github.com/rumpl/bof@v23.0.0-rc.2+incompatible/distribution/push_v2.go (about)

     1  package distribution // import "github.com/docker/docker/distribution"
     2  
     3  import (
     4  	"context"
     5  	"fmt"
     6  	"io"
     7  	"os"
     8  	"runtime"
     9  	"sort"
    10  	"strings"
    11  	"sync"
    12  
    13  	"github.com/docker/distribution"
    14  	"github.com/docker/distribution/manifest/schema1"
    15  	"github.com/docker/distribution/manifest/schema2"
    16  	"github.com/docker/distribution/reference"
    17  	"github.com/docker/distribution/registry/api/errcode"
    18  	"github.com/docker/distribution/registry/client"
    19  	apitypes "github.com/docker/docker/api/types"
    20  	"github.com/docker/docker/distribution/metadata"
    21  	"github.com/docker/docker/distribution/xfer"
    22  	"github.com/docker/docker/layer"
    23  	"github.com/docker/docker/pkg/ioutils"
    24  	"github.com/docker/docker/pkg/progress"
    25  	"github.com/docker/docker/pkg/stringid"
    26  	"github.com/docker/docker/registry"
    27  	"github.com/docker/libtrust"
    28  	"github.com/opencontainers/go-digest"
    29  	"github.com/pkg/errors"
    30  	"github.com/sirupsen/logrus"
    31  )
    32  
    33  const (
    34  	smallLayerMaximumSize  = 100 * (1 << 10) // 100KB
    35  	middleLayerMaximumSize = 10 * (1 << 20)  // 10MB
    36  )
    37  
    38  // newPusher creates a new pusher for pushing to a v2 registry.
    39  // The parameters are passed through to the underlying pusher implementation for
    40  // use during the actual push operation.
    41  func newPusher(ref reference.Named, endpoint registry.APIEndpoint, repoInfo *registry.RepositoryInfo, config *ImagePushConfig) *pusher {
    42  	return &pusher{
    43  		metadataService: metadata.NewV2MetadataService(config.MetadataStore),
    44  		ref:             ref,
    45  		endpoint:        endpoint,
    46  		repoInfo:        repoInfo,
    47  		config:          config,
    48  	}
    49  }
    50  
    51  type pusher struct {
    52  	metadataService metadata.V2MetadataService
    53  	ref             reference.Named
    54  	endpoint        registry.APIEndpoint
    55  	repoInfo        *registry.RepositoryInfo
    56  	config          *ImagePushConfig
    57  	repo            distribution.Repository
    58  
    59  	// pushState is state built by the Upload functions.
    60  	pushState pushState
    61  }
    62  
    63  type pushState struct {
    64  	sync.Mutex
    65  	// remoteLayers is the set of layers known to exist on the remote side.
    66  	// This avoids redundant queries when pushing multiple tags that
    67  	// involve the same layers. It is also used to fill in digest and size
    68  	// information when building the manifest.
    69  	remoteLayers map[layer.DiffID]distribution.Descriptor
    70  	hasAuthInfo  bool
    71  }
    72  
    73  // TODO(tiborvass): have push() take a reference to repository + tag, so that the pusher itself is repository-agnostic.
