iSulad/0018-make-sure-the-input-parameter-is-not-empty-and-optim.patch
xuxuepeng f2271d04b4 !621 Add vsock support for exec
* Add vsock support for exec
2023-09-13 02:47:13 +00:00

1576 lines
58 KiB
Diff

From c6442b5805d39d8749a1016e2932543a130f16dc Mon Sep 17 00:00:00 2001
From: zhongtao <zhongtao17@huawei.com>
Date: Fri, 25 Aug 2023 17:34:12 +0800
Subject: [PATCH 18/33] make sure the input parameter is not empty and optimize
the code
Signed-off-by: zhongtao <zhongtao17@huawei.com>
---
src/daemon/modules/api/image_api.h | 2 +-
src/daemon/modules/image/external/ext_image.c | 8 ++-
src/daemon/modules/image/image.c | 47 +++++++++++-----
src/daemon/modules/image/image_spec_merge.c | 2 +-
.../modules/image/oci/oci_common_operators.c | 9 ++-
src/daemon/modules/image/oci/oci_image.c | 8 +--
src/daemon/modules/image/oci/oci_image.h | 2 +-
src/daemon/modules/image/oci/oci_image_type.h | 42 --------------
src/daemon/modules/image/oci/oci_import.c | 1 +
src/daemon/modules/image/oci/oci_load.c | 10 +---
src/daemon/modules/image/oci/oci_load.h | 2 +-
src/daemon/modules/image/oci/oci_login.c | 2 +-
src/daemon/modules/image/oci/oci_logout.c | 2 +-
src/daemon/modules/image/oci/oci_pull.c | 4 +-
.../image/oci/registry/registry_apiv2.c | 2 +-
.../oci/storage/image_store/image_store.c | 45 ++++++++++++---
.../oci/storage/image_store/image_store.h | 4 +-
.../graphdriver/devmapper/deviceset.c | 10 ++--
.../graphdriver/devmapper/driver_devmapper.c | 4 +-
.../graphdriver/devmapper/wrapper_devmapper.c | 14 +++--
.../graphdriver/devmapper/wrapper_devmapper.h | 8 +--
.../graphdriver/overlay2/driver_overlay2.c | 17 +++---
.../graphdriver/overlay2/driver_overlay2.h | 2 -
.../image/oci/storage/layer_store/layer.c | 2 +-
.../image/oci/storage/layer_store/layer.h | 2 +-
.../oci/storage/layer_store/layer_store.c | 55 ++++++++-----------
.../oci/storage/layer_store/layer_store.h | 8 +--
.../remote_layer_support/image_remote_impl.c | 12 +++-
.../remote_layer_support/layer_remote_impl.c | 10 ++++
.../overlay_remote_impl.c | 10 ++++
.../remote_layer_support/remote_support.c | 5 ++
.../ro_symlink_maintain.c | 11 +++-
.../oci/storage/rootfs_store/rootfs_store.c | 8 +--
.../oci/storage/rootfs_store/rootfs_store.h | 6 +-
.../modules/image/oci/storage/storage.c | 35 ++++++++++--
.../modules/image/oci/storage/storage.h | 6 +-
src/daemon/modules/image/oci/utils_images.c | 7 ++-
src/daemon/modules/image/oci/utils_images.h | 2 +-
src/utils/http/http.h | 2 +
.../oci/storage/layers/storage_driver_ut.cc | 10 +---
.../oci/storage/layers/storage_layers_ut.cc | 34 ------------
test/mocks/driver_overlay2_mock.cc | 8 ---
test/mocks/driver_overlay2_mock.h | 1 -
43 files changed, 251 insertions(+), 230 deletions(-)
delete mode 100644 src/daemon/modules/image/oci/oci_image_type.h
diff --git a/src/daemon/modules/api/image_api.h b/src/daemon/modules/api/image_api.h
index 4bb8d1a9..2f2c00a2 100644
--- a/src/daemon/modules/api/image_api.h
+++ b/src/daemon/modules/api/image_api.h
@@ -239,7 +239,7 @@ typedef struct {
int image_module_init(const isulad_daemon_configs *args);
-void image_module_exit();
+void image_module_exit(void);
int im_get_container_filesystem_usage(const char *image_type, const char *id, imagetool_fs_info **fs_usage);
diff --git a/src/daemon/modules/image/external/ext_image.c b/src/daemon/modules/image/external/ext_image.c
index e1706469..5b6b7298 100644
--- a/src/daemon/modules/image/external/ext_image.c
+++ b/src/daemon/modules/image/external/ext_image.c
@@ -138,13 +138,17 @@ int ext_list_images(const im_list_request *request, imagetool_images_list **list
{
int ret = 0;
+ if (request == NULL || list == NULL) {
+ ERROR("Empty request or list");
+ return -1;
+ }
+
*list = util_common_calloc_s(sizeof(imagetool_images_list));
if (*list == NULL) {
ERROR("Memory out");
ret = -1;
- goto out;
}
-out:
+
return ret;
}
diff --git a/src/daemon/modules/image/image.c b/src/daemon/modules/image/image.c
index 322ab67c..408ceea2 100644
--- a/src/daemon/modules/image/image.c
+++ b/src/daemon/modules/image/image.c
@@ -374,8 +374,8 @@ int im_resolv_image_name(const char *image_type, const char *image_name, char **
int ret = -1;
const struct bim_type *q = NULL;
- if (image_type == NULL) {
- ERROR("Image type is required");
+ if (image_type == NULL || image_name == NULL || resolved_name == NULL) {
+ ERROR("Image type image_name and resolved_name is required");
goto out;
}
q = get_bim_by_type(image_type);
@@ -402,8 +402,8 @@ int im_get_filesystem_info(const char *image_type, im_fs_info_response **respons
int ret = -1;
const struct bim_type *q = NULL;
- if (image_type == NULL) {
- ERROR("Image type is required");
+ if (image_type == NULL || response == NULL) {
+ ERROR("Image type and response is required");
goto out;
}
@@ -419,7 +419,7 @@ int im_get_filesystem_info(const char *image_type, im_fs_info_response **respons
INFO("Event: {Object: get image filesystem info, Type: inspecting}");
ret = q->ops->get_filesystem_info(response);
if (ret != 0) {
- if (response != NULL && *response != NULL) {
+ if (*response != NULL && (*response)->errmsg != NULL) {
ERROR("Get filesystem info failed: %s", (*response)->errmsg);
} else {
ERROR("Get filesystem info failed");
@@ -439,7 +439,7 @@ int im_get_container_filesystem_usage(const char *image_type, const char *id, im
const struct bim_type *q = NULL;
im_container_fs_usage_request *request = NULL;
- if (image_type == NULL || id == NULL) {
+ if (image_type == NULL || id == NULL || fs_usage == NULL) {
ERROR("Invalid input arguments");
ret = -1;
goto out;
@@ -763,6 +763,12 @@ bool im_config_image_exist(const char *image_name)
{
const struct bim_type *bim_type = NULL;
+ if (image_name == NULL) {
+ ERROR("Invalid input arguments");
+ isulad_set_error_message("Invalid input arguments");
+ return false;
+ }
+
bim_type = bim_query(image_name);
if (bim_type == NULL) {
ERROR("Config image %s not exist", image_name);
@@ -778,7 +784,7 @@ int im_merge_image_config(const char *image_type, const char *image_name, contai
int ret = 0;
struct bim *bim = NULL;
- if (container_spec == NULL || image_type == NULL) {
+ if (container_spec == NULL || image_name == NULL || image_type == NULL) {
ERROR("Invalid input arguments");
ret = -1;
goto out;
@@ -905,7 +911,7 @@ int im_list_images(const im_list_request *ctx, im_list_response **response)
size_t i;
imagetool_images_list *images_tmp = NULL;
- if (response == NULL) {
+ if (ctx == NULL || response == NULL) {
