2013-09-20 15:55:44 +00:00
|
|
|
import json
|
|
|
|
import logging
|
2013-10-29 20:11:54 +00:00
|
|
|
import urlparse
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2014-01-24 22:00:42 +00:00
|
|
|
from flask import request, make_response, jsonify, session, Blueprint
|
2013-09-20 15:55:44 +00:00
|
|
|
from functools import wraps
|
2014-02-21 03:26:10 +00:00
|
|
|
from collections import OrderedDict
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2014-03-18 23:21:27 +00:00
|
|
|
from data import model
|
2014-03-20 16:09:25 +00:00
|
|
|
from data.model import oauth
|
2013-11-16 20:05:26 +00:00
|
|
|
from data.queue import webhook_queue
|
2014-02-07 01:58:26 +00:00
|
|
|
from app import mixpanel, app
|
2014-02-25 20:07:24 +00:00
|
|
|
from auth.auth import process_auth
|
|
|
|
from auth.auth_context import get_authenticated_user, get_validated_token
|
2013-11-11 21:28:05 +00:00
|
|
|
from util.names import parse_repository_name
|
2013-09-27 23:29:01 +00:00
|
|
|
from util.email import send_confirmation_email
|
2014-03-18 23:21:27 +00:00
|
|
|
from auth.permissions import (ModifyRepositoryPermission, UserAdminPermission,
|
|
|
|
ReadRepositoryPermission, CreateRepositoryPermission)
|
2014-01-28 23:29:45 +00:00
|
|
|
|
2014-01-24 20:01:40 +00:00
|
|
|
from util.http import abort
|
|
|
|
|
2014-01-24 22:00:42 +00:00
|
|
|
|
2013-09-20 15:55:44 +00:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
2013-12-30 22:05:27 +00:00
|
|
|
index = Blueprint('index', __name__)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-10-16 18:24:10 +00:00
|
|
|
def generate_headers(role='read'):
|
|
|
|
def decorator_method(f):
|
|
|
|
@wraps(f)
|
|
|
|
def wrapper(namespace, repository, *args, **kwargs):
|
|
|
|
response = f(namespace, repository, *args, **kwargs)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-12-09 04:24:29 +00:00
|
|
|
# Setting session namespace and repository
|
|
|
|
session['namespace'] = namespace
|
|
|
|
session['repository'] = repository
|
|
|
|
|
2014-02-16 22:38:47 +00:00
|
|
|
if get_authenticated_user():
|
|
|
|
session['username'] = get_authenticated_user().username
|
|
|
|
else:
|
|
|
|
session.pop('username', None)
|
|
|
|
|
2013-10-29 20:11:54 +00:00
|
|
|
# We run our index and registry on the same hosts for now
|
|
|
|
registry_server = urlparse.urlparse(request.url).netloc
|
|
|
|
response.headers['X-Docker-Endpoints'] = registry_server
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-10-16 18:24:10 +00:00
|
|
|
has_token_request = request.headers.get('X-Docker-Token', '')
|
2013-09-20 22:38:17 +00:00
|
|
|
|
2013-10-16 18:24:10 +00:00
|
|
|
if has_token_request:
|
|
|
|
repo = model.get_repository(namespace, repository)
|
2013-11-11 22:01:21 +00:00
|
|
|
if repo:
|
|
|
|
token = model.create_access_token(repo, role)
|
|
|
|
token_str = 'signature=%s' % token.code
|
|
|
|
response.headers['WWW-Authenticate'] = token_str
|
|
|
|
response.headers['X-Docker-Token'] = token_str
|
|
|
|
else:
|
|
|
|
logger.info('Token request in non-existing repo: %s/%s' %
|
|
|
|
(namespace, repository))
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-10-16 18:24:10 +00:00
|
|
|
return response
|
|
|
|
return wrapper
|
|
|
|
return decorator_method
|
2013-09-20 15:55:44 +00:00
|
|
|
|
|
|
|
|
2013-12-30 22:05:27 +00:00
|
|
|
@index.route('/users', methods=['POST'])
|
|
|
|
@index.route('/users/', methods=['POST'])
|
2013-09-20 15:55:44 +00:00
|
|
|
def create_user():
|
|
|
|
user_data = request.get_json()
|
2013-10-01 16:25:06 +00:00
|
|
|
username = user_data['username']
|
|
|
|
password = user_data['password']
