forked from TrueCloudLab/distribution
740ed699f4
challenges with the upstream until any proxied data is found not to be local. Implement auth challenges behind an interface and add to unit tests. Also, remove a non-sensical unit test. Signed-off-by: Richard Scothern <richard.scothern@docker.com>
100 lines
2.8 KiB
Go
100 lines
2.8 KiB
Go
package proxy
|
|
|
|
import (
|
|
"time"
|
|
|
|
"github.com/docker/distribution"
|
|
"github.com/docker/distribution/context"
|
|
"github.com/docker/distribution/digest"
|
|
"github.com/docker/distribution/reference"
|
|
"github.com/docker/distribution/registry/proxy/scheduler"
|
|
)
|
|
|
|
// todo(richardscothern): from cache control header or config
|
|
const repositoryTTL = time.Duration(24 * 7 * time.Hour)
|
|
|
|
type proxyManifestStore struct {
|
|
ctx context.Context
|
|
localManifests distribution.ManifestService
|
|
remoteManifests distribution.ManifestService
|
|
repositoryName reference.Named
|
|
scheduler *scheduler.TTLExpirationScheduler
|
|
authChallenger authChallenger
|
|
}
|
|
|
|
var _ distribution.ManifestService = &proxyManifestStore{}
|
|
|
|
func (pms proxyManifestStore) Exists(ctx context.Context, dgst digest.Digest) (bool, error) {
|
|
exists, err := pms.localManifests.Exists(ctx, dgst)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
if exists {
|
|
return true, nil
|
|
}
|
|
if err := pms.authChallenger.tryEstablishChallenges(ctx); err != nil {
|
|
return false, err
|
|
}
|
|
return pms.remoteManifests.Exists(ctx, dgst)
|
|
}
|
|
|
|
func (pms proxyManifestStore) Get(ctx context.Context, dgst digest.Digest, options ...distribution.ManifestServiceOption) (distribution.Manifest, error) {
|
|
// At this point `dgst` was either specified explicitly, or returned by the
|
|
// tagstore with the most recent association.
|
|
var fromRemote bool
|
|
manifest, err := pms.localManifests.Get(ctx, dgst, options...)
|
|
if err != nil {
|
|
if err := pms.authChallenger.tryEstablishChallenges(ctx); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
manifest, err = pms.remoteManifests.Get(ctx, dgst, options...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
fromRemote = true
|
|
}
|
|
|
|
_, payload, err := manifest.Payload()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
proxyMetrics.ManifestPush(uint64(len(payload)))
|
|
if fromRemote {
|
|
proxyMetrics.ManifestPull(uint64(len(payload)))
|
|
|
|
_, err = pms.localManifests.Put(ctx, manifest)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Schedule the manifest blob for removal
|
|
repoBlob, err := reference.WithDigest(pms.repositoryName, dgst)
|
|
if err != nil {
|
|
context.GetLogger(ctx).Errorf("Error creating reference: %s", err)
|
|
return nil, err
|
|
}
|
|
|
|
pms.scheduler.AddManifest(repoBlob, repositoryTTL)
|
|
// Ensure the manifest blob is cleaned up
|
|
//pms.scheduler.AddBlob(blobRef, repositoryTTL)
|
|
|
|
}
|
|
|
|
return manifest, err
|
|
}
|
|
|
|
func (pms proxyManifestStore) Put(ctx context.Context, manifest distribution.Manifest, options ...distribution.ManifestServiceOption) (digest.Digest, error) {
|
|
var d digest.Digest
|
|
return d, distribution.ErrUnsupported
|
|
}
|
|
|
|
func (pms proxyManifestStore) Delete(ctx context.Context, dgst digest.Digest) error {
|
|
return distribution.ErrUnsupported
|
|
}
|
|
|
|
/*func (pms proxyManifestStore) Enumerate(ctx context.Context, manifests []distribution.Manifest, last distribution.Manifest) (n int, err error) {
|
|
return 0, distribution.ErrUnsupported
|
|
}
|
|
*/
|