ERROR("Empty arguments");
return -1;
}
@@ -982,6 +988,12 @@ static bool check_im_pull_args(const im_pull_request *req, im_pull_response * co
isulad_set_error_message("Empty image required");
return false;
}
+
+ if (req->type == NULL) {
+ ERROR("Empty type required");
+ isulad_set_error_message("Empty type required");
+ return false;
+ }
return true;
}
@@ -1079,7 +1091,7 @@ int im_import_image(const im_import_request *request, char **id)
return -1;
}
- if (request->file == NULL) {
+ if (request->file == NULL || request->tag == NULL) {
ERROR("Import image requires image tarball file path");
isulad_set_error_message("Import image requires image tarball file path");
goto pack_response;
@@ -1185,7 +1197,8 @@ int im_load_image(const im_load_request *request, im_load_response **response)
ret = bim->ops->load_image(request);
if (ret != 0) {
- ERROR("Failed to load image from %s with tag %s and type %s", request->file, request->tag, request->type);
+ // request->tag may be empty
+ ERROR("Failed to load image from %s with type %s", request->file, request->type);
ret = -1;
goto pack_response;
}
@@ -1368,11 +1381,16 @@ int im_logout(const im_logout_request *request, im_logout_response **response)
int ret = -1;
struct bim *bim = NULL;
- if (response == NULL) {
+ if (request == NULL || response == NULL) {
ERROR("Empty response");
return -1;
}
+ if (request->type == NULL || request->server == NULL) {
+ ERROR("Empty type or server");
+ return -1;
+ }
+
*response = util_common_calloc_s(sizeof(im_logout_response));
if (*response == NULL) {
ERROR("Out of memory");
@@ -1842,13 +1860,12 @@ char *im_get_rootfs_dir(const im_get_rf_dir_request *request)
char *dir = NULL;
struct bim *bim = NULL;
- if (request->type == NULL) {
+ if (request == NULL || request->type == NULL) {
ERROR("Missing image type");
return NULL;
}
bim = bim_get(request->type, NULL, NULL, NULL);
-
if (bim == NULL) {
ERROR("Failed to init bim, image type:%s", request->type);
return NULL;
@@ -1916,7 +1933,7 @@ int image_module_init(const isulad_daemon_configs *args)
return bims_init(args);
}
-void image_module_exit()
+void image_module_exit(void)
{
size_t i;
@@ -2085,7 +2102,7 @@ int im_prepare_container_rootfs(const im_prepare_request *request, char **real_r
int nret = 0;
struct bim *bim = NULL;
- if (request == NULL) {
+ if (request == NULL || real_rootfs == NULL) {
ERROR("Invalid input arguments");
return -1;
}
diff --git a/src/daemon/modules/image/image_spec_merge.c b/src/daemon/modules/image/image_spec_merge.c
index e8cdae28..1e857bb7 100644
--- a/src/daemon/modules/image/image_spec_merge.c
+++ b/src/daemon/modules/image/image_spec_merge.c
@@ -29,7 +29,7 @@ int image_spec_merge_env(const char **env, size_t env_len, container_config *con
char **im_kv = NULL;
char **custom_kv = NULL;
- if (env == NULL || env_len == 0) {
+ if (env == NULL || env_len == 0 || container_spec == NULL) {
return 0;
}
diff --git a/src/daemon/modules/image/oci/oci_common_operators.c b/src/daemon/modules/image/oci/oci_common_operators.c
index 83cccbe6..e15423e6 100644
--- a/src/daemon/modules/image/oci/oci_common_operators.c
+++ b/src/daemon/modules/image/oci/oci_common_operators.c
@@ -57,7 +57,7 @@ char *oci_resolve_image_name(const char *name)
int oci_get_user_conf(const char *basefs, host_config *hc, const char *userstr, defs_process_user *puser)
{
- if (basefs == NULL || puser == NULL) {
+ if (basefs == NULL || puser == NULL || hc == NULL) {
ERROR("Empty basefs or puser");
return -1;
}
@@ -371,6 +371,11 @@ int oci_list_images(const im_list_request *request, imagetool_images_list **imag
int ret = 0;
struct filters_args *image_filters = NULL;
+ if (request == NULL || images == NULL) {
+ ERROR("Empty request or images");
+ return -1;
+ }
+
if (request != NULL && request->image_filters != NULL) {
image_filters = request->image_filters;
}
@@ -408,7 +413,7 @@ int oci_summary_image(im_summary_request *request, im_summary_response *response
char *image_ref = NULL;
char *resolved_name = NULL;
- if (response == NULL) {
+ if (request == NULL || response == NULL) {
ERROR("Invalid arguments");
return -1;
}
diff --git a/src/daemon/modules/image/oci/oci_image.c b/src/daemon/modules/image/oci/oci_image.c
index 4a48016b..f712a446 100644
--- a/src/daemon/modules/image/oci/oci_image.c
+++ b/src/daemon/modules/image/oci/oci_image.c
@@ -353,7 +353,7 @@ out:
return ret;
}
-void oci_exit()
+void oci_exit(void)
{
storage_module_exit();
free_oci_image_data();
@@ -396,7 +396,7 @@ int oci_prepare_rf(const im_prepare_request *request, char **real_rootfs)
{
int ret = 0;
- if (request == NULL) {
+ if (request == NULL || request->container_id == NULL) {
ERROR("Bim is NULL");
return -1;
}
@@ -457,7 +457,7 @@ int oci_mount_rf(const im_mount_request *request)
{
char *mount_point = NULL;
- if (request == NULL) {
+ if (request == NULL || request->name_id == NULL) {
ERROR("Invalid arguments");
return -1;
}
@@ -796,7 +796,7 @@ int oci_export_rf(const im_export_request *request)
{
int ret = 0;
- if (request == NULL) {
+ if (request == NULL || request->name_id == NULL) {
ERROR("Invalid input arguments");
return -1;
}
diff --git a/src/daemon/modules/image/oci/oci_image.h b/src/daemon/modules/image/oci/oci_image.h
index c52c8a7b..07f10c8d 100644
--- a/src/daemon/modules/image/oci/oci_image.h
+++ b/src/daemon/modules/image/oci/oci_image.h
@@ -41,7 +41,7 @@ struct oci_image_module_data {
struct oci_image_module_data *get_oci_image_data(void);
int oci_init(const isulad_daemon_configs *args);
-void oci_exit();
+void oci_exit(void);
int oci_pull_rf(const im_pull_request *request, im_pull_response *response);
int oci_rmi(const im_rmi_request *request);
diff --git a/src/daemon/modules/image/oci/oci_image_type.h b/src/daemon/modules/image/oci/oci_image_type.h
deleted file mode 100644
index f436a453..00000000
--- a/src/daemon/modules/image/oci/oci_image_type.h
+++ /dev/null
@@ -1,42 +0,0 @@
-/******************************************************************************
- * Copyright (c) Huawei Technologies Co., Ltd. 2018-2019. All rights reserved.
- * iSulad licensed under the Mulan PSL v2.
- * You can use this software according to the terms and conditions of the Mulan PSL v2.
- * You may obtain a copy of Mulan PSL v2 at:
- * http://license.coscl.org.cn/MulanPSL2
- * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, MERCHANTABILITY OR FIT FOR A PARTICULAR
- * PURPOSE.
- * See the Mulan PSL v2 for more details.
