github.com/AkihiroSuda/docker@v1.13.1/plugin/backend_linux.go (about)

     1  // +build linux
     2  
     3  package plugin
     4  
     5  import (
     6  	"archive/tar"
     7  	"compress/gzip"
     8  	"encoding/json"
     9  	"fmt"
    10  	"io"
    11  	"io/ioutil"
    12  	"net/http"
    13  	"os"
    14  	"path"
    15  	"path/filepath"
    16  	"sort"
    17  	"strings"
    18  
    19  	"github.com/Sirupsen/logrus"
    20  	"github.com/docker/distribution/digest"
    21  	"github.com/docker/distribution/manifest/schema2"
    22  	"github.com/docker/docker/api/types"
    23  	"github.com/docker/docker/distribution"
    24  	progressutils "github.com/docker/docker/distribution/utils"
    25  	"github.com/docker/docker/distribution/xfer"
    26  	"github.com/docker/docker/image"
    27  	"github.com/docker/docker/layer"
    28  	"github.com/docker/docker/pkg/chrootarchive"
    29  	"github.com/docker/docker/pkg/mount"
    30  	"github.com/docker/docker/pkg/pools"
    31  	"github.com/docker/docker/pkg/progress"
    32  	"github.com/docker/docker/plugin/v2"
    33  	"github.com/docker/docker/reference"
    34  	"github.com/pkg/errors"
    35  	"golang.org/x/net/context"
    36  )
    37  
    38  // Disable deactivates a plugin. This means resources (volumes, networks) cant use them.
    39  func (pm *Manager) Disable(refOrID string, config *types.PluginDisableConfig) error {
    40  	p, err := pm.config.Store.GetV2Plugin(refOrID)
    41  	if err != nil {
    42  		return err
    43  	}
    44  	pm.mu.RLock()
    45  	c := pm.cMap[p]
    46  	pm.mu.RUnlock()
    47  
    48  	if !config.ForceDisable && p.GetRefCount() > 0 {
    49  		return fmt.Errorf("plugin %s is in use", p.Name())
    50  	}
    51  
    52  	if err := pm.disable(p, c); err != nil {
    53  		return err
    54  	}
    55  	pm.config.LogPluginEvent(p.GetID(), refOrID, "disable")
    56  	return nil
    57  }
    58  
    59  // Enable activates a plugin, which implies that they are ready to be used by containers.
    60  func (pm *Manager) Enable(refOrID string, config *types.PluginEnableConfig) error {
    61  	p, err := pm.config.Store.GetV2Plugin(refOrID)
    62  	if err != nil {
    63  		return err
    64  	}
    65  
    66  	c := &controller{timeoutInSecs: config.Timeout}
    67  	if err := pm.enable(p, c, false); err != nil {
    68  		return err
    69  	}
    70  	pm.config.LogPluginEvent(p.GetID(), refOrID, "enable")
    71  	return nil
    72  }
    73  
    74  // Inspect examines a plugin config
    75  func (pm *Manager) Inspect(refOrID string) (tp *types.Plugin, err error) {
    76  	p, err := pm.config.Store.GetV2Plugin(refOrID)
    77  	if err != nil {
    78  		return nil, err
    79  	}
    80  
    81  	return &p.PluginObj, nil
    82  }
    83  
    84  func (pm *Manager) pull(ctx context.Context, ref reference.Named, config *distribution.ImagePullConfig, outStream io.Writer) error {
    85  	if outStream != nil {
    86  		// Include a buffer so that slow client connections don't affect
    87  		// transfer performance.
