123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152 |
- package distribution // import "github.com/docker/docker/distribution"
- import (
- "context"
- "fmt"
- "github.com/containerd/log"
- "github.com/distribution/reference"
- "github.com/docker/docker/api"
- "github.com/docker/docker/api/types/events"
- refstore "github.com/docker/docker/reference"
- "github.com/docker/docker/registry"
- "github.com/opencontainers/go-digest"
- "github.com/pkg/errors"
- )
- // Pull initiates a pull operation. image is the repository name to pull, and
- // tag may be either empty, or indicate a specific tag to pull.
- func Pull(ctx context.Context, ref reference.Named, config *ImagePullConfig, local ContentStore) error {
- repoInfo, err := pullEndpoints(ctx, config.RegistryService, ref, func(ctx context.Context, repoInfo registry.RepositoryInfo, endpoint registry.APIEndpoint) error {
- log.G(ctx).Debugf("Trying to pull %s from %s", reference.FamiliarName(repoInfo.Name), endpoint.URL)
- puller := newPuller(endpoint, &repoInfo, config, local)
- return puller.pull(ctx, ref)
- })
- if err == nil {
- config.ImageEventLogger(reference.FamiliarString(ref), reference.FamiliarName(repoInfo.Name), events.ActionPull)
- }
- return err
- }
- // Tags returns available tags for the given image in the remote repository.
- func Tags(ctx context.Context, ref reference.Named, config *Config) ([]string, error) {
- var tags []string
- _, err := pullEndpoints(ctx, config.RegistryService, ref, func(ctx context.Context, repoInfo registry.RepositoryInfo, endpoint registry.APIEndpoint) error {
- repo, err := newRepository(ctx, &repoInfo, endpoint, config.MetaHeaders, config.AuthConfig, "pull")
- if err != nil {
- return err
- }
- tags, err = repo.Tags(ctx).All(ctx)
- return err
- })
- return tags, err
- }
- // validateRepoName validates the name of a repository.
- func validateRepoName(name reference.Named) error {
- if reference.FamiliarName(name) == api.NoBaseImageSpecifier {
- return errors.WithStack(reservedNameError(api.NoBaseImageSpecifier))
- }
- return nil
- }
- func addDigestReference(store refstore.Store, ref reference.Named, dgst digest.Digest, id digest.Digest) error {
- dgstRef, err := reference.WithDigest(reference.TrimNamed(ref), dgst)
- if err != nil {
- return err
- }
- if oldTagID, err := store.Get(dgstRef); err == nil {
- if oldTagID != id {
- // Updating digests not supported by reference store
- log.G(context.TODO()).Errorf("Image ID for digest %s changed from %s to %s, cannot update", dgst.String(), oldTagID, id)
- }
- return nil
- } else if err != refstore.ErrDoesNotExist {
- return err
- }
- return store.AddDigest(dgstRef, id, true)
- }
- func pullEndpoints(ctx context.Context, registryService RegistryResolver, ref reference.Named,
- f func(context.Context, registry.RepositoryInfo, registry.APIEndpoint) error,
- ) (*registry.RepositoryInfo, error) {
- // Resolve the Repository name from fqn to RepositoryInfo
- repoInfo, err := registryService.ResolveRepository(ref)
- if err != nil {
- return nil, err
- }
- // makes sure name is not `scratch`
- if err := validateRepoName(repoInfo.Name); err != nil {
- return repoInfo, err
- }
- endpoints, err := registryService.LookupPullEndpoints(reference.Domain(repoInfo.Name))
- if err != nil {
- return repoInfo, err
- }
- var (
- lastErr error
- // confirmedTLSRegistries is a map indicating which registries
- // are known to be using TLS. There should never be a plaintext
- // retry for any of these.
- confirmedTLSRegistries = make(map[string]struct{})
- )
- for _, endpoint := range endpoints {
- if endpoint.URL.Scheme != "https" {
- if _, confirmedTLS := confirmedTLSRegistries[endpoint.URL.Host]; confirmedTLS {
- log.G(ctx).Debugf("Skipping non-TLS endpoint %s for host/port that appears to use TLS", endpoint.URL)
- continue
- }
- }
- log.G(ctx).Debugf("Trying to pull %s from %s", reference.FamiliarName(repoInfo.Name), endpoint.URL)
- if err := f(ctx, *repoInfo, endpoint); err != nil {
- if _, ok := err.(fallbackError); !ok && continueOnError(err, endpoint.Mirror) {
- err = fallbackError{
- err: err,
- transportOK: true,
- }
- }
- // Was this pull cancelled? If so, don't try to fall
- // back.
- fallback := false
- select {
- case <-ctx.Done():
- default:
- if fallbackErr, ok := err.(fallbackError); ok {
- fallback = true
- if fallbackErr.transportOK && endpoint.URL.Scheme == "https" {
- confirmedTLSRegistries[endpoint.URL.Host] = struct{}{}
- }
- err = fallbackErr.err
- }
- }
- if fallback {
- lastErr = err
- log.G(ctx).Infof("Attempting next endpoint for pull after error: %v", err)
- continue
- }
- log.G(ctx).Errorf("Not continuing with pull after error: %v", err)
- return repoInfo, translatePullError(err, ref)
- }
- return repoInfo, nil
- }
- if lastErr == nil {
- lastErr = fmt.Errorf("no endpoints found for %s", reference.FamiliarString(ref))
- }
- return repoInfo, translatePullError(lastErr, ref)
- }
|