    74  func (p *pusher) push(ctx context.Context) (err error) {
    75  	p.pushState.remoteLayers = make(map[layer.DiffID]distribution.Descriptor)
    76  
    77  	p.repo, err = newRepository(ctx, p.repoInfo, p.endpoint, p.config.MetaHeaders, p.config.AuthConfig, "push", "pull")
    78  	p.pushState.hasAuthInfo = p.config.AuthConfig.RegistryToken != "" || (p.config.AuthConfig.Username != "" && p.config.AuthConfig.Password != "")
    79  	if err != nil {
    80  		logrus.Debugf("Error getting v2 registry: %v", err)
    81  		return err
    82  	}
    83  
    84  	if err = p.pushRepository(ctx); err != nil {
    85  		if continueOnError(err, p.endpoint.Mirror) {
    86  			return fallbackError{
    87  				err:         err,
    88  				transportOK: true,
    89  			}
    90  		}
    91  	}
    92  	return err
    93  }
    94  
    95  func (p *pusher) pushRepository(ctx context.Context) (err error) {
    96  	if namedTagged, isNamedTagged := p.ref.(reference.NamedTagged); isNamedTagged {
    97  		imageID, err := p.config.ReferenceStore.Get(p.ref)
    98  		if err != nil {
    99  			return fmt.Errorf("tag does not exist: %s", reference.FamiliarString(p.ref))
   100  		}
   101  
   102  		return p.pushTag(ctx, namedTagged, imageID)
   103  	}
   104  
   105  	if !reference.IsNameOnly(p.ref) {
   106  		return errors.New("cannot push a digest reference")
   107  	}
   108  
   109  	// Push all tags
   110  	pushed := 0
   111  	for _, association := range p.config.ReferenceStore.ReferencesByName(p.ref) {
   112  		if namedTagged, isNamedTagged := association.Ref.(reference.NamedTagged); isNamedTagged {
   113  			pushed++
   114  			if err := p.pushTag(ctx, namedTagged, association.ID); err != nil {
   115  				return err
   116  			}
   117  		}
   118  	}
   119  
   120  	if pushed == 0 {
   121  		return fmt.Errorf("no tags to push for %s", reference.FamiliarName(p.repoInfo.Name))
   122  	}
   123  
   124  	return nil
   125  }
   126  
   127  func (p *pusher) pushTag(ctx context.Context, ref reference.NamedTagged, id digest.Digest) error {
   128  	logrus.Debugf("Pushing repository: %s", reference.FamiliarString(ref))
   129  
   130  	imgConfig, err := p.config.ImageStore.Get(ctx, id)
   131  	if err != nil {
   132  		return fmt.Errorf("could not find image from tag %s: %v", reference.FamiliarString(ref), err)
   133  	}
   134  
   135  	rootfs, err := rootFSFromConfig(imgConfig)
   136  	if err != nil {
   137  		return fmt.Errorf("unable to get rootfs for image %s: %s", reference.FamiliarString(ref), err)
   138  	}
   139  
   140  	l, err := p.config.LayerStores.Get(rootfs.ChainID())
   141  	if err != nil {
   142  		return fmt.Errorf("failed to get top layer from image: %v", err)
   143  	}
   144  	defer l.Release()
   145  
   146  	hmacKey, err := metadata.ComputeV2MetadataHMACKey(p.config.AuthConfig)
   147  	if err != nil {
   148  		return fmt.Errorf("failed to compute hmac key of auth config: %v", err)
   149  	}
   150  
   151  	var descriptors []xfer.UploadDescriptor
   152  
   153  	descriptorTemplate := pushDescriptor{
   154  		metadataService: p.metadataService,
   155  		hmacKey:         hmacKey,
   156  		repoInfo:        p.repoInfo.Name,
   157  		ref:             p.ref,
   158  		endpoint:        p.endpoint,
   159  		repo:            p.repo,
   160  		pushState:       &p.pushState,
   161  	}
   162  
   163  	// Loop bounds condition is to avoid pushing the base layer on Windows.
   164  	for range rootfs.DiffIDs {
   165  		descriptor := descriptorTemplate
   166  		descriptor.layer = l
   167  		descriptor.checkedDigests = make(map[digest.Digest]struct{})
   168  		descriptors = append(descriptors, &descriptor)
   169  
   170  		l = l.Parent()
   171  	}
   172  
   173  	if err := p.config.UploadManager.Upload(ctx, descriptors, p.config.ProgressOutput); err != nil {
   174  		return err
   175  	}
   176  
   177  	// Try schema2 first
   178  	builder := schema2.NewManifestBuilder(p.repo.Blobs(ctx), p.config.ConfigMediaType, imgConfig)
   179  	manifest, err := manifestFromBuilder(ctx, builder, descriptors)
   180  	if err != nil {
   181  		return err
   182  	}
   183  
   184  	manSvc, err := p.repo.Manifests(ctx)
   185  	if err != nil {
   186  		return err
   187  	}
   188  
   189  	putOptions := []distribution.ManifestServiceOption{distribution.WithTag(ref.Tag())}
   190  	if _, err = manSvc.Put(ctx, manifest, putOptions...); err != nil {
   191  		if runtime.GOOS == "windows" {
   192  			logrus.Warnf("failed to upload schema2 manifest: %v", err)
   193  			return err
   194  		}
   195  
   196  		// This is a temporary environment variables used in CI to allow pushing
   197  		// manifest v2 schema 1 images to test-registries used for testing *pulling*
   198  		// these images.
