2016-12-12 18:05:53 -05:00
|
|
|
package plugin
|
2016-08-26 13:02:38 -04:00
|
|
|
|
|
|
|
import (
|
2016-10-06 10:09:54 -04:00
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/Sirupsen/logrus"
|
2017-01-25 19:54:18 -05:00
|
|
|
"github.com/docker/distribution/reference"
|
2016-10-07 16:53:14 -04:00
|
|
|
"github.com/docker/docker/pkg/plugingetter"
|
2016-08-26 13:02:38 -04:00
|
|
|
"github.com/docker/docker/pkg/plugins"
|
2016-10-06 10:09:54 -04:00
|
|
|
"github.com/docker/docker/plugin/v2"
|
2016-12-12 18:05:53 -05:00
|
|
|
"github.com/pkg/errors"
|
2016-08-26 13:02:38 -04:00
|
|
|
)
|
|
|
|
|
2016-10-06 10:09:54 -04:00
|
|
|
/* allowV1PluginsFallback determines daemon's support for V1 plugins.
|
|
|
|
* When the time comes to remove support for V1 plugins, flipping
|
|
|
|
* this bool is all that will be needed.
|
|
|
|
*/
|
|
|
|
const allowV1PluginsFallback bool = true
|
|
|
|
|
|
|
|
/* defaultAPIVersion is the version of the plugin API for volume, network,
|
|
|
|
IPAM and authz. This is a very stable API. When we update this API, then
|
2016-12-08 12:35:32 -05:00
|
|
|
pluginType should include a version. e.g. "networkdriver/2.0".
|
2016-10-06 10:09:54 -04:00
|
|
|
*/
|
|
|
|
const defaultAPIVersion string = "1.0"
|
|
|
|
|
|
|
|
// ErrNotFound indicates that a plugin was not found locally.
|
|
|
|
type ErrNotFound string
|
|
|
|
|
|
|
|
func (name ErrNotFound) Error() string { return fmt.Sprintf("plugin %q not found", string(name)) }
|
|
|
|
|
2017-06-12 13:07:42 -04:00
|
|
|
// ErrAmbiguous indicates that more than one plugin was found
|
2016-11-23 23:04:44 -05:00
|
|
|
type ErrAmbiguous string
|
|
|
|
|
|
|
|
func (name ErrAmbiguous) Error() string {
|
|
|
|
return fmt.Sprintf("multiple plugins found for %q", string(name))
|
|
|
|
}
|
|
|
|
|
2017-06-12 10:36:46 -04:00
|
|
|
// ErrDisabled indicates that a plugin was found but it is disabled
|
|
|
|
type ErrDisabled string
|
|
|
|
|
|
|
|
func (name ErrDisabled) Error() string {
|
|
|
|
return fmt.Sprintf("plugin %s found but disabled", string(name))
|
|
|
|
}
|
|
|
|
|
2017-01-02 09:01:19 -05:00
|
|
|
// GetV2Plugin retrieves a plugin by name, id or partial ID.
|
2016-12-12 18:05:53 -05:00
|
|
|
func (ps *Store) GetV2Plugin(refOrID string) (*v2.Plugin, error) {
|
2016-10-06 10:09:54 -04:00
|
|
|
ps.RLock()
|
|
|
|
defer ps.RUnlock()
|
|
|
|
|
2016-12-12 18:05:53 -05:00
|
|
|
id, err := ps.resolvePluginID(refOrID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2016-10-06 10:09:54 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
p, idOk := ps.plugins[id]
|
|
|
|
if !idOk {
|
2016-12-12 18:05:53 -05:00
|
|
|
return nil, errors.WithStack(ErrNotFound(id))
|
2016-10-06 10:09:54 -04:00
|
|
|
}
|
2016-12-12 18:05:53 -05:00
|
|
|
|
2016-10-06 10:09:54 -04:00
|
|
|
return p, nil
|
|
|
|
}
|
|
|
|
|
2016-12-12 18:05:53 -05:00
|
|
|
// validateName returns error if name is already reserved. always call with lock and full name
|
|
|
|
func (ps *Store) validateName(name string) error {
|
|
|
|
for _, p := range ps.plugins {
|
|
|
|
if p.Name() == name {
|
2016-12-29 22:58:39 -05:00
|
|
|
return errors.Errorf("plugin %q already exists", name)
|
2016-12-12 18:05:53 -05:00
|
|
|
}
|
2016-10-06 10:09:54 -04:00
|
|
|
}
|
2016-12-12 18:05:53 -05:00
|
|
|
return nil
|
2016-10-06 10:09:54 -04:00
|
|
|
}
|
|
|
|
|
2017-01-02 09:01:19 -05:00
|
|
|
// GetAll retrieves all plugins.
|
2016-10-06 10:09:54 -04:00
|
|
|
func (ps *Store) GetAll() map[string]*v2.Plugin {
|
|
|
|
ps.RLock()
|
|
|
|
defer ps.RUnlock()
|
|
|
|
return ps.plugins
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetAll initialized plugins during daemon restore.
