2014-03-11 04:16:58 +04:00
package registry
2013-03-15 04:43:59 +04:00
import (
"encoding/base64"
"encoding/json"
2013-05-29 04:35:10 +04:00
"errors"
2013-03-15 04:43:59 +04:00
"fmt"
"io/ioutil"
"net/http"
"os"
2015-04-02 01:39:37 +03:00
"path/filepath"
2013-03-15 04:43:59 +04:00
"strings"
2015-01-16 00:06:52 +03:00
"sync"
"time"
2014-06-03 04:46:06 +04:00
2015-03-27 01:22:04 +03:00
"github.com/Sirupsen/logrus"
2015-04-02 01:39:37 +03:00
"github.com/docker/docker/pkg/homedir"
2015-03-29 16:51:08 +03:00
"github.com/docker/docker/pkg/requestdecorator"
2013-03-15 04:43:59 +04:00
)
2014-10-09 01:03:39 +04:00
const (
// Where we store the config file
2015-04-02 01:39:37 +03:00
CONFIGFILE = "config.json"
OLD_CONFIGFILE = ".dockercfg"
2014-10-09 01:03:39 +04:00
)
2013-05-29 04:35:10 +04:00
var (
2013-06-04 17:51:12 +04:00
ErrConfigFileMissing = errors . New ( "The Auth config file is missing" )
2013-05-29 04:35:10 +04:00
)
2015-04-02 01:39:37 +03:00
// Registry Auth Info
2013-03-15 04:43:59 +04:00
type AuthConfig struct {
2013-09-03 22:45:49 +04:00
Username string ` json:"username,omitempty" `
Password string ` json:"password,omitempty" `
Auth string ` json:"auth" `
Email string ` json:"email" `
ServerAddress string ` json:"serveraddress,omitempty" `
2013-03-15 04:43:59 +04:00
}
2015-04-02 01:39:37 +03:00
// ~/.docker/config.json file info
2013-07-23 19:04:31 +04:00
type ConfigFile struct {
2015-04-02 01:39:37 +03:00
AuthConfigs map [ string ] AuthConfig ` json:"auths" `
HttpHeaders map [ string ] string ` json:"HttpHeaders,omitempty" `
filename string // Note: not serialized - for internal use only
2013-03-22 16:52:13 +04:00
}
2014-12-17 03:57:37 +03:00
type RequestAuthorization struct {
2014-12-20 03:14:04 +03:00
authConfig * AuthConfig
registryEndpoint * Endpoint
resource string
scope string
actions [ ] string
2015-01-16 00:06:52 +03:00
tokenLock sync . Mutex
tokenCache string
tokenExpiration time . Time
2014-12-17 03:57:37 +03:00
}
2014-12-20 03:14:04 +03:00
func NewRequestAuthorization ( authConfig * AuthConfig , registryEndpoint * Endpoint , resource , scope string , actions [ ] string ) * RequestAuthorization {
return & RequestAuthorization {
authConfig : authConfig ,
registryEndpoint : registryEndpoint ,
resource : resource ,
scope : scope ,
actions : actions ,
}
}
2014-12-17 03:57:37 +03:00
2014-12-20 03:14:04 +03:00
func ( auth * RequestAuthorization ) getToken ( ) ( string , error ) {
2015-01-16 00:06:52 +03:00
auth . tokenLock . Lock ( )
defer auth . tokenLock . Unlock ( )
now := time . Now ( )
if now . Before ( auth . tokenExpiration ) {
2015-03-27 01:22:04 +03:00
logrus . Debugf ( "Using cached token for %s" , auth . authConfig . Username )
2015-01-16 00:06:52 +03:00
return auth . tokenCache , nil
}
2015-01-12 22:56:01 +03:00
client := auth . registryEndpoint . HTTPClient ( )
2014-12-17 03:57:37 +03:00
factory := HTTPRequestFactory ( nil )
2014-12-20 03:14:04 +03:00
for _ , challenge := range auth . registryEndpoint . AuthChallenges {
2014-12-17 03:57:37 +03:00
switch strings . ToLower ( challenge . Scheme ) {
case "basic" :
