2015-07-29 18:12:01 +00:00
|
|
|
package proxy
|
|
|
|
|
|
|
|
import (
|
2016-02-11 02:07:28 +00:00
|
|
|
"fmt"
|
2015-07-29 18:12:01 +00:00
|
|
|
"net/http"
|
|
|
|
"net/url"
|
2016-02-11 02:07:28 +00:00
|
|
|
"sync"
|
2015-07-29 18:12:01 +00:00
|
|
|
|
|
|
|
"github.com/docker/distribution"
|
|
|
|
"github.com/docker/distribution/configuration"
|
|
|
|
"github.com/docker/distribution/context"
|
2015-12-15 22:35:23 +00:00
|
|
|
"github.com/docker/distribution/reference"
|
2015-07-29 18:12:01 +00:00
|
|
|
"github.com/docker/distribution/registry/client"
|
|
|
|
"github.com/docker/distribution/registry/client/auth"
|
|
|
|
"github.com/docker/distribution/registry/client/transport"
|
|
|
|
"github.com/docker/distribution/registry/proxy/scheduler"
|
|
|
|
"github.com/docker/distribution/registry/storage"
|
|
|
|
"github.com/docker/distribution/registry/storage/driver"
|
|
|
|
)
|
|
|
|
|
|
|
|
// proxyingRegistry fetches content from a remote registry and caches it locally
|
|
|
|
type proxyingRegistry struct {
|
2016-02-11 02:07:28 +00:00
|
|
|
embedded distribution.Namespace // provides local registry functionality
|
|
|
|
scheduler *scheduler.TTLExpirationScheduler
|
|
|
|
remoteURL string
|
|
|
|
authChallenger authChallenger
|
2015-07-29 18:12:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewRegistryPullThroughCache creates a registry acting as a pull through cache
|
|
|
|
func NewRegistryPullThroughCache(ctx context.Context, registry distribution.Namespace, driver driver.StorageDriver, config configuration.Proxy) (distribution.Namespace, error) {
|
|
|
|
_, err := url.Parse(config.RemoteURL)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
v := storage.NewVacuum(ctx, driver)
|
|
|
|
s := scheduler.New(ctx, driver, "/scheduler-state.json")
|
2016-01-27 00:42:10 +00:00
|
|
|
s.OnBlobExpire(func(ref reference.Reference) error {
|
|
|
|
var r reference.Canonical
|
|
|
|
var ok bool
|
|
|
|
if r, ok = ref.(reference.Canonical); !ok {
|
|
|
|
return fmt.Errorf("unexpected reference type : %T", ref)
|
|
|
|
}
|
|
|
|
|
|
|
|
repo, err := registry.Repository(ctx, r)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
blobs := repo.Blobs(ctx)
|
|
|
|
|
|
|
|
// Clear the repository reference and descriptor caches
|
|
|
|
err = blobs.Delete(ctx, r.Digest())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = v.RemoveBlob(r.Digest().String())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
2015-07-29 18:12:01 +00:00
|
|
|
})
|
2016-01-27 00:42:10 +00:00
|
|
|
|
|
|
|
s.OnManifestExpire(func(ref reference.Reference) error {
|
|
|
|
var r reference.Canonical
|
|
|
|
var ok bool
|
|
|
|
if r, ok = ref.(reference.Canonical); !ok {
|
|
|
|
return fmt.Errorf("unexpected reference type : %T", ref)
|
|
|
|
}
|
|
|
|
|
|
|
|
repo, err := registry.Repository(ctx, r)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
manifests, err := repo.Manifests(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = manifests.Delete(ctx, r.Digest())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
2015-07-29 18:12:01 +00:00
|
|
|
})
|
2015-08-21 04:50:15 +00:00
|
|
|
|
2015-07-29 18:12:01 +00:00
|
|
|
err = s.Start()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-02-11 02:07:28 +00:00
|
|
|
cs, err := configureAuth(config.Username, config.Password)
|
2015-07-29 18:12:01 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &proxyingRegistry{
|
2016-02-11 02:07:28 +00:00
|
|
|
embedded: registry,
|
|
|
|
scheduler: s,
|
|
|
|
remoteURL: config.RemoteURL,
|
|
|
|
authChallenger: &remoteAuthChallenger{
|
|
|
|
remoteURL: config.RemoteURL,
|
|
|
|
challengeManager: auth.NewSimpleChallengeManager(),
|
|
|
|
credentialStore: cs,
|
|
|
|
},
|
2015-07-29 18:12:01 +00:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pr *proxyingRegistry) Scope() distribution.Scope {
|
|
|
|
return distribution.GlobalScope
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pr *proxyingRegistry) Repositories(ctx context.Context, repos []string, last string) (n int, err error) {
|
|
|
|
return pr.embedded.Repositories(ctx, repos, last)
|
|
|
|
}
|
|
|
|
|
2015-12-15 22:35:23 +00:00
|
|
|
func (pr *proxyingRegistry) Repository(ctx context.Context, name reference.Named) (distribution.Repository, error) {
|
2016-02-11 02:07:28 +00:00
|
|
|
hcm, ok := pr.authChallenger.(*remoteAuthChallenger)
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("unexpected challenge manager type %T", pr.authChallenger)
|
|
|
|
}
|
|
|
|
|
2015-07-29 18:12:01 +00:00
|
|
|
tr := transport.NewTransport(http.DefaultTransport,
|
2016-02-11 02:07:28 +00:00
|
|
|
auth.NewAuthorizer(hcm.challengeManager, auth.NewTokenHandler(http.DefaultTransport, hcm.credentialStore, name.Name(), "pull")))
|
2015-07-29 18:12:01 +00:00
|
|
|
|
|
|
|
localRepo, err := pr.embedded.Repository(ctx, name)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-08-21 04:50:15 +00:00
|
|
|
localManifests, err := localRepo.Manifests(ctx, storage.SkipLayerVerification())
|
2015-07-29 18:12:01 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
remoteRepo, err := client.NewRepository(ctx, name, pr.remoteURL, tr)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
remoteManifests, err := remoteRepo.Manifests(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &proxiedRepository{
|
2015-09-18 23:11:35 +00:00
|
|
|
blobStore: &proxyBlobStore{
|
2016-01-27 00:42:10 +00:00
|
|
|
localStore: localRepo.Blobs(ctx),
|
|
|
|
remoteStore: remoteRepo.Blobs(ctx),
|
|
|
|
scheduler: pr.scheduler,
|
|
|
|
repositoryName: name,
|
2016-02-11 02:07:28 +00:00
|
|
|
authChallenger: pr.authChallenger,
|
2015-07-29 18:12:01 +00:00
|
|
|
},
|
2016-01-27 00:42:10 +00:00
|
|
|
manifests: &proxyManifestStore{
|
2015-07-29 18:12:01 +00:00
|
|
|
repositoryName: name,
|
|
|
|
localManifests: localManifests, // Options?
