mirror of
https://github.com/harness/drone.git
synced 2025-05-04 14:43:15 +08:00

* [AH-231]: Updated PR comments and some artifact/image issues * [AH-231]: Cleanup extra table * [AH-231]: Updated versions * [AH-231]: Lint fixed * [AH-231]: Merge commit * [AH-231]: Updated logic to get child manifests * [AH-231]: Updated sleep time * [AH-231]: Completed implementation of manifest lists * [AH-231]: Updated manifest list flows * [AH-231]: Temp changes * [AH-231]: Wiring fixed * [AH-231]: Initial commit; minor fixes * [AH-307]: Updated lint * fix comment * add new method to spacestore * feat: [AH-307]: fix after rebase with main * [AH-307]: Removing comments * [AH-307]: linting fixes * feat: [AH-286]: define proto, interface and no-op reporter implementation to publish artifact events (#2657) * feat: [AH-286]: publish artifact event - no row found is not error * feat: [AH-286]: publish artifact event - no row found is not error * feat: [AH-286]: publish artifact event - lint errors, move publishing event outside DB transaction * feat: [AH-286]: publish artifact event - review comments * feat: [AH-286]: publish artifact event - address review comments * feat: [AH-286]: publish artifact event - keep payload generic * feat: [AH-286]: publish artifact event - as sqlite locks DB, perform db operation outside goroutine publishing of events * feat: [AH-286]: publish artifact event - make publishing event async * feat: [AH-286]: publish artifact event - use api types * feat: [AH-286]: Publish event for SSCA to trigger scans - no need to export spacePathStore * feat: [AH-286]: Publish event for SSCA to trigger scans - send spacePath instead of parentID * feat: [AH-286]: Publish event for SSCA to trigger scans - rename scanner as generic reporter * feat: [AH-286]: Publish event for SSCA to trigger scans - rename scanner as generic reporter * feat: [AH-286]: publish artifact event - reuse redis.Send() * feat: [AH-286]: Publish event for SSCA to trigger scans - review comments * feat: [AH-286]: Publish event for SSCA to trigger scans - remove unused interface * feat: [AH-286]: Publish event for SSCA to trigger scans - update msg format * feat: [AH-286]: define proto, interface and no-op reporter implementation to publish artifact events * feat: [AH-286]: Publish event for SSCA to trigger scans - extract acctID/orgID/projectID from spacepathStore * feat: [AH-286]: publish artifact event - remove protobuf reference, fix lint errors * feat: [AH-286]: publish artifact event - fix msg format * feat: [AH-286]: define proto, interface and no-op reporter implementation to publish artifact events * feat: [AH-286]: define proto, interface and no-op reporter implementation to publish artifact events * feat: [AH-321]: make repo form disabled for rbac (#2687) * feat: [AH-321]: make repo form disabled for rbac * fix wire-gen * GC refactoring * feat: [AH-340]: update UI as per the product feedbacks (#2685) * feat: [AH-340]: update UI as per the product feedbacks * feat: [AH-44]: add module data while redirecting to pipeline execution page * feat: [AH-44]: add build pipeline details in overview cards * feat: [AH-44]: update view for prod and non prod tag * feat: [AH-44]: rearrange filters on artifact list apge * feat: [AH-10]: add schema for overview cards, update artifact list, add ai search input, update api for registry artifact list and update mapping for deployments table * feat: [AH-307]: add secretSpacePath in upstream password field while sending to BE (#2631) * feat: [AH-307]: add secretSpacePath in upstream password field while sending to BE * feat: [AH-299]: support new changes for artifact list page (#2630) * feat: update har service api version * feat: [AH-30]: integrate API schema