2015-11-18 17:18:44 -05:00
|
|
|
package distribution
|
|
|
|
|
|
|
|
import (
|
2015-11-04 00:03:12 -05:00
|
|
|
"fmt"
|
2015-11-18 17:18:44 -05:00
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/docker/distribution"
|
2016-01-26 14:20:14 -05:00
|
|
|
distreference "github.com/docker/distribution/reference"
|
2015-11-18 17:18:44 -05:00
|
|
|
"github.com/docker/distribution/registry/client"
|
|
|
|
"github.com/docker/distribution/registry/client/auth"
|
|
|
|
"github.com/docker/distribution/registry/client/transport"
|
2016-09-06 14:18:12 -04:00
|
|
|
"github.com/docker/docker/api/types"
|
2016-01-04 13:36:01 -05:00
|
|
|
"github.com/docker/docker/dockerversion"
|
2015-11-18 17:18:44 -05:00
|
|
|
"github.com/docker/docker/registry"
|
2016-04-25 07:54:48 -04:00
|
|
|
"github.com/docker/go-connections/sockets"
|
2015-11-18 17:18:44 -05:00
|
|
|
"golang.org/x/net/context"
|
|
|
|
)
|
|
|
|
|
2016-05-07 21:36:10 -04:00
|
|
|
// NewV2Repository returns a repository (v2 only). It creates an HTTP transport
|
2015-11-18 17:18:44 -05:00
|
|
|
// providing timeout settings and authentication support, and also verifies the
|
|
|
|
// remote API version.
|
2015-12-04 16:42:33 -05:00
|
|
|
func NewV2Repository(ctx context.Context, repoInfo *registry.RepositoryInfo, endpoint registry.APIEndpoint, metaHeaders http.Header, authConfig *types.AuthConfig, actions ...string) (repo distribution.Repository, foundVersion bool, err error) {
|
2015-12-11 14:00:13 -05:00
|
|
|
repoName := repoInfo.FullName()
|
2015-11-18 17:18:44 -05:00
|
|
|
// If endpoint does not support CanonicalName, use the RemoteName instead
|
|
|
|
if endpoint.TrimHostname {
|
2015-12-11 14:00:13 -05:00
|
|
|
repoName = repoInfo.RemoteName()
|
2015-11-18 17:18:44 -05:00
|
|
|
}
|
|
|
|
|
2016-04-25 07:54:48 -04:00
|
|
|
direct := &net.Dialer{
|
|
|
|
Timeout: 30 * time.Second,
|
|
|
|
KeepAlive: 30 * time.Second,
|
|
|
|
DualStack: true,
|
|
|
|
}
|
|
|
|
|
2015-11-18 17:18:44 -05:00
|
|
|
// TODO(dmcgowan): Call close idle connections when complete, use keep alive
|
|
|
|
base := &http.Transport{
|
2016-04-25 07:54:48 -04:00
|
|
|
Proxy: http.ProxyFromEnvironment,
|
|
|
|
Dial: direct.Dial,
|
2015-11-18 17:18:44 -05:00
|
|
|
TLSHandshakeTimeout: 10 * time.Second,
|
|
|
|
TLSClientConfig: endpoint.TLSConfig,
|
|
|
|
// TODO(dmcgowan): Call close idle connections when complete and use keep alive
|
|
|
|
DisableKeepAlives: true,
|
|
|
|
}
|
|
|
|
|
2016-04-25 07:54:48 -04:00
|
|
|
proxyDialer, err := sockets.DialerFromEnvironment(direct)
|
|
|
|
if err == nil {
|
|
|
|
base.Dial = proxyDialer.Dial
|
|
|
|
}
|
|
|
|
|
2016-03-18 17:42:40 -04:00
|
|
|
modifiers := registry.DockerHeaders(dockerversion.DockerUserAgent(ctx), metaHeaders)
|
2015-11-18 17:18:44 -05:00
|
|
|
authTransport := transport.NewTransport(base, modifiers...)
