Index that kinda works and is backed by a database. Still lots to do.
This commit is contained in:
commit
8e169b1026
9 changed files with 477 additions and 0 deletions
3
.gitignore
vendored
Normal file
3
.gitignore
vendored
Normal file
|
@ -0,0 +1,3 @@
|
|||
*.pyc
|
||||
venv
|
||||
test.db
|
10
app.py
Normal file
10
app.py
Normal file
|
@ -0,0 +1,10 @@
|
|||
from flask import Flask, make_response, jsonify
|
||||
|
||||
app = Flask(__name__)
|
||||
|
||||
@app.route('/_ping')
|
||||
@app.route('/v1/_ping')
|
||||
def ping():
|
||||
response = make_response('true', 200);
|
||||
response.headers['X-Docker-Registry-Version'] = '0.6.0'
|
||||
return response
|
99
auth.py
Normal file
99
auth.py
Normal file
|
@ -0,0 +1,99 @@
|
|||
import logging
|
||||
|
||||
from functools import wraps
|
||||
from werkzeug import LocalProxy
|
||||
from flask import request, make_response, _request_ctx_stack
|
||||
from base64 import b64decode
|
||||
|
||||
import model
|
||||
|
||||
from util import parse_namespace_repository
|
||||
|
||||
logger = logging.getLogger(__name__)
|
||||
|
||||
|
||||
def _get_user():
|
||||
return getattr(_request_ctx_stack.top, 'authenticated_user', None)
|
||||
|
||||
|
||||
def _get_token():
|
||||
return getattr(_request_ctx_stack.top, 'validated_token', None)
|
||||
|
||||
|
||||
authenticated_user = LocalProxy(_get_user)
|
||||
validated_token = LocalProxy(_get_token)
|
||||
|
||||
|
||||
def check_basic_auth():
|
||||
auth = request.headers.get('authorization', '')
|
||||
normalized = [part.strip() for part in auth.split(' ') if part]
|
||||
if normalized[0].lower() != 'basic' or len(normalized) != 2:
|
||||
logger.debug('Invalid basic auth format.')
|
||||
return False
|
||||
|
||||
credentials = b64decode(normalized[1]).split(':')
|
||||
|
||||
if len(credentials) != 2:
|
||||
logger.debug('Invalid basic auth credential formet.')
|
||||
|
||||
authenticated = model.verify_user(credentials[0], credentials[1])
|
||||
|
||||
if authenticated:
|
||||
logger.debug('Successfully validated user: %s' % authenticated.username)
|
||||
ctx = _request_ctx_stack.top
|
||||
ctx.authenticated_user = authenticated
|
||||
|
||||
return True
|
||||
|
||||
# We weren't able to authenticate via basic auth.
|
||||
return False
|
||||
|
||||
|
||||
def check_token():
|
||||
auth = request.headers.get('authorization', '')
|
||||
logger.debug('Validating auth token: %s' % auth)
|
||||
|
||||
normalized = [part.strip() for part in auth.split(' ') if part]
|
||||
if normalized[0].lower() != 'token' or len(normalized) != 3:
|
||||
logger.debug('Invalid token format.')
|
||||
return False
|
||||
|
||||
token_details = normalized[2].split(',')
|
||||
|
||||
if len(token_details) != 3:
|
||||
logger.debug('Invalid token format.')
|
||||
return False
|
||||
|
||||
token_vals = {val[0]: val[1] for val in
|
||||
(detail.split('=') for detail in token_details)}
|
||||
if ('signature' not in token_vals or 'access' not in token_vals or
|
||||
'repository' not in token_vals):
|
||||
logger.debug('Invalid token components.')
|
||||
return False
|
||||
|
||||
unquoted = token_vals['repository'][1:-1]
|
||||
namespace, repository = parse_namespace_repository(unquoted)
|
||||
logger.debug('Validing signature: %s' % token_vals['signature'])
|
||||
validated = model.verify_token(namespace, repository,
|
||||
token_vals['signature'])
|
||||
|
||||
if validated:
|
||||
logger.debug('Successfully validated token: %s' % validated.code)
|
||||
ctx = _request_ctx_stack.top
|
||||
ctx.validated_token = validated
|
||||
|
||||
return True
|
||||
|
||||
# WE weren't able to authenticate the token
|
||||
logger.debug('Token could not be validated.')
|
||||
return False
|
||||
|
||||
|
||||
def requires_auth(f):
|
||||
@wraps(f)
|
||||
def wrapper(*args, **kwargs):
|
||||
if not check_basic_auth() and not check_token():
|
||||
return make_response('Invalid credentials.', 401)
|
||||
logger.debug('Successfully authenticated user or token.')
