You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

api_packages_container_test.go 23KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539
  1. // Copyright 2022 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package integrations
  5. import (
  6. "bytes"
  7. "encoding/base64"
  8. "fmt"
  9. "net/http"
  10. "strings"
  11. "testing"
  12. "code.gitea.io/gitea/models/db"
  13. packages_model "code.gitea.io/gitea/models/packages"
  14. container_model "code.gitea.io/gitea/models/packages/container"
  15. "code.gitea.io/gitea/models/unittest"
  16. user_model "code.gitea.io/gitea/models/user"
  17. container_module "code.gitea.io/gitea/modules/packages/container"
  18. "code.gitea.io/gitea/modules/packages/container/oci"
  19. "code.gitea.io/gitea/modules/setting"
  20. api "code.gitea.io/gitea/modules/structs"
  21. "github.com/stretchr/testify/assert"
  22. )
  23. func TestPackageContainer(t *testing.T) {
  24. defer prepareTestEnv(t)()
  25. user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User)
  26. has := func(l packages_model.PackagePropertyList, name string) bool {
  27. for _, pp := range l {
  28. if pp.Name == name {
  29. return true
  30. }
  31. }
  32. return false
  33. }
  34. images := []string{"test", "te/st"}
  35. tags := []string{"latest", "main"}
  36. multiTag := "multi"
  37. unknownDigest := "sha256:0000000000000000000000000000000000000000000000000000000000000000"
  38. blobDigest := "sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4"
  39. blobContent, _ := base64.StdEncoding.DecodeString(`H4sIAAAJbogA/2IYBaNgFIxYAAgAAP//Lq+17wAEAAA=`)
  40. configDigest := "sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d"
  41. configContent := `{"architecture":"amd64","config":{"Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/true"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"container":"b89fe92a887d55c0961f02bdfbfd8ac3ddf66167db374770d2d9e9fab3311510","container_config":{"Hostname":"b89fe92a887d","Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/bin/sh","-c","#(nop) ","CMD [\"/true\"]"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"created":"2022-01-01T00:00:00.000000000Z","docker_version":"20.10.12","history":[{"created":"2022-01-01T00:00:00.000000000Z","created_by":"/bin/sh -c #(nop) COPY file:0e7589b0c800daaf6fa460d2677101e4676dd9491980210cb345480e513f3602 in /true "},{"created":"2022-01-01T00:00:00.000000001Z","created_by":"/bin/sh -c #(nop) CMD [\"/true\"]","empty_layer":true}],"os":"linux","rootfs":{"type":"layers","diff_ids":["sha256:0ff3b91bdf21ecdf2f2f3d4372c2098a14dbe06cd678e8f0a85fd4902d00e2e2"]}}`
  42. manifestDigest := "sha256:4f10484d1c1bb13e3956b4de1cd42db8e0f14a75be1617b60f2de3cd59c803c6"
  43. manifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeDockerManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}`
  44. untaggedManifestDigest := "sha256:4305f5f5572b9a426b88909b036e52ee3cf3d7b9c1b01fac840e90747f56623d"
  45. untaggedManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}`
  46. indexManifestDigest := "sha256:bab112d6efb9e7f221995caaaa880352feb5bd8b1faf52fae8d12c113aa123ec"
  47. indexManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageIndex + `","manifests":[{"mediaType":"` + oci.MediaTypeDockerManifest + `","digest":"` + manifestDigest + `","platform":{"os":"linux","architecture":"arm","variant":"v7"}},{"mediaType":"` + oci.MediaTypeImageManifest + `","digest":"` + untaggedManifestDigest + `","platform":{"os":"linux","architecture":"arm64","variant":"v8"}}]}`
  48. anonymousToken := ""
  49. userToken := ""
  50. t.Run("Authenticate", func(t *testing.T) {
  51. type TokenResponse struct {
  52. Token string `json:"token"`
  53. }
  54. authenticate := []string{`Bearer realm="` + setting.AppURL + `v2/token"`}
