dotcloud/docker

View on GitHub
distribution/pull.go

Summary

Maintainability
B
4 hrs
Test Coverage
package distribution // import "github.com/docker/docker/distribution"

import (
    "context"
    "fmt"

    "github.com/containerd/log"
    "github.com/distribution/reference"
    "github.com/docker/docker/api"
    "github.com/docker/docker/api/types/events"
    refstore "github.com/docker/docker/reference"
    "github.com/docker/docker/registry"
    "github.com/opencontainers/go-digest"
    "github.com/pkg/errors"
)

// Pull initiates a pull operation. image is the repository name to pull, and
// tag may be either empty, or indicate a specific tag to pull.
func Pull(ctx context.Context, ref reference.Named, config *ImagePullConfig, local ContentStore) error {
    repoInfo, err := pullEndpoints(ctx, config.RegistryService, ref, func(ctx context.Context, repoInfo registry.RepositoryInfo, endpoint registry.APIEndpoint) error {
        log.G(ctx).Debugf("Trying to pull %s from %s", reference.FamiliarName(repoInfo.Name), endpoint.URL)
        puller := newPuller(endpoint, &repoInfo, config, local)
        return puller.pull(ctx, ref)
    })

    if err == nil {
        config.ImageEventLogger(reference.FamiliarString(ref), reference.FamiliarName(repoInfo.Name), events.ActionPull)
    }

    return err
}

// Tags returns available tags for the given image in the remote repository.
func Tags(ctx context.Context, ref reference.Named, config *Config) ([]string, error) {
    var tags []string
    _, err := pullEndpoints(ctx, config.RegistryService, ref, func(ctx context.Context, repoInfo registry.RepositoryInfo, endpoint registry.APIEndpoint) error {
        repo, err := newRepository(ctx, &repoInfo, endpoint, config.MetaHeaders, config.AuthConfig, "pull")
        if err != nil {
            return err
        }

        tags, err = repo.Tags(ctx).All(ctx)
        return err
    })

    return tags, err
}

// validateRepoName validates the name of a repository.
func validateRepoName(name reference.Named) error {
    if reference.FamiliarName(name) == api.NoBaseImageSpecifier {
        return errors.WithStack(reservedNameError(api.NoBaseImageSpecifier))
    }
    return nil
}

func addDigestReference(store refstore.Store, ref reference.Named, dgst digest.Digest, id digest.Digest) error {
    dgstRef, err := reference.WithDigest(reference.TrimNamed(ref), dgst)
    if err != nil {
        return err
    }

    if oldTagID, err := store.Get(dgstRef); err == nil {
        if oldTagID != id {
            // Updating digests not supported by reference store
            log.G(context.TODO()).Errorf("Image ID for digest %s changed from %s to %s, cannot update", dgst.String(), oldTagID, id)
        }
        return nil
    } else if err != refstore.ErrDoesNotExist {
        return err
    }

    return store.AddDigest(dgstRef, id, true)
}

func pullEndpoints(ctx context.Context, registryService RegistryResolver, ref reference.Named,
    f func(context.Context, registry.RepositoryInfo, registry.APIEndpoint) error,
) (*registry.RepositoryInfo, error) {
    // Resolve the Repository name from fqn to RepositoryInfo
    repoInfo, err := registryService.ResolveRepository(ref)
    if err != nil {
        return nil, err
    }

    // makes sure name is not `scratch`
    if err := validateRepoName(repoInfo.Name); err != nil {
        return repoInfo, err
    }

    endpoints, err := registryService.LookupPullEndpoints(reference.Domain(repoInfo.Name))
    if err != nil {
        return repoInfo, err
    }

    var (
        lastErr error

        // confirmedTLSRegistries is a map indicating which registries
        // are known to be using TLS. There should never be a plaintext
        // retry for any of these.
        confirmedTLSRegistries = make(map[string]struct{})
    )
    for _, endpoint := range endpoints {
        if endpoint.URL.Scheme != "https" {
            if _, confirmedTLS := confirmedTLSRegistries[endpoint.URL.Host]; confirmedTLS {
                log.G(ctx).Debugf("Skipping non-TLS endpoint %s for host/port that appears to use TLS", endpoint.URL)
                continue
            }
        }

        log.G(ctx).Debugf("Trying to pull %s from %s", reference.FamiliarName(repoInfo.Name), endpoint.URL)

        if err := f(ctx, *repoInfo, endpoint); err != nil {
            if _, ok := err.(fallbackError); !ok && continueOnError(err, endpoint.Mirror) {
                err = fallbackError{
                    err:         err,
                    transportOK: true,
                }
            }

            // Was this pull cancelled? If so, don't try to fall
            // back.
            fallback := false
            select {
            case <-ctx.Done():
            default:
                if fallbackErr, ok := err.(fallbackError); ok {
                    fallback = true
                    if fallbackErr.transportOK && endpoint.URL.Scheme == "https" {
                        confirmedTLSRegistries[endpoint.URL.Host] = struct{}{}
                    }
                    err = fallbackErr.err
                }
            }
            if fallback {
                lastErr = err
                log.G(ctx).Infof("Attempting next endpoint for pull after error: %v", err)
                continue
            }
            log.G(ctx).Errorf("Not continuing with pull after error: %v", err)
            return repoInfo, translatePullError(err, ref)
        }

        return repoInfo, nil
    }

    if lastErr == nil {
        lastErr = fmt.Errorf("no endpoints found for %s", reference.FamiliarString(ref))
    }

    return repoInfo, translatePullError(lastErr, ref)
}