- * Author: lifeng
- * Create: 2018-11-08
- * Description: provide image type definition
- ******************************************************************************/
-
-#ifndef DAEMON_MODULES_IMAGE_OCI_OCI_IMAGE_TYPE_H
-#define DAEMON_MODULES_IMAGE_OCI_OCI_IMAGE_TYPE_H
-
-#ifdef __cplusplus
-extern "C" {
-#endif
-
-/* AuthConfig contains authorization information for connecting to a registry */
-typedef struct {
- char *username;
- char *password;
- char *auth;
- char *server_address;
-
- // IdentityToken is used to authenticate the user and get
- // an access token for the registry.
- char *identity_token;
-
- // RegistryToken is a bearer token to be sent to a registry
- char *registry_token;
-} auth_config;
-
-#ifdef __cplusplus
-}
-#endif
-
-#endif
diff --git a/src/daemon/modules/image/oci/oci_import.c b/src/daemon/modules/image/oci/oci_import.c
index 93179504..1e14a916 100644
--- a/src/daemon/modules/image/oci/oci_import.c
+++ b/src/daemon/modules/image/oci/oci_import.c
@@ -268,6 +268,7 @@ static int create_manifest(import_desc *desc)
manifest->layers[0]->size = desc->compressed_size;
manifest->layers[0]->digest = util_strdup_s(desc->compressed_digest);
+ // the image manifest schema version is v2
manifest->schema_version = 2;
manifest->media_type = util_strdup_s(DOCKER_MANIFEST_SCHEMA2_JSON);
diff --git a/src/daemon/modules/image/oci/oci_load.c b/src/daemon/modules/image/oci/oci_load.c
index 5e062d44..569c5346 100644
--- a/src/daemon/modules/image/oci/oci_load.c
+++ b/src/daemon/modules/image/oci/oci_load.c
@@ -851,20 +851,17 @@ static int64_t get_layer_size_from_storage(char *chain_id_pre)
id = oci_load_without_sha256_prefix(chain_id_pre);
if (id == NULL) {
ERROR("Get chain id failed from value:%s", chain_id_pre);
- size = -1;
- goto out;
+ return -1;
}
l = storage_layer_get(id);
if (l == NULL) {
ERROR("Layer with chain id:%s is not exist in store", id);
- size = -1;
- goto out;
+ return -1;
}
size = l->compress_size;
-out:
free_layer(l);
return size;
}
@@ -883,8 +880,7 @@ static int oci_load_set_manifest_info(load_image_t *im)
im->manifest = util_common_calloc_s(sizeof(oci_image_manifest));
if (im->manifest == NULL) {
ERROR("Out of memory");
- ret = -1;
- goto out;
+ return -1;
}
im->manifest->schema_version = OCI_SCHEMA_VERSION;
diff --git a/src/daemon/modules/image/oci/oci_load.h b/src/daemon/modules/image/oci/oci_load.h
index e1e09067..53ca87d2 100644
--- a/src/daemon/modules/image/oci/oci_load.h
+++ b/src/daemon/modules/image/oci/oci_load.h
@@ -1,5 +1,5 @@
/******************************************************************************
-* Copyright (c) Huawei Technologies Co., Ltd. 2019. All rights reserved.
+* Copyright (c) Huawei Technologies Co., Ltd. 2020. All rights reserved.
* iSulad licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
diff --git a/src/daemon/modules/image/oci/oci_login.c b/src/daemon/modules/image/oci/oci_login.c
index 22de9593..e9eec378 100644
--- a/src/daemon/modules/image/oci/oci_login.c
+++ b/src/daemon/modules/image/oci/oci_login.c
@@ -1,5 +1,5 @@
/******************************************************************************
-* Copyright (c) Huawei Technologies Co., Ltd. 2019. All rights reserved.
+* Copyright (c) Huawei Technologies Co., Ltd. 2020. All rights reserved.
* iSulad licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
diff --git a/src/daemon/modules/image/oci/oci_logout.c b/src/daemon/modules/image/oci/oci_logout.c
index 02fdb126..f8a63220 100644
--- a/src/daemon/modules/image/oci/oci_logout.c
+++ b/src/daemon/modules/image/oci/oci_logout.c
@@ -1,5 +1,5 @@
/******************************************************************************
-* Copyright (c) Huawei Technologies Co., Ltd. 2019. All rights reserved.
+* Copyright (c) Huawei Technologies Co., Ltd. 2020. All rights reserved.
* iSulad licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
diff --git a/src/daemon/modules/image/oci/oci_pull.c b/src/daemon/modules/image/oci/oci_pull.c
index 5b35ca2b..e7ff77df 100644
--- a/src/daemon/modules/image/oci/oci_pull.c
+++ b/src/daemon/modules/image/oci/oci_pull.c
@@ -1,5 +1,5 @@
/******************************************************************************
-* Copyright (c) Huawei Technologies Co., Ltd. 2019. All rights reserved.
+* Copyright (c) Huawei Technologies Co., Ltd. 2020. All rights reserved.
* iSulad licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
@@ -70,7 +70,7 @@ out:
return ret;
}
-static void update_option_insecure_registry(registry_pull_options *options, char **insecure_registries, char *host)
+static void update_option_insecure_registry(registry_pull_options *options, char **insecure_registries, const char *host)
{
char **registry = NULL;
diff --git a/src/daemon/modules/image/oci/registry/registry_apiv2.c b/src/daemon/modules/image/oci/registry/registry_apiv2.c
index 048fac94..db4d311e 100644
--- a/src/daemon/modules/image/oci/registry/registry_apiv2.c
+++ b/src/daemon/modules/image/oci/registry/registry_apiv2.c
@@ -632,7 +632,7 @@ static int split_head_body(char *file, char **http_head)
}
body += strlen(deli);
- ret = util_write_file(file, body, strlen(body), 0600);
+ ret = util_write_file(file, body, strlen(body), BODY_FILE_MODE);
if (ret != 0) {
ERROR("rewrite body to file failed");
ret = -1;
diff --git a/src/daemon/modules/image/oci/storage/image_store/image_store.c b/src/daemon/modules/image/oci/storage/image_store/image_store.c
index 55e3bb97..b7e0f0cc 100644
--- a/src/daemon/modules/image/oci/storage/image_store/image_store.c
+++ b/src/daemon/modules/image/oci/storage/image_store/image_store.c
@@ -146,7 +146,7 @@ static void free_image_store(image_store_t *store)
free(store);
}
-void image_store_free()
+void image_store_free(void)
{
free_image_store(g_image_store);
g_image_store = NULL;
@@ -1185,6 +1185,11 @@ int image_store_set_big_data(const char *id, const char *key, const char *data)
return -1;
}
+ if (id == NULL || data == NULL) {
+ ERROR("Empty id or data");
+ return -1;
+ }
+
if (g_image_store == NULL) {
ERROR("Image store is not ready");
return -1;
@@ -1287,7 +1292,7 @@ int image_store_add_name(const char *id, const char *name)
size_t i;
if (id == NULL || name == NULL) {
- ERROR("Invalid input paratemer: id(%s), name(%s)", id, name);
+ ERROR("Invalid input paratemer");
return -1;
}
@@ -1515,7 +1520,7 @@ int image_store_set_metadata(const char *id, const char *metadata)
image_t *img = NULL;
if (id == NULL || metadata == NULL) {
- ERROR("Invalid paratemer: id(%s), metadata(%s)", id, metadata);
+ ERROR("Invalid paratemer");
return -1;
}
@@ -1664,7 +1669,6 @@ char *image_store_big_data(const char *id, const char *key)
}
ret = get_data_path(img->simage->id, key, filename, sizeof(filename));
