
Changes: https://github.com/containerd/typeurl/compare/7f6e6d160d67...v2.1.0 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
294 lines
7.4 KiB
Go
294 lines
7.4 KiB
Go
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package image
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"strings"
|
|
"sync"
|
|
|
|
transfertypes "github.com/containerd/containerd/api/types/transfer"
|
|
"github.com/containerd/containerd/log"
|
|
"github.com/containerd/containerd/pkg/streaming"
|
|
"github.com/containerd/containerd/pkg/transfer"
|
|
"github.com/containerd/containerd/pkg/transfer/plugins"
|
|
tstreaming "github.com/containerd/containerd/pkg/transfer/streaming"
|
|
"github.com/containerd/containerd/remotes"
|
|
"github.com/containerd/containerd/remotes/docker"
|
|
"github.com/containerd/typeurl/v2"
|
|
ocispec "github.com/opencontainers/image-spec/specs-go/v1"
|
|
)
|
|
|
|
func init() {
|
|
// TODO: Move this to separate package?
|
|
plugins.Register(&transfertypes.OCIRegistry{}, &OCIRegistry{})
|
|
}
|
|
|
|
// Initialize with hosts, authorizer callback, and headers
|
|
func NewOCIRegistry(ref string, headers http.Header, creds CredentialHelper) *OCIRegistry {
|
|
// Create an authorizer
|
|
var aopts []docker.AuthorizerOpt
|
|
if creds != nil {
|
|
// TODO: Support bearer
|
|
aopts = append(aopts, docker.WithAuthCreds(func(host string) (string, string, error) {
|
|
c, err := creds.GetCredentials(context.Background(), ref, host)
|
|
if err != nil {
|
|
return "", "", err
|
|
}
|
|
|
|
return c.Username, c.Secret, nil
|
|
}))
|
|
}
|
|
|
|
ropts := []docker.RegistryOpt{
|
|
docker.WithAuthorizer(docker.NewDockerAuthorizer(aopts...)),
|
|
}
|
|
|
|
// TODO: Apply local configuration, maybe dynamically create resolver when requested
|
|
resolver := docker.NewResolver(docker.ResolverOptions{
|
|
Hosts: docker.ConfigureDefaultRegistries(ropts...),
|
|
Headers: headers,
|
|
})
|
|
return &OCIRegistry{
|
|
reference: ref,
|
|
headers: headers,
|
|
creds: creds,
|
|
resolver: resolver,
|
|
}
|
|
}
|
|
|
|
// From stream
|
|
type CredentialHelper interface {
|
|
GetCredentials(ctx context.Context, ref, host string) (Credentials, error)
|
|
}
|
|
|
|
type Credentials struct {
|
|
Host string
|
|
Username string
|
|
Secret string
|
|
Header string
|
|
}
|
|
|
|
// OCI
|
|
type OCIRegistry struct {
|
|
reference string
|
|
|
|
headers http.Header
|
|
creds CredentialHelper
|
|
|
|
resolver remotes.Resolver
|
|
|
|
// This could be an interface which returns resolver?
|
|
// Resolver could also be a plug-able interface, to call out to a program to fetch?
|
|
}
|
|
|
|
func (r *OCIRegistry) String() string {
|
|
return fmt.Sprintf("OCI Registry (%s)", r.reference)
|
|
}
|
|
|
|
func (r *OCIRegistry) Image() string {
|
|
return r.reference
|
|
}
|
|
|
|
func (r *OCIRegistry) Resolve(ctx context.Context) (name string, desc ocispec.Descriptor, err error) {
|
|
return r.resolver.Resolve(ctx, r.reference)
|
|
}
|
|
|
|
func (r *OCIRegistry) Fetcher(ctx context.Context, ref string) (transfer.Fetcher, error) {
|
|
return r.resolver.Fetcher(ctx, ref)
|
|
}
|
|
|
|
func (r *OCIRegistry) Pusher(ctx context.Context, desc ocispec.Descriptor) (transfer.Pusher, error) {
|
|
var ref = r.reference
|
|
// Annotate ref with digest to push only push tag for single digest
|
|
if !strings.Contains(ref, "@") {
|
|
ref = ref + "@" + desc.Digest.String()
|
|
}
|
|
return r.resolver.Pusher(ctx, ref)
|
|
}
|
|
|
|
func (r *OCIRegistry) MarshalAny(ctx context.Context, sm streaming.StreamCreator) (typeurl.Any, error) {
|
|
res := &transfertypes.RegistryResolver{}
|
|
if r.headers != nil {
|
|
res.Headers = map[string]string{}
|
|
for k := range r.headers {
|
|
res.Headers[k] = r.headers.Get(k)
|
|
}
|
|
}
|
|
if r.creds != nil {
|
|
sid := tstreaming.GenerateID("creds")
|
|
stream, err := sm.Create(ctx, sid)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
