441 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			441 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
   Copyright The containerd Authors.
 | 
						|
 | 
						|
   Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
   you may not use this file except in compliance with the License.
 | 
						|
   You may obtain a copy of the License at
 | 
						|
 | 
						|
       http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
   Unless required by applicable law or agreed to in writing, software
 | 
						|
   distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
   See the License for the specific language governing permissions and
 | 
						|
   limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package images
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
	"sort"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/containerd/containerd/content"
 | 
						|
	"github.com/containerd/containerd/errdefs"
 | 
						|
	"github.com/containerd/containerd/log"
 | 
						|
	"github.com/containerd/containerd/platforms"
 | 
						|
	digest "github.com/opencontainers/go-digest"
 | 
						|
	ocispec "github.com/opencontainers/image-spec/specs-go/v1"
 | 
						|
)
 | 
						|
 | 
						|
// Image provides the model for how containerd views container images.
 | 
						|
type Image struct {
 | 
						|
	// Name of the image.
 | 
						|
	//
 | 
						|
	// To be pulled, it must be a reference compatible with resolvers.
 | 
						|
	//
 | 
						|
	// This field is required.
 | 
						|
	Name string
 | 
						|
 | 
						|
	// Labels provide runtime decoration for the image record.
 | 
						|
	//
 | 
						|
	// There is no default behavior for how these labels are propagated. They
 | 
						|
	// only decorate the static metadata object.
 | 
						|
	//
 | 
						|
	// This field is optional.
 | 
						|
	Labels map[string]string
 | 
						|
 | 
						|
	// Target describes the root content for this image. Typically, this is
 | 
						|
	// a manifest, index or manifest list.
 | 
						|
	Target ocispec.Descriptor
 | 
						|
 | 
						|
	CreatedAt, UpdatedAt time.Time
 | 
						|
}
 | 
						|
 | 
						|
// DeleteOptions provide options on image delete
 | 
						|
type DeleteOptions struct {
 | 
						|
	Synchronous bool
 | 
						|
}
 | 
						|
 | 
						|
// DeleteOpt allows configuring a delete operation
 | 
						|
type DeleteOpt func(context.Context, *DeleteOptions) error
 | 
						|
 | 
						|
// SynchronousDelete is used to indicate that an image deletion and removal of
 | 
						|
// the image resources should occur synchronously before returning a result.
 | 
						|
func SynchronousDelete() DeleteOpt {
 | 
						|
	return func(ctx context.Context, o *DeleteOptions) error {
 | 
						|
		o.Synchronous = true
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// Store and interact with images
 | 
						|
type Store interface {
 | 
						|
	Get(ctx context.Context, name string) (Image, error)
 | 
						|
	List(ctx context.Context, filters ...string) ([]Image, error)
 | 
						|
	Create(ctx context.Context, image Image) (Image, error)
 | 
						|
 | 
						|
	// Update will replace the data in the store with the provided image. If
 | 
						|
	// one or more fieldpaths are provided, only those fields will be updated.
 | 
						|
	Update(ctx context.Context, image Image, fieldpaths ...string) (Image, error)
 | 
						|
 | 
						|
	Delete(ctx context.Context, name string, opts ...DeleteOpt) error
 | 
						|
}
 | 
						|
 | 
						|
// TODO(stevvooe): Many of these functions make strong platform assumptions,
 | 
						|
// which are untrue in a lot of cases. More refactoring must be done here to
 | 
						|
// make this work in all cases.
 | 
						|
 | 
						|
// Config resolves the image configuration descriptor.
 | 
						|
//
 | 
						|
// The caller can then use the descriptor to resolve and process the
 | 
						|
// configuration of the image.
 | 
						|
func (image *Image) Config(ctx context.Context, provider content.Provider, platform platforms.MatchComparer) (ocispec.Descriptor, error) {
 | 
						|
	return Config(ctx, provider, image.Target, platform)
 | 
						|
}
 | 
						|
 | 
						|
// RootFS returns the unpacked diffids that make up and images rootfs.
 | 
						|
//
 | 
						|
// These are used to verify that a set of layers unpacked to the expected
 | 
						|
// values.
