2013-03-15 04:43:59 +04:00
|
|
|
package auth
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/base64"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
|
|
|
"os"
|
2013-03-22 13:19:39 +04:00
|
|
|
"path"
|
2013-03-15 04:43:59 +04:00
|
|
|
"strings"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Where we store the config file
|
2013-03-22 13:19:39 +04:00
|
|
|
const CONFIGFILE = ".dockercfg"
|
2013-03-15 04:43:59 +04:00
|
|
|
|
|
|
|
// the registry server we want to login against
|
2013-05-03 02:39:44 +04:00
|
|
|
const INDEX_SERVER = "https://index.docker.io"
|
2013-03-15 04:43:59 +04:00
|
|
|
|
|
|
|
type AuthConfig struct {
|
|
|
|
Username string `json:"username"`
|
|
|
|
Password string `json:"password"`
|
|
|
|
Email string `json:"email"`
|
2013-03-22 13:19:39 +04:00
|
|
|
rootPath string `json:-`
|
2013-03-15 04:43:59 +04:00
|
|
|
}
|
|
|
|
|
2013-03-22 16:52:13 +04:00
|
|
|
func NewAuthConfig(username, password, email, rootPath string) *AuthConfig {
|
|
|
|
return &AuthConfig{
|
|
|
|
Username: username,
|
|
|
|
Password: password,
|
|
|
|
Email: email,
|
|
|
|
rootPath: rootPath,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-15 04:43:59 +04:00
|
|
|
// create a base64 encoded auth string to store in config
|
2013-03-22 13:19:39 +04:00
|
|
|
func EncodeAuth(authConfig *AuthConfig) string {
|
2013-03-15 04:43:59 +04:00
|
|
|
authStr := authConfig.Username + ":" + authConfig.Password
|
|
|
|
msg := []byte(authStr)
|
|
|
|
encoded := make([]byte, base64.StdEncoding.EncodedLen(len(msg)))
|
|
|
|
base64.StdEncoding.Encode(encoded, msg)
|
|
|
|
return string(encoded)
|
|
|
|
}
|
|
|
|
|
|
|
|
// decode the auth string
|
2013-03-22 13:19:39 +04:00
|
|
|
func DecodeAuth(authStr string) (*AuthConfig, error) {
|
2013-03-15 04:43:59 +04:00
|
|
|
decLen := base64.StdEncoding.DecodedLen(len(authStr))
|
|
|
|
decoded := make([]byte, decLen)
|
|
|
|
authByte := []byte(authStr)
|
|
|
|
n, err := base64.StdEncoding.Decode(decoded, authByte)
|
|
|
|
if err != nil {
|
2013-03-22 13:19:39 +04:00
|
|
|
return nil, err
|
2013-03-15 04:43:59 +04:00
|
|
|
}
|
|
|
|
if n > decLen {
|
2013-03-22 13:19:39 +04:00
|
|
|
return nil, fmt.Errorf("Something went wrong decoding auth config")
|
2013-03-15 04:43:59 +04:00
|
|
|
}
|
|
|
|
arr := strings.Split(string(decoded), ":")
|
2013-03-22 13:19:39 +04:00
|
|
|
if len(arr) != 2 {
|
|
|
|
return nil, fmt.Errorf("Invalid auth configuration file")
|
|
|
|
}
|
2013-03-15 04:43:59 +04:00
|
|
|
password := strings.Trim(arr[1], "\x00")
|
2013-03-22 13:19:39 +04:00
|
|
|
return &AuthConfig{Username: arr[0], Password: password}, nil
|
2013-03-15 04:43:59 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// load up the auth config information and return values
|
2013-03-22 13:19:39 +04:00
|
|
|
// FIXME: use the internal golang config parser
|
|
|
|
func LoadConfig(rootPath string) (*AuthConfig, error) {
|
|
|
|
confFile := path.Join(rootPath, CONFIGFILE)
|
|
|
|
if _, err := os.Stat(confFile); err != nil {
|
|
|
|
return &AuthConfig{}, fmt.Errorf("The Auth config file is missing")
|
|
|
|
}
|
|
|
|
b, err := ioutil.ReadFile(confFile)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
arr := strings.Split(string(b), "\n")
|
2013-05-02 03:36:01 +04:00
|
|
|
if len(arr) < 2 {
|
|
|
|
return nil, fmt.Errorf("The Auth config file is empty")
|
|
|
|
}
|
2013-03-29 04:12:23 +04:00
|
|
|
origAuth := strings.Split(arr[0], " = ")
|
|
|
|
origEmail := strings.Split(arr[1], " = ")
|
|
|
|
authConfig, err := DecodeAuth(origAuth[1])
|
2013-03-22 13:19:39 +04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2013-03-15 04:43:59 +04:00
|
|
|
}
|
2013-03-29 04:12:23 +04:00
|
|
|
authConfig.Email = origEmail[1]
|
2013-03-22 13:19:39 +04:00
|
|
|
authConfig.rootPath = rootPath
|
|
|
|
return authConfig, nil
|
2013-03-15 04:43:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
// save the auth config
|
2013-03-22 13:19:39 +04:00
|
|
|
func saveConfig(rootPath, authStr string, email string) error {
|
2013-05-02 03:36:01 +04:00
|
|
|
confFile := path.Join(rootPath, CONFIGFILE)
|
|
|
|
if len(email) == 0 {
|
|
|
|
os.Remove(confFile)
|
|
|
|
return nil
|
|
|
|
}
|
2013-03-15 04:43:59 +04:00
|
|
|
lines := "auth = " + authStr + "\n" + "email = " + email + "\n"
|
|
|
|
b := []byte(lines)
|
2013-05-02 03:36:01 +04:00
|
|
|
err := ioutil.WriteFile(confFile, b, 0600)
|
2013-03-15 04:43:59 +04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// try to register/login to the registry server
|
2013-03-22 13:19:39 +04:00
|
|
|
func Login(authConfig *AuthConfig) (string, error) {
|
2013-03-15 04:43:59 +04:00
|
|
|
storeConfig := false
|
2013-04-24 23:15:34 +04:00
|
|
|
client := &http.Client{}
|
2013-03-15 04:43:59 +04:00
|
|
|
reqStatusCode := 0
|
|
|
|
var status string
|
|
|
|
var reqBody []byte
|
2013-03-16 01:41:55 +04:00
|
|
|
jsonBody, err := json.Marshal(authConfig)
|
|
|
|
if err != nil {
|
2013-04-24 20:11:29 +04:00
|
|
|
return "", fmt.Errorf("Config Error: %s", err)
|
2013-03-16 01:41:55 +04:00
|
|
|
}
|
|
|
|
|
2013-04-02 14:00:21 +04:00
|
|
|
// using `bytes.NewReader(jsonBody)` here causes the server to respond with a 411 status.
