Skip to content

Commit e41e7ef

Browse files
Convert down to schema1 for registries that don't support it
Enable short term quay.io support (which doesn't support schema1) by down converting when we get an invalid manifest error. Also support arguments from file.
1 parent ca259b6 commit e41e7ef

File tree

4 files changed

+177
-20
lines changed

4 files changed

+177
-20
lines changed

contrib/completions/bash/oc

+3
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

contrib/completions/zsh/oc

+3
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

hack/import-restrictions.json

+1
Original file line numberDiff line numberDiff line change
@@ -395,6 +395,7 @@
395395
"vendor/github.com/docker/docker",
396396
"vendor/github.com/docker/go-connections",
397397
"vendor/github.com/docker/go-units",
398+
"vendor/github.com/docker/libtrust",
398399
"vendor/github.com/evanphx/json-patch",
399400
"vendor/github.com/fsnotify/fsnotify",
400401
"vendor/github.com/fsouza/go-dockerclient",

pkg/oc/cli/cmd/image/mirror/mirror.go

+170-20
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,26 @@
11
package mirror
22

33
import (
4+
"bufio"
45
"fmt"
56
"io"
7+
"os"
68
"regexp"
79
"strings"
10+
"sync"
811

912
"github.com/docker/distribution"
1013
"github.com/docker/distribution/manifest/manifestlist"
14+
"github.com/docker/distribution/manifest/schema1"
1115
"github.com/docker/distribution/manifest/schema2"
1216
"github.com/docker/distribution/reference"
17+
"github.com/docker/distribution/registry/api/errcode"
18+
"github.com/docker/distribution/registry/api/v2"
1319
"github.com/docker/distribution/registry/client"
1420
"github.com/docker/distribution/registry/client/auth"
21+
1522
units "github.com/docker/go-units"
23+
"github.com/docker/libtrust"
1624
"github.com/golang/glog"
1725
godigest "github.com/opencontainers/go-digest"
1826
"github.com/spf13/cobra"
@@ -89,6 +97,8 @@ type Mapping struct {
8997
type pushOptions struct {
9098
Out, ErrOut io.Writer
9199

100+
Filenames []string
101+
92102
Mappings []Mapping
93103
OSFilter *regexp.Regexp
94104

@@ -130,6 +140,7 @@ func NewCmdMirrorImage(name string, out, errOut io.Writer) *cobra.Command {
130140
flag.StringVar(&o.FilterByOS, "filter-by-os", o.FilterByOS, "A regular expression to control which images are mirrored. Images will be passed as '<platform>/<architecture>[/<variant>]'.")
131141
flag.BoolVar(&o.Force, "force", o.Force, "If true, attempt to write all contents.")
132142
flag.StringSliceVar(&o.AttemptS3BucketCopy, "s3-source-bucket", o.AttemptS3BucketCopy, "A list of bucket/path locations on S3 that may contain already uploaded blobs. Add [store] to the end to use the Docker registry path convention.")
143+
flag.StringSliceVarP(&o.Filenames, "filename", "f", o.Filenames, "One or more files to read SRC=DST or SRC DST [DST ...] mappings from.")
133144

134145
return cmd
135146
}
@@ -162,56 +173,109 @@ func parseDestination(ref string) (imageapi.DockerImageReference, DestinationTyp
162173
return dst, dstType, nil
163174
}
164175

165-
func (o *pushOptions) Complete(args []string) error {
176+
func parseArgs(args []string, overlap map[string]string) ([]Mapping, error) {
166177
var remainingArgs []string
167-
overlap := make(map[string]string)
178+
var mappings []Mapping
168179
for _, s := range args {
169180
parts := strings.SplitN(s, "=", 2)
170181
if len(parts) != 2 {
171182
remainingArgs = append(remainingArgs, s)
172183
continue
173184
}
174185
if len(parts[0]) == 0 || len(parts[1]) == 0 {
175-
return fmt.Errorf("all arguments must be valid SRC=DST mappings")
186+
return nil, fmt.Errorf("all arguments must be valid SRC=DST mappings")
176187
}
177188
src, err := parseSource(parts[0])
178189
if err != nil {
179-
return err
190+
return nil, err
180191
}
181192
dst, dstType, err := parseDestination(parts[1])
182193
if err != nil {
183-
return err
194+
return nil, err
184195
}
185196
if _, ok := overlap[dst.String()]; ok {
186-
return fmt.Errorf("each destination tag may only be specified once: %s", dst.String())
197+
return nil, fmt.Errorf("each destination tag may only be specified once: %s", dst.String())
187198
}
188199
overlap[dst.String()] = src.String()
189200

