plugin_install.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113
  1. package client
  2. import (
  3. "encoding/json"
  4. "io"
  5. "net/http"
  6. "net/url"
  7. "github.com/docker/distribution/reference"
  8. "github.com/docker/docker/api/types"
  9. "github.com/pkg/errors"
  10. "golang.org/x/net/context"
  11. )
  12. // PluginInstall installs a plugin
  13. func (cli *Client) PluginInstall(ctx context.Context, name string, options types.PluginInstallOptions) (rc io.ReadCloser, err error) {
  14. query := url.Values{}
  15. if _, err := reference.ParseNormalizedNamed(options.RemoteRef); err != nil {
  16. return nil, errors.Wrap(err, "invalid remote reference")
  17. }
  18. query.Set("remote", options.RemoteRef)
  19. privileges, err := cli.checkPluginPermissions(ctx, query, options)
  20. if err != nil {
  21. return nil, err
  22. }
  23. // set name for plugin pull, if empty should default to remote reference
  24. query.Set("name", name)
  25. resp, err := cli.tryPluginPull(ctx, query, privileges, options.RegistryAuth)
  26. if err != nil {
  27. return nil, err
  28. }
  29. name = resp.header.Get("Docker-Plugin-Name")
  30. pr, pw := io.Pipe()
  31. go func() { // todo: the client should probably be designed more around the actual api
  32. _, err := io.Copy(pw, resp.body)
  33. if err != nil {
  34. pw.CloseWithError(err)
  35. return
  36. }
  37. defer func() {
  38. if err != nil {
  39. delResp, _ := cli.delete(ctx, "/plugins/"+name, nil, nil)
  40. ensureReaderClosed(delResp)
  41. }
  42. }()
  43. if len(options.Args) > 0 {
  44. if err := cli.PluginSet(ctx, name, options.Args); err != nil {
  45. pw.CloseWithError(err)
  46. return
  47. }
  48. }
  49. if options.Disabled {
  50. pw.Close()
  51. return
  52. }
  53. enableErr := cli.PluginEnable(ctx, name, types.PluginEnableOptions{Timeout: 0})
  54. pw.CloseWithError(enableErr)
  55. }()
  56. return pr, nil
  57. }
  58. func (cli *Client) tryPluginPrivileges(ctx context.Context, query url.Values, registryAuth string) (serverResponse, error) {
  59. headers := map[string][]string{"X-Registry-Auth": {registryAuth}}
  60. return cli.get(ctx, "/plugins/privileges", query, headers)
  61. }
  62. func (cli *Client) tryPluginPull(ctx context.Context, query url.Values, privileges types.PluginPrivileges, registryAuth string) (serverResponse, error) {
  63. headers := map[string][]string{"X-Registry-Auth": {registryAuth}}
  64. return cli.post(ctx, "/plugins/pull", query, privileges, headers)
  65. }
  66. func (cli *Client) checkPluginPermissions(ctx context.Context, query url.Values, options types.PluginInstallOptions) (types.PluginPrivileges, error) {
  67. resp, err := cli.tryPluginPrivileges(ctx, query, options.RegistryAuth)
  68. if resp.statusCode == http.StatusUnauthorized && options.PrivilegeFunc != nil {
  69. // todo: do inspect before to check existing name before checking privileges
  70. newAuthHeader, privilegeErr := options.PrivilegeFunc()
  71. if privilegeErr != nil {
  72. ensureReaderClosed(resp)
  73. return nil, privilegeErr
  74. }
  75. options.RegistryAuth = newAuthHeader
  76. resp, err = cli.tryPluginPrivileges(ctx, query, options.RegistryAuth)
  77. }
  78. if err != nil {
  79. ensureReaderClosed(resp)
  80. return nil, err
  81. }
  82. var privileges types.PluginPrivileges
  83. if err := json.NewDecoder(resp.body).Decode(&privileges); err != nil {
  84. ensureReaderClosed(resp)
  85. return nil, err
  86. }
  87. ensureReaderClosed(resp)
  88. if !options.AcceptAllPermissions && options.AcceptPermissionsFunc != nil && len(privileges) > 0 {
  89. accept, err := options.AcceptPermissionsFunc(privileges)
  90. if err != nil {
  91. return nil, err
  92. }
  93. if !accept {
  94. return nil, pluginPermissionDenied{options.RemoteRef}
  95. }
  96. }
  97. return privileges, nil
  98. }