|
|
|
|
func (ps *Store) SetAll(plugins map[string]*v2.Plugin) {
|
|
|
|
ps.Lock()
|
|
|
|
defer ps.Unlock()
|
|
|
|
ps.plugins = plugins
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ps *Store) getAllByCap(capability string) []plugingetter.CompatPlugin {
|
|
|
|
ps.RLock()
|
|
|
|
defer ps.RUnlock()
|
|
|
|
|
|
|
|
result := make([]plugingetter.CompatPlugin, 0, 1)
|
|
|
|
for _, p := range ps.plugins {
|
2016-10-31 20:59:45 -04:00
|
|
|
if p.IsEnabled() {
|
|
|
|
if _, err := p.FilterByCap(capability); err == nil {
|
|
|
|
result = append(result, p)
|
|
|
|
}
|
2016-10-06 10:09:54 -04:00
|
|
|
}
|
2016-08-26 13:02:38 -04:00
|
|
|
}
|
2016-10-06 10:09:54 -04:00
|
|
|
return result
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetState sets the active state of the plugin and updates plugindb.
|
|
|
|
func (ps *Store) SetState(p *v2.Plugin, state bool) {
|
|
|
|
ps.Lock()
|
|
|
|
defer ps.Unlock()
|
|
|
|
|
|
|
|
p.PluginObj.Enabled = state
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add adds a plugin to memory and plugindb.
|
2016-11-22 12:42:58 -05:00
|
|
|
// An error will be returned if there is a collision.
|
|
|
|
func (ps *Store) Add(p *v2.Plugin) error {
|
2016-10-06 10:09:54 -04:00
|
|
|
ps.Lock()
|
2016-11-22 12:42:58 -05:00
|
|
|
defer ps.Unlock()
|
|
|
|
|
|
|
|
if v, exist := ps.plugins[p.GetID()]; exist {
|
|
|
|
return fmt.Errorf("plugin %q has the same ID %s as %q", p.Name(), p.GetID(), v.Name())
|
|
|
|
}
|
|
|
|
ps.plugins[p.GetID()] = p
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-10-06 10:09:54 -04:00
|
|
|
// Remove removes a plugin from memory and plugindb.
|
|
|
|
func (ps *Store) Remove(p *v2.Plugin) {
|
|
|
|
ps.Lock()
|
|
|
|
delete(ps.plugins, p.GetID())
|
|
|
|
ps.Unlock()
|
|
|
|
}
|
|
|
|
|
2016-09-08 21:52:29 -04:00
|
|
|
// Get returns an enabled plugin matching the given name and capability.
|
2016-10-06 10:09:54 -04:00
|
|
|
func (ps *Store) Get(name, capability string, mode int) (plugingetter.CompatPlugin, error) {
|
|
|
|
var (
|
|
|
|
p *v2.Plugin
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
|
|
|
|
// Lookup using new model.
|
|
|
|
if ps != nil {
|
2016-12-12 18:05:53 -05:00
|
|
|
p, err = ps.GetV2Plugin(name)
|
2016-10-06 10:09:54 -04:00
|
|
|
if err == nil {
|
2016-12-09 12:34:30 -05:00
|
|
|
p.AddRefCount(mode)
|
2016-09-08 21:52:29 -04:00
|
|
|
if p.IsEnabled() {
|
|
|
|
return p.FilterByCap(capability)
|
|
|
|
}
|
|
|
|
// Plugin was found but it is disabled, so we should not fall back to legacy plugins
|
|
|
|
// but we should error out right away
|
2017-06-12 10:36:46 -04:00
|
|
|
return nil, ErrDisabled(name)
|
2016-10-06 10:09:54 -04:00
|
|
|
}
|
2016-12-12 18:05:53 -05:00
|
|
|
if _, ok := errors.Cause(err).(ErrNotFound); !ok {
|
2016-10-06 10:09:54 -04:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Lookup using legacy model.
|
|
|
|
if allowV1PluginsFallback {
|
|
|
|
p, err := plugins.Get(name, capability)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("legacy plugin: %v", err)
|
|
|
|
}
|
|
|
|
return p, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-12-22 13:26:04 -05:00
|
|
|
// GetAllManagedPluginsByCap returns a list of managed plugins matching the given capability.
|
|
|
|
func (ps *Store) GetAllManagedPluginsByCap(capability string) []plugingetter.CompatPlugin {
|
|
|
|
return ps.getAllByCap(capability)
|
|
|
|
}
|
|
|
|
|
2016-09-08 21:52:29 -04:00
|
|
|
// GetAllByCap returns a list of enabled plugins matching the given capability.
|
2016-10-06 10:09:54 -04:00
|
|
|
func (ps *Store) GetAllByCap(capability string) ([]plugingetter.CompatPlugin, error) {
|
|
|
|
result := make([]plugingetter.CompatPlugin, 0, 1)
|
|
|
|
|
|
|
|
/* Daemon start always calls plugin.Init thereby initializing a store.
|
|
|
|
* So store on experimental builds can never be nil, even while
|
|
|
|
* handling legacy plugins. However, there are legacy plugin unit
|
|
|
|
* tests where the volume subsystem directly talks with the plugin,
|
|
|
|
* bypassing the daemon. For such tests, this check is necessary.
