123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300 |
- package registry
- import (
- "fmt"
- "io/ioutil"
- "net/http"
- "net/url"
- "strings"
- "time"
- "github.com/Sirupsen/logrus"
- "github.com/docker/distribution/registry/client/auth"
- "github.com/docker/distribution/registry/client/transport"
- "github.com/docker/engine-api/types"
- registrytypes "github.com/docker/engine-api/types/registry"
- )
- const (
- // AuthClientID is used the ClientID used for the token server
- AuthClientID = "docker"
- )
- // loginV1 tries to register/login to the v1 registry server.
- func loginV1(authConfig *types.AuthConfig, apiEndpoint APIEndpoint, userAgent string) (string, string, error) {
- registryEndpoint, err := apiEndpoint.ToV1Endpoint(userAgent, nil)
- if err != nil {
- return "", "", err
- }
- serverAddress := registryEndpoint.String()
- logrus.Debugf("attempting v1 login to registry endpoint %s", serverAddress)
- if serverAddress == "" {
- return "", "", fmt.Errorf("Server Error: Server Address not set.")
- }
- loginAgainstOfficialIndex := serverAddress == IndexServer
- req, err := http.NewRequest("GET", serverAddress+"users/", nil)
- if err != nil {
- return "", "", err
- }
- req.SetBasicAuth(authConfig.Username, authConfig.Password)
- resp, err := registryEndpoint.client.Do(req)
- if err != nil {
- // fallback when request could not be completed
- return "", "", fallbackError{
- err: err,
- }
- }
- defer resp.Body.Close()
- body, err := ioutil.ReadAll(resp.Body)
- if err != nil {
- return "", "", err
- }
- if resp.StatusCode == http.StatusOK {
- return "Login Succeeded", "", nil
- } else if resp.StatusCode == http.StatusUnauthorized {
- if loginAgainstOfficialIndex {
- return "", "", fmt.Errorf("Wrong login/password, please try again. Haven't got a Docker ID? Create one at https://hub.docker.com")
- }
- return "", "", fmt.Errorf("Wrong login/password, please try again")
- } else if resp.StatusCode == http.StatusForbidden {
- if loginAgainstOfficialIndex {
- return "", "", fmt.Errorf("Login: Account is not active. Please check your e-mail for a confirmation link.")
- }
- // *TODO: Use registry configuration to determine what this says, if anything?
- return "", "", fmt.Errorf("Login: Account is not active. Please see the documentation of the registry %s for instructions how to activate it.", serverAddress)
- } else if resp.StatusCode == http.StatusInternalServerError { // Issue #14326
- logrus.Errorf("%s returned status code %d. Response Body :\n%s", req.URL.String(), resp.StatusCode, body)
- return "", "", fmt.Errorf("Internal Server Error")
- }
- return "", "", fmt.Errorf("Login: %s (Code: %d; Headers: %s)", body,
- resp.StatusCode, resp.Header)
- }
- type loginCredentialStore struct {
- authConfig *types.AuthConfig
- }
- func (lcs loginCredentialStore) Basic(*url.URL) (string, string) {
- return lcs.authConfig.Username, lcs.authConfig.Password
- }
- func (lcs loginCredentialStore) RefreshToken(*url.URL, string) string {
- return lcs.authConfig.IdentityToken
- }
- func (lcs loginCredentialStore) SetRefreshToken(u *url.URL, service, token string) {
- lcs.authConfig.IdentityToken = token
- }
- type staticCredentialStore struct {
- auth *types.AuthConfig
- }
- // NewStaticCredentialStore returns a credential store
- // which always returns the same credential values.
- func NewStaticCredentialStore(auth *types.AuthConfig) auth.CredentialStore {
- return staticCredentialStore{
- auth: auth,
- }
- }
- func (scs staticCredentialStore) Basic(*url.URL) (string, string) {
- if scs.auth == nil {
- return "", ""
- }
- return scs.auth.Username, scs.auth.Password
- }
- func (scs staticCredentialStore) RefreshToken(*url.URL, string) string {
- if scs.auth == nil {
- return ""
- }
- return scs.auth.IdentityToken
- }
- func (scs staticCredentialStore) SetRefreshToken(*url.URL, string, string) {
- }
- type fallbackError struct {
- err error
- }
- func (err fallbackError) Error() string {
- return err.err.Error()
- }
- // loginV2 tries to login to the v2 registry server. The given registry
- // endpoint will be pinged to get authorization challenges. These challenges
- // will be used to authenticate against the registry to validate credentials.
- func loginV2(authConfig *types.AuthConfig, endpoint APIEndpoint, userAgent string) (string, string, error) {
- logrus.Debugf("attempting v2 login to registry endpoint %s", strings.TrimRight(endpoint.URL.String(), "/")+"/v2/")
- modifiers := DockerHeaders(userAgent, nil)
- authTransport := transport.NewTransport(NewTransport(endpoint.TLSConfig), modifiers...)
