2018-02-05 21:05:59 +00:00
|
|
|
package registry // import "github.com/docker/docker/registry"
|
2014-08-07 14:43:06 +00:00
|
|
|
|
|
|
|
import (
|
2014-10-06 19:34:39 +00:00
|
|
|
// this is required for some certificates
|
2023-06-23 00:33:17 +00:00
|
|
|
"context"
|
2014-08-07 14:43:06 +00:00
|
|
|
_ "crypto/sha512"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"net/http/cookiejar"
|
|
|
|
"net/url"
|
|
|
|
"strings"
|
2018-05-19 11:38:54 +00:00
|
|
|
"sync"
|
2014-08-07 14:43:06 +00:00
|
|
|
|
2023-09-13 15:41:45 +00:00
|
|
|
"github.com/containerd/log"
|
2022-02-26 18:13:43 +00:00
|
|
|
"github.com/docker/docker/api/types/registry"
|
2018-01-11 19:53:06 +00:00
|
|
|
"github.com/docker/docker/errdefs"
|
2015-05-17 09:07:48 +00:00
|
|
|
"github.com/docker/docker/pkg/ioutils"
|
2017-07-19 14:20:13 +00:00
|
|
|
"github.com/pkg/errors"
|
2014-08-07 14:43:06 +00:00
|
|
|
)
|
|
|
|
|
2022-02-26 00:05:27 +00:00
|
|
|
// A session is used to communicate with a V1 registry
|
|
|
|
type session struct {
|
2022-02-25 23:02:37 +00:00
|
|
|
indexEndpoint *v1Endpoint
|
2015-05-14 14:12:54 +00:00
|
|
|
client *http.Client
|
2014-08-07 14:43:06 +00:00
|
|
|
}
|
|
|
|
|
2015-05-16 01:35:04 +00:00
|
|
|
type authTransport struct {
|
|
|
|
http.RoundTripper
|
2022-03-03 09:32:29 +00:00
|
|
|
*registry.AuthConfig
|
2015-05-16 01:35:04 +00:00
|
|
|
|
|
|
|
alwaysSetBasicAuth bool
|
|
|
|
token []string
|
|
|
|
|
|
|
|
mu sync.Mutex // guards modReq
|
|
|
|
modReq map[*http.Request]*http.Request // original -> modified
|
|
|
|
}
|
|
|
|
|
2022-03-18 12:52:20 +00:00
|
|
|
// newAuthTransport handles the auth layer when communicating with a v1 registry (private or official)
|
2015-05-14 14:12:54 +00:00
|
|
|
//
|
|
|
|
// For private v1 registries, set alwaysSetBasicAuth to true.
|
|
|
|
//
|
|
|
|
// For the official v1 registry, if there isn't already an Authorization header in the request,
|
|
|
|
// but there is an X-Docker-Token header set to true, then Basic Auth will be used to set the Authorization header.
|
|
|
|
// After sending the request with the provided base http.RoundTripper, if an X-Docker-Token header, representing
|
|
|
|
// a token, is present in the response, then it gets cached and sent in the Authorization header of all subsequent
|
|
|
|
// requests.
|
|
|
|
//
|
|
|
|
// If the server sends a token without the client having requested it, it is ignored.
|
|
|
|
//
|
|
|
|
// This RoundTripper also has a CancelRequest method important for correct timeout handling.
|
2022-03-03 09:32:29 +00:00
|
|
|
func newAuthTransport(base http.RoundTripper, authConfig *registry.AuthConfig, alwaysSetBasicAuth bool) *authTransport {
|
2015-05-16 01:35:04 +00:00
|
|
|
if base == nil {
|
|
|
|
base = http.DefaultTransport
|
|
|
|
}
|
|
|
|
return &authTransport{
|
|
|
|
RoundTripper: base,
|
|
|
|
AuthConfig: authConfig,
|
|
|
|
alwaysSetBasicAuth: alwaysSetBasicAuth,
|
|
|
|
modReq: make(map[*http.Request]*http.Request),
|
|
|
|
}
|
2015-05-14 14:12:54 +00:00
|
|
|
}
|
2014-08-07 14:43:06 +00:00
|
|
|
|
2015-05-17 09:07:48 +00:00
|
|
|
// cloneRequest returns a clone of the provided *http.Request.
