Skip to content

Commit 7998ae4

Browse files
author
OpenShift Bot
authored
Merge pull request #9819 from miminar/remote-layer-federation
Merged by openshift-bot
2 parents 681c6f2 + db956d8 commit 7998ae4

21 files changed

+3103
-223
lines changed

images/dockerregistry/config.yml

+1
Original file line numberDiff line numberDiff line change
@@ -23,5 +23,6 @@ middleware:
2323
pullthrough: true
2424
enforcequota: false
2525
projectcachettl: 1m
26+
blobrepositorycachettl: 10m
2627
storage:
2728
- name: openshift

pkg/dockerregistry/server/auth.go

+16-22
Original file line numberDiff line numberDiff line change
@@ -40,26 +40,36 @@ const (
4040
TokenRealmKey = "token-realm"
4141
)
4242

43+
// RegistryClient encapsulates getting access to the OpenShift API.
44+
type RegistryClient interface {
45+
// Clients return the authenticated client to use with the server.
46+
Clients() (client.Interface, kclient.Interface, error)
47+
// SafeClientConfig returns a client config without authentication info.
48+
SafeClientConfig() restclient.Config
49+
}
50+
4351
// DefaultRegistryClient is exposed for testing the registry with fake client.
4452
var DefaultRegistryClient = NewRegistryClient(clientcmd.NewConfig().BindToFile())
4553

46-
// RegistryClient encapsulates getting access to the OpenShift API.
47-
type RegistryClient struct {
54+
// registryClient implements RegistryClient
55+
type registryClient struct {
4856
config *clientcmd.Config
4957
}
5058

59+
var _ RegistryClient = &registryClient{}
60+
5161
// NewRegistryClient creates a registry client.
52-
func NewRegistryClient(config *clientcmd.Config) *RegistryClient {
53-
return &RegistryClient{config: config}
62+
func NewRegistryClient(config *clientcmd.Config) RegistryClient {
63+
return &registryClient{config: config}
5464
}
5565

5666
// Client returns the authenticated client to use with the server.
57-
func (r *RegistryClient) Clients() (client.Interface, kclient.Interface, error) {
67+
func (r *registryClient) Clients() (client.Interface, kclient.Interface, error) {
5868
return r.config.Clients()
5969
}
6070

6171
// SafeClientConfig returns a client config without authentication info.
62-
func (r *RegistryClient) SafeClientConfig() restclient.Config {
72+
func (r *registryClient) SafeClientConfig() restclient.Config {
6373
return clientcmd.AnonymousClientConfig(r.config.OpenShiftConfig())
6474
}
6575

@@ -327,22 +337,6 @@ func (ac *AccessController) Authorized(ctx context.Context, accessRecords ...reg
327337
return WithUserClient(ctx, osClient), nil
328338
}
329339

330-
func getNamespaceName(resourceName string) (string, string, error) {
331-
repoParts := strings.SplitN(resourceName, "/", 2)
332-
if len(repoParts) != 2 {
333-
return "", "", ErrNamespaceRequired
334-
}
335-
ns := repoParts[0]
336-
if len(ns) == 0 {
337-
return "", "", ErrNamespaceRequired
338-
}
339-
name := repoParts[1]
340-
if len(name) == 0 {
341-
return "", "", ErrNamespaceRequired
342-
}
343-
return ns, name, nil
344-
}
345-
346340
func getOpenShiftAPIToken(ctx context.Context, req *http.Request) (string, error) {
347341
token := ""
348342

pkg/dockerregistry/server/blobdescriptorservice.go

+178-1
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,28 @@
11
package server
22

33
import (
4+
"fmt"
5+
"sort"
6+
"time"
7+
48
"github.com/docker/distribution"
59
"github.com/docker/distribution/context"
610
"github.com/docker/distribution/digest"
711
"github.com/docker/distribution/registry/middleware/registry"
812
"github.com/docker/distribution/registry/storage"
13+
14+
kerrors "k8s.io/kubernetes/pkg/api/errors"
15+
16+
imageapi "github.com/openshift/origin/pkg/image/api"
917
)
1018

