1
1
package mirror
2
2
3
3
import (
4
+ "bufio"
4
5
"fmt"
5
6
"io"
7
+ "os"
6
8
"regexp"
7
9
"strings"
10
+ "sync"
8
11
9
12
"github.com/docker/distribution"
10
13
"github.com/docker/distribution/manifest/manifestlist"
14
+ "github.com/docker/distribution/manifest/schema1"
11
15
"github.com/docker/distribution/manifest/schema2"
12
16
"github.com/docker/distribution/reference"
17
+ "github.com/docker/distribution/registry/api/errcode"
18
+ "github.com/docker/distribution/registry/api/v2"
13
19
"github.com/docker/distribution/registry/client"
14
20
"github.com/docker/distribution/registry/client/auth"
21
+
15
22
units "github.com/docker/go-units"
23
+ "github.com/docker/libtrust"
16
24
"github.com/golang/glog"
17
25
godigest "github.com/opencontainers/go-digest"
18
26
"github.com/spf13/cobra"
@@ -89,6 +97,8 @@ type Mapping struct {
89
97
type pushOptions struct {
90
98
Out , ErrOut io.Writer
91
99
100
+ Filenames []string
101
+
92
102
Mappings []Mapping
93
103
OSFilter * regexp.Regexp
94
104
@@ -130,6 +140,7 @@ func NewCmdMirrorImage(name string, out, errOut io.Writer) *cobra.Command {
130
140
flag .StringVar (& o .FilterByOS , "filter-by-os" , o .FilterByOS , "A regular expression to control which images are mirrored. Images will be passed as '<platform>/<architecture>[/<variant>]'." )
131
141
flag .BoolVar (& o .Force , "force" , o .Force , "If true, attempt to write all contents." )
132
142
flag .StringSliceVar (& o .AttemptS3BucketCopy , "s3-source-bucket" , o .AttemptS3BucketCopy , "A list of bucket/path locations on S3 that may contain already uploaded blobs. Add [store] to the end to use the Docker registry path convention." )
143
+ flag .StringSliceVarP (& o .Filenames , "filename" , "f" , o .Filenames , "One or more files to read SRC=DST or SRC DST [DST ...] mappings from." )
133
144
134
145
return cmd
135
146
}
@@ -162,56 +173,109 @@ func parseDestination(ref string) (imageapi.DockerImageReference, DestinationTyp
162
173
return dst , dstType , nil
163
174
}
164
175
165
- func ( o * pushOptions ) Complete ( args [ ]string ) error {
176
+ func parseArgs ( args [] string , overlap map [ string ]string ) ([] Mapping , error ) {
166
177
var remainingArgs []string
167
- overlap := make ( map [ string ] string )
178
+ var mappings [] Mapping
168
179
for _ , s := range args {
169
180
parts := strings .SplitN (s , "=" , 2 )
170
181
if len (parts ) != 2 {
171
182
remainingArgs = append (remainingArgs , s )
172
183
continue
173
184
}
174
185
if len (parts [0 ]) == 0 || len (parts [1 ]) == 0 {
175
- return fmt .Errorf ("all arguments must be valid SRC=DST mappings" )
186
+ return nil , fmt .Errorf ("all arguments must be valid SRC=DST mappings" )
176
187
}
177
188
src , err := parseSource (parts [0 ])
178
189
if err != nil {
179
- return err
190
+ return nil , err
180
191
}
181
192
dst , dstType , err := parseDestination (parts [1 ])
182
193
if err != nil {
183
- return err
194
+ return nil , err
184
195
}
185
196
if _ , ok := overlap [dst .String ()]; ok {
186
- return fmt .Errorf ("each destination tag may only be specified once: %s" , dst .String ())
197
+ return nil , fmt .Errorf ("each destination tag may only be specified once: %s" , dst .String ())
187
198
}
188
199
overlap [dst .String ()] = src .String ()
189
200
190
- o . Mappings = append (o . Mappings , Mapping {Source : src , Destination : dst , Type : dstType })
201
+ mappings = append (mappings , Mapping {Source : src , Destination : dst , Type : dstType })
191
202
}
192
203
193
204
switch {
194
- case len (remainingArgs ) == 0 && len (o .Mappings ) > 0 :
195
- // user has input arguments
196
- case len (remainingArgs ) > 1 && len (o .Mappings ) == 0 :
205
+ case len (remainingArgs ) > 1 && len (mappings ) == 0 :
197
206
src , err := parseSource (remainingArgs [0 ])
198
207
if err != nil {
199
- return err
208
+ return nil , err