  55. t.Run("Anonymous", func(t *testing.T) {
  56. defer PrintCurrentTest(t)()
  57. req := NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
  58. resp := MakeRequest(t, req, http.StatusUnauthorized)
  59. assert.ElementsMatch(t, authenticate, resp.Header().Values("WWW-Authenticate"))
  60. req = NewRequest(t, "GET", fmt.Sprintf("%sv2/token", setting.AppURL))
  61. resp = MakeRequest(t, req, http.StatusOK)
  62. tokenResponse := &TokenResponse{}
  63. DecodeJSON(t, resp, &tokenResponse)
  64. assert.NotEmpty(t, tokenResponse.Token)
  65. anonymousToken = fmt.Sprintf("Bearer %s", tokenResponse.Token)
  66. req = NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
  67. addTokenAuthHeader(req, anonymousToken)
  68. MakeRequest(t, req, http.StatusOK)
  69. })
  70. t.Run("User", func(t *testing.T) {
  71. defer PrintCurrentTest(t)()
  72. req := NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
  73. resp := MakeRequest(t, req, http.StatusUnauthorized)
  74. assert.ElementsMatch(t, authenticate, resp.Header().Values("WWW-Authenticate"))
  75. req = NewRequest(t, "GET", fmt.Sprintf("%sv2/token", setting.AppURL))
  76. req = AddBasicAuthHeader(req, user.Name)
  77. resp = MakeRequest(t, req, http.StatusOK)
  78. tokenResponse := &TokenResponse{}
  79. DecodeJSON(t, resp, &tokenResponse)
  80. assert.NotEmpty(t, tokenResponse.Token)
  81. userToken = fmt.Sprintf("Bearer %s", tokenResponse.Token)
  82. req = NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
  83. addTokenAuthHeader(req, userToken)
  84. MakeRequest(t, req, http.StatusOK)
  85. })
  86. })
  87. t.Run("DetermineSupport", func(t *testing.T) {
  88. defer PrintCurrentTest(t)()
  89. req := NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
  90. addTokenAuthHeader(req, userToken)
  91. resp := MakeRequest(t, req, http.StatusOK)
  92. assert.Equal(t, "registry/2.0", resp.Header().Get("Docker-Distribution-Api-Version"))
  93. })
  94. for _, image := range images {
  95. t.Run(fmt.Sprintf("[Image:%s]", image), func(t *testing.T) {
  96. url := fmt.Sprintf("%sv2/%s/%s", setting.AppURL, user.Name, image)
  97. t.Run("UploadBlob/Monolithic", func(t *testing.T) {
  98. defer PrintCurrentTest(t)()
  99. req := NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads", url))
  100. addTokenAuthHeader(req, anonymousToken)
  101. MakeRequest(t, req, http.StatusUnauthorized)
  102. req = NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, unknownDigest), bytes.NewReader(blobContent))
  103. addTokenAuthHeader(req, userToken)
  104. MakeRequest(t, req, http.StatusBadRequest)
  105. req = NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, blobDigest), bytes.NewReader(blobContent))
  106. addTokenAuthHeader(req, userToken)
  107. resp := MakeRequest(t, req, http.StatusCreated)
  108. assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location"))
  109. assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
  110. pv, err := packages_model.GetInternalVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, container_model.UploadVersion)
  111. assert.NoError(t, err)
  112. pfs, err := packages_model.GetFilesByVersionID(db.DefaultContext, pv.ID)
  113. assert.NoError(t, err)
  114. assert.Len(t, pfs, 1)
  115. pb, err := packages_model.GetBlobByID(db.DefaultContext, pfs[0].BlobID)
  116. assert.NoError(t, err)
  117. assert.EqualValues(t, len(blobContent), pb.Size)
  118. })
  119. t.Run("UploadBlob/Chunked", func(t *testing.T) {
  120. defer PrintCurrentTest(t)()
  121. req := NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads", url))
  122. addTokenAuthHeader(req, userToken)
  123. resp := MakeRequest(t, req, http.StatusAccepted)
  124. uuid := resp.Header().Get("Docker-Upload-Uuid")
  125. assert.NotEmpty(t, uuid)