   199  		if os.Getenv("DOCKER_ALLOW_SCHEMA1_PUSH_DONOTUSE") == "" {
   200  			if err.Error() == "tag invalid" {
   201  				msg := "[DEPRECATED] support for pushing manifest v2 schema1 images has been removed. More information at https://docs.docker.com/registry/spec/deprecated-schema-v1/"
   202  				logrus.WithError(err).Error(msg)
   203  				return errors.Wrap(err, msg)
   204  			}
   205  			return err
   206  		}
   207  
   208  		logrus.Warnf("failed to upload schema2 manifest: %v - falling back to schema1", err)
   209  
   210  		// Note: this fallback is deprecated, see log messages below
   211  		manifestRef, err := reference.WithTag(p.repo.Named(), ref.Tag())
   212  		if err != nil {
   213  			return err
   214  		}
   215  		pk, err := libtrust.GenerateECP256PrivateKey()
   216  		if err != nil {
   217  			return errors.Wrap(err, "unexpected error generating private key")
   218  		}
   219  		builder = schema1.NewConfigManifestBuilder(p.repo.Blobs(ctx), pk, manifestRef, imgConfig)
   220  		manifest, err = manifestFromBuilder(ctx, builder, descriptors)
   221  		if err != nil {
   222  			return err
   223  		}
   224  
   225  		if _, err = manSvc.Put(ctx, manifest, putOptions...); err != nil {
   226  			return err
   227  		}
   228  
   229  		// schema2 failed but schema1 succeeded
   230  		msg := fmt.Sprintf("[DEPRECATION NOTICE] support for pushing manifest v2 schema1 images will be removed in an upcoming release. Please contact admins of the %s registry NOW to avoid future disruption. More information at https://docs.docker.com/registry/spec/deprecated-schema-v1/", reference.Domain(ref))
   231  		logrus.Warn(msg)
   232  		progress.Message(p.config.ProgressOutput, "", msg)
   233  	}
   234  
   235  	var canonicalManifest []byte
   236  
   237  	switch v := manifest.(type) {
   238  	case *schema1.SignedManifest:
   239  		canonicalManifest = v.Canonical
   240  	case *schema2.DeserializedManifest:
   241  		_, canonicalManifest, err = v.Payload()
   242  		if err != nil {
   243  			return err
   244  		}
   245  	}
   246  
   247  	manifestDigest := digest.FromBytes(canonicalManifest)
   248  	progress.Messagef(p.config.ProgressOutput, "", "%s: digest: %s size: %d", ref.Tag(), manifestDigest, len(canonicalManifest))
   249  
   250  	if err := addDigestReference(p.config.ReferenceStore, ref, manifestDigest, id); err != nil {
   251  		return err
   252  	}
   253  
   254  	// Signal digest to the trust client so it can sign the
   255  	// push, if appropriate.
   256  	progress.Aux(p.config.ProgressOutput, apitypes.PushResult{Tag: ref.Tag(), Digest: manifestDigest.String(), Size: len(canonicalManifest)})
   257  
   258  	return nil
   259  }
   260  
   261  func manifestFromBuilder(ctx context.Context, builder distribution.ManifestBuilder, descriptors []xfer.UploadDescriptor) (distribution.Manifest, error) {
   262  	// descriptors is in reverse order; iterate backwards to get references
   263  	// appended in the right order.
   264  	for i := len(descriptors) - 1; i >= 0; i-- {
   265  		if err := builder.AppendReference(descriptors[i].(*pushDescriptor)); err != nil {
   266  			return nil, err
   267  		}
   268  	}
   269  
   270  	return builder.Build(ctx)
   271  }
   272  
   273  type pushDescriptor struct {
   274  	layer            PushLayer
   275  	metadataService  metadata.V2MetadataService
   276  	hmacKey          []byte
   277  	repoInfo         reference.Named
   278  	ref              reference.Named
   279  	endpoint         registry.APIEndpoint
   280  	repo             distribution.Repository
   281  	pushState        *pushState
   282  	remoteDescriptor distribution.Descriptor
   283  	// a set of digests whose presence has been checked in a target repository
   284  	checkedDigests map[digest.Digest]struct{}
   285  }
   286  
   287  func (pd *pushDescriptor) Key() string {
   288  	return "v2push:" + pd.ref.Name() + " " + pd.layer.DiffID().String()
   289  }
   290  
   291  func (pd *pushDescriptor) ID() string {
   292  	return stringid.TruncateID(pd.layer.DiffID().String())
   293  }
   294  
   295  func (pd *pushDescriptor) DiffID() layer.DiffID {
   296  	return pd.layer.DiffID()
   297  }
   298  
   299  func (pd *pushDescriptor) Upload(ctx context.Context, progressOutput progress.Output) (distribution.Descriptor, error) {
   300  	// Skip foreign layers unless this registry allows nondistributable artifacts.