 | 
						|
func (image *Image) RootFS(ctx context.Context, provider content.Provider, platform platforms.MatchComparer) ([]digest.Digest, error) {
 | 
						|
	desc, err := image.Config(ctx, provider, platform)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	return RootFS(ctx, provider, desc)
 | 
						|
}
 | 
						|
 | 
						|
// Size returns the total size of an image's packed resources.
 | 
						|
func (image *Image) Size(ctx context.Context, provider content.Provider, platform platforms.MatchComparer) (int64, error) {
 | 
						|
	var size int64
 | 
						|
	return size, Walk(ctx, Handlers(HandlerFunc(func(ctx context.Context, desc ocispec.Descriptor) ([]ocispec.Descriptor, error) {
 | 
						|
		if desc.Size < 0 {
 | 
						|
			return nil, fmt.Errorf("invalid size %v in %v (%v)", desc.Size, desc.Digest, desc.MediaType)
 | 
						|
		}
 | 
						|
		size += desc.Size
 | 
						|
		return nil, nil
 | 
						|
	}), LimitManifests(FilterPlatforms(ChildrenHandler(provider), platform), platform, 1)), image.Target)
 | 
						|
}
 | 
						|
 | 
						|
type platformManifest struct {
 | 
						|
	p *ocispec.Platform
 | 
						|
	m *ocispec.Manifest
 | 
						|
}
 | 
						|
 | 
						|
// Manifest resolves a manifest from the image for the given platform.
 | 
						|
//
 | 
						|
// When a manifest descriptor inside of a manifest index does not have
 | 
						|
// a platform defined, the platform from the image config is considered.
 | 
						|
//
 | 
						|
// If the descriptor points to a non-index manifest, then the manifest is
 | 
						|
// unmarshalled and returned without considering the platform inside of the
 | 
						|
// config.
 | 
						|
//
 | 
						|
// TODO(stevvooe): This violates the current platform agnostic approach to this
 | 
						|
// package by returning a specific manifest type. We'll need to refactor this
 | 
						|
// to return a manifest descriptor or decide that we want to bring the API in
 | 
						|
// this direction because this abstraction is not needed.
 | 
						|
func Manifest(ctx context.Context, provider content.Provider, image ocispec.Descriptor, platform platforms.MatchComparer) (ocispec.Manifest, error) {
 | 
						|
	var (
 | 
						|
		limit    = 1
 | 
						|
		m        []platformManifest
 | 
						|
		wasIndex bool
 | 
						|
	)
 | 
						|
 | 
						|
	if err := Walk(ctx, HandlerFunc(func(ctx context.Context, desc ocispec.Descriptor) ([]ocispec.Descriptor, error) {
 | 
						|
		switch desc.MediaType {
 | 
						|
		case MediaTypeDockerSchema2Manifest, ocispec.MediaTypeImageManifest:
 | 
						|
			p, err := content.ReadBlob(ctx, provider, desc)
 | 
						|
			if err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
 | 
						|
			if err := validateMediaType(p, desc.MediaType); err != nil {
 | 
						|
				return nil, fmt.Errorf("manifest: invalid desc %s: %w", desc.Digest, err)
 | 
						|
			}
 | 
						|
 | 
						|
			var manifest ocispec.Manifest
 | 
						|
			if err := json.Unmarshal(p, &manifest); err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
 | 
						|
			if desc.Digest != image.Digest && platform != nil {
 | 
						|
				if desc.Platform != nil && !platform.Match(*desc.Platform) {
 | 
						|
					return nil, nil
 | 
						|
				}
 | 
						|
 | 
						|
				if desc.Platform == nil {
 | 
						|
					p, err := content.ReadBlob(ctx, provider, manifest.Config)
 | 
						|
					if err != nil {
 | 
						|
						return nil, err