for deployments list content * feat: [AH-300]: update tag colors for prod and non prod tags * feat: [AH-300]: Add Deployments table in artiface version details page * feat: [AH-299]: support new changes for artifact list page * feat: [AH-299]: support new changes for artifact list page * feat: [AH-321]: support artifact registry rbac permission on UI (#2671) * feat: [AH-321]: support artifact registry rbac permission on UI * enable rbac (#2664) * fix scope * enable rbac * feat: [AH-307]: hide code tab from version details page for both docker and helm * feat: [AH-240]: add custom handling for enterprise auth type field * Merge branch 'AH-307-plus-url-support-2_no_rbac' of https://git0.harness.io/l7B_kbSEQD2wjrM7PShm5w/PROD/Harness_Commons/gitness into AH-307-plus-url-support-2_no_rbac * feat: [AH-307]: send space_ref in query param while creating registries * lowercase rootRef * [AH-307]: updated route * [AH-307]: Added logs * [AH-307]: Added logs * feat: [AH-317]: add space_ref query param * local * Merge commit * Merge commit * Merge commit * Added comments * Revert changes * Merge commit * Merge branch 'main' of https://git0.harness.io/l7B_kbSEQD2wjrM7PShm5w/PROD/Harness_Commons/gitness into AH-307-plus-url-support-2 * Merge branch 'AH-306d' of https://git0.harness.io/l7B_kbSEQD2wjrM7PShm5w/PROD/Harness_Commons/gitness into AH-307-plus-url-support-2 * fix space path handling * Merge branch 'main' of https://git0.harness.io/l7B_kbSEQD2wjrM7PShm5w/PROD/Harness_Commons/gitness into AH-307-plus-url-support-2 * Updated URLs to support slashes with + separator * fix: [AH-306c]: fix anonymous flow * fix: [AH-306c]: fix anonymous flow * feat: [AH-307]: plus url support on UI (cherry picked from commit 3fb6add3ce03498b6668b5f8f6d547e1acedaec4) * [AH-307]: Added examples (cherry picked from commit e83e41303da536f421be333be04aed09fbf75f5f) * [AH-307]: Added Regex request rewrite support (cherry picked from commit ed7b155256bdcd1134bc228b5705556a1233add6) * fix: [AH-306c]: fix anonymous flow
180 lines
5.7 KiB
Go
180 lines
5.7 KiB
Go
// Copyright 2023 Harness, Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package database
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/harness/gitness/app/api/request"
|
|
"github.com/harness/gitness/registry/app/store"
|
|
"github.com/harness/gitness/registry/app/store/database/util"
|
|
"github.com/harness/gitness/registry/types"
|
|
store2 "github.com/harness/gitness/store"
|
|
databaseg "github.com/harness/gitness/store/database"
|
|
"github.com/harness/gitness/store/database/dbtx"
|
|
|
|
"github.com/jmoiron/sqlx"
|
|
"github.com/rs/zerolog/log"
|
|
)
|
|
|
|
type ociImageIndexMappingDao struct {
|
|
db *sqlx.DB
|
|
}
|
|
|
|
func NewOCIImageIndexMappingDao(db *sqlx.DB) store.OCIImageIndexMappingRepository {
|
|
return &ociImageIndexMappingDao{
|
|
db: db,
|
|
}
|
|
}
|
|
|
|
type ociImageIndexMappingDB struct {
|
|
ID int64 `db:"oci_mapping_id"`
|
|
ParentManifestID int64 `db:"oci_mapping_parent_manifest_id"`
|
|
ChildDigest []byte `db:"oci_mapping_child_digest"`
|
|
CreatedAt int64 `db:"oci_mapping_created_at"`
|
|
UpdatedAt int64 `db:"oci_mapping_updated_at"`
|
|
CreatedBy int64 `db:"oci_mapping_created_by"`
|
|
UpdatedBy int64 `db:"oci_mapping_updated_by"`
|
|
}
|
|
|
|
func (dao *ociImageIndexMappingDao) Create(
|
|
ctx context.Context,
|
|
ociManifest *types.OCIImageIndexMapping,
|
|
) error {
|
|
const sqlQuery = `
|
|
INSERT INTO oci_image_index_mappings (
|
|
oci_mapping_parent_manifest_id,
|
|
oci_mapping_child_digest,
|
|
oci_mapping_created_at,
|
|
oci_mapping_updated_at,
|
|
oci_mapping_created_by,
|
|
oci_mapping_updated_by
|
|
) VALUES (
|
|
:oci_mapping_parent_manifest_id,
|
|
:oci_mapping_child_digest,
|
|