    88  		progressChan := make(chan progress.Progress, 100)
    89  
    90  		writesDone := make(chan struct{})
    91  
    92  		defer func() {
    93  			close(progressChan)
    94  			<-writesDone
    95  		}()
    96  
    97  		var cancelFunc context.CancelFunc
    98  		ctx, cancelFunc = context.WithCancel(ctx)
    99  
   100  		go func() {
   101  			progressutils.WriteDistributionProgress(cancelFunc, outStream, progressChan)
   102  			close(writesDone)
   103  		}()
   104  
   105  		config.ProgressOutput = progress.ChanOutput(progressChan)
   106  	} else {
   107  		config.ProgressOutput = progress.DiscardOutput()
   108  	}
   109  	return distribution.Pull(ctx, ref, config)
   110  }
   111  
   112  type tempConfigStore struct {
   113  	config       []byte
   114  	configDigest digest.Digest
   115  }
   116  
   117  func (s *tempConfigStore) Put(c []byte) (digest.Digest, error) {
   118  	dgst := digest.FromBytes(c)
   119  
   120  	s.config = c
   121  	s.configDigest = dgst
   122  
   123  	return dgst, nil
   124  }
   125  
   126  func (s *tempConfigStore) Get(d digest.Digest) ([]byte, error) {
   127  	if d != s.configDigest {
   128  		return nil, digest.ErrDigestNotFound
   129  	}
   130  	return s.config, nil
   131  }
   132  
   133  func (s *tempConfigStore) RootFSFromConfig(c []byte) (*image.RootFS, error) {
   134  	return configToRootFS(c)
   135  }
   136  
   137  func computePrivileges(c types.PluginConfig) (types.PluginPrivileges, error) {
   138  	var privileges types.PluginPrivileges
   139  	if c.Network.Type != "null" && c.Network.Type != "bridge" && c.Network.Type != "" {
   140  		privileges = append(privileges, types.PluginPrivilege{
   141  			Name:        "network",
   142  			Description: "permissions to access a network",
   143  			Value:       []string{c.Network.Type},
   144  		})
   145  	}
   146  	for _, mount := range c.Mounts {
   147  		if mount.Source != nil {
   148  			privileges = append(privileges, types.PluginPrivilege{
   149  				Name:        "mount",
   150  				Description: "host path to mount",
   151  				Value:       []string{*mount.Source},
   152  			})
   153  		}
   154  	}
   155  	for _, device := range c.Linux.Devices {
   156  		if device.Path != nil {
   157  			privileges = append(privileges, types.PluginPrivilege{
   158  				Name:        "device",
   159  				Description: "host device to access",
   160  				Value:       []string{*device.Path},
   161  			})
   162  		}
   163  	}
   164  	if c.Linux.AllowAllDevices {
   165  		privileges = append(privileges, types.PluginPrivilege{
   166  			Name:        "allow-all-devices",
   167  			Description: "allow 'rwm' access to all devices",
   168  			Value:       []string{"true"},
   169  		})
   170  	}
   171  	if len(c.Linux.Capabilities) > 0 {
   172  		privileges = append(privileges, types.PluginPrivilege{
   173  			Name:        "capabilities",
   174  			Description: "list of additional capabilities required",
   175  			Value:       c.Linux.Capabilities,
   176  		})
   177  	}
   178  
   179  	return privileges, nil
   180  }
   181  
   182  // Privileges pulls a plugin config and computes the privileges required to install it.
   183  func (pm *Manager) Privileges(ctx context.Context, ref reference.Named, metaHeader http.Header, authConfig *types.AuthConfig) (types.PluginPrivileges, error) {
   184  	// create image store instance
   185  	cs := &tempConfigStore{}
   186  
   187  	// DownloadManager not defined because only pulling configuration.
   188  	pluginPullConfig := &distribution.ImagePullConfig{
   189  		Config: distribution.Config{
   190  			MetaHeaders:      metaHeader,
   191  			AuthConfig:       authConfig,
   192  			RegistryService:  pm.config.RegistryService,
   193  			ImageEventLogger: func(string, string, string) {},
   194  			ImageStore:       cs,
   195  		},
   196  		Schema2Types: distribution.PluginTypes,
   197  	}
   198  
   199  	if err := pm.pull(ctx, ref, pluginPullConfig, nil); err != nil {
   200  		return nil, err
   201  	}
   202  
   203  	if cs.config == nil {
   204  		return nil, errors.New("no configuration pulled")
   205  	}
   206  	var config types.PluginConfig
   207  	if err := json.Unmarshal(cs.config, &config); err != nil {
   208  		return nil, err
   209  	}
   210  
   211  	return computePrivileges(config)
