auth.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362
  1. package docker
  2. import (
  3. "context"
  4. "encoding/base64"
  5. "encoding/json"
  6. "fmt"
  7. "io/ioutil"
  8. "os"
  9. "path/filepath"
  10. "regexp"
  11. "strings"
  12. "time"
  13. api "github.com/porter-dev/porter/api/client"
  14. "github.com/porter-dev/porter/api/types"
  15. "k8s.io/client-go/util/homedir"
  16. )
  17. // AuthEntry is a stored token for registry access with an expiration time.
  18. type AuthEntry struct {
  19. AuthorizationToken string
  20. RequestedAt time.Time
  21. ExpiresAt time.Time
  22. ProