2016-05-11 10:05:19 +02:00
|
|
|
/*
|
|
|
|
Copyright (c) 2016 VMware, Inc. All Rights Reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2016-05-18 12:17:40 +02:00
|
|
|
package replication
|
2016-05-11 10:05:19 +02:00
|
|
|
|
|
|
|
import (
|
2016-05-12 12:54:04 +02:00
|
|
|
"bytes"
|
2016-06-23 12:19:39 +02:00
|
|
|
"crypto/tls"
|
2016-05-12 12:54:04 +02:00
|
|
|
"encoding/json"
|
2016-06-17 12:27:31 +02:00
|
|
|
"errors"
|
2016-05-12 12:54:04 +02:00
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
2016-05-11 10:05:19 +02:00
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/docker/distribution"
|
|
|
|
"github.com/docker/distribution/manifest/schema1"
|
|
|
|
"github.com/docker/distribution/manifest/schema2"
|
2016-07-13 08:35:52 +02:00
|
|
|
"github.com/vmware/harbor/dao"
|
2016-05-11 10:05:19 +02:00
|
|
|
"github.com/vmware/harbor/models"
|
2016-05-23 13:39:13 +02:00
|
|
|
"github.com/vmware/harbor/utils/log"
|
2016-05-11 10:05:19 +02:00
|
|
|
"github.com/vmware/harbor/utils/registry"
|
|
|
|
"github.com/vmware/harbor/utils/registry/auth"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2016-07-06 09:11:51 +02:00
|
|
|
// StateInitialize ...
|
|
|
|
StateInitialize = "initialize"
|
2016-05-11 10:05:19 +02:00
|
|
|
// StateCheck ...
|
|
|
|
StateCheck = "check"
|
|
|
|
// StatePullManifest ...
|
|
|
|
StatePullManifest = "pull_manifest"
|
|
|
|
// StateTransferBlob ...
|
|
|
|
StateTransferBlob = "transfer_blob"
|
|
|
|
// StatePushManifest ...
|
|
|
|
StatePushManifest = "push_manifest"
|
|
|
|
)
|
|
|
|
|
2016-06-17 12:27:31 +02:00
|
|
|
var (
|
2016-06-17 12:34:40 +02:00
|
|
|
// ErrConflict represents http 409 error
|
2016-06-17 12:27:31 +02:00
|
|
|
ErrConflict = errors.New("conflict")
|
|
|
|
)
|
|
|
|
|
2016-05-18 10:37:11 +02:00
|
|
|
// BaseHandler holds informations shared by other state handlers
|
2016-05-11 10:05:19 +02:00
|
|
|
type BaseHandler struct {
|
|
|
|
project string // project_name
|
|
|
|
repository string // prject_name/repo_name
|
|
|
|
tags []string
|
|
|
|
|
2016-07-06 09:11:51 +02:00
|
|
|
srcURL string // url of source registry
|
|
|
|
srcSecret string
|
2016-05-11 10:05:19 +02:00
|
|
|
|
|
|
|
dstURL string // url of target registry
|
|
|
|
dstUsr string // username ...
|
2016-05-30 09:39:51 +02:00
|
|
|
dstPwd string // password ...
|
2016-05-11 10:05:19 +02:00
|
|
|
|
2016-06-21 10:39:03 +02:00
|
|
|
insecure bool // whether skip secure check when using https
|
|
|
|
|
2016-05-11 10:05:19 +02:00
|
|
|
srcClient *registry.Repository
|
|
|
|
dstClient *registry.Repository
|
|
|
|
|
|
|
|
manifest distribution.Manifest // manifest of tags[0]
|
2016-06-28 05:06:56 +02:00
|
|
|
digest string //digest of tags[0]'s manifest
|
2016-05-11 10:05:19 +02:00
|
|
|
blobs []string // blobs need to be transferred for tags[0]
|
|
|
|
|
2016-05-18 10:37:11 +02:00
|
|
|
blobsExistence map[string]bool //key: digest of blob, value: existence
|
|
|
|
|
2016-05-23 13:39:13 +02:00
|
|
|
logger *log.Logger
|
2016-05-11 10:05:19 +02:00
|
|
|
}
|
|
|
|
|
2016-07-06 09:11:51 +02:00
|
|
|
// InitBaseHandler initializes a BaseHandler.
