest", "main"},
 | |
| 						ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=main&n=2>; rel="next"`, user.Name, image),
 | |
| 					},
 | |
| 					{
 | |
| 						URL:          fmt.Sprintf("%s/tags/list?last=main", url),
 | |
| 						ExpectedTags: []string{"multi"},
 | |
| 						ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=multi>; rel="next"`, user.Name, image),
 | |
| 					},
 | |
| 					{
 | |
| 						URL:          fmt.Sprintf("%s/tags/list?n=1&last=latest", url),
 | |
| 						ExpectedTags: []string{"main"},
 | |
| 						ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=main&n=1>; rel="next"`, user.Name, image),
 | |
| 					},
 | |
| 				}
 | |
| 
 | |
| 				for _, c := range cases {
 | |
| 					req := NewRequest(t, "GET", c.URL)
 | |
| 					addTokenAuthHeader(req, userToken)
 | |
| 					resp := MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 					type TagList struct {
 | |
| 						Name string   `json:"name"`
 | |
| 						Tags []string `json:"tags"`
 | |
| 					}
 | |
| 
 | |
| 					tagList := &TagList{}
 | |
| 					DecodeJSON(t, resp, &tagList)
 | |
| 
 | |
| 					assert.Equal(t, user.Name+"/"+image, tagList.Name)
 | |
| 					assert.Equal(t, c.ExpectedTags, tagList.Tags)
 | |
| 					assert.Equal(t, c.ExpectedLink, resp.Header().Get("Link"))
 | |
| 				}
 | |
| 			})
 | |
| 
 | |
| 			t.Run("Delete", func(t *testing.T) {
 | |
| 				t.Run("Blob", func(t *testing.T) {
 | |
| 					defer PrintCurrentTest(t)()
 | |
| 
 | |
| 					req := NewRequest(t, "DELETE", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
 | |
| 					addTokenAuthHeader(req, userToken)
 | |
| 					MakeRequest(t, req, http.StatusAccepted)
 | |
| 
 | |
| 					req = NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
 | |
| 					addTokenAuthHeader(req, userToken)
 | |
| 					MakeRequest(t, req, http.StatusNotFound)
 | |
| 				})
 | |
| 
 | |
| 				t.Run("ManifestByDigest", func(t *testing.T) {
 | |
| 					defer PrintCurrentTest(t)()
 | |
| 
 | |
| 					req := NewRequest(t, "DELETE", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest))
 | |
| 					addTokenAuthHeader(req, userToken)
 | |
| 					MakeRequest(t, req, http.StatusAccepted)
 | |
| 
 | |
| 					req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest))
 | |
| 					addTokenAuthHeader(req, userToken)
 | |
| 					MakeRequest(t, req, http.StatusNotFound)
 | |
| 				})
 | |
| 
 | |
| 				t.Run("ManifestByTag", func(t *testing.T) {
 | |
| 					defer PrintCurrentTest(t)()
 | |
| 
 | |
| 					req := NewRequest(t, "DELETE", fmt.Sprintf("%s/manifests/%s", url, multiTag))
 | |
| 					addTokenAuthHeader(req, userToken)
 | |
| 					MakeRequest(t, req, http.StatusAccepted)
 | |
| 
 | |
| 					req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, multiTag))
 | |
| 					addTokenAuthHeader(req, userToken)
 | |
| 					MakeRequest(t, req, http.StatusNotFound)
 | |
| 				})
 | |
| 			})
 | |
| 		})
 | |
| 	}
 | |
| }
 |