1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/auth/auth.go

194 lines
5.2 KiB
Go
Raw Normal View History

package auth
import (
"encoding/base64"
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"net/http"
"os"
"path"
"strings"
)
// Where we store the config file
const CONFIGFILE = ".dockercfg"
// the registry server we want to login against
2013-06-04 14:00:22 -04:00
const INDEXSERVER = "https://index.docker.io/v1"
2013-06-04 14:00:22 -04:00
//const INDEXSERVER = "http://indexstaging-docker.dotcloud.com/"
var (
2013-06-04 09:51:12 -04:00
ErrConfigFileMissing = errors.New("The Auth config file is missing")
)
type AuthConfig struct {
Username string `json:"username"`
Password string `json:"password"`
Email string `json:"email"`
2013-05-15 16:02:24 -04:00
rootPath string
}
2013-03-22 08:52:13 -04:00
func NewAuthConfig(username, password, email, rootPath string) *AuthConfig {
return &AuthConfig{
Username: username,
Password: password,
Email: email,
rootPath: rootPath,
}
}
func IndexServerAddress() string {
if os.Getenv("DOCKER_INDEX_URL") != "" {
return os.Getenv("DOCKER_INDEX_URL") + "/v1"
}
2013-06-04 14:00:22 -04:00
return INDEXSERVER
}
// create a base64 encoded auth string to store in config
2013-05-30 11:39:43 -04:00
func encodeAuth(authConfig *AuthConfig) string {
authStr := authConfig.Username + ":" + authConfig.Password
msg := []byte(authStr)
encoded := make([]byte, base64.StdEncoding.EncodedLen(len(msg)))
base64.StdEncoding.Encode(encoded, msg)
return string(encoded)
}
// decode the auth string
2013-05-30 11:39:43 -04:00
func decodeAuth(authStr string) (*AuthConfig, error) {
decLen := base64.StdEncoding.DecodedLen(len(authStr))
decoded := make([]byte, decLen)
authByte := []byte(authStr)
n, err := base64.StdEncoding.Decode(decoded, authByte)
if err != nil {
return nil, err
}
if n > decLen {
return nil, fmt.Errorf("Something went wrong decoding auth config")
}
arr := strings.Split(string(decoded), ":")
if len(arr) != 2 {
return nil, fmt.Errorf("Invalid auth configuration file")
}
password := strings.Trim(arr[1], "\x00")
return &AuthConfig{Username: arr[0], Password: password}, nil
}
// load up the auth config information and return values
// FIXME: use the internal golang config parser
func LoadConfig(rootPath string) (*AuthConfig, error) {
confFile := path.Join(rootPath, CONFIGFILE)
if _, err := os.Stat(confFile); err != nil {
2013-05-30 11:39:43 -04:00
return &AuthConfig{rootPath:rootPath}, ErrConfigFileMissing
}
b, err := ioutil.ReadFile(confFile)
if err != nil {
return nil, err
}
arr := strings.Split(string(b), "\n")
if len(arr) < 2 {
return nil, fmt.Errorf("The Auth config file is empty")
}
origAuth := strings.Split(arr[0], " = ")
origEmail := strings.Split(arr[1], " = ")
2013-05-30 11:39:43 -04:00
authConfig, err := decodeAuth(origAuth[1])
if err != nil {
return nil, err
}
authConfig.Email = origEmail[1]
authConfig.rootPath = rootPath
return authConfig, nil
}
// save the auth config
2013-05-30 11:39:43 -04:00
func SaveConfig(authConfig *AuthConfig) error {
confFile := path.Join(authConfig.rootPath, CONFIGFILE)
if len(authConfig.Email) == 0 {
os.Remove(confFile)
return nil
}
2013-05-30 11:39:43 -04:00
lines := "auth = " + encodeAuth(authConfig) + "\n" + "email = " + authConfig.Email + "\n"
b := []byte(lines)
err := ioutil.WriteFile(confFile, b, 0600)
if err != nil {
return err
}
return nil
}
// try to register/login to the registry server
func Login(authConfig *AuthConfig, store bool) (string, error) {
storeConfig := false
2013-04-24 15:15:34 -04:00
client := &http.Client{}
reqStatusCode := 0
var status string
var reqBody []byte
2013-03-15 17:41:55 -04:00
jsonBody, err := json.Marshal(authConfig)
if err != nil {
2013-04-24 12:11:29 -04:00
return "", fmt.Errorf("Config Error: %s", err)
2013-03-15 17:41:55 -04:00
}
2013-04-02 06:00:21 -04:00
// using `bytes.NewReader(jsonBody)` here causes the server to respond with a 411 status.
b := strings.NewReader(string(jsonBody))
req1, err := http.Post(IndexServerAddress()+"/users/", "application/json; charset=utf-8", b)
2013-03-14 21:43:02 -04:00
if err != nil {
2013-04-24 12:11:29 -04:00
return "", fmt.Errorf("Server Error: %s", err)
}
2013-03-14 21:43:02 -04:00
reqStatusCode = req1.StatusCode
2013-03-15 17:41:55 -04:00
defer req1.Body.Close()
reqBody, err = ioutil.ReadAll(req1.Body)
if err != nil {
2013-04-24 12:11:29 -04:00
return "", fmt.Errorf("Server Error: [%#v] %s", reqStatusCode, err)
2013-03-15 17:41:55 -04:00
}
2013-03-14 21:43:02 -04:00
if reqStatusCode == 201 {
2013-05-02 18:39:44 -04:00
status = "Account created. Please use the confirmation link we sent" +
2013-05-01 16:41:58 -04:00
" to your e-mail to activate it.\n"
storeConfig = true
2013-05-01 16:41:58 -04:00
} else if reqStatusCode == 403 {
2013-05-02 18:39:44 -04:00
return "", fmt.Errorf("Login: Your account hasn't been activated. " +
2013-05-01 16:41:58 -04:00
"Please check your e-mail for a confirmation link.")
} else if reqStatusCode == 400 {
if string(reqBody) == "\"Username or email already exists\"" {
req, err := http.NewRequest("GET", IndexServerAddress()+"/users/", nil)
req.SetBasicAuth(authConfig.Username, authConfig.Password)
resp, err := client.Do(req)
if err != nil {
return "", err
}
defer resp.Body.Close()
body, err := ioutil.ReadAll(resp.Body)
if err != nil {
return "", err
}
if resp.StatusCode == 200 {
status = "Login Succeeded\n"
storeConfig = true
} else if resp.StatusCode == 401 {
if store {
if err := SaveConfig(authConfig); err != nil {
return "", err
}
}
return "", fmt.Errorf("Wrong login/password, please try again")
} else {
return "", fmt.Errorf("Login: %s (Code: %d; Headers: %s)", body,
resp.StatusCode, resp.Header)
}
} else {
2013-04-24 12:11:29 -04:00
return "", fmt.Errorf("Registration: %s", reqBody)
}
2013-03-14 21:43:02 -04:00
} else {
2013-04-24 12:11:29 -04:00
return "", fmt.Errorf("Unexpected status code [%d] : %s", reqStatusCode, reqBody)
}
if storeConfig && store {
if err := SaveConfig(authConfig); err != nil {
return "", err
}
}
return status, nil
}