-
if (ret != 0) {
ERROR("Failed to get big data file path: %s.", key);
goto out;
@@ -1809,7 +1813,7 @@ char *image_store_big_data_digest(const char *id, const char *key)
image_t *img = NULL;
char *digest = NULL;
- if (key == NULL || strlen(key) == 0) {
+ if (key == NULL || strlen(key) == 0 || id == NULL) {
ERROR("Not a valid name for a big data item, can't retrieve image big data value for empty name");
return NULL;
}
@@ -1854,8 +1858,8 @@ int image_store_big_data_names(const char *id, char ***names, size_t *names_len)
int ret = 0;
image_t *img = NULL;
- if (id == NULL) {
- ERROR("Invalid parameter, id is NULL");
+ if (id == NULL || names == NULL || names_len == NULL) {
+ ERROR("Invalid parameter");
return -1;
}
@@ -2724,7 +2728,7 @@ unlock:
return ret;
}
-size_t image_store_get_images_number()
+size_t image_store_get_images_number(void)
{
size_t number = 0;
@@ -3140,6 +3144,11 @@ int image_store_validate_manifest_schema_version_1(const char *path, bool *valid
char manifest_path[PATH_MAX] = { 0x00 };
bool valid_v2_config = false;
+ if (path == NULL || valid == NULL) {
+ ERROR("Empty path or valid");
+ return -1;
+ }
+
*valid = false;
nret = snprintf(manifest_path, sizeof(manifest_path), "%s/%s", path, IMAGE_DIGEST_BIG_DATA_KEY);
if (nret < 0 || (size_t)nret >= sizeof(manifest_path)) {
@@ -3698,6 +3707,11 @@ int remote_append_image_by_directory_with_lock(const char *id)
return -1;
}
+ if (g_image_store == NULL) {
+ ERROR("Image store is not ready");
+ return -1;
+ }
+
if (!image_store_lock(EXCLUSIVE)) {
ERROR("Failed to lock remote image store when handle: %s", id);
return -1;
@@ -3732,6 +3746,11 @@ int remote_remove_image_from_memory_with_lock(const char *id)
return -1;
}
+ if (g_image_store == NULL) {
+ ERROR("Image store is not ready");
+ return -1;
+ }
+
if (!image_store_lock(EXCLUSIVE)) {
ERROR("Failed to lock remote image store when handle: %s", id);
return -1;
@@ -3758,6 +3777,16 @@ char *remote_image_get_top_layer_from_json(const char *img_id)
storage_image *im = NULL;
parser_error err = NULL;
+ if (img_id == NULL) {
+ ERROR("Empty img id");
+ return NULL;
+ }
+
+ if (g_image_store == NULL) {
+ ERROR("Image store is not ready");
+ return NULL;
+ }
+
nret = snprintf(image_path, sizeof(image_path), "%s/%s/%s", g_image_store->dir, img_id, IMAGE_JSON);
if (nret < 0 || (size_t)nret >= sizeof(image_path)) {
ERROR("Failed to get image path");
diff --git a/src/daemon/modules/image/oci/storage/image_store/image_store.h b/src/daemon/modules/image/oci/storage/image_store/image_store.h
index 5164cc73..019a2881 100644
--- a/src/daemon/modules/image/oci/storage/image_store/image_store.h
+++ b/src/daemon/modules/image/oci/storage/image_store/image_store.h
@@ -98,13 +98,13 @@ int image_store_set_image_size(const char *id, uint64_t size);
int image_store_get_all_images(imagetool_images_list *images_list);
// On success, the number of the known images is returned. On failure, (size_t)-1 is returned
-size_t image_store_get_images_number();
+size_t image_store_get_images_number(void);
// Retrieves image file system info
int image_store_get_fs_info(imagetool_fs_info *fs_info);
// Free memory of image store, but will not delete the persisted files
-void image_store_free();
+void image_store_free(void);
imagetool_image_summary *image_store_get_image_summary(const char *id);
diff --git a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/deviceset.c b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/deviceset.c
index 4f19c26d..79541e54 100644
--- a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/deviceset.c
+++ b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/deviceset.c
@@ -499,14 +499,14 @@ bool has_metadata(const char *hash, struct device_set *devset)
bool ret = true;
int nret = 0;
- if (hash == NULL) {
+ if (hash == NULL || devset == NULL) {
return true;
}
metadata_path = metadata_dir(devset);
if (metadata_path == NULL) {
ERROR("Failed to get meta data directory");
- goto out;
+ return false;
}
nret = snprintf(metadata_file, sizeof(metadata_file), "%s/%s", metadata_path, util_valid_str(hash) ? hash : "base");
@@ -541,7 +541,7 @@ static image_devmapper_device_info *load_metadata(const struct device_set *devse
metadata_path = metadata_dir(devset);
if (metadata_path == NULL) {
ERROR("Failed to get meta data directory");
- goto out;
+ return NULL;
}
nret = snprintf(metadata_file, sizeof(metadata_file), "%s/%s", metadata_path, util_valid_str(hash) ? hash : "base");
@@ -3076,7 +3076,7 @@ int mount_device(const char *hash, const char *path, const struct driver_mount_o
char *dev_fname = NULL;
char *options = NULL;
- if (hash == NULL || path == NULL) {
+ if (hash == NULL || path == NULL || devset == NULL) {
ERROR("devmapper: invalid input params to mount device");
return -1;
}
@@ -3236,7 +3236,7 @@ int export_device_metadata(struct device_metadata *dev_metadata, const char *has
char *dm_name = NULL;
devmapper_device_info_t *device_info = NULL;
- if (hash == NULL || dev_metadata == NULL) {
+ if (hash == NULL || dev_metadata == NULL || devset == NULL) {
ERROR("Invalid input params");
return -1;
}
diff --git a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/driver_devmapper.c b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/driver_devmapper.c
index ecb62f79..d62d3133 100644
--- a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/driver_devmapper.c
+++ b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/driver_devmapper.c
@@ -198,7 +198,7 @@ int devmapper_rm_layer(const char *id, const struct graphdriver *driver)
}
if (delete_device(id, false, driver->devset) != 0) {
- ERROR("failed to remove device %s", id);
+ ERROR("Failed to remove device %s", id);
return -1;
}
@@ -624,7 +624,7 @@ int devmapper_clean_up(struct graphdriver *driver)
{
int ret = 0;
- if (driver == NULL) {
+ if (driver == NULL || driver->devset == NULL || driver->home == NULL) {
ERROR("Invalid input param to cleanup devicemapper");
return -1;
}
diff --git a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.c b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.c
index e91ddd1e..e22311f1 100644
--- a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.c
+++ b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.c
@@ -192,7 +192,7 @@ cleanup:
return NULL;
}
-char *dev_get_driver_version()
+char *dev_get_driver_version(void)
{
struct dm_task *dmt = NULL;
char *version = NULL;
@@ -234,7 +234,7 @@ cleanup:
}
// dev_get_library_version return the device mapper library version
-char *dev_get_library_version()
+char *dev_get_library_version(void)
{
char version[128] = { 0 };
@@ -679,7 +679,7 @@ cleanup:
return ret;
}
-bool udev_sync_supported()
+bool udev_sync_supported(void)
{
return dm_udev_get_sync_support() != 0;