   212  }
   213  
   214  // Upgrade upgrades a plugin
   215  func (pm *Manager) Upgrade(ctx context.Context, ref reference.Named, name string, metaHeader http.Header, authConfig *types.AuthConfig, privileges types.PluginPrivileges, outStream io.Writer) (err error) {
   216  	p, err := pm.config.Store.GetV2Plugin(name)
   217  	if err != nil {
   218  		return errors.Wrap(err, "plugin must be installed before upgrading")
   219  	}
   220  
   221  	if p.IsEnabled() {
   222  		return fmt.Errorf("plugin must be disabled before upgrading")
   223  	}
   224  
   225  	pm.muGC.RLock()
   226  	defer pm.muGC.RUnlock()
   227  
   228  	// revalidate because Pull is public
   229  	nameref, err := reference.ParseNamed(name)
   230  	if err != nil {
   231  		return errors.Wrapf(err, "failed to parse %q", name)
   232  	}
   233  	name = reference.WithDefaultTag(nameref).String()
   234  
   235  	tmpRootFSDir, err := ioutil.TempDir(pm.tmpDir(), ".rootfs")
   236  	defer os.RemoveAll(tmpRootFSDir)
   237  
   238  	dm := &downloadManager{
   239  		tmpDir:    tmpRootFSDir,
   240  		blobStore: pm.blobStore,
   241  	}
   242  
   243  	pluginPullConfig := &distribution.ImagePullConfig{
   244  		Config: distribution.Config{
   245  			MetaHeaders:      metaHeader,
   246  			AuthConfig:       authConfig,
   247  			RegistryService:  pm.config.RegistryService,
   248  			ImageEventLogger: pm.config.LogPluginEvent,
   249  			ImageStore:       dm,
   250  		},
   251  		DownloadManager: dm, // todo: reevaluate if possible to substitute distribution/xfer dependencies instead
   252  		Schema2Types:    distribution.PluginTypes,
   253  	}
   254  
   255  	err = pm.pull(ctx, ref, pluginPullConfig, outStream)
   256  	if err != nil {
   257  		go pm.GC()
   258  		return err
   259  	}
   260  
   261  	if err := pm.upgradePlugin(p, dm.configDigest, dm.blobs, tmpRootFSDir, &privileges); err != nil {
   262  		return err
   263  	}
   264  	p.PluginObj.PluginReference = ref.String()
   265  	return nil
   266  }
   267  
   268  // Pull pulls a plugin, check if the correct privileges are provided and install the plugin.
   269  func (pm *Manager) Pull(ctx context.Context, ref reference.Named, name string, metaHeader http.Header, authConfig *types.AuthConfig, privileges types.PluginPrivileges, outStream io.Writer) (err error) {
   270  	pm.muGC.RLock()
   271  	defer pm.muGC.RUnlock()
   272  
   273  	// revalidate because Pull is public
   274  	nameref, err := reference.ParseNamed(name)
   275  	if err != nil {
   276  		return errors.Wrapf(err, "failed to parse %q", name)
   277  	}
   278  	name = reference.WithDefaultTag(nameref).String()
   279  
   280  	if err := pm.config.Store.validateName(name); err != nil {
   281  		return err
   282  	}
   283  
   284  	tmpRootFSDir, err := ioutil.TempDir(pm.tmpDir(), ".rootfs")
   285  	defer os.RemoveAll(tmpRootFSDir)
   286  
   287  	dm := &downloadManager{
   288  		tmpDir:    tmpRootFSDir,
   289  		blobStore: pm.blobStore,
   290  	}
   291  
   292  	pluginPullConfig := &distribution.ImagePullConfig{
   293  		Config: distribution.Config{
   294  			MetaHeaders:      metaHeader,
   295  			AuthConfig:       authConfig,
   296  			RegistryService:  pm.config.RegistryService,
   297  			ImageEventLogger: pm.config.LogPluginEvent,
   298  			ImageStore:       dm,
   299  		},
   300  		DownloadManager: dm, // todo: reevaluate if possible to substitute distribution/xfer dependencies instead
   301  		Schema2Types:    distribution.PluginTypes,
   302  	}
   303  
   304  	err = pm.pull(ctx, ref, pluginPullConfig, outStream)
   305  	if err != nil {
   306  		go pm.GC()
   307  		return err
   308  	}
   309  
   310  	p, err := pm.createPlugin(name, dm.configDigest, dm.blobs, tmpRootFSDir, &privileges)
   311  	if err != nil {
   312  		return err
   313  	}
   314  	p.PluginObj.PluginReference = ref.String()
   315  
   316  	return nil
   317  }
   318  
   319  // List displays the list of plugins and associated metadata.
   320  func (pm *Manager) List() ([]types.Plugin, error) {
   321  	plugins := pm.config.Store.GetAll()
   322  	out := make([]types.Plugin, 0, len(plugins))
   323  	for _, p := range plugins {
   324  		out = append(out, p.PluginObj)
   325  	}
   326  	return out, nil
   327  }
   328  
   329  // Push pushes a plugin to the store.