   301  	if !pd.endpoint.AllowNondistributableArtifacts {
   302  		if fs, ok := pd.layer.(distribution.Describable); ok {
   303  			if d := fs.Descriptor(); len(d.URLs) > 0 {
   304  				progress.Update(progressOutput, pd.ID(), "Skipped foreign layer")
   305  				return d, nil
   306  			}
   307  		}
   308  	}
   309  
   310  	diffID := pd.DiffID()
   311  
   312  	pd.pushState.Lock()
   313  	if descriptor, ok := pd.pushState.remoteLayers[diffID]; ok {
   314  		// it is already known that the push is not needed and
   315  		// therefore doing a stat is unnecessary
   316  		pd.pushState.Unlock()
   317  		progress.Update(progressOutput, pd.ID(), "Layer already exists")
   318  		return descriptor, nil
   319  	}
   320  	pd.pushState.Unlock()
   321  
   322  	maxMountAttempts, maxExistenceChecks, checkOtherRepositories := getMaxMountAndExistenceCheckAttempts(pd.layer)
   323  
   324  	// Do we have any metadata associated with this layer's DiffID?
   325  	metaData, err := pd.metadataService.GetMetadata(diffID)
   326  	if err == nil {
   327  		// check for blob existence in the target repository
   328  		descriptor, exists, err := pd.layerAlreadyExists(ctx, progressOutput, diffID, true, 1, metaData)
   329  		if exists || err != nil {
   330  			return descriptor, err
   331  		}
   332  	}
   333  
   334  	// if digest was empty or not saved, or if blob does not exist on the remote repository,
   335  	// then push the blob.
   336  	bs := pd.repo.Blobs(ctx)
   337  
   338  	var layerUpload distribution.BlobWriter
   339  
   340  	// Attempt to find another repository in the same registry to mount the layer from to avoid an unnecessary upload
   341  	candidates := getRepositoryMountCandidates(pd.repoInfo, pd.hmacKey, maxMountAttempts, metaData)
   342  	isUnauthorizedError := false
   343  	for _, mc := range candidates {
   344  		mountCandidate := mc
   345  		logrus.Debugf("attempting to mount layer %s (%s) from %s", diffID, mountCandidate.Digest, mountCandidate.SourceRepository)
   346  		createOpts := []distribution.BlobCreateOption{}
   347  
   348  		if len(mountCandidate.SourceRepository) > 0 {
   349  			namedRef, err := reference.ParseNormalizedNamed(mountCandidate.SourceRepository)
   350  			if err != nil {
   351  				logrus.WithError(err).Errorf("failed to parse source repository reference %v", reference.FamiliarString(namedRef))
   352  				_ = pd.metadataService.Remove(mountCandidate)
   353  				continue
   354  			}
   355  
   356  			// Candidates are always under same domain, create remote reference
   357  			// with only path to set mount from with
   358  			remoteRef, err := reference.WithName(reference.Path(namedRef))
   359  			if err != nil {
   360  				logrus.WithError(err).Errorf("failed to make remote reference out of %q", reference.Path(namedRef))
   361  				continue
   362  			}
   363  
   364  			canonicalRef, err := reference.WithDigest(reference.TrimNamed(remoteRef), mountCandidate.Digest)
   365  			if err != nil {
   366  				logrus.WithError(err).Error("failed to make canonical reference")
   367  				continue
   368  			}
   369  
   370  			createOpts = append(createOpts, client.WithMountFrom(canonicalRef))
   371  		}
   372  
   373  		// send the layer
   374  		lu, err := bs.Create(ctx, createOpts...)
