You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

api_packages_container_test.go 30KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720
  1. // Copyright 2022 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package integration
  4. import (
  5. "bytes"
  6. "encoding/base64"
  7. "fmt"
  8. "net/http"
  9. "strings"
  10. "sync"
  11. "testing"
  12. auth_model "code.gitea.io/gitea/models/auth"
  13. "code.gitea.io/gitea/models/db"
  14. packages_model "code.gitea.io/gitea/models/packages"
  15. container_model "code.gitea.io/gitea/models/packages/container"
  16. "code.gitea.io/gitea/models/unittest"
  17. user_model "code.gitea.io/gitea/models/user"
  18. container_module "code.gitea.io/gitea/modules/packages/container"
  19. "code.gitea.io/gitea/modules/setting"
  20. api "code.gitea.io/gitea/modules/structs"
  21. "code.gitea.io/gitea/modules/test"
  22. "code.gitea.io/gitea/tests"
  23. "github.com/minio/sha256-simd"
  24. oci "github.com/opencontainers/image-spec/specs-go/v1"
  25. "github.com/stretchr/testify/assert"
  26. )
  27. func TestPackageContainer(t *testing.T) {
  28. defer tests.PrepareTestEnv(t)()
  29. user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
  30. session := loginUser(t, user.Name)
  31. token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadPackage)
  32. privateUser := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 31})
  33. has := func(l packages_model.PackagePropertyList, name string) bool {
  34. for _, pp := range l {
  35. if pp.Name == name {
  36. return true
  37. }
  38. }
  39. return false
  40. }
  41. getAllByName := func(l packages_model.PackagePropertyList, name string) []string {
  42. values := make([]string, 0, len(l))
  43. for _, pp := range l {
  44. if pp.Name == name {
  45. values = append(values, pp.Value)
  46. }
  47. }
  48. return values
  49. }
  50. images := []string{"test", "te/st"}
  51. tags := []string{"latest", "main"}
  52. multiTag := "multi"
  53. unknownDigest := "sha256:0000000000000000000000000000000000000000000000000000000000000000"
  54. blobDigest := "sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4"
  55. blobContent, _ := base64.StdEncoding.DecodeString(`H4sIAAAJbogA/2IYBaNgFIxYAAgAAP//Lq+17wAEAAA=`)
  56. configDigest := "sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d"
  57. configContent := `{"architecture":"amd64","config":{"Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/true"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"container":"b89fe92a887d55c0961f02bdfbfd8ac3ddf66167db374770d2d9e9fab3311510","container_config":{"Hostname":"b89fe92a887d","Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/bin/sh","-c","#(nop) ","CMD [\"/true\"]"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"created":"2022-01-01T00:00:00.000000000Z","docker_version":"20.10.12","history":[{"created":"2022-01-01T00:00:00.000000000Z","created_by":"/bin/sh -c #(nop) COPY file:0e7589b0c800daaf6fa460d2677101e4676dd9491980210cb345480e513f3602 in /true "},{"created":"2022-01-01T00:00:00.000000001Z","created_by":"/bin/sh -c #(nop) CMD [\"/true\"]","empty_layer":true}],"os":"linux","rootfs":{"type":"layers","diff_ids":["sha256:0ff3b91bdf21ecdf2f2f3d4372c2098a14dbe06cd678e8f0a85fd4902d00e2e2"]}}`
  58. manifestDigest := "sha256:4f10484d1c1bb13e3956b4de1cd42db8e0f14a75be1617b60f2de3cd59c803c6"
  59. manifestContent := `{"schemaVersion":2,"mediaType":"application/vnd.docker.distribution.manifest.v2+json","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}`
  60. untaggedManifestDigest := "sha256:4305f5f5572b9a426b88909b036e52ee3cf3d7b9c1b01fac840e90747f56623d"
  61. untaggedManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}`