   330  func (pm *Manager) Push(ctx context.Context, name string, metaHeader http.Header, authConfig *types.AuthConfig, outStream io.Writer) error {
   331  	p, err := pm.config.Store.GetV2Plugin(name)
   332  	if err != nil {
   333  		return err
   334  	}
   335  
   336  	ref, err := reference.ParseNamed(p.Name())
   337  	if err != nil {
   338  		return errors.Wrapf(err, "plugin has invalid name %v for push", p.Name())
   339  	}
   340  
   341  	var po progress.Output
   342  	if outStream != nil {
   343  		// Include a buffer so that slow client connections don't affect
   344  		// transfer performance.
   345  		progressChan := make(chan progress.Progress, 100)
   346  
   347  		writesDone := make(chan struct{})
   348  
   349  		defer func() {
   350  			close(progressChan)
   351  			<-writesDone
   352  		}()
   353  
   354  		var cancelFunc context.CancelFunc
   355  		ctx, cancelFunc = context.WithCancel(ctx)
   356  
   357  		go func() {
   358  			progressutils.WriteDistributionProgress(cancelFunc, outStream, progressChan)
   359  			close(writesDone)
   360  		}()
   361  
   362  		po = progress.ChanOutput(progressChan)
   363  	} else {
   364  		po = progress.DiscardOutput()
   365  	}
   366  
   367  	// TODO: replace these with manager
   368  	is := &pluginConfigStore{
   369  		pm:     pm,
   370  		plugin: p,
   371  	}
   372  	ls := &pluginLayerProvider{
   373  		pm:     pm,
   374  		plugin: p,
   375  	}
   376  	rs := &pluginReference{
   377  		name:     ref,
   378  		pluginID: p.Config,
   379  	}
   380  
   381  	uploadManager := xfer.NewLayerUploadManager(3)
   382  
   383  	imagePushConfig := &distribution.ImagePushConfig{
   384  		Config: distribution.Config{
   385  			MetaHeaders:      metaHeader,
   386  			AuthConfig:       authConfig,
   387  			ProgressOutput:   po,
   388  			RegistryService:  pm.config.RegistryService,
   389  			ReferenceStore:   rs,
   390  			ImageEventLogger: pm.config.LogPluginEvent,
   391  			ImageStore:       is,
   392  			RequireSchema2:   true,
   393  		},
   394  		ConfigMediaType: schema2.MediaTypePluginConfig,
   395  		LayerStore:      ls,
   396  		UploadManager:   uploadManager,
   397  	}
   398  
   399  	return distribution.Push(ctx, ref, imagePushConfig)
   400  }
   401  
   402  type pluginReference struct {
   403  	name     reference.Named
   404  	pluginID digest.Digest
   405  }
   406  
   407  func (r *pluginReference) References(id digest.Digest) []reference.Named {
   408  	if r.pluginID != id {
   409  		return nil
   410  	}
   411  	return []reference.Named{r.name}
   412  }
   413  
   414  func (r *pluginReference) ReferencesByName(ref reference.Named) []reference.Association {
   415  	return []reference.Association{
   416  		{
   417  			Ref: r.name,
   418  			ID:  r.pluginID,
   419  		},
   420  	}
   421  }
   422  
   423  func (r *pluginReference) Get(ref reference.Named) (digest.Digest, error) {
   424  	if r.name.String() != ref.String() {
   425  		return digest.Digest(""), reference.ErrDoesNotExist
   426  	}
   427  	return r.pluginID, nil
   428  }
   429  