19+
// ByGeneration allows for sorting tag events from latest to oldest.
20+
type ByGeneration []*imageapi.TagEvent
21+
22+
func (b ByGeneration) Less(i, j int) bool { return b[i].Generation > b[j].Generation }
23+
func (b ByGeneration) Len() int { return len(b) }
24+
func (b ByGeneration) Swap(i, j int) { b[i], b[j] = b[j], b[i] }
25+
1126
func init() {
1227
middleware.RegisterOptions(storage.BlobDescriptorServiceFactory(&blobDescriptorServiceFactory{}))
1328
}
@@ -25,6 +40,168 @@ type blobDescriptorService struct {
2540
distribution.BlobDescriptorService
2641
}
2742

43+
// Stat returns a a blob descriptor if the given blob is either linked in repository or is referenced in
44+
// corresponding image stream. This method is invoked from inside of upstream's linkedBlobStore. It expects
45+
// a proper repository object to be set on given context by upper openshift middleware wrappers.
2846
func (bs *blobDescriptorService) Stat(ctx context.Context, dgst digest.Digest) (distribution.Descriptor, error) {
29-
return dockerRegistry.BlobStatter().Stat(ctx, dgst)
47+
repo, found := RepositoryFrom(ctx)
48+
if !found || repo == nil {
49+
err := fmt.Errorf("failed to retrieve repository from context")
50+
context.GetLogger(ctx).Error(err)
51+
return distribution.Descriptor{}, err
52+
}
53+
54+
// if there is a repo layer link, return its descriptor
55+
desc, err := bs.BlobDescriptorService.Stat(ctx, dgst)
56+
if err == nil {
57+
// and remember the association
58+
repo.cachedLayers.RememberDigest(dgst, repo.blobrepositorycachettl, imageapi.DockerImageReference{
59+
Namespace: repo.namespace,
60+
Name: repo.name,
61+
}.Exact())
62+
return desc, nil
63+
}
64+
65+
context.GetLogger(ctx).Debugf("could not stat layer link %q in repository %q: %v", dgst.String(), repo.Named().Name(), err)
66+
67+
// verify the blob is stored locally
68+
desc, err = dockerRegistry.BlobStatter().Stat(ctx, dgst)
69+
if err != nil {
70+
return desc, err
71+
}
72+
73+
// ensure it's referenced inside of corresponding image stream
74+
if imageStreamHasBlob(repo, dgst) {
75+
return desc, nil
76+
}
77+
78+
return distribution.Descriptor{}, distribution.ErrBlobUnknown
79+
}
80+
81+
func (bs *blobDescriptorService) Clear(ctx context.Context, dgst digest.Digest) error {
82+
repo, found := RepositoryFrom(ctx)
83+
if !found || repo == nil {
84+
err := fmt.Errorf("failed to retrieve repository from context")
85+
context.GetLogger(ctx).Error(err)
86+
return err
87+
}
88+
89+
repo.cachedLayers.ForgetDigest(dgst, imageapi.DockerImageReference{
90+
Namespace: repo.namespace,
91+
Name: repo.name,
92+
}.Exact())
93+
return bs.BlobDescriptorService.Clear(ctx, dgst)
94+
}
95+
96+
// imageStreamHasBlob returns true if the given blob digest is referenced in image stream corresponding to
97+
// given repository. If not found locally, image stream's images will be iterated and fetched from newest to
98+
// oldest until found. Each processed image will update local cache of blobs.
99+
func imageStreamHasBlob(r *repository, dgst digest.Digest) bool {
100+
repoCacheName := imageapi.DockerImageReference{Namespace: r.namespace, Name: r.name}.Exact()
101+
if r.cachedLayers.RepositoryHasBlob(repoCacheName, dgst) {
102+
context.GetLogger(r.ctx).Debugf("found cached blob %q in repository %s", dgst.String(), r.Named().Name())
103+
return true
104+
}
105+
106+
context.GetLogger(r.ctx).Debugf("verifying presence of blob %q in image stream %s/%s", dgst.String(), r.namespace, r.name)
107+
started := time.Now()
108+
logFound := func(found bool) bool {
109+
elapsed := time.Now().Sub(started)
110+
if found {
111+