190-
o.Mappings = append(o.Mappings, Mapping{Source: src, Destination: dst, Type: dstType})
201+
mappings = append(mappings, Mapping{Source: src, Destination: dst, Type: dstType})
191202
}
192203

193204
switch {
194-
case len(remainingArgs) == 0 && len(o.Mappings) > 0:
195-
// user has input arguments
196-
case len(remainingArgs) > 1 && len(o.Mappings) == 0:
205+
case len(remainingArgs) > 1 && len(mappings) == 0:
197206
src, err := parseSource(remainingArgs[0])
198207
if err != nil {
199-
return err
208+
return nil, err
200209
}
201210
for i := 1; i < len(remainingArgs); i++ {
202211
dst, dstType, err := parseDestination(remainingArgs[i])
203212
if err != nil {
204-
return err
213+
return nil, err
205214
}
206215
if _, ok := overlap[dst.String()]; ok {
207-
return fmt.Errorf("each destination tag may only be specified once: %s", dst.String())
216+
return nil, fmt.Errorf("each destination tag may only be specified once: %s", dst.String())
208217
}
209218
overlap[dst.String()] = src.String()
210-
o.Mappings = append(o.Mappings, Mapping{Source: src, Destination: dst, Type: dstType})
219+
mappings = append(mappings, Mapping{Source: src, Destination: dst, Type: dstType})
211220
}
212-
case len(remainingArgs) == 1 && len(o.Mappings) == 0:
213-
return fmt.Errorf("all arguments must be valid SRC=DST mappings, or you must specify one SRC argument and one or more DST arguments")
214-
default:
221+
case len(remainingArgs) == 1 && len(mappings) == 0:
222+
return nil, fmt.Errorf("all arguments must be valid SRC=DST mappings, or you must specify one SRC argument and one or more DST arguments")
223+
}
224+
return mappings, nil
225+
}
226+
227+
func parseFile(filename string, overlap map[string]string) ([]Mapping, error) {
228+
var fileMappings []Mapping
229+
f, err := os.Open(filename)
230+
if err != nil {
231+
return nil, err
232+
}
233+
defer f.Close()
234+
s := bufio.NewScanner(f)
235+
lineNumber := 0
236+
for s.Scan() {
237+
line := s.Text()
238+
lineNumber++
239+
240+
// remove comments and whitespace
241+
if i := strings.Index(line, "#"); i != -1 {
242+
line = line[0:i]
243+
}
244+
line = strings.TrimSpace(line)
245+
if len(line) == 0 {
246+
continue
247+
}
248+
249+
args := strings.Split(line, " ")
250+
mappings, err := parseArgs(args, overlap)
251+
if err != nil {
252+
return nil, fmt.Errorf("file %s, line %d: %v", filename, lineNumber, err)
253+
}
254+
fileMappings = append(fileMappings, mappings...)
255+
}
256+
if err := s.Err(); err != nil {
257+
return nil, err
258+
}
259+
return fileMappings, nil
260+
}
261+
262+
func (o *pushOptions) Complete(args []string) error {
263+
overlap := make(map[string]string)
264+
265+
var err error
266+
o.Mappings, err = parseArgs(args, overlap)
267+
if err != nil {
268+
return err
269+
}
270+
for _, filename := range o.Filenames {
271+
mappings, err := parseFile(filename, overlap)
272+
if err != nil {
273+
return err
274+
}
275+
o.Mappings = append(o.Mappings, mappings...)
276+
}
277+
278+
if len(o.Mappings) == 0 {
215279
return fmt.Errorf("you must specify at least one source image to pull and the destination to push to as SRC=DST or SRC DST [DST2 DST3 ...]")
216280
}
217281

@@ -461,7 +525,7 @@ func (o *pushOptions) Run() error {
461525
}
462526
}
463527

464-
if errs := uploadAndTagManifests(ctx, dst, srcManifest, src.ref, toManifests, o.Out); len(errs) > 0 {
528+
if errs := uploadAndTagManifests(ctx, dst, srcManifest, src.ref, toManifests, o.Out, toRepo.Blobs(ctx), canonicalTo); len(errs) > 0 {
465529
digestErrs = append(digestErrs, errs...)
466530
continue
467531
}
@@ -660,12 +724,15 @@ func uploadAndTagManifests(
660724
srcRef imageapi.DockerImageReference,
661725
toManifests distribution.ManifestService,
662726
out io.Writer,
727+
// supports schema2->schema1 downconversion
728+
blobs distribution.BlobService,
729+
ref reference.Named,
663730
) []retrieverError {
664731
var errs []retrieverError
665732

