mirror of
https://github.com/containers/skopeo.git
synced 2025-05-05 14:37:12 +00:00
346 lines
9.6 KiB
Go
346 lines
9.6 KiB
Go
package inspect
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"strings"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/Sirupsen/logrus"
|
|
"github.com/codegangsta/cli"
|
|
"github.com/docker/distribution/digest"
|
|
distreference "github.com/docker/distribution/reference"
|
|
"github.com/docker/distribution/registry/api/errcode"
|
|
"github.com/docker/distribution/registry/api/v2"
|
|
"github.com/docker/distribution/registry/client"
|
|
"github.com/docker/docker/api"
|
|
"github.com/docker/docker/cliconfig"
|
|
"github.com/docker/docker/distribution"
|
|
"github.com/docker/docker/dockerversion"
|
|
"github.com/docker/docker/image"
|
|
"github.com/docker/docker/opts"
|
|
versionPkg "github.com/docker/docker/pkg/version"
|
|
"github.com/docker/docker/reference"
|
|
"github.com/docker/docker/registry"
|
|
engineTypes "github.com/docker/engine-api/types"
|
|
registryTypes "github.com/docker/engine-api/types/registry"
|
|
"github.com/projectatomic/skopeo/types"
|
|
"golang.org/x/net/context"
|
|
)
|
|
|
|
// fallbackError wraps an error that can possibly allow fallback to a different
|
|
// endpoint.
|
|
type fallbackError struct {
|
|
// err is the error being wrapped.
|
|
err error
|
|
// confirmedV2 is set to true if it was confirmed that the registry
|
|
// supports the v2 protocol. This is used to limit fallbacks to the v1
|
|
// protocol.
|
|
confirmedV2 bool
|
|
transportOK bool
|
|
}
|
|
|
|
// Error renders the FallbackError as a string.
|
|
func (f fallbackError) Error() string {
|
|
return f.err.Error()
|
|
}
|
|
|
|
type manifestFetcher interface {
|
|
Fetch(ctx context.Context, ref reference.Named) (types.ImageManifest, error)
|
|
}
|
|
|
|
func validateName(name string) error {
|
|
distref, err := distreference.ParseNamed(name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
hostname, _ := distreference.SplitHostname(distref)
|
|
if hostname == "" {
|
|
return fmt.Errorf("Please use a fully qualified repository name")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func GetData(c *cli.Context, name string) (types.ImageManifest, error) {
|
|
if err := validateName(name); err != nil {
|
|
return nil, err
|
|
}
|
|
ref, err := reference.ParseNamed(name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
repoInfo, err := registry.ParseRepositoryInfo(ref)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
authConfig, err := getAuthConfig(c, repoInfo.Index)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err := validateRepoName(repoInfo.Name()); err != nil {
|
|
return nil, err
|
|
}
|
|
options := ®istry.Options{}
|
|
options.Mirrors = opts.NewListOpts(nil)
|
|
options.InsecureRegistries = opts.NewListOpts(nil)
|
|
options.InsecureRegistries.Set("0.0.0.0/0")
|
|
registryService := registry.NewService(options)
|
|
// TODO(runcom): hacky, provide a way of passing tls cert (flag?) to be used to lookup
|
|
for _, ic := range registryService.Config.IndexConfigs {
|
|
ic.Secure = false
|
|
}
|
|
|
|
endpoints, err := registryService.LookupPullEndpoints(repoInfo.Hostname())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
logrus.Debugf("endpoints: %v", endpoints)
|
|
|
|
var (
|
|
ctx = context.Background()
|
|
lastErr error
|
|
discardNoSupportErrors bool
|
|
imgInspect types.ImageManifest
|
|
confirmedV2 bool
|
|
confirmedTLSRegistries = make(map[string]struct{})
|
|
)
|
|
|
|
for _, endpoint := range endpoints {
|
|
// make sure I can reach the registry, same as docker pull does
|
|
v1endpoint, err := endpoint.ToV1Endpoint(dockerversion.DockerUserAgent(), nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if _, err := v1endpoint.Ping(); err != nil {
|
|
if strings.Contains(err.Error(), "timeout") {
|
|
return nil, err
|
|
}
|
|
continue
|
|
}
|
|
|
|
if confirmedV2 && endpoint.Version == registry.APIVersion1 {
|
|
logrus.Debugf("Skipping v1 endpoint %s because v2 registry was detected", endpoint.URL)
|
|
continue
|
|
}
|
|
|
|
if endpoint.URL.Scheme != "https" {
|
|
if _, confirmedTLS := confirmedTLSRegistries[endpoint.URL.Host]; confirmedTLS {
|
|
logrus.Debugf("Skipping non-TLS endpoint %s for host/port that appears to use TLS", endpoint.URL)
|
|
continue
|
|
}
|
|
}
|
|
|
|
logrus.Debugf("Trying to fetch image manifest of %s repository from %s %s", repoInfo.Name(), endpoint.URL, endpoint.Version)
|
|
|
|
//fetcher, err := newManifestFetcher(endpoint, repoInfo, config)
|
|
fetcher, err := newManifestFetcher(endpoint, repoInfo, authConfig, registryService)
|
|
if err != nil {
|
|
lastErr = err
|
|
continue
|
|
}
|
|
|
|
if imgInspect, err = fetcher.Fetch(ctx, ref); err != nil {
|
|
// Was this fetch cancelled? If so, don't try to fall back.
|
|
fallback := false
|
|
select {
|
|
case <-ctx.Done():
|
|
default:
|
|
if fallbackErr, ok := err.(fallbackError); ok {
|
|
fallback = true
|
|
confirmedV2 = confirmedV2 || fallbackErr.confirmedV2
|
|
if fallbackErr.transportOK && endpoint.URL.Scheme == "https" {
|
|
confirmedTLSRegistries[endpoint.URL.Host] = struct{}{}
|
|
}
|
|
err = fallbackErr.err
|
|
}
|
|
}
|
|
if fallback {
|
|
if _, ok := err.(distribution.ErrNoSupport); !ok {
|
|
// Because we found an error that's not ErrNoSupport, discard all subsequent ErrNoSupport errors.
|
|
discardNoSupportErrors = true
|
|
// save the current error
|
|
lastErr = err
|
|
} else if !discardNoSupportErrors {
|
|
// Save the ErrNoSupport error, because it's either the first error or all encountered errors
|
|
// were also ErrNoSupport errors.
|
|
lastErr = err
|
|
}
|
|
continue
|
|
}
|
|
logrus.Errorf("Not continuing with pull after error: %v", err)
|
|
return nil, err
|
|
}
|
|
|
|
return imgInspect, nil
|
|
}
|
|
|
|
if lastErr == nil {
|
|
lastErr = fmt.Errorf("no endpoints found for %s", ref.String())
|
|
}
|
|
|
|
return nil, lastErr
|
|
}
|
|
|
|
func newManifestFetcher(endpoint registry.APIEndpoint, repoInfo *registry.RepositoryInfo, authConfig engineTypes.AuthConfig, registryService *registry.Service) (manifestFetcher, error) {
|
|
switch endpoint.Version {
|
|
case registry.APIVersion2:
|
|
return &v2ManifestFetcher{
|
|
endpoint: endpoint,
|
|
authConfig: authConfig,
|
|
service: registryService,
|
|
repoInfo: repoInfo,
|
|
}, nil
|
|
case registry.APIVersion1:
|
|
return &v1ManifestFetcher{
|
|
endpoint: endpoint,
|
|
authConfig: authConfig,
|
|
service: registryService,
|
|
repoInfo: repoInfo,
|
|
}, nil
|
|
}
|
|
return nil, fmt.Errorf("unknown version %d for registry %s", endpoint.Version, endpoint.URL)
|
|
}
|
|
|
|
func getAuthConfig(c *cli.Context, index *registryTypes.IndexInfo) (engineTypes.AuthConfig, error) {
|
|
var (
|
|
username = c.GlobalString("username")
|
|
password = c.GlobalString("password")
|
|
cfg = c.GlobalString("docker-cfg")
|
|
defAuthConfig = engineTypes.AuthConfig{
|
|
Username: c.GlobalString("username"),
|
|
Password: c.GlobalString("password"),
|
|
Email: "stub@example.com",
|
|
}
|
|
)
|
|
|
|
//
|
|
// FINAL TODO(runcom): avoid returning empty config! just fallthrough and return
|
|
// the first useful authconfig
|
|
//
|
|
|
|
// TODO(runcom): ??? atomic needs this
|
|
// TODO(runcom): implement this to opt-in for docker-cfg, no need to make this
|
|
// work by default with docker's conf
|
|
//useDockerConf := c.GlobalString("use-docker-cfg")
|
|
|
|
if username != "" && password != "" {
|
|
return defAuthConfig, nil
|
|
}
|
|
|
|
confFile, err := cliconfig.Load(cfg)
|
|
if err != nil {
|
|
return engineTypes.AuthConfig{}, err
|
|
}
|
|
authConfig := registry.ResolveAuthConfig(confFile.AuthConfigs, index)
|
|
logrus.Debugf("authConfig for %s: %v", index.Name, authConfig)
|
|
|
|
return authConfig, nil
|
|
}
|
|
|