 | 
						|
					}
 | 
						|
 | 
						|
					var image ocispec.Image
 | 
						|
					if err := json.Unmarshal(p, &image); err != nil {
 | 
						|
						return nil, err
 | 
						|
					}
 | 
						|
 | 
						|
					if !platform.Match(platforms.Normalize(ocispec.Platform{OS: image.OS, Architecture: image.Architecture})) {
 | 
						|
						return nil, nil
 | 
						|
					}
 | 
						|
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			m = append(m, platformManifest{
 | 
						|
				p: desc.Platform,
 | 
						|
				m: &manifest,
 | 
						|
			})
 | 
						|
 | 
						|
			return nil, nil
 | 
						|
		case MediaTypeDockerSchema2ManifestList, ocispec.MediaTypeImageIndex:
 | 
						|
			p, err := content.ReadBlob(ctx, provider, desc)
 | 
						|
			if err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
 | 
						|
			if err := validateMediaType(p, desc.MediaType); err != nil {
 | 
						|
				return nil, fmt.Errorf("manifest: invalid desc %s: %w", desc.Digest, err)
 | 
						|
			}
 | 
						|
 | 
						|
			var idx ocispec.Index
 | 
						|
			if err := json.Unmarshal(p, &idx); err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
 | 
						|
			if platform == nil {
 | 
						|
				return idx.Manifests, nil
 | 
						|
			}
 | 
						|
 | 
						|
			var descs []ocispec.Descriptor
 | 
						|
			for _, d := range idx.Manifests {
 | 
						|
				if d.Platform == nil || platform.Match(*d.Platform) {
 | 
						|
					descs = append(descs, d)
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			sort.SliceStable(descs, func(i, j int) bool {
 | 
						|
				if descs[i].Platform == nil {
 | 
						|
					return false
 | 
						|
				}
 | 
						|
				if descs[j].Platform == nil {
 | 
						|
					return true
 | 
						|
				}
 | 
						|
				return platform.Less(*descs[i].Platform, *descs[j].Platform)
 | 
						|
			})
 | 
						|
 | 
						|
			wasIndex = true
 | 
						|
 | 
						|
			if len(descs) > limit {
 | 
						|
				return descs[:limit], nil
 | 
						|
			}
 | 
						|
			return descs, nil
 | 
						|
		}
 | 
						|
		return nil, fmt.Errorf("unexpected media type %v for %v: %w", desc.MediaType, desc.Digest, errdefs.ErrNotFound)
 | 
						|
	}), image); err != nil {
 | 
						|
		return ocispec.Manifest{}, err
 | 
						|
	}
 | 
						|
 | 
						|
	if len(m) == 0 {
 | 
						|
		err := fmt.Errorf("manifest %v: %w", image.Digest, errdefs.ErrNotFound)
 | 
						|
		if wasIndex {
 | 
						|
			err = fmt.Errorf("no match for platform in manifest %v: %w", image.Digest, errdefs.ErrNotFound)
 | 
						|
		}
 | 
						|
		return ocispec.Manifest{}, err
 | 
						|
	}
 | 
						|
	return *m[0].m, nil
 | 
						|
}
 | 
						|
 | 
						|
// Config resolves the image configuration descriptor using a content provided
 | 
						|
// to resolve child resources on the image.
 | 
						|
//
 | 
						|
// The caller can then use the descriptor to resolve and process the
 | 
						|
// configuration of the image.
 | 
						|
func Config(ctx context.Context, provider content.Provider, image ocispec.Descriptor, platform platforms.MatchComparer) (ocispec.Descriptor, error) {
 | 
						|
	manifest, err := Manifest(ctx, provider, image, platform)
 | 
						|
	if err != nil {
 | 
						|
		return ocispec.Descriptor{}, err
 | 
						|
	}
 | 
						|
	return manifest.Config, err
 | 
						|
}
 | 
						|
 | 
						|
// Platforms returns one or more platforms supported by the image.
