2015-07-16 19:49:06 +00:00
|
|
|
# XXX This code is not yet ready to be run in production, and should remain disabled until such
|
|
|
|
# XXX time as this notice is removed.
|
|
|
|
|
2015-07-06 19:00:07 +00:00
|
|
|
import logging
|
2015-08-12 20:39:32 +00:00
|
|
|
import re
|
2015-07-06 19:00:07 +00:00
|
|
|
|
2015-08-12 20:39:32 +00:00
|
|
|
from flask import make_response, url_for, request, redirect, Response, abort as flask_abort
|
2015-07-06 19:00:07 +00:00
|
|
|
|
2015-07-15 21:25:41 +00:00
|
|
|
from app import storage, app
|
2015-08-12 20:39:32 +00:00
|
|
|
from data import model, database
|
2015-07-06 19:00:07 +00:00
|
|
|
from digest import digest_tools
|
|
|
|
from endpoints.v2 import v2_bp, require_repo_read, require_repo_write, get_input_stream
|
2015-08-12 20:39:32 +00:00
|
|
|
from endpoints.v2.errors import BlobUnknown, BlobUploadInvalid, BlobUploadUnknown
|
2015-07-06 19:00:07 +00:00
|
|
|
from auth.jwt_auth import process_jwt_auth
|
|
|
|
from endpoints.decorators import anon_protect
|
2015-08-12 20:39:32 +00:00
|
|
|
from util.cache import cache_control
|
|
|
|
from util.registry.filelike import wrap_with_hash
|
|
|
|
from storage.basestorage import InvalidChunkException
|
2015-07-06 19:00:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2015-07-16 19:49:06 +00:00
|
|
|
BASE_BLOB_ROUTE = '/<namespace>/<repo_name>/blobs/<regex("{0}"):digest>'
|
|
|
|
BLOB_DIGEST_ROUTE = BASE_BLOB_ROUTE.format(digest_tools.DIGEST_PATTERN)
|
2015-08-12 20:39:32 +00:00
|
|
|
RANGE_HEADER_REGEX = re.compile(r'^bytes=([0-9]+)-([0-9]+)$')
|
|
|
|
|
|
|
|
|
|
|
|
class _InvalidRangeHeader(Exception):
|
|
|
|
pass
|
2015-07-16 19:49:06 +00:00
|
|
|
|
|
|
|
|
|
|
|
@v2_bp.route(BLOB_DIGEST_ROUTE, methods=['HEAD'])
|
2015-07-06 19:00:07 +00:00
|
|
|
@process_jwt_auth
|
|
|
|
@require_repo_read
|
|
|
|
@anon_protect
|
|
|
|
def check_blob_existence(namespace, repo_name, digest):
|
|
|
|
try:
|
2015-08-12 20:39:32 +00:00
|
|
|
model.image.get_repo_image_by_storage_checksum(namespace, repo_name, digest)
|
2015-07-06 19:00:07 +00:00
|
|
|
|
|
|
|
# The response body must be empty for a successful HEAD request
|
|
|
|
return make_response('')
|
2015-08-12 20:39:32 +00:00
|
|
|
except model.InvalidImageException:
|
|
|
|
raise BlobUnknown()
|
|
|
|
|
|
|
|
|
|
|
|
def _base_blob_fetch(namespace, repo_name, digest):
|
|
|
|
""" Some work that is common to both GET and HEAD requests. Callers MUST check for proper
|
|
|
|
authorization before calling this method.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
found = model.blob.get_repo_blob_by_digest(namespace, repo_name, digest)
|
2015-07-15 21:25:41 +00:00
|
|
|
except model.BlobDoesNotExist:
|
2015-08-12 20:39:32 +00:00
|
|
|
raise BlobUnknown()