|
func validateRepoName(name string) error {
|
|
if name == "" {
|
|
return fmt.Errorf("Repository name can't be empty")
|
|
}
|
|
if name == api.NoBaseImageSpecifier {
|
|
return fmt.Errorf("'%s' is a reserved name", api.NoBaseImageSpecifier)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func makeImageManifest(img *image.Image, tag string, dgst digest.Digest, tagList []string) types.ImageManifest {
|
|
var digest string
|
|
if err := dgst.Validate(); err == nil {
|
|
digest = dgst.String()
|
|
}
|
|
return &types.DockerImageManifest{
|
|
Tag: tag,
|
|
Digest: digest,
|
|
RepoTags: tagList,
|
|
Comment: img.Comment,
|
|
Created: img.Created.Format(time.RFC3339Nano),
|
|
ContainerConfig: &img.ContainerConfig,
|
|
DockerVersion: img.DockerVersion,
|
|
Author: img.Author,
|
|
Config: img.Config,
|
|
Architecture: img.Architecture,
|
|
Os: img.OS,
|
|
}
|
|
}
|
|
|
|
func makeRawConfigFromV1Config(imageJSON []byte, rootfs *image.RootFS, history []image.History) (map[string]*json.RawMessage, error) {
|
|
var dver struct {
|
|
DockerVersion string `json:"docker_version"`
|
|
}
|
|
|
|
if err := json.Unmarshal(imageJSON, &dver); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
useFallback := versionPkg.Version(dver.DockerVersion).LessThan("1.8.3")
|
|
|
|
if useFallback {
|
|
var v1Image image.V1Image
|
|
err := json.Unmarshal(imageJSON, &v1Image)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
imageJSON, err = json.Marshal(v1Image)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
var c map[string]*json.RawMessage
|
|
if err := json.Unmarshal(imageJSON, &c); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
c["rootfs"] = rawJSON(rootfs)
|
|
c["history"] = rawJSON(history)
|
|
|
|
return c, nil
|
|
}
|
|
|
|
func rawJSON(value interface{}) *json.RawMessage {
|
|
jsonval, err := json.Marshal(value)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
return (*json.RawMessage)(&jsonval)
|
|
}
|
|
|
|
func continueOnError(err error) bool {
|
|
switch v := err.(type) {
|
|
case errcode.Errors:
|
|
if len(v) == 0 {
|
|
return true
|
|
}
|
|
return continueOnError(v[0])
|
|
case distribution.ErrNoSupport:
|
|
return continueOnError(v.Err)
|
|
case errcode.Error:
|
|
return shouldV2Fallback(v)
|
|
case *client.UnexpectedHTTPResponseError:
|
|
return true
|
|
case ImageConfigPullError:
|
|
return false
|
|
case error:
|
|
return !strings.Contains(err.Error(), strings.ToLower(syscall.ENOSPC.Error()))
|
|
}
|
|
// let's be nice and fallback if the error is a completely
|
|
// unexpected one.
|
|
// If new errors have to be handled in some way, please
|
|
// add them to the switch above.
|
|
return true
|
|
}
|
|
|
|
// shouldV2Fallback returns true if this error is a reason to fall back to v1.
|
|
func shouldV2Fallback(err errcode.Error) bool {
|
|
switch err.Code {
|
|
case errcode.ErrorCodeUnauthorized, v2.ErrorCodeManifestUnknown, v2.ErrorCodeNameUnknown:
|
|
return true
|
|
}
|
|
return false
|
|
}
|