123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481 |
- package registry
- import (
- "encoding/base64"
- "encoding/json"
- "errors"
- "fmt"
- "io/ioutil"
- "net/http"
- "os"
- "path"
- "strings"
- "sync"
- "time"
- log "github.com/Sirupsen/logrus"
- "github.com/docker/docker/utils"
- )
- const (
- // Where we store the config file
- CONFIGFILE = ".dockercfg"
- )
- var (
- ErrConfigFileMissing = errors.New("The Auth config file is missing")
- )
- type AuthConfig struct {
- Username string `json:"username,omitempty"`
- Password string `json:"password,omitempty"`
- Auth string `json:"auth"`
- Email string `json:"email"`
- ServerAddress string `json:"serveraddress,omitempty"`
- }
- type ConfigFile struct {
- Configs map[string]AuthConfig `json:"configs,omitempty"`
- rootPath string
- }
- type RequestAuthorization struct {
- authConfig *AuthConfig
- registryEndpoint *Endpoint
- resource string
- scope string
- actions []string
- tokenLock sync.Mutex
- tokenCache string
- tokenExpiration time.Time
- }
- func NewRequestAuthorization(authConfig *AuthConfig, registryEndpoint *Endpoint, resource, scope string, actions []string) *RequestAuthorization {
- return &RequestAuthorization{
- authConfig: authConfig,
- registryEndpoint: registryEndpoint,
- resource: resource,
- scope: scope,
- actions: actions,
- }
- }
- func (auth *RequestAuthorization) getToken() (string, error) {
- auth.tokenLock.Lock()
- defer auth.tokenLock.Unlock()
- now := time.Now()
- if now.Before(auth.tokenExpiration) {
- log.Debugf("Using cached token for %s", auth.authConfig.Username)
- return auth.tokenCache, nil
- }
- client := &http.Client{
- Transport: &http.Transport{
- DisableKeepAlives: true,
- Proxy: http.ProxyFromEnvironment},
- CheckRedirect: AddRequiredHeadersToRedirectedRequests,
- }
- factory := HTTPRequestFactory(nil)
- for _, challenge := range auth.registryEndpoint.AuthChallenges {
- switch strings.ToLower(challenge.Scheme) {
- case "basic":
- // no token necessary
- case "bearer":
- log.Debugf("Getting bearer token with %s for %s", challenge.Parameters, auth.authConfig.Username)
- params := map[string]string{}
- for k, v := range challenge.Parameters {
- params[k] = v
- }
- params["scope"] = fmt.Sprintf("%s:%s:%s", auth.resource, auth.scope, strings.Join(auth.actions, ","))
- token, err := getToken(auth.authConfig.Username, auth.authConfig.Password, params, auth.registryEndpoint, client, factory)
- if err != nil {
- return "", err
- }
- auth.tokenCache = token
- auth.tokenExpiration = now.Add(time.Minute)
- return token, nil
- default:
- log.Infof("Unsupported auth scheme: %q", challenge.Scheme)
- }
- }
- // Do not expire cache since there are no challenges which use a token
- auth.tokenExpiration = time.Now().Add(time.Hour * 24)
- return "", nil
- }
- func (auth *RequestAuthorization) Authorize(req *http.Request) error {
- token, err := auth.getToken()
- if err != nil {
- return err
- }
- if token != "" {
- req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", token))
- } else if auth.authConfig.Username != "" && auth.authConfig.Password != "" {
- req.SetBasicAuth(auth.authConfig.Username, auth.authConfig.Password)
- }
- return nil
- }
- // create a base64 encoded auth string to store in config
- func encodeAuth(authConfig *AuthConfig) string {
- authStr := authConfig.Username + ":" + authConfig.Password
- msg := []byte(authStr)
- encoded := make([]byte, base64.StdEncoding.EncodedLen(len(msg)))
- base64.StdEncoding.Encode(encoded, msg)
- return string(encoded)
- }
- // decode the auth string
- func decodeAuth(authStr string) (string, string, error) {
- decLen := base64.StdEncoding.DecodedLen(len(authStr))
- decoded := make([]byte, decLen)
- authByte := []byte(authStr)
