drone/registry/app/api/controller/metadata/get_artifacts_docker_layers.go

197 lines
6.1 KiB
Go

// Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
m "github.com/harness/gitness/registry/app/manifest"
"github.com/harness/gitness/registry/app/manifest/ocischema"
"github.com/harness/gitness/registry/app/manifest/schema2"
"github.com/harness/gitness/registry/app/pkg/docker"
"github.com/harness/gitness/registry/types"
store2 "github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/distribution/distribution/v3/registry/api/errcode"
"github.com/opencontainers/go-digest"
"github.com/rs/zerolog/log"
)
const (
KB = 1024
MB = 1024 * KB
GB = 1024 * MB
DefaultSize = "0 B"
)
func (c *APIController) GetDockerArtifactLayers(
ctx context.Context,
r artifact.GetDockerArtifactLayersRequestObject,
) (artifact.GetDockerArtifactLayersResponseObject, error) {
regInfo, _ := c.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
space, err := c.SpaceStore.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetDockerArtifactLayers400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := GetPermissionChecks(space, regInfo.RegistryIdentifier, enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetDockerArtifactLayers403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
manifestDigest := string(r.Params.Digest)
image := string(r.Artifact)
dgst, err := types.NewDigest(digest.Digest(manifestDigest))
if err != nil {
return getLayersErrorResponse(ctx, err)
}
registry, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.parentID, regInfo.RegistryIdentifier)
if err != nil {
return getLayersErrorResponse(ctx, err)
}
if registry == nil {
return getLayersErrorResponse(ctx, fmt.Errorf("repository not found"))
}
m, err := c.ManifestStore.FindManifestByDigest(ctx, registry.ID, image, dgst)
if err != nil {
if errors.Is(err, store2.ErrResourceNotFound) {
return getLayersErrorResponse(ctx, fmt.Errorf("manifest not found"))
}
return getLayersErrorResponse(ctx, err)
}
mConfig, err := getManifestConfig(ctx, m.Configuration.Digest, regInfo.RootIdentifier, c.StorageDriver)
if err != nil {
return getLayersErrorResponse(ctx, err)
}
layersSummary := &artifact.DockerLayersSummary{
Digest: m.Digest.String(),
}
if mConfig != nil {
osArch := fmt.Sprintf("%s/%s", mConfig.Os, mConfig.Arch)
layersSummary.OsArch = &osArch
var historyLayers []artifact.DockerLayerEntry
manifest, err := docker.DBManifestToManifest(m)
if err != nil {
return getLayersErrorResponse(ctx, fmt.Errorf("failed to convert DB manifest to manifest: %w", err))
}
layers, err := getManifestLayers(manifest)
if err != nil {
return getLayersErrorResponse(ctx, err)
}
layerIndex := 0
for _, history := range mConfig.History {
var layerEntry = &artifact.DockerLayerEntry{
Command: history.CreatedBy,
}
sizeString := DefaultSize
if !history.EmptyLayer && len(layers) > layerIndex {
sizeString = GetSizeString(layers[layerIndex].Size)
layerIndex++
}
layerEntry.Size = &sizeString
historyLayers = append(
historyLayers, *layerEntry,
)
}
layersSummary.Layers = &historyLayers
} else {
return getLayersErrorResponse(ctx, fmt.Errorf("manifest config not found"))
}
return artifact.GetDockerArtifactLayers200JSONResponse{
DockerLayersResponseJSONResponse: artifact.DockerLayersResponseJSONResponse{
Data: *layersSummary,
Status: artifact.StatusSUCCESS,
},
}, nil
}
func getLayersErrorResponse(ctx context.Context, err error) (artifact.GetDockerArtifactLayersResponseObject, error) {
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to get layers: %v", err)
}
return artifact.GetDockerArtifactLayers500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
func getManifestLayers(
manifest m.Manifest,
) ([]m.Descriptor, error) {
switch manifest.(type) {
case *schema2.DeserializedManifest:
deserializedManifest := &schema2.DeserializedManifest{}
mediaType, bytes, _ := manifest.Payload()
err := deserializedManifest.UnmarshalJSON(bytes)
if err != nil {
return nil, fmt.Errorf("failed to unmarshal %s manifest: %w", mediaType, err)
}
return deserializedManifest.Layers(), nil
case *ocischema.DeserializedManifest:
deserializedManifest := &ocischema.DeserializedManifest{}
mediaType, bytes, _ := manifest.Payload()
err := deserializedManifest.UnmarshalJSON(bytes)
if err != nil {
return nil, fmt.Errorf("failed to unmarshal %s manifest: %w", mediaType, err)
}
return deserializedManifest.Layers(), nil
default:
return nil, errcode.ErrorCodeManifestInvalid.WithDetail("manifest type unsupported")
}
}
func GetSizeString(size int64) string {
switch {
case size >= GB:
return fmt.Sprintf("%.2f GB", float64(size)/float64(GB))
case size >= MB:
return fmt.Sprintf("%.2f MB", float64(size)/float64(MB))
case size >= KB:
return fmt.Sprintf("%.2f KB", float64(size)/float64(KB))
default:
return fmt.Sprintf("%d B", size)
}
}