|
|
|
|
|
2014-02-20 19:49:34 +00:00
|
|
|
# UGH! we have to use this response when the login actually worked, in order
|
|
|
|
# to get the CLI to try again with a get, and then tell us login succeeded.
|
|
|
|
success = make_response('"Username or email already exists"', 400)
|
|
|
|
|
2013-10-16 18:24:10 +00:00
|
|
|
if username == '$token':
|
|
|
|
try:
|
2013-11-11 21:28:05 +00:00
|
|
|
model.load_token_data(password)
|
2014-02-20 19:49:34 +00:00
|
|
|
return success
|
2013-10-16 18:24:10 +00:00
|
|
|
except model.InvalidTokenException:
|
2014-01-28 23:29:45 +00:00
|
|
|
abort(400, 'Invalid access token.', issue='invalid-access-token')
|
2013-10-16 18:24:10 +00:00
|
|
|
|
2014-03-20 16:09:25 +00:00
|
|
|
elif username == '$oauthtoken':
|
|
|
|
validated = oauth.validate_access_token(password)
|
|
|
|
if validated is not None:
|
|
|
|
return success
|
|
|
|
else:
|
|
|
|
abort(400, 'Invalid oauth access token.', issue='invalid-oauth-access-token')
|
|
|
|
|
2013-11-21 00:43:19 +00:00
|
|
|
elif '+' in username:
|
|
|
|
try:
|
|
|
|
model.verify_robot(username, password)
|
2014-02-20 19:49:34 +00:00
|
|
|
return success
|
2013-11-21 00:43:19 +00:00
|
|
|
except model.InvalidRobotException:
|
2014-02-20 19:49:34 +00:00
|
|
|
abort(400, 'Invalid robot account or password.',
|
|
|
|
issue='robot-login-failure')
|
2013-11-21 00:43:19 +00:00
|
|
|
|
2013-10-01 16:25:06 +00:00
|
|
|
existing_user = model.get_user(username)
|
|
|
|
if existing_user:
|
|
|
|
verified = model.verify_user(username, password)
|
|
|
|
if verified:
|
2014-02-07 01:58:26 +00:00
|
|
|
# Mark that the user was logged in.
|
|
|
|
event = app.config['USER_EVENTS'].get_event(username)
|
|
|
|
event.publish_event_data('docker-cli', {'action': 'login'})
|
|
|
|
|
2014-02-20 19:49:34 +00:00
|
|
|
return success
|
2013-10-01 16:25:06 +00:00
|
|
|
else:
|
2014-02-07 01:58:26 +00:00
|
|
|
# Mark that the login failed.
|
|
|
|
event = app.config['USER_EVENTS'].get_event(username)
|
|
|
|
event.publish_event_data('docker-cli', {'action': 'loginfailure'})
|
|
|
|
|
2014-01-28 23:29:45 +00:00
|
|
|
abort(400, 'Invalid password.', issue='login-failure')
|
|
|
|
|
2013-10-01 16:25:06 +00:00
|
|
|
else:
|
|
|
|
# New user case
|
|
|
|
new_user = model.create_user(username, password, user_data['email'])
|
|
|
|
code = model.create_confirm_email_code(new_user)
|
|
|
|
send_confirmation_email(new_user.username, new_user.email, code.code)
|
|
|
|
return make_response('Created', 201)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
|
|
|
|
2013-12-30 22:05:27 +00:00
|
|
|
@index.route('/users', methods=['GET'])
|
|
|
|
@index.route('/users/', methods=['GET'])
|
2013-09-20 22:38:17 +00:00
|
|
|
@process_auth
|
2013-09-20 15:55:44 +00:00
|
|
|
def get_user():
|
2013-11-07 22:09:47 +00:00
|
|
|
if get_authenticated_user():
|
|
|
|
return jsonify({
|
|
|
|
'username': get_authenticated_user().username,
|
|
|
|
'email': get_authenticated_user().email,
|
|
|
|
})
|
2014-02-21 21:07:08 +00:00
|
|
|
elif get_validated_token():
|
|
|
|
return jsonify({
|
|
|
|
'username': '$token',
|
|
|
|
'email': None,
|
|
|
|
})
|
2013-11-07 22:09:47 +00:00
|
|
|
abort(404)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
|
|
|
|
2013-12-30 22:05:27 +00:00
|
|
|
@index.route('/users/<username>/', methods=['PUT'])
|
2013-09-20 22:38:17 +00:00
|
|
|
@process_auth
|
2013-09-20 15:55:44 +00:00
|
|
|
def update_user(username):
|
2014-03-18 23:21:27 +00:00
|
|
|
permission = UserAdminPermission(username)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-09-20 22:38:17 +00:00
|
|
|
if permission.can():
|
|
|
|
update_request = request.get_json()
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-09-20 22:38:17 +00:00
|
|
|
if 'password' in update_request:
|
|
|
|
logger.debug('Updating user password.')