  62. indexManifestDigest := "sha256:bab112d6efb9e7f221995caaaa880352feb5bd8b1faf52fae8d12c113aa123ec"
  63. indexManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageIndex + `","manifests":[{"mediaType":"application/vnd.docker.distribution.manifest.v2+json","digest":"` + manifestDigest + `","platform":{"os":"linux","architecture":"arm","variant":"v7"}},{"mediaType":"` + oci.MediaTypeImageManifest + `","digest":"` + untaggedManifestDigest + `","platform":{"os":"linux","architecture":"arm64","variant":"v8"}}]}`
  64. anonymousToken := ""
  65. userToken := ""
  66. t.Run("Authenticate", func(t *testing.T) {
  67. type TokenResponse struct {
  68. Token string `json:"token"`
  69. }
  70. authenticate := []string{`Bearer realm="` + setting.AppURL + `v2/token",service="container_registry",scope="*"`}
  71. t.Run("Anonymous", func(t *testing.T) {
  72. defer tests.PrintCurrentTest(t)()
  73. req := NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
  74. resp := MakeRequest(t, req, http.StatusUnauthorized)
  75. assert.ElementsMatch(t, authenticate, resp.Header().Values("WWW-Authenticate"))
  76. req = NewRequest(t, "GET", fmt.Sprintf("%sv2/token", setting.AppURL))
  77. resp = MakeRequest(t, req, http.StatusOK)
  78. tokenResponse := &TokenResponse{}
  79. DecodeJSON(t, resp, &tokenResponse)
  80. assert.NotEmpty(t, tokenResponse.Token)
  81. anonymousToken = fmt.Sprintf("Bearer %s", tokenResponse.Token)
  82. req = NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
  83. addTokenAuthHeader(req, anonymousToken)
  84. MakeRequest(t, req, http.StatusOK)
  85. defer test.MockVariableValue(&setting.Service.RequireSignInView, true)()
  86. req = NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
  87. MakeRequest(t, req, http.StatusUnauthorized)
  88. req = NewRequest(t, "GET", fmt.Sprintf("%sv2/token", setting.AppURL))
  89. MakeRequest(t, req, http.StatusUnauthorized)
  90. })
  91. t.Run("User", func(t *testing.T) {
  92. defer tests.PrintCurrentTest(t)()
  93. req := NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
  94. resp := MakeRequest(t, req, http.StatusUnauthorized)
  95. assert.ElementsMatch(t, authenticate, resp.Header().Values("WWW-Authenticate"))
  96. req = NewRequest(t, "GET", fmt.Sprintf("%sv2/token", setting.AppURL))
  97. req = AddBasicAuthHeader(req, user.Name)
  98. resp = MakeRequest(t, req, http.StatusOK)
  99. tokenResponse := &TokenResponse{}
  100. DecodeJSON(t, resp, &tokenResponse)
  101. assert.NotEmpty(t, tokenResponse.Token)
  102. userToken = fmt.Sprintf("Bearer %s", tokenResponse.Token)
  103. req = NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
  104. addTokenAuthHeader(req, userToken)
  105. MakeRequest(t, req, http.StatusOK)
  106. })
  107. })
  108. t.Run("DetermineSupport", func(t *testing.T) {
  109. defer tests.PrintCurrentTest(t)()
  110. req := NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL))
  111. addTokenAuthHeader(req, userToken)
  112. resp := MakeRequest(t, req, http.StatusOK)
  113. assert.Equal(t, "registry/2.0", resp.Header().Get("Docker-Distribution-Api-Version"))
  114. })
  115. for _, image := range images {
  116. t.Run(fmt.Sprintf("[Image:%s]", image), func(t *testing.T) {
  117. url := fmt.Sprintf("%sv2/%s/%s", setting.AppURL, user.Name, image)
  118. t.Run("UploadBlob/Monolithic", func(t *testing.T) {
  119. defer tests.PrintCurrentTest(t)()
  120. req := NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads", url))
  121. addTokenAuthHeader(req, anonymousToken)
  122. MakeRequest(t, req, http.StatusUnauthorized)
  123. req = NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, unknownDigest), bytes.NewReader(blobContent))
  124. addTokenAuthHeader(req, userToken)
  125. MakeRequest(t, req, http.StatusBadRequest)