  126. pbu, err := packages_model.GetBlobUploadByID(db.DefaultContext, uuid)
  127. assert.NoError(t, err)
  128. assert.EqualValues(t, 0, pbu.BytesReceived)
  129. uploadURL := resp.Header().Get("Location")
  130. assert.NotEmpty(t, uploadURL)
  131. req = NewRequestWithBody(t, "PATCH", setting.AppURL+uploadURL[1:]+"000", bytes.NewReader(blobContent))
  132. addTokenAuthHeader(req, userToken)
  133. MakeRequest(t, req, http.StatusNotFound)
  134. req = NewRequestWithBody(t, "PATCH", setting.AppURL+uploadURL[1:], bytes.NewReader(blobContent))
  135. addTokenAuthHeader(req, userToken)
  136. req.Header.Set("Content-Range", "1-10")
  137. MakeRequest(t, req, http.StatusRequestedRangeNotSatisfiable)
  138. contentRange := fmt.Sprintf("0-%d", len(blobContent)-1)
  139. req.Header.Set("Content-Range", contentRange)
  140. resp = MakeRequest(t, req, http.StatusAccepted)
  141. assert.Equal(t, uuid, resp.Header().Get("Docker-Upload-Uuid"))
  142. assert.Equal(t, contentRange, resp.Header().Get("Range"))
  143. pbu, err = packages_model.GetBlobUploadByID(db.DefaultContext, uuid)
  144. assert.NoError(t, err)
  145. assert.EqualValues(t, len(blobContent), pbu.BytesReceived)
  146. uploadURL = resp.Header().Get("Location")
  147. req = NewRequest(t, "PUT", fmt.Sprintf("%s?digest=%s", setting.AppURL+uploadURL[1:], blobDigest))
  148. addTokenAuthHeader(req, userToken)
  149. resp = MakeRequest(t, req, http.StatusCreated)
  150. assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location"))
  151. assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
  152. })
  153. for _, tag := range tags {
  154. t.Run(fmt.Sprintf("[Tag:%s]", tag), func(t *testing.T) {
  155. t.Run("UploadManifest", func(t *testing.T) {
  156. defer PrintCurrentTest(t)()
  157. req := NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, configDigest), strings.NewReader(configContent))
  158. addTokenAuthHeader(req, userToken)
  159. MakeRequest(t, req, http.StatusCreated)
  160. req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
  161. addTokenAuthHeader(req, anonymousToken)
  162. req.Header.Set("Content-Type", oci.MediaTypeDockerManifest)
  163. MakeRequest(t, req, http.StatusUnauthorized)
  164. req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
  165. addTokenAuthHeader(req, userToken)
  166. req.Header.Set("Content-Type", oci.MediaTypeDockerManifest)
  167. resp := MakeRequest(t, req, http.StatusCreated)
  168. assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
  169. pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, tag)
  170. assert.NoError(t, err)
  171. pd, err := packages_model.GetPackageDescriptor(db.DefaultContext, pv)
  172. assert.NoError(t, err)
  173. assert.Nil(t, pd.SemVer)
  174. assert.Equal(t, image, pd.Package.Name)
  175. assert.Equal(t, tag, pd.Version.Version)
  176. assert.True(t, has(pd.Properties, container_module.PropertyManifestTagged))
  177. assert.IsType(t, &container_module.Metadata{}, pd.Metadata)
  178. metadata := pd.Metadata.(*container_module.Metadata)
  179. assert.Equal(t, container_module.TypeOCI, metadata.Type)
  180. assert.Len(t, metadata.ImageLayers, 2)
  181. assert.Empty(t, metadata.MultiArch)
  182. assert.Len(t, pd.Files, 3)
  183. for _, pfd := range pd.Files {
  184. switch pfd.File.Name {
  185. case container_model.ManifestFilename:
  186. assert.True(t, pfd.File.IsLead)
  187. assert.Equal(t, oci.MediaTypeDockerManifest, pfd.Properties.GetByName(container_module.PropertyMediaType))
  188. assert.Equal(t, manifestDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
  189. case strings.Replace(configDigest, ":", "_", 1):
  190. assert.False(t, pfd.File.IsLead)
  191. assert.Equal(t, "application/vnd.docker.container.image.v1+json", pfd.Properties.GetByName(container_module.PropertyMediaType))