   375  		switch err := err.(type) {
   376  		case nil:
   377  			// noop
   378  		case distribution.ErrBlobMounted:
   379  			progress.Updatef(progressOutput, pd.ID(), "Mounted from %s", err.From.Name())
   380  
   381  			err.Descriptor.MediaType = schema2.MediaTypeLayer
   382  
   383  			pd.pushState.Lock()
   384  			pd.pushState.remoteLayers[diffID] = err.Descriptor
   385  			pd.pushState.Unlock()
   386  
   387  			// Cache mapping from this layer's DiffID to the blobsum
   388  			if err := pd.metadataService.TagAndAdd(diffID, pd.hmacKey, metadata.V2Metadata{
   389  				Digest:           err.Descriptor.Digest,
   390  				SourceRepository: pd.repoInfo.Name(),
   391  			}); err != nil {
   392  				return distribution.Descriptor{}, xfer.DoNotRetry{Err: err}
   393  			}
   394  			return err.Descriptor, nil
   395  		case errcode.Errors:
   396  			for _, e := range err {
   397  				switch e := e.(type) {
   398  				case errcode.Error:
   399  					if e.Code == errcode.ErrorCodeUnauthorized {
   400  						// when unauthorized error that indicate user don't has right to push layer to register
   401  						logrus.Debugln("failed to push layer to registry because unauthorized error")
   402  						isUnauthorizedError = true
   403  					}
   404  				default:
   405  				}
   406  			}
   407  		default:
   408  			logrus.Infof("failed to mount layer %s (%s) from %s: %v", diffID, mountCandidate.Digest, mountCandidate.SourceRepository, err)
   409  		}
   410  
   411  		// when error is unauthorizedError and user don't hasAuthInfo that's the case user don't has right to push layer to register
   412  		// and he hasn't login either, in this case candidate cache should be removed
   413  		if len(mountCandidate.SourceRepository) > 0 &&
   414  			!(isUnauthorizedError && !pd.pushState.hasAuthInfo) &&
   415  			(metadata.CheckV2MetadataHMAC(&mountCandidate, pd.hmacKey) ||
   416  				len(mountCandidate.HMAC) == 0) {
   417  			cause := "blob mount failure"
   418  			if err != nil {
   419  				cause = fmt.Sprintf("an error: %v", err.Error())
   420  			}
   421  			logrus.Debugf("removing association between layer %s and %s due to %s", mountCandidate.Digest, mountCandidate.SourceRepository, cause)
   422  			_ = pd.metadataService.Remove(mountCandidate)
   423  		}
   424  
   425  		if lu != nil {
   426  			// cancel previous upload
   427  			cancelLayerUpload(ctx, mountCandidate.Digest, layerUpload)
   428  			layerUpload = lu
   429  		}
   430  	}
   431  
   432  	if maxExistenceChecks-len(pd.checkedDigests) > 0 {
   433  		// do additional layer existence checks with other known digests if any
   434  		descriptor, exists, err := pd.layerAlreadyExists(ctx, progressOutput, diffID, checkOtherRepositories, maxExistenceChecks-len(pd.checkedDigests), metaData)
   435  		if exists || err != nil {
   436  			return descriptor, err
   437  		}
   438  	}
   439  
   440  	logrus.Debugf("Pushing layer: %s", diffID)
   441  	if layerUpload == nil {
   442  		layerUpload, err = bs.Create(ctx)
   443  		if err != nil {
   444  			return distribution.Descriptor{}, retryOnError(err)
   445  		}
   446  	}
   447  	defer layerUpload.Close()
   448  	// upload the blob
   449  	return pd.uploadUsingSession(ctx, progressOutput, diffID, layerUpload)
   450  }
   451  
   452  func (pd *pushDescriptor) SetRemoteDescriptor(descriptor distribution.Descriptor) {
   453  	pd.remoteDescriptor = descriptor
   454  }
   455  
   456  func (pd *pushDescriptor) Descriptor() distribution.Descriptor {
   457  	return pd.remoteDescriptor
   458  }
   459  
   460  func (pd *pushDescriptor) uploadUsingSession(
   461  	ctx context.Context,
   462  	progressOutput progress.Output,
   463  	diffID layer.DiffID,
   464  	layerUpload distribution.BlobWriter,
   465  ) (distribution.Descriptor, error) {
   466  	var reader io.ReadCloser
   467  
   468  	contentReader, err := pd.layer.Open()
   469  	if err != nil {
   470  		return distribution.Descriptor{}, retryOnError(err)
   471  	}
   472  
   473  	reader = progress.NewProgressReader(ioutils.NewCancelReadCloser(ctx, contentReader), progressOutput, pd.layer.Size(), pd.ID(), "Pushing")
   474  
   475  	switch m := pd.layer.MediaType(); m {
   476  	case schema2.MediaTypeUncompressedLayer:
   477  		compressedReader, compressionDone := compress(reader)
   478  		defer func(closer io.Closer) {
   479  			closer.Close()
   480  			<-compressionDone
   481  		}(reader)
   482  		reader = compressedReader
   483  	case schema2.MediaTypeLayer:
   484  	default:
   485  		reader.Close()
   486  		return distribution.Descriptor{}, xfer.DoNotRetry{Err: fmt.Errorf("unsupported layer media type %s", m)}
   487  	}
   488  
   489  	digester := digest.Canonical.Digester()
   490  	tee := io.TeeReader(reader, digester.Hash())
   491  
   492  	nn, err := layerUpload.ReadFrom(tee)
   493  	reader.Close()
   494  	if err != nil {
   495  		return distribution.Descriptor{}, retryOnError(err)
   496  	}
   497  
   498  	pushDigest := digester.Digest()
   499  	if _, err := layerUpload.Commit(ctx, distribution.Descriptor{Digest: pushDigest}); err != nil {
   500  		return distribution.Descriptor{}, retryOnError(err)
   501  	}
   502  
   503  	logrus.Debugf("uploaded layer %s (%s), %d bytes", diffID, pushDigest, nn)
   504  	progress.Update(progressOutput, pd.ID(), "Pushed")
   505  
   506  	// Cache mapping from this layer's DiffID to the blobsum
   507  	if err := pd.metadataService.TagAndAdd(diffID, pd.hmacKey, metadata.V2Metadata{
   508  		Digest:           pushDigest,
   509  		SourceRepository: pd.repoInfo.Name(),
   510  	}); err != nil {
   511  		return distribution.Descriptor{}, xfer.DoNotRetry{Err: err}
   512  	}
   513  
   514  	desc := distribution.Descriptor{
   515  		Digest:    pushDigest,
   516  		MediaType: schema2.MediaTypeLayer,
   517  		Size:      nn,
   518  	}
   519  
   520  	pd.pushState.Lock()
   521  	pd.pushState.remoteLayers[diffID] = desc
   522  	pd.pushState.Unlock()
   523  
   524  	return desc, nil
   525  }
   526  
   527  // layerAlreadyExists checks if the registry already knows about any of the metadata passed in the "metadata"
   528  // slice. If it finds one that the registry knows about, it returns the known digest and "true". If
   529  // "checkOtherRepositories" is true, stat will be performed also with digests mapped to any other repository
   530  // (not just the target one).