|
2016-02-11 18:45:29 -05:00
|
|
|
|
2016-07-13 16:30:24 -04:00
|
|
|
challengeManager, foundVersion, err := registry.PingV2Registry(endpoint.URL, authTransport)
|
2016-03-01 02:07:41 -05:00
|
|
|
if err != nil {
|
|
|
|
transportOK := false
|
|
|
|
if responseErr, ok := err.(registry.PingResponseError); ok {
|
|
|
|
transportOK = true
|
|
|
|
err = responseErr.Err
|
2015-11-18 17:18:44 -05:00
|
|
|
}
|
2016-02-11 18:45:29 -05:00
|
|
|
return nil, foundVersion, fallbackError{
|
|
|
|
err: err,
|
|
|
|
confirmedV2: foundVersion,
|
2016-03-01 02:07:41 -05:00
|
|
|
transportOK: transportOK,
|
2016-02-11 18:45:29 -05:00
|
|
|
}
|
2015-11-18 17:18:44 -05:00
|
|
|
}
|
|
|
|
|
2015-11-04 00:03:12 -05:00
|
|
|
if authConfig.RegistryToken != "" {
|
|
|
|
passThruTokenHandler := &existingTokenHandler{token: authConfig.RegistryToken}
|
|
|
|
modifiers = append(modifiers, auth.NewAuthorizer(challengeManager, passThruTokenHandler))
|
|
|
|
} else {
|
2016-11-15 18:06:48 -05:00
|
|
|
scope := auth.RepositoryScope{
|
|
|
|
Repository: repoName,
|
|
|
|
Actions: actions,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Keep image repositories blank for scope compatibility
|
|
|
|
if repoInfo.Class != "image" {
|
|
|
|
scope.Class = repoInfo.Class
|
|
|
|
}
|
|
|
|
|
2016-07-13 16:30:24 -04:00
|
|
|
creds := registry.NewStaticCredentialStore(authConfig)
|
2016-02-23 18:18:04 -05:00
|
|
|
tokenHandlerOptions := auth.TokenHandlerOptions{
|
|
|
|
Transport: authTransport,
|
|
|
|
Credentials: creds,
|
2016-11-15 18:06:48 -05:00
|
|
|
Scopes: []auth.Scope{scope},
|
|
|
|
ClientID: registry.AuthClientID,
|
2016-02-23 18:18:04 -05:00
|
|
|
}
|
|
|
|
tokenHandler := auth.NewTokenHandlerWithOptions(tokenHandlerOptions)
|
2015-11-04 00:03:12 -05:00
|
|
|
basicHandler := auth.NewBasicHandler(creds)
|
|
|
|
modifiers = append(modifiers, auth.NewAuthorizer(challengeManager, tokenHandler, basicHandler))
|
|
|
|
}
|
2015-11-18 17:18:44 -05:00
|
|
|
tr := transport.NewTransport(base, modifiers...)
|
|
|
|
|
2016-01-26 14:20:14 -05:00
|
|
|
repoNameRef, err := distreference.ParseNamed(repoName)
|
|
|
|
if err != nil {
|
2016-02-11 18:45:29 -05:00
|
|
|
return nil, foundVersion, fallbackError{
|
|
|
|
err: err,
|
|
|
|
confirmedV2: foundVersion,
|
|
|
|
transportOK: true,
|
|
|
|
}
|
2016-01-26 14:20:14 -05:00
|
|
|
}
|
|
|
|
|
2016-02-17 19:53:25 -05:00
|
|
|
repo, err = client.NewRepository(ctx, repoNameRef, endpoint.URL.String(), tr)
|
2016-02-11 18:45:29 -05:00
|
|
|
if err != nil {
|
|
|
|
err = fallbackError{
|
|
|
|
err: err,
|
|
|
|
confirmedV2: foundVersion,
|
|
|
|
transportOK: true,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return
|
2015-11-18 17:18:44 -05:00
|
|
|
}
|
|
|
|
|
2015-11-04 00:03:12 -05:00
|
|
|
type existingTokenHandler struct {
|
|
|
|
token string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (th *existingTokenHandler) Scheme() string {
|
|
|
|
return "bearer"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (th *existingTokenHandler) AuthorizeRequest(req *http.Request, params map[string]string) error {
|
|
|
|
req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", th.token))
|
|
|
|
return nil
|
|
|
|
}
|