| package local |
| |
| import ( |
| "encoding/base64" |
| "encoding/json" |
| "errors" |
| "fmt" |
| "io" |
| "net/http" |
| "strings" |
| |
| "github.com/docker/distribution/digest" |
| "github.com/docker/docker/api/server/httputils" |
| "github.com/docker/docker/builder/dockerfile" |
| derr "github.com/docker/docker/errors" |
| "github.com/docker/docker/pkg/ioutils" |
| "github.com/docker/docker/pkg/streamformatter" |
| "github.com/docker/docker/reference" |
| "github.com/docker/docker/runconfig" |
| "github.com/docker/engine-api/types" |
| "github.com/docker/engine-api/types/container" |
| "golang.org/x/net/context" |
| ) |
| |
| func (s *router) postCommit(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| if err := httputils.CheckForJSON(r); err != nil { |
| return err |
| } |
| |
| cname := r.Form.Get("container") |
| |
| pause := httputils.BoolValue(r, "pause") |
| version := httputils.VersionFromContext(ctx) |
| if r.FormValue("pause") == "" && version.GreaterThanOrEqualTo("1.13") { |
| pause = true |
| } |
| |
| c, _, _, err := runconfig.DecodeContainerConfig(r.Body) |
| if err != nil && err != io.EOF { //Do not fail if body is empty. |
| return err |
| } |
| if c == nil { |
| c = &container.Config{} |
| } |
| |
| if !s.daemon.Exists(cname) { |
| return derr.ErrorCodeNoSuchContainer.WithArgs(cname) |
| } |
| |
| newConfig, err := dockerfile.BuildFromConfig(c, r.Form["changes"]) |
| if err != nil { |
| return err |
| } |
| |
| commitCfg := &types.ContainerCommitConfig{ |
| Pause: pause, |
| Repo: r.Form.Get("repo"), |
| Tag: r.Form.Get("tag"), |
| Author: r.Form.Get("author"), |
| Comment: r.Form.Get("comment"), |
| Config: newConfig, |
| MergeConfigs: true, |
| } |
| |
| imgID, err := s.daemon.Commit(cname, commitCfg) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusCreated, &types.ContainerCommitResponse{ |
| ID: string(imgID), |
| }) |
| } |
| |
| // Creates an image from Pull or from Import |
| func (s *router) postImagesCreate(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| var ( |
| image = r.Form.Get("fromImage") |
| repo = r.Form.Get("repo") |
| tag = r.Form.Get("tag") |
| message = r.Form.Get("message") |
| ) |
| authEncoded := r.Header.Get("X-Registry-Auth") |
| authConfig := &types.AuthConfig{} |
| if authEncoded != "" { |
| authJSON := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded)) |
| if err := json.NewDecoder(authJSON).Decode(authConfig); err != nil { |
| // for a pull it is not an error if no auth was given |
| // to increase compatibility with the existing api it is defaulting to be empty |
| authConfig = &types.AuthConfig{} |
| } |
| } |
| |
| var ( |
| err error |
| output = ioutils.NewWriteFlusher(w) |
| ) |
| defer output.Close() |
| |
| w.Header().Set("Content-Type", "application/json") |
| |
| if image != "" { //pull |
| // Special case: "pull -a" may send an image name with a |
| // trailing :. This is ugly, but let's not break API |
| // compatibility. |
| image = strings.TrimSuffix(image, ":") |
| |
| var ref reference.Named |
| ref, err = reference.ParseNamed(image) |
| if err == nil { |
| if tag != "" { |
| // The "tag" could actually be a digest. |
| var dgst digest.Digest |
| dgst, err = digest.ParseDigest(tag) |
| if err == nil { |
| ref, err = reference.WithDigest(ref, dgst) |
| } else { |
| ref, err = reference.WithTag(ref, tag) |
| } |
| } |
| if err == nil { |
| metaHeaders := map[string][]string{} |
| for k, v := range r.Header { |
| if strings.HasPrefix(k, "X-Meta-") { |
| metaHeaders[k] = v |
| } |
| } |
| |
| err = s.daemon.PullImage(ref, metaHeaders, authConfig, output) |
| } |
| } |
| } else { //import |
| var newRef reference.Named |
| if repo != "" { |
| var err error |
| newRef, err = reference.ParseNamed(repo) |
| if err != nil { |
| return err |
| } |
| |
| if _, isCanonical := newRef.(reference.Canonical); isCanonical { |
| return errors.New("cannot import digest reference") |
| } |
| |
| if tag != "" { |
| newRef, err = reference.WithTag(newRef, tag) |
| if err != nil { |
| return err |
| } |
| } |
| } |
| |
| src := r.Form.Get("fromSrc") |
| |
| // 'err' MUST NOT be defined within this block, we need any error |
| // generated from the download to be available to the output |
| // stream processing below |
| var newConfig *container.Config |
| newConfig, err = dockerfile.BuildFromConfig(&container.Config{}, r.Form["changes"]) |
| if err != nil { |
| return err |
| } |
| |
| err = s.daemon.ImportImage(src, newRef, message, r.Body, output, newConfig) |
| } |
| if err != nil { |
| if !output.Flushed() { |
| return err |
| } |
| sf := streamformatter.NewJSONStreamFormatter() |
| output.Write(sf.FormatError(err)) |
| } |
| |
| return nil |
| } |
| |
| func (s *router) postImagesPush(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| metaHeaders := map[string][]string{} |
| for k, v := range r.Header { |