2014-12-20 03:14:04 +03:00
// no token necessary
2014-12-17 03:57:37 +03:00
case "bearer" :
2015-03-27 01:22:04 +03:00
logrus . Debugf ( "Getting bearer token with %s for %s" , challenge . Parameters , auth . authConfig . Username )
2014-12-17 03:57:37 +03:00
params := map [ string ] string { }
for k , v := range challenge . Parameters {
params [ k ] = v
}
2014-12-20 03:14:04 +03:00
params [ "scope" ] = fmt . Sprintf ( "%s:%s:%s" , auth . resource , auth . scope , strings . Join ( auth . actions , "," ) )
token , err := getToken ( auth . authConfig . Username , auth . authConfig . Password , params , auth . registryEndpoint , client , factory )
2014-12-17 03:57:37 +03:00
if err != nil {
2014-12-20 03:14:04 +03:00
return "" , err
2014-12-17 03:57:37 +03:00
}
2015-01-16 00:06:52 +03:00
auth . tokenCache = token
auth . tokenExpiration = now . Add ( time . Minute )
2014-12-17 03:57:37 +03:00
2014-12-20 03:14:04 +03:00
return token , nil
2014-12-17 03:57:37 +03:00
default :
2015-03-27 01:22:04 +03:00
logrus . Infof ( "Unsupported auth scheme: %q" , challenge . Scheme )
2014-12-17 03:57:37 +03:00
}
}
2015-01-16 00:06:52 +03:00
// Do not expire cache since there are no challenges which use a token
auth . tokenExpiration = time . Now ( ) . Add ( time . Hour * 24 )
2014-12-20 03:14:04 +03:00
return "" , nil
2014-12-17 03:57:37 +03:00
}
2014-12-20 03:14:04 +03:00
func ( auth * RequestAuthorization ) Authorize ( req * http . Request ) error {
token , err := auth . getToken ( )
if err != nil {
return err
}
if token != "" {
req . Header . Set ( "Authorization" , fmt . Sprintf ( "Bearer %s" , token ) )
} else if auth . authConfig . Username != "" && auth . authConfig . Password != "" {
req . SetBasicAuth ( auth . authConfig . Username , auth . authConfig . Password )
2014-12-17 03:57:37 +03:00
}
2014-12-20 03:14:04 +03:00
return nil
2014-12-17 03:57:37 +03:00
}
2013-03-15 04:43:59 +04:00
// create a base64 encoded auth string to store in config
2013-05-30 19:39:43 +04:00
func encodeAuth ( authConfig * AuthConfig ) string {
2013-03-15 04:43:59 +04:00
authStr := authConfig . Username + ":" + authConfig . Password
msg := [ ] byte ( authStr )
encoded := make ( [ ] byte , base64 . StdEncoding . EncodedLen ( len ( msg ) ) )
base64 . StdEncoding . Encode ( encoded , msg )
return string ( encoded )
}
// decode the auth string
2013-07-23 19:04:31 +04:00
func decodeAuth ( authStr string ) ( string , string , error ) {
2013-03-15 04:43:59 +04:00
decLen := base64 . StdEncoding . DecodedLen ( len ( authStr ) )
decoded := make ( [ ] byte , decLen )
authByte := [ ] byte ( authStr )
n , err := base64 . StdEncoding . Decode ( decoded , authByte )
if err != nil {
2013-07-23 19:04:31 +04:00
return "" , "" , err
2013-03-15 04:43:59 +04:00
}
if n > decLen {
2013-07-23 19:04:31 +04:00
return "" , "" , fmt . Errorf ( "Something went wrong decoding auth config" )
2013-03-15 04:43:59 +04:00
}
2013-11-30 03:14:36 +04:00
arr := strings . SplitN ( string ( decoded ) , ":" , 2 )
2013-03-22 13:19:39 +04:00
if len ( arr ) != 2 {
2013-07-23 19:04:31 +04:00
return "" , "" , fmt . Errorf ( "Invalid auth configuration file" )