|
||||
return f(*args, **kwargs)
|
||||
return wrapper
|
74
database.py
Normal file
74
database.py
Normal file
|
@ -0,0 +1,74 @@
|
|||
import string
|
||||
from random import SystemRandom
|
||||
|
||||
from peewee import *
|
||||
from peewee import create_model_tables
|
||||
|
||||
from datetime import datetime
|
||||
|
||||
db = SqliteDatabase('test.db', threadlocals=True)
|
||||
|
||||
|
||||
class BaseModel(Model):
|
||||
class Meta:
|
||||
database = db
|
||||
|
||||
|
||||
class User(BaseModel):
|
||||
username = CharField(primary_key=True)
|
||||
password_hash = CharField()
|
||||
email = CharField()
|
||||
verified = BooleanField(default=False)
|
||||
|
||||
|
||||
class Repository(BaseModel):
|
||||
repository_id = PrimaryKeyField()
|
||||
namespace = CharField()
|
||||
name = CharField()
|
||||
|
||||
class Meta:
|
||||
database = db
|
||||
indexes = (
|
||||
# create a unique index on namespace and name
|
||||
(('namespace', 'name'), True),
|
||||
)
|
||||
|
||||
|
||||
def random_string_generator(length=16):
|
||||
def random_string():
|
||||
random = SystemRandom()
|
||||
return ''.join([random.choice(string.ascii_uppercase + string.digits)
|
||||
for x in range(length)])
|
||||
return random_string
|
||||
|
||||
|
||||
class AccessToken(BaseModel):
|
||||
token_id = PrimaryKeyField()
|
||||
code = CharField(default=random_string_generator())
|
||||
repository = ForeignKeyField(Repository)
|
||||
created = DateTimeField(default=datetime.now)
|
||||
|
||||
|
||||
class Image(BaseModel):
|
||||
image_id = CharField(primary_key=True)
|
||||
checksum = CharField(null=True)
|
||||
|
||||
|
||||
class RepositoryImage(BaseModel):
|
||||
repository = ForeignKeyField(Repository)
|
||||
image = ForeignKeyField(Image)
|
||||
tag = CharField()
|
||||
|
||||
class Meta:
|
||||
database = db
|
||||
indexes = (
|
||||
# we don't really want duplicates
|
||||
(('repository', 'image', 'tag'), True),
|
||||
)
|
||||
|
||||
|
||||
def create_tables():
|
||||
create_model_tables([User, Repository, Image, RepositoryImage, AccessToken])
|
||||
|
||||
if __name__ == '__main__':
|
||||
create_tables()
|
175
index.py
Normal file
175
index.py
Normal file
|
@ -0,0 +1,175 @@
|
|||
import json
|
||||
import urllib
|
||||
import json
|
||||
import logging
|
||||
|
||||
from flask import request, make_response, jsonify
|
||||
from functools import wraps
|
||||
|
||||
from app import app
|
||||
from auth import requires_auth, authenticated_user, validated_token
|
||||
from util import parse_namespace_repository
|
||||
|
||||
import model
|
||||
|
||||
logger = logging.getLogger(__name__)
|
||||
|
||||
|
||||
REGISTRY_SERVER = 'localhost:5003'
|
||||
|
||||
|
||||
def parse_repository_name(f):
|
||||
@wraps(f)
|
||||
def wrapper(repository, *args, **kwargs):
|
||||
(namespace, repository) = parse_namespace_repository(repository)
|
||||
return f(namespace, repository, *args, **kwargs)
|
||||
return wrapper
|
||||
|
||||
|
||||
def generate_headers(access):
|
||||
def add_headers(f):
|
||||
@wraps(f)
|
||||
def wrapper(namespace, repository, *args, **kwargs):
|
||||
response = f(namespace, repository, *args, **kwargs)
|
||||
|
||||
response.headers['X-Docker-Endpoints'] = REGISTRY_SERVER
|
||||
|
||||
if request.headers.get('X-Docker-Token', ''):
|
||||
repo = model.create_or_fetch_repository(namespace, repository)
|
||||
token = model.create_access_token(repo)
|
||||
token_str = ('Token signature=%s,repository="%s/%s",access=%s' %
|
||||
(token.code, namespace, repository, access))
|
||||
response.headers['WWW-Authenticate'] = token_str
|
||||
response.headers['X-Docker-Token'] = token_str
|
||||
|
||||
return response
|
||||
return wrapper
|
||||
return add_headers
|
||||
|
||||
|
||||
@app.route('/v1/users', methods=['POST'])
|
||||
@app.route('/v1/users/', methods=['POST'])
|
||||
def create_user():
|
||||
user_data = request.get_json()
|
||||
model.create_user(user_data['username'], user_data['password'],
|
||||
user_data['email'])
|
||||
return make_response('Created', 201)
|
||||
|
||||
|
||||
@app.route('/v1/users', methods=['GET'])
|
||||
@app.route('/v1/users/', methods=['GET'])
|
||||
@requires_auth
|
||||
def get_user():
|
||||
return jsonify({
|
||||
'username': authenticated_user.username,
|
||||
'email': authenticated_user.email,
|
||||
})
|
||||
|
||||
|
||||
@app.route('/v1/users/<username>/', methods=['PUT'])
|
||||
@requires_auth
|
||||
def update_user(username):
|
||||
if authenticated_user.username != username:
|
||||
return make_response('Forbidden', 403)
|
||||
|
||||
update_request = request.get_json()
|
||||
|
||||
if update_request.has_key('password'):
|
||||
logger.debug('Updating user password.')