  126. req = NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, blobDigest), bytes.NewReader(blobContent))
  127. addTokenAuthHeader(req, userToken)
  128. resp := MakeRequest(t, req, http.StatusCreated)
  129. assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location"))
  130. assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
  131. pv, err := packages_model.GetInternalVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, container_model.UploadVersion)
  132. assert.NoError(t, err)
  133. pfs, err := packages_model.GetFilesByVersionID(db.DefaultContext, pv.ID)
  134. assert.NoError(t, err)
  135. assert.Len(t, pfs, 1)
  136. pb, err := packages_model.GetBlobByID(db.DefaultContext, pfs[0].BlobID)
  137. assert.NoError(t, err)
  138. assert.EqualValues(t, len(blobContent), pb.Size)
  139. })
  140. t.Run("UploadBlob/Chunked", func(t *testing.T) {
  141. defer tests.PrintCurrentTest(t)()
  142. req := NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads", url))
  143. addTokenAuthHeader(req, userToken)
  144. resp := MakeRequest(t, req, http.StatusAccepted)
  145. uuid := resp.Header().Get("Docker-Upload-Uuid")
  146. assert.NotEmpty(t, uuid)
  147. pbu, err := packages_model.GetBlobUploadByID(db.DefaultContext, uuid)
  148. assert.NoError(t, err)
  149. assert.EqualValues(t, 0, pbu.BytesReceived)
  150. uploadURL := resp.Header().Get("Location")
  151. assert.NotEmpty(t, uploadURL)
  152. req = NewRequestWithBody(t, "PATCH", setting.AppURL+uploadURL[1:]+"000", bytes.NewReader(blobContent))
  153. addTokenAuthHeader(req, userToken)
  154. MakeRequest(t, req, http.StatusNotFound)
  155. req = NewRequestWithBody(t, "PATCH", setting.AppURL+uploadURL[1:], bytes.NewReader(blobContent))
  156. addTokenAuthHeader(req, userToken)
  157. req.Header.Set("Content-Range", "1-10")
  158. MakeRequest(t, req, http.StatusRequestedRangeNotSatisfiable)
  159. contentRange := fmt.Sprintf("0-%d", len(blobContent)-1)
  160. req.Header.Set("Content-Range", contentRange)
  161. resp = MakeRequest(t, req, http.StatusAccepted)
  162. assert.Equal(t, uuid, resp.Header().Get("Docker-Upload-Uuid"))
  163. assert.Equal(t, contentRange, resp.Header().Get("Range"))
  164. uploadURL = resp.Header().Get("Location")
  165. req = NewRequest(t, "GET", setting.AppURL+uploadURL[1:])
  166. addTokenAuthHeader(req, userToken)
  167. resp = MakeRequest(t, req, http.StatusNoContent)
  168. assert.Equal(t, uuid, resp.Header().Get("Docker-Upload-Uuid"))
  169. assert.Equal(t, fmt.Sprintf("0-%d", len(blobContent)), resp.Header().Get("Range"))
  170. pbu, err = packages_model.GetBlobUploadByID(db.DefaultContext, uuid)
  171. assert.NoError(t, err)
  172. assert.EqualValues(t, len(blobContent), pbu.BytesReceived)
  173. req = NewRequest(t, "PUT", fmt.Sprintf("%s?digest=%s", setting.AppURL+uploadURL[1:], blobDigest))
  174. addTokenAuthHeader(req, userToken)
  175. resp = MakeRequest(t, req, http.StatusCreated)
  176. assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location"))
  177. assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
  178. t.Run("Cancel", func(t *testing.T) {
  179. defer tests.PrintCurrentTest(t)()
  180. req := NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads", url))
  181. addTokenAuthHeader(req, userToken)
  182. resp := MakeRequest(t, req, http.StatusAccepted)
  183. uuid := resp.Header().Get("Docker-Upload-Uuid")
  184. assert.NotEmpty(t, uuid)
  185. uploadURL := resp.Header().Get("Location")
  186. assert.NotEmpty(t, uploadURL)
  187. req = NewRequest(t, "GET", setting.AppURL+uploadURL[1:])
  188. addTokenAuthHeader(req, userToken)
  189. resp = MakeRequest(t, req, http.StatusNoContent)
  190. assert.Equal(t, uuid, resp.Header().Get("Docker-Upload-Uuid"))