|
2016-05-25 09:24:44 +02:00
|
|
|
func InitBaseHandler(repository, srcURL, srcSecret,
|
2016-07-06 09:11:51 +02:00
|
|
|
dstURL, dstUsr, dstPwd string, insecure bool, tags []string, logger *log.Logger) *BaseHandler {
|
2016-05-16 07:57:30 +02:00
|
|
|
|
2016-05-11 10:05:19 +02:00
|
|
|
base := &BaseHandler{
|
2016-05-18 10:37:11 +02:00
|
|
|
repository: repository,
|
|
|
|
tags: tags,
|
|
|
|
srcURL: srcURL,
|
2016-07-06 09:11:51 +02:00
|
|
|
srcSecret: srcSecret,
|
2016-05-18 10:37:11 +02:00
|
|
|
dstURL: dstURL,
|
|
|
|
dstUsr: dstUsr,
|
|
|
|
dstPwd: dstPwd,
|
2016-06-24 07:57:48 +02:00
|
|
|
insecure: insecure,
|
2016-05-18 10:37:11 +02:00
|
|
|
blobsExistence: make(map[string]bool, 10),
|
|
|
|
logger: logger,
|
2016-05-11 10:05:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
base.project = getProjectName(base.repository)
|
|
|
|
|
2016-07-06 09:11:51 +02:00
|
|
|
return base
|
|
|
|
}
|
|
|
|
|
|
|
|
// Exit ...
|
|
|
|
func (b *BaseHandler) Exit() error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func getProjectName(repository string) string {
|
|
|
|
repository = strings.TrimSpace(repository)
|
|
|
|
repository = strings.TrimRight(repository, "/")
|
|
|
|
return repository[:strings.LastIndex(repository, "/")]
|
|
|
|
}
|
|
|
|
|
|
|
|
// Initializer creates clients for source and destination registry,
|
|
|
|
// lists tags of the repository if parameter tags is nil.
|
|
|
|
type Initializer struct {
|
|
|
|
*BaseHandler
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enter ...
|
|
|
|
func (i *Initializer) Enter() (string, error) {
|
|
|
|
i.logger.Infof("initializing: repository: %s, tags: %v, source URL: %s, destination URL: %s, insecure: %v, destination user: %s",
|
|
|
|
i.repository, i.tags, i.srcURL, i.dstURL, i.insecure, i.dstUsr)
|
|
|
|
|
|
|
|
state, err := i.enter()
|
|
|
|
if err != nil && retry(err) {
|
|
|
|
i.logger.Info("waiting for retrying...")
