286 lines
7.9 KiB
Go
286 lines
7.9 KiB
Go
// Copyright 2015 go-dockerclient authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package docker
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"errors"
|
|
"io"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"os"
|
|
"path"
|
|
"strings"
|
|
)
|
|
|
|
// ErrCannotParseDockercfg is the error returned by NewAuthConfigurations when the dockercfg cannot be parsed.
|
|
var ErrCannotParseDockercfg = errors.New("failed to read authentication from dockercfg")
|
|
|
|
// AuthConfiguration represents authentication options to use in the PushImage
|
|
// method. It represents the authentication in the Docker index server.
|
|
type AuthConfiguration struct {
|
|
Username string `json:"username,omitempty"`
|
|
Password string `json:"password,omitempty"`
|
|
Email string `json:"email,omitempty"`
|
|
ServerAddress string `json:"serveraddress,omitempty"`
|
|
|
|
// IdentityToken can be supplied with the identitytoken response of the AuthCheck call
|
|
// see https://pkg.go.dev/github.com/docker/docker/api/types?tab=doc#AuthConfig
|
|
// It can be used in place of password not in conjunction with it
|
|
IdentityToken string `json:"identitytoken,omitempty"`
|
|
|
|
// RegistryToken can be supplied with the registrytoken
|
|
RegistryToken string `json:"registrytoken,omitempty"`
|
|
}
|
|
|
|
func (c AuthConfiguration) isEmpty() bool {
|
|
return c == AuthConfiguration{}
|
|
}
|
|
|
|
func (c AuthConfiguration) headerKey() string {
|
|
return "X-Registry-Auth"
|
|
}
|
|
|
|
// AuthConfigurations represents authentication options to use for the
|
|
// PushImage method accommodating the new X-Registry-Config header
|
|
type AuthConfigurations struct {
|
|
Configs map[string]AuthConfiguration `json:"configs"`
|
|
}
|
|
|
|
func (c AuthConfigurations) isEmpty() bool {
|
|
return len(c.Configs) == 0
|
|
}
|
|
|
|
func (AuthConfigurations) headerKey() string {
|
|
return "X-Registry-Config"
|
|
}
|
|
|
|
// merge updates the configuration. If a key is defined in both maps, the one
|
|
// in c.Configs takes precedence.
|
|
func (c *AuthConfigurations) merge(other AuthConfigurations) {
|
|
for k, v := range other.Configs {
|
|
if c.Configs == nil {
|
|
c.Configs = make(map[string]AuthConfiguration)
|
|
}
|
|
if _, ok := c.Configs[k]; !ok {
|
|
c.Configs[k] = v
|
|
}
|
|
}
|
|
}
|
|
|
|
// AuthConfigurations119 is used to serialize a set of AuthConfigurations
|
|
// for Docker API >= 1.19.
|
|
type AuthConfigurations119 map[string]AuthConfiguration
|
|
|
|
func (c AuthConfigurations119) isEmpty() bool {
|
|
return len(c) == 0
|
|
}
|
|
|
|
func (c AuthConfigurations119) headerKey() string {
|
|
return "X-Registry-Config"
|
|
}
|
|
|
|
// dockerConfig represents a registry authentation configuration from the
|
|
// .dockercfg file.
|
|
type dockerConfig struct {
|
|
Auth string `json:"auth"`
|
|
Email string `json:"email"`
|
|
IdentityToken string `json:"identitytoken"`
|
|
RegistryToken string `json:"registrytoken"`
|
|
}
|
|
|
|
// NewAuthConfigurationsFromFile returns AuthConfigurations from a path containing JSON
|
|
// in the same format as the .dockercfg file.
|
|
func NewAuthConfigurationsFromFile(path string) (*AuthConfigurations, error) {
|
|
r, err := os.Open(path)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return NewAuthConfigurations(r)
|
|
}
|
|
|
|
func cfgPaths(dockerConfigEnv string, homeEnv string) []string {
|
|
if dockerConfigEnv != "" {
|
|
return []string{
|
|
path.Join(dockerConfigEnv, "plaintext-passwords.json"),
|
|
path.Join(dockerConfigEnv, "config.json"),
|
|
}
|
|
}
|
|
if homeEnv != "" {
|
|
return []string{
|
|
path.Join(homeEnv, ".docker", "plaintext-passwords.json"),
|
|
path.Join(homeEnv, ".docker", "config.json"),
|
|
path.Join(homeEnv, ".dockercfg"),
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// NewAuthConfigurationsFromDockerCfg returns AuthConfigurations from system
|
|
// config files. The following files are checked in the order listed:
|
|
//
|
|
// If the environment variable DOCKER_CONFIG is set to a non-empty string:
|
|
//
|
|
// - $DOCKER_CONFIG/plaintext-passwords.json
|
|
// - $DOCKER_CONFIG/config.json
|
|
//
|
|
// Otherwise, it looks for files in the $HOME directory and the legacy
|
|
// location:
|
|
//
|
|
// - $HOME/.docker/plaintext-passwords.json
|
|
// - $HOME/.docker/config.json
|
|
// - $HOME/.dockercfg
|
|
func NewAuthConfigurationsFromDockerCfg() (*AuthConfigurations, error) {
|
|
pathsToTry := cfgPaths(os.Getenv("DOCKER_CONFIG"), os.Getenv("HOME"))
|
|
if len(pathsToTry) < 1 {
|
|
return nil, errors.New("no docker configuration found")
|
|
}
|
|
return newAuthConfigurationsFromDockerCfg(pathsToTry)
|
|
}
|
|
|
|
func newAuthConfigurationsFromDockerCfg(pathsToTry []string) (*AuthConfigurations, error) {
|
|
var result *AuthConfigurations
|
|
var auths *AuthConfigurations
|
|
var err error
|
|
for _, path := range pathsToTry {
|
|
auths, err = NewAuthConfigurationsFromFile(path)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
|
|
if result == nil {
|
|
result = auths
|
|
} else {
|
|
result.merge(*auths)
|
|
}
|
|
}
|
|
|
|
if result != nil {
|
|
return result, nil
|
|
}
|
|
return result, err
|
|
}
|
|
|
|
// NewAuthConfigurations returns AuthConfigurations from a JSON encoded string in the
|
|
// same format as the .dockercfg file.