  192. assert.Equal(t, configDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
  193. case strings.Replace(blobDigest, ":", "_", 1):
  194. assert.False(t, pfd.File.IsLead)
  195. assert.Equal(t, "application/vnd.docker.image.rootfs.diff.tar.gzip", pfd.Properties.GetByName(container_module.PropertyMediaType))
  196. assert.Equal(t, blobDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
  197. default:
  198. assert.Fail(t, "unknown file: %s", pfd.File.Name)
  199. }
  200. }
  201. // Overwrite existing tag
  202. req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
  203. addTokenAuthHeader(req, userToken)
  204. req.Header.Set("Content-Type", oci.MediaTypeDockerManifest)
  205. MakeRequest(t, req, http.StatusCreated)
  206. })
  207. t.Run("HeadManifest", func(t *testing.T) {
  208. defer PrintCurrentTest(t)()
  209. req := NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/unknown-tag", url))
  210. addTokenAuthHeader(req, userToken)
  211. MakeRequest(t, req, http.StatusNotFound)
  212. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, tag))
  213. addTokenAuthHeader(req, userToken)
  214. resp := MakeRequest(t, req, http.StatusOK)
  215. assert.Equal(t, fmt.Sprintf("%d", len(manifestContent)), resp.Header().Get("Content-Length"))
  216. assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
  217. })
  218. t.Run("GetManifest", func(t *testing.T) {
  219. defer PrintCurrentTest(t)()
  220. req := NewRequest(t, "GET", fmt.Sprintf("%s/manifests/unknown-tag", url))
  221. addTokenAuthHeader(req, userToken)
  222. MakeRequest(t, req, http.StatusNotFound)
  223. req = NewRequest(t, "GET", fmt.Sprintf("%s/manifests/%s", url, tag))
  224. addTokenAuthHeader(req, userToken)
  225. resp := MakeRequest(t, req, http.StatusOK)
  226. assert.Equal(t, fmt.Sprintf("%d", len(manifestContent)), resp.Header().Get("Content-Length"))
  227. assert.Equal(t, oci.MediaTypeDockerManifest, resp.Header().Get("Content-Type"))
  228. assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
  229. assert.Equal(t, manifestContent, resp.Body.String())
  230. })
  231. })
  232. }
  233. t.Run("UploadUntaggedManifest", func(t *testing.T) {
  234. defer PrintCurrentTest(t)()
  235. req := NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest), strings.NewReader(untaggedManifestContent))
  236. addTokenAuthHeader(req, userToken)
  237. req.Header.Set("Content-Type", oci.MediaTypeImageManifest)
  238. resp := MakeRequest(t, req, http.StatusCreated)
  239. assert.Equal(t, untaggedManifestDigest, resp.Header().Get("Docker-Content-Digest"))
  240. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest))
  241. addTokenAuthHeader(req, userToken)
  242. resp = MakeRequest(t, req, http.StatusOK)
  243. assert.Equal(t, fmt.Sprintf("%d", len(untaggedManifestContent)), resp.Header().Get("Content-Length"))
  244. assert.Equal(t, untaggedManifestDigest, resp.Header().Get("Docker-Content-Digest"))
  245. pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, untaggedManifestDigest)
  246. assert.NoError(t, err)
  247. pd, err := packages_model.GetPackageDescriptor(db.DefaultContext, pv)
  248. assert.NoError(t, err)
  249. assert.Nil(t, pd.SemVer)
  250. assert.Equal(t, image, pd.Package.Name)
  251. assert.Equal(t, untaggedManifestDigest, pd.Version.Version)
  252. assert.False(t, has(pd.Properties, container_module.PropertyManifestTagged))
  253. assert.IsType(t, &container_module.Metadata{}, pd.Metadata)
  254. assert.Len(t, pd.Files, 3)
  255. for _, pfd := range pd.Files {
  256. if pfd.File.Name == container_model.ManifestFilename {
  257. assert.True(t, pfd.File.IsLead)
  258. assert.Equal(t, oci.MediaTypeImageManifest, pfd.Properties.GetByName(container_module.PropertyMediaType))
