2017-08-31 15:17:21 +00:00
|
|
|
package libpod
|
2017-07-23 23:12:36 +00:00
|
|
|
|
|
|
|
import (
|
2017-09-09 11:14:40 +00:00
|
|
|
"fmt"
|
2017-07-23 23:12:36 +00:00
|
|
|
"io"
|
2017-07-12 17:37:16 +00:00
|
|
|
"strings"
|
2017-07-23 23:12:36 +00:00
|
|
|
"syscall"
|
|
|
|
|
|
|
|
cp "github.com/containers/image/copy"
|
2017-09-09 11:14:40 +00:00
|
|
|
dockerarchive "github.com/containers/image/docker/archive"
|
2017-07-12 17:37:16 +00:00
|
|
|
"github.com/containers/image/docker/tarfile"
|
2017-07-23 23:12:36 +00:00
|
|
|
"github.com/containers/image/manifest"
|
2017-09-09 11:14:40 +00:00
|
|
|
ociarchive "github.com/containers/image/oci/archive"
|
2017-07-23 23:12:36 +00:00
|
|
|
"github.com/containers/image/signature"
|
|
|
|
is "github.com/containers/image/storage"
|
|
|
|
"github.com/containers/image/transports/alltransports"
|
2017-09-06 16:51:29 +00:00
|
|
|
"github.com/containers/image/types"
|
2017-07-23 23:12:36 +00:00
|
|
|
"github.com/containers/storage"
|
|
|
|
"github.com/containers/storage/pkg/archive"
|
2017-08-31 15:17:21 +00:00
|
|
|
"github.com/kubernetes-incubator/cri-o/libpod/common"
|
|
|
|
"github.com/kubernetes-incubator/cri-o/libpod/images"
|
2017-07-23 23:12:36 +00:00
|
|
|
"github.com/pkg/errors"
|
|
|
|
)
|
|
|
|
|
2017-08-31 15:17:21 +00:00
|
|
|
// Runtime API
|
|
|
|
|
2017-07-23 23:12:36 +00:00
|
|
|
const (
|
|
|
|
// DefaultRegistry is a prefix that we apply to an image name
|
|
|
|
// to check docker hub first for the image
|
|
|
|
DefaultRegistry = "docker://"
|
|
|
|
)
|
|
|
|
|
2017-09-09 11:14:40 +00:00
|
|
|
var (
|
|
|
|
// DockerArchive is the transport we prepend to an image name
|
|
|
|
// when saving to docker-archive
|
|
|
|
DockerArchive = dockerarchive.Transport.Name()
|
|
|
|
// OCIArchive is the transport we prepend to an image name
|
|
|
|
// when saving to oci-archive
|
|
|
|
OCIArchive = ociarchive.Transport.Name()
|
|
|
|
)
|
|
|
|
|
2017-07-23 23:12:36 +00:00
|
|
|
// CopyOptions contains the options given when pushing or pulling images
|
|
|
|
type CopyOptions struct {
|
|
|
|
// Compression specifies the type of compression which is applied to
|
|
|
|
// layer blobs. The default is to not use compression, but
|
|
|
|
// archive.Gzip is recommended.
|
|
|
|
Compression archive.Compression
|
|
|
|
// DockerRegistryOptions encapsulates settings that affect how we
|
|
|
|
// connect or authenticate to a remote registry to which we want to
|
|
|
|
// push the image.
|
|
|
|
common.DockerRegistryOptions
|
|
|
|
// SigningOptions encapsulates settings that control whether or not we
|
|
|
|
// strip or add signatures to the image when pushing (uploading) the
|
|
|
|
// image to a registry.
