| package distribution // import "github.com/docker/docker/distribution" |
| |
| import ( |
| "context" |
| "fmt" |
| |
| "github.com/containerd/log" |
| "github.com/distribution/reference" |
| "github.com/docker/docker/api" |
| "github.com/docker/docker/api/types/events" |
| refstore "github.com/docker/docker/reference" |
| "github.com/docker/docker/registry" |
| "github.com/opencontainers/go-digest" |
| "github.com/pkg/errors" |
| ) |
| |
| // Pull initiates a pull operation. image is the repository name to pull, and |
| // tag may be either empty, or indicate a specific tag to pull. |
| func Pull(ctx context.Context, ref reference.Named, config *ImagePullConfig, local ContentStore) error { |
| repoInfo, err := pullEndpoints(ctx, config.RegistryService, ref, func(ctx context.Context, repoInfo registry.RepositoryInfo, endpoint registry.APIEndpoint) error { |
| log.G(ctx).Debugf("Trying to pull %s from %s", reference.FamiliarName(repoInfo.Name), endpoint.URL) |
| puller := newPuller(endpoint, &repoInfo, config, local) |
| return puller.pull(ctx, ref) |
| }) |
| |
| if err == nil { |
| config.ImageEventLogger(reference.FamiliarString(ref), reference.FamiliarName(repoInfo.Name), events.ActionPull) |
| } |
| |
| return err |
| } |
| |
| // Tags returns available tags for the given image in the remote repository. |
| func Tags(ctx context.Context, ref reference.Named, config *Config) ([]string, error) { |
| var tags []string |
| _, err := pullEndpoints(ctx, config.RegistryService, ref, func(ctx context.Context, repoInfo registry.RepositoryInfo, endpoint registry.APIEndpoint) error { |
| repo, err := newRepository(ctx, &repoInfo, endpoint, config.MetaHeaders, config.AuthConfig, "pull") |
| if err != nil { |
| return err |
| } |
| |
| tags, err = repo.Tags(ctx).All(ctx) |
| return err |
| }) |
| |
| return tags, err |
| } |
| |
| // validateRepoName validates the name of a repository. |
| func validateRepoName(name reference.Named) error { |
| if reference.FamiliarName(name) == api.NoBaseImageSpecifier { |
| return errors.WithStack(reservedNameError(api.NoBaseImageSpecifier)) |
| } |
| return nil |
| } |
| |
| func addDigestReference(store refstore.Store, ref reference.Named, dgst digest.Digest, id digest.Digest) error { |
| dgstRef, err := reference.WithDigest(reference.TrimNamed(ref), dgst) |
| if err != nil { |
| return err |
| } |
| |
| if oldTagID, err := store.Get(dgstRef); err == nil { |
| if oldTagID != id { |
| // Updating digests not supported by reference store |
| log.G(context.TODO()).Errorf("Image ID for digest %s changed from %s to %s, cannot update", dgst.String(), oldTagID, id) |
| } |
| return nil |
| } else if err != refstore.ErrDoesNotExist { |
| return err |
| } |
| |
| return store.AddDigest(dgstRef, id, true) |
| } |
| |
| func pullEndpoints(ctx context.Context, registryService RegistryResolver, ref reference.Named, |
| f func(context.Context, registry.RepositoryInfo, registry.APIEndpoint) error, |
| ) (*registry.RepositoryInfo, error) { |
| // Resolve the Repository name from fqn to RepositoryInfo |
| repoInfo, err := registryService.ResolveRepository(ref) |
| if err != nil { |
| return nil, err |
| } |
| |
| // makes sure name is not `scratch` |
| if err := validateRepoName(repoInfo.Name); err != nil { |
| return repoInfo, err |
| } |
| |
| endpoints, err := registryService.LookupPullEndpoints(reference.Domain(repoInfo.Name)) |
| if err != nil { |
| return repoInfo, err |
| } |
| |
| var ( |
| lastErr error |
| |
| // confirmedTLSRegistries is a map indicating which registries |
| // are known to be using TLS. There should never be a plaintext |
| // retry for any of these. |
| confirmedTLSRegistries = make(map[string]struct{}) |
| ) |
| for _, endpoint := range endpoints { |
| if endpoint.URL.Scheme != "https" { |
| if _, confirmedTLS := confirmedTLSRegistries[endpoint.URL.Host]; confirmedTLS { |
| log.G(ctx).Debugf("Skipping non-TLS endpoint %s for host/port that appears to use TLS", endpoint.URL) |
| continue |
| } |
| } |
| |
| log.G(ctx).Debugf("Trying to pull %s from %s", reference.FamiliarName(repoInfo.Name), endpoint.URL) |
| |
| if err := f(ctx, *repoInfo, endpoint); err != nil { |
| if _, ok := err.(fallbackError); !ok && continueOnError(err, endpoint.Mirror) { |
| err = fallbackError{ |
| err: err, |
| transportOK: true, |
| } |
| } |
| |
| // Was this pull cancelled? If so, don't try to fall |
| // back. |
| fallback := false |
| select { |
| case <-ctx.Done(): |
| default: |
| if fallbackErr, ok := err.(fallbackError); ok { |
| fallback = true |
| if fallbackErr.transportOK && endpoint.URL.Scheme == "https" { |
| confirmedTLSRegistries[endpoint.URL.Host] = struct{}{} |
| } |
| err = fallbackErr.err |
| } |
| } |
| if fallback { |
| lastErr = err |
| log.G(ctx).Infof("Attempting next endpoint for pull after error: %v", err) |
| continue |
| } |
| log.G(ctx).Errorf("Not continuing with pull after error: %v", err) |
| return repoInfo, translatePullError(err, ref) |
| } |
| |
| return repoInfo, nil |
| } |
| |
| if lastErr == nil { |
| lastErr = fmt.Errorf("no endpoints found for %s", reference.FamiliarString(ref)) |
| } |
| |
| return repoInfo, translatePullError(lastErr, ref) |
| } |