200
209
}
201
210
for i := 1 ; i < len (remainingArgs ); i ++ {
202
211
dst , dstType , err := parseDestination (remainingArgs [i ])
203
212
if err != nil {
204
- return err
213
+ return nil , err
205
214
}
206
215
if _ , ok := overlap [dst .String ()]; ok {
207
- return fmt .Errorf ("each destination tag may only be specified once: %s" , dst .String ())
216
+ return nil , fmt .Errorf ("each destination tag may only be specified once: %s" , dst .String ())
208
217
}
209
218
overlap [dst .String ()] = src .String ()
210
- o . Mappings = append (o . Mappings , Mapping {Source : src , Destination : dst , Type : dstType })
219
+ mappings = append (mappings , Mapping {Source : src , Destination : dst , Type : dstType })
211
220
}
212
- case len (remainingArgs ) == 1 && len (o .Mappings ) == 0 :
213
- return fmt .Errorf ("all arguments must be valid SRC=DST mappings, or you must specify one SRC argument and one or more DST arguments" )
214
- default :
221
+ case len (remainingArgs ) == 1 && len (mappings ) == 0 :
222
+ return nil , fmt .Errorf ("all arguments must be valid SRC=DST mappings, or you must specify one SRC argument and one or more DST arguments" )
223
+ }
224
+ return mappings , nil
225
+ }
226
+
227
+ func parseFile (filename string , overlap map [string ]string ) ([]Mapping , error ) {
228
+ var fileMappings []Mapping
229
+ f , err := os .Open (filename )
230
+ if err != nil {
231
+ return nil , err
232
+ }
233
+ defer f .Close ()
234
+ s := bufio .NewScanner (f )
235
+ lineNumber := 0
236
+ for s .Scan () {
237
+ line := s .Text ()
238
+ lineNumber ++
239
+
240
+ // remove comments and whitespace
241
+ if i := strings .Index (line , "#" ); i != - 1 {
242
+ line = line [0 :i ]
243
+ }
244
+ line = strings .TrimSpace (line )
245
+ if len (line ) == 0 {
246
+ continue
247
+ }
248
+
249
+ args := strings .Split (line , " " )
250
+ mappings , err := parseArgs (args , overlap )
251
+ if err != nil {
252
+ return nil , fmt .Errorf ("file %s, line %d: %v" , filename , lineNumber , err )
253
+ }
254
+ fileMappings = append (fileMappings , mappings ... )
255
+ }
256
+ if err := s .Err (); err != nil {
257
+ return nil , err
258
+ }
259
+ return fileMappings , nil
260
+ }
261
+
262
+ func (o * pushOptions ) Complete (args []string ) error {
263
+ overlap := make (map [string ]string )
264
+
265
+ var err error
266
+ o .Mappings , err = parseArgs (args , overlap )
267
+ if err != nil {
268
+ return err
269
+ }
270
+ for _ , filename := range o .Filenames {
271
+ mappings , err := parseFile (filename , overlap )
272
+ if err != nil {
273
+ return err
274
+ }
275
+ o .Mappings = append (o .Mappings , mappings ... )
276
+ }
277
+
278
+ if len (o .Mappings ) == 0 {
215
279
return fmt .Errorf ("you must specify at least one source image to pull and the destination to push to as SRC=DST or SRC DST [DST2 DST3 ...]" )
216
280
}
217
281
@@ -461,7 +525,7 @@ func (o *pushOptions) Run() error {
461
525
}
462
526
}
463
527
464
- if errs := uploadAndTagManifests (ctx , dst , srcManifest , src .ref , toManifests , o .Out ); len (errs ) > 0 {
528
+ if errs := uploadAndTagManifests (ctx , dst , srcManifest , src .ref , toManifests , o .Out , toRepo . Blobs ( ctx ), canonicalTo ); len (errs ) > 0 {
465
529
digestErrs = append (digestErrs , errs ... )
466
530
continue
467
531
}
@@ -660,12 +724,15 @@ func uploadAndTagManifests(
660
724
srcRef imageapi.DockerImageReference ,
661
725
toManifests distribution.ManifestService ,
662
726
out io.Writer ,
727
+ // supports schema2->schema1 downconversion
728
+ blobs distribution.BlobService ,
729
+ ref reference.Named ,
663
730
) []retrieverError {
664
731
var errs []retrieverError
665
732
666
733
// upload and tag the manifest
667
734
for _ , tag := range dst .tags {
668
- toDigest , err := toManifests . Put (ctx , srcManifest , distribution . WithTag ( tag ) )