   430  func (r *pluginReference) AddTag(ref reference.Named, id digest.Digest, force bool) error {
   431  	// Read only, ignore
   432  	return nil
   433  }
   434  func (r *pluginReference) AddDigest(ref reference.Canonical, id digest.Digest, force bool) error {
   435  	// Read only, ignore
   436  	return nil
   437  }
   438  func (r *pluginReference) Delete(ref reference.Named) (bool, error) {
   439  	// Read only, ignore
   440  	return false, nil
   441  }
   442  
   443  type pluginConfigStore struct {
   444  	pm     *Manager
   445  	plugin *v2.Plugin
   446  }
   447  
   448  func (s *pluginConfigStore) Put([]byte) (digest.Digest, error) {
   449  	return digest.Digest(""), errors.New("cannot store config on push")
   450  }
   451  
   452  func (s *pluginConfigStore) Get(d digest.Digest) ([]byte, error) {
   453  	if s.plugin.Config != d {
   454  		return nil, errors.New("plugin not found")
   455  	}
   456  	rwc, err := s.pm.blobStore.Get(d)
   457  	if err != nil {
   458  		return nil, err
   459  	}
   460  	defer rwc.Close()
   461  	return ioutil.ReadAll(rwc)
   462  }
   463  
   464  func (s *pluginConfigStore) RootFSFromConfig(c []byte) (*image.RootFS, error) {
   465  	return configToRootFS(c)
   466  }
   467  
   468  type pluginLayerProvider struct {
   469  	pm     *Manager
   470  	plugin *v2.Plugin
   471  }
   472  
   473  func (p *pluginLayerProvider) Get(id layer.ChainID) (distribution.PushLayer, error) {
   474  	rootFS := rootFSFromPlugin(p.plugin.PluginObj.Config.Rootfs)
   475  	var i int
   476  	for i = 1; i <= len(rootFS.DiffIDs); i++ {
   477  		if layer.CreateChainID(rootFS.DiffIDs[:i]) == id {
   478  			break
   479  		}
   480  	}
   481  	if i > len(rootFS.DiffIDs) {
   482  		return nil, errors.New("layer not found")
   483  	}
   484  	return &pluginLayer{
   485  		pm:      p.pm,
   486  		diffIDs: rootFS.DiffIDs[:i],
   487  		blobs:   p.plugin.Blobsums[:i],
   488  	}, nil
   489  }
   490  
   491  type pluginLayer struct {
   492  	pm      *Manager
   493  	diffIDs []layer.DiffID
   494  	blobs   []digest.Digest
   495  }
   496  
   497  func (l *pluginLayer) ChainID() layer.ChainID {
   498  	return layer.CreateChainID(l.diffIDs)
   499  }
   500  
   501  func (l *pluginLayer) DiffID() layer.DiffID {
   502  	return l.diffIDs[len(l.diffIDs)-1]
   503  }
   504  
   505  func (l *pluginLayer) Parent() distribution.PushLayer {
   506  	if len(l.diffIDs) == 1 {
   507  		return nil
   508  	}
   509  	return &pluginLayer{
   510  		pm:      l.pm,
   511  		diffIDs: l.diffIDs[:len(l.diffIDs)-1],
   512  		blobs:   l.blobs[:len(l.diffIDs)-1],
   513  	}
   514  }
   515  
   516  func (l *pluginLayer) Open() (io.ReadCloser, error) {
   517  	return l.pm.blobStore.Get(l.blobs[len(l.diffIDs)-1])
   518  }
   519  
   520  func (l *pluginLayer) Size() (int64, error) {
   521  	return l.pm.blobStore.Size(l.blobs[len(l.diffIDs)-1])
   522  }
   523  
   524  func (l *pluginLayer) MediaType() string {
   525  	return schema2.MediaTypeLayer
   526  }
   527  
   528  func (l *pluginLayer) Release() {
   529  	// Nothing needs to be release, no references held
   530  }
   531  
   532  // Remove deletes plugin's root directory.
