Index that kinda works and is backed by a database. Still lots to do.

This commit is contained in:
yackob03 2013-09-20 11:55:44 -04:00
commit 8e169b1026
9 changed files with 477 additions and 0 deletions

3
.gitignore vendored Normal file
View file

@ -0,0 +1,3 @@
*.pyc
venv
test.db

10
app.py Normal file
View file

@ -0,0 +1,10 @@
from flask import Flask, make_response, jsonify
app = Flask(__name__)
@app.route('/_ping')
@app.route('/v1/_ping')
def ping():
response = make_response('true', 200);
response.headers['X-Docker-Registry-Version'] = '0.6.0'
return response

99
auth.py Normal file
View file

@ -0,0 +1,99 @@
import logging
from functools import wraps
from werkzeug import LocalProxy
from flask import request, make_response, _request_ctx_stack
from base64 import b64decode
import model
from util import parse_namespace_repository
logger = logging.getLogger(__name__)
def _get_user():
return getattr(_request_ctx_stack.top, 'authenticated_user', None)
def _get_token():
return getattr(_request_ctx_stack.top, 'validated_token', None)
authenticated_user = LocalProxy(_get_user)
validated_token = LocalProxy(_get_token)
def check_basic_auth():
auth = request.headers.get('authorization', '')
normalized = [part.strip() for part in auth.split(' ') if part]
if normalized[0].lower() != 'basic' or len(normalized) != 2:
logger.debug('Invalid basic auth format.')
return False
credentials = b64decode(normalized[1]).split(':')
if len(credentials) != 2:
logger.debug('Invalid basic auth credential formet.')
authenticated = model.verify_user(credentials[0], credentials[1])
if authenticated:
logger.debug('Successfully validated user: %s' % authenticated.username)
ctx = _request_ctx_stack.top
ctx.authenticated_user = authenticated
return True
# We weren't able to authenticate via basic auth.
return False
def check_token():
auth = request.headers.get('authorization', '')
logger.debug('Validating auth token: %s' % auth)
normalized = [part.strip() for part in auth.split(' ') if part]
if normalized[0].lower() != 'token' or len(normalized) != 3:
logger.debug('Invalid token format.')
return False
token_details = normalized[2].split(',')
if len(token_details) != 3:
logger.debug('Invalid token format.')
return False
token_vals = {val[0]: val[1] for val in
(detail.split('=') for detail in token_details)}
if ('signature' not in token_vals or 'access' not in token_vals or
'repository' not in token_vals):
logger.debug('Invalid token components.')
return False
unquoted = token_vals['repository'][1:-1]
namespace, repository = parse_namespace_repository(unquoted)
logger.debug('Validing signature: %s' % token_vals['signature'])
validated = model.verify_token(namespace, repository,
token_vals['signature'])
if validated:
logger.debug('Successfully validated token: %s' % validated.code)
ctx = _request_ctx_stack.top
ctx.validated_token = validated
return True
# WE weren't able to authenticate the token
logger.debug('Token could not be validated.')
return False
def requires_auth(f):
@wraps(f)
def wrapper(*args, **kwargs):
if not check_basic_auth() and not check_token():
return make_response('Invalid credentials.', 401)
logger.debug('Successfully authenticated user or token.')
return f(*args, **kwargs)
return wrapper

74
database.py Normal file
View file

@ -0,0 +1,74 @@
import string
from random import SystemRandom
from peewee import *
from peewee import create_model_tables
from datetime import datetime
db = SqliteDatabase('test.db', threadlocals=True)
class BaseModel(Model):
class Meta:
database = db
class User(BaseModel):
username = CharField(primary_key=True)
password_hash = CharField()
email = CharField()
verified = BooleanField(default=False)
class Repository(BaseModel):
repository_id = PrimaryKeyField()
namespace = CharField()
name = CharField()
class Meta:
database = db
indexes = (
# create a unique index on namespace and name
(('namespace', 'name'), True),
)
def random_string_generator(length=16):
def random_string():
random = SystemRandom()
return ''.join([random.choice(string.ascii_uppercase + string.digits)
for x in range(length)])
return random_string
class AccessToken(BaseModel):
token_id = PrimaryKeyField()
code = CharField(default=random_string_generator())
repository = ForeignKeyField(Repository)
created = DateTimeField(default=datetime.now)
class Image(BaseModel):
image_id = CharField(primary_key=True)
checksum = CharField(null=True)
class RepositoryImage(BaseModel):
repository = ForeignKeyField(Repository)
image = ForeignKeyField(Image)
tag = CharField()
class Meta:
database = db
indexes = (
# we don't really want duplicates
(('repository', 'image', 'tag'), True),
)
def create_tables():
create_model_tables([User, Repository, Image, RepositoryImage, AccessToken])
if __name__ == '__main__':
create_tables()