  191. assert.Equal(t, "0-0", resp.Header().Get("Range"))
  192. req = NewRequest(t, "DELETE", setting.AppURL+uploadURL[1:])
  193. addTokenAuthHeader(req, userToken)
  194. MakeRequest(t, req, http.StatusNoContent)
  195. req = NewRequest(t, "GET", setting.AppURL+uploadURL[1:])
  196. addTokenAuthHeader(req, userToken)
  197. MakeRequest(t, req, http.StatusNotFound)
  198. })
  199. })
  200. t.Run("UploadBlob/Mount", func(t *testing.T) {
  201. defer tests.PrintCurrentTest(t)()
  202. privateBlobDigest := "sha256:6ccce4863b70f258d691f59609d31b4502e1ba5199942d3bc5d35d17a4ce771d"
  203. req := NewRequestWithBody(t, "POST", fmt.Sprintf("%sv2/%s/%s/blobs/uploads?digest=%s", setting.AppURL, privateUser.Name, image, privateBlobDigest), strings.NewReader("gitea"))
  204. req = AddBasicAuthHeader(req, privateUser.Name)
  205. MakeRequest(t, req, http.StatusCreated)
  206. req = NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads?mount=%s", url, unknownDigest))
  207. addTokenAuthHeader(req, userToken)
  208. MakeRequest(t, req, http.StatusAccepted)
  209. req = NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads?mount=%s", url, privateBlobDigest))
  210. addTokenAuthHeader(req, userToken)
  211. MakeRequest(t, req, http.StatusAccepted)
  212. req = NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads?mount=%s", url, blobDigest))
  213. addTokenAuthHeader(req, userToken)
  214. resp := MakeRequest(t, req, http.StatusCreated)
  215. assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location"))
  216. assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
  217. req = NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads?mount=%s&from=%s", url, unknownDigest, "unknown/image"))
  218. addTokenAuthHeader(req, userToken)
  219. MakeRequest(t, req, http.StatusAccepted)
  220. req = NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads?mount=%s&from=%s/%s", url, blobDigest, user.Name, image))
  221. addTokenAuthHeader(req, userToken)
  222. resp = MakeRequest(t, req, http.StatusCreated)
  223. assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location"))
  224. assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
  225. })
  226. for _, tag := range tags {
  227. t.Run(fmt.Sprintf("[Tag:%s]", tag), func(t *testing.T) {
  228. t.Run("UploadManifest", func(t *testing.T) {
  229. defer tests.PrintCurrentTest(t)()
  230. req := NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, configDigest), strings.NewReader(configContent))
  231. addTokenAuthHeader(req, userToken)
  232. MakeRequest(t, req, http.StatusCreated)
  233. req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
  234. addTokenAuthHeader(req, anonymousToken)
  235. req.Header.Set("Content-Type", "application/vnd.docker.distribution.manifest.v2+json")
  236. MakeRequest(t, req, http.StatusUnauthorized)
  237. req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
  238. addTokenAuthHeader(req, userToken)
  239. req.Header.Set("Content-Type", "application/vnd.docker.distribution.manifest.v2+json")
  240. resp := MakeRequest(t, req, http.StatusCreated)
  241. assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
  242. pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, tag)
  243. assert.NoError(t, err)
  244. pd, err := packages_model.GetPackageDescriptor(db.DefaultContext, pv)
  245. assert.NoError(t, err)
  246. assert.Nil(t, pd.SemVer)
  247. assert.Equal(t, image, pd.Package.Name)
  248. assert.Equal(t, tag, pd.Version.Version)
  249. assert.ElementsMatch(t, []string{strings.ToLower(user.LowerName + "/" + image)}, getAllByName(pd.PackageProperties, container_module.PropertyRepository))
  250. assert.True(t, has(pd.VersionProperties, container_module.PropertyManifestTagged))