   533  func (pm *Manager) Remove(name string, config *types.PluginRmConfig) error {
   534  	p, err := pm.config.Store.GetV2Plugin(name)
   535  	pm.mu.RLock()
   536  	c := pm.cMap[p]
   537  	pm.mu.RUnlock()
   538  
   539  	if err != nil {
   540  		return err
   541  	}
   542  
   543  	if !config.ForceRemove {
   544  		if p.GetRefCount() > 0 {
   545  			return fmt.Errorf("plugin %s is in use", p.Name())
   546  		}
   547  		if p.IsEnabled() {
   548  			return fmt.Errorf("plugin %s is enabled", p.Name())
   549  		}
   550  	}
   551  
   552  	if p.IsEnabled() {
   553  		if err := pm.disable(p, c); err != nil {
   554  			logrus.Errorf("failed to disable plugin '%s': %s", p.Name(), err)
   555  		}
   556  	}
   557  
   558  	defer func() {
   559  		go pm.GC()
   560  	}()
   561  
   562  	id := p.GetID()
   563  	pm.config.Store.Remove(p)
   564  	pluginDir := filepath.Join(pm.config.Root, id)
   565  	if err := recursiveUnmount(pm.config.Root); err != nil {
   566  		logrus.WithField("dir", pm.config.Root).WithField("id", id).Warn(err)
   567  	}
   568  	if err := os.RemoveAll(pluginDir); err != nil {
   569  		logrus.Warnf("unable to remove %q from plugin remove: %v", pluginDir, err)
   570  	}
   571  	pm.config.LogPluginEvent(id, name, "remove")
   572  	return nil
   573  }
   574  
   575  func getMounts(root string) ([]string, error) {
   576  	infos, err := mount.GetMounts()
   577  	if err != nil {
   578  		return nil, errors.Wrap(err, "failed to read mount table while performing recursive unmount")
   579  	}
   580  
   581  	var mounts []string
   582  	for _, m := range infos {
   583  		if strings.HasPrefix(m.Mountpoint, root) {
   584  			mounts = append(mounts, m.Mountpoint)
   585  		}
   586  	}
   587  
   588  	return mounts, nil
   589  }
   590  
   591  func recursiveUnmount(root string) error {
   592  	mounts, err := getMounts(root)
   593  	if err != nil {
   594  		return err
   595  	}
   596  
   597  	// sort in reverse-lexicographic order so the root mount will always be last
   598  	sort.Sort(sort.Reverse(sort.StringSlice(mounts)))
   599  
   600  	for i, m := range mounts {
   601  		if err := mount.Unmount(m); err != nil {
   602  			if i == len(mounts)-1 {
   603  				return errors.Wrapf(err, "error performing recursive unmount on %s", root)
   604  			}
   605  			logrus.WithError(err).WithField("mountpoint", m).Warn("could not unmount")
   606  		}
   607  	}
   608  
   609  	return nil
   610  }
   611  
   612  // Set sets plugin args
   613  func (pm *Manager) Set(name string, args []string) error {
   614  	p, err := pm.config.Store.GetV2Plugin(name)
   615  	if err != nil {
   616  		return err
   617  	}
   618  	if err := p.Set(args); err != nil {
   619  		return err
   620  	}
   621  	return pm.save(p)
   622  }
   623  
   624  // CreateFromContext creates a plugin from the given pluginDir which contains
   625  // both the rootfs and the config.json and a repoName with optional tag.
   626  func (pm *Manager) CreateFromContext(ctx context.Context, tarCtx io.ReadCloser, options *types.PluginCreateOptions) (err error) {
   627  	pm.muGC.RLock()
   628  	defer pm.muGC.RUnlock()
   629  
   630  	ref, err := reference.ParseNamed(options.RepoName)
   631  	if err != nil {
   632  		return errors.Wrapf(err, "failed to parse reference %v", options.RepoName)
   633  	}
   634  	if _, ok := ref.(reference.Canonical); ok {
   635  		return errors.Errorf("canonical references are not permitted")
   636  	}
   637  	taggedRef := reference.WithDefaultTag(ref)
   638  	name := taggedRef.String()
   639  
   640  	if err := pm.config.Store.validateName(name); err != nil { // fast check, real check is in createPlugin()
   641  		return err
   642  	}
   643  
   644  	tmpRootFSDir, err := ioutil.TempDir(pm.tmpDir(), ".rootfs")
   645  	defer os.RemoveAll(tmpRootFSDir)
   646  	if err != nil {
   647  		return errors.Wrap(err, "failed to create temp directory")
   648  	}
   649  	var configJSON []byte
   650  	rootFS := splitConfigRootFSFromTar(tarCtx, &configJSON)
   651  
   652  	rootFSBlob, err := pm.blobStore.New()
   653  	if err != nil {
   654  		return err
   655  	}
   656  	defer rootFSBlob.Close()
   657  	gzw := gzip.NewWriter(rootFSBlob)