context.GetLogger(r.ctx).Debugf("verified presence of blob %q in image stream %s/%s after %s", dgst.String(), r.namespace, r.name, elapsed.String())
112+
} else {
113+
context.GetLogger(r.ctx).Debugf("detected absence of blob %q in image stream %s/%s after %s", dgst.String(), r.namespace, r.name, elapsed.String())
114+
}
115+
return found
116+
}
117+
118+
// verify directly with etcd
119+
is, err := r.getImageStream()
120+
if err != nil {
121+
context.GetLogger(r.ctx).Errorf("failed to get image stream: %v", err)
122+
return logFound(false)
123+
}
124+
125+
tagEvents := []*imageapi.TagEvent{}
126+
event2Name := make(map[*imageapi.TagEvent]string)
127+
for name, eventList := range is.Status.Tags {
128+
for i := range eventList.Items {
129+
event := &eventList.Items[i]
130+
tagEvents = append(tagEvents, event)
131+
event2Name[event] = name
132+
}
133+
}
134+
// search from youngest to oldest
135+
sort.Sort(ByGeneration(tagEvents))
136+
137+
processedImages := map[string]struct{}{}
138+
139+
for _, tagEvent := range tagEvents {
140+
if _, processed := processedImages[tagEvent.Image]; processed {
141+
continue
142+
}
143+
if imageHasBlob(r, repoCacheName, tagEvent.Image, dgst.String(), !r.pullthrough) {
144+
tagName := event2Name[tagEvent]
145+
context.GetLogger(r.ctx).Debugf("blob found under istag %s/%s:%s in image %s", r.namespace, r.name, tagName, tagEvent.Image)
146+
return logFound(true)
147+
}
148+
processedImages[tagEvent.Image] = struct{}{}
149+
}
150+
151+
context.GetLogger(r.ctx).Warnf("blob %q exists locally but is not referenced in repository %s/%s", dgst.String(), r.namespace, r.name)
152+
153+
return logFound(false)
154+
}
155+
156+
// imageHasBlob returns true if the image identified by imageName refers to the given blob. The image is
157+
// fetched. If requireManaged is true and the image is not managed (it refers to remote registry), the image
158+
// will not be processed. Fetched image will update local cache of blobs -> repositories with (blobDigest,
159+
// cacheName) pairs.
160+
func imageHasBlob(
161+
r *repository,
162+
cacheName,
163+
imageName,
164+
blobDigest string,
165+
requireManaged bool,
166+
) bool {
167+
context.GetLogger(r.ctx).Debugf("getting image %s", imageName)
168+
image, err := r.getImage(digest.Digest(imageName))
169+
if err != nil {
170+
if kerrors.IsNotFound(err) {
171+
context.GetLogger(r.ctx).Debugf("image %q not found: imageName")
172+
} else {
173+
context.GetLogger(r.ctx).Errorf("failed to get image: %v", err)
174+
}
175+
return false
176+
}
177+
178+
// in case of pullthrough disabled, client won't be able to download a blob belonging to not managed image
179+
// (image stored in external registry), thus don't consider them as candidates
180+
if managed := image.Annotations[imageapi.ManagedByOpenShiftAnnotation]; requireManaged && managed != "true" {
181+
context.GetLogger(r.ctx).Debugf("skipping not managed image")
182+
return false
183+
}
184+
185+
if len(image.DockerImageLayers) == 0 {
186+
if len(image.DockerImageManifestMediaType) > 0 {
187+
// If the media type is set, we can safely assume that the best effort to fill the image layers
188+
// has already been done. There are none.
189+
return false
190+
}
191+
err = imageapi.ImageWithMetadata(image)
192+
if err != nil {
193+
context.GetLogger(r.ctx).Errorf("failed to get metadata for image %s: %v", imageName, err)
194+
return false
195+
}
196+
}
197+
198+
for _, layer := range image.DockerImageLayers {
199+
if layer.Name == blobDigest {
200+
// remember all the layers of matching image
201+
r.rememberLayersOfImage(image, cacheName)
202+
return true
203+
}
204+
}
205+
206+
return false
30207
}

0 commit comments

Comments
 (0)