|
|
|
|
model.change_password(get_authenticated_user(),
|
|
|
|
update_request['password'])
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-09-20 22:38:17 +00:00
|
|
|
if 'email' in update_request:
|
|
|
|
logger.debug('Updating user email')
|
|
|
|
model.update_email(get_authenticated_user(), update_request['email'])
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-09-20 22:38:17 +00:00
|
|
|
return jsonify({
|
|
|
|
'username': get_authenticated_user().username,
|
|
|
|
'email': get_authenticated_user().email,
|
|
|
|
})
|
|
|
|
|
|
|
|
abort(403)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
|
|
|
|
2013-12-30 22:05:27 +00:00
|
|
|
@index.route('/repositories/<path:repository>', methods=['PUT'])
|
2013-09-20 22:38:17 +00:00
|
|
|
@process_auth
|
2013-09-20 15:55:44 +00:00
|
|
|
@parse_repository_name
|
2013-10-16 18:24:10 +00:00
|
|
|
@generate_headers(role='write')
|
2013-09-20 15:55:44 +00:00
|
|
|
def create_repository(namespace, repository):
|
|
|
|
image_descriptions = json.loads(request.data)
|
2013-09-20 22:38:17 +00:00
|
|
|
repo = model.get_repository(namespace, repository)
|
|
|
|
|
2013-10-16 18:24:10 +00:00
|
|
|
if not repo and get_authenticated_user() is None:
|
2013-12-20 21:21:07 +00:00
|
|
|
logger.debug('Attempt to create new repository without user auth.')
|
2014-01-28 23:29:45 +00:00
|
|
|
abort(401,
|
|
|
|
message='Cannot create a repository as a guest. Please login via "docker login" first.',
|
|
|
|
issue='no-login')
|
2013-10-16 18:24:10 +00:00
|
|
|
|
|
|
|
elif repo:
|
2013-09-20 22:38:17 +00:00
|
|
|
permission = ModifyRepositoryPermission(namespace, repository)
|
|
|
|
if not permission.can():
|
2014-01-28 23:29:45 +00:00
|
|
|
abort(403,
|
|
|
|
message='You do not have permission to modify repository %(namespace)s/%(repository)s',
|
|
|
|
issue='no-repo-write-permission',
|
|
|
|
namespace=namespace, repository=repository)
|
2013-09-20 22:47:47 +00:00
|
|
|
|
2013-09-26 19:58:11 +00:00
|
|
|
else:
|
2013-11-11 21:31:29 +00:00
|
|
|
permission = CreateRepositoryPermission(namespace)
|
2013-11-04 20:42:08 +00:00
|
|
|
if not permission.can():
|
|
|
|
logger.info('Attempt to create a new repo with insufficient perms.')
