plugin_routes.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162
  1. package plugin
  2. import (
  3. "encoding/base64"
  4. "encoding/json"
  5. "net/http"
  6. "strconv"
  7. "strings"
  8. "github.com/docker/docker/api/server/httputils"
  9. "github.com/docker/docker/api/types"
  10. "golang.org/x/net/context"
  11. )
  12. func parseHeaders(headers http.Header) (map[string][]string, *types.AuthConfig) {
  13. metaHeaders := map[string][]string{}
  14. for k, v := range headers {
  15. if strings.HasPrefix(k, "X-Meta-") {
  16. metaHeaders[k] = v
  17. }
  18. }
  19. // Get X-Registry-Auth
  20. authEncoded := headers.Get("X-Registry-Auth")
  21. authConfig := &types.AuthConfig{}
  22. if authEncoded != "" {
  23. authJSON := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  24. if err := json.NewDecoder(authJSON).Decode(authConfig); err != nil {
  25. authConfig = &types.AuthConfig{}
  26. }
  27. }
  28. return metaHeaders, authConfig
  29. }
  30. func (pr *pluginRouter) getPrivileges(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  31. if err := httputils.ParseForm(r); err != nil {
  32. return err
  33. }
  34. metaHeaders, authConfig := parseHeaders(r.Header)
  35. privileges, err := pr.backend.Privileges(r.FormValue("name"), metaHeaders, authConfig)
  36. if err != nil {
  37. return err
  38. }
  39. return httputils.WriteJSON(w, http.StatusOK, privileges)
  40. }
  41. func (pr *pluginRouter) pullPlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  42. if err := httputils.ParseForm(r); err != nil {
  43. return err
  44. }
  45. var privileges types.PluginPrivileges
  46. if err := json.NewDecoder(r.Body).Decode(&privileges); err != nil {
  47. return err
  48. }
  49. metaHeaders, authConfig := parseHeaders(r.Header)
  50. if err := pr.backend.Pull(r.FormValue("name"), metaHeaders, authConfig, privileges); err != nil {
  51. return err
  52. }
  53. w.WriteHeader(http.StatusCreated)
  54. return nil
  55. }
  56. func (pr *pluginRouter) createPlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  57. if err := httputils.ParseForm(r); err != nil {
  58. return err
  59. }
  60. options := &types.PluginCreateOptions{
  61. RepoName: r.FormValue("name")}
  62. if err := pr.backend.CreateFromContext(ctx, r.Body, options); err != nil {
  63. return err
  64. }
  65. //TODO: send progress bar
  66. w.WriteHeader(http.StatusNoContent)
  67. return nil
  68. }
  69. func (pr *pluginRouter) enablePlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  70. if err := httputils.ParseForm(r); err != nil {
  71. return err
  72. }
  73. name := vars["name"]
  74. timeout, err := strconv.Atoi(r.Form.Get("timeout"))
  75. if err != nil {
  76. return err
  77. }
  78. config := &types.PluginEnableConfig{Timeout: timeout}
  79. return pr.backend.Enable(name, config)
  80. }
  81. func (pr *pluginRouter) disablePlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  82. if err := httputils.ParseForm(r); err != nil {
  83. return err
  84. }
  85. name := vars["name"]
  86. config := &types.PluginDisableConfig{
  87. ForceDisable: httputils.BoolValue(r, "force"),
  88. }
  89. return pr.backend.Disable(name, config)
  90. }
  91. func (pr *pluginRouter) removePlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  92. if err := httputils.ParseForm(r); err != nil {
  93. return err
  94. }
  95. name := vars["name"]
  96. config := &types.PluginRmConfig{
  97. ForceRemove: httputils.BoolValue(r, "force"),
  98. }
  99. return pr.backend.Remove(name, config)
  100. }
  101. func (pr *pluginRouter) pushPlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  102. if err := httputils.ParseForm(r); err != nil {
  103. return err
  104. }
  105. metaHeaders, authConfig := parseHeaders(r.Header)
  106. return pr.backend.Push(vars["name"], metaHeaders, authConfig)
  107. }
  108. func (pr *pluginRouter) setPlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  109. var args []string
  110. if err := json.NewDecoder(r.Body).Decode(&args); err != nil {
  111. return err
  112. }
  113. if err := pr.backend.Set(vars["name"], args); err != nil {
  114. return err
  115. }
  116. w.WriteHeader(http.StatusNoContent)
  117. return nil
  118. }
  119. func (pr *pluginRouter) listPlugins(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  120. l, err := pr.backend.List()
  121. if err != nil {
  122. return err
  123. }
  124. return httputils.WriteJSON(w, http.StatusOK, l)
  125. }
  126. func (pr *pluginRouter) inspectPlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  127. result, err := pr.backend.Inspect(vars["name"])
  128. if err != nil {
  129. return err
  130. }
  131. return httputils.WriteJSON(w, http.StatusOK, result)
  132. }