|
|
|
|
return models.JobRetrying, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return state, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (i *Initializer) enter() (string, error) {
|
|
|
|
c := &http.Cookie{Name: models.UISecretCookie, Value: i.srcSecret}
|
2016-05-25 09:24:44 +02:00
|
|
|
srcCred := auth.NewCookieCredential(c)
|
2016-07-06 09:11:51 +02:00
|
|
|
srcClient, err := newRepositoryClient(i.srcURL, i.insecure, srcCred,
|
|
|
|
i.repository, "repository", i.repository, "pull", "push", "*")
|
2016-05-11 10:05:19 +02:00
|
|
|
if err != nil {
|
2016-07-06 09:11:51 +02:00
|
|
|
i.logger.Errorf("an error occurred while creating source repository client: %v", err)
|
|
|
|
return "", err
|
2016-05-11 10:05:19 +02:00
|
|
|
}
|
2016-07-06 09:11:51 +02:00
|
|
|
i.srcClient = srcClient
|
2016-05-11 10:05:19 +02:00
|
|
|
|
2016-07-06 09:11:51 +02:00
|
|
|
dstCred := auth.NewBasicAuthCredential(i.dstUsr, i.dstPwd)
|
|
|
|
dstClient, err := newRepositoryClient(i.dstURL, i.insecure, dstCred,
|
|
|
|
i.repository, "repository", i.repository, "pull", "push", "*")
|
2016-05-11 10:05:19 +02:00
|
|
|
if err != nil {
|
2016-07-06 09:11:51 +02:00
|
|
|
i.logger.Errorf("an error occurred while creating destination repository client: %v", err)
|
|
|
|
return "", err
|
2016-05-11 10:05:19 +02:00
|
|
|
}
|
2016-07-06 09:11:51 +02:00
|
|
|
i.dstClient = dstClient
|
2016-05-11 10:05:19 +02:00
|
|
|
|
2016-07-06 09:11:51 +02:00
|
|
|
if len(i.tags) == 0 {
|
|
|
|
tags, err := i.srcClient.ListTag()
|
2016-05-11 10:05:19 +02:00
|
|
|
if err != nil {
|
2016-07-06 09:11:51 +02:00
|
|
|
i.logger.Errorf("an error occurred while listing tags for source repository: %v", err)
|
|
|
|
return "", err
|
2016-05-11 10:05:19 +02:00
|
|
|
}
|
2016-07-06 09:11:51 +02:00
|
|
|
i.tags = tags
|
2016-05-11 10:05:19 +02:00
|
|
|
}
|
|
|
|
|
2016-07-06 09:11:51 +02:00
|
|
|
i.logger.Infof("initialization completed: project: %s, repository: %s, tags: %v, source URL: %s, destination URL: %s, insecure: %v, destination user: %s",
|
|
|
|
i.project, i.repository, i.tags, i.srcURL, i.dstURL, i.insecure, i.dstUsr)
|
2016-05-11 10:05:19 +02:00
|
|
|
|
2016-07-06 09:11:51 +02:00
|
|
|
return StateCheck, nil
|
2016-05-11 10:05:19 +02:00
|
|
|
}
|
|
|
|
|
2016-05-18 10:37:11 +02:00
|
|
|
// Checker checks the existence of project and the user's privlege to the project
|
2016-05-11 10:05:19 +02:00
|
|
|
type Checker struct {
|
|
|
|
*BaseHandler
|
|
|
|
}
|
|
|
|
|
2016-05-18 10:37:11 +02:00
|
|
|
// Enter check existence of project, if it does not exist, create it,
|
2016-05-11 10:05:19 +02:00
|
|
|
// if it exists, check whether the user has write privilege to it.
|
|
|
|
func (c *Checker) Enter() (string, error) {
|
2016-07-05 05:06:58 +02:00
|
|
|
state, err := c.enter()
|
|
|
|
if err != nil && retry(err) {
|
2016-07-05 05:22:16 +02:00
|
|
|
c.logger.Info("waiting for retrying...")
|
|
|
|
return models.JobRetrying, nil
|
2016-07-05 05:06:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return state, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Checker) enter() (string, error) {
|
2016-07-15 10:36:11 +02:00
|
|
|
project, err := dao.GetProjectByName(c.project)
|
2016-05-11 10:05:19 +02:00
|
|
|
if err != nil {
|
2016-07-15 10:36:11 +02:00
|
|
|
c.logger.Errorf("an error occurred while getting project %s in DB: %v", c.project, err)
|
2016-05-11 10:05:19 +02:00
|
|
|
return "", err
|
|
|
|
}
|
2016-07-13 08:35:52 +02:00
|
|
|
|
2016-07-15 10:36:11 +02:00
|
|
|
err = c.createProject(project.Public == 1)
|
|
|
|
if err == nil {
|
2016-05-11 10:05:19 +02:00
|
|
|
c.logger.Infof("project %s is created on %s with user %s", c.project, c.dstURL, c.dstUsr)
|
|
|
|
return StatePullManifest, nil
|
|
|
|
}
|
|
|
|
|
2016-07-15 10:36:11 +02:00
|
|
|
// other job may be also doing the same thing when the current job
|
|
|
|
// is creating project, so when the response code is 409, continue
|
|
|
|
// to do next step
|
|
|
|
if err == ErrConflict {
|
|
|
|
c.logger.Warningf("the status code is 409 when creating project %s on %s with user %s, try to do next step", c.project, c.dstURL, c.dstUsr)
|
|
|
|
return StatePullManifest, nil
|
2016-05-12 12:54:04 +02:00
|
|
|
}
|
|
|
|
|
2016-07-15 10:36:11 +02:00
|
|
|
c.logger.Errorf("an error occurred while creating project %s on %s with user %s : %v", c.project, c.dstURL, c.dstUsr, err)
|
2016-05-12 12:54:04 +02:00
|
|
|
|
2016-07-15 10:36:11 +02:00
|
|
|
return "", err
|
2016-05-11 10:05:19 +02:00
|
|
|
}
|
|
|
|
|
2016-07-13 08:35:52 +02:00
|
|
|
func (c *Checker) createProject(isPublic bool) error {
|
2016-05-12 12:54:04 +02:00
|
|
|
project := struct {
|
|
|
|
ProjectName string `json:"project_name"`
|
|
|
|
Public bool `json:"public"`
|
|
|
|
}{
|
|
|
|
ProjectName: c.project,
|
2016-07-13 08:35:52 +02:00
|
|
|
Public: isPublic,
|
2016-05-12 12:54:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
data, err := json.Marshal(project)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
url := strings.TrimRight(c.dstURL, "/") + "/api/projects/"
|
|
|
|
req, err := http.NewRequest("POST", url, bytes.NewReader(data))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-05-11 10:05:19 +02:00
|
|
|
|
2016-05-12 12:54:04 +02:00
|
|
|
req.SetBasicAuth(c.dstUsr, c.dstPwd)
|
2016-06-23 12:19:39 +02:00
|
|
|
|
|
|
|
client := &http.Client{
|
|
|
|
Transport: &http.Transport{
|
|
|
|
TLSClientConfig: &tls.Config{
|
|
|
|
InsecureSkipVerify: c.insecure,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := client.Do(req)
|
2016-05-12 12:54:04 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2016-07-14 11:50:25 +02:00
|
|
|
defer resp.Body.Close()
|
|
|
|
|
2016-06-23 12:19:39 +02:00
|
|
|
// version 0.1.1's reponse code is 200
|
2016-06-23 12:23:40 +02:00
|
|
|
if resp.StatusCode == http.StatusCreated ||
|
|
|
|
resp.StatusCode == http.StatusOK {
|
|
|
|
return nil
|
|
|
|
}
|
2016-06-17 12:27:31 +02:00
|
|
|
|
2016-06-23 12:23:40 +02:00
|
|
|
if resp.StatusCode == http.StatusConflict {
|
|
|
|
return ErrConflict
|
|
|
|
}
|
2016-05-12 12:54:04 +02:00
|
|
|
|
2016-06-23 12:23:40 +02:00
|
|
|
message, err := ioutil.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
c.logger.Errorf("an error occurred while reading message from response: %v", err)
|
2016-05-12 12:54:04 +02:00
|
|
|
}
|
|
|
|
|
2016-06-23 12:23:40 +02:00
|
|
|
return fmt.Errorf("failed to create project %s on %s with user %s: %d %s",
|
|
|
|
c.project, c.dstURL, c.dstUsr, resp.StatusCode, string(message))
|
2016-05-11 10:05:19 +02:00
|
|
|
}
|
|
|
|
|
2016-05-18 10:37:11 +02:00
|
|
|
// ManifestPuller pulls the manifest of a tag. And if no tag needs to be pulled,
|
|
|
|
// the next state that state machine should enter is "finished".
