2014-11-22 03:39:52 +00:00
|
|
|
package storage
|
|
|
|
|
|
|
|
import (
|
2015-01-14 20:02:43 +00:00
|
|
|
"bytes"
|
2014-11-22 03:39:52 +00:00
|
|
|
"reflect"
|
|
|
|
"testing"
|
|
|
|
|
2014-12-24 00:01:38 +00:00
|
|
|
"github.com/docker/distribution/digest"
|
2015-01-02 21:21:29 +00:00
|
|
|
"github.com/docker/distribution/manifest"
|
2014-12-24 00:01:38 +00:00
|
|
|
"github.com/docker/distribution/storagedriver/inmemory"
|
2015-01-02 21:21:29 +00:00
|
|
|
"github.com/docker/libtrust"
|
2014-11-22 03:39:52 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestManifestStorage(t *testing.T) {
|
|
|
|
driver := inmemory.New()
|
2015-01-14 20:02:43 +00:00
|
|
|
pm := pathMapper{
|
|
|
|
root: "/storage/testing",
|
|
|
|
version: storagePathVersion,
|
|
|
|
}
|
|
|
|
bs := blobStore{
|
2014-11-22 03:39:52 +00:00
|
|
|
driver: driver,
|
2015-01-14 20:02:43 +00:00
|
|
|
pm: &pm,
|
|
|
|
}
|
|
|
|
ms := &manifestStore{
|
|
|
|
driver: driver,
|
|
|
|
pathMapper: &pm,
|
|
|
|
revisionStore: &revisionStore{
|
|
|
|
driver: driver,
|
|
|
|
pathMapper: &pm,
|
|
|
|
blobStore: &bs,
|
2014-11-22 03:39:52 +00:00
|
|
|
},
|
2015-01-14 20:02:43 +00:00
|
|
|
tagStore: &tagStore{
|
|
|
|
driver: driver,
|
|
|
|
pathMapper: &pm,
|
|
|
|
blobStore: &bs,
|
|
|
|
},
|
|
|
|
blobStore: &bs,
|
2014-11-22 03:39:52 +00:00
|
|
|
layerService: newMockedLayerService(),
|
|
|
|
}
|
|
|
|
|
|
|
|
name := "foo/bar"
|
|
|
|
tag := "thetag"
|
|
|
|
|
|
|
|
exists, err := ms.Exists(name, tag)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error checking manifest existence: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if exists {
|
|
|
|
t.Fatalf("manifest should not exist")
|
|
|
|
}
|
|
|
|
|
2014-11-26 20:52:52 +00:00
|
|
|
if _, err := ms.Get(name, tag); true {
|
|
|
|
switch err.(type) {
|
|
|
|
case ErrUnknownManifest:
|
|
|
|
break
|
|
|
|
default:
|
|
|
|
t.Fatalf("expected manifest unknown error: %#v", err)
|
|
|
|
}
|
2014-11-22 03:39:52 +00:00
|
|
|
}
|
|
|
|
|
2015-01-02 23:46:47 +00:00
|
|
|
m := manifest.Manifest{
|
2015-01-02 21:21:29 +00:00
|
|
|
Versioned: manifest.Versioned{
|
2014-11-22 03:39:52 +00:00
|
|
|
SchemaVersion: 1,
|
|
|
|
},
|
|
|
|
Name: name,
|
|
|
|
Tag: tag,
|
2015-01-02 21:21:29 +00:00
|
|
|
FSLayers: []manifest.FSLayer{
|
2014-11-22 03:39:52 +00:00
|
|
|
{
|
|
|
|
BlobSum: "asdf",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
BlobSum: "qwer",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
pk, err := libtrust.GenerateECP256PrivateKey()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error generating private key: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-01-02 23:46:47 +00:00
|
|
|
sm, err := manifest.Sign(&m, pk)
|
2014-11-22 03:39:52 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error signing manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = ms.Put(name, tag, sm)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected errors putting manifest")
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(stevvooe): We expect errors describing all of the missing layers.
|
|
|
|
|
|
|
|
ms.layerService.(*mockedExistenceLayerService).add(name, "asdf")
|
|
|
|
ms.layerService.(*mockedExistenceLayerService).add(name, "qwer")
|
|
|
|
|
|
|
|
if err = ms.Put(name, tag, sm); err != nil {
|
|
|
|
t.Fatalf("unexpected error putting manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
exists, err = ms.Exists(name, tag)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error checking manifest existence: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !exists {
|
|
|
|
t.Fatalf("manifest should exist")
|
|
|
|
}
|
|
|
|
|
|
|
|
fetchedManifest, err := ms.Get(name, tag)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error fetching manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !reflect.DeepEqual(fetchedManifest, sm) {
|
|
|
|
t.Fatalf("fetched manifest not equal: %#v != %#v", fetchedManifest, sm)
|
|
|
|
}
|
2014-12-09 19:06:51 +00:00
|
|
|
|
2015-01-14 20:02:43 +00:00
|
|
|
fetchedJWS, err := libtrust.ParsePrettySignature(fetchedManifest.Raw, "signatures")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error parsing jws: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
payload, err := fetchedJWS.Payload()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error extracting payload: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sigs, err := fetchedJWS.Signatures()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to extract signatures: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(sigs) != 1 {
|
|
|
|
t.Fatalf("unexpected number of signatures: %d != %d", len(sigs), 1)
|
|
|
|
}
|
|
|
|
|
2014-12-09 19:06:51 +00:00
|
|
|
// Grabs the tags and check that this tagged manifest is present
|
|
|
|
tags, err := ms.Tags(name)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error fetching tags: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(tags) != 1 {
|
|
|
|
t.Fatalf("unexpected tags returned: %v", tags)
|
|
|
|
}
|
|
|
|
|
|
|
|
if tags[0] != tag {
|
|
|
|
t.Fatalf("unexpected tag found in tags: %v != %v", tags, []string{tag})
|
|
|
|
}
|
2015-01-14 20:02:43 +00:00
|
|
|
|
|
|
|
// Now, push the same manifest with a different key
|
|
|
|
pk2, err := libtrust.GenerateECP256PrivateKey()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error generating private key: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sm2, err := manifest.Sign(&m, pk2)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error signing manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
jws2, err := libtrust.ParsePrettySignature(sm2.Raw, "signatures")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error parsing signature: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sigs2, err := jws2.Signatures()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to extract signatures: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(sigs2) != 1 {
|
|
|
|
t.Fatalf("unexpected number of signatures: %d != %d", len(sigs2), 1)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = ms.Put(name, tag, sm2); err != nil {
|
|
|
|
t.Fatalf("unexpected error putting manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
fetched, err := ms.Get(name, tag)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error fetching manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := manifest.Verify(fetched); err != nil {
|
|
|
|
t.Fatalf("unexpected error verifying manifest: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assemble our payload and two signatures to get what we expect!