   531  func (pd *pushDescriptor) layerAlreadyExists(
   532  	ctx context.Context,
   533  	progressOutput progress.Output,
   534  	diffID layer.DiffID,
   535  	checkOtherRepositories bool,
   536  	maxExistenceCheckAttempts int,
   537  	v2Metadata []metadata.V2Metadata,
   538  ) (desc distribution.Descriptor, exists bool, err error) {
   539  	// filter the metadata
   540  	candidates := []metadata.V2Metadata{}
   541  	for _, meta := range v2Metadata {
   542  		if len(meta.SourceRepository) > 0 && !checkOtherRepositories && meta.SourceRepository != pd.repoInfo.Name() {
   543  			continue
   544  		}
   545  		candidates = append(candidates, meta)
   546  	}
   547  	// sort the candidates by similarity
   548  	sortV2MetadataByLikenessAndAge(pd.repoInfo, pd.hmacKey, candidates)
   549  
   550  	digestToMetadata := make(map[digest.Digest]*metadata.V2Metadata)
   551  	// an array of unique blob digests ordered from the best mount candidates to worst
   552  	layerDigests := []digest.Digest{}
   553  	for i := 0; i < len(candidates); i++ {
   554  		if len(layerDigests) >= maxExistenceCheckAttempts {
   555  			break
   556  		}
   557  		meta := &candidates[i]
   558  		if _, exists := digestToMetadata[meta.Digest]; exists {
   559  			// keep reference just to the first mapping (the best mount candidate)
   560  			continue
   561  		}
   562  		if _, exists := pd.checkedDigests[meta.Digest]; exists {
   563  			// existence of this digest has already been tested
   564  			continue
   565  		}
   566  		digestToMetadata[meta.Digest] = meta
   567  		layerDigests = append(layerDigests, meta.Digest)
   568  	}
   569  
   570  attempts:
   571  	for _, dgst := range layerDigests {
   572  		meta := digestToMetadata[dgst]
   573  		logrus.Debugf("Checking for presence of layer %s (%s) in %s", diffID, dgst, pd.repoInfo.Name())
   574  		desc, err = pd.repo.Blobs(ctx).Stat(ctx, dgst)
   575  		pd.checkedDigests[meta.Digest] = struct{}{}
   576  		switch err {
   577  		case nil:
   578  			if m, ok := digestToMetadata[desc.Digest]; !ok || m.SourceRepository != pd.repoInfo.Name() || !metadata.CheckV2MetadataHMAC(m, pd.hmacKey) {
   579  				// cache mapping from this layer's DiffID to the blobsum
   580  				if err := pd.metadataService.TagAndAdd(diffID, pd.hmacKey, metadata.V2Metadata{
   581  					Digest:           desc.Digest,
   582  					SourceRepository: pd.repoInfo.Name(),
   583  				}); err != nil {
   584  					return distribution.Descriptor{}, false, xfer.DoNotRetry{Err: err}
   585  				}
   586  			}
   587  			desc.MediaType = schema2.MediaTypeLayer
   588  			exists = true
   589  			break attempts
   590  		case distribution.ErrBlobUnknown:
   591  			if meta.SourceRepository == pd.repoInfo.Name() {
   592  				// remove the mapping to the target repository
   593  				pd.metadataService.Remove(*meta)
   594  			}
   595  		default:
   596  			logrus.WithError(err).Debugf("Failed to check for presence of layer %s (%s) in %s", diffID, dgst, pd.repoInfo.Name())
   597  		}
   598  	}
   599  
   600  	if exists {
   601  		progress.Update(progressOutput, pd.ID(), "Layer already exists")
   602  		pd.pushState.Lock()
   603  		pd.pushState.remoteLayers[diffID] = desc
   604  		pd.pushState.Unlock()
   605  	}
   606  
   607  	return desc, exists, nil
   608  }
   609  
   610  // getMaxMountAndExistenceCheckAttempts returns a maximum number of cross repository mount attempts from
   611  // source repositories of target registry, maximum number of layer existence checks performed on the target
   612  // repository and whether the check shall be done also with digests mapped to different repositories. The
   613  // decision is based on layer size. The smaller the layer, the fewer attempts shall be made because the cost
   614  // of upload does not outweigh a latency.
   615  func getMaxMountAndExistenceCheckAttempts(layer PushLayer) (maxMountAttempts, maxExistenceCheckAttempts int, checkOtherRepositories bool) {
   616  	size := layer.Size()
   617  	switch {
   618  	// big blob
   619  	case size > middleLayerMaximumSize:
   620  		// 1st attempt to mount the blob few times
   621  		// 2nd few existence checks with digests associated to any repository
   622  		// then fallback to upload
   623  		return 4, 3, true
   624  
   625  	// middle sized blobs; if we could not get the size, assume we deal with middle sized blob
   626  	case size > smallLayerMaximumSize:
   627  		// 1st attempt to mount blobs of average size few times
   628  		// 2nd try at most 1 existence check if there's an existing mapping to the target repository
   629  		// then fallback to upload
   630  		return 3, 1, false
   631  
   632  	// small blobs, do a minimum number of checks
   633  	default:
   634  		return 1, 1, false
   635  	}
   636  }
   637  
   638  // getRepositoryMountCandidates returns an array of v2 metadata items belonging to the given registry. The
   639  // array is sorted from youngest to oldest. If requireRegistryMatch is true, the resulting array will contain
   640  // only metadata entries having registry part of SourceRepository matching the part of repoInfo.