}
@@ -705,7 +705,8 @@ int dev_create_device(const char *pool_fname, int device_id)
int ret = 0;
int nret = 0;
uint64_t sector = 0;
- char message[PATH_MAX] = { 0 }; // 临时字符缓冲区上限
+ // temporary character buffer limit
+ char message[PATH_MAX] = { 0 };
struct dm_task *dmt = NULL;
if (pool_fname == NULL) {
@@ -1066,7 +1067,7 @@ static void log_cb(int level, const char *file, int line, int dm_errno_or_class,
free(buffer);
}
-void log_with_errno_init()
+void log_with_errno_init(void)
{
dm_log_with_errno_init(log_cb);
}
@@ -1136,7 +1137,8 @@ int dev_set_transaction_id(const char *pool_name, uint64_t old_id, uint64_t new_
int ret = 0;
int nret = 0;
uint64_t sector = 0;
- char message[PATH_MAX] = { 0 }; // 临时字符缓冲区上限
+ // temporary character buffer limit
+ char message[PATH_MAX] = { 0 };
struct dm_task *dmt = NULL;
if (pool_name == NULL) {
diff --git a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.h b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.h
index e8acebc0..01771a3b 100644
--- a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.h
+++ b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.h
@@ -96,11 +96,11 @@ int set_dev_dir(const char *dir);
struct dm_task* task_create_named(int type, const char *name);
-void log_with_errno_init();
+void log_with_errno_init(void);
-char *dev_get_driver_version();
+char *dev_get_driver_version(void);
-char *dev_get_library_version();
+char *dev_get_library_version(void);
int dev_get_status(uint64_t *start, uint64_t *length, char **target_type, char **params, const char *name);
@@ -112,7 +112,7 @@ int dev_remove_device_deferred(const char *name);
int dev_get_device_list(char ***list, size_t *length);
-bool udev_sync_supported();
+bool udev_sync_supported(void);
bool udev_set_sync_support(bool enable);
diff --git a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.c b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.c
index 3b27076c..ced30b96 100644
--- a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.c
+++ b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.c
@@ -405,12 +405,6 @@ out:
return ret;
}
-bool overlay2_is_quota_options(struct graphdriver *driver, const char *option)
-{
- return strncmp(option, QUOTA_SIZE_OPTION, strlen(QUOTA_SIZE_OPTION)) == 0 ||
- strncmp(option, QUOTA_BASESIZE_OPTIONS, strlen(QUOTA_BASESIZE_OPTIONS)) == 0;
-}
-
static int check_parent_valid(const char *parent, const struct graphdriver *driver)
{
int ret = 0;
@@ -1158,7 +1152,7 @@ int overlay2_rm_layer(const char *id, const struct graphdriver *driver)
struct stat stat_buf;
#endif
- if (id == NULL || driver == NULL) {
+ if (id == NULL || driver == NULL || driver->home == NULL) {
ERROR("Invalid input arguments");
return -1;
}
@@ -1844,6 +1838,11 @@ bool overlay2_layer_exists(const char *id, const struct graphdriver *driver)
char *layer_dir = NULL;
char *link_id = NULL;
+ if (id == NULL || driver == NULL || driver->home == NULL) {
+ ERROR("Failed to verify overlay2 layer exists for empty id or driver");
+ return false;
+ }
+
layer_dir = util_path_join(driver->home, id);
if (layer_dir == NULL) {
ERROR("Failed to join layer dir:%s", id);
@@ -2075,7 +2074,7 @@ int overlay2_get_driver_status(const struct graphdriver *driver, struct graphdri
int nret = 0;
char tmp[MAX_INFO_LENGTH] = { 0 };
- if (driver == NULL || status == NULL) {
+ if (driver == NULL || status == NULL || driver->backing_fs == NULL) {
ERROR("Invalid input arguments");
return -1;
}
@@ -2117,7 +2116,7 @@ int overlay2_clean_up(struct graphdriver *driver)
{
int ret = 0;
- if (driver == NULL) {
+ if (driver == NULL || driver->home == NULL) {
ERROR("Invalid input arguments");
ret = -1;
goto out;
diff --git a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.h b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.h
index e14271b1..438c508e 100644
--- a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.h
+++ b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.h
@@ -35,8 +35,6 @@ extern "C" {
int overlay2_init(struct graphdriver *driver, const char *driver_home, const char **options, size_t len);
-bool overlay2_is_quota_options(struct graphdriver *driver, const char *option);
-
int overlay2_create_rw(const char *id, const char *parent, const struct graphdriver *driver,
struct driver_create_opts *create_opts);
diff --git a/src/daemon/modules/image/oci/storage/layer_store/layer.c b/src/daemon/modules/image/oci/storage/layer_store/layer.c
index 4baeb7c2..4beb3d10 100644
--- a/src/daemon/modules/image/oci/storage/layer_store/layer.c
+++ b/src/daemon/modules/image/oci/storage/layer_store/layer.c
@@ -46,7 +46,7 @@ void free_layer_t(layer_t *ptr)
free(ptr);
}
-layer_t *create_empty_layer()
+layer_t *create_empty_layer(void)
{
layer_t *result = NULL;
int nret = 0;
diff --git a/src/daemon/modules/image/oci/storage/layer_store/layer.h b/src/daemon/modules/image/oci/storage/layer_store/layer.h
index f2dad648..9387efe0 100644
--- a/src/daemon/modules/image/oci/storage/layer_store/layer.h
+++ b/src/daemon/modules/image/oci/storage/layer_store/layer.h
@@ -43,7 +43,7 @@ typedef struct _layer_t_ {
uint64_t refcnt;
} layer_t;
-layer_t *create_empty_layer();
+layer_t *create_empty_layer(void);
void free_layer_t(layer_t *ptr);
void layer_ref_inc(layer_t *layer);
diff --git a/src/daemon/modules/image/oci/storage/layer_store/layer_store.c b/src/daemon/modules/image/oci/storage/layer_store/layer_store.c
index 6ea3c48b..3ffe0ca7 100644
--- a/src/daemon/modules/image/oci/storage/layer_store/layer_store.c
+++ b/src/daemon/modules/image/oci/storage/layer_store/layer_store.c
@@ -117,7 +117,7 @@ static inline void layer_store_unlock()
}
}
-void layer_store_cleanup()
+void layer_store_cleanup(void)
{
struct linked_list *item = NULL;
struct linked_list *next = NULL;
@@ -230,7 +230,7 @@ static inline void delete_g_layer_list_item(struct linked_list *item, bool rm_va
g_metadata.layers_list_len -= 1;
}
-void remove_layer_list_tail()
+void remove_layer_list_tail(void)
{
struct linked_list *item = NULL;
@@ -1231,18 +1231,6 @@ int layer_store_delete(const char *id)
return ret;
}
-bool layer_store_exists(const char *id)
-{
- layer_t *l = lookup_with_lock(id);
-
- if (l == NULL) {
- return false;
- }
-
- layer_ref_dec(l);
- return true;
-}
-
static void copy_json_to_layer(const layer_t *jl, struct layer *l)
{
if (jl->slayer == NULL) {
@@ -1354,7 +1342,7 @@ int layer_store_by_compress_digest(const char *digest, struct layer_list *resp)
{
int ret = 0;
- if (resp == NULL) {
+ if (digest == NULL || resp == NULL) {
return -1;
}
@@ -1367,22 +1355,6 @@ int layer_store_by_compress_digest(const char *digest, struct layer_list *resp)
return ret;
}
-int layer_store_by_uncompress_digest(const char *digest, struct layer_list *resp)