2013-03-22 13:19:39 +04:00
}
2013-03-15 04:43:59 +04:00
password := strings . Trim ( arr [ 1 ] , "\x00" )
2013-07-23 19:04:31 +04:00
return arr [ 0 ] , password , nil
2013-03-15 04:43:59 +04:00
}
// load up the auth config information and return values
2013-03-22 13:19:39 +04:00
// FIXME: use the internal golang config parser
2015-04-02 01:39:37 +03:00
func LoadConfig ( configDir string ) ( * ConfigFile , error ) {
if configDir == "" {
configDir = filepath . Join ( homedir . Get ( ) , ".docker" )
}
configFile := ConfigFile {
AuthConfigs : make ( map [ string ] AuthConfig ) ,
filename : filepath . Join ( configDir , CONFIGFILE ) ,
}
// Try happy path first - latest config file
if _ , err := os . Stat ( configFile . filename ) ; err == nil {
file , err := os . Open ( configFile . filename )
if err != nil {
return & configFile , err
}
defer file . Close ( )
if err := json . NewDecoder ( file ) . Decode ( & configFile ) ; err != nil {
return & configFile , err
}
for addr , ac := range configFile . AuthConfigs {
ac . Username , ac . Password , err = decodeAuth ( ac . Auth )
if err != nil {
return & configFile , err
}
ac . Auth = ""
ac . ServerAddress = addr
configFile . AuthConfigs [ addr ] = ac
}
return & configFile , nil
} else if ! os . IsNotExist ( err ) {
// if file is there but we can't stat it for any reason other
// than it doesn't exist then stop
return & configFile , err
}
// Can't find latest config file so check for the old one
confFile := filepath . Join ( homedir . Get ( ) , OLD_CONFIGFILE )
2013-03-22 13:19:39 +04:00
if _ , err := os . Stat ( confFile ) ; err != nil {
2013-08-16 18:29:40 +04:00
return & configFile , nil //missing file is not an error
2013-03-22 13:19:39 +04:00
}
2015-04-02 01:39:37 +03:00
2013-03-22 13:19:39 +04:00
b , err := ioutil . ReadFile ( confFile )
if err != nil {
2013-08-14 14:26:18 +04:00
return & configFile , err
2013-03-22 13:19:39 +04:00
}
2013-07-23 19:04:31 +04:00
2015-04-02 01:39:37 +03:00
if err := json . Unmarshal ( b , & configFile . AuthConfigs ) ; err != nil {
2013-07-23 19:04:31 +04:00
arr := strings . Split ( string ( b ) , "\n" )
if len ( arr ) < 2 {
2013-08-16 18:29:40 +04:00
return & configFile , fmt . Errorf ( "The Auth config file is empty" )
2013-07-23 19:04:31 +04:00
}
authConfig := AuthConfig { }
origAuth := strings . Split ( arr [ 0 ] , " = " )
2013-09-30 15:07:32 +04:00
if len ( origAuth ) != 2 {
return & configFile , fmt . Errorf ( "Invalid Auth config file" )
}
2013-07-23 19:04:31 +04:00
authConfig . Username , authConfig . Password , err = decodeAuth ( origAuth [ 1 ] )
if err != nil {
2013-08-16 18:29:40 +04:00
return & configFile , err
2013-07-23 19:04:31 +04:00
}
origEmail := strings . Split ( arr [ 1 ] , " = " )
2013-09-30 15:07:32 +04:00
if len ( origEmail ) != 2 {
return & configFile , fmt . Errorf ( "Invalid Auth config file" )
}
2013-07-23 19:04:31 +04:00
authConfig . Email = origEmail [ 1 ]
2013-09-03 22:45:49 +04:00
authConfig . ServerAddress = IndexServerAddress ( )
2014-10-07 05:54:52 +04:00
// *TODO: Switch to using IndexServerName() instead?