 | 
						|
func Platforms(ctx context.Context, provider content.Provider, image ocispec.Descriptor) ([]ocispec.Platform, error) {
 | 
						|
	var platformSpecs []ocispec.Platform
 | 
						|
	return platformSpecs, Walk(ctx, Handlers(HandlerFunc(func(ctx context.Context, desc ocispec.Descriptor) ([]ocispec.Descriptor, error) {
 | 
						|
		if desc.Platform != nil {
 | 
						|
			platformSpecs = append(platformSpecs, *desc.Platform)
 | 
						|
			return nil, ErrSkipDesc
 | 
						|
		}
 | 
						|
 | 
						|
		switch desc.MediaType {
 | 
						|
		case MediaTypeDockerSchema2Config, ocispec.MediaTypeImageConfig:
 | 
						|
			p, err := content.ReadBlob(ctx, provider, desc)
 | 
						|
			if err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
 | 
						|
			var image ocispec.Image
 | 
						|
			if err := json.Unmarshal(p, &image); err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
 | 
						|
			platformSpecs = append(platformSpecs,
 | 
						|
				platforms.Normalize(ocispec.Platform{OS: image.OS, Architecture: image.Architecture}))
 | 
						|
		}
 | 
						|
		return nil, nil
 | 
						|
	}), ChildrenHandler(provider)), image)
 | 
						|
}
 | 
						|
 | 
						|
// Check returns nil if the all components of an image are available in the
 | 
						|
// provider for the specified platform.
 | 
						|
//
 | 
						|
// If available is true, the caller can assume that required represents the
 | 
						|
// complete set of content required for the image.
 | 
						|
//
 | 
						|
// missing will have the components that are part of required but not available
 | 
						|
// in the provider.
 | 
						|
//
 | 
						|
// If there is a problem resolving content, an error will be returned.
 | 
						|
func Check(ctx context.Context, provider content.Provider, image ocispec.Descriptor, platform platforms.MatchComparer) (available bool, required, present, missing []ocispec.Descriptor, err error) {
 | 
						|
	mfst, err := Manifest(ctx, provider, image, platform)
 | 
						|
	if err != nil {
 | 
						|
		if errdefs.IsNotFound(err) {
 | 
						|
			return false, []ocispec.Descriptor{image}, nil, []ocispec.Descriptor{image}, nil
 | 
						|
		}
 | 
						|
 | 
						|
		return false, nil, nil, nil, fmt.Errorf("failed to check image %v: %w", image.Digest, err)
 | 
						|
	}
 | 
						|
 | 
						|
	// TODO(stevvooe): It is possible that referenced components could have
 | 
						|
	// children, but this is rare. For now, we ignore this and only verify
 | 
						|
	// that manifest components are present.
 | 
						|
	required = append([]ocispec.Descriptor{mfst.Config}, mfst.Layers...)
 | 
						|
 | 
						|
	for _, desc := range required {
 | 
						|
		ra, err := provider.ReaderAt(ctx, desc)
 | 
						|
		if err != nil {
 | 
						|
			if errdefs.IsNotFound(err) {
 | 
						|
				missing = append(missing, desc)
 | 
						|
				continue
 | 
						|
			} else {
 | 
						|
				return false, nil, nil, nil, fmt.Errorf("failed to check image %v: %w", desc.Digest, err)
 | 
						|
			}
 | 
						|
		}
 | 
						|
		ra.Close()
 | 
						|
		present = append(present, desc)
 | 
						|
 | 
						|
	}
 | 
						|
 | 
						|
	return true, required, present, missing, nil
 | 
						|
}
 | 
						|
 | 
						|
// Children returns the immediate children of content described by the descriptor.
 | 
						|
func Children(ctx context.Context, provider content.Provider, desc ocispec.Descriptor) ([]ocispec.Descriptor, error) {
 | 
						|
	var descs []ocispec.Descriptor
 | 
						|
	switch desc.MediaType {
 | 
						|
	case MediaTypeDockerSchema2Manifest, ocispec.MediaTypeImageManifest:
 | 
						|
		p, err := content.ReadBlob(ctx, provider, desc)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		if err := validateMediaType(p, desc.MediaType); err != nil {
 | 
						|
			return nil, fmt.Errorf("children: invalid desc %s: %w", desc.Digest, err)
 | 
						|
		}
 | 
						|
 | 
						|
		// TODO(stevvooe): We just assume oci manifest, for now. There may be
 | 
						|
		// subtle differences from the docker version.