|
2016-05-11 10:05:19 +02:00
|
|
|
type ManifestPuller struct {
|
|
|
|
*BaseHandler
|
|
|
|
}
|
|
|
|
|
2016-05-18 10:37:11 +02:00
|
|
|
// Enter pulls manifest of a tag and checks if all blobs exist in the destination registry
|
2016-05-11 10:05:19 +02:00
|
|
|
func (m *ManifestPuller) Enter() (string, error) {
|
2016-07-05 05:06:58 +02:00
|
|
|
state, err := m.enter()
|
|
|
|
if err != nil && retry(err) {
|
2016-07-05 05:22:16 +02:00
|
|
|
m.logger.Info("waiting for retrying...")
|
|
|
|
return models.JobRetrying, nil
|
2016-07-05 05:06:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return state, err
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ManifestPuller) enter() (string, error) {
|
2016-05-11 10:05:19 +02:00
|
|
|
if len(m.tags) == 0 {
|
2016-05-18 12:17:40 +02:00
|
|
|
m.logger.Infof("no tag needs to be replicated, next state is \"finished\"")
|
2016-05-11 10:05:19 +02:00
|
|
|
return models.JobFinished, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
name := m.repository
|
|
|
|
tag := m.tags[0]
|
|
|
|
|
|
|
|
acceptMediaTypes := []string{schema1.MediaTypeManifest, schema2.MediaTypeManifest}
|
|
|
|
digest, mediaType, payload, err := m.srcClient.PullManifest(tag, acceptMediaTypes)
|
|
|
|
if err != nil {
|
|
|
|
m.logger.Errorf("an error occurred while pulling manifest of %s:%s from %s: %v", name, tag, m.srcURL, err)
|
|
|
|
return "", err
|
|
|
|
}
|
2016-06-28 05:06:56 +02:00
|
|
|
m.digest = digest
|
2016-05-11 10:05:19 +02:00
|
|
|
m.logger.Infof("manifest of %s:%s pulled successfully from %s: %s", name, tag, m.srcURL, digest)
|
|
|
|
|
|
|
|
if strings.Contains(mediaType, "application/json") {
|
|
|
|
mediaType = schema1.MediaTypeManifest
|
|
|
|
}
|
|
|
|
|
|
|
|
manifest, _, err := registry.UnMarshal(mediaType, payload)
|
|
|
|
if err != nil {
|
|
|
|
m.logger.Errorf("an error occurred while parsing manifest of %s:%s from %s: %v", name, tag, m.srcURL, err)
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
m.manifest = manifest
|
|
|
|
|
|
|
|
// all blobs(layers and config)
|
|
|
|
var blobs []string
|
|
|
|
|
|
|
|
for _, discriptor := range manifest.References() {
|
|
|
|
blobs = append(blobs, discriptor.Digest.String())
|
|
|
|
}
|
|
|
|
|
|
|
|
// config is also need to be transferred if the schema of manifest is v2
|
|
|
|
manifest2, ok := manifest.(*schema2.DeserializedManifest)
|
|
|
|
if ok {
|
|
|
|
blobs = append(blobs, manifest2.Target().Digest.String())
|
|
|
|
}
|
|
|
|
|
|
|
|
m.logger.Infof("all blobs of %s:%s from %s: %v", name, tag, m.srcURL, blobs)
|
|
|
|
|
|
|
|
for _, blob := range blobs {
|
2016-05-18 10:37:11 +02:00
|
|
|
exist, ok := m.blobsExistence[blob]
|
|
|
|
if !ok {
|
|
|
|
exist, err = m.dstClient.BlobExist(blob)
|
|
|
|
if err != nil {
|
|
|
|
m.logger.Errorf("an error occurred while checking existence of blob %s of %s:%s on %s: %v", blob, name, tag, m.dstURL, err)
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
m.blobsExistence[blob] = exist
|
2016-05-11 10:05:19 +02:00
|
|
|
}
|
2016-05-18 10:37:11 +02:00
|
|
|
|
2016-05-11 10:05:19 +02:00
|
|
|
if !exist {
|
|
|
|
m.blobs = append(m.blobs, blob)
|
2016-05-18 12:17:40 +02:00
|
|
|
} else {
|
|
|
|
m.logger.Infof("blob %s of %s:%s already exists in %s", blob, name, tag, m.dstURL)
|
2016-05-11 10:05:19 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
m.logger.Infof("blobs of %s:%s need to be transferred to %s: %v", name, tag, m.dstURL, m.blobs)
|
|
|
|
|
|
|
|
return StateTransferBlob, nil
|
|
|
|
}
|
|
|
|
|
2016-05-18 10:37:11 +02:00
|
|
|
// BlobTransfer transfers blobs of a tag
|
2016-05-11 10:05:19 +02:00
|
|
|
type BlobTransfer struct {
|
|
|
|
*BaseHandler
|
|
|
|
}
|
|
|
|
|
2016-05-18 10:37:11 +02:00
|
|
|
// Enter pulls blobs and then pushs them to destination registry.