|
|
|
|
|
|
|
|
headers = {
|
|
|
|
'Docker-Content-Digest': digest,
|
|
|
|
}
|
|
|
|
|
|
|
|
# Add the Accept-Ranges header if the storage engine supports resumable
|
|
|
|
# downloads.
|
|
|
|
if storage.get_supports_resumable_downloads(found.storage.locations):
|
|
|
|
logger.debug('Storage supports resumable downloads')
|
|
|
|
headers['Accept-Ranges'] = 'bytes'
|
|
|
|
|
|
|
|
return found, headers
|
|
|
|
|
|
|
|
|
|
|
|
@v2_bp.route(BLOB_DIGEST_ROUTE, methods=['HEAD'])
|
|
|
|
@process_jwt_auth
|
|
|
|
@require_repo_read
|
|
|
|
@anon_protect
|
|
|
|
@cache_control(max_age=31436000)
|
|
|
|
def check_blob_exists(namespace, repo_name, digest):
|
|
|
|
_, headers = _base_blob_fetch(namespace, repo_name, digest)
|
|
|
|
|
|
|
|
response = make_response('')
|
|
|
|
response.headers.extend(headers)
|
|
|
|
return response
|
2015-07-06 19:00:07 +00:00
|
|
|
|
|
|
|
|
2015-07-16 19:49:06 +00:00
|
|
|
@v2_bp.route(BLOB_DIGEST_ROUTE, methods=['GET'])
|
2015-07-06 19:00:07 +00:00
|
|
|
@process_jwt_auth
|
|
|
|
@require_repo_read
|
|
|
|
@anon_protect
|
2015-08-12 20:39:32 +00:00
|
|
|
@cache_control(max_age=31536000)
|
2015-07-06 19:00:07 +00:00
|
|
|
def download_blob(namespace, repo_name, digest):
|
2015-08-12 20:39:32 +00:00
|
|
|
found, headers = _base_blob_fetch(namespace, repo_name, digest)
|
|
|
|
|
|
|
|
path = storage.blob_path(digest)
|
|
|
|
if not found.cas_path:
|
|
|
|
logger.info('Generating legacy v1 path for image: %s', digest)
|
|
|
|
path = storage.v1_image_layer_path(found.uuid)
|
|
|
|
|
|
|
|
logger.debug('Looking up the direct download URL')
|
|
|
|
direct_download_url = storage.get_direct_download_url(found.locations, path)
|
|
|
|
|
|
|
|
if direct_download_url:
|
|
|
|
logger.debug('Returning direct download URL')
|
|
|
|
resp = redirect(direct_download_url)
|
|
|
|
resp.headers.extend(headers)
|
|
|
|
return resp
|
|
|
|
|
|
|
|
logger.debug('Streaming layer data')
|
|
|
|
|
|
|
|
# Close the database handle here for this process before we send the long download.
|
|
|
|
database.close_db_filter(None)
|
|
|
|
|
|
|
|
return Response(storage.stream_read(found.locations, path), headers=headers)
|
|
|
|
|
|
|
|
|
2015-08-13 19:43:49 +00:00
|
|
|
def _render_range(num_uploaded_bytes, with_bytes_prefix=True):
|
|
|
|
return '{0}0-{1}'.format('bytes=' if with_bytes_prefix else '', num_uploaded_bytes - 1)
|
2015-07-06 19:00:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@v2_bp.route('/<namespace>/<repo_name>/blobs/uploads/', methods=['POST'])
|
|
|
|
@process_jwt_auth
|
|
|
|
@require_repo_write
|
|
|
|
@anon_protect
|
|
|
|
def start_blob_upload(namespace, repo_name):
|
2015-08-12 20:39:32 +00:00
|
|
|
location_name = storage.preferred_locations[0]
|
|
|
|
new_upload_uuid = storage.initiate_chunked_upload(location_name)
|
|
|
|
model.blob.initiate_upload(namespace, repo_name, new_upload_uuid, location_name)
|
|
|
|
|
|
|
|
digest = request.args.get('digest', None)
|
|
|
|
if digest is None:
|
|
|
|
# The user will send the blob data in another request
|
|
|
|
accepted = make_response('', 202)
|
|
|
|
accepted.headers['Location'] = url_for('v2.upload_chunk', namespace=namespace,
|
|
|
|
repo_name=repo_name, upload_uuid=new_upload_uuid)
|
|
|
|
accepted.headers['Range'] = _render_range(0)
|
|
|
|