-{
- int ret = 0;
-
- if (resp == NULL) {
- return -1;
- }
- if (!layer_store_lock(false)) {
- return -1;
- }
-
- ret = layers_by_digest_map(g_metadata.by_uncompress_digest, digest, resp);
- layer_store_unlock();
- return ret;
-}
-
struct layer *layer_store_lookup(const char *name)
{
struct layer *ret = NULL;
@@ -1492,6 +1464,10 @@ int layer_store_try_repair_lowers(const char *id)
layer_t *l = NULL;
int ret = 0;
+ if (id == NULL) {
+ return -1;
+ }
+
l = lookup_with_lock(id);
if (l == NULL) {
return -1;
@@ -1807,7 +1783,7 @@ free_out:
return -1;
}
-void layer_store_exit()
+void layer_store_exit(void)
{
graphdriver_cleanup();
}
@@ -2116,6 +2092,11 @@ int layer_store_check(const char *id)
int ret = 0;
char *rootfs = NULL;
+ if (id == NULL) {
+ ERROR("Failed to do layer store check for Empty id");
+ return -1;
+ }
+
layer_t *l = lookup_with_lock(id);
if (l == NULL || l->slayer == NULL) {
ERROR("layer %s not found when checking integration", id);
@@ -2157,6 +2138,11 @@ int remote_layer_remove_memory_stores_with_lock(const char *id)
{
int ret = 0;
+ if (id == NULL) {
+ ERROR("Failed to lock layer store for empty id");
+ return -1;
+ }
+
if (!layer_store_lock(true)) {
ERROR("Failed to lock layer store when handle: %s", id);
return -1;
@@ -2237,6 +2223,11 @@ int remote_load_one_layer(const char *id)
layer_t *tl = NULL;
size_t i = 0;
+ if (id == NULL) {
+ ERROR("Failed to do remote load one layer for empty id");
+ return -1;
+ }
+
if (!layer_store_lock(true)) {
return -1;
}
diff --git a/src/daemon/modules/image/oci/storage/layer_store/layer_store.h b/src/daemon/modules/image/oci/storage/layer_store/layer_store.h
index be8c52dc..20287119 100644
--- a/src/daemon/modules/image/oci/storage/layer_store/layer_store.h
+++ b/src/daemon/modules/image/oci/storage/layer_store/layer_store.h
@@ -51,20 +51,18 @@ struct layer_opts {
};
int layer_store_init(const struct storage_module_init_options *conf);
-void layer_store_exit();
-void layer_store_cleanup();
+void layer_store_exit(void);
+void layer_store_cleanup(void);
-void remove_layer_list_tail();
+void remove_layer_list_tail(void);
int layer_store_create(const char *id, const struct layer_opts *opts, const struct io_read_wrapper *content,
char **new_id);
int layer_inc_hold_refs(const char *layer_id);
int layer_dec_hold_refs(const char *layer_id);
int layer_get_hold_refs(const char *layer_id, int *ref_num);
int layer_store_delete(const char *id);
-bool layer_store_exists(const char *id);
int layer_store_list(struct layer_list *resp);
int layer_store_by_compress_digest(const char *digest, struct layer_list *resp);
-int layer_store_by_uncompress_digest(const char *digest, struct layer_list *resp);
struct layer *layer_store_lookup(const char *name);
char *layer_store_mount(const char *id);
int layer_store_umount(const char *id, bool force);
diff --git a/src/daemon/modules/image/oci/storage/remote_layer_support/image_remote_impl.c b/src/daemon/modules/image/oci/storage/remote_layer_support/image_remote_impl.c
index b4a53ec1..07c4a5cc 100644
--- a/src/daemon/modules/image/oci/storage/remote_layer_support/image_remote_impl.c
+++ b/src/daemon/modules/image/oci/storage/remote_layer_support/image_remote_impl.c
@@ -1,5 +1,5 @@
/******************************************************************************
- * Copyright (c) Huawei Technologies Co., Ltd. 2020-2023. All rights reserved.
+ * Copyright (c) Huawei Technologies Co., Ltd. 2023. All rights reserved.
* iSulad licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
@@ -31,6 +31,11 @@ static map_t *image_byid_new = NULL;
struct remote_image_data *remote_image_create(const char *remote_home, const char *remote_ro)
{
+ if (remote_home == NULL) {
+ ERROR("Empty remote home");
+ return NULL;
+ }
+
struct remote_image_data *data = util_common_calloc_s(sizeof(struct remote_image_data));
if (data == NULL) {
ERROR("Out of memory");
@@ -204,6 +209,11 @@ static int remote_image_add(void *data)
void remote_image_refresh(struct remote_image_data *data)
{
+ if (data == NULL) {
+ ERROR("Skip refresh remote image for empty data");
+ return;
+ }
+
if (remote_dir_scan(data) != 0) {
ERROR("remote overlay failed to scan dir, skip refresh");
return;
diff --git a/src/daemon/modules/image/oci/storage/remote_layer_support/layer_remote_impl.c b/src/daemon/modules/image/oci/storage/remote_layer_support/layer_remote_impl.c
index b1a1e944..7527f1e4 100644
--- a/src/daemon/modules/image/oci/storage/remote_layer_support/layer_remote_impl.c
+++ b/src/daemon/modules/image/oci/storage/remote_layer_support/layer_remote_impl.c
@@ -31,6 +31,11 @@ static map_t *layer_byid_new = NULL;
struct remote_layer_data *remote_layer_create(const char *layer_home, const char *layer_ro)
{
+ if (layer_home == NULL || layer_ro == NULL) {
+ ERROR("Empty layer home or layer ro");
+ return NULL;
+ }
+
struct remote_layer_data *data = util_common_calloc_s(sizeof(struct remote_layer_data));
if (data == NULL) {
ERROR("Out of memory");
@@ -232,6 +237,11 @@ static int remote_layer_add(struct remote_layer_data *data)
void remote_layer_refresh(struct remote_layer_data *data)
{
+ if (data == NULL) {
+ ERROR("Skip refresh remote layer for empty data");
+ return;
+ }
+
if (remote_dir_scan(data) != 0) {
ERROR("remote layer failed to scan dir, skip refresh");
return;
diff --git a/src/daemon/modules/image/oci/storage/remote_layer_support/overlay_remote_impl.c b/src/daemon/modules/image/oci/storage/remote_layer_support/overlay_remote_impl.c
index e44c64ef..38d9b0ce 100644
--- a/src/daemon/modules/image/oci/storage/remote_layer_support/overlay_remote_impl.c
+++ b/src/daemon/modules/image/oci/storage/remote_layer_support/overlay_remote_impl.c
@@ -37,6 +37,11 @@ static map_t *overlay_id_link = NULL;
struct remote_overlay_data *remote_overlay_create(const char *remote_home, const char *remote_ro)
{
+ if (remote_home == NULL || remote_ro == NULL) {
+ ERROR("Empty remote home or remote ro");
+ return NULL;
+ }
+
struct remote_overlay_data *data = util_common_calloc_s(sizeof(struct remote_overlay_data));
if (data == NULL) {
ERROR("Out of memory");
@@ -341,6 +346,11 @@ static int remote_overlay_add(struct remote_overlay_data *data)
void remote_overlay_refresh(struct remote_overlay_data *data)
{
+ if (data == NULL) {
+ ERROR("Skip refresh remote overlay for empty data");
+ return;
+ }
+
if (remote_dir_scan(data) != 0) {
ERROR("remote overlay failed to scan dir, skip refresh");
return;
diff --git a/src/daemon/modules/image/oci/storage/remote_layer_support/remote_support.c b/src/daemon/modules/image/oci/storage/remote_layer_support/remote_support.c
index 1bac8dd5..5bf9869b 100644
--- a/src/daemon/modules/image/oci/storage/remote_layer_support/remote_support.c