|
|
|
|
// The clone is a shallow copy of the struct and its Header map.
|
|
|
|
func cloneRequest(r *http.Request) *http.Request {
|
|
|
|
// shallow copy of the struct
|
|
|
|
r2 := new(http.Request)
|
|
|
|
*r2 = *r
|
|
|
|
// deep copy of the Header
|
|
|
|
r2.Header = make(http.Header, len(r.Header))
|
|
|
|
for k, s := range r.Header {
|
|
|
|
r2.Header[k] = append([]string(nil), s...)
|
|
|
|
}
|
|
|
|
|
|
|
|
return r2
|
|
|
|
}
|
|
|
|
|
2016-05-08 01:36:10 +00:00
|
|
|
// RoundTrip changes an HTTP request's headers to add the necessary
|
2015-07-21 19:40:36 +00:00
|
|
|
// authentication-related headers
|
2015-05-16 01:35:04 +00:00
|
|
|
func (tr *authTransport) RoundTrip(orig *http.Request) (*http.Response, error) {
|
2015-06-08 23:56:37 +00:00
|
|
|
// Authorization should not be set on 302 redirect for untrusted locations.
|
2015-07-21 19:40:36 +00:00
|
|
|
// This logic mirrors the behavior in addRequiredHeadersToRedirectedRequests.
|
2015-06-08 23:56:37 +00:00
|
|
|
// As the authorization logic is currently implemented in RoundTrip,
|
2015-12-13 16:00:39 +00:00
|
|
|
// a 302 redirect is detected by looking at the Referrer header as go http package adds said header.
|
|
|
|
// This is safe as Docker doesn't set Referrer in other scenarios.
|
2015-06-08 23:56:37 +00:00
|
|
|
if orig.Header.Get("Referer") != "" && !trustedLocation(orig) {
|
|
|
|
return tr.RoundTripper.RoundTrip(orig)
|
|
|
|
}
|
|
|
|
|
2015-02-12 18:23:22 +00:00
|
|
|
req := cloneRequest(orig)
|
2015-05-16 01:35:04 +00:00
|
|
|
tr.mu.Lock()
|
|
|
|
tr.modReq[orig] = req
|
|
|
|
tr.mu.Unlock()
|
2015-05-14 14:12:54 +00:00
|
|
|
|
|
|
|
if tr.alwaysSetBasicAuth {
|
2015-07-16 16:38:44 +00:00
|
|
|
if tr.AuthConfig == nil {
|
|
|
|
return nil, errors.New("unexpected error: empty auth config")
|
|
|
|
}
|
2015-05-14 14:12:54 +00:00
|
|
|
req.SetBasicAuth(tr.Username, tr.Password)
|
|
|
|
return tr.RoundTripper.RoundTrip(req)
|
2014-08-07 14:43:06 +00:00
|
|
|
}
|
|
|
|
|
2015-05-14 14:12:54 +00:00
|
|
|
// Don't override
|
|
|
|
if req.Header.Get("Authorization") == "" {
|
2015-07-16 16:38:44 +00:00
|
|
|
if req.Header.Get("X-Docker-Token") == "true" && tr.AuthConfig != nil && len(tr.Username) > 0 {
|
2015-05-14 14:12:54 +00:00
|
|
|
req.SetBasicAuth(tr.Username, tr.Password)
|
2015-06-08 23:56:37 +00:00
|
|
|
} else if len(tr.token) > 0 {
|
2015-05-14 14:12:54 +00:00
|
|
|
req.Header.Set("Authorization", "Token "+strings.Join(tr.token, ","))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
resp, err := tr.RoundTripper.RoundTrip(req)