:oci_mapping_created_at,
|
|
:oci_mapping_updated_at,
|
|
:oci_mapping_created_by,
|
|
:oci_mapping_updated_by
|
|
) ON CONFLICT (oci_mapping_parent_manifest_id, oci_mapping_child_digest)
|
|
DO NOTHING
|
|
RETURNING oci_mapping_id`
|
|
|
|
db := dbtx.GetAccessor(ctx, dao.db)
|
|
internalManifest := mapToInternalOCIMapping(ctx, ociManifest)
|
|
query, args, err := db.BindNamed(sqlQuery, internalManifest)
|
|
if err != nil {
|
|
return databaseg.ProcessSQLErrorf(ctx, err, "Bind query failed")
|
|
}
|
|
|
|
if err = db.QueryRowContext(ctx, query, args...).Scan(&ociManifest.ID); err != nil {
|
|
err = databaseg.ProcessSQLErrorf(ctx, err, "QueryRowContext failed")
|
|
if errors.Is(err, store2.ErrDuplicate) {
|
|
return nil
|
|
}
|
|
return fmt.Errorf("inserting OCI image index mapping: %w", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (dao *ociImageIndexMappingDao) GetAllByChildDigest(
|
|
ctx context.Context, registryID int64, imageName string, childDigest types.Digest,
|
|
) ([]*types.OCIImageIndexMapping, error) {
|
|
digestBytes, err := util.GetHexDecodedBytes(string(childDigest))
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to get digest bytes: %w", err)
|
|
}
|
|
const sqlQuery = `
|
|
SELECT
|
|
oci_mapping_id,
|
|
oci_mapping_parent_manifest_id,
|
|
oci_mapping_child_digest,
|
|
oci_mapping_created_at,
|
|
oci_mapping_updated_at,
|
|
oci_mapping_created_by,
|
|
oci_mapping_updated_by
|
|
FROM
|
|
oci_image_index_mappings
|
|
JOIN manifests ON manifests.manifest_id = oci_image_index_mappings.oci_mapping_parent_manifest_id
|
|
WHERE
|
|
manifest_registry_id = $1 AND
|
|
manifest_image_name = $2 AND
|
|
oci_mapping_child_digest = $3`
|
|
|
|
db := dbtx.GetAccessor(ctx, dao.db)
|
|
rows, err := db.QueryxContext(ctx, sqlQuery, registryID, imageName, digestBytes)
|
|
if err != nil || rows.Err() != nil {
|
|
return nil, databaseg.ProcessSQLErrorf(ctx, err, "QueryxContext failed")
|
|
}
|
|
defer rows.Close()
|
|
|
|
var manifests []*types.OCIImageIndexMapping
|
|
for rows.Next() {
|
|
var dbManifest ociImageIndexMappingDB
|
|
if err := rows.StructScan(&dbManifest); err != nil {
|
|
return nil, databaseg.ProcessSQLErrorf(ctx, err, "StructScan failed")
|
|
}
|
|
manifests = append(manifests, mapToExternalOCIManifest(&dbManifest))
|
|
}
|
|
return manifests, nil
|
|
}
|
|
|
|
func mapToInternalOCIMapping(ctx context.Context, in *types.OCIImageIndexMapping) *ociImageIndexMappingDB {
|
|
if in.CreatedAt.IsZero() {
|
|
in.CreatedAt = time.Now()
|
|
}
|
|
in.UpdatedAt = time.Now()
|
|
session, _ := request.AuthSessionFrom(ctx)
|
|
if in.CreatedBy == 0 {
|
|
in.CreatedBy = session.Principal.ID
|
|
}
|
|
in.UpdatedBy = session.Principal.ID
|
|
childBytes, err := types.GetDigestBytes(in.ChildManifestDigest)
|
|
if err != nil {
|
|
log.Error().Msgf("failed to get digest bytes: %v", err)
|
|
}
|
|
|
|
return &ociImageIndexMappingDB{
|
|
ID: in.ID,
|
|
ParentManifestID: in.ParentManifestID,
|
|
ChildDigest: childBytes,
|
|
CreatedAt: in.CreatedAt.UnixMilli(),
|
|
UpdatedAt: in.UpdatedAt.UnixMilli(),
|
|
CreatedBy: in.CreatedBy,
|
|
UpdatedBy: in.UpdatedBy,
|
|
}
|
|
}
|
|
|
|
func mapToExternalOCIManifest(in *ociImageIndexMappingDB) *types.OCIImageIndexMapping {
|
|
childDgst := types.Digest(util.GetHexEncodedString(in.ChildDigest))
|
|
parsedChildDigest, err := childDgst.Parse()
|
|
if err != nil {
|
|
log.Error().Msgf("failed to child parse digest: %v", err)
|
|
}
|
|
|
|
return &types.OCIImageIndexMapping{
|
|
ID: in.ID,
|
|
ParentManifestID: in.ParentManifestID,
|
|
ChildManifestDigest: parsedChildDigest,
|
|
CreatedAt: time.UnixMilli(in.CreatedAt),
|
|
UpdatedAt: time.UnixMilli(in.UpdatedAt),
|
|
CreatedBy: in.CreatedBy,
|
|
UpdatedBy: in.UpdatedBy,
|
|
}
|
|
}
|