 | 
						|
		var manifest ocispec.Manifest
 | 
						|
		if err := json.Unmarshal(p, &manifest); err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		descs = append(descs, manifest.Config)
 | 
						|
		descs = append(descs, manifest.Layers...)
 | 
						|
	case MediaTypeDockerSchema2ManifestList, ocispec.MediaTypeImageIndex:
 | 
						|
		p, err := content.ReadBlob(ctx, provider, desc)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		if err := validateMediaType(p, desc.MediaType); err != nil {
 | 
						|
			return nil, fmt.Errorf("children: invalid desc %s: %w", desc.Digest, err)
 | 
						|
		}
 | 
						|
 | 
						|
		var index ocispec.Index
 | 
						|
		if err := json.Unmarshal(p, &index); err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		descs = append(descs, index.Manifests...)
 | 
						|
	default:
 | 
						|
		if IsLayerType(desc.MediaType) || IsKnownConfig(desc.MediaType) {
 | 
						|
			// childless data types.
 | 
						|
			return nil, nil
 | 
						|
		}
 | 
						|
		log.G(ctx).Debugf("encountered unknown type %v; children may not be fetched", desc.MediaType)
 | 
						|
	}
 | 
						|
 | 
						|
	return descs, nil
 | 
						|
}
 | 
						|
 | 
						|
// unknownDocument represents a manifest, manifest list, or index that has not
 | 
						|
// yet been validated.
 | 
						|
type unknownDocument struct {
 | 
						|
	MediaType string          `json:"mediaType,omitempty"`
 | 
						|
	Config    json.RawMessage `json:"config,omitempty"`
 | 
						|
	Layers    json.RawMessage `json:"layers,omitempty"`
 | 
						|
	Manifests json.RawMessage `json:"manifests,omitempty"`
 | 
						|
	FSLayers  json.RawMessage `json:"fsLayers,omitempty"` // schema 1
 | 
						|
}
 | 
						|
 | 
						|
// validateMediaType returns an error if the byte slice is invalid JSON or if
 | 
						|
// the media type identifies the blob as one format but it contains elements of
 | 
						|
// another format.
 | 
						|
func validateMediaType(b []byte, mt string) error {
 | 
						|
	var doc unknownDocument
 | 
						|
	if err := json.Unmarshal(b, &doc); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	if len(doc.FSLayers) != 0 {
 | 
						|
		return fmt.Errorf("media-type: schema 1 not supported")
 | 
						|
	}
 | 
						|
	switch mt {
 | 
						|
	case MediaTypeDockerSchema2Manifest, ocispec.MediaTypeImageManifest:
 | 
						|
		if len(doc.Manifests) != 0 ||
 | 
						|
			doc.MediaType == MediaTypeDockerSchema2ManifestList ||
 | 
						|
			doc.MediaType == ocispec.MediaTypeImageIndex {
 | 
						|
			return fmt.Errorf("media-type: expected manifest but found index (%s)", mt)
 | 
						|
		}
 | 
						|
	case MediaTypeDockerSchema2ManifestList, ocispec.MediaTypeImageIndex:
 | 
						|
		if len(doc.Config) != 0 || len(doc.Layers) != 0 ||
 | 
						|
			doc.MediaType == MediaTypeDockerSchema2Manifest ||
 | 
						|
			doc.MediaType == ocispec.MediaTypeImageManifest {
 | 
						|
			return fmt.Errorf("media-type: expected index but found manifest (%s)", mt)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// RootFS returns the unpacked diffids that make up and images rootfs.
 | 
						|
//
 | 
						|
// These are used to verify that a set of layers unpacked to the expected
 | 
						|
// values.
 | 
						|
func RootFS(ctx context.Context, provider content.Provider, configDesc ocispec.Descriptor) ([]digest.Digest, error) {
 | 
						|
	p, err := content.ReadBlob(ctx, provider, configDesc)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	var config ocispec.Image
 | 
						|
	if err := json.Unmarshal(p, &config); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	return config.RootFS.DiffIDs, nil
 | 
						|
}
 |