 9edcfcc1cb
			
		
	
	9edcfcc1cb
	
	
	
		
			
			Adds a new platform interface for matching and comparing platforms. This new interface allows both filtering and ordering of platforms to support running multiple platform and choosing the best platform. Signed-off-by: Derek McGowan <derek@mcgstyle.net>
		
			
				
	
	
		
			206 lines
		
	
	
		
			6.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			206 lines
		
	
	
		
			6.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package remotes
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"strings"
 | |
| 	"sync"
 | |
| 
 | |
| 	"github.com/containerd/containerd/content"
 | |
| 	"github.com/containerd/containerd/errdefs"
 | |
| 	"github.com/containerd/containerd/images"
 | |
| 	"github.com/containerd/containerd/log"
 | |
| 	"github.com/containerd/containerd/platforms"
 | |
| 	ocispec "github.com/opencontainers/image-spec/specs-go/v1"
 | |
| 	"github.com/pkg/errors"
 | |
| 	"github.com/sirupsen/logrus"
 | |
| )
 | |
| 
 | |
| // MakeRefKey returns a unique reference for the descriptor. This reference can be
 | |
| // used to lookup ongoing processes related to the descriptor. This function
 | |
| // may look to the context to namespace the reference appropriately.
 | |
| func MakeRefKey(ctx context.Context, desc ocispec.Descriptor) string {
 | |
| 	// TODO(stevvooe): Need better remote key selection here. Should be a
 | |
| 	// product of the context, which may include information about the ongoing
 | |
| 	// fetch process.
 | |
| 	switch desc.MediaType {
 | |
| 	case images.MediaTypeDockerSchema2Manifest, ocispec.MediaTypeImageManifest:
 | |
| 		return "manifest-" + desc.Digest.String()
 | |
| 	case images.MediaTypeDockerSchema2ManifestList, ocispec.MediaTypeImageIndex:
 | |
| 		return "index-" + desc.Digest.String()
 | |
| 	case images.MediaTypeDockerSchema2Layer, images.MediaTypeDockerSchema2LayerGzip,
 | |
| 		images.MediaTypeDockerSchema2LayerForeign, images.MediaTypeDockerSchema2LayerForeignGzip,
 | |
| 		ocispec.MediaTypeImageLayer, ocispec.MediaTypeImageLayerGzip,
 | |
| 		ocispec.MediaTypeImageLayerNonDistributable, ocispec.MediaTypeImageLayerNonDistributableGzip:
 | |
| 		return "layer-" + desc.Digest.String()
 | |
| 	case images.MediaTypeDockerSchema2Config, ocispec.MediaTypeImageConfig:
 | |
| 		return "config-" + desc.Digest.String()
 | |
| 	default:
 | |
| 		log.G(ctx).Warnf("reference for unknown type: %s", desc.MediaType)
 | |
| 		return "unknown-" + desc.Digest.String()
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // FetchHandler returns a handler that will fetch all content into the ingester
 | |
| // discovered in a call to Dispatch. Use with ChildrenHandler to do a full
 | |
| // recursive fetch.
 | |
| func FetchHandler(ingester content.Ingester, fetcher Fetcher) images.HandlerFunc {
 | |
| 	return func(ctx context.Context, desc ocispec.Descriptor) (subdescs []ocispec.Descriptor, err error) {
 | |
| 		ctx = log.WithLogger(ctx, log.G(ctx).WithFields(logrus.Fields{
 | |
| 			"digest":    desc.Digest,
 | |
| 			"mediatype": desc.MediaType,
 | |
| 			"size":      desc.Size,
 | |
| 		}))
 | |
| 
 | |
| 		switch desc.MediaType {
 | |
| 		case images.MediaTypeDockerSchema1Manifest:
 | |
| 			return nil, fmt.Errorf("%v not supported", desc.MediaType)
 | |
| 		default:
 | |
| 			err := fetch(ctx, ingester, fetcher, desc)
 | |
| 			return nil, err
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func fetch(ctx context.Context, ingester content.Ingester, fetcher Fetcher, desc ocispec.Descriptor) error {
 | |
| 	log.G(ctx).Debug("fetch")
 | |
| 
 | |
| 	cw, err := content.OpenWriter(ctx, ingester, content.WithRef(MakeRefKey(ctx, desc)), content.WithDescriptor(desc))
 | |
| 	if err != nil {
 | |
| 		if errdefs.IsAlreadyExists(err) {
 | |
| 			return nil
 | |
| 		}
 | |
| 		return err
 | |
| 	}
 | |
| 	defer cw.Close()
 | |
| 
 | |
| 	ws, err := cw.Status()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if ws.Offset == desc.Size {
 | |