|
2014-01-28 23:29:45 +00:00
|
|
|
abort(403,
|
|
|
|
message='You do not have permission to create repositories in namespace "%(namespace)s"',
|
|
|
|
issue='no-create-permission',
|
|
|
|
namespace=namespace)
|
2013-09-20 22:38:17 +00:00
|
|
|
|
|
|
|
logger.debug('Creaing repository with owner: %s' %
|
|
|
|
get_authenticated_user().username)
|
|
|
|
repo = model.create_repository(namespace, repository,
|
|
|
|
get_authenticated_user())
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2014-02-21 03:26:10 +00:00
|
|
|
added_images = OrderedDict([(desc['id'], desc)
|
|
|
|
for desc in image_descriptions])
|
|
|
|
new_repo_images = dict(added_images)
|
2014-02-21 13:00:47 +00:00
|
|
|
|
2013-09-20 15:55:44 +00:00
|
|
|
for existing in model.get_repository_images(namespace, repository):
|
2013-10-01 18:14:39 +00:00
|
|
|
if existing.docker_image_id in new_repo_images:
|
|
|
|
added_images.pop(existing.docker_image_id)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2014-02-16 22:38:47 +00:00
|
|
|
username = get_authenticated_user() and get_authenticated_user().username
|
2014-02-21 03:26:10 +00:00
|
|
|
translations = {}
|
2013-09-20 15:55:44 +00:00
|
|
|
for image_description in added_images.values():
|
2014-02-25 21:31:52 +00:00
|
|
|
model.find_create_or_link_image(image_description['id'], repo, username,
|
|
|
|
translations)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
|
|
|
response = make_response('Created', 201)
|
2013-10-03 20:19:01 +00:00
|
|
|
|
2013-11-14 19:53:55 +00:00
|
|
|
extra_params = {
|
|
|
|
'repository': '%s/%s' % (namespace, repository),
|
|
|
|
}
|
|
|
|
|
2013-11-27 07:29:31 +00:00
|
|
|
metadata = {
|
|
|
|
'repo': repository,
|
|
|
|
'namespace': namespace
|
|
|
|
}
|
|
|
|
|
2013-10-16 18:24:10 +00:00
|
|
|
if get_authenticated_user():
|
2014-02-07 01:58:26 +00:00
|
|
|
username = get_authenticated_user().username
|
|
|
|
|
|
|
|
mixpanel.track(username, 'push_repo', extra_params)
|
|
|
|
metadata['username'] = username
|
|
|
|
|
|
|
|
# Mark that the user has started pushing the repo.
|
|
|
|
user_data = {
|
|
|
|
'action': 'push_repo',
|
|
|
|
'repository': repository,
|
|
|
|
'namespace': namespace
|
|
|
|
}
|
|
|
|
|
|
|
|
event = app.config['USER_EVENTS'].get_event(username)
|
|
|
|
event.publish_event_data('docker-cli', user_data)
|
|
|
|
|
2013-10-16 18:24:10 +00:00
|
|
|
else:
|
2013-11-14 19:53:55 +00:00
|
|
|
mixpanel.track(get_validated_token().code, 'push_repo', extra_params)
|
2013-11-27 07:29:31 +00:00
|
|
|
metadata['token'] = get_validated_token().friendly_name
|
|
|
|
metadata['token_code'] = get_validated_token().code
|
|
|
|
|
2013-12-02 19:08:10 +00:00
|
|
|
model.log_action('push_repo', namespace, performer=get_authenticated_user(),
|
|
|
|
ip=request.remote_addr, metadata=metadata, repository=repo)
|
2013-10-03 20:19:01 +00:00
|
|
|
|
2013-09-20 15:55:44 +00:00
|
|
|
return response
|
|
|
|
|
|
|
|
|
2013-12-30 22:05:27 +00:00
|
|
|
@index.route('/repositories/<path:repository>/images', methods=['PUT'])
|
2013-09-20 22:38:17 +00:00
|
|
|
@process_auth
|
2013-09-20 15:55:44 +00:00
|
|
|
@parse_repository_name
|
2013-10-16 18:24:10 +00:00
|
|
|
@generate_headers(role='write')
|
2013-09-20 15:55:44 +00:00
|
|
|
def update_images(namespace, repository):
|
2013-09-20 22:38:17 +00:00
|
|
|
permission = ModifyRepositoryPermission(namespace, repository)
|
|
|
|
|
|
|
|
if permission.can():
|
2013-11-16 20:05:26 +00:00
|
|
|
repo = model.get_repository(namespace, repository)
|
|
|
|
if not repo:
