plugin_routes.go 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323
  1. package plugin
  2. import (
  3. "encoding/base64"
  4. "encoding/json"
  5. "net/http"
  6. "strconv"
  7. "strings"
  8. distreference "github.com/docker/distribution/reference"
  9. "github.com/docker/docker/api/server/httputils"
  10. "github.com/docker/docker/api/types"
  11. "github.com/docker/docker/api/types/filters"
  12. "github.com/docker/docker/pkg/ioutils"
  13. "github.com/docker/docker/pkg/streamformatter"
  14. "github.com/docker/docker/reference"
  15. "github.com/pkg/errors"
  16. "golang.org/x/net/context"
  17. )
  18. func parseHeaders(headers http.Header) (map[string][]string, *types.AuthConfig) {
  19. metaHeaders := map[string][]string{}
  20. for k, v := range headers {
  21. if strings.HasPrefix(k, "X-Meta-") {
  22. metaHeaders[k] = v
  23. }
  24. }
  25. // Get X-Registry-Auth
  26. authEncoded := headers.Get("X-Registry-Auth")
  27. authConfig := &types.AuthConfig{}
  28. if authEncoded != "" {
  29. authJSON := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  30. if err := json.NewDecoder(authJSON).Decode(authConfig); err != nil {
  31. authConfig = &types.AuthConfig{}
  32. }
  33. }
  34. return metaHeaders, authConfig
  35. }
  36. // parseRemoteRef parses the remote reference into a reference.Named
  37. // returning the tag associated with the reference. In the case the
  38. // given reference string includes both digest and tag, the returned
  39. // reference will have the digest without the tag, but the tag will
  40. // be returned.
  41. func parseRemoteRef(remote string) (reference.Named, string, error) {
  42. // Parse remote reference, supporting remotes with name and tag
  43. // NOTE: Using distribution reference to handle references
  44. // containing both a name and digest
  45. remoteRef, err := distreference.ParseNamed(remote)
  46. if err != nil {
  47. return nil, "", err
  48. }
  49. var tag string
  50. if t, ok := remoteRef.(distreference.Tagged); ok {
  51. tag = t.Tag()
  52. }
  53. // Convert distribution reference to docker reference
  54. // TODO: remove when docker reference changes reconciled upstream
  55. ref, err := reference.WithName(remoteRef.Name())
  56. if err != nil {
  57. return nil, "", err
  58. }
  59. if d, ok := remoteRef.(distreference.Digested); ok {
  60. ref, err = reference.WithDigest(ref, d.Digest())
  61. if err != nil {
  62. return nil, "", err
  63. }
  64. } else if tag != "" {
  65. ref, err = reference.WithTag(ref, tag)
  66. if err != nil {
  67. return nil, "", err
  68. }
  69. } else {
  70. ref = reference.WithDefaultTag(ref)
  71. }
  72. return ref, tag, nil
  73. }
  74. func (pr *pluginRouter) getPrivileges(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  75. if err := httputils.ParseForm(r); err != nil {
  76. return err
  77. }
  78. metaHeaders, authConfig := parseHeaders(r.Header)
  79. ref, _, err := parseRemoteRef(r.FormValue("remote"))
  80. if err != nil {
  81. return err
  82. }
  83. privileges, err := pr.backend.Privileges(ctx, ref, metaHeaders, authConfig)
  84. if err != nil {
  85. return err
  86. }
  87. return httputils.WriteJSON(w, http.StatusOK, privileges)
  88. }
  89. func (pr *pluginRouter) upgradePlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  90. if err := httputils.ParseForm(r); err != nil {
  91. return errors.Wrap(err, "failed to parse form")
  92. }
  93. var privileges types.PluginPrivileges
  94. dec := json.NewDecoder(r.Body)
  95. if err := dec.Decode(&privileges); err != nil {
  96. return errors.Wrap(err, "failed to parse privileges")
  97. }
  98. if dec.More() {
  99. return errors.New("invalid privileges")
  100. }
  101. metaHeaders, authConfig := parseHeaders(r.Header)
  102. ref, tag, err := parseRemoteRef(r.FormValue("remote"))
  103. if err != nil {
  104. return err
  105. }
  106. name, err := getName(ref, tag, vars["name"])
  107. if err != nil {
  108. return err
  109. }
  110. w.Header().Set("Docker-Plugin-Name", name)
  111. w.Header().Set("Content-Type", "application/json")
  112. output := ioutils.NewWriteFlusher(w)
  113. if err := pr.backend.Upgrade(ctx, ref, name, metaHeaders, authConfig, privileges, output); err != nil {
  114. if !output.Flushed() {
  115. return err
  116. }
  117. output.Write(streamformatter.NewJSONStreamFormatter().FormatError(err))
  118. }
  119. return nil
  120. }
  121. func (pr *pluginRouter) pullPlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  122. if err := httputils.ParseForm(r); err != nil {
  123. return errors.Wrap(err, "failed to parse form")
  124. }
  125. var privileges types.PluginPrivileges
  126. dec := json.NewDecoder(r.Body)
  127. if err := dec.Decode(&privileges); err != nil {
  128. return errors.Wrap(err, "failed to parse privileges")
  129. }
  130. if dec.More() {
  131. return errors.New("invalid privileges")
  132. }
  133. metaHeaders, authConfig := parseHeaders(r.Header)