|
||||
model.change_password(authenticated_user, update_request['password'])
|
||||
|
||||
if update_request.has_key('email'):
|
||||
logger.debug('Updating user email')
|
||||
model.update_email(authenticated_user, update_request['email'])
|
||||
|
||||
return jsonify({
|
||||
'username': authenticated_user.username,
|
||||
'email': authenticated_user.email,
|
||||
})
|
||||
|
||||
|
||||
@app.route('/v1/repositories/<path:repository>', methods=['PUT'])
|
||||
@requires_auth
|
||||
@parse_repository_name
|
||||
@generate_headers(access='write')
|
||||
def create_repository(namespace, repository):
|
||||
image_descriptions = json.loads(request.data)
|
||||
|
||||
repo = model.create_or_fetch_repository(namespace, repository)
|
||||
|
||||
new_repo_images = {desc['id']: desc for desc in image_descriptions}
|
||||
added_images = dict(new_repo_images)
|
||||
for existing in model.get_repository_images(namespace, repository):
|
||||
if existing.image_id in new_repo_images:
|
||||
added_images.pop(existing.image_id)
|
||||
else:
|
||||
existing.repositoryimage.delete()
|
||||
|
||||
for image_description in added_images.values():
|
||||
image = model.create_image(image_description['id'])
|
||||
model.assign_image_repository(repo, image, image_description['Tag'])
|
||||
|
||||
response = make_response('Created', 201)
|
||||
return response
|
||||
|
||||
|
||||
@app.route('/v1/repositories/<path:repository>/images', methods=['PUT'])
|
||||
@requires_auth
|
||||
@parse_repository_name
|
||||
@generate_headers(access='write')
|
||||
def update_images(namespace, repository):
|
||||
image_with_checksums = json.loads(request.data)
|
||||
|
||||
for image in image_with_checksums:
|
||||
model.set_image_checksum(image['id'], image['checksum'])
|
||||
|
||||
return make_response('Updated', 204)
|
||||
|
||||
|
||||
@app.route('/v1/repositories/<path:repository>/images', methods=['GET'])
|
||||
@requires_auth
|
||||
@parse_repository_name
|
||||
@generate_headers(access='read')
|
||||
def get_repository_images(namespace, repository):
|
||||
if validated_token and (validated_token.repository.name != repository or
|
||||
validated_token.repository.namespace != namespace):
|
||||
return make_response('Forbidden', 403)
|
||||
|
||||
#TODO check user has permission for repository
|
||||
|
||||
#TODO invalidate token
|
||||
|
||||
all_images = []
|
||||
for image in model.get_repository_images(namespace, repository):
|
||||
new_image_view = {
|
||||
'id': image.image_id,
|
||||
'tag': image.repositoryimage.tag,
|
||||
'checksum': image.checksum,
|
||||
}
|
||||
all_images.append(new_image_view)
|
||||
|
||||
resp = make_response(json.dumps(all_images), 200)
|
||||
resp.mimetype = 'application/json'
|
||||
|
||||
repo = model.create_or_fetch_repository(namespace, repository)
|
||||
|
||||
return resp
|
||||
|
||||
|
||||
@app.route('/v1/repositories/<path:repository>/images', methods=['DELETE'])
|
||||
@requires_auth
|
||||
@parse_repository_name
|
||||
@generate_headers(access='delete')
|
||||
def delete_repository_images(namespace, repository):
|
||||
pass
|
||||
|
||||
|
||||
@app.route('/v1/repositories/<path:repository>/auth', methods=['PUT'])
|
||||
@parse_repository_name
|
||||
def put_repository_auth(namespace, repository):
|
||||
pass
|
||||
|
||||
|
||||
@app.route('/v1/search', methods=['GET'])
|
||||
def get_search():
|
||||
pass
|
90
model.py
Normal file
90
model.py
Normal file
|
@ -0,0 +1,90 @@
|
|||
import bcrypt
|
||||
|
||||
from database import User, Repository, Image, RepositoryImage, AccessToken
|
||||
|
||||
|
||||