2015-04-02 01:39:37 +03:00
configFile . AuthConfigs [ IndexServerAddress ( ) ] = authConfig
2013-07-23 19:04:31 +04:00
} else {
2015-04-02 01:39:37 +03:00
for k , authConfig := range configFile . AuthConfigs {
2013-07-23 19:04:31 +04:00
authConfig . Username , authConfig . Password , err = decodeAuth ( authConfig . Auth )
if err != nil {
2013-08-16 18:29:40 +04:00
return & configFile , err
2013-07-23 19:04:31 +04:00
}
2013-07-24 16:28:22 +04:00
authConfig . Auth = ""
2013-09-03 22:45:49 +04:00
authConfig . ServerAddress = k
2015-04-02 01:39:37 +03:00
configFile . AuthConfigs [ k ] = authConfig
2013-07-23 19:04:31 +04:00
}
2013-03-15 04:43:59 +04:00
}
2013-07-23 19:04:31 +04:00
return & configFile , nil
2013-03-15 04:43:59 +04:00
}
2015-04-02 01:39:37 +03:00
func ( configFile * ConfigFile ) Save ( ) error {
// Encode sensitive data into a new/temp struct
tmpAuthConfigs := make ( map [ string ] AuthConfig , len ( configFile . AuthConfigs ) )
for k , authConfig := range configFile . AuthConfigs {
2013-07-25 04:35:52 +04:00
authCopy := authConfig
authCopy . Auth = encodeAuth ( & authCopy )
authCopy . Username = ""
authCopy . Password = ""
2013-09-03 22:45:49 +04:00
authCopy . ServerAddress = ""
2015-04-02 01:39:37 +03:00
tmpAuthConfigs [ k ] = authCopy
2013-07-23 19:04:31 +04:00
}
2015-04-02 01:39:37 +03:00
saveAuthConfigs := configFile . AuthConfigs
configFile . AuthConfigs = tmpAuthConfigs
defer func ( ) { configFile . AuthConfigs = saveAuthConfigs } ( )
data , err := json . MarshalIndent ( configFile , "" , "\t" )
2013-07-23 19:04:31 +04:00
if err != nil {
return err
}
2015-04-02 01:39:37 +03:00
2015-04-21 00:09:41 +03:00
if err := os . MkdirAll ( filepath . Dir ( configFile . filename ) , 0700 ) ; err != nil {
2015-04-02 01:39:37 +03:00
return err
}
err = ioutil . WriteFile ( configFile . filename , data , 0600 )
2013-03-15 04:43:59 +04:00
if err != nil {
return err
}
2015-04-02 01:39:37 +03:00
2013-03-15 04:43:59 +04:00
return nil
}
2014-12-12 04:55:15 +03:00
// Login tries to register/login to the registry server.
2015-03-29 16:51:08 +03:00
func Login ( authConfig * AuthConfig , registryEndpoint * Endpoint , factory * requestdecorator . RequestFactory ) ( string , error ) {
2014-12-12 04:55:15 +03:00
// Separates the v2 registry login logic from the v1 logic.
if registryEndpoint . Version == APIVersion2 {
return loginV2 ( authConfig , registryEndpoint , factory )
}
return loginV1 ( authConfig , registryEndpoint , factory )
}
// loginV1 tries to register/login to the v1 registry server.