|
2014-08-07 14:43:06 +00:00
|
|
|
if err != nil {
|
2019-10-27 23:57:15 +00:00
|
|
|
tr.mu.Lock()
|
2015-05-16 01:35:04 +00:00
|
|
|
delete(tr.modReq, orig)
|
2019-10-27 23:57:15 +00:00
|
|
|
tr.mu.Unlock()
|
2014-08-07 14:43:06 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2015-05-21 20:53:22 +00:00
|
|
|
if len(resp.Header["X-Docker-Token"]) > 0 {
|
2015-05-14 14:12:54 +00:00
|
|
|
tr.token = resp.Header["X-Docker-Token"]
|
|
|
|
}
|
2015-05-17 09:07:48 +00:00
|
|
|
resp.Body = &ioutils.OnEOFReader{
|
2015-05-16 01:35:04 +00:00
|
|
|
Rc: resp.Body,
|
2015-06-01 20:25:18 +00:00
|
|
|
Fn: func() {
|
|
|
|
tr.mu.Lock()
|
|
|
|
delete(tr.modReq, orig)
|
|
|
|
tr.mu.Unlock()
|
|
|
|
},
|
2015-05-16 01:35:04 +00:00
|
|
|
}
|
2015-05-14 14:12:54 +00:00
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
|
2015-05-16 01:35:04 +00:00
|
|
|
// CancelRequest cancels an in-flight request by closing its connection.
|
|
|
|
func (tr *authTransport) CancelRequest(req *http.Request) {
|
|
|
|
type canceler interface {
|
|
|
|
CancelRequest(*http.Request)
|
|
|
|
}
|
|
|
|
if cr, ok := tr.RoundTripper.(canceler); ok {
|
|
|
|
tr.mu.Lock()
|
|
|
|
modReq := tr.modReq[req]
|
|
|
|
delete(tr.modReq, req)
|
|
|
|
tr.mu.Unlock()
|
|
|
|
cr.CancelRequest(modReq)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-03 09:32:29 +00:00
|
|
|
func authorizeClient(client *http.Client, authConfig *registry.AuthConfig, endpoint *v1Endpoint) error {
|
2015-05-14 14:12:54 +00:00
|
|
|
var alwaysSetBasicAuth bool
|
2014-08-07 14:43:06 +00:00
|
|
|
|
|
|
|
// If we're working with a standalone private registry over HTTPS, send Basic Auth headers
|
2015-05-14 14:12:54 +00:00
|
|
|
// alongside all our requests.
|
2016-03-01 07:07:41 +00:00
|
|
|
if endpoint.String() != IndexServer && endpoint.URL.Scheme == "https" {
|
2022-02-25 23:08:20 +00:00
|
|
|
info, err := endpoint.ping()
|
2014-08-07 14:43:06 +00:00
|
|
|
if err != nil {
|
2016-07-13 20:30:24 +00:00
|
|
|
return err
|
2014-08-07 14:43:06 +00:00
|
|
|
}
|
2015-05-14 14:12:54 +00:00
|
|
|
if info.Standalone && authConfig != nil {
|
2023-06-23 00:33:17 +00:00
|
|
|
log.G(context.TODO()).Debugf("Endpoint %s is eligible for private registry. Enabling decorator.", endpoint.String())
|
2015-05-14 14:12:54 +00:00
|
|
|
alwaysSetBasicAuth = true
|
2014-08-07 14:43:06 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-19 17:12:52 +00:00
|
|
|
// Annotate the transport unconditionally so that v2 can
|
|
|
|
// properly fallback on v1 when an image is not found.