|
2016-05-11 10:05:19 +02:00
|
|
|
func (b *BlobTransfer) Enter() (string, error) {
|
2016-07-05 05:06:58 +02:00
|
|
|
state, err := b.enter()
|
|
|
|
if err != nil && retry(err) {
|
2016-07-05 05:22:16 +02:00
|
|
|
b.logger.Info("waiting for retrying...")
|
|
|
|
return models.JobRetrying, nil
|
2016-07-05 05:06:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return state, err
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *BlobTransfer) enter() (string, error) {
|
2016-05-11 10:05:19 +02:00
|
|
|
name := b.repository
|
|
|
|
tag := b.tags[0]
|
|
|
|
for _, blob := range b.blobs {
|
2016-05-18 12:17:40 +02:00
|
|
|
b.logger.Infof("transferring blob %s of %s:%s to %s ...", blob, name, tag, b.dstURL)
|
2016-05-11 10:05:19 +02:00
|
|
|
size, data, err := b.srcClient.PullBlob(blob)
|
|
|
|
if err != nil {
|
|
|
|
b.logger.Errorf("an error occurred while pulling blob %s of %s:%s from %s: %v", blob, name, tag, b.srcURL, err)
|
|
|
|
return "", err
|
|
|
|
}
|
2016-07-14 11:50:25 +02:00
|
|
|
if data != nil {
|
|
|
|
defer data.Close()
|
|
|
|
}
|
2016-05-11 10:05:19 +02:00
|
|
|
if err = b.dstClient.PushBlob(blob, size, data); err != nil {
|
|
|
|
b.logger.Errorf("an error occurred while pushing blob %s of %s:%s to %s : %v", blob, name, tag, b.dstURL, err)
|
|
|
|
return "", err
|
|
|
|
}
|
2016-05-18 12:17:40 +02:00
|
|
|
b.logger.Infof("blob %s of %s:%s transferred to %s completed", blob, name, tag, b.dstURL)
|
2016-05-11 10:05:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return StatePushManifest, nil
|
|
|
|
}
|
|
|
|
|
2016-05-18 10:37:11 +02:00
|
|
|
// ManifestPusher pushs the manifest to destination registry
|
2016-05-11 10:05:19 +02:00
|
|
|
type ManifestPusher struct {
|
|
|
|
*BaseHandler
|
|
|
|
}
|
|
|
|
|
2016-05-18 10:37:11 +02:00
|
|
|
// Enter checks the existence of manifest in the source registry first, and if it
|
|
|
|
// exists, pushs it to destination registry. The checking operation is to avoid
|
|
|
|
// the situation that the tag is deleted during the blobs transfering
|
2016-07-05 05:22:16 +02:00
|
|
|
func (m *ManifestPusher) Enter() (string, error) {
|
|
|
|
state, err := m.enter()
|
2016-07-05 05:06:58 +02:00
|
|
|
if err != nil && retry(err) {
|
2016-07-05 05:22:16 +02:00
|
|
|
m.logger.Info("waiting for retrying...")