- credentialAuthConfig := *authConfig
- creds := loginCredentialStore{
- authConfig: &credentialAuthConfig,
- }
- loginClient, foundV2, err := v2AuthHTTPClient(endpoint.URL, authTransport, modifiers, creds, nil)
- if err != nil {
- return "", "", err
- }
- endpointStr := strings.TrimRight(endpoint.URL.String(), "/") + "/v2/"
- req, err := http.NewRequest("GET", endpointStr, nil)
- if err != nil {
- if !foundV2 {
- err = fallbackError{err: err}
- }
- return "", "", err
- }
- resp, err := loginClient.Do(req)
- if err != nil {
- if !foundV2 {
- err = fallbackError{err: err}
- }
- return "", "", err
- }
- defer resp.Body.Close()
- if resp.StatusCode != http.StatusOK {
- // TODO(dmcgowan): Attempt to further interpret result, status code and error code string
- err := fmt.Errorf("login attempt to %s failed with status: %d %s", endpointStr, resp.StatusCode, http.StatusText(resp.StatusCode))
- if !foundV2 {
- err = fallbackError{err: err}
- }
- return "", "", err
- }
- return "Login Succeeded", credentialAuthConfig.IdentityToken, nil
- }
- func v2AuthHTTPClient(endpoint *url.URL, authTransport http.RoundTripper, modifiers []transport.RequestModifier, creds auth.CredentialStore, scopes []auth.Scope) (*http.Client, bool, error) {
- challengeManager, foundV2, err := PingV2Registry(endpoint, authTransport)
- if err != nil {
- if !foundV2 {
- err = fallbackError{err: err}
- }
- return nil, foundV2, err
- }
- tokenHandlerOptions := auth.TokenHandlerOptions{
- Transport: authTransport,
- Credentials: creds,
- OfflineAccess: true,
- ClientID: AuthClientID,
- Scopes: scopes,
- }
- tokenHandler := auth.NewTokenHandlerWithOptions(tokenHandlerOptions)
- basicHandler := auth.NewBasicHandler(creds)
- modifiers = append(modifiers, auth.NewAuthorizer(challengeManager, tokenHandler, basicHandler))
- tr := transport.NewTransport(authTransport, modifiers...)
- return &http.Client{
- Transport: tr,
- Timeout: 15 * time.Second,
- }, foundV2, nil
- }
- // ResolveAuthConfig matches an auth configuration to a server address or a URL
- func ResolveAuthConfig(authConfigs map[string]types.AuthConfig, index *registrytypes.IndexInfo) types.AuthConfig {
- configKey := GetAuthConfigKey(index)
- // First try the happy case
- if c, found := authConfigs[configKey]; found || index.Official {
- return c
- }
- convertToHostname := func(url string) string {
- stripped := url
- if strings.HasPrefix(url, "http://") {
- stripped = strings.Replace(url, "http://", "", 1)
- } else if strings.HasPrefix(url, "https://") {
- stripped = strings.Replace(url, "https://", "", 1)
- }
- nameParts := strings.SplitN(stripped, "/", 2)
- return nameParts[0]
- }
- // Maybe they have a legacy config file, we will iterate the keys converting
- // them to the new format and testing
- for registry, ac := range authConfigs {
- if configKey == convertToHostname(registry) {
- return ac
- }
- }
- // When all else fails, return an empty auth config
- return types.AuthConfig{}
- }
- // PingResponseError is used when the response from a ping
- // was received but invalid.
- type PingResponseError struct {
- Err error
- }
- func (err PingResponseError) Error() string {
- return err.Error()
- }
- // PingV2Registry attempts to ping a v2 registry and on success return a
- // challenge manager for the supported authentication types and
- // whether v2 was confirmed by the response. If a response is received but
- // cannot be interpreted a PingResponseError will be returned.
- func PingV2Registry(endpoint *url.URL, transport http.RoundTripper) (auth.ChallengeManager, bool, error) {
- var (
- foundV2 = false
- v2Version = auth.APIVersion{
- Type: "registry",
- Version: "2.0",
- }
- )
- pingClient := &http.Client{
- Transport: transport,
- Timeout: 15 * time.Second,
- }
- endpointStr := strings.TrimRight(endpoint.String(), "/") + "/v2/"
- req, err := http.NewRequest("GET", endpointStr, nil)
- if err != nil {
- return nil, false, err
- }
- resp, err := pingClient.Do(req)
- if err != nil {
- return nil, false, err
- }
- defer resp.Body.Close()
- versions := auth.APIVersions(resp, DefaultRegistryVersionHeader)
- for _, pingVersion := range versions {
- if pingVersion == v2Version {
- // The version header indicates we're definitely
- // talking to a v2 registry. So don't allow future
- // fallbacks to the v1 protocol.
- foundV2 = true
- break
- }
- }
- challengeManager := auth.NewSimpleChallengeManager()
- if err := challengeManager.AddResponse(resp); err != nil {
- return nil, foundV2, PingResponseError{
- Err: err,
- }
- }
- return challengeManager, foundV2, nil
- }
|