resolver.go 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134
  1. package containerd
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "errors"
  6. "net/http"
  7. cerrdefs "github.com/containerd/containerd/errdefs"
  8. "github.com/containerd/containerd/remotes"
  9. "github.com/containerd/containerd/remotes/docker"
  10. "github.com/containerd/containerd/version"
  11. "github.com/containerd/log"
  12. "github.com/distribution/reference"
  13. registrytypes "github.com/docker/docker/api/types/registry"
  14. "github.com/docker/docker/dockerversion"
  15. "github.com/docker/docker/pkg/useragent"
  16. "github.com/docker/docker/registry"
  17. )
  18. func (i *ImageService) newResolverFromAuthConfig(ctx context.Context, authConfig *registrytypes.AuthConfig, ref reference.Named) (remotes.Resolver, docker.StatusTracker) {
  19. tracker := docker.NewInMemoryTracker()
  20. hosts := hostsWrapper(i.registryHosts, authConfig, ref, i.registryService)
  21. headers := http.Header{}
  22. headers.Set("User-Agent", dockerversion.DockerUserAgent(ctx, useragent.VersionInfo{Name: "containerd-client", Version: version.Version}, useragent.VersionInfo{Name: "storage-driver", Version: i.snapshotter}))
  23. return docker.NewResolver(docker.ResolverOptions{
  24. Hosts: hosts,
  25. Tracker: tracker,
  26. Headers: headers,
  27. }), tracker
  28. }
  29. func hostsWrapper(hostsFn docker.RegistryHosts, optAuthConfig *registrytypes.AuthConfig, ref reference.Named, regService registryResolver) docker.RegistryHosts {
  30. var authorizer docker.Authorizer
  31. if optAuthConfig != nil {
  32. authorizer = authorizerFromAuthConfig(*optAuthConfig, ref)
  33. }
  34. return func(n string) ([]docker.RegistryHost, error) {
  35. hosts, err := hostsFn(n)
  36. if err != nil {
  37. return nil, err
  38. }
  39. for i := range hosts {
  40. if hosts[i].Authorizer == nil {
  41. hosts[i].Authorizer = authorizer
  42. isInsecure := regService.IsInsecureRegistry(hosts[i].Host)
  43. if hosts[i].Client.Transport != nil && isInsecure {
  44. hosts[i].Client.Transport = httpFallback{super: hosts[i].Client.Transport}
  45. }
  46. }
  47. }
  48. return hosts, nil
  49. }
  50. }
  51. func authorizerFromAuthConfig(authConfig registrytypes.AuthConfig, ref reference.Named) docker.Authorizer {
  52. cfgHost := registry.ConvertToHostname(authConfig.ServerAddress)
  53. if cfgHost == "" {
  54. cfgHost = reference.Domain(ref)
  55. }
  56. if cfgHost == registry.IndexHostname || cfgHost == registry.IndexName {
  57. cfgHost = registry.DefaultRegistryHost
  58. }
  59. if authConfig.RegistryToken != "" {
  60. return &bearerAuthorizer{
  61. host: cfgHost,
  62. bearer: authConfig.RegistryToken,
  63. }
  64. }
  65. return docker.NewDockerAuthorizer(docker.WithAuthCreds(func(host string) (string, string, error) {
  66. if cfgHost != host {
  67. log.G(context.TODO()).WithFields(log.Fields{
  68. "host": host,
  69. "cfgHost": cfgHost,
  70. }).Warn("Host doesn't match")
  71. return "", "", nil
  72. }
  73. if authConfig.IdentityToken != "" {
  74. return "", authConfig.IdentityToken, nil
  75. }
  76. return authConfig.Username, authConfig.Password, nil
  77. }))
  78. }
  79. type bearerAuthorizer struct {
  80. host string
  81. bearer string
  82. }
  83. func (a *bearerAuthorizer) Authorize(ctx context.Context, req *http.Request) error {
  84. if req.Host != a.host {
  85. log.G(ctx).WithFields(log.Fields{
  86. "host": req.Host,
  87. "cfgHost": a.host,
  88. }).Warn("Host doesn't match for bearer token")
  89. return nil
  90. }
  91. req.Header.Set("Authorization", "Bearer "+a.bearer)
  92. return nil
  93. }
  94. func (a *bearerAuthorizer) AddResponses(context.Context, []*http.Response) error {
  95. // Return not implemented to prevent retry of the request when bearer did not succeed
  96. return cerrdefs.ErrNotImplemented
  97. }
  98. type httpFallback struct {
  99. super http.RoundTripper
  100. }
  101. func (f httpFallback) RoundTrip(r *http.Request) (*http.Response, error) {
  102. resp, err := f.super.RoundTrip(r)
  103. var tlsErr tls.RecordHeaderError
  104. if errors.As(err, &tlsErr) && string(tlsErr.RecordHeader[:]) == "HTTP/" {
  105. // server gave HTTP response to HTTPS client
  106. plainHttpUrl := *r.URL
  107. plainHttpUrl.Scheme = "http"
  108. plainHttpRequest := *r
  109. plainHttpRequest.URL = &plainHttpUrl
  110. return http.DefaultTransport.RoundTrip(&plainHttpRequest)
  111. }
  112. return resp, err
  113. }