mirror of
https://github.com/harness/drone.git
synced 2025-05-07 17:01:30 +08:00

* [AH-231]: Updated PR comments and some artifact/image issues * [AH-231]: Cleanup extra table * [AH-231]: Updated versions * [AH-231]: Lint fixed * [AH-231]: Merge commit * [AH-231]: Updated logic to get child manifests * [AH-231]: Updated sleep time * [AH-231]: Completed implementation of manifest lists * [AH-231]: Updated manifest list flows * [AH-231]: Temp changes * [AH-231]: Wiring fixed * [AH-231]: Initial commit; minor fixes * [AH-307]: Updated lint * fix comment * add new method to spacestore * feat: [AH-307]: fix after rebase with main * [AH-307]: Removing comments * [AH-307]: linting fixes * feat: [AH-286]: define proto, interface and no-op reporter implementation to publish artifact events (#2657) * feat: [AH-286]: publish artifact event - no row found is not error * feat: [AH-286]: publish artifact event - no row found is not error * feat: [AH-286]: publish artifact event - lint errors, move publishing event outside DB transaction * feat: [AH-286]: publish artifact event - review comments * feat: [AH-286]: publish artifact event - address review comments * feat: [AH-286]: publish artifact event - keep payload generic * feat: [AH-286]: publish artifact event - as sqlite locks DB, perform db operation outside goroutine publishing of events * feat: [AH-286]: publish artifact event - make publishing event async * feat: [AH-286]: publish artifact event - use api types * feat: [AH-286]: Publish event for SSCA to trigger scans - no need to export spacePathStore * feat: [AH-286]: Publish event for SSCA to trigger scans - send spacePath instead of parentID * feat: [AH-286]: Publish event for SSCA to trigger scans - rename scanner as generic reporter * feat: [AH-286]: Publish event for SSCA to trigger scans - rename scanner as generic reporter * feat: [AH-286]: publish artifact event - reuse redis.Send() * feat: [AH-286]: Publish event for SSCA to trigger scans - review comments * feat: [AH-286]: Publish event for SSCA to trigger scans - remove unused interface * feat: [AH-286]: Publish event for SSCA to trigger scans - update msg format * feat: [AH-286]: define proto, interface and no-op reporter implementation to publish artifact events * feat: [AH-286]: Publish event for SSCA to trigger scans - extract acctID/orgID/projectID from spacepathStore * feat: [AH-286]: publish artifact event - remove protobuf reference, fix lint errors * feat: [AH-286]: publish artifact event - fix msg format * feat: [AH-286]: define proto, interface and no-op reporter implementation to publish artifact events * feat: [AH-286]: define proto, interface and no-op reporter implementation to publish artifact events * feat: [AH-321]: make repo form disabled for rbac (#2687) * feat: [AH-321]: make repo form disabled for rbac * fix wire-gen * GC refactoring * feat: [AH-340]: update UI as per the product feedbacks (#2685) * feat: [AH-340]: update UI as per the product feedbacks * feat: [AH-44]: add module data while redirecting to pipeline execution page * feat: [AH-44]: add build pipeline details in overview cards * feat: [AH-44]: update view for prod and non prod tag * feat: [AH-44]: rearrange filters on artifact list apge * feat: [AH-10]: add schema for overview cards, update artifact list, add ai search input, update api for registry artifact list and update mapping for deployments table * feat: [AH-307]: add secretSpacePath in upstream password field while sending to BE (#2631) * feat: [AH-307]: add secretSpacePath in upstream password field while sending to BE * feat: [AH-299]: support new changes for artifact list page (#2630) * feat: update har service api version * feat: [AH-30]: integrate API schema for deployments list content * feat: [AH-300]: update tag colors for prod and non prod tags * feat: [AH-300]: Add Deployments table in artiface version details page * feat: [AH-299]: support new changes for artifact list page * feat: [AH-299]: support new changes for artifact list page * feat: [AH-321]: support artifact registry rbac permission on UI (#2671) * feat: [AH-321]: support artifact registry rbac permission on UI * enable rbac (#2664) * fix scope * enable rbac * feat: [AH-307]: hide code tab from version details page for both docker and helm * feat: [AH-240]: add custom handling for enterprise auth type field * Merge branch 'AH-307-plus-url-support-2_no_rbac' of https://git0.harness.io/l7B_kbSEQD2wjrM7PShm5w/PROD/Harness_Commons/gitness into AH-307-plus-url-support-2_no_rbac * feat: [AH-307]: send space_ref in query param while creating registries * lowercase rootRef * [AH-307]: updated route * [AH-307]: Added logs * [AH-307]: Added logs * feat: [AH-317]: add space_ref query param * local * Merge commit * Merge commit * Merge commit * Added comments * Revert changes * Merge commit * Merge branch 'main' of https://git0.harness.io/l7B_kbSEQD2wjrM7PShm5w/PROD/Harness_Commons/gitness into AH-307-plus-url-support-2 * Merge branch 'AH-306d' of https://git0.harness.io/l7B_kbSEQD2wjrM7PShm5w/PROD/Harness_Commons/gitness into AH-307-plus-url-support-2 * fix space path handling * Merge branch 'main' of https://git0.harness.io/l7B_kbSEQD2wjrM7PShm5w/PROD/Harness_Commons/gitness into AH-307-plus-url-support-2 * Updated URLs to support slashes with + separator * fix: [AH-306c]: fix anonymous flow * fix: [AH-306c]: fix anonymous flow * feat: [AH-307]: plus url support on UI (cherry picked from commit 3fb6add3ce03498b6668b5f8f6d547e1acedaec4) * [AH-307]: Added examples (cherry picked from commit e83e41303da536f421be333be04aed09fbf75f5f) * [AH-307]: Added Regex request rewrite support (cherry picked from commit ed7b155256bdcd1134bc228b5705556a1233add6) * fix: [AH-306c]: fix anonymous flow
179 lines
5.9 KiB
Go
179 lines
5.9 KiB
Go
// Copyright 2023 Harness, Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package metadata
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
"errors"
|
|
"fmt"
|
|
"net/http"
|
|
|
|
apiauth "github.com/harness/gitness/app/api/auth"
|
|
"github.com/harness/gitness/app/api/request"
|
|
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
|
|
ml "github.com/harness/gitness/registry/app/manifest/manifestlist"
|
|
os "github.com/harness/gitness/registry/app/manifest/ocischema"
|
|
s2 "github.com/harness/gitness/registry/app/manifest/schema2"
|
|
"github.com/harness/gitness/registry/app/pkg/docker"
|
|
"github.com/harness/gitness/registry/types"
|
|
store2 "github.com/harness/gitness/store"
|
|
"github.com/harness/gitness/types/enum"
|
|
|
|
"github.com/rs/zerolog/log"
|
|
)
|
|
|
|
func (c *APIController) GetDockerArtifactManifests(
|
|
ctx context.Context,
|
|
r artifact.GetDockerArtifactManifestsRequestObject,
|
|
) (artifact.GetDockerArtifactManifestsResponseObject, error) {
|
|
regInfo, err := c.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
|
|
if err != nil {
|
|
return artifact.GetDockerArtifactManifests400JSONResponse{
|
|
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
|
|
*GetErrorResponse(http.StatusBadRequest, err.Error()),
|
|
),
|
|
}, nil
|
|
}
|
|
|
|
space, err := c.SpaceStore.FindByRef(ctx, regInfo.ParentRef)
|
|
if err != nil {
|
|
return artifact.GetDockerArtifactManifests400JSONResponse{
|
|
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
|
|
*GetErrorResponse(http.StatusBadRequest, err.Error()),
|
|
),
|
|
}, nil
|
|
}
|
|
|
|
session, _ := request.AuthSessionFrom(ctx)
|
|
permissionChecks := GetPermissionChecks(space, regInfo.RegistryIdentifier, enum.PermissionRegistryView)
|
|
if err = apiauth.CheckRegistry(
|
|
ctx,
|
|
c.Authorizer,
|
|
session,
|
|
permissionChecks...,
|
|
); err != nil {
|
|
return artifact.GetDockerArtifactManifests403JSONResponse{
|
|
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
|
|