   641  func getRepositoryMountCandidates(
   642  	repoInfo reference.Named,
   643  	hmacKey []byte,
   644  	max int,
   645  	v2Metadata []metadata.V2Metadata,
   646  ) []metadata.V2Metadata {
   647  	candidates := []metadata.V2Metadata{}
   648  	for _, meta := range v2Metadata {
   649  		sourceRepo, err := reference.ParseNamed(meta.SourceRepository)
   650  		if err != nil || reference.Domain(repoInfo) != reference.Domain(sourceRepo) {
   651  			continue
   652  		}
   653  		// target repository is not a viable candidate
   654  		if meta.SourceRepository == repoInfo.Name() {
   655  			continue
   656  		}
   657  		candidates = append(candidates, meta)
   658  	}
   659  
   660  	sortV2MetadataByLikenessAndAge(repoInfo, hmacKey, candidates)
   661  	if max >= 0 && len(candidates) > max {
   662  		// select the youngest metadata
   663  		candidates = candidates[:max]
   664  	}
   665  
   666  	return candidates
   667  }
   668  
   669  // byLikeness is a sorting container for v2 metadata candidates for cross repository mount. The
   670  // candidate "a" is preferred over "b":
   671  //
   672  //  1. if it was hashed using the same AuthConfig as the one used to authenticate to target repository and the
   673  //     "b" was not
   674  //  2. if a number of its repository path components exactly matching path components of target repository is higher
   675  type byLikeness struct {
   676  	arr            []metadata.V2Metadata
   677  	hmacKey        []byte
   678  	pathComponents []string
   679  }
   680  
   681  func (bla byLikeness) Less(i, j int) bool {
   682  	aMacMatch := metadata.CheckV2MetadataHMAC(&bla.arr[i], bla.hmacKey)
   683  	bMacMatch := metadata.CheckV2MetadataHMAC(&bla.arr[j], bla.hmacKey)
   684  	if aMacMatch != bMacMatch {
   685  		return aMacMatch
   686  	}
   687  	aMatch := numOfMatchingPathComponents(bla.arr[i].SourceRepository, bla.pathComponents)
   688  	bMatch := numOfMatchingPathComponents(bla.arr[j].SourceRepository, bla.pathComponents)
   689  	return aMatch > bMatch
   690  }
   691  func (bla byLikeness) Swap(i, j int) {
   692  	bla.arr[i], bla.arr[j] = bla.arr[j], bla.arr[i]
   693  }
   694  func (bla byLikeness) Len() int { return len(bla.arr) }
   695  
   696  func sortV2MetadataByLikenessAndAge(repoInfo reference.Named, hmacKey []byte, marr []metadata.V2Metadata) {
   697  	// reverse the metadata array to shift the newest entries to the beginning
   698  	for i := 0; i < len(marr)/2; i++ {
   699  		marr[i], marr[len(marr)-i-1] = marr[len(marr)-i-1], marr[i]
   700  	}
   701  	// keep equal entries ordered from the youngest to the oldest
   702  	sort.Stable(byLikeness{
   703  		arr:            marr,
   704  		hmacKey:        hmacKey,
   705  		pathComponents: getPathComponents(repoInfo.Name()),
   706  	})
   707  }
   708  
   709  // numOfMatchingPathComponents returns a number of path components in "pth" that exactly match "matchComponents".
   710  func numOfMatchingPathComponents(pth string, matchComponents []string) int {
   711  	pthComponents := getPathComponents(pth)
   712  	i := 0
   713  	for ; i < len(pthComponents) && i < len(matchComponents); i++ {
   714  		if matchComponents[i] != pthComponents[i] {
   715  			return i
   716  		}
   717  	}
   718  	return i
   719  }
   720  
   721  func getPathComponents(path string) []string {
   722  	return strings.Split(path, "/")
   723  }
   724  
   725  func cancelLayerUpload(ctx context.Context, dgst digest.Digest, layerUpload distribution.BlobWriter) {
   726  	if layerUpload != nil {
   727  		logrus.Debugf("cancelling upload of blob %s", dgst)
   728  		err := layerUpload.Cancel(ctx)
   729  		if err != nil {
   730  			logrus.Warnf("failed to cancel upload: %v", err)
   731  		}
   732  	}
   733  }