  251. assert.IsType(t, &container_module.Metadata{}, pd.Metadata)
  252. metadata := pd.Metadata.(*container_module.Metadata)
  253. assert.Equal(t, container_module.TypeOCI, metadata.Type)
  254. assert.Len(t, metadata.ImageLayers, 2)
  255. assert.Empty(t, metadata.Manifests)
  256. assert.Len(t, pd.Files, 3)
  257. for _, pfd := range pd.Files {
  258. switch pfd.File.Name {
  259. case container_model.ManifestFilename:
  260. assert.True(t, pfd.File.IsLead)
  261. assert.Equal(t, "application/vnd.docker.distribution.manifest.v2+json", pfd.Properties.GetByName(container_module.PropertyMediaType))
  262. assert.Equal(t, manifestDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
  263. case strings.Replace(configDigest, ":", "_", 1):
  264. assert.False(t, pfd.File.IsLead)
  265. assert.Equal(t, "application/vnd.docker.container.image.v1+json", pfd.Properties.GetByName(container_module.PropertyMediaType))
  266. assert.Equal(t, configDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
  267. case strings.Replace(blobDigest, ":", "_", 1):
  268. assert.False(t, pfd.File.IsLead)
  269. assert.Equal(t, "application/vnd.docker.image.rootfs.diff.tar.gzip", pfd.Properties.GetByName(container_module.PropertyMediaType))
  270. assert.Equal(t, blobDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
  271. default:
  272. assert.Fail(t, "unknown file: %s", pfd.File.Name)
  273. }
  274. }
  275. req = NewRequest(t, "GET", fmt.Sprintf("%s/manifests/%s", url, tag))
  276. addTokenAuthHeader(req, userToken)
  277. MakeRequest(t, req, http.StatusOK)
  278. pv, err = packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, tag)
  279. assert.NoError(t, err)
  280. assert.EqualValues(t, 1, pv.DownloadCount)
  281. // Overwrite existing tag should keep the download count
  282. req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent))
  283. addTokenAuthHeader(req, userToken)
  284. req.Header.Set("Content-Type", oci.MediaTypeImageManifest)
  285. MakeRequest(t, req, http.StatusCreated)
  286. pv, err = packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, tag)
  287. assert.NoError(t, err)
  288. assert.EqualValues(t, 1, pv.DownloadCount)
  289. })
  290. t.Run("HeadManifest", func(t *testing.T) {
  291. defer tests.PrintCurrentTest(t)()
  292. req := NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/unknown-tag", url))
  293. addTokenAuthHeader(req, userToken)
  294. MakeRequest(t, req, http.StatusNotFound)
  295. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, tag))
  296. addTokenAuthHeader(req, userToken)
  297. resp := MakeRequest(t, req, http.StatusOK)
  298. assert.Equal(t, fmt.Sprintf("%d", len(manifestContent)), resp.Header().Get("Content-Length"))
  299. assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
  300. })
  301. t.Run("GetManifest", func(t *testing.T) {
  302. defer tests.PrintCurrentTest(t)()
  303. req := NewRequest(t, "GET", fmt.Sprintf("%s/manifests/unknown-tag", url))
  304. addTokenAuthHeader(req, userToken)
  305. MakeRequest(t, req, http.StatusNotFound)
  306. req = NewRequest(t, "GET", fmt.Sprintf("%s/manifests/%s", url, tag))
  307. addTokenAuthHeader(req, userToken)
  308. resp := MakeRequest(t, req, http.StatusOK)
  309. assert.Equal(t, fmt.Sprintf("%d", len(manifestContent)), resp.Header().Get("Content-Length"))
  310. assert.Equal(t, oci.MediaTypeImageManifest, resp.Header().Get("Content-Type"))
  311. assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest"))
  312. assert.Equal(t, manifestContent, resp.Body.String())
  313. })
  314. })
  315. }
  316. t.Run("UploadUntaggedManifest", func(t *testing.T) {
  317. defer tests.PrintCurrentTest(t)()