|
|
|
|
remoteManifests: remoteManifests,
|
|
|
|
ctx: ctx,
|
|
|
|
scheduler: pr.scheduler,
|
2016-02-11 02:07:28 +00:00
|
|
|
authChallenger: pr.authChallenger,
|
2015-07-29 18:12:01 +00:00
|
|
|
},
|
2015-08-21 04:50:15 +00:00
|
|
|
name: name,
|
2016-01-27 00:42:10 +00:00
|
|
|
tags: &proxyTagService{
|
2016-02-11 02:07:28 +00:00
|
|
|
localTags: localRepo.Tags(ctx),
|
|
|
|
remoteTags: remoteRepo.Tags(ctx),
|
|
|
|
authChallenger: pr.authChallenger,
|
2015-08-21 04:50:15 +00:00
|
|
|
},
|
2015-07-29 18:12:01 +00:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2016-02-11 02:07:28 +00:00
|
|
|
// authChallenger encapsulates a request to the upstream to establish credential challenges
|
|
|
|
type authChallenger interface {
|
|
|
|
tryEstablishChallenges(context.Context) error
|
|
|
|
}
|
|
|
|
|
|
|
|
type remoteAuthChallenger struct {
|
|
|
|
remoteURL string
|
|
|
|
sync.Mutex
|
|
|
|
challengeManager auth.ChallengeManager
|
|
|
|
credentialStore auth.CredentialStore
|
|
|
|
}
|
|
|
|
|
|
|
|
// tryEstablishChallenges will attempt to get a challenge types for the upstream if none currently exist
|
|
|
|
func (hcm *remoteAuthChallenger) tryEstablishChallenges(ctx context.Context) error {
|
|
|
|
hcm.Lock()
|
|
|
|
defer hcm.Unlock()
|
|
|
|
|
|
|
|
remoteURL := hcm.remoteURL + "/v2/"
|
|
|
|
challenges, err := hcm.challengeManager.GetChallenges(remoteURL)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(challenges) > 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// establish challenge type with upstream
|
|
|
|
if err := ping(hcm.challengeManager, remoteURL, challengeHeader); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
context.GetLogger(ctx).Infof("Challenge established with upstream : %s %s", remoteURL, hcm.challengeManager)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-07-29 18:12:01 +00:00
|
|
|
// proxiedRepository uses proxying blob and manifest services to serve content
|
|
|
|
// locally, or pulling it through from a remote and caching it locally if it doesn't
|
|
|
|
// already exist
|
|
|
|
type proxiedRepository struct {
|
2015-08-21 04:50:15 +00:00
|
|
|
blobStore distribution.BlobStore
|
|
|
|
manifests distribution.ManifestService
|
2015-12-15 22:35:23 +00:00
|
|
|
name reference.Named
|
2015-08-21 04:50:15 +00:00
|
|
|
tags distribution.TagService
|
2015-07-29 18:12:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (pr *proxiedRepository) Manifests(ctx context.Context, options ...distribution.ManifestServiceOption) (distribution.ManifestService, error) {
|
|
|
|
return pr.manifests, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pr *proxiedRepository) Blobs(ctx context.Context) distribution.BlobStore {
|
|
|
|
return pr.blobStore
|
|
|
|
}
|
|
|
|
|
2015-12-15 22:35:23 +00:00
|
|
|
func (pr *proxiedRepository) Name() reference.Named {
|
2015-07-29 18:12:01 +00:00
|
|
|
return pr.name
|
|
|
|
}
|
|
|
|
|
2015-08-21 04:50:15 +00:00
|
|
|
func (pr *proxiedRepository) Tags(ctx context.Context) distribution.TagService {
|
|
|
|
return pr.tags
|
2015-07-29 18:12:01 +00:00
|
|
|
}
|