175
index.py Normal file
View file

@ -0,0 +1,175 @@
import json
import urllib
import json
import logging
from flask import request, make_response, jsonify
from functools import wraps
from app import app
from auth import requires_auth, authenticated_user, validated_token
from util import parse_namespace_repository
import model
logger = logging.getLogger(__name__)
REGISTRY_SERVER = 'localhost:5003'
def parse_repository_name(f):
@wraps(f)
def wrapper(repository, *args, **kwargs):
(namespace, repository) = parse_namespace_repository(repository)
return f(namespace, repository, *args, **kwargs)
return wrapper
def generate_headers(access):
def add_headers(f):
@wraps(f)
def wrapper(namespace, repository, *args, **kwargs):
response = f(namespace, repository, *args, **kwargs)
response.headers['X-Docker-Endpoints'] = REGISTRY_SERVER
if request.headers.get('X-Docker-Token', ''):
repo = model.create_or_fetch_repository(namespace, repository)
token = model.create_access_token(repo)
token_str = ('Token signature=%s,repository="%s/%s",access=%s' %
(token.code, namespace, repository, access))
response.headers['WWW-Authenticate'] = token_str
response.headers['X-Docker-Token'] = token_str
return response
return wrapper
return add_headers
@app.route('/v1/users', methods=['POST'])
@app.route('/v1/users/', methods=['POST'])
def create_user():
user_data = request.get_json()
model.create_user(user_data['username'], user_data['password'],
user_data['email'])
return make_response('Created', 201)
@app.route('/v1/users', methods=['GET'])
@app.route('/v1/users/', methods=['GET'])
@requires_auth
def get_user():
return jsonify({
'username': authenticated_user.username,
'email': authenticated_user.email,
})
@app.route('/v1/users/<username>/', methods=['PUT'])
@requires_auth
def update_user(username):
if authenticated_user.username != username:
return make_response('Forbidden', 403)
update_request = request.get_json()
if update_request.has_key('password'):
logger.debug('Updating user password.')
model.change_password(authenticated_user, update_request['password'])
if update_request.has_key('email'):
logger.debug('Updating user email')
model.update_email(authenticated_user, update_request['email'])
return jsonify({
'username': authenticated_user.username,
'email': authenticated_user.email,
})
@app.route('/v1/repositories/<path:repository>', methods=['PUT'])
@requires_auth
@parse_repository_name
@generate_headers(access='write')
def create_repository(namespace, repository):
image_descriptions = json.loads(request.data)
repo = model.create_or_fetch_repository(namespace, repository)
new_repo_images = {desc['id']: desc for desc in image_descriptions}
added_images = dict(new_repo_images)
for existing in model.get_repository_images(namespace, repository):
if existing.image_id in new_repo_images:
added_images.pop(existing.image_id)
else:
existing.repositoryimage.delete()
for image_description in added_images.values():
image = model.create_image(image_description['id'])
model.assign_image_repository(repo, image, image_description['Tag'])
response = make_response('Created', 201)
return response
@app.route('/v1/repositories/<path:repository>/images', methods=['PUT'])
@requires_auth
@parse_repository_name
@generate_headers(access='write')
def update_images(namespace, repository):
image_with_checksums = json.loads(request.data)
for image in image_with_checksums:
model.set_image_checksum(image['id'], image['checksum'])
return make_response('Updated', 204)
@app.route('/v1/repositories/<path:repository>/images', methods=['GET'])
@requires_auth
@parse_repository_name
@generate_headers(access='read')
def get_repository_images(namespace, repository):
if validated_token and (validated_token.repository.name != repository or
validated_token.repository.namespace != namespace):
return make_response('Forbidden', 403)
#TODO check user has permission for repository
#TODO invalidate token
all_images = []
for image in model.get_repository_images(namespace, repository):
new_image_view = {
'id': image.image_id,
'tag': image.repositoryimage.tag,
'checksum': image.checksum,
}
all_images.append(new_image_view)
resp = make_response(json.dumps(all_images), 200)
resp.mimetype = 'application/json'
repo = model.create_or_fetch_repository(namespace, repository)
return resp
@app.route('/v1/repositories/<path:repository>/images', methods=['DELETE'])
@requires_auth
@parse_repository_name
@generate_headers(access='delete')
def delete_repository_images(namespace, repository):
pass
@app.route('/v1/repositories/<path:repository>/auth', methods=['PUT'])
@parse_repository_name
def put_repository_auth(namespace, repository):
pass
@app.route('/v1/search', methods=['GET'])
def get_search():
pass