|
2013-11-11 23:05:21 +00:00
|
|
|
# Make sure the repo actually exists.
|
2014-01-28 23:29:45 +00:00
|
|
|
abort(404, message='Unknown repository', issue='unknown-repo')
|
2013-11-11 23:05:21 +00:00
|
|
|
|
2013-09-20 22:38:17 +00:00
|
|
|
image_with_checksums = json.loads(request.data)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-11-16 20:05:26 +00:00
|
|
|
updated_tags = {}
|
2013-09-20 22:38:17 +00:00
|
|
|
for image in image_with_checksums:
|
2013-09-26 19:58:11 +00:00
|
|
|
logger.debug('Setting checksum for image id: %s to %s' %
|
2013-10-08 15:29:42 +00:00
|
|
|
(image['id'], image['checksum']))
|
2013-11-16 20:05:26 +00:00
|
|
|
updated_tags[image['Tag']] = image['id']
|
2013-11-18 17:12:35 +00:00
|
|
|
model.set_image_checksum(image['id'], repo, image['checksum'])
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2014-02-07 01:58:26 +00:00
|
|
|
if get_authenticated_user():
|
|
|
|
username = get_authenticated_user().username
|
|
|
|
|
|
|
|
# Mark that the user has pushed the repo.
|
|
|
|
user_data = {
|
|
|
|
'action': 'pushed_repo',
|
|
|
|
'repository': repository,
|
|
|
|
'namespace': namespace
|
|
|
|
}
|
|
|
|
|
|
|
|
event = app.config['USER_EVENTS'].get_event(username)
|
|
|
|
event.publish_event_data('docker-cli', user_data)
|
|
|
|
|
2014-02-06 19:13:35 +00:00
|
|
|
num_removed = model.garbage_collect_repository(namespace, repository)
|
|
|
|
|
2013-11-16 20:05:26 +00:00
|
|
|
# Generate a job for each webhook that has been added to this repo
|
|
|
|
webhooks = model.list_webhooks(namespace, repository)
|
|
|
|
for webhook in webhooks:
|
|
|
|
webhook_data = json.loads(webhook.parameters)
|
|
|
|
repo_string = '%s/%s' % (namespace, repository)
|
|
|
|
logger.debug('Creating webhook for repository \'%s\' for url \'%s\'' %
|
|
|
|
(repo_string, webhook_data['url']))
|
|
|
|
webhook_data['payload'] = {
|
|
|
|
'repository': repo_string,
|
|
|
|
'namespace': namespace,
|
|
|
|
'name': repository,
|
|
|
|
'docker_url': 'quay.io/%s' % repo_string,
|
|
|
|
'homepage': 'https://quay.io/repository/%s' % repo_string,
|
|
|
|
'visibility': repo.visibility.name,
|
|
|
|
'updated_tags': updated_tags,
|
2014-02-06 19:13:35 +00:00
|
|
|
'pushed_image_count': len(image_with_checksums),
|
|
|
|
'pruned_image_count': num_removed,
|
2013-11-16 20:05:26 +00:00
|
|
|
}
|
|
|
|
webhook_queue.put(json.dumps(webhook_data))
|
|
|
|
|
2013-09-20 22:38:17 +00:00
|
|
|
return make_response('Updated', 204)
|
|
|
|
|
|
|
|
abort(403)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
|
|
|
|
2013-12-30 22:05:27 +00:00
|
|
|
@index.route('/repositories/<path:repository>/images', methods=['GET'])
|
2013-09-20 22:38:17 +00:00
|
|
|
@process_auth
|
2013-09-20 15:55:44 +00:00
|
|
|
@parse_repository_name
|
2013-10-16 18:24:10 +00:00
|
|
|
@generate_headers(role='read')
|
2013-09-20 15:55:44 +00:00
|
|
|
def get_repository_images(namespace, repository):
|
2013-09-20 22:38:17 +00:00
|
|
|
permission = ReadRepositoryPermission(namespace, repository)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-09-20 22:38:17 +00:00