735
+ toDigest , err := putManifestInCompatibleSchema (ctx , srcManifest , tag , toManifests , blobs , ref )
669
736
if err != nil {
670
737
errs = append (errs , retrieverError {src : srcRef , dst : dst .ref , err : fmt .Errorf ("unable to push manifest to %s: %v" , dst .ref , err )})
671
738
continue
@@ -682,7 +749,7 @@ func uploadAndTagManifests(
682
749
}
683
750
684
751
// this is a pure manifest move, put the manifest by its id
685
- toDigest , err := toManifests . Put (ctx , srcManifest )
752
+ toDigest , err := putManifestInCompatibleSchema (ctx , srcManifest , "latest" , toManifests , blobs , ref )
686
753
if err != nil {
687
754
errs = append (errs , retrieverError {src : srcRef , dst : dst .ref , err : fmt .Errorf ("unable to push manifest to %s: %v" , dst .ref , err )})
688
755
return errs
@@ -696,6 +763,89 @@ func uploadAndTagManifests(
696
763
return errs
697
764
}
698
765
766
+ // TDOO: remove when quay.io switches to v2 schema
767
+ func putManifestInCompatibleSchema (
768
+ ctx apirequest.Context ,
769
+ srcManifest distribution.Manifest ,
770
+ tag string ,
771
+ toManifests distribution.ManifestService ,
772
+ // supports schema2 -> schema1 downconversion
773
+ blobs distribution.BlobService ,
774
+ ref reference.Named ,
775
+ ) (godigest.Digest , error ) {
776
+
777
+ toDigest , err := toManifests .Put (ctx , srcManifest , distribution .WithTag (tag ))
778
+ if err == nil {
779
+ return toDigest , nil
780
+ }
781
+ errs , ok := err .(errcode.Errors )
782
+ if ! ok || len (errs ) == 0 {
783
+ return toDigest , err
784
+ }
785
+ errcode , ok := errs [0 ].(errcode.Error )
786
+ if ! ok || errcode .ErrorCode () != v2 .ErrorCodeManifestInvalid {
787
+ return toDigest , err
788
+ }
789
+ // try downconverting to v2-schema1
790
+ schema2Manifest , ok := srcManifest .(* schema2.DeserializedManifest )
791
+ if ! ok {
792
+ return toDigest , err
793
+ }
794
+ ref , tagErr := reference .WithTag (ref , tag )
795
+ if tagErr != nil {
796
+ return toDigest , err
797
+ }
798
+ schema1Manifest , convertErr := convertToSchema1 (ctx , blobs , schema2Manifest , ref )
799
+ if convertErr != nil {
800
+ return toDigest , err
801
+ }
802
+ return toManifests .Put (ctx , schema1Manifest , distribution .WithTag (tag ))
803
+ }
804
+
805
+ // TDOO: remove when quay.io switches to v2 schema
806
+ func convertToSchema1 (ctx apirequest.Context , blobs distribution.BlobService , schema2Manifest * schema2.DeserializedManifest , ref reference.Named ) (distribution.Manifest , error ) {
807
+ targetDescriptor := schema2Manifest .Target ()
808
+ configJSON , err := blobs .Get (ctx , targetDescriptor .Digest )
809
+ if err != nil {
810
+ return nil , err
811
+ }
812
+ trustKey , err := loadPrivateKey ()
813
+ if err != nil {
814
+ return nil , err
815
+ }
816
+ builder := schema1 .NewConfigManifestBuilder (blobs , trustKey , ref , configJSON )
817
+ for _ , d := range schema2Manifest .Layers {
818
+ if err := builder .AppendReference (d ); err != nil {
819
+ return nil , err
820
+ }
821
+ }
822
+ manifest , err := builder .Build (ctx )
823
+ if err != nil {
824
+ return nil , err
825
+ }
826
+ return manifest , nil
827
+ }
828
+
829
+ var (
830
+ privateKeyLock sync.Mutex
831
+ privateKey libtrust.PrivateKey
832
+ )
833
+
834
+ // TDOO: remove when quay.io switches to v2 schema
835
+ func loadPrivateKey () (libtrust.PrivateKey , error ) {
836
+ privateKeyLock .Lock ()
837
+ defer privateKeyLock .Unlock ()
838
+ if privateKey != nil {
839
+ return privateKey , nil
840
+ }
841
+ trustKey , err := libtrust .GenerateECP256PrivateKey ()
842
+ if err != nil {
843
+ return nil , err
844
+ }
845
+ privateKey = trustKey
846
+ return privateKey , nil
847
+ }
848
+
699
849
type optionFunc func (interface {}) error
700
850
701
851
func (f optionFunc ) Apply (v interface {}) error {
0 commit comments