666733
// upload and tag the manifest
667734
for _, tag := range dst.tags {
668-
toDigest, err := toManifests.Put(ctx, srcManifest, distribution.WithTag(tag))
735+
toDigest, err := putManifestInCompatibleSchema(ctx, srcManifest, tag, toManifests, blobs, ref)
669736
if err != nil {
670737
errs = append(errs, retrieverError{src: srcRef, dst: dst.ref, err: fmt.Errorf("unable to push manifest to %s: %v", dst.ref, err)})
671738
continue
@@ -682,7 +749,7 @@ func uploadAndTagManifests(
682749
}
683750

684751
// this is a pure manifest move, put the manifest by its id
685-
toDigest, err := toManifests.Put(ctx, srcManifest)
752+
toDigest, err := putManifestInCompatibleSchema(ctx, srcManifest, "latest", toManifests, blobs, ref)
686753
if err != nil {
687754
errs = append(errs, retrieverError{src: srcRef, dst: dst.ref, err: fmt.Errorf("unable to push manifest to %s: %v", dst.ref, err)})
688755
return errs
@@ -696,6 +763,89 @@ func uploadAndTagManifests(
696763
return errs
697764
}
698765

766+
// TDOO: remove when quay.io switches to v2 schema
767+
func putManifestInCompatibleSchema(
768+
ctx apirequest.Context,
769+
srcManifest distribution.Manifest,
770+
tag string,
771+
toManifests distribution.ManifestService,
772+
// supports schema2 -> schema1 downconversion
773+
blobs distribution.BlobService,
774+
ref reference.Named,
775+
) (godigest.Digest, error) {
776+
777+
toDigest, err := toManifests.Put(ctx, srcManifest, distribution.WithTag(tag))
778+
if err == nil {
779+
return toDigest, nil
780+
}
781+
errs, ok := err.(errcode.Errors)
782+
if !ok || len(errs) == 0 {
783+
return toDigest, err
784+
}
785+
errcode, ok := errs[0].(errcode.Error)
786+
if !ok || errcode.ErrorCode() != v2.ErrorCodeManifestInvalid {
787+
return toDigest, err
788+
}
789+
// try downconverting to v2-schema1
790+
schema2Manifest, ok := srcManifest.(*schema2.DeserializedManifest)
791+
if !ok {
792+
return toDigest, err
793+
}
794+
ref, tagErr := reference.WithTag(ref, tag)
795+
if tagErr != nil {
796+
return toDigest, err
797+
}
798+
schema1Manifest, convertErr := convertToSchema1(ctx, blobs, schema2Manifest, ref)
799+
if convertErr != nil {
800+
return toDigest, err
801+
}
802+
return toManifests.Put(ctx, schema1Manifest, distribution.WithTag(tag))
803+
}
804+
805+
// TDOO: remove when quay.io switches to v2 schema
806+
func convertToSchema1(ctx apirequest.Context, blobs distribution.BlobService, schema2Manifest *schema2.DeserializedManifest, ref reference.Named) (distribution.Manifest, error) {
807+
targetDescriptor := schema2Manifest.Target()
808+
configJSON, err := blobs.Get(ctx, targetDescriptor.Digest)
809+
if err != nil {
810+
return nil, err
811+
}
812+
trustKey, err := loadPrivateKey()
813+
if err != nil {
814+
return nil, err
815+
}
816+
builder := schema1.NewConfigManifestBuilder(blobs, trustKey, ref, configJSON)
817+
for _, d := range schema2Manifest.Layers {
818+
if err := builder.AppendReference(d); err != nil {
819+
return nil, err
820+
}
821+
}
822+
manifest, err := builder.Build(ctx)
823+
if err != nil {
824+
return nil, err
825+
}
826+
return manifest, nil
827+
}
828+
829+
var (
830+
privateKeyLock sync.Mutex
831+
privateKey libtrust.PrivateKey
832+
)
833+
834+
// TDOO: remove when quay.io switches to v2 schema
835+
func loadPrivateKey() (libtrust.PrivateKey, error) {
836+
privateKeyLock.Lock()
837+
defer privateKeyLock.Unlock()
838+
if privateKey != nil {
839+
return privateKey, nil
840+
}
841+
trustKey, err := libtrust.GenerateECP256PrivateKey()
842+
if err != nil {
843+
return nil, err
844+
}
845+
privateKey = trustKey
846+
return privateKey, nil
847+
}
848+
699849
type optionFunc func(interface{}) error
700850

701851
func (f optionFunc) Apply(v interface{}) error {

0 commit comments

Comments
 (0)