|
|
|
# TODO invalidate token?
|
2013-11-27 07:29:31 +00:00
|
|
|
is_public = model.repository_is_public(namespace, repository)
|
|
|
|
if permission.can() or is_public:
|
2013-11-11 23:05:21 +00:00
|
|
|
# We can't rely on permissions to tell us if a repo exists anymore
|
|
|
|
repo = model.get_repository(namespace, repository)
|
|
|
|
if not repo:
|
2014-01-28 23:29:45 +00:00
|
|
|
abort(404, message='Unknown repository', issue='unknown-repo')
|
2013-11-11 23:05:21 +00:00
|
|
|
|
2013-09-20 22:38:17 +00:00
|
|
|
all_images = []
|
|
|
|
for image in model.get_repository_images(namespace, repository):
|
|
|
|
new_image_view = {
|
2013-10-01 18:14:39 +00:00
|
|
|
'id': image.docker_image_id,
|
2013-09-20 22:38:17 +00:00
|
|
|
'checksum': image.checksum,
|
|
|
|
}
|
|
|
|
all_images.append(new_image_view)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-09-20 22:38:17 +00:00
|
|
|
resp = make_response(json.dumps(all_images), 200)
|
|
|
|
resp.mimetype = 'application/json'
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-11-29 05:04:50 +00:00
|
|
|
metadata = {
|
|
|
|
'repo': repository,
|
|
|
|
'namespace': namespace,
|
|
|
|
}
|
2013-10-03 23:18:03 +00:00
|
|
|
if get_authenticated_user():
|
2013-12-02 19:08:10 +00:00
|
|
|
metadata['username'] = get_authenticated_user().username
|
2013-11-29 05:04:50 +00:00
|
|
|
elif get_validated_token():
|
|
|
|
metadata['token'] = get_validated_token().friendly_name
|
|
|
|
metadata['token_code'] = get_validated_token().code
|
|
|
|
else:
|
|
|
|
metadata['public'] = True
|
2013-10-03 23:18:03 +00:00
|
|
|
|
2013-12-02 19:08:10 +00:00
|
|
|
pull_username = 'anonymous'
|
|
|
|
if get_authenticated_user():
|
|
|
|
pull_username = get_authenticated_user().username
|
|
|
|
|
2013-11-14 19:53:55 +00:00
|
|
|
extra_params = {
|
|
|
|
'repository': '%s/%s' % (namespace, repository),
|
|
|
|
}
|
2013-10-03 20:19:01 +00:00
|
|
|
|
2013-11-27 07:29:31 +00:00
|
|
|
mixpanel.track(pull_username, 'pull_repo', extra_params)
|
2013-12-02 19:08:10 +00:00
|
|
|
model.log_action('pull_repo', namespace,
|
|
|
|
performer=get_authenticated_user(),
|
|
|
|
ip=request.remote_addr, metadata=metadata,
|
|
|
|
repository=repo)
|
2013-09-20 22:38:17 +00:00
|
|
|
return resp
|
2013-09-20 15:55:44 +00:00
|
|
|
|
2013-11-11 23:05:21 +00:00
|
|
|
abort(403)
|
2013-09-20 15:55:44 +00:00
|
|
|
|
|
|
|
|
2013-12-30 22:05:27 +00:00
|
|
|
@index.route('/repositories/<path:repository>/images', methods=['DELETE'])
|
2013-09-20 22:38:17 +00:00
|
|
|
@process_auth
|
2013-09-20 15:55:44 +00:00
|
|
|
@parse_repository_name
|
2013-10-16 18:24:10 +00:00
|
|
|
@generate_headers(role='write')
|
2013-09-20 15:55:44 +00:00
|
|
|
def delete_repository_images(namespace, repository):
|
2014-01-28 23:29:45 +00:00
|
|
|
abort(501, 'Not Implemented', issue='not-implemented')
|
2013-09-20 15:55:44 +00:00
|
|
|
|
|
|
|
|
2013-12-30 22:05:27 +00:00
|
|
|
@index.route('/repositories/<path:repository>/auth', methods=['PUT'])
|
2013-09-20 15:55:44 +00:00
|
|
|
@parse_repository_name
|
|
|
|
def put_repository_auth(namespace, repository):
|
2014-01-28 23:29:45 +00:00
|
|
|
abort(501, 'Not Implemented', issue='not-implemented')
|
2013-09-20 15:55:44 +00:00
|
|
|
|
|
|
|
|
2013-12-30 22:05:27 +00:00
|
|
|
@index.route('/search', methods=['GET'])
|
2013-09-20 15:55:44 +00:00
|
|
|
def get_search():
|
2014-01-28 23:29:45 +00:00
|
|
|
abort(501, 'Not Implemented', issue='not-implemented')
|
2013-09-25 16:45:12 +00:00
|
|
|
|
|
|
|
|
2013-12-30 22:05:27 +00:00
|
|
|
@index.route('/_ping')
|
|
|
|
@index.route('/_ping')
|
2013-09-25 16:45:12 +00:00
|
|
|
def ping():
|
|
|
|
response = make_response('true', 200)
|
|
|
|
response.headers['X-Docker-Registry-Version'] = '0.6.0'
|
|
|
|
return response
|