Skip to content

Commit 7f800e0

Browse files
authored
Merge pull request #2364 from dmcgowan/fix-http-seeker-unsupported-range
Fix size validation bug with some registries
2 parents cecf576 + 59740d8 commit 7f800e0

File tree

2 files changed

+122
-2
lines changed

2 files changed

+122
-2
lines changed

remotes/docker/fetcher.go

+28-2
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ import (
2020
"context"
2121
"fmt"
2222
"io"
23+
"io/ioutil"
2324
"net/http"
2425
"path"
2526
"strings"
@@ -84,8 +85,9 @@ func (r dockerFetcher) open(ctx context.Context, u, mediatype string, offset int
8485
req.Header.Set("Accept", strings.Join([]string{mediatype, `*`}, ", "))
8586

8687
if offset > 0 {
87-
// TODO(stevvooe): Only set this header in response to the
88-
// "Accept-Ranges: bytes" header.
88+
// Note: "Accept-Ranges: bytes" cannot be trusted as some endpoints
89+
// will return the header without supporting the range. The content
90+
// range must always be checked.
8991
req.Header.Set("Range", fmt.Sprintf("bytes=%d-", offset))
9092
}
9193

@@ -106,6 +108,30 @@ func (r dockerFetcher) open(ctx context.Context, u, mediatype string, offset int
106108
}
107109
return nil, errors.Errorf("unexpected status code %v: %v", u, resp.Status)
108110
}
111+
if offset > 0 {
112+
cr := resp.Header.Get("content-range")
113+
if cr != "" {
114+
if !strings.HasPrefix(cr, fmt.Sprintf("bytes %d-", offset)) {
115+
return nil, errors.Errorf("unhandled content range in response: %v", cr)
116+
117+
}
118+
} else {
119+
// TODO: Should any cases where use of content range
120+
// without the proper header be considerd?
121+
// 206 responses?
122+
123+
// Discard up to offset
124+
// Could use buffer pool here but this case should be rare
125+
n, err := io.Copy(ioutil.Discard, io.LimitReader(resp.Body, offset))
126+
if err != nil {
127+
return nil, errors.Wrap(err, "failed to discard to offset")
128+
}
129+
if n != offset {
130+
return nil, errors.Errorf("unable to discard to offset")
131+
}
132+
133+
}
134+
}
109135

110136
return resp.Body, nil
111137
}

remotes/docker/fetcher_test.go

+94
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
/*
2+
Copyright The containerd Authors.
3+
4+
Licensed under the Apache License, Version 2.0 (the "License");
5+
you may not use this file except in compliance with the License.
6+
You may obtain a copy of the License at
7+
8+
http://www.apache.org/licenses/LICENSE-2.0
9+
10+
Unless required by applicable law or agreed to in writing, software
11+
distributed under the License is distributed on an "AS IS" BASIS,
12+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
See the License for the specific language governing permissions and
14+
limitations under the License.
15+
*/
16+
17+
package docker
18+
19+
import (
20+
"context"
21+
"fmt"
22+
"io/ioutil"
23+
"math/rand"
24+
"net/http"
25+
"net/http/httptest"
26+
"testing"
27+
)
28+
29+
func TestFetcherOpen(t *testing.T) {
30+
content := make([]byte, 128)
31+
rand.New(rand.NewSource(1)).Read(content)
32+
start := 0
33+
34+
s := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
35+
if start > 0 {
36+
rw.Header().Set("content-range", fmt.Sprintf("bytes %d-127/128", start))
37+
}
38+
rw.Header().Set("content-length", fmt.Sprintf("%d", len(content[start:])))
39+
rw.Write(content[start:])
40+
}))
41+
defer s.Close()
42+
43+
f := dockerFetcher{&dockerBase{
44+
client: s.Client(),
45+
}}
46+
ctx := context.Background()
47+
48+
checkReader := func(o int64) {
49+
t.Helper()
50+
rc, err := f.open(ctx, s.URL, "", o)
51+
if err != nil {
52+
t.Fatalf("failed to open: %+v", err)
53+
}
54+
b, err := ioutil.ReadAll(rc)
55+
if err != nil {
56+
t.Fatal(err)
57+
}
58+
expected := content[o:]
59+
if len(b) != len(expected) {
60+
t.Errorf("unexpected length %d, expected %d", len(b), len(expected))
61+
return
62+
}
63+
for i, c := range expected {
64+
if b[i] != c {
65+
t.Errorf("unexpected byte %x at %d, expected %x", b[i], i, c)
66+
return
67+
}
68+
}
69+
70+
}
71+
72+
checkReader(0)
73+
74+
// Test server ignores content range
75+
checkReader(25)
76+
77+
// Use content range on server
78+
start = 20
79+
checkReader(20)
80+
81+
// Check returning just last byte and no bytes
82+
start = 127
83+
checkReader(127)
84+
start = 128
85+
checkReader(128)
86+
87+
// Check that server returning a different content range
88+
// then requested errors
89+
start = 30
90+
_, err := f.open(ctx, s.URL, "", 20)
91+
if err == nil {
92+
t.Fatal("expected error opening with invalid server response")
93+
}
94+
}

0 commit comments

Comments
 (0)