+++ b/src/daemon/modules/image/oci/storage/remote_layer_support/remote_support.c
@@ -87,6 +87,11 @@ int remote_start_refresh_thread(pthread_rwlock_t *remote_lock)
pthread_t a_thread;
maintain_context ctx = get_maintain_context();
+ if (remote_lock == NULL) {
+ ERROR("Invalid remote lock");
+ return -1;
+ }
+
supporters.image_data = remote_image_create(ctx.image_home, NULL);
if (supporters.image_data == NULL) {
goto free_out;
diff --git a/src/daemon/modules/image/oci/storage/remote_layer_support/ro_symlink_maintain.c b/src/daemon/modules/image/oci/storage/remote_layer_support/ro_symlink_maintain.c
index 4d234aab..ea40ae45 100644
--- a/src/daemon/modules/image/oci/storage/remote_layer_support/ro_symlink_maintain.c
+++ b/src/daemon/modules/image/oci/storage/remote_layer_support/ro_symlink_maintain.c
@@ -37,6 +37,8 @@ static char *layer_home;
static char *overlay_ro_dir;
static char *overlay_home;
+#define LAYER_RO_DIR_MODE 0700
+
int remote_image_init(const char *root_dir)
{
if (root_dir == NULL) {
@@ -67,7 +69,7 @@ int remote_layer_init(const char *root_dir)
ERROR("Failed join path when init remote layer maintainer");
goto out;
}
- if (!util_file_exists(layer_ro_dir) && util_mkdir_p(layer_ro_dir, 0700) != 0) {
+ if (!util_file_exists(layer_ro_dir) && util_mkdir_p(layer_ro_dir, LAYER_RO_DIR_MODE) != 0) {
ERROR("Failed to create RO dir under overlay");
goto out;
}
@@ -127,6 +129,11 @@ static int do_build_ro_dir(const char *home, const char *id)
int nret = 0;
int ret = 0;
+ if (home == NULL || id == NULL) {
+ ERROR("Empty home or id");
+ return -1;
+ }
+
nret = asprintf(&ro_symlink, "%s/%s", home, id);
if (nret < 0 || nret > PATH_MAX) {
SYSERROR("Failed create ro layer dir sym link path");
@@ -183,7 +190,7 @@ int do_remove_ro_dir(const char *home, const char *id)
int ret = 0;
int nret = 0;
- if (id == NULL) {
+ if (home == NULL || id == NULL) {
return 0;
}
diff --git a/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.c b/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.c
index ee1e15d0..7ed07029 100644
--- a/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.c
+++ b/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.c
@@ -121,7 +121,7 @@ static void free_rootfs_store(rootfs_store_t *store)
free(store);
}
-void rootfs_store_free()
+void rootfs_store_free(void)
{
free_rootfs_store(g_rootfs_store);
g_rootfs_store = NULL;
@@ -1085,7 +1085,7 @@ out:
return ret;
}
-int rootfs_store_wipe()
+int rootfs_store_wipe(void)
{
int ret = 0;
char *id = NULL;
@@ -1125,7 +1125,7 @@ int rootfs_store_set_metadata(const char *id, const char *metadata)
cntrootfs_t *cntr = NULL;
if (id == NULL || metadata == NULL) {
- ERROR("Invalid paratemer: id(%s), metadata(%s)", id, metadata);
+ ERROR("Invalid paratemer");
return -1;
}
@@ -1331,7 +1331,7 @@ out:
return ret;
}
-char *rootfs_store_get_data_dir()
+char *rootfs_store_get_data_dir(void)
{
return util_strdup_s(g_rootfs_store->dir);
}
\ No newline at end of file
diff --git a/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.h b/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.h
index c23af091..63f3294b 100644
--- a/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.h
+++ b/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.h
@@ -48,7 +48,7 @@ char *rootfs_store_lookup(const char *id);
int rootfs_store_delete(const char *id);
// Remove records of all containers
-int rootfs_store_wipe();
+int rootfs_store_wipe(void);
// Updates the metadata associated with the item with the specified ID.
int rootfs_store_set_metadata(const char *id, const char *metadata);
@@ -66,10 +66,10 @@ storage_rootfs *rootfs_store_get_rootfs(const char *id);
int rootfs_store_get_all_rootfs(struct rootfs_list *all_rootfs);
// Return rootfs store data dir
-char *rootfs_store_get_data_dir();
+char *rootfs_store_get_data_dir(void);
// Free memory of container store, but will not delete the persisted files
-void rootfs_store_free();
+void rootfs_store_free(void);
#ifdef __cplusplus
}
diff --git a/src/daemon/modules/image/oci/storage/storage.c b/src/daemon/modules/image/oci/storage/storage.c
index 13f8bb53..255ec89c 100644
--- a/src/daemon/modules/image/oci/storage/storage.c
+++ b/src/daemon/modules/image/oci/storage/storage.c
@@ -194,6 +194,11 @@ int storage_inc_hold_refs(const char *layer_id)
{
int ret = 0;
+ if (layer_id == NULL) {
+ ERROR("Empty layer id");
+ return -1;
+ }
+
if (!storage_lock(&g_storage_rwlock, true)) {
ERROR("Failed to lock image store when increase hold refs number for layer %s", layer_id);
return -1;
@@ -209,6 +214,11 @@ int storage_inc_hold_refs(const char *layer_id)
int storage_dec_hold_refs(const char *layer_id)
{
int ret = 0;
+
+ if (layer_id == NULL) {
+ ERROR("Empty layer id");
+ return -1;
+ }
if (!storage_lock(&g_storage_rwlock, true)) {
ERROR("Failed to lock image store when decrease hold refs number for layer %s", layer_id);
@@ -284,6 +294,11 @@ struct layer_list *storage_layers_get_by_compress_digest(const char *digest)
int ret = 0;
struct layer_list *layers = NULL;
+ if (digest == NULL) {
+ ERROR("Empty digest");
+ return NULL;
+ }
+
layers = util_common_calloc_s(sizeof(struct layer_list));
if (layers == NULL) {
ERROR("Out of memory");
@@ -539,7 +554,7 @@ char *storage_img_get_image_id(const char *img_name)
return image_store_lookup(img_name);
}
-bool is_top_layer_of_other_image(const char *img_id, const imagetool_images_list *all_images, const char *layer_id)
+static bool is_top_layer_of_other_image(const char *img_id, const imagetool_images_list *all_images, const char *layer_id)
{
size_t i = 0;
@@ -913,6 +928,11 @@ int storage_img_set_image_size(const char *image_id)
int ret = 0;
int64_t image_size = 0;
+ if (image_id == NULL) {
+ ERROR("Empty image id");
+ return -1;
+ }
+
image_size = storage_img_cal_image_size(image_id);
if (image_size < 0) {
ERROR("Failed to get image %s size", image_id);
@@ -961,7 +981,7 @@ bool storage_image_exist(const char *image_or_id)
return image_store_exists(image_or_id);
}
-size_t storage_get_img_count()
+size_t storage_get_img_count(void)
{
return image_store_get_images_number();
}
@@ -1250,8 +1270,8 @@ int storage_rootfs_fs_usgae(const char *container_id, imagetool_fs_info *fs_info
}
rootfs_info = rootfs_store_get_rootfs(container_id);
- if (rootfs_info == NULL) {
- ERROR("Failed to get rootfs %s info", container_id);
+ if (rootfs_info == NULL || rootfs_info->layer == NULL) {
+ ERROR("Failed to get valid rootfs %s info", container_id);
ret = -1;
goto out;
}
@@ -1278,7 +1298,7 @@ char *storage_rootfs_mount(const char *container_id)
}
rootfs_info = rootfs_store_get_rootfs(container_id);
- if (rootfs_info == NULL) {
+ if (rootfs_info == NULL || rootfs_info->layer == NULL) {
ERROR("Failed to get rootfs %s info", container_id);