|
|
|
|
b := strings.NewReader(string(jsonBody))
|
2013-04-24 23:15:34 +04:00
|
|
|
req1, err := http.Post(INDEX_SERVER+"/v1/users/", "application/json; charset=utf-8", b)
|
2013-03-15 05:43:02 +04:00
|
|
|
if err != nil {
|
2013-04-24 20:11:29 +04:00
|
|
|
return "", fmt.Errorf("Server Error: %s", err)
|
2013-03-15 04:43:59 +04:00
|
|
|
}
|
2013-03-15 05:43:02 +04:00
|
|
|
reqStatusCode = req1.StatusCode
|
2013-03-16 01:41:55 +04:00
|
|
|
defer req1.Body.Close()
|
|
|
|
reqBody, err = ioutil.ReadAll(req1.Body)
|
|
|
|
if err != nil {
|
2013-04-24 20:11:29 +04:00
|
|
|
return "", fmt.Errorf("Server Error: [%#v] %s", reqStatusCode, err)
|
2013-03-16 01:41:55 +04:00
|
|
|
}
|
2013-03-15 05:43:02 +04:00
|
|
|
|
2013-03-15 04:43:59 +04:00
|
|
|
if reqStatusCode == 201 {
|
2013-05-03 02:39:44 +04:00
|
|
|
status = "Account created. Please use the confirmation link we sent" +
|
2013-05-02 00:41:58 +04:00
|
|
|
" to your e-mail to activate it.\n"
|
2013-03-15 04:43:59 +04:00
|
|
|
storeConfig = true
|
2013-05-02 00:41:58 +04:00
|
|
|
} else if reqStatusCode == 403 {
|
2013-05-03 02:39:44 +04:00
|
|
|
return "", fmt.Errorf("Login: Your account hasn't been activated. " +
|
2013-05-02 00:41:58 +04:00
|
|
|
"Please check your e-mail for a confirmation link.")
|
2013-03-15 04:43:59 +04:00
|
|
|
} else if reqStatusCode == 400 {
|
2013-05-01 20:06:17 +04:00
|
|
|
if string(reqBody) == "\"Username or email already exists\"" {
|
2013-04-24 23:15:34 +04:00
|
|
|
req, err := http.NewRequest("GET", INDEX_SERVER+"/v1/users/", nil)
|
2013-03-15 04:43:59 +04:00
|
|
|
req.SetBasicAuth(authConfig.Username, authConfig.Password)
|
|
|
|
resp, err := client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
body, err := ioutil.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
if resp.StatusCode == 200 {
|
|
|
|
status = "Login Succeeded\n"
|
|
|
|
storeConfig = true
|
2013-05-02 03:36:01 +04:00
|
|
|
} else if resp.StatusCode == 401 {
|
|
|
|
saveConfig(authConfig.rootPath, "", "")
|
|
|
|
return "", fmt.Errorf("Wrong login/password, please try again")
|
2013-03-15 04:43:59 +04:00
|
|
|
} else {
|
2013-05-02 03:36:01 +04:00
|
|
|
return "", fmt.Errorf("Login: %s (Code: %d; Headers: %s)", body,
|
|
|
|
resp.StatusCode, resp.Header)
|
2013-03-15 04:43:59 +04:00
|
|
|
}
|
|
|
|
} else {
|
2013-04-24 20:11:29 +04:00
|
|
|
return "", fmt.Errorf("Registration: %s", reqBody)
|
2013-03-15 04:43:59 +04:00
|
|
|
}
|
2013-03-15 05:43:02 +04:00
|
|
|
} else {
|
2013-04-24 20:11:29 +04:00
|
|
|
return "", fmt.Errorf("Unexpected status code [%d] : %s", reqStatusCode, reqBody)
|
2013-03-15 04:43:59 +04:00
|
|
|
}
|
|
|
|
if storeConfig {
|
|
|
|
authStr := EncodeAuth(authConfig)
|
2013-03-22 13:19:39 +04:00
|
|
|
saveConfig(authConfig.rootPath, authStr, authConfig.Email)
|
2013-03-15 04:43:59 +04:00
|
|
|
}
|
|
|
|
return status, nil
|
|
|
|
}
|