- n, err := base64.StdEncoding.Decode(decoded, authByte)
- if err != nil {
- return "", "", err
- }
- if n > decLen {
- return "", "", fmt.Errorf("Something went wrong decoding auth config")
- }
- arr := strings.SplitN(string(decoded), ":", 2)
- if len(arr) != 2 {
- return "", "", fmt.Errorf("Invalid auth configuration file")
- }
- password := strings.Trim(arr[1], "\x00")
- return arr[0], password, nil
- }
- // load up the auth config information and return values
- // FIXME: use the internal golang config parser
- func LoadConfig(rootPath string) (*ConfigFile, error) {
- configFile := ConfigFile{Configs: make(map[string]AuthConfig), rootPath: rootPath}
- confFile := path.Join(rootPath, CONFIGFILE)
- if _, err := os.Stat(confFile); err != nil {
- return &configFile, nil //missing file is not an error
- }
- b, err := ioutil.ReadFile(confFile)
- if err != nil {
- return &configFile, err
- }
- if err := json.Unmarshal(b, &configFile.Configs); err != nil {
- arr := strings.Split(string(b), "\n")
- if len(arr) < 2 {
- return &configFile, fmt.Errorf("The Auth config file is empty")
- }
- authConfig := AuthConfig{}
- origAuth := strings.Split(arr[0], " = ")
- if len(origAuth) != 2 {
- return &configFile, fmt.Errorf("Invalid Auth config file")
- }
- authConfig.Username, authConfig.Password, err = decodeAuth(origAuth[1])
- if err != nil {
- return &configFile, err
- }
- origEmail := strings.Split(arr[1], " = ")
- if len(origEmail) != 2 {
- return &configFile, fmt.Errorf("Invalid Auth config file")
- }
- authConfig.Email = origEmail[1]
- authConfig.ServerAddress = IndexServerAddress()
- // *TODO: Switch to using IndexServerName() instead?
- configFile.Configs[IndexServerAddress()] = authConfig
- } else {
- for k, authConfig := range configFile.Configs {
- authConfig.Username, authConfig.Password, err = decodeAuth(authConfig.Auth)
- if err != nil {
- return &configFile, err
- }
- authConfig.Auth = ""
- authConfig.ServerAddress = k
- configFile.Configs[k] = authConfig
- }
- }
- return &configFile, nil
- }
- // save the auth config
- func SaveConfig(configFile *ConfigFile) error {
- confFile := path.Join(configFile.rootPath, CONFIGFILE)
- if len(configFile.Configs) == 0 {
- os.Remove(confFile)
- return nil
- }
- configs := make(map[string]AuthConfig, len(configFile.Configs))
- for k, authConfig := range configFile.Configs {
- authCopy := authConfig
- authCopy.Auth = encodeAuth(&authCopy)
- authCopy.Username = ""
- authCopy.Password = ""
- authCopy.ServerAddress = ""
- configs[k] = authCopy
- }
- b, err := json.MarshalIndent(configs, "", "\t")
- if err != nil {
- return err
- }
- err = ioutil.WriteFile(confFile, b, 0600)
- if err != nil {
- return err
- }
- return nil
- }
- // Login tries to register/login to the registry server.
- func Login(authConfig *AuthConfig, registryEndpoint *Endpoint, factory *utils.HTTPRequestFactory) (string, error) {
- // Separates the v2 registry login logic from the v1 logic.
- if registryEndpoint.Version == APIVersion2 {
- return loginV2(authConfig, registryEndpoint, factory)
- }
- return loginV1(authConfig, registryEndpoint, factory)
- }
- // loginV1 tries to register/login to the v1 registry server.
- func loginV1(authConfig *AuthConfig, registryEndpoint *Endpoint, factory *utils.HTTPRequestFactory) (string, error) {
- var (
- status string
- reqBody []byte
- err error
- client = &http.Client{
- Transport: &http.Transport{
- DisableKeepAlives: true,
- Proxy: http.ProxyFromEnvironment,
- },
- CheckRedirect: AddRequiredHeadersToRedirectedRequests,
- }
- reqStatusCode = 0
- serverAddress = authConfig.ServerAddress
- )
- log.Debugf("attempting v1 login to registry endpoint %s", registryEndpoint)
- if serverAddress == "" {
- return "", fmt.Errorf("Server Error: Server Address not set.")