  318. req := NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest), strings.NewReader(untaggedManifestContent))
  319. addTokenAuthHeader(req, userToken)
  320. req.Header.Set("Content-Type", oci.MediaTypeImageManifest)
  321. resp := MakeRequest(t, req, http.StatusCreated)
  322. assert.Equal(t, untaggedManifestDigest, resp.Header().Get("Docker-Content-Digest"))
  323. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest))
  324. addTokenAuthHeader(req, userToken)
  325. resp = MakeRequest(t, req, http.StatusOK)
  326. assert.Equal(t, fmt.Sprintf("%d", len(untaggedManifestContent)), resp.Header().Get("Content-Length"))
  327. assert.Equal(t, untaggedManifestDigest, resp.Header().Get("Docker-Content-Digest"))
  328. pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, untaggedManifestDigest)
  329. assert.NoError(t, err)
  330. pd, err := packages_model.GetPackageDescriptor(db.DefaultContext, pv)
  331. assert.NoError(t, err)
  332. assert.Nil(t, pd.SemVer)
  333. assert.Equal(t, image, pd.Package.Name)
  334. assert.Equal(t, untaggedManifestDigest, pd.Version.Version)
  335. assert.ElementsMatch(t, []string{strings.ToLower(user.LowerName + "/" + image)}, getAllByName(pd.PackageProperties, container_module.PropertyRepository))
  336. assert.False(t, has(pd.VersionProperties, container_module.PropertyManifestTagged))
  337. assert.IsType(t, &container_module.Metadata{}, pd.Metadata)
  338. assert.Len(t, pd.Files, 3)
  339. for _, pfd := range pd.Files {
  340. if pfd.File.Name == container_model.ManifestFilename {
  341. assert.True(t, pfd.File.IsLead)
  342. assert.Equal(t, oci.MediaTypeImageManifest, pfd.Properties.GetByName(container_module.PropertyMediaType))
  343. assert.Equal(t, untaggedManifestDigest, pfd.Properties.GetByName(container_module.PropertyDigest))
  344. }
  345. }
  346. })
  347. t.Run("UploadIndexManifest", func(t *testing.T) {
  348. defer tests.PrintCurrentTest(t)()
  349. req := NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, multiTag), strings.NewReader(indexManifestContent))
  350. addTokenAuthHeader(req, userToken)
  351. req.Header.Set("Content-Type", oci.MediaTypeImageIndex)
  352. resp := MakeRequest(t, req, http.StatusCreated)
  353. assert.Equal(t, indexManifestDigest, resp.Header().Get("Docker-Content-Digest"))
  354. pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, multiTag)
  355. assert.NoError(t, err)
  356. pd, err := packages_model.GetPackageDescriptor(db.DefaultContext, pv)
  357. assert.NoError(t, err)
  358. assert.Nil(t, pd.SemVer)
  359. assert.Equal(t, image, pd.Package.Name)
  360. assert.Equal(t, multiTag, pd.Version.Version)
  361. assert.ElementsMatch(t, []string{strings.ToLower(user.LowerName + "/" + image)}, getAllByName(pd.PackageProperties, container_module.PropertyRepository))
  362. assert.True(t, has(pd.VersionProperties, container_module.PropertyManifestTagged))
  363. assert.ElementsMatch(t, []string{manifestDigest, untaggedManifestDigest}, getAllByName(pd.VersionProperties, container_module.PropertyManifestReference))
  364. assert.IsType(t, &container_module.Metadata{}, pd.Metadata)
  365. metadata := pd.Metadata.(*container_module.Metadata)
  366. assert.Equal(t, container_module.TypeOCI, metadata.Type)
  367. assert.Len(t, metadata.Manifests, 2)
  368. assert.Condition(t, func() bool {
  369. for _, m := range metadata.Manifests {
  370. switch m.Platform {
  371. case "linux/arm/v7":
  372. assert.Equal(t, manifestDigest, m.Digest)
  373. assert.EqualValues(t, 1524, m.Size)
  374. case "linux/arm64/v8":
  375. assert.Equal(t, untaggedManifestDigest, m.Digest)
  376. assert.EqualValues(t, 1514, m.Size)
  377. default:
  378. return false
  379. }
  380. }
  381. return true
  382. })
  383. assert.Len(t, pd.Files, 1)
