| package image // import "github.com/docker/docker/api/server/router/image" |
| |
| import ( |
| "context" |
| "encoding/base64" |
| "encoding/json" |
| "net/http" |
| "strconv" |
| "strings" |
| |
| "github.com/containerd/containerd/platforms" |
| "github.com/docker/docker/api/server/httputils" |
| "github.com/docker/docker/api/types" |
| "github.com/docker/docker/api/types/filters" |
| "github.com/docker/docker/api/types/versions" |
| "github.com/docker/docker/errdefs" |
| "github.com/docker/docker/pkg/ioutils" |
| "github.com/docker/docker/pkg/streamformatter" |
| "github.com/docker/docker/pkg/system" |
| "github.com/docker/docker/registry" |
| specs "github.com/opencontainers/image-spec/specs-go/v1" |
| "github.com/pkg/errors" |
| ) |
| |
| // Creates an image from Pull or from Import |
| func (s *imageRouter) postImagesCreate(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| var ( |
| image = r.Form.Get("fromImage") |
| repo = r.Form.Get("repo") |
| tag = r.Form.Get("tag") |
| message = r.Form.Get("message") |
| err error |
| output = ioutils.NewWriteFlusher(w) |
| platform *specs.Platform |
| ) |
| defer output.Close() |
| |
| w.Header().Set("Content-Type", "application/json") |
| |
| version := httputils.VersionFromContext(ctx) |
| if versions.GreaterThanOrEqualTo(version, "1.32") { |
| apiPlatform := r.FormValue("platform") |
| if apiPlatform != "" { |
| sp, err := platforms.Parse(apiPlatform) |
| if err != nil { |
| return err |
| } |
| if err := system.ValidatePlatform(sp); err != nil { |
| return err |
| } |
| platform = &sp |
| } |
| } |
| |
| if err == nil { |
| if image != "" { //pull |
| metaHeaders := map[string][]string{} |
| for k, v := range r.Header { |
| if strings.HasPrefix(k, "X-Meta-") { |
| metaHeaders[k] = v |
| } |
| } |
| |
| authEncoded := r.Header.Get("X-Registry-Auth") |
| authConfig := &types.AuthConfig{} |
| if authEncoded != "" { |
| authJSON := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded)) |
| if err := json.NewDecoder(authJSON).Decode(authConfig); err != nil { |
| // for a pull it is not an error if no auth was given |
| // to increase compatibility with the existing api it is defaulting to be empty |
| authConfig = &types.AuthConfig{} |
| } |
| } |
| err = s.backend.PullImage(ctx, image, tag, platform, metaHeaders, authConfig, output) |
| } else { //import |
| src := r.Form.Get("fromSrc") |
| // 'err' MUST NOT be defined within this block, we need any error |
| // generated from the download to be available to the output |
| // stream processing below |
| os := "" |
| if platform != nil { |
| os = platform.OS |
| } |
| err = s.backend.ImportImage(src, repo, os, tag, message, r.Body, output, r.Form["changes"]) |
| } |
| } |
| if err != nil { |
| if !output.Flushed() { |
| return err |
| } |
| output.Write(streamformatter.FormatError(err)) |
| } |
| |
| return nil |
| } |
| |
| func (s *imageRouter) postImagesPush(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| metaHeaders := map[string][]string{} |
| for k, v := range r.Header { |
| if strings.HasPrefix(k, "X-Meta-") { |
| metaHeaders[k] = v |
| } |
| } |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| authConfig := &types.AuthConfig{} |
| |
| authEncoded := r.Header.Get("X-Registry-Auth") |
| if authEncoded != "" { |
| // the new format is to handle the authConfig as a header |
| authJSON := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded)) |
| if err := json.NewDecoder(authJSON).Decode(authConfig); err != nil { |
| // to increase compatibility to existing api it is defaulting to be empty |
| authConfig = &types.AuthConfig{} |
| } |
| } else { |
| // the old format is supported for compatibility if there was no authConfig header |
| if err := json.NewDecoder(r.Body).Decode(authConfig); err != nil { |
| return errors.Wrap(errdefs.InvalidParameter(err), "Bad parameters and missing X-Registry-Auth") |
| } |
| } |
| |
| image := vars["name"] |
| tag := r.Form.Get("tag") |
| |
| output := ioutils.NewWriteFlusher(w) |
| defer output.Close() |
| |
| w.Header().Set("Content-Type", "application/json") |
| |
| if err := s.backend.PushImage(ctx, image, tag, metaHeaders, authConfig, output); err != nil { |
| if !output.Flushed() { |
| return err |
| } |
| output.Write(streamformatter.FormatError(err)) |
| } |
| return nil |
| } |
| |