90
model.py Normal file
View file

@ -0,0 +1,90 @@
import bcrypt
from database import User, Repository, Image, RepositoryImage, AccessToken
def create_user(username, password, email):
pw_hash = bcrypt.hashpw(password, bcrypt.gensalt())
new_user = User.create(username=username, password_hash=pw_hash,
email=email)
return new_user
def verify_user(username, password):
try:
fetched = User.get(User.username == username)
except User.DoesNotExist:
return None
if bcrypt.hashpw(password, fetched.password_hash) == fetched.password_hash:
return fetched
# We weren't able to authorize the user
return None
def change_password(user, new_password):
pw_hash = bcrypt.hashpw(new_password, bcrypt.gensalt())
user.password_hash = pw_hash
user.save()
def update_email(user, new_email):
user.email = new_email
user.verified = False
user.save()
def create_or_fetch_repository(namespace, name):
try:
repo = Repository.get(Repository.name == name and
Repository.namespace == namespace)
except Repository.DoesNotExist:
repo = Repository.create(namespace=namespace, name=name)
return repo
def create_image(image_id):
new_image = Image.create(image_id=image_id)
return new_image
def set_image_checksum(image_id, checksum):
fetched = Image.get(Image.image_id == image_id)
fetched.checksum = checksum
fetched.save()
return fetched
def assign_image_repository(repository, image, tag):
repo_image = RepositoryImage.create(repository=repository, image=image,
tag=tag)
return repo_image
def get_repository_images(namespace_name, repository_name):
select = Image.select(Image, RepositoryImage)
joined = select.join(RepositoryImage).join(Repository)
return joined.where(Repository.name == repository_name and
Repository.namespace == namespace_name)
def create_access_token(repository):
new_token = AccessToken.create(repository=repository)
return new_token
def verify_token(namespace_name, repository_name, code):
try:
fetched_repo = Repository.get(Repository.namespace == namespace_name and
Repository.name == repository_name)
except Repository.DoesNotExist:
return None
try:
fetched = AccessToken.get(AccessToken.code == code and
AccessToken.repository == fetched_repo)
except AccessToken.DoesNotExist:
return None
return fetched

3
requirements.txt Normal file
View file

@ -0,0 +1,3 @@
peewee
flask
py-bcrypt

12
util.py Normal file
View file

@ -0,0 +1,12 @@
import urllib
def parse_namespace_repository(repository):
parts = repository.rstrip('/').split('/', 1)
if len(parts) < 2:
namespace = 'library'
repository = parts[0]
else:
(namespace, repository) = parts
repository = urllib.quote_plus(repository)
return (namespace, repository)

11
wsgi.py Normal file
View file

@ -0,0 +1,11 @@
import logging
from app import app
import index
if __name__ == '__main__':
FORMAT = '%(asctime)-15s - %(levelname)s - %(pathname)s - %(funcName)s - %(message)s'
logging.basicConfig(format=FORMAT, level=logging.DEBUG)
app.run(port=5002, debug=True)