   658  	layerDigester := digest.Canonical.New()
   659  	rootFSReader := io.TeeReader(rootFS, io.MultiWriter(gzw, layerDigester.Hash()))
   660  
   661  	if err := chrootarchive.Untar(rootFSReader, tmpRootFSDir, nil); err != nil {
   662  		return err
   663  	}
   664  	if err := rootFS.Close(); err != nil {
   665  		return err
   666  	}
   667  
   668  	if configJSON == nil {
   669  		return errors.New("config not found")
   670  	}
   671  
   672  	if err := gzw.Close(); err != nil {
   673  		return errors.Wrap(err, "error closing gzip writer")
   674  	}
   675  
   676  	var config types.PluginConfig
   677  	if err := json.Unmarshal(configJSON, &config); err != nil {
   678  		return errors.Wrap(err, "failed to parse config")
   679  	}
   680  
   681  	if err := pm.validateConfig(config); err != nil {
   682  		return err
   683  	}
   684  
   685  	pm.mu.Lock()
   686  	defer pm.mu.Unlock()
   687  
   688  	rootFSBlobsum, err := rootFSBlob.Commit()
   689  	if err != nil {
   690  		return err
   691  	}
   692  	defer func() {
   693  		if err != nil {
   694  			go pm.GC()
   695  		}
   696  	}()
   697  
   698  	config.Rootfs = &types.PluginConfigRootfs{
   699  		Type:    "layers",
   700  		DiffIds: []string{layerDigester.Digest().String()},
   701  	}
   702  
   703  	configBlob, err := pm.blobStore.New()
   704  	if err != nil {
   705  		return err
   706  	}
   707  	defer configBlob.Close()
   708  	if err := json.NewEncoder(configBlob).Encode(config); err != nil {
   709  		return errors.Wrap(err, "error encoding json config")
   710  	}
   711  	configBlobsum, err := configBlob.Commit()
   712  	if err != nil {
   713  		return err
   714  	}
   715  
   716  	p, err := pm.createPlugin(name, configBlobsum, []digest.Digest{rootFSBlobsum}, tmpRootFSDir, nil)
   717  	if err != nil {
   718  		return err
   719  	}
   720  	p.PluginObj.PluginReference = taggedRef.String()
   721  
   722  	pm.config.LogPluginEvent(p.PluginObj.ID, name, "create")
   723  
   724  	return nil
   725  }
   726  
   727  func (pm *Manager) validateConfig(config types.PluginConfig) error {
   728  	return nil // TODO:
   729  }
   730  
   731  func splitConfigRootFSFromTar(in io.ReadCloser, config *[]byte) io.ReadCloser {
   732  	pr, pw := io.Pipe()
   733  	go func() {
   734  		tarReader := tar.NewReader(in)
   735  		tarWriter := tar.NewWriter(pw)
   736  		defer in.Close()
   737  
   738  		hasRootFS := false
   739  
   740  		for {
   741  			hdr, err := tarReader.Next()
   742  			if err == io.EOF {
   743  				if !hasRootFS {
   744  					pw.CloseWithError(errors.Wrap(err, "no rootfs found"))
   745  					return
   746  				}
   747  				// Signals end of archive.
   748  				tarWriter.Close()
   749  				pw.Close()
   750  				return
   751  			}
   752  			if err != nil {
   753  				pw.CloseWithError(errors.Wrap(err, "failed to read from tar"))
   754  				return
   755  			}
   756  
   757  			content := io.Reader(tarReader)
   758  			name := path.Clean(hdr.Name)
   759  			if path.IsAbs(name) {
   760  				name = name[1:]
   761  			}
   762  			if name == configFileName {
   763  				dt, err := ioutil.ReadAll(content)
   764  				if err != nil {
   765  					pw.CloseWithError(errors.Wrapf(err, "failed to read %s", configFileName))
   766  					return
   767  				}
   768  				*config = dt
   769  			}
   770  			if parts := strings.Split(name, "/"); len(parts) != 0 && parts[0] == rootFSFileName {
   771  				hdr.Name = path.Clean(path.Join(parts[1:]...))
   772  				if hdr.Typeflag == tar.TypeLink && strings.HasPrefix(strings.ToLower(hdr.Linkname), rootFSFileName+"/") {
   773  					hdr.Linkname = hdr.Linkname[len(rootFSFileName)+1:]
   774  				}
   775  				if err := tarWriter.WriteHeader(hdr); err != nil {
   776  					pw.CloseWithError(errors.Wrap(err, "error writing tar header"))
   777  					return
   778  				}
   779  				if _, err := pools.Copy(tarWriter, content); err != nil {
   780  					pw.CloseWithError(errors.Wrap(err, "error copying tar data"))
   781  					return
   782  				}
   783  				hasRootFS = true
   784  			} else {
   785  				io.Copy(ioutil.Discard, content)
   786  			}
   787  		}
   788  	}()
   789  	return pr
   790  }