goto out;
}
@@ -1726,6 +1746,11 @@ container_inspect_graph_driver *storage_get_metadata_by_container_id(const char
storage_rootfs *rootfs_info = NULL;
container_inspect_graph_driver *container_metadata = NULL;
+ if (id == NULL) {
+ ERROR("Empty id");
+ return NULL;
+ }
+
rootfs_info = rootfs_store_get_rootfs(id);
if (rootfs_info == NULL) {
ERROR("Failed to get rootfs %s info", id);
diff --git a/src/daemon/modules/image/oci/storage/storage.h b/src/daemon/modules/image/oci/storage/storage.h
index a761938c..718f7eff 100644
--- a/src/daemon/modules/image/oci/storage/storage.h
+++ b/src/daemon/modules/image/oci/storage/storage.h
@@ -119,7 +119,7 @@ typedef struct storage_layer_create_opts {
int storage_module_init(struct storage_module_init_options *opts);
-void storage_module_exit();
+void storage_module_exit(void);
void free_storage_module_init_options(struct storage_module_init_options *opts);
@@ -153,7 +153,7 @@ int storage_img_set_image_size(const char *image_id);
char *storage_get_img_top_layer(const char *id);
-size_t storage_get_img_count();
+size_t storage_get_img_count(void);
char *storage_img_get_image_id(const char *img_name);
@@ -191,7 +191,7 @@ char *storage_rootfs_mount(const char *container_id);
int storage_rootfs_umount(const char *container_id, bool force);
-char *storage_rootfs_get_dir();
+char *storage_rootfs_get_dir(void);
container_inspect_graph_driver *storage_get_metadata_by_container_id(const char *id);
diff --git a/src/daemon/modules/image/oci/utils_images.c b/src/daemon/modules/image/oci/utils_images.c
index 2c5656c6..f8fd1e73 100644
--- a/src/daemon/modules/image/oci/utils_images.c
+++ b/src/daemon/modules/image/oci/utils_images.c
@@ -247,7 +247,7 @@ int oci_split_image_name(const char *image_name, char **host, char **name, char
return 0;
}
-char *get_hostname_to_strip()
+char *get_hostname_to_strip(void)
{
char *name = NULL;
@@ -320,6 +320,11 @@ char *make_big_data_base_name(const char *key)
char *base_name = NULL;
size_t name_size;
+ if (key == NULL) {
+ ERROR("Empty key");
+ return NULL;
+ }
+
if (should_use_origin_name(key)) {
return util_strdup_s(key);
}
diff --git a/src/daemon/modules/image/oci/utils_images.h b/src/daemon/modules/image/oci/utils_images.h
index 97879e41..2238bb91 100644
--- a/src/daemon/modules/image/oci/utils_images.h
+++ b/src/daemon/modules/image/oci/utils_images.h
@@ -57,7 +57,7 @@ int oci_split_search_name(const char *search_name, char **host, char **name);
char *oci_get_isulad_tmpdir(const char *root_dir);
int makesure_isulad_tmpdir_perm_right(const char *root_dir);
-char *get_hostname_to_strip();
+char *get_hostname_to_strip(void);
char *oci_image_digest_pos(const char *name);
diff --git a/src/utils/http/http.h b/src/utils/http/http.h
index cdd6d64f..02d56ba8 100644
--- a/src/utils/http/http.h
+++ b/src/utils/http/http.h
@@ -107,6 +107,8 @@ struct http_get_options {
#define AUTHZ_UNIX_SOCK "/run/isulad/plugins/authz-broker.sock"
#define AUTHZ_REQUEST_URL "http://localhost/isulad.auth"
+#define BODY_FILE_MODE 0600
+
/* http response code */
enum http_response_code {
StatusContinue = 100, // RFC 7231, 6.2.1
diff --git a/test/image/oci/storage/layers/storage_driver_ut.cc b/test/image/oci/storage/layers/storage_driver_ut.cc
index ae9f4df1..943fa073 100644
--- a/test/image/oci/storage/layers/storage_driver_ut.cc
+++ b/test/image/oci/storage/layers/storage_driver_ut.cc
@@ -269,12 +269,4 @@ TEST_F(StorageDriverUnitTest, test_graphdriver_try_repair_lowers)
std::string id { "1be74353c3d0fd55fb5638a52953e6f1bc441e5b1710921db9ec2aa202725569" };
ASSERT_EQ(graphdriver_try_repair_lowers(id.c_str(), nullptr), 0);
-}
-
-TEST(StorageOverlay2QuotaOptionsTest, test_overlay2_is_quota_options)
-{
- std::vector<std::string> options { "overlay2.size", "overlay2.basesize" };
- for (auto option : options) {
- ASSERT_TRUE(overlay2_is_quota_options(nullptr, option.c_str()));
- }
-}
+}
\ No newline at end of file
diff --git a/test/image/oci/storage/layers/storage_layers_ut.cc b/test/image/oci/storage/layers/storage_layers_ut.cc
index fca37e83..73611fdc 100644
--- a/test/image/oci/storage/layers/storage_layers_ut.cc
+++ b/test/image/oci/storage/layers/storage_layers_ut.cc
@@ -278,19 +278,6 @@ TEST_F(StorageLayersUnitTest, test_layers_load)
free_layer_list(layer_list);
}
-TEST_F(StorageLayersUnitTest, test_layer_store_exists)
-{
- if (!support_overlay) {
- return;
- }
-
- std::string id { "7db8f44a0a8e12ea4283e3180e98880007efbd5de2e7c98b67de9cdd4dfffb0b" };
- std::string incorrectId { "50551ff67da98ab8540d7132" };
-
- ASSERT_TRUE(layer_store_exists(id.c_str()));
- ASSERT_FALSE(layer_store_exists(incorrectId.c_str()));
-}
-
TEST_F(StorageLayersUnitTest, test_layer_store_create)
{
if (!support_overlay) {
@@ -337,24 +324,3 @@ TEST_F(StorageLayersUnitTest, test_layer_store_by_compress_digest)
free_layer_list(layer_list);
}
-
-TEST_F(StorageLayersUnitTest, test_layer_store_by_uncompress_digest)
-{
- if (!support_overlay) {
- return;
- }
-
- std::string uncompress { "sha256:9c27e219663c25e0f28493790cc0b88bc973ba3b1686355f221c38a36978ac63" };
- std::string id { "9c27e219663c25e0f28493790cc0b88bc973ba3b1686355f221c38a36978ac63" };
- struct layer_list *layer_list = (struct layer_list *)util_common_calloc_s(sizeof(struct layer_list));
-
- ASSERT_EQ(layer_store_by_uncompress_digest(uncompress.c_str(), layer_list), 0);
- ASSERT_EQ(layer_list->layers_len, 1);
-
- struct layer **layers = layer_list->layers;
- ASSERT_STREQ(layers[0]->id, id.c_str());
- ASSERT_STREQ(layers[0]->uncompressed_digest, uncompress.c_str());
- ASSERT_EQ(layers[0]->uncompress_size, 1672256);
-
- free_layer_list(layer_list);
-}
diff --git a/test/mocks/driver_overlay2_mock.cc b/test/mocks/driver_overlay2_mock.cc
index 6f24dbcf..6892539d 100644
--- a/test/mocks/driver_overlay2_mock.cc
+++ b/test/mocks/driver_overlay2_mock.cc
@@ -39,11 +39,3 @@ int overlay2_parse_options(struct graphdriver *driver, const char **options, siz
}
return -1;
}
-
-bool overlay2_is_quota_options(struct graphdriver *driver, const char *option)
-{
- if (g_driver_overlay2_mock != nullptr) {
- return g_driver_overlay2_mock->Overlay2IsQuotaOptions(driver, option);
- }
- return false;
-}
diff --git a/test/mocks/driver_overlay2_mock.h b/test/mocks/driver_overlay2_mock.h
index 071e6287..f09b715a 100644
--- a/test/mocks/driver_overlay2_mock.h
+++ b/test/mocks/driver_overlay2_mock.h
@@ -24,7 +24,6 @@ public:
virtual ~MockDriverOverlay2() = default;
MOCK_METHOD1(Overlay2Init, int(struct graphdriver *));
MOCK_METHOD3(Overlay2ParseOptions, int(struct graphdriver *, const char **, size_t));
- MOCK_METHOD2(Overlay2IsQuotaOptions, bool(struct graphdriver *, const char *));
};
void MockDriverOverlay2_SetMock(MockDriverOverlay2* mock);
--
2.40.1