|
|
|
|
*/
|
|
|
|
if ps != nil {
|
|
|
|
ps.RLock()
|
|
|
|
result = ps.getAllByCap(capability)
|
|
|
|
ps.RUnlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Lookup with legacy model
|
|
|
|
if allowV1PluginsFallback {
|
|
|
|
pl, err := plugins.GetAll(capability)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("legacy plugin: %v", err)
|
|
|
|
}
|
|
|
|
for _, p := range pl {
|
|
|
|
result = append(result, p)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return result, nil
|
2016-09-06 17:30:55 -04:00
|
|
|
}
|
2016-09-26 14:06:26 -04:00
|
|
|
|
|
|
|
// Handle sets a callback for a given capability. It is only used by network
|
|
|
|
// and ipam drivers during plugin registration. The callback registers the
|
|
|
|
// driver with the subsystem (network, ipam).
|
|
|
|
func (ps *Store) Handle(capability string, callback func(string, *plugins.Client)) {
|
2016-10-06 10:09:54 -04:00
|
|
|
pluginType := fmt.Sprintf("docker.%s/%s", strings.ToLower(capability), defaultAPIVersion)
|
|
|
|
|
|
|
|
// Register callback with new plugin model.
|
|
|
|
ps.Lock()
|
|
|
|
handlers, ok := ps.handlers[pluginType]
|
|
|
|
if !ok {
|
|
|
|
handlers = []func(string, *plugins.Client){}
|
|
|
|
}
|
|
|
|
handlers = append(handlers, callback)
|
|
|
|
ps.handlers[pluginType] = handlers
|
|
|
|
ps.Unlock()
|
|
|
|
|
|
|
|
// Register callback with legacy plugin model.
|
|
|
|
if allowV1PluginsFallback {
|
|
|
|
plugins.Handle(capability, callback)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// CallHandler calls the registered callback. It is invoked during plugin enable.
|
|
|
|
func (ps *Store) CallHandler(p *v2.Plugin) {
|
|
|
|
for _, typ := range p.GetTypes() {
|
|
|
|
for _, handler := range ps.handlers[typ.String()] {
|
|
|
|
handler(p.Name(), p.Client())
|
|
|
|
}
|
|
|
|
}
|
2016-09-26 14:06:26 -04:00
|
|
|
}
|
2016-11-23 23:04:44 -05:00
|
|
|
|
2016-12-12 18:05:53 -05:00
|
|
|
func (ps *Store) resolvePluginID(idOrName string) (string, error) {
|
|
|
|
ps.RLock() // todo: fix
|
2016-11-23 23:04:44 -05:00
|
|
|
defer ps.RUnlock()
|
|
|
|
|
2016-12-12 18:05:53 -05:00
|
|
|
if validFullID.MatchString(idOrName) {
|
|
|
|
return idOrName, nil
|
|
|
|
}
|
|
|
|
|
2017-01-25 19:54:18 -05:00
|
|
|
ref, err := reference.ParseNormalizedNamed(idOrName)
|
2016-12-12 18:05:53 -05:00
|
|
|
if err != nil {
|
2016-12-24 01:57:30 -05:00
|
|
|
return "", errors.WithStack(ErrNotFound(idOrName))
|
2016-12-12 18:05:53 -05:00
|
|
|
}
|
|
|
|
if _, ok := ref.(reference.Canonical); ok {
|
2017-01-25 19:54:18 -05:00
|
|
|
logrus.Warnf("canonical references cannot be resolved: %v", reference.FamiliarString(ref))
|
2016-12-12 18:05:53 -05:00
|
|
|
return "", errors.WithStack(ErrNotFound(idOrName))
|
|
|
|
}
|
|
|
|
|
2017-01-25 19:54:18 -05:00
|
|
|
ref = reference.TagNameOnly(ref)
|
2016-12-12 18:05:53 -05:00
|
|
|
|
|
|
|
for _, p := range ps.plugins {
|
2017-01-25 19:54:18 -05:00
|
|
|
if p.PluginObj.Name == reference.FamiliarString(ref) {
|
2016-12-12 18:05:53 -05:00
|
|
|
return p.PluginObj.ID, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-23 23:04:44 -05:00
|
|
|
var found *v2.Plugin
|
2016-12-12 18:05:53 -05:00
|
|
|
for id, p := range ps.plugins { // this can be optimized
|
|
|
|
if strings.HasPrefix(id, idOrName) {
|
2016-11-23 23:04:44 -05:00
|
|
|
if found != nil {
|
2016-12-12 18:05:53 -05:00
|
|
|
return "", errors.WithStack(ErrAmbiguous(idOrName))
|
2016-11-23 23:04:44 -05:00
|
|
|
}
|
|
|
|
found = p
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if found == nil {
|
2016-12-12 18:05:53 -05:00
|
|
|
return "", errors.WithStack(ErrNotFound(idOrName))
|
2016-11-23 23:04:44 -05:00
|
|
|
}
|
2016-12-12 18:05:53 -05:00
|
|
|
return found.PluginObj.ID, nil
|
2016-11-23 23:04:44 -05:00
|
|
|
}
|