2015-03-29 16:51:08 +03:00
func loginV1 ( authConfig * AuthConfig , registryEndpoint * Endpoint , factory * requestdecorator . RequestFactory ) ( string , error ) {
2014-02-06 04:49:43 +04:00
var (
2015-01-12 22:56:01 +03:00
status string
reqBody [ ] byte
err error
client = registryEndpoint . HTTPClient ( )
2014-02-06 04:49:43 +04:00
reqStatusCode = 0
serverAddress = authConfig . ServerAddress
)
2013-09-03 22:45:49 +04:00
2015-03-27 01:22:04 +03:00
logrus . Debugf ( "attempting v1 login to registry endpoint %s" , registryEndpoint )
2014-12-12 04:55:15 +03:00
2013-09-03 22:45:49 +04:00
if serverAddress == "" {
2014-10-07 05:54:52 +04:00
return "" , fmt . Errorf ( "Server Error: Server Address not set." )
2013-09-03 22:45:49 +04:00
}
loginAgainstOfficialIndex := serverAddress == IndexServerAddress ( )
2013-12-25 04:37:00 +04:00
// to avoid sending the server address to the server it should be removed before being marshalled
2013-09-03 22:45:49 +04:00
authCopy := * authConfig
authCopy . ServerAddress = ""
jsonBody , err := json . Marshal ( authCopy )
2013-03-16 01:41:55 +04:00
if err != nil {
2013-04-24 20:11:29 +04:00
return "" , fmt . Errorf ( "Config Error: %s" , err )
2013-03-16 01:41:55 +04:00
}
2013-04-02 14:00:21 +04:00
// using `bytes.NewReader(jsonBody)` here causes the server to respond with a 411 status.
b := strings . NewReader ( string ( jsonBody ) )
2015-01-12 22:56:01 +03:00
req1 , err := client . Post ( serverAddress + "users/" , "application/json; charset=utf-8" , b )
2013-03-15 05:43:02 +04:00
if err != nil {
2013-04-24 20:11:29 +04:00
return "" , fmt . Errorf ( "Server Error: %s" , err )
2013-03-15 04:43:59 +04:00
}
2013-03-15 05:43:02 +04:00
reqStatusCode = req1 . StatusCode
2013-03-16 01:41:55 +04:00
defer req1 . Body . Close ( )
reqBody , err = ioutil . ReadAll ( req1 . Body )
if err != nil {
2013-04-24 20:11:29 +04:00
return "" , fmt . Errorf ( "Server Error: [%#v] %s" , reqStatusCode , err )
2013-03-16 01:41:55 +04:00
}
2013-03-15 05:43:02 +04:00
2013-03-15 04:43:59 +04:00
if reqStatusCode == 201 {
2013-09-03 22:45:49 +04:00
if loginAgainstOfficialIndex {
status = "Account created. Please use the confirmation link we sent" +
" to your e-mail to activate it."
} else {
2014-10-07 05:54:52 +04:00
// *TODO: Use registry configuration to determine what this says, if anything?
2013-09-03 22:45:49 +04:00
status = "Account created. Please see the documentation of the registry " + serverAddress + " for instructions how to activate it."
}
2013-03-15 04:43:59 +04:00
} else if reqStatusCode == 400 {
2013-05-01 20:06:17 +04:00
if string ( reqBody ) == "\"Username or email already exists\"" {
2013-09-03 22:45:49 +04:00
req , err := factory . NewRequest ( "GET" , serverAddress + "users/" , nil )
2013-03-15 04:43:59 +04:00
req . SetBasicAuth ( authConfig . Username , authConfig . Password )
resp , err := client . Do ( req )
if err != nil {
return "" , err
}
defer resp . Body . Close ( )
body , err := ioutil . ReadAll ( resp . Body )
if err != nil {
return "" , err
}
if resp . StatusCode == 200 {
2014-10-29 03:42:03 +03:00
return "Login Succeeded" , nil
2013-05-02 03:36:01 +04:00
} else if resp . StatusCode == 401 {
return "" , fmt . Errorf ( "Wrong login/password, please try again" )
2013-12-06 03:10:44 +04:00
} else if resp . StatusCode == 403 {
if loginAgainstOfficialIndex {
return "" , fmt . Errorf ( "Login: Account is not Active. Please check your e-mail for a confirmation link." )
}
2014-10-07 05:54:52 +04:00
// *TODO: Use registry configuration to determine what this says, if anything?