|
|
func NewAuthConfigurations(r io.Reader) (*AuthConfigurations, error) {
|
|
var auth *AuthConfigurations
|
|
confs, err := parseDockerConfig(r)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
auth, err = authConfigs(confs)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return auth, nil
|
|
}
|
|
|
|
func parseDockerConfig(r io.Reader) (map[string]dockerConfig, error) {
|
|
buf := new(bytes.Buffer)
|
|
buf.ReadFrom(r)
|
|
byteData := buf.Bytes()
|
|
|
|
confsWrapper := struct {
|
|
Auths map[string]dockerConfig `json:"auths"`
|
|
}{}
|
|
if err := json.Unmarshal(byteData, &confsWrapper); err == nil {
|
|
if len(confsWrapper.Auths) > 0 {
|
|
return confsWrapper.Auths, nil
|
|
}
|
|
}
|
|
|
|
var confs map[string]dockerConfig
|
|
if err := json.Unmarshal(byteData, &confs); err != nil {
|
|
return nil, err
|
|
}
|
|
return confs, nil
|
|
}
|
|
|
|
// authConfigs converts a dockerConfigs map to a AuthConfigurations object.
|
|
func authConfigs(confs map[string]dockerConfig) (*AuthConfigurations, error) {
|
|
c := &AuthConfigurations{
|
|
Configs: make(map[string]AuthConfiguration),
|
|
}
|
|
|
|
for reg, conf := range confs {
|
|
if conf.Auth == "" {
|
|
continue
|
|
}
|
|
|
|
// support both padded and unpadded encoding
|
|
data, err := base64.StdEncoding.DecodeString(conf.Auth)
|
|
if err != nil {
|
|
data, err = base64.StdEncoding.WithPadding(base64.NoPadding).DecodeString(conf.Auth)
|
|
}
|
|
if err != nil {
|
|
return nil, errors.New("error decoding plaintext credentials")
|
|
}
|
|
|
|
userpass := strings.SplitN(string(data), ":", 2)
|
|
if len(userpass) != 2 {
|
|
return nil, ErrCannotParseDockercfg
|
|
}
|
|
|
|
authConfig := AuthConfiguration{
|
|
Email: conf.Email,
|
|
Username: userpass[0],
|
|
Password: userpass[1],
|
|
ServerAddress: reg,
|
|
}
|
|
|
|
// if identitytoken provided then zero the password and set it
|
|
if conf.IdentityToken != "" {
|
|
authConfig.Password = ""
|
|
authConfig.IdentityToken = conf.IdentityToken
|
|
}
|
|
|
|
// if registrytoken provided then zero the password and set it
|
|
if conf.RegistryToken != "" {
|
|
authConfig.Password = ""
|
|
authConfig.RegistryToken = conf.RegistryToken
|
|
}
|
|
c.Configs[reg] = authConfig
|
|
}
|
|
|
|
return c, nil
|
|
}
|
|
|
|
// AuthStatus returns the authentication status for Docker API versions >= 1.23.
|
|
type AuthStatus struct {
|
|
Status string `json:"Status,omitempty" yaml:"Status,omitempty" toml:"Status,omitempty"`
|
|
IdentityToken string `json:"IdentityToken,omitempty" yaml:"IdentityToken,omitempty" toml:"IdentityToken,omitempty"`
|
|
}
|
|
|
|
// AuthCheck validates the given credentials. It returns nil if successful.
|
|
//
|
|
// For Docker API versions >= 1.23, the AuthStatus struct will be populated, otherwise it will be empty.`
|
|
//
|
|
// See https://goo.gl/6nsZkH for more details.
|
|
func (c *Client) AuthCheck(conf *AuthConfiguration) (AuthStatus, error) {
|
|
var authStatus AuthStatus
|
|
if conf == nil {
|
|
return authStatus, errors.New("conf is nil")
|
|
}
|
|
resp, err := c.do(http.MethodPost, "/auth", doOptions{data: conf})
|
|
if err != nil {
|
|
return authStatus, err
|
|
}
|
|
defer resp.Body.Close()
|
|
data, err := ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
return authStatus, err
|
|
}
|
|
if len(data) == 0 {
|
|
return authStatus, nil
|
|
}
|
|
if err := json.Unmarshal(data, &authStatus); err != nil {
|
|
return authStatus, err
|
|
}
|
|
return authStatus, nil
|
|
}
|