- }
- loginAgainstOfficialIndex := serverAddress == IndexServerAddress()
- // to avoid sending the server address to the server it should be removed before being marshalled
- authCopy := *authConfig
- authCopy.ServerAddress = ""
- jsonBody, err := json.Marshal(authCopy)
- if err != nil {
- return "", fmt.Errorf("Config Error: %s", err)
- }
- // using `bytes.NewReader(jsonBody)` here causes the server to respond with a 411 status.
- b := strings.NewReader(string(jsonBody))
- req1, err := http.Post(serverAddress+"users/", "application/json; charset=utf-8", b)
- if err != nil {
- return "", fmt.Errorf("Server Error: %s", err)
- }
- reqStatusCode = req1.StatusCode
- defer req1.Body.Close()
- reqBody, err = ioutil.ReadAll(req1.Body)
- if err != nil {
- return "", fmt.Errorf("Server Error: [%#v] %s", reqStatusCode, err)
- }
- if reqStatusCode == 201 {
- if loginAgainstOfficialIndex {
- status = "Account created. Please use the confirmation link we sent" +
- " to your e-mail to activate it."
- } else {
- // *TODO: Use registry configuration to determine what this says, if anything?
- status = "Account created. Please see the documentation of the registry " + serverAddress + " for instructions how to activate it."
- }
- } else if reqStatusCode == 400 {
- if string(reqBody) == "\"Username or email already exists\"" {
- req, err := factory.NewRequest("GET", serverAddress+"users/", nil)
- req.SetBasicAuth(authConfig.Username, authConfig.Password)
- resp, err := client.Do(req)
- if err != nil {
- return "", err
- }
- defer resp.Body.Close()
- body, err := ioutil.ReadAll(resp.Body)
- if err != nil {
- return "", err
- }
- if resp.StatusCode == 200 {
- return "Login Succeeded", nil
- } else if resp.StatusCode == 401 {
- return "", fmt.Errorf("Wrong login/password, please try again")
- } else if resp.StatusCode == 403 {
- if loginAgainstOfficialIndex {
- return "", fmt.Errorf("Login: Account is not Active. Please check your e-mail for a confirmation link.")
- }
- // *TODO: Use registry configuration to determine what this says, if anything?
- return "", fmt.Errorf("Login: Account is not Active. Please see the documentation of the registry %s for instructions how to activate it.", serverAddress)
- }
- return "", fmt.Errorf("Login: %s (Code: %d; Headers: %s)", body, resp.StatusCode, resp.Header)
- }
- return "", fmt.Errorf("Registration: %s", reqBody)
- } else if reqStatusCode == 401 {
- // This case would happen with private registries where /v1/users is
- // protected, so people can use `docker login` as an auth check.
- req, err := factory.NewRequest("GET", serverAddress+"users/", nil)
- req.SetBasicAuth(authConfig.Username, authConfig.Password)
- resp, err := client.Do(req)
- if err != nil {
- return "", err
- }
- defer resp.Body.Close()
- body, err := ioutil.ReadAll(resp.Body)
- if err != nil {
- return "", err
- }
- if resp.StatusCode == 200 {
- return "Login Succeeded", nil
- } else if resp.StatusCode == 401 {
- return "", fmt.Errorf("Wrong login/password, please try again")
- } else {
- return "", fmt.Errorf("Login: %s (Code: %d; Headers: %s)", body,
- resp.StatusCode, resp.Header)
- }
- } else {
- return "", fmt.Errorf("Unexpected status code [%d] : %s", reqStatusCode, reqBody)
- }
- return status, nil
- }
- // loginV2 tries to login to the v2 registry server. The given registry endpoint has been
- // pinged or setup with a list of authorization challenges. Each of these challenges are
- // tried until one of them succeeds. Currently supported challenge schemes are:
- // HTTP Basic Authorization
- // Token Authorization with a separate token issuing server
- // NOTE: the v2 logic does not attempt to create a user account if one doesn't exist. For
- // now, users should create their account through other means like directly from a web page
- // served by the v2 registry service provider. Whether this will be supported in the future
- // is to be determined.