go func() {
|
|
// Check for context cancellation as well
|
|
for {
|
|
select {
|
|
case <-ctx.Done():
|
|
return
|
|
default:
|
|
}
|
|
|
|
req, err := stream.Recv()
|
|
if err != nil {
|
|
// If not EOF, log error
|
|
return
|
|
}
|
|
|
|
var s transfertypes.AuthRequest
|
|
if err := typeurl.UnmarshalTo(req, &s); err != nil {
|
|
log.G(ctx).WithError(err).Error("failed to unmarshal credential request")
|
|
continue
|
|
}
|
|
creds, err := r.creds.GetCredentials(ctx, s.Reference, s.Host)
|
|
if err != nil {
|
|
log.G(ctx).WithError(err).Error("failed to get credentials")
|
|
continue
|
|
}
|
|
var resp transfertypes.AuthResponse
|
|
if creds.Header != "" {
|
|
resp.AuthType = transfertypes.AuthType_HEADER
|
|
resp.Secret = creds.Header
|
|
} else if creds.Username != "" {
|
|
resp.AuthType = transfertypes.AuthType_CREDENTIALS
|
|
resp.Username = creds.Username
|
|
resp.Secret = creds.Secret
|
|
} else {
|
|
resp.AuthType = transfertypes.AuthType_REFRESH
|
|
resp.Secret = creds.Secret
|
|
}
|
|
|
|
a, err := typeurl.MarshalAny(&resp)
|
|
if err != nil {
|
|
log.G(ctx).WithError(err).Error("failed to marshal credential response")
|
|
continue
|
|
}
|
|
|
|
if err := stream.Send(a); err != nil {
|
|
if !errors.Is(err, io.EOF) {
|
|
log.G(ctx).WithError(err).Error("unexpected send failure")
|
|
}
|
|
return
|
|
}
|
|
}
|
|
|
|
}()
|
|
res.AuthStream = sid
|
|
}
|
|
s := &transfertypes.OCIRegistry{
|
|
Reference: r.reference,
|
|
Resolver: res,
|
|
}
|
|
|
|
return typeurl.MarshalAny(s)
|
|
}
|
|
|
|
func (r *OCIRegistry) UnmarshalAny(ctx context.Context, sm streaming.StreamGetter, a typeurl.Any) error {
|
|
var (
|
|
s transfertypes.OCIRegistry
|
|
ropts []docker.RegistryOpt
|
|
aopts []docker.AuthorizerOpt
|
|
)
|
|
if err := typeurl.UnmarshalTo(a, &s); err != nil {
|
|
return err
|
|
}
|
|
|
|
if s.Resolver != nil {
|
|
if sid := s.Resolver.AuthStream; sid != "" {
|
|
stream, err := sm.Get(ctx, sid)
|
|
if err != nil {
|
|
log.G(ctx).WithError(err).WithField("stream", sid).Debug("failed to get auth stream")
|
|
return err
|
|
}
|
|
r.creds = &credCallback{
|
|
stream: stream,
|
|
}
|
|
aopts = append(aopts, docker.WithAuthCreds(func(host string) (string, string, error) {
|
|
c, err := r.creds.GetCredentials(context.Background(), s.Reference, host)
|
|
if err != nil {
|
|
return "", "", err
|
|
}
|
|
|
|
return c.Username, c.Secret, nil
|
|
}))
|
|
}
|
|
r.headers = http.Header{}
|
|
for k, v := range s.Resolver.Headers {
|
|
r.headers.Add(k, v)
|
|
}
|
|
}
|
|
authorizer := docker.NewDockerAuthorizer(aopts...)
|
|
ropts = append(ropts, docker.WithAuthorizer(authorizer))
|
|
|
|
r.reference = s.Reference
|
|
r.resolver = docker.NewResolver(docker.ResolverOptions{
|
|
Hosts: docker.ConfigureDefaultRegistries(ropts...),
|
|
Headers: r.headers,
|
|
})
|
|
|
|
return nil
|
|
}
|
|
|
|
type credCallback struct {
|
|
sync.Mutex
|
|
stream streaming.Stream
|
|
}
|
|
|
|
func (cc *credCallback) GetCredentials(ctx context.Context, ref, host string) (Credentials, error) {
|
|
cc.Lock()
|
|
defer cc.Unlock()
|
|
|
|
ar := &transfertypes.AuthRequest{
|
|
Host: host,
|
|
Reference: ref,
|
|
}
|
|
any, err := typeurl.MarshalAny(ar)
|
|
if err != nil {
|
|
return Credentials{}, err
|
|
}
|
|
if err := cc.stream.Send(any); err != nil {
|
|
return Credentials{}, err
|
|
}
|
|
resp, err := cc.stream.Recv()
|
|
if err != nil {
|
|
return Credentials{}, err
|
|
}
|
|
var s transfertypes.AuthResponse
|
|
if err := typeurl.UnmarshalTo(resp, &s); err != nil {
|
|
return Credentials{}, err
|
|
}
|
|
creds := Credentials{
|
|
Host: host,
|
|
}
|
|
switch s.AuthType {
|
|
case transfertypes.AuthType_CREDENTIALS:
|
|
creds.Username = s.Username
|
|
creds.Secret = s.Secret
|
|
case transfertypes.AuthType_REFRESH:
|
|
creds.Secret = s.Secret
|
|
case transfertypes.AuthType_HEADER:
|
|
creds.Header = s.Secret
|
|
}
|
|
|
|
return creds, nil
|
|
}
|