accepted.headers['Docker-Upload-UUID'] = new_upload_uuid
|
|
|
|
return accepted
|
|
|
|
else:
|
|
|
|
# The user plans to send us the entire body right now
|
2015-08-13 19:43:49 +00:00
|
|
|
uploaded = _upload_chunk(namespace, repo_name, new_upload_uuid)
|
2015-08-12 20:39:32 +00:00
|
|
|
uploaded.save()
|
|
|
|
|
|
|
|
return _finish_upload(namespace, repo_name, uploaded, digest)
|
|
|
|
|
|
|
|
|
|
|
|
@v2_bp.route('/<namespace>/<repo_name>/blobs/uploads/<upload_uuid>', methods=['GET'])
|
|
|
|
@process_jwt_auth
|
|
|
|
@require_repo_write
|
|
|
|
@anon_protect
|
|
|
|
def fetch_existing_upload(namespace, repo_name, upload_uuid):
|
|
|
|
try:
|
|
|
|
found = model.blob.get_blob_upload(namespace, repo_name, upload_uuid)
|
|
|
|
except model.InvalidBlobUpload:
|
|
|
|
raise BlobUploadUnknown()
|
|
|
|
|
|
|
|
accepted = make_response('', 204)
|
|
|
|
accepted.headers['Range'] = _render_range(found.byte_count)
|
|
|
|
accepted.headers['Docker-Upload-UUID'] = upload_uuid
|
|
|
|
return accepted
|
|
|
|
|
|
|
|
|
|
|
|
def _current_request_path():
|
|
|
|
return '{0}{1}'.format(request.script_root, request.path)
|
|
|
|
|
|
|
|
|
|
|
|
def _range_not_satisfiable(valid_end):
|
|
|
|
invalid_range = make_response('', 416)
|
|
|
|
invalid_range.headers['Location'] = _current_request_path()
|
|
|
|
invalid_range.headers['Range'] = '0-{0}'.format(valid_end)
|
|
|
|
invalid_range.headers['Docker-Upload-UUID'] = request.view_args['upload_uuid']
|
|
|
|
flask_abort(invalid_range)
|
|
|
|
|
|
|
|
|
|
|
|
def _parse_range_header(range_header_text, valid_start):
|
|
|
|
""" Parses the range header, and returns a tuple of the start offset and the length,
|
|
|
|
or raises an _InvalidRangeHeader exception.
|
|
|
|
"""
|
|
|
|
found = RANGE_HEADER_REGEX.match(range_header_text)
|
|
|
|
if found is None:
|
|
|
|
raise _InvalidRangeHeader()
|
|
|
|
|
|
|
|
start = int(found.group(1))
|
|
|
|
length = int(found.group(2)) - start
|
|
|
|
|
|
|
|
if start != valid_start or length <= 0:
|
|
|
|
raise _InvalidRangeHeader()
|
|
|
|
|
|
|
|
return (start, length)
|
|
|
|
|
|
|
|
|
2015-08-13 19:43:49 +00:00
|
|
|
def _upload_chunk(namespace, repo_name, upload_uuid):
|
2015-08-12 20:39:32 +00:00
|
|
|
""" Common code among the various uploading paths for appending data to blobs.
|
|
|
|
Callers MUST call .save() or .delete_instance() on the returned database object.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
found = model.blob.get_blob_upload(namespace, repo_name, upload_uuid)
|
|
|
|
except model.InvalidBlobUpload:
|
|
|
|
raise BlobUploadUnknown()
|
|
|
|
|
|
|
|
start_offset, length = 0, -1
|
|
|
|
range_header = request.headers.get('range', None)
|
|
|
|
if range_header is not None:
|
|
|
|
try:
|
|
|
|
start_offset, length = _parse_range_header(range_header, found.byte_count)
|
|
|
|
except _InvalidRangeHeader:
|
|
|
|
_range_not_satisfiable(found.byte_count)
|
|
|
|
|
|
|
|
input_fp = wrap_with_hash(get_input_stream(request), found.sha_state)
|
|
|
|
|
|
|
|
try:
|
2015-08-13 19:35:37 +00:00
|
|
|
length_written = storage.stream_upload_chunk({found.location.name}, upload_uuid, start_offset,
|
|
|
|
length, input_fp)
|
2015-08-12 20:39:32 +00:00
|
|
|
except InvalidChunkException:
|
|
|
|
_range_not_satisfiable(found.byte_count)
|
|
|