- func loginV2(authConfig *AuthConfig, registryEndpoint *Endpoint, factory *utils.HTTPRequestFactory) (string, error) {
- log.Debugf("attempting v2 login to registry endpoint %s", registryEndpoint)
- client := &http.Client{
- Transport: &http.Transport{
- DisableKeepAlives: true,
- Proxy: http.ProxyFromEnvironment,
- },
- CheckRedirect: AddRequiredHeadersToRedirectedRequests,
- }
- var (
- err error
- allErrors []error
- )
- for _, challenge := range registryEndpoint.AuthChallenges {
- log.Debugf("trying %q auth challenge with params %s", challenge.Scheme, challenge.Parameters)
- switch strings.ToLower(challenge.Scheme) {
- case "basic":
- err = tryV2BasicAuthLogin(authConfig, challenge.Parameters, registryEndpoint, client, factory)
- case "bearer":
- err = tryV2TokenAuthLogin(authConfig, challenge.Parameters, registryEndpoint, client, factory)
- default:
- // Unsupported challenge types are explicitly skipped.
- err = fmt.Errorf("unsupported auth scheme: %q", challenge.Scheme)
- }
- if err == nil {
- return "Login Succeeded", nil
- }
- log.Debugf("error trying auth challenge %q: %s", challenge.Scheme, err)
- allErrors = append(allErrors, err)
- }
- return "", fmt.Errorf("no successful auth challenge for %s - errors: %s", registryEndpoint, allErrors)
- }
- func tryV2BasicAuthLogin(authConfig *AuthConfig, params map[string]string, registryEndpoint *Endpoint, client *http.Client, factory *utils.HTTPRequestFactory) error {
- req, err := factory.NewRequest("GET", registryEndpoint.Path(""), nil)
- if err != nil {
- return err
- }
- req.SetBasicAuth(authConfig.Username, authConfig.Password)
- resp, err := client.Do(req)
- if err != nil {
- return err
- }
- defer resp.Body.Close()
- if resp.StatusCode != http.StatusOK {
- return fmt.Errorf("basic auth attempt to %s realm %q failed with status: %d %s", registryEndpoint, params["realm"], resp.StatusCode, http.StatusText(resp.StatusCode))
- }
- return nil
- }
- func tryV2TokenAuthLogin(authConfig *AuthConfig, params map[string]string, registryEndpoint *Endpoint, client *http.Client, factory *utils.HTTPRequestFactory) error {
- token, err := getToken(authConfig.Username, authConfig.Password, params, registryEndpoint, client, factory)
- if err != nil {
- return err
- }
- req, err := factory.NewRequest("GET", registryEndpoint.Path(""), nil)
- if err != nil {
- return err
- }
- req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", token))
- resp, err := client.Do(req)
- if err != nil {
- return err
- }
- defer resp.Body.Close()
- if resp.StatusCode != http.StatusOK {
- return fmt.Errorf("token auth attempt to %s realm %q failed with status: %d %s", registryEndpoint, params["realm"], resp.StatusCode, http.StatusText(resp.StatusCode))
- }
- return nil
- }
- // this method matches a auth configuration to a server address or a url
- func (config *ConfigFile) ResolveAuthConfig(index *IndexInfo) AuthConfig {
- configKey := index.GetAuthConfigKey()
- // First try the happy case
- if c, found := config.Configs[configKey]; found || index.Official {
- return c
- }
- convertToHostname := func(url string) string {
- stripped := url
- if strings.HasPrefix(url, "http://") {
- stripped = strings.Replace(url, "http://", "", 1)
- } else if strings.HasPrefix(url, "https://") {
- stripped = strings.Replace(url, "https://", "", 1)
- }
- nameParts := strings.SplitN(stripped, "/", 2)
- return nameParts[0]
- }
- // Maybe they have a legacy config file, we will iterate the keys converting
- // them to the new format and testing
- for registry, config := range config.Configs {
- if configKey == convertToHostname(registry) {
- return config
- }
- }
- // When all else fails, return an empty auth config
- return AuthConfig{}
- }
|