| func (s *imageRouter) getImagesGet(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| w.Header().Set("Content-Type", "application/x-tar") |
| |
| output := ioutils.NewWriteFlusher(w) |
| defer output.Close() |
| var names []string |
| if name, ok := vars["name"]; ok { |
| names = []string{name} |
| } else { |
| names = r.Form["names"] |
| } |
| |
| if err := s.backend.ExportImage(names, output); err != nil { |
| if !output.Flushed() { |
| return err |
| } |
| output.Write(streamformatter.FormatError(err)) |
| } |
| return nil |
| } |
| |
| func (s *imageRouter) postImagesLoad(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| quiet := httputils.BoolValueOrDefault(r, "quiet", true) |
| |
| w.Header().Set("Content-Type", "application/json") |
| |
| output := ioutils.NewWriteFlusher(w) |
| defer output.Close() |
| if err := s.backend.LoadImage(r.Body, output, quiet); err != nil { |
| output.Write(streamformatter.FormatError(err)) |
| } |
| return nil |
| } |
| |
| type missingImageError struct{} |
| |
| func (missingImageError) Error() string { |
| return "image name cannot be blank" |
| } |
| |
| func (missingImageError) InvalidParameter() {} |
| |
| func (s *imageRouter) deleteImages(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| name := vars["name"] |
| |
| if strings.TrimSpace(name) == "" { |
| return missingImageError{} |
| } |
| |
| force := httputils.BoolValue(r, "force") |
| prune := !httputils.BoolValue(r, "noprune") |
| |
| list, err := s.backend.ImageDelete(name, force, prune) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, list) |
| } |
| |
| func (s *imageRouter) getImagesByName(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| imageInspect, err := s.backend.LookupImage(vars["name"]) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, imageInspect) |
| } |
| |
| func (s *imageRouter) getImagesJSON(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| imageFilters, err := filters.FromJSON(r.Form.Get("filters")) |
| if err != nil { |
| return err |
| } |
| |
| filterParam := r.Form.Get("filter") |
| // FIXME(vdemeester) This has been deprecated in 1.13, and is target for removal for v17.12 |
| if filterParam != "" { |
| imageFilters.Add("reference", filterParam) |
| } |
| |
| images, err := s.backend.Images(imageFilters, httputils.BoolValue(r, "all"), false) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, images) |
| } |
| |
| func (s *imageRouter) getImagesHistory(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| name := vars["name"] |
| history, err := s.backend.ImageHistory(name) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, history) |
| } |
| |
| func (s *imageRouter) postImagesTag(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| if _, err := s.backend.TagImage(vars["name"], r.Form.Get("repo"), r.Form.Get("tag")); err != nil { |
| return err |
| } |
| w.WriteHeader(http.StatusCreated) |
| return nil |
| } |
| |
| func (s *imageRouter) getImagesSearch(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| var ( |
| config *types.AuthConfig |
| authEncoded = r.Header.Get("X-Registry-Auth") |
| headers = map[string][]string{} |
| ) |
| |
| if authEncoded != "" { |
| authJSON := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded)) |
| if err := json.NewDecoder(authJSON).Decode(&config); err != nil { |
| // for a search it is not an error if no auth was given |
| // to increase compatibility with the existing api it is defaulting to be empty |
| config = &types.AuthConfig{} |
| } |
| } |
| for k, v := range r.Header { |
| if strings.HasPrefix(k, "X-Meta-") { |
| headers[k] = v |
| } |
| } |
| limit := registry.DefaultSearchLimit |
| if r.Form.Get("limit") != "" { |
| limitValue, err := strconv.Atoi(r.Form.Get("limit")) |
| if err != nil { |
| return err |
| } |
| limit = limitValue |
| } |
| query, err := s.backend.SearchRegistryForImages(ctx, r.Form.Get("filters"), r.Form.Get("term"), limit, config, headers) |
| if err != nil { |
| return err |
| } |
| return httputils.WriteJSON(w, http.StatusOK, query.Results) |
| } |
| |
| func (s *imageRouter) postImagesPrune(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| pruneFilters, err := filters.FromJSON(r.Form.Get("filters")) |
| if err != nil { |
| return err |
| } |
| |
| pruneReport, err := s.backend.ImagesPrune(ctx, pruneFilters) |
| if err != nil { |
| return err |
| } |
| return httputils.WriteJSON(w, http.StatusOK, pruneReport) |
| } |