|
|
|
|
return models.JobRetrying, nil
|
2016-07-05 05:06:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return state, err
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ManifestPusher) enter() (string, error) {
|
2016-05-11 10:05:19 +02:00
|
|
|
name := m.repository
|
|
|
|
tag := m.tags[0]
|
|
|
|
_, exist, err := m.srcClient.ManifestExist(tag)
|
|
|
|
if err != nil {
|
|
|
|
m.logger.Infof("an error occurred while checking the existence of manifest of %s:%s on %s: %v", name, tag, m.srcURL, err)
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
if !exist {
|
|
|
|
m.logger.Infof("manifest of %s:%s does not exist on source registry %s, cancel manifest pushing", name, tag, m.srcURL)
|
|
|
|
} else {
|
|
|
|
m.logger.Infof("manifest of %s:%s exists on source registry %s, continue manifest pushing", name, tag, m.srcURL)
|
2016-06-28 05:06:56 +02:00
|
|
|
|
2016-07-13 08:35:52 +02:00
|
|
|
digest, manifestExist, err := m.dstClient.ManifestExist(tag)
|
|
|
|
if manifestExist && digest == m.digest {
|
2016-06-28 05:06:56 +02:00
|
|
|
m.logger.Infof("manifest of %s:%s exists on destination registry %s, skip manifest pushing", name, tag, m.dstURL)
|
|
|
|
|
|
|
|
m.tags = m.tags[1:]
|
|
|
|
m.manifest = nil
|
|
|
|
m.digest = ""
|
|
|
|
m.blobs = nil
|
|
|
|
|
|
|
|
return StatePullManifest, nil
|
|
|
|
}
|
|
|
|
|
2016-05-11 10:05:19 +02:00
|
|
|
mediaType, data, err := m.manifest.Payload()
|
|
|
|
if err != nil {
|
|
|
|
m.logger.Errorf("an error occurred while getting payload of manifest for %s:%s : %v", name, tag, err)
|
|
|
|
return "", err
|
|
|
|
}
|
2016-05-12 12:54:04 +02:00
|
|
|
|
2016-05-11 10:05:19 +02:00
|
|
|
if _, err = m.dstClient.PushManifest(tag, mediaType, data); err != nil {
|
|
|
|
m.logger.Errorf("an error occurred while pushing manifest of %s:%s to %s : %v", name, tag, m.dstURL, err)
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
m.logger.Infof("manifest of %s:%s has been pushed to %s", name, tag, m.dstURL)
|
|
|
|
}
|
|
|
|
|
|
|
|
m.tags = m.tags[1:]
|
2016-05-18 12:17:40 +02:00
|
|
|
m.manifest = nil
|
2016-06-28 05:06:56 +02:00
|
|
|
m.digest = ""
|
2016-05-18 12:17:40 +02:00
|
|
|
m.blobs = nil
|
2016-05-11 10:05:19 +02:00
|
|
|
|
|
|
|
return StatePullManifest, nil
|
|
|
|
}
|
2016-06-21 10:39:03 +02:00
|
|
|
|
|
|
|
func newRepositoryClient(endpoint string, insecure bool, credential auth.Credential, repository, scopeType, scopeName string,
|
|
|
|
scopeActions ...string) (*registry.Repository, error) {
|
|
|
|
|
|
|
|
authorizer := auth.NewStandardTokenAuthorizer(credential, insecure, scopeType, scopeName, scopeActions...)
|
|
|
|
|
2016-06-22 06:03:50 +02:00
|
|
|
store, err := auth.NewAuthorizerStore(endpoint, insecure, authorizer)
|
2016-06-21 10:39:03 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
uam := &userAgentModifier{
|
2016-06-23 06:14:26 +02:00
|
|
|
userAgent: "harbor-registry-client",
|
2016-06-21 10:39:03 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
client, err := registry.NewRepositoryWithModifiers(repository, endpoint, insecure, store, uam)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return client, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type userAgentModifier struct {
|
|
|
|
userAgent string
|
|
|
|
}
|
|
|
|
|
|
|
|
// Modify adds user-agent header to the request
|
|
|
|
func (u *userAgentModifier) Modify(req *http.Request) error {
|
|
|
|
req.Header.Set(http.CanonicalHeaderKey("User-Agent"), u.userAgent)
|
|
|
|
return nil
|
|
|
|
}
|