|
2022-03-18 12:52:20 +00:00
|
|
|
client.Transport = newAuthTransport(client.Transport, authConfig, alwaysSetBasicAuth)
|
2014-08-07 14:43:06 +00:00
|
|
|
|
2015-05-14 14:12:54 +00:00
|
|
|
jar, err := cookiejar.New(nil)
|
|
|
|
if err != nil {
|
2022-02-26 12:45:12 +00:00
|
|
|
return errdefs.System(errors.New("cookiejar.New is not supposed to return an error"))
|
2015-05-14 14:12:54 +00:00
|
|
|
}
|
|
|
|
client.Jar = jar
|
|
|
|
|
2016-07-13 20:30:24 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-02-26 00:05:27 +00:00
|
|
|
func newSession(client *http.Client, endpoint *v1Endpoint) *session {
|
|
|
|
return &session{
|
2016-07-13 20:30:24 +00:00
|
|
|
client: client,
|
|
|
|
indexEndpoint: endpoint,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-02 12:29:47 +00:00
|
|
|
// defaultSearchLimit is the default value for maximum number of returned search results.
|
|
|
|
const defaultSearchLimit = 25
|
|
|
|
|
2022-02-26 00:05:27 +00:00
|
|
|
// searchRepositories performs a search against the remote repository
|
2022-02-26 18:13:43 +00:00
|
|
|
func (r *session) searchRepositories(term string, limit int) (*registry.SearchResults, error) {
|
2022-03-02 12:29:47 +00:00
|
|
|
if limit == 0 {
|
|
|
|
limit = defaultSearchLimit
|
|
|
|
}
|
2016-06-01 20:38:14 +00:00
|
|
|
if limit < 1 || limit > 100 {
|
2022-02-26 12:45:12 +00:00
|
|
|
return nil, invalidParamf("limit %d is outside the range of [1, 100]", limit)
|
2016-06-01 20:38:14 +00:00
|
|
|
}
|
|
|
|
u := r.indexEndpoint.String() + "search?q=" + url.QueryEscape(term) + "&n=" + url.QueryEscape(fmt.Sprintf("%d", limit))
|
2023-07-10 14:09:50 +00:00
|
|
|
log.G(context.TODO()).WithField("url", u).Debug("searchRepositories")
|
2015-07-10 03:56:23 +00:00
|
|
|
|
2019-10-12 18:42:44 +00:00
|
|
|
req, err := http.NewRequest(http.MethodGet, u, nil)
|
2015-07-10 03:56:23 +00:00
|
|
|
if err != nil {
|
2022-02-26 12:45:12 +00:00
|
|
|
return nil, invalidParamWrapf(err, "error building request")
|
2015-07-10 03:56:23 +00:00
|
|
|
}
|
|
|
|
// Have the AuthTransport send authentication, when logged in.
|
|
|
|
req.Header.Set("X-Docker-Token", "true")
|
|
|
|
res, err := r.client.Do(req)
|
2014-08-07 14:43:06 +00:00
|
|
|
if err != nil {
|
2017-11-29 04:09:37 +00:00
|
|
|
return nil, errdefs.System(err)
|
2014-08-07 14:43:06 +00:00
|
|
|
}
|
|
|
|
defer res.Body.Close()
|
2019-10-13 15:25:25 +00:00
|
|
|
if res.StatusCode != http.StatusOK {
|
2023-09-18 14:35:45 +00:00
|
|
|
// TODO(thaJeztah): return upstream response body for errors (see https://github.com/moby/moby/issues/27286).
|
|
|
|
return nil, errdefs.Unknown(fmt.Errorf("Unexpected status code %d", res.StatusCode))
|
2014-08-07 14:43:06 +00:00
|
|
|
}
|
2023-07-10 14:13:35 +00:00
|
|
|
result := ®istry.SearchResults{}
|
|
|
|
err = json.NewDecoder(res.Body).Decode(result)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errdefs.System(errors.Wrap(err, "error decoding registry search results"))
|
|
|
|
}
|
|
|
|
return result, nil
|
2014-08-07 14:43:06 +00:00
|
|
|
}
|