| if strings.HasPrefix(k, "X-Meta-") { |
| metaHeaders[k] = v |
| } |
| } |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| authConfig := &types.AuthConfig{} |
| |
| authEncoded := r.Header.Get("X-Registry-Auth") |
| if authEncoded != "" { |
| // the new format is to handle the authConfig as a header |
| authJSON := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded)) |
| if err := json.NewDecoder(authJSON).Decode(authConfig); err != nil { |
| // to increase compatibility to existing api it is defaulting to be empty |
| authConfig = &types.AuthConfig{} |
| } |
| } else { |
| // the old format is supported for compatibility if there was no authConfig header |
| if err := json.NewDecoder(r.Body).Decode(authConfig); err != nil { |
| return fmt.Errorf("Bad parameters and missing X-Registry-Auth: %v", err) |
| } |
| } |
| |
| ref, err := reference.ParseNamed(vars["name"]) |
| if err != nil { |
| return err |
| } |
| tag := r.Form.Get("tag") |
| if tag != "" { |
| // Push by digest is not supported, so only tags are supported. |
| ref, err = reference.WithTag(ref, tag) |
| if err != nil { |
| return err |
| } |
| } |
| |
| output := ioutils.NewWriteFlusher(w) |
| defer output.Close() |
| |
| w.Header().Set("Content-Type", "application/json") |
| |
| if err := s.daemon.PushImage(ref, metaHeaders, authConfig, output); err != nil { |
| if !output.Flushed() { |
| return err |
| } |
| sf := streamformatter.NewJSONStreamFormatter() |
| output.Write(sf.FormatError(err)) |
| } |
| return nil |
| } |
| |
| func (s *router) getImagesGet(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| w.Header().Set("Content-Type", "application/x-tar") |
| |
| output := ioutils.NewWriteFlusher(w) |
| defer output.Close() |
| var names []string |
| if name, ok := vars["name"]; ok { |
| names = []string{name} |
| } else { |
| names = r.Form["names"] |
| } |
| |
| if err := s.daemon.ExportImage(names, output); err != nil { |
| if !output.Flushed() { |
| return err |
| } |
| sf := streamformatter.NewJSONStreamFormatter() |
| output.Write(sf.FormatError(err)) |
| } |
| return nil |
| } |
| |
| func (s *router) postImagesLoad(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| return s.daemon.LoadImage(r.Body, w) |
| } |
| |
| func (s *router) deleteImages(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| name := vars["name"] |
| |
| if strings.TrimSpace(name) == "" { |
| return fmt.Errorf("image name cannot be blank") |
| } |
| |
| force := httputils.BoolValue(r, "force") |
| prune := !httputils.BoolValue(r, "noprune") |
| |
| list, err := s.daemon.ImageDelete(name, force, prune) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, list) |
| } |
| |
| func (s *router) getImagesByName(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| imageInspect, err := s.daemon.LookupImage(vars["name"]) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, imageInspect) |
| } |
| |
| func (s *router) getImagesJSON(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| // FIXME: The filter parameter could just be a match filter |
| images, err := s.daemon.Images(r.Form.Get("filters"), r.Form.Get("filter"), httputils.BoolValue(r, "all")) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, images) |
| } |
| |
| func (s *router) getImagesHistory(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| name := vars["name"] |
| history, err := s.daemon.ImageHistory(name) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, history) |
| } |
| |
| func (s *router) postImagesTag(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| repo := r.Form.Get("repo") |
| tag := r.Form.Get("tag") |
| newTag, err := reference.WithName(repo) |
| if err != nil { |
| return err |
| } |
| if tag != "" { |
| if newTag, err = reference.WithTag(newTag, tag); err != nil { |
| return err |
| } |
| } |
| if err := s.daemon.TagImage(newTag, vars["name"]); err != nil { |
| return err |
| } |
| w.WriteHeader(http.StatusCreated) |
| return nil |
| } |
| |
| func (s *router) getImagesSearch(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| var ( |
| config *types.AuthConfig |
| authEncoded = r.Header.Get("X-Registry-Auth") |
| headers = map[string][]string{} |
| ) |
| |
| if authEncoded != "" { |
| authJSON := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded)) |
| if err := json.NewDecoder(authJSON).Decode(&config); err != nil { |
| // for a search it is not an error if no auth was given |
| // to increase compatibility with the existing api it is defaulting to be empty |
| config = &types.AuthConfig{} |
| } |
| } |
| for k, v := range r.Header { |
| if strings.HasPrefix(k, "X-Meta-") { |
| headers[k] = v |
| } |
| } |
| query, err := s.daemon.SearchRegistryForImages(r.Form.Get("term"), config, headers) |
| if err != nil { |
| return err |
| } |
| return httputils.WriteJSON(w, http.StatusOK, query.Results) |
| } |