  259. assert.Equal(t, untaggedManifestDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
  260. }
  261. }
  262. })
  263. t.Run("UploadIndexManifest", func(t *testing.T) {
  264. defer PrintCurrentTest(t)()
  265. req := NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, multiTag), strings.NewReader(indexManifestContent))
  266. addTokenAuthHeader(req, userToken)
  267. req.Header.Set("Content-Type", oci.MediaTypeImageIndex)
  268. resp := MakeRequest(t, req, http.StatusCreated)
  269. assert.Equal(t, indexManifestDigest, resp.Header().Get("Docker-Content-Digest"))
  270. pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, multiTag)
  271. assert.NoError(t, err)
  272. pd, err := packages_model.GetPackageDescriptor(db.DefaultContext, pv)
  273. assert.NoError(t, err)
  274. assert.Nil(t, pd.SemVer)
  275. assert.Equal(t, image, pd.Package.Name)
  276. assert.Equal(t, multiTag, pd.Version.Version)
  277. assert.True(t, has(pd.Properties, container_module.PropertyManifestTagged))
  278. getAllByName := func(l packages_model.PackagePropertyList, name string) []string {
  279. values := make([]string, 0, len(l))
  280. for _, pp := range l {
  281. if pp.Name == name {
  282. values = append(values, pp.Value)
  283. }
  284. }
  285. return values
  286. }
  287. assert.ElementsMatch(t, []string{manifestDigest, untaggedManifestDigest}, getAllByName(pd.Properties, container_module.PropertyManifestReference))
  288. assert.IsType(t, &container_module.Metadata{}, pd.Metadata)
  289. metadata := pd.Metadata.(*container_module.Metadata)
  290. assert.Equal(t, container_module.TypeOCI, metadata.Type)
  291. assert.Contains(t, metadata.MultiArch, "linux/arm/v7")
  292. assert.Equal(t, manifestDigest, metadata.MultiArch["linux/arm/v7"])
  293. assert.Contains(t, metadata.MultiArch, "linux/arm64/v8")
  294. assert.Equal(t, untaggedManifestDigest, metadata.MultiArch["linux/arm64/v8"])
  295. assert.Len(t, pd.Files, 1)
  296. assert.True(t, pd.Files[0].File.IsLead)
  297. assert.Equal(t, oci.MediaTypeImageIndex, pd.Files[0].Properties.GetByName(container_module.PropertyMediaType))
  298. assert.Equal(t, indexManifestDigest, pd.Files[0].Properties.GetByName(container_module.PropertyDigest))
  299. })
  300. t.Run("UploadBlob/Mount", func(t *testing.T) {
  301. defer PrintCurrentTest(t)()
  302. req := NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads?mount=%s", url, unknownDigest))
  303. addTokenAuthHeader(req, userToken)
  304. MakeRequest(t, req, http.StatusAccepted)
  305. req = NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads?mount=%s", url, blobDigest))
  306. addTokenAuthHeader(req, userToken)
  307. resp := MakeRequest(t, req, http.StatusCreated)
  308. assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location"))
  309. assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
  310. })
  311. t.Run("HeadBlob", func(t *testing.T) {
  312. defer PrintCurrentTest(t)()
  313. req := NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, unknownDigest))
  314. addTokenAuthHeader(req, userToken)
  315. MakeRequest(t, req, http.StatusNotFound)
  316. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
  317. addTokenAuthHeader(req, userToken)
  318. resp := MakeRequest(t, req, http.StatusOK)
  319. assert.Equal(t, fmt.Sprintf("%d", len(blobContent)), resp.Header().Get("Content-Length"))
  320. assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
  321. })
  322. t.Run("GetBlob", func(t *testing.T) {
  323. defer PrintCurrentTest(t)()
  324. req := NewRequest(t, "GET", fmt.Sprintf("%s/blobs/%s", url, unknownDigest))
  325. addTokenAuthHeader(req, userToken)
  326. MakeRequest(t, req, http.StatusNotFound)
  327. req = NewRequest(t, "GET", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