  384. assert.True(t, pd.Files[0].File.IsLead)
  385. assert.Equal(t, oci.MediaTypeImageIndex, pd.Files[0].Properties.GetByName(container_module.PropertyMediaType))
  386. assert.Equal(t, indexManifestDigest, pd.Files[0].Properties.GetByName(container_module.PropertyDigest))
  387. })
  388. t.Run("HeadBlob", func(t *testing.T) {
  389. defer tests.PrintCurrentTest(t)()
  390. req := NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, unknownDigest))
  391. addTokenAuthHeader(req, userToken)
  392. MakeRequest(t, req, http.StatusNotFound)
  393. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
  394. addTokenAuthHeader(req, userToken)
  395. resp := MakeRequest(t, req, http.StatusOK)
  396. assert.Equal(t, fmt.Sprintf("%d", len(blobContent)), resp.Header().Get("Content-Length"))
  397. assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
  398. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
  399. addTokenAuthHeader(req, anonymousToken)
  400. MakeRequest(t, req, http.StatusOK)
  401. })
  402. t.Run("GetBlob", func(t *testing.T) {
  403. defer tests.PrintCurrentTest(t)()
  404. req := NewRequest(t, "GET", fmt.Sprintf("%s/blobs/%s", url, unknownDigest))
  405. addTokenAuthHeader(req, userToken)
  406. MakeRequest(t, req, http.StatusNotFound)
  407. req = NewRequest(t, "GET", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
  408. addTokenAuthHeader(req, userToken)
  409. resp := MakeRequest(t, req, http.StatusOK)
  410. assert.Equal(t, fmt.Sprintf("%d", len(blobContent)), resp.Header().Get("Content-Length"))
  411. assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest"))
  412. assert.Equal(t, blobContent, resp.Body.Bytes())
  413. })
  414. t.Run("GetTagList", func(t *testing.T) {
  415. defer tests.PrintCurrentTest(t)()
  416. cases := []struct {
  417. URL string
  418. ExpectedTags []string
  419. ExpectedLink string
  420. }{
  421. {
  422. URL: fmt.Sprintf("%s/tags/list", url),
  423. ExpectedTags: []string{"latest", "main", "multi"},
  424. ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=multi>; rel="next"`, user.Name, image),
  425. },
  426. {
  427. URL: fmt.Sprintf("%s/tags/list?n=0", url),
  428. ExpectedTags: []string{},
  429. ExpectedLink: "",
  430. },
  431. {
  432. URL: fmt.Sprintf("%s/tags/list?n=2", url),
  433. ExpectedTags: []string{"latest", "main"},
  434. ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=main&n=2>; rel="next"`, user.Name, image),
  435. },
  436. {
  437. URL: fmt.Sprintf("%s/tags/list?last=main", url),
  438. ExpectedTags: []string{"multi"},
  439. ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=multi>; rel="next"`, user.Name, image),
  440. },
  441. {
  442. URL: fmt.Sprintf("%s/tags/list?n=1&last=latest", url),
  443. ExpectedTags: []string{"main"},
  444. ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=main&n=1>; rel="next"`, user.Name, image),
  445. },
  446. }
  447. for _, c := range cases {
  448. req := NewRequest(t, "GET", c.URL)
  449. addTokenAuthHeader(req, userToken)
  450. resp := MakeRequest(t, req, http.StatusOK)
  451. type TagList struct {
  452. Name string `json:"name"`
  453. Tags []string `json:"tags"`
  454. }
  455. tagList := &TagList{}
  456. DecodeJSON(t, resp, &tagList)
  457. assert.Equal(t, user.Name+"/"+image, tagList.Name)
  458. assert.Equal(t, c.ExpectedTags, tagList.Tags)
  459. assert.Equal(t, c.ExpectedLink, resp.Header().Get("Link"))
  460. }
  461. req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s?type=container&q=%s&token=%s", user.Name, image, token))
  462. resp := MakeRequest(t, req, http.StatusOK)
  463. var apiPackages []*api.Package
  464. DecodeJSON(t, resp, &apiPackages)
  465. assert.Len(t, apiPackages, 4) // "latest", "main", "multi", "sha256:..."