2013-12-06 03:10:44 +04:00
return "" , fmt . Errorf ( "Login: Account is not Active. Please see the documentation of the registry %s for instructions how to activate it." , serverAddress )
2013-03-15 04:43:59 +04:00
}
2014-10-06 23:34:39 +04:00
return "" , fmt . Errorf ( "Login: %s (Code: %d; Headers: %s)" , body , resp . StatusCode , resp . Header )
2013-03-15 04:43:59 +04:00
}
2014-10-06 23:34:39 +04:00
return "" , fmt . Errorf ( "Registration: %s" , reqBody )
2013-11-07 22:36:02 +04:00
} else if reqStatusCode == 401 {
// This case would happen with private registries where /v1/users is
// protected, so people can use `docker login` as an auth check.
req , err := factory . NewRequest ( "GET" , serverAddress + "users/" , nil )
req . SetBasicAuth ( authConfig . Username , authConfig . Password )
resp , err := client . Do ( req )
if err != nil {
return "" , err
}
defer resp . Body . Close ( )
body , err := ioutil . ReadAll ( resp . Body )
if err != nil {
return "" , err
2013-12-06 03:10:44 +04:00
}
2013-11-07 22:36:02 +04:00
if resp . StatusCode == 200 {
2014-10-29 03:42:03 +03:00
return "Login Succeeded" , nil
2013-11-07 22:36:02 +04:00
} else if resp . StatusCode == 401 {
return "" , fmt . Errorf ( "Wrong login/password, please try again" )
} else {
return "" , fmt . Errorf ( "Login: %s (Code: %d; Headers: %s)" , body ,
resp . StatusCode , resp . Header )
}
2013-03-15 05:43:02 +04:00
} else {
2013-04-24 20:11:29 +04:00
return "" , fmt . Errorf ( "Unexpected status code [%d] : %s" , reqStatusCode , reqBody )
2013-03-15 04:43:59 +04:00
}
return status , nil
}
2013-09-03 22:45:49 +04:00
2014-12-12 04:55:15 +03:00
// loginV2 tries to login to the v2 registry server. The given registry endpoint has been
// pinged or setup with a list of authorization challenges. Each of these challenges are
// tried until one of them succeeds. Currently supported challenge schemes are:
// HTTP Basic Authorization
// Token Authorization with a separate token issuing server
// NOTE: the v2 logic does not attempt to create a user account if one doesn't exist. For
// now, users should create their account through other means like directly from a web page
// served by the v2 registry service provider. Whether this will be supported in the future
// is to be determined.
2015-03-29 16:51:08 +03:00
func loginV2 ( authConfig * AuthConfig , registryEndpoint * Endpoint , factory * requestdecorator . RequestFactory ) ( string , error ) {
2015-03-27 01:22:04 +03:00
logrus . Debugf ( "attempting v2 login to registry endpoint %s" , registryEndpoint )
2014-12-12 04:55:15 +03:00
var (
err error
allErrors [ ] error
2015-01-12 22:56:01 +03:00
client = registryEndpoint . HTTPClient ( )
2014-12-12 04:55:15 +03:00
)
for _ , challenge := range registryEndpoint . AuthChallenges {
2015-03-27 01:22:04 +03:00
logrus . Debugf ( "trying %q auth challenge with params %s" , challenge . Scheme , challenge . Parameters )
2014-12-12 04:55:15 +03:00
switch strings . ToLower ( challenge . Scheme ) {
case "basic" :
err = tryV2BasicAuthLogin ( authConfig , challenge . Parameters , registryEndpoint , client , factory )
case "bearer" :
err = tryV2TokenAuthLogin ( authConfig , challenge . Parameters , registryEndpoint , client , factory )
default :
// Unsupported challenge types are explicitly skipped.