|
|
|
|
common.SigningOptions
|
2017-09-06 16:51:29 +00:00
|
|
|
|
|
|
|
// SigningPolicyPath this points to a alternative signature policy file, used mainly for testing
|
|
|
|
SignaturePolicyPath string
|
2017-07-23 23:12:36 +00:00
|
|
|
}
|
|
|
|
|
2017-08-31 15:17:21 +00:00
|
|
|
// Image API
|
2017-07-23 23:12:36 +00:00
|
|
|
|
2017-08-31 15:17:21 +00:00
|
|
|
// ImageFilter is a function to determine whether an image is included in
|
|
|
|
// command output. Images to be outputted are tested using the function. A true
|
|
|
|
// return will include the image, a false return will exclude it.
|
|
|
|
type ImageFilter func(*storage.Image) bool
|
2017-07-23 23:12:36 +00:00
|
|
|
|
2017-08-31 15:17:21 +00:00
|
|
|
// PullImage pulls an image from configured registries
|
|
|
|
// By default, only the latest tag (or a specific tag if requested) will be
|
|
|
|
// pulled. If allTags is true, all tags for the requested image will be pulled.
|
|
|
|
// Signature validation will be performed if the Runtime has been appropriately
|
|
|
|
// configured
|
2017-09-09 11:14:40 +00:00
|
|
|
func (r *Runtime) PullImage(imgName string, allTags bool, signaturePolicyPath string, reportWriter io.Writer) error {
|
|
|
|
r.lock.Lock()
|
|
|
|
defer r.lock.Unlock()
|
|
|
|
|
|
|
|
if !r.valid {
|
|
|
|
return fmt.Errorf("runtime is not valid")
|
|
|
|
}
|
|
|
|
|
2017-08-31 15:17:21 +00:00
|
|
|
// PullImage copies the image from the source to the destination
|
2017-07-12 17:37:16 +00:00
|
|
|
var (
|
|
|
|
images []string
|
|
|
|
)
|
|
|
|
|
2017-09-09 11:14:40 +00:00
|
|
|
if signaturePolicyPath == "" {
|
|
|
|
signaturePolicyPath = r.config.SignaturePolicyPath
|
|
|
|
}
|
|
|
|
|
|
|
|
sc := common.GetSystemContext(signaturePolicyPath)
|
|
|
|
|
2017-07-12 17:37:16 +00:00
|
|
|
srcRef, err := alltransports.ParseImageName(imgName)
|
2017-07-23 23:12:36 +00:00
|
|
|
if err != nil {
|
2017-07-12 17:37:16 +00:00
|
|
|
defaultName := DefaultRegistry + imgName
|
|
|
|
srcRef2, err2 := alltransports.ParseImageName(defaultName)
|
2017-07-23 23:12:36 +00:00
|
|
|
if err2 != nil {
|
2017-07-12 17:37:16 +00:00
|
|
|
return errors.Errorf("error parsing image name %q: %v", defaultName, err2)
|
2017-07-23 23:12:36 +00:00
|
|
|
}
|
|
|
|
srcRef = srcRef2
|
|
|
|
}
|
|
|
|
|
2017-07-12 17:37:16 +00:00
|
|
|
splitArr := strings.Split(imgName, ":")
|
2017-09-09 11:14:40 +00:00
|
|
|
archFile := splitArr[len(splitArr)-1]
|
2017-07-23 23:12:36 +00:00
|
|
|
|
2017-07-12 17:37:16 +00:00
|
|
|
// supports pulling from docker-archive, oci, and registries
|
2017-09-09 11:14:40 +00:00
|
|
|
if srcRef.Transport().Name() == DockerArchive {
|
|
|
|
tarSource := tarfile.NewSource(archFile)
|
2017-07-12 17:37:16 +00:00
|
|
|
manifest, err := tarSource.LoadTarManifest()
|
|
|
|
if err != nil {
|
|
|
|
return errors.Errorf("error retrieving manifest.json: %v", err)
|
|
|
|
}
|
|
|
|
// to pull all the images stored in one tar file
|
|
|
|
for i := range manifest {
|
2017-08-15 16:51:07 +00:00
|
|
|
if manifest[i].RepoTags != nil {
|
|
|
|
images = append(images, manifest[i].RepoTags[0])
|
|
|
|
} else {
|
|
|
|
// create an image object and use the hex value of the digest as the image ID
|
|
|
|
// for parsing the store reference
|
2017-09-09 11:14:40 +00:00
|
|
|
newImg, err := srcRef.NewImage(sc)
|
2017-08-15 16:51:07 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer newImg.Close()
|
|
|
|
digest := newImg.ConfigInfo().Digest
|
|
|
|
if err := digest.Validate(); err == nil {
|
|
|
|
images = append(images, "@"+digest.Hex())
|
|
|
|
} else {
|
|
|
|
return errors.Wrapf(err, "error getting config info")
|
|
|
|
}
|
|
|
|
}
|
2017-07-12 17:37:16 +00:00
|
|
|
}
|
2017-09-09 11:14:40 +00:00
|
|
|
} else if srcRef.Transport().Name() == OCIArchive {
|
|
|
|
// retrieve the manifest from index.json to access the image name
|
|
|
|
manifest, err := ociarchive.LoadManifestDescriptor(srcRef)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "error loading manifest for %q", srcRef)
|
|
|
|
}
|
|
|
|
|
|
|
|
if manifest.Annotations == nil || manifest.Annotations["org.opencontainers.image.ref.name"] == "" {
|
|
|
|
return errors.Errorf("error, archive doesn't have a name annotation. Cannot store image with no name")
|
|
|
|
}
|
|
|
|
images = append(images, manifest.Annotations["org.opencontainers.image.ref.name"])
|
2017-07-12 17:37:16 +00:00
|
|
|
} else {
|
|
|
|
images = append(images, imgName)
|
2017-07-23 23:12:36 +00:00
|
|
|
}
|
|
|
|
|
2017-08-31 15:17:21 +00:00
|
|
|
policy, err := signature.DefaultPolicy(r.imageContext)
|
2017-07-23 23:12:36 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
policyContext, err := signature.NewPolicyContext(policy)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer policyContext.Destroy()
|
|
|
|
|
2017-09-09 11:14:40 +00:00
|
|
|
copyOptions := common.GetCopyOptions(reportWriter, signaturePolicyPath, nil, nil, common.SigningOptions{})
|
2017-07-12 17:37:16 +00:00
|
|
|
for _, image := range images {
|
2017-09-09 11:14:40 +00:00
|
|
|
reference := image
|
|
|
|
if srcRef.DockerReference() != nil {
|
|
|
|
reference = srcRef.DockerReference().String()
|
|
|
|
}
|
|
|
|
destRef, err := is.Transport.ParseStoreReference(r.store, reference)
|
2017-07-12 17:37:16 +00:00
|
|
|
if err != nil {
|
|
|
|
return errors.Errorf("error parsing dest reference name: %v", err)
|
|
|
|
}
|
|
|
|
if err = cp.Image(policyContext, destRef, srcRef, copyOptions); err != nil {
|
|
|
|
return errors.Errorf("error loading image %q: %v", image, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
2017-07-23 23:12:36 +00:00
|
|
|
}
|
2017-08-31 15:17:21 +00:00
|
|
|
|
|
|
|
// PushImage pushes the given image to a location described by the given path
|
2017-09-06 14:28:59 +00:00
|
|
|
func (r *Runtime) PushImage(source string, destination string, options CopyOptions, reportWriter io.Writer) error {
|
2017-09-09 11:14:40 +00:00
|
|
|
r.lock.Lock()
|
|
|
|
defer r.lock.Unlock()
|
|
|
|
|
|
|
|
if !r.valid {
|
|
|
|
return fmt.Errorf("runtime is not valid")
|
|
|
|
}
|
|
|
|
|
2017-08-31 15:17:21 +00:00
|
|
|
// PushImage pushes the src image to the destination
|
|
|
|
//func PushImage(source, destination string, options CopyOptions) error {
|
|
|
|
if source == "" || destination == "" {
|
|
|
|
return errors.Wrapf(syscall.EINVAL, "source and destination image names must be specified")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the destination Image Reference
|
|
|
|
dest, err := alltransports.ParseImageName(destination)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "error getting destination imageReference for %q", destination)
|
|
|
|
}
|
|
|
|
|
2017-09-09 11:14:40 +00:00
|
|
|
signaturePolicyPath := r.config.SignaturePolicyPath
|
|
|
|
if options.SignaturePolicyPath != "" {
|
|
|
|
signaturePolicyPath = options.SignaturePolicyPath
|
|
|
|
}
|
|
|
|
|
|
|
|
policyContext, err := common.GetPolicyContext(signaturePolicyPath)
|
2017-08-31 15:17:21 +00:00
|
|
|
if err != nil {
|
2017-09-09 11:14:40 +00:00
|
|
|
return errors.Wrapf(err, "Could not get default policy context for signature policy path %q", signaturePolicyPath)
|
2017-08-31 15:17:21 +00:00
|
|
|
}
|
|
|
|
defer policyContext.Destroy()
|
|
|
|
// Look up the image name and its layer, then build the imagePushData from
|
|
|
|
// the image
|
2017-09-09 11:14:40 +00:00
|
|
|
img, err := r.getImage(source)
|
2017-08-31 15:17:21 +00:00
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "error locating image %q for importing settings", source)
|
|
|
|
}
|
|
|
|
cd, err := images.ImportCopyDataFromImage(r.store, r.imageContext, img.ID, "", "")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// Give the image we're producing the same ancestors as its source image
|
|
|
|
cd.FromImage = cd.Docker.ContainerConfig.Image
|
|
|
|
cd.FromImageID = string(cd.Docker.Parent)
|
|
|
|
|
|
|
|
// Prep the layers and manifest for export
|
|
|
|
src, err := cd.MakeImageRef(manifest.GuessMIMEType(cd.Manifest), options.Compression, img.Names, img.TopLayer, nil)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "error copying layers and metadata")
|
|
|
|
}
|
|
|
|
|
2017-09-09 11:14:40 +00:00
|
|
|
copyOptions := common.GetCopyOptions(reportWriter, signaturePolicyPath, nil, &options.DockerRegistryOptions, options.SigningOptions)
|
2017-08-31 15:17:21 +00:00
|
|
|
|
|
|
|
// Copy the image to the remote destination
|
|
|
|
err = cp.Image(policyContext, dest, src, copyOptions)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "Error copying image to the remote destination")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// TagImage adds a tag to the given image
|
|
|
|
func (r *Runtime) TagImage(image *storage.Image, tag string) error {
|
2017-09-09 11:14:40 +00:00
|
|
|
r.lock.Lock()
|
|
|
|
defer r.lock.Unlock()
|
|
|
|
|
|
|
|
if !r.valid {
|
|
|
|
return fmt.Errorf("runtime is not valid")
|
|
|
|
}
|
|
|
|
|
2017-09-06 16:51:29 +00:00
|
|
|
tags, err := r.store.Names(image.ID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, key := range tags {
|
|
|
|
if key == tag {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
tags = append(tags, tag)
|
|
|
|
return r.store.SetNames(image.ID, tags)
|
2017-08-31 15:17:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// UntagImage removes a tag from the given image
|
|
|
|
func (r *Runtime) UntagImage(image *storage.Image, tag string) error {
|
2017-09-09 11:14:40 +00:00
|
|
|
r.lock.Lock()
|
|
|
|
defer r.lock.Unlock()
|
|
|
|
|
|
|
|
if !r.valid {
|
|
|
|
return fmt.Errorf("runtime is not valid")
|
|
|
|
}
|
|
|
|
|
2017-09-06 16:51:29 +00:00
|
|
|
tags, err := r.store.Names(image.ID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for i, key := range tags {
|
|
|
|
if key == tag {
|
|
|
|
tags[i] = tags[len(tags)-1]
|
|
|
|
tags = tags[:len(tags)-1]
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return r.store.SetNames(image.ID, tags)
|
2017-08-31 15:17:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// RemoveImage deletes an image from local storage
|
|
|
|
// Images being used by running containers cannot be removed
|
|
|
|
func (r *Runtime) RemoveImage(image *storage.Image) error {
|
2017-09-09 11:14:40 +00:00
|
|
|
r.lock.Lock()
|
|
|
|
defer r.lock.Unlock()
|
|
|
|
|
|
|
|
if !r.valid {
|
|
|
|
return fmt.Errorf("runtime is not valid")
|
|
|
|
}
|
|
|
|
|
2017-09-06 16:51:29 +00:00
|
|
|
_, err := r.store.DeleteImage(image.ID, false)
|
|
|
|
return err
|
2017-08-31 15:17:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// GetImage retrieves an image matching the given name or hash from system
|
|
|
|
// storage
|
|
|
|
// If no matching image can be found, an error is returned
|
|
|
|
func (r *Runtime) GetImage(image string) (*storage.Image, error) {
|
2017-09-09 11:14:40 +00:00
|
|
|
r.lock.Lock()
|
|
|
|
defer r.lock.Unlock()
|
|
|
|
|
|
|
|
if !r.valid {
|
|
|
|
return nil, fmt.Errorf("runtime is not valid")
|
|
|
|
}
|
|
|
|
return r.getImage(image)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *Runtime) getImage(image string) (*storage.Image, error) {
|
2017-09-06 16:51:29 +00:00
|
|
|
var img *storage.Image
|
|
|
|
ref, err := is.Transport.ParseStoreReference(r.store, image)
|
|
|
|
if err == nil {
|
|
|
|
img, err = is.Transport.GetStoreImage(r.store, ref)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
img2, err2 := r.store.Image(image)
|
|
|
|
if err2 != nil {
|
|
|
|
if ref == nil {
|
|
|
|
return nil, errors.Wrapf(err, "error parsing reference to image %q", image)
|
|
|
|
}
|
|
|
|
return nil, errors.Wrapf(err, "unable to locate image %q", image)
|
|
|
|
}
|
|
|
|
img = img2
|
|
|
|
}
|
|
|
|
return img, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetImageRef searches for and returns a new types.Image matching the given name or ID in the given store.
|
|
|
|
func (r *Runtime) GetImageRef(image string) (types.Image, error) {
|
2017-09-09 11:14:40 +00:00
|
|
|
r.lock.Lock()
|
|
|
|
defer r.lock.Unlock()
|
|
|
|
|
|
|
|
if !r.valid {
|
|
|
|
return nil, fmt.Errorf("runtime is not valid")
|
|
|
|
}
|
|
|
|
|
|
|
|
img, err := r.getImage(image)
|
2017-09-06 16:51:29 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrapf(err, "unable to locate image %q", image)
|
|
|
|
}
|
|
|
|
ref, err := is.Transport.ParseStoreReference(r.store, "@"+img.ID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrapf(err, "error parsing reference to image %q", img.ID)
|
|
|
|
}
|
|
|
|
imgRef, err := ref.NewImage(nil)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrapf(err, "error reading image %q", img.ID)
|
|
|
|
}
|
|
|
|
return imgRef, nil
|
2017-08-31 15:17:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// GetImages retrieves all images present in storage
|
|
|
|
// Filters can be provided which will determine which images are included in the
|
|
|
|
// output. Multiple filters are handled by ANDing their output, so only images
|
|
|
|
// matching all filters are included
|
|
|
|
func (r *Runtime) GetImages(filter ...ImageFilter) ([]*storage.Image, error) {
|
2017-09-11 15:27:40 +00:00
|
|
|
return nil, ErrNotImplemented
|
2017-08-31 15:17:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ImportImage imports an OCI format image archive into storage as an image
|
|
|
|
func (r *Runtime) ImportImage(path string) (*storage.Image, error) {
|
2017-09-11 15:27:40 +00:00
|
|
|
return nil, ErrNotImplemented
|
2017-08-31 15:17:21 +00:00
|
|
|
}
|