-
Notifications
You must be signed in to change notification settings - Fork 36
Expand file tree
/
Copy pathloader.rs
More file actions
100 lines (91 loc) · 3.3 KB
/
loader.rs
File metadata and controls
100 lines (91 loc) · 3.3 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
use async_trait::async_trait;
use futures_util::{StreamExt, TryStreamExt};
use oci_client::{manifest::OciDescriptor, RegistryOperation};
use wasm_pkg_common::{
package::{PackageRef, Version},
Error,
};
use crate::{
loader::PackageLoader,
release::{Release, VersionInfo},
ContentStream,
};
use super::{oci_registry_error, OciBackend};
#[async_trait]
impl PackageLoader for OciBackend {
async fn list_all_versions(&self, package: &PackageRef) -> Result<Vec<VersionInfo>, Error> {
let reference = self.make_reference(package, None);
tracing::debug!(?reference, "Listing tags for OCI reference");
let auth = self.auth(&reference, RegistryOperation::Pull).await?;
let resp = self
.client
.list_tags(&reference, &auth, None, None)
.await
.map_err(oci_registry_error)?;
tracing::trace!(response = ?resp, "List tags response");
// Return only tags that parse as valid semver versions.
let versions = resp
.tags
.iter()
.flat_map(|tag| match Version::parse(tag) {
Ok(version) => Some(VersionInfo {
version,
yanked: false,
}),
Err(err) => {
// Signature tags all start with a SHA and shouldn't generate a warning
if tag.starts_with("sha256-") {
tracing::debug!(?tag, "Ignoring signature tag");
} else {
tracing::warn!(?tag, error = ?err, "Ignoring invalid version tag");
}
None
}
})
.collect();
Ok(versions)
}
async fn get_release(&self, package: &PackageRef, version: &Version) -> Result<Release, Error> {
let reference = self.make_reference(package, Some(version));
tracing::debug!(?reference, "Fetching image manifest for OCI reference");
let auth = self.auth(&reference, RegistryOperation::Pull).await?;
let (manifest, _config, _digest) = self
.client
.pull_manifest_and_config(&reference, &auth)
.await
.map_err(Error::RegistryError)?;
tracing::trace!(?manifest, "Got manifest");
let version = version.to_owned();
let content_digest = manifest
.layers
.into_iter()
.next()
.ok_or_else(|| {
Error::InvalidPackageManifest("Returned manifest had no layers".to_string())
})?
.digest
.parse()?;
Ok(Release {
version,
content_digest,
})
}
async fn stream_content_unvalidated(
&self,
package: &PackageRef,
release: &Release,
) -> Result<ContentStream, Error> {
let reference = self.make_reference(package, None);
let descriptor = OciDescriptor {
digest: release.content_digest.to_string(),
..Default::default()
};
self.auth(&reference, RegistryOperation::Pull).await?;
let stream = self
.client
.pull_blob_stream(&reference, &descriptor)
.await
.map_err(oci_registry_error)?;
Ok(stream.map_err(Into::into).boxed())
}
}