  466. })
  467. t.Run("Delete", func(t *testing.T) {
  468. t.Run("Blob", func(t *testing.T) {
  469. defer tests.PrintCurrentTest(t)()
  470. req := NewRequest(t, "DELETE", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
  471. addTokenAuthHeader(req, userToken)
  472. MakeRequest(t, req, http.StatusAccepted)
  473. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, blobDigest))
  474. addTokenAuthHeader(req, userToken)
  475. MakeRequest(t, req, http.StatusNotFound)
  476. })
  477. t.Run("ManifestByDigest", func(t *testing.T) {
  478. defer tests.PrintCurrentTest(t)()
  479. req := NewRequest(t, "DELETE", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest))
  480. addTokenAuthHeader(req, userToken)
  481. MakeRequest(t, req, http.StatusAccepted)
  482. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest))
  483. addTokenAuthHeader(req, userToken)
  484. MakeRequest(t, req, http.StatusNotFound)
  485. })
  486. t.Run("ManifestByTag", func(t *testing.T) {
  487. defer tests.PrintCurrentTest(t)()
  488. req := NewRequest(t, "DELETE", fmt.Sprintf("%s/manifests/%s", url, multiTag))
  489. addTokenAuthHeader(req, userToken)
  490. MakeRequest(t, req, http.StatusAccepted)
  491. req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, multiTag))
  492. addTokenAuthHeader(req, userToken)
  493. MakeRequest(t, req, http.StatusNotFound)
  494. })
  495. })
  496. })
  497. }
  498. // https://github.com/go-gitea/gitea/issues/19586
  499. t.Run("ParallelUpload", func(t *testing.T) {
  500. defer tests.PrintCurrentTest(t)()
  501. url := fmt.Sprintf("%sv2/%s/parallel", setting.AppURL, user.Name)
  502. var wg sync.WaitGroup
  503. for i := 0; i < 10; i++ {
  504. wg.Add(1)
  505. content := []byte{byte(i)}
  506. digest := fmt.Sprintf("sha256:%x", sha256.Sum256(content))
  507. go func() {
  508. defer wg.Done()
  509. req := NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, digest), bytes.NewReader(content))
  510. addTokenAuthHeader(req, userToken)
  511. resp := MakeRequest(t, req, http.StatusCreated)
  512. assert.Equal(t, digest, resp.Header().Get("Docker-Content-Digest"))
  513. }()
  514. }
  515. wg.Wait()
  516. })
  517. t.Run("OwnerNameChange", func(t *testing.T) {
  518. defer tests.PrintCurrentTest(t)()
  519. checkCatalog := func(owner string) func(t *testing.T) {
  520. return func(t *testing.T) {
  521. defer tests.PrintCurrentTest(t)()
  522. req := NewRequest(t, "GET", fmt.Sprintf("%sv2/_catalog", setting.AppURL))
  523. addTokenAuthHeader(req, userToken)
  524. resp := MakeRequest(t, req, http.StatusOK)
  525. type RepositoryList struct {
  526. Repositories []string `json:"repositories"`
  527. }
  528. repoList := &RepositoryList{}
  529. DecodeJSON(t, resp, &repoList)
  530. assert.Len(t, repoList.Repositories, len(images))
  531. names := make([]string, 0, len(images))
  532. for _, image := range images {
  533. names = append(names, strings.ToLower(owner+"/"+image))
  534. }
  535. assert.ElementsMatch(t, names, repoList.Repositories)
  536. }
  537. }
  538. t.Run(fmt.Sprintf("Catalog[%s]", user.LowerName), checkCatalog(user.LowerName))
  539. session := loginUser(t, user.Name)
  540. newOwnerName := "newUsername"
  541. req := NewRequestWithValues(t, "POST", "/user/settings", map[string]string{
  542. "_csrf": GetCSRF(t, session, "/user/settings"),
  543. "name": newOwnerName,
  544. "email": "user2@example.com",
  545. "language": "en-US",
  546. })
  547. session.MakeRequest(t, req, http.StatusSeeOther)
  548. t.Run(fmt.Sprintf("Catalog[%s]", newOwnerName), checkCatalog(newOwnerName))
  549. req = NewRequestWithValues(t, "POST", "/user/settings", map[string]string{
  550. "_csrf": GetCSRF(t, session, "/user/settings"),
  551. "name": user.Name,
  552. "email": "user2@example.com",
  553. "language": "en-US",
  554. })
  555. session.MakeRequest(t, req, http.StatusSeeOther)
  556. })
  557. }