  328. addTokenAuthHeader(req, userToken)
  329. resp := MakeRequest(t, req, http.StatusOK)
  330. assert.Equal(t, fmt.Sprintf("%d", len(blobContent)), resp.Header().Get("Content-Length"))
  331. assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
  332. assert.Equal(t, blobContent, resp.Body.Bytes())
  333. })
  334. t.Run("GetTagList", func(t *testing.T) {
  335. defer PrintCurrentTest(t)()
  336. cases := []struct {
  337. URL string
  338. ExpectedTags []string
  339. ExpectedLink string
  340. }{
  341. {
  342. URL: fmt.Sprintf("%s/tags/list", url),
  343. ExpectedTags: []string{"latest", "main", "multi"},
  344. ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=multi>; rel="next"`, user.Name, image),
  345. },
  346. {
  347. URL: fmt.Sprintf("%s/tags/list?n=0", url),
  348. ExpectedTags: []string{},
  349. ExpectedLink: "",
  350. },
  351. {
  352. URL: fmt.Sprintf("%s/tags/list?n=2", url),
  353. ExpectedTags: []string{"latest", "main"},
  354. ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=main&n=2>; rel="next"`, user.Name, image),
  355. },
  356. {
  357. URL: fmt.Sprintf("%s/tags/list?last=main", url),
  358. ExpectedTags: []string{"multi"},
  359. ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=multi>; rel="next"`, user.Name, image),
  360. },
  361. {
  362. URL: fmt.Sprintf("%s/tags/list?n=1&last=latest", url),
  363. ExpectedTags: []string{"main"},
  364. ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=main&n=1>; rel="next"`, user.Name, image),
  365. },
  366. }
  367. for _, c := range cases {
  368. req := NewRequest(t, "GET", c.URL)
  369. addTokenAuthHeader(req, userToken)
  370. resp := MakeRequest(t, req, http.StatusOK)
  371. type TagList struct {
  372. Name string `json:"name"`
  373. Tags []string `json:"tags"`
  374. }
  375. tagList := &TagList{}
  376. DecodeJSON(t, resp, &tagList)
  377. assert.Equal(t, user.Name+"/"+image, tagList.Name)
  378. assert.Equal(t, c.ExpectedTags, tagList.Tags)
  379. assert.Equal(t, c.ExpectedLink, resp.Header().Get("Link"))
  380. }
  381. req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s?type=container&q=%s", user.Name, image))
  382. resp := MakeRequest(t, req, http.StatusOK)
  383. var apiPackages []*api.Package
  384. DecodeJSON(t, resp, &apiPackages)
  385. assert.Len(t, apiPackages, 4) // "latest", "main", "multi", "sha256:..."
  386. })
  387. t.Run("Delete", func(t *testing.T) {
  388. t.Run("Blob", func(t *testing.T) {
  389. defer PrintCurrentTest(t)()
  390. req := NewRequest(t, "DELETE", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
  391. addTokenAuthHeader(req, userToken)
  392. MakeRequest(t, req, http.StatusAccepted)
  393. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
  394. addTokenAuthHeader(req, userToken)
  395. MakeRequest(t, req, http.StatusNotFound)
  396. })
  397. t.Run("ManifestByDigest", func(t *testing.T) {
  398. defer PrintCurrentTest(t)()
  399. req := NewRequest(t, "DELETE", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest))
  400. addTokenAuthHeader(req, userToken)
  401. MakeRequest(t, req, http.StatusAccepted)
  402. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest))
  403. addTokenAuthHeader(req, userToken)
  404. MakeRequest(t, req, http.StatusNotFound)
  405. })
  406. t.Run("ManifestByTag", func(t *testing.T) {
  407. defer PrintCurrentTest(t)()
  408. req := NewRequest(t, "DELETE", fmt.Sprintf("%s/manifests/%s", url, multiTag))
  409. addTokenAuthHeader(req, userToken)
  410. MakeRequest(t, req, http.StatusAccepted)
  411. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, multiTag))
  412. addTokenAuthHeader(req, userToken)
  413. MakeRequest(t, req, http.StatusNotFound)
  414. })
  415. })
  416. })
  417. }
  418. }