|
|
2015-08-13 19:35:37 +00:00
|
|
|
found.byte_count += length_written
|
2015-08-12 20:39:32 +00:00
|
|
|
return found
|
|
|
|
|
|
|
|
|
|
|
|
def _finish_upload(namespace, repo_name, upload_obj, expected_digest):
|
|
|
|
computed_digest = digest_tools.sha256_digest_from_hashlib(upload_obj.sha_state)
|
|
|
|
if not digest_tools.digests_equal(computed_digest, expected_digest):
|
|
|
|
raise BlobUploadInvalid()
|
|
|
|
|
|
|
|
final_blob_location = digest_tools.content_path(expected_digest)
|
|
|
|
storage.complete_chunked_upload({upload_obj.location.name}, upload_obj.uuid, final_blob_location)
|
|
|
|
model.blob.store_blob_record_and_temp_link(namespace, repo_name, expected_digest,
|
|
|
|
upload_obj.location,
|
|
|
|
app.config['PUSH_TEMP_TAG_EXPIRATION_SEC'])
|
|
|
|
upload_obj.delete_instance()
|
|
|
|
|
|
|
|
response = make_response('', 201)
|
|
|
|
response.headers['Docker-Content-Digest'] = expected_digest
|
|
|
|
response.headers['Location'] = url_for('v2.download_blob', namespace=namespace,
|
|
|
|
repo_name=repo_name, digest=expected_digest)
|
|
|
|
return response
|
|
|
|
|
|
|
|
|
|
|
|
@v2_bp.route('/<namespace>/<repo_name>/blobs/uploads/<upload_uuid>', methods=['PATCH'])
|
|
|
|
@process_jwt_auth
|
|
|
|
@require_repo_write
|
|
|
|
@anon_protect
|
|
|
|
def upload_chunk(namespace, repo_name, upload_uuid):
|
2015-08-13 19:43:49 +00:00
|
|
|
upload = _upload_chunk(namespace, repo_name, upload_uuid)
|
2015-08-12 20:39:32 +00:00
|
|
|
upload.save()
|
|
|
|
|
2015-08-13 19:35:37 +00:00
|
|
|
accepted = make_response('', 204)
|
2015-08-12 20:39:32 +00:00
|
|
|
accepted.headers['Location'] = _current_request_path()
|
2015-08-13 19:35:37 +00:00
|
|
|
accepted.headers['Range'] = _render_range(upload.byte_count, with_bytes_prefix=False)
|
2015-08-12 20:39:32 +00:00
|
|
|
accepted.headers['Docker-Upload-UUID'] = upload_uuid
|
2015-07-06 19:00:07 +00:00
|
|
|
return accepted
|
|
|
|
|
|
|
|
|
|
|
|
@v2_bp.route('/<namespace>/<repo_name>/blobs/uploads/<upload_uuid>', methods=['PUT'])
|
|
|
|
@process_jwt_auth
|
|
|
|
@require_repo_write
|
|
|
|
@anon_protect
|
2015-08-12 20:39:32 +00:00
|
|
|
def monolithic_upload_or_last_chunk(namespace, repo_name, upload_uuid):
|
2015-07-06 19:00:07 +00:00
|
|
|
digest = request.args.get('digest', None)
|
2015-08-12 20:39:32 +00:00
|
|
|
if digest is None:
|
|
|
|
raise BlobUploadInvalid()
|
|
|
|
|
2015-08-13 19:43:49 +00:00
|
|
|
found = _upload_chunk(namespace, repo_name, upload_uuid)
|
2015-08-12 20:39:32 +00:00
|
|
|
return _finish_upload(namespace, repo_name, found, digest)
|
|
|
|
|
|
|
|
|
|
|
|
@v2_bp.route('/<namespace>/<repo_name>/blobs/uploads/<upload_uuid>', methods=['DELETE'])
|
|
|
|
@process_jwt_auth
|
|
|
|
@require_repo_write
|
|
|
|
@anon_protect
|
|
|
|
def cancel_upload(namespace, repo_name, upload_uuid):
|
|
|
|
try:
|
|
|
|
found = model.blob.get_blob_upload(namespace, repo_name, upload_uuid)
|
|
|
|
except model.InvalidBlobUpload:
|
|
|
|
raise BlobUploadUnknown()
|
|
|
|
|
|
|
|
# We delete the record for the upload first, since if the partial upload in
|
|
|
|
# storage fails to delete, it doesn't break anything
|
|
|
|
found.delete_instance()
|
|
|
|
storage.cancel_chunked_upload({found.location.name}, found.uuid)
|
|
|
|
|
|
|
|
return make_response('', 204)
|