def create_user(username, password, email):
|
||||
pw_hash = bcrypt.hashpw(password, bcrypt.gensalt())
|
||||
new_user = User.create(username=username, password_hash=pw_hash,
|
||||
email=email)
|
||||
return new_user
|
||||
|
||||
|
||||
def verify_user(username, password):
|
||||
try:
|
||||
fetched = User.get(User.username == username)
|
||||
except User.DoesNotExist:
|
||||
return None
|
||||
|
||||
if bcrypt.hashpw(password, fetched.password_hash) == fetched.password_hash:
|
||||
return fetched
|
||||
|
||||
# We weren't able to authorize the user
|
||||
return None
|
||||
|
||||
|
||||
def change_password(user, new_password):
|
||||
pw_hash = bcrypt.hashpw(new_password, bcrypt.gensalt())
|
||||
user.password_hash = pw_hash
|
||||
user.save()
|
||||
|
||||
|
||||
def update_email(user, new_email):
|
||||
user.email = new_email
|
||||
user.verified = False
|
||||
user.save()
|
||||
|
||||
|
||||
def create_or_fetch_repository(namespace, name):
|
||||
try:
|
||||
repo = Repository.get(Repository.name == name and
|
||||
Repository.namespace == namespace)
|
||||
except Repository.DoesNotExist:
|
||||
repo = Repository.create(namespace=namespace, name=name)
|
||||
return repo
|
||||
|
||||
|
||||
def create_image(image_id):
|
||||
new_image = Image.create(image_id=image_id)
|
||||
return new_image
|
||||
|
||||
|
||||
def set_image_checksum(image_id, checksum):
|
||||
fetched = Image.get(Image.image_id == image_id)
|
||||
fetched.checksum = checksum
|
||||
fetched.save()
|
||||
return fetched
|
||||
|
||||
|
||||
def assign_image_repository(repository, image, tag):
|
||||
repo_image = RepositoryImage.create(repository=repository, image=image,
|
||||
tag=tag)
|
||||
return repo_image
|
||||
|
||||
|
||||
def get_repository_images(namespace_name, repository_name):
|
||||
select = Image.select(Image, RepositoryImage)
|
||||
joined = select.join(RepositoryImage).join(Repository)
|
||||
return joined.where(Repository.name == repository_name and
|
||||
Repository.namespace == namespace_name)
|
||||
|
||||
|
||||
def create_access_token(repository):
|
||||
new_token = AccessToken.create(repository=repository)
|
||||
return new_token
|
||||
|
||||
|
||||
def verify_token(namespace_name, repository_name, code):
|
||||
try:
|
||||
fetched_repo = Repository.get(Repository.namespace == namespace_name and
|
||||
Repository.name == repository_name)
|
||||
except Repository.DoesNotExist:
|
||||
return None
|
||||
|
||||
try:
|
||||
fetched = AccessToken.get(AccessToken.code == code and
|
||||
AccessToken.repository == fetched_repo)
|
||||
except AccessToken.DoesNotExist:
|
||||
return None
|
||||
|
||||
return fetched
|
3
requirements.txt
Normal file
3
requirements.txt
Normal file
|
@ -0,0 +1,3 @@
|
|||
peewee
|
||||
flask
|
||||
py-bcrypt
|
12
util.py
Normal file
12
util.py
Normal file
|
@ -0,0 +1,12 @@
|
|||
import urllib
|
||||
|
||||
|
||||
def parse_namespace_repository(repository):
|
||||
parts = repository.rstrip('/').split('/', 1)
|
||||
if len(parts) < 2:
|
||||
namespace = 'library'
|
||||
repository = parts[0]
|
||||
else:
|
||||
(namespace, repository) = parts
|
||||
repository = urllib.quote_plus(repository)
|
||||
return (namespace, repository)
|
11
wsgi.py
Normal file
11
wsgi.py
Normal file
|
@ -0,0 +1,11 @@
|
|||
import logging
|
||||
|
||||
from app import app
|
||||
|
||||
import index
|
||||
|
||||
if __name__ == '__main__':
|
||||
FORMAT = '%(asctime)-15s - %(levelname)s - %(pathname)s - %(funcName)s - %(message)s'
|
||||
logging.basicConfig(format=FORMAT, level=logging.DEBUG)
|
||||
|
||||
app.run(port=5002, debug=True)
|
Reference in a new issue