err = fmt . Errorf ( "unsupported auth scheme: %q" , challenge . Scheme )
}
if err == nil {
return "Login Succeeded" , nil
}
2015-03-27 01:22:04 +03:00
logrus . Debugf ( "error trying auth challenge %q: %s" , challenge . Scheme , err )
2014-12-12 04:55:15 +03:00
allErrors = append ( allErrors , err )
}
return "" , fmt . Errorf ( "no successful auth challenge for %s - errors: %s" , registryEndpoint , allErrors )
}
2015-03-29 16:51:08 +03:00
func tryV2BasicAuthLogin ( authConfig * AuthConfig , params map [ string ] string , registryEndpoint * Endpoint , client * http . Client , factory * requestdecorator . RequestFactory ) error {
2014-12-12 04:55:15 +03:00
req , err := factory . NewRequest ( "GET" , registryEndpoint . Path ( "" ) , nil )
if err != nil {
return err
}
req . SetBasicAuth ( authConfig . Username , authConfig . Password )
resp , err := client . Do ( req )
if err != nil {
return err
}
defer resp . Body . Close ( )
if resp . StatusCode != http . StatusOK {
return fmt . Errorf ( "basic auth attempt to %s realm %q failed with status: %d %s" , registryEndpoint , params [ "realm" ] , resp . StatusCode , http . StatusText ( resp . StatusCode ) )
}
return nil
}
2015-03-29 16:51:08 +03:00
func tryV2TokenAuthLogin ( authConfig * AuthConfig , params map [ string ] string , registryEndpoint * Endpoint , client * http . Client , factory * requestdecorator . RequestFactory ) error {
2014-12-12 04:55:15 +03:00
token , err := getToken ( authConfig . Username , authConfig . Password , params , registryEndpoint , client , factory )
if err != nil {
return err
}
req , err := factory . NewRequest ( "GET" , registryEndpoint . Path ( "" ) , nil )
if err != nil {
return err
}
req . Header . Set ( "Authorization" , fmt . Sprintf ( "Bearer %s" , token ) )
resp , err := client . Do ( req )
if err != nil {
return err
}
defer resp . Body . Close ( )
if resp . StatusCode != http . StatusOK {
return fmt . Errorf ( "token auth attempt to %s realm %q failed with status: %d %s" , registryEndpoint , params [ "realm" ] , resp . StatusCode , http . StatusText ( resp . StatusCode ) )
}
return nil
}
2013-09-03 22:45:49 +04:00
// this method matches a auth configuration to a server address or a url
2014-10-07 05:54:52 +04:00
func ( config * ConfigFile ) ResolveAuthConfig ( index * IndexInfo ) AuthConfig {
configKey := index . GetAuthConfigKey ( )
2014-02-21 02:57:58 +04:00
// First try the happy case
2015-04-02 01:39:37 +03:00
if c , found := config . AuthConfigs [ configKey ] ; found || index . Official {
2014-02-21 02:57:58 +04:00
return c
2013-09-03 22:45:49 +04:00
}
2014-02-21 02:57:58 +04:00
convertToHostname := func ( url string ) string {
stripped := url
if strings . HasPrefix ( url , "http://" ) {
stripped = strings . Replace ( url , "http://" , "" , 1 )
} else if strings . HasPrefix ( url , "https://" ) {
stripped = strings . Replace ( url , "https://" , "" , 1 )
2013-09-03 22:45:49 +04:00
}
2014-02-21 02:57:58 +04:00
nameParts := strings . SplitN ( stripped , "/" , 2 )
return nameParts [ 0 ]
2013-09-03 22:45:49 +04:00
}
2014-02-21 02:57:58 +04:00
// Maybe they have a legacy config file, we will iterate the keys converting
// them to the new format and testing
2015-04-02 01:39:37 +03:00
for registry , config := range config . AuthConfigs {
2014-10-07 05:54:52 +04:00
if configKey == convertToHostname ( registry ) {
2014-02-21 02:57:58 +04:00
return config
}
2013-09-03 22:45:49 +04:00
}
2014-02-21 02:57:58 +04:00
// When all else fails, return an empty auth config
return AuthConfig { }
2013-09-03 22:45:49 +04:00
}
2015-04-02 01:39:37 +03:00
func ( config * ConfigFile ) Filename ( ) string {
return config . filename
}