  134. ref, tag, err := parseRemoteRef(r.FormValue("remote"))
  135. if err != nil {
  136. return err
  137. }
  138. name, err := getName(ref, tag, r.FormValue("name"))
  139. if err != nil {
  140. return err
  141. }
  142. w.Header().Set("Docker-Plugin-Name", name)
  143. w.Header().Set("Content-Type", "application/json")
  144. output := ioutils.NewWriteFlusher(w)
  145. if err := pr.backend.Pull(ctx, ref, name, metaHeaders, authConfig, privileges, output); err != nil {
  146. if !output.Flushed() {
  147. return err
  148. }
  149. output.Write(streamformatter.NewJSONStreamFormatter().FormatError(err))
  150. }
  151. return nil
  152. }
  153. func getName(ref reference.Named, tag, name string) (string, error) {
  154. if name == "" {
  155. if _, ok := ref.(reference.Canonical); ok {
  156. trimmed := reference.TrimNamed(ref)
  157. if tag != "" {
  158. nt, err := reference.WithTag(trimmed, tag)
  159. if err != nil {
  160. return "", err
  161. }
  162. name = nt.String()
  163. } else {
  164. name = reference.WithDefaultTag(trimmed).String()
  165. }
  166. } else {
  167. name = ref.String()
  168. }
  169. } else {
  170. localRef, err := reference.ParseNamed(name)
  171. if err != nil {
  172. return "", err
  173. }
  174. if _, ok := localRef.(reference.Canonical); ok {
  175. return "", errors.New("cannot use digest in plugin tag")
  176. }
  177. if distreference.IsNameOnly(localRef) {
  178. // TODO: log change in name to out stream
  179. name = reference.WithDefaultTag(localRef).String()
  180. }
  181. }
  182. return name, nil
  183. }
  184. func (pr *pluginRouter) createPlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  185. if err := httputils.ParseForm(r); err != nil {
  186. return err
  187. }
  188. options := &types.PluginCreateOptions{
  189. RepoName: r.FormValue("name")}
  190. if err := pr.backend.CreateFromContext(ctx, r.Body, options); err != nil {
  191. return err
  192. }
  193. //TODO: send progress bar
  194. w.WriteHeader(http.StatusNoContent)
  195. return nil
  196. }
  197. func (pr *pluginRouter) enablePlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  198. if err := httputils.ParseForm(r); err != nil {
  199. return err
  200. }
  201. name := vars["name"]
  202. timeout, err := strconv.Atoi(r.Form.Get("timeout"))
  203. if err != nil {
  204. return err
  205. }
  206. config := &types.PluginEnableConfig{Timeout: timeout}
  207. return pr.backend.Enable(name, config)
  208. }
  209. func (pr *pluginRouter) disablePlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  210. if err := httputils.ParseForm(r); err != nil {
  211. return err
  212. }
  213. name := vars["name"]
  214. config := &types.PluginDisableConfig{
  215. ForceDisable: httputils.BoolValue(r, "force"),
  216. }
  217. return pr.backend.Disable(name, config)
  218. }
  219. func (pr *pluginRouter) removePlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  220. if err := httputils.ParseForm(r); err != nil {
  221. return err
  222. }
  223. name := vars["name"]
  224. config := &types.PluginRmConfig{
  225. ForceRemove: httputils.BoolValue(r, "force"),
  226. }
  227. return pr.backend.Remove(name, config)
  228. }
  229. func (pr *pluginRouter) pushPlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  230. if err := httputils.ParseForm(r); err != nil {
  231. return errors.Wrap(err, "failed to parse form")
  232. }
  233. metaHeaders, authConfig := parseHeaders(r.Header)
  234. w.Header().Set("Content-Type", "application/json")
  235. output := ioutils.NewWriteFlusher(w)
  236. if err := pr.backend.Push(ctx, vars["name"], metaHeaders, authConfig, output); err != nil {
  237. if !output.Flushed() {
  238. return err
  239. }
  240. output.Write(streamformatter.NewJSONStreamFormatter().FormatError(err))
  241. }
  242. return nil
  243. }
  244. func (pr *pluginRouter) setPlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  245. var args []string
  246. if err := json.NewDecoder(r.Body).Decode(&args); err != nil {
  247. return err
  248. }
  249. if err := pr.backend.Set(vars["name"], args); err != nil {
  250. return err
  251. }
  252. w.WriteHeader(http.StatusNoContent)
  253. return nil
  254. }
  255. func (pr *pluginRouter) listPlugins(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  256. if err := httputils.ParseForm(r); err != nil {
  257. return err
  258. }
  259. pluginFilters, err := filters.FromParam(r.Form.Get("filters"))
  260. if err != nil {
  261. return err
  262. }
  263. l, err := pr.backend.List(pluginFilters)
  264. if err != nil {
  265. return err
  266. }
  267. return httputils.WriteJSON(w, http.StatusOK, l)
  268. }
  269. func (pr *pluginRouter) inspectPlugin(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  270. result, err := pr.backend.Inspect(vars["name"])
  271. if err != nil {
  272. return err
  273. }
  274. return httputils.WriteJSON(w, http.StatusOK, result)
  275. }