| 		// If writer is already complete, commit and return
 | |
| 		err := cw.Commit(ctx, desc.Size, desc.Digest)
 | |
| 		if err != nil && !errdefs.IsAlreadyExists(err) {
 | |
| 			return errors.Wrapf(err, "failed commit on ref %q", ws.Ref)
 | |
| 		}
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	rc, err := fetcher.Fetch(ctx, desc)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer rc.Close()
 | |
| 
 | |
| 	return content.Copy(ctx, cw, rc, desc.Size, desc.Digest)
 | |
| }
 | |
| 
 | |
| // PushHandler returns a handler that will push all content from the provider
 | |
| // using a writer from the pusher.
 | |
| func PushHandler(pusher Pusher, provider content.Provider) images.HandlerFunc {
 | |
| 	return func(ctx context.Context, desc ocispec.Descriptor) ([]ocispec.Descriptor, error) {
 | |
| 		ctx = log.WithLogger(ctx, log.G(ctx).WithFields(logrus.Fields{
 | |
| 			"digest":    desc.Digest,
 | |
| 			"mediatype": desc.MediaType,
 | |
| 			"size":      desc.Size,
 | |
| 		}))
 | |
| 
 | |
| 		err := push(ctx, provider, pusher, desc)
 | |
| 		return nil, err
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func push(ctx context.Context, provider content.Provider, pusher Pusher, desc ocispec.Descriptor) error {
 | |
| 	log.G(ctx).Debug("push")
 | |
| 
 | |
| 	cw, err := pusher.Push(ctx, desc)
 | |
| 	if err != nil {
 | |
| 		if !errdefs.IsAlreadyExists(err) {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		return nil
 | |
| 	}
 | |
| 	defer cw.Close()
 | |
| 
 | |
| 	ra, err := provider.ReaderAt(ctx, desc)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer ra.Close()
 | |
| 
 | |
| 	rd := io.NewSectionReader(ra, 0, desc.Size)
 | |
| 	return content.Copy(ctx, cw, rd, desc.Size, desc.Digest)
 | |
| }
 | |
| 
 | |
| // PushContent pushes content specified by the descriptor from the provider.
 | |
| //
 | |
| // Base handlers can be provided which will be called before any push specific
 | |
| // handlers.
 | |
| func PushContent(ctx context.Context, pusher Pusher, desc ocispec.Descriptor, provider content.Provider, platform platforms.MatchComparer, baseHandlers ...images.Handler) error {
 | |
| 	var m sync.Mutex
 | |
| 	manifestStack := []ocispec.Descriptor{}
 | |
| 
 | |
| 	filterHandler := images.HandlerFunc(func(ctx context.Context, desc ocispec.Descriptor) ([]ocispec.Descriptor, error) {
 | |
| 		switch desc.MediaType {
 | |
| 		case images.MediaTypeDockerSchema2Manifest, ocispec.MediaTypeImageManifest,
 | |
| 			images.MediaTypeDockerSchema2ManifestList, ocispec.MediaTypeImageIndex:
 | |
| 			m.Lock()
 | |
| 			manifestStack = append(manifestStack, desc)
 | |
| 			m.Unlock()
 | |
| 			return nil, images.ErrStopHandler
 | |
| 		default:
 | |
| 			return nil, nil
 | |
| 		}
 | |
| 	})
 | |
| 
 | |
| 	pushHandler := PushHandler(pusher, provider)
 | |
| 
 | |
| 	handlers := append(baseHandlers,
 | |
| 		images.FilterPlatforms(images.ChildrenHandler(provider), platform),
 | |
| 		filterHandler,
 | |
| 		pushHandler,
 | |
| 	)
 | |
| 
 | |
| 	if err := images.Dispatch(ctx, images.Handlers(handlers...), desc); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// Iterate in reverse order as seen, parent always uploaded after child
 | |
| 	for i := len(manifestStack) - 1; i >= 0; i-- {
 | |
| 		_, err := pushHandler(ctx, manifestStack[i])
 | |
| 		if err != nil {
 | |
| 			// TODO(estesp): until we have a more complete method for index push, we need to report
 | |
| 			// missing dependencies in an index/manifest list by sensing the "400 Bad Request"
 | |
| 			// as a marker for this problem
 | |
| 			if (manifestStack[i].MediaType == ocispec.MediaTypeImageIndex ||
 | |
| 				manifestStack[i].MediaType == images.MediaTypeDockerSchema2ManifestList) &&
 | |
| 				errors.Cause(err) != nil && strings.Contains(errors.Cause(err).Error(), "400 Bad Request") {
 | |
| 				return errors.Wrap(err, "manifest list/index references to blobs and/or manifests are missing in your target registry")
 | |
| 			}
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 |