*GetErrorResponse(http.StatusForbidden, err.Error()),
|
|
),
|
|
}, nil
|
|
}
|
|
|
|
image := string(r.Artifact)
|
|
version := string(r.Version)
|
|
registry, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.parentID, regInfo.RegistryIdentifier)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
t, err := c.TagStore.FindTag(ctx, registry.ID, image, version)
|
|
if err != nil && !errors.Is(err, sql.ErrNoRows) {
|
|
return nil, err
|
|
}
|
|
m, err := c.ManifestStore.Get(ctx, t.ManifestID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
manifest, err := docker.DBManifestToManifest(m)
|
|
manifestDetailsList := []artifact.DockerManifestDetails{}
|
|
switch reqManifest := manifest.(type) {
|
|
case *s2.DeserializedManifest:
|
|
mConfig, err := getManifestConfig(ctx, reqManifest.Config().Digest, regInfo.RootIdentifier, c.StorageDriver)
|
|
if err != nil {
|
|
return artifactManifestsErrorRs(err), nil
|
|
}
|
|
manifestDetailsList = append(manifestDetailsList, getManifestDetails(m, mConfig))
|
|
case *os.DeserializedManifest:
|
|
mConfig, err := getManifestConfig(ctx, reqManifest.Config().Digest, regInfo.RootIdentifier, c.StorageDriver)
|
|
if err != nil {
|
|
return artifactManifestsErrorRs(err), nil
|
|
}
|
|
manifestDetailsList = append(manifestDetailsList, getManifestDetails(m, mConfig))
|
|
case *ml.DeserializedManifestList:
|
|
manifestDetailsList, err = c.getManifestList(ctx, reqManifest, registry, image, regInfo)
|
|
if err != nil {
|
|
return artifactManifestsErrorRs(err), nil
|
|
}
|
|
default:
|
|
log.Ctx(ctx).Error().Stack().Err(err).Msgf("Unknown manifest type: %T", manifest)
|
|
}
|
|
|
|
return artifact.GetDockerArtifactManifests200JSONResponse{
|
|
DockerManifestsResponseJSONResponse: artifact.DockerManifestsResponseJSONResponse{
|
|
Data: artifact.DockerManifests{
|
|
ImageName: t.ImageName,
|
|
Version: t.Name,
|
|
Manifests: &manifestDetailsList,
|
|
},
|
|
Status: artifact.StatusSUCCESS,
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
func (c *APIController) getManifestList(
|
|
ctx context.Context, reqManifest *ml.DeserializedManifestList, registry *types.Registry, image string,
|
|
regInfo *RegistryRequestBaseInfo,
|
|
) ([]artifact.DockerManifestDetails, error) {
|
|
manifestDetailsList := []artifact.DockerManifestDetails{}
|
|
for _, manifestEntry := range reqManifest.Manifests {
|
|
dgst, err := types.NewDigest(manifestEntry.Digest)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
referencedManifest, err := c.ManifestStore.FindManifestByDigest(ctx, registry.ID, image, dgst)
|
|
if err != nil {
|
|
if errors.Is(err, store2.ErrResourceNotFound) {
|
|
if registry.Type == artifact.RegistryTypeUPSTREAM {
|
|
continue
|
|
}
|
|
return nil, fmt.Errorf("manifest: %s not found", dgst.String())
|
|
}
|
|
return nil, err
|
|
}
|
|
mConfig, err := getManifestConfig(
|
|
ctx, referencedManifest.Configuration.Digest,
|
|
regInfo.RootIdentifier, c.StorageDriver,
|
|
)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
manifestDetailsList = append(manifestDetailsList, getManifestDetails(referencedManifest, mConfig))
|
|
}
|
|
return manifestDetailsList, nil
|
|
}
|
|
|
|
func artifactManifestsErrorRs(err error) artifact.GetDockerArtifactManifestsResponseObject {
|
|
return artifact.GetDockerArtifactManifests500JSONResponse{
|
|
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
|
|
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
|
|
),
|
|
}
|
|
}
|
|
|
|
func getManifestDetails(m *types.Manifest, mConfig *manifestConfig) artifact.DockerManifestDetails {
|
|
createdAt := GetTimeInMs(m.CreatedAt)
|
|
size := GetSize(m.TotalSize)
|
|
|
|
manifestDetails := artifact.DockerManifestDetails{
|
|
Digest: m.Digest.String(),
|
|
CreatedAt: &createdAt,
|
|
Size: &size,
|
|
}
|
|
if mConfig != nil {
|
|
manifestDetails.OsArch = fmt.Sprintf("%s/%s", mConfig.Os, mConfig.Arch)
|
|
}
|
|
return manifestDetails
|
|
}
|