|
|
|
|
expectedJWS, err := libtrust.NewJSONSignature(payload, sigs[0], sigs2[0])
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error merging jws: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
expectedSigs, err := expectedJWS.Signatures()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error getting expected signatures: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
receivedJWS, err := libtrust.ParsePrettySignature(fetched.Raw, "signatures")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error parsing jws: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
receivedPayload, err := receivedJWS.Payload()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error extracting received payload: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(receivedPayload, payload) {
|
|
|
|
t.Fatalf("payloads are not equal")
|
|
|
|
}
|
|
|
|
|
|
|
|
receivedSigs, err := receivedJWS.Signatures()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error getting signatures: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, sig := range receivedSigs {
|
|
|
|
if !bytes.Equal(sig, expectedSigs[i]) {
|
|
|
|
t.Fatalf("mismatched signatures from remote: %v != %v", string(sig), string(expectedSigs[i]))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := ms.Delete(name, tag); err != nil {
|
|
|
|
t.Fatalf("unexpected error deleting manifest: %v", err)
|
|
|
|
}
|
2014-11-22 03:39:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type layerKey struct {
|
|
|
|
name string
|
|
|
|
digest digest.Digest
|
|
|
|
}
|
|
|
|
|
|
|
|
type mockedExistenceLayerService struct {
|
|
|
|
exists map[layerKey]struct{}
|
|
|
|
}
|
|
|
|
|
|
|
|
func newMockedLayerService() *mockedExistenceLayerService {
|
|
|
|
return &mockedExistenceLayerService{
|
|
|
|
exists: make(map[layerKey]struct{}),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var _ LayerService = &mockedExistenceLayerService{}
|
|
|
|
|
|
|
|
func (mels *mockedExistenceLayerService) add(name string, digest digest.Digest) {
|
|
|
|
mels.exists[layerKey{name: name, digest: digest}] = struct{}{}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mels *mockedExistenceLayerService) remove(name string, digest digest.Digest) {
|
|
|
|
delete(mels.exists, layerKey{name: name, digest: digest})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mels *mockedExistenceLayerService) Exists(name string, digest digest.Digest) (bool, error) {
|
|
|
|
_, ok := mels.exists[layerKey{name: name, digest: digest}]
|
|
|
|
return ok, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mockedExistenceLayerService) Fetch(name string, digest digest.Digest) (Layer, error) {
|
|
|
|
panic("not implemented")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mockedExistenceLayerService) Upload(name string) (LayerUpload, error) {
|
|
|
|
panic("not implemented")
|
|
|
|
}
|
|
|
|
|
Spool layer uploads to remote storage
To smooth initial implementation, uploads were spooled to local file storage,
validated, then pushed to remote storage. That approach was flawed in that it
present easy clustering of registry services that share a remote storage
backend. The original plan was to implement resumable hashes then implement
remote upload storage. After some thought, it was found to be better to get
remote spooling working, then optimize with resumable hashes.
Moving to this approach has tradeoffs: after storing the complete upload
remotely, the node must fetch the content and validate it before moving it to
the final location. This can double bandwidth usage to the remote backend.
Modifying the verification and upload code to store intermediate hashes should
be trivial once the layer digest format has settled.
The largest changes for users of the storage package (mostly the registry app)
are the LayerService interface and the LayerUpload interface. The LayerService
now takes qualified repository names to start and resume uploads. In corallry,
the concept of LayerUploadState has been complete removed, exposing all aspects
of that state as part of the LayerUpload object. The LayerUpload object has
been modified to work as an io.WriteSeeker and includes a StartedAt time, to
allow for upload timeout policies. Finish now only requires a digest, eliding
the requirement for a size parameter.
Resource cleanup has taken a turn for the better. Resources are cleaned up
after successful uploads and during a cancel call. Admittedly, this is probably
not completely where we want to be. It's recommend that we bolster this with a
periodic driver utility script that scans for partial uploads and deletes the
underlying data. As a small benefit, we can leave these around to better
understand how and why these uploads are failing, at the cost of some extra
disk space.
Many other changes follow from the changes above. The webapp needs to be
updated to meet the new interface requirements.
Signed-off-by: Stephen J Day <stephen.day@docker.com>
2015-01-08 22:24:02 +00:00
|
|
|
func (mockedExistenceLayerService) Resume(name, uuid string) (LayerUpload, error) {
|
2014-11-22 03:39:52 +00:00
|
|
|
panic("not implemented")
|
|
|
|
}
|