This repository has been archived on 2020-03-24. You can view files and clone it, but cannot push or open issues or pull requests.
quay/endpoints/v1/tag.py

113 lines
3.8 KiB
Python
Raw Normal View History

2013-09-25 21:50:03 +00:00
import logging
import json
2013-09-25 21:50:03 +00:00
from flask import abort, request, jsonify, make_response, session
2013-09-25 21:50:03 +00:00
from app import storage
from auth.decorators import process_auth
2017-06-29 17:24:00 +00:00
from auth.permissions import (ReadRepositoryPermission, ModifyRepositoryPermission)
from data.registry_model import registry_model
from data.registry_model.manifestbuilder import lookup_manifest_builder
from endpoints.decorators import anon_protect, parse_repository_name
2015-06-22 21:37:13 +00:00
from endpoints.v1 import v1_bp
from util.audit import track_and_log
from util.names import TAG_ERROR, TAG_REGEX
2013-09-25 21:50:03 +00:00
logger = logging.getLogger(__name__)
@v1_bp.route('/repositories/<repopath:repository>/tags', methods=['GET'])
2013-09-25 21:50:03 +00:00
@process_auth
@anon_protect
2016-03-09 21:20:28 +00:00
@parse_repository_name()
def get_tags(namespace_name, repo_name):
permission = ReadRepositoryPermission(namespace_name, repo_name)
repository_ref = registry_model.lookup_repository(namespace_name, repo_name, kind_filter='image')
if permission.can() or (repository_ref is not None and repository_ref.is_public):
if repository_ref is None:
abort(404)
2013-09-25 21:50:03 +00:00
tag_map = registry_model.get_legacy_tags_map(repository_ref, storage)
2013-09-25 21:50:03 +00:00
return jsonify(tag_map)
abort(403)
@v1_bp.route('/repositories/<repopath:repository>/tags/<tag>', methods=['GET'])
2013-09-25 21:50:03 +00:00
@process_auth
@anon_protect
2016-03-09 21:20:28 +00:00
@parse_repository_name()
def get_tag(namespace_name, repo_name, tag):
permission = ReadRepositoryPermission(namespace_name, repo_name)
repository_ref = registry_model.lookup_repository(namespace_name, repo_name, kind_filter='image')
if permission.can() or (repository_ref is not None and repository_ref.is_public):
if repository_ref is None:
abort(404)
2013-09-25 21:50:03 +00:00
tag = registry_model.get_repo_tag(repository_ref, tag, include_legacy_image=True)
if tag is None:
abort(404)
resp = make_response('"%s"' % tag.legacy_image.docker_image_id)
resp.headers['Content-Type'] = 'application/json'
return resp
2013-09-25 21:50:03 +00:00
abort(403)
@v1_bp.route('/repositories/<repopath:repository>/tags/<tag>', methods=['PUT'])
2013-09-25 21:50:03 +00:00
@process_auth
@anon_protect
2016-03-09 21:20:28 +00:00
@parse_repository_name()
def put_tag(namespace_name, repo_name, tag):
permission = ModifyRepositoryPermission(namespace_name, repo_name)
repository_ref = registry_model.lookup_repository(namespace_name, repo_name, kind_filter='image')
2013-09-25 21:50:03 +00:00
if permission.can() and repository_ref is not None:
2015-10-05 20:36:33 +00:00
if not TAG_REGEX.match(tag):
abort(400, TAG_ERROR)
2016-07-12 17:48:44 +00:00
image_id = json.loads(request.data)
2013-09-25 21:50:03 +00:00
# Check for the image ID first in a builder (for an in-progress push).
builder = lookup_manifest_builder(repository_ref, session.get('manifest_builder'), storage)
if builder is not None:
layer = builder.lookup_layer(image_id)
if layer is not None:
commited_tag = builder.commit_tag_and_manifest(tag, layer)
if commited_tag is None:
abort(400)
return make_response('Created', 200)
# Check if there is an existing image we should use (for PUT calls outside of a normal push
# operation).
legacy_image = registry_model.get_legacy_image(repository_ref, image_id)
if legacy_image is None:
abort(400)
if registry_model.retarget_tag(repository_ref, tag, legacy_image, storage) is None:
abort(400)
2013-09-25 21:50:03 +00:00
return make_response('Created', 200)
abort(403)
@v1_bp.route('/repositories/<repopath:repository>/tags/<tag>', methods=['DELETE'])
2013-09-25 21:50:03 +00:00
@process_auth
@anon_protect
2016-03-09 21:20:28 +00:00
@parse_repository_name()
def delete_tag(namespace_name, repo_name, tag):
permission = ModifyRepositoryPermission(namespace_name, repo_name)
repository_ref = registry_model.lookup_repository(namespace_name, repo_name, kind_filter='image')
2013-09-25 21:50:03 +00:00
if permission.can() and repository_ref is not None:
if not registry_model.delete_tag(repository_ref, tag):
abort(404)
track_and_log('delete_tag', repository_ref, tag=tag)
return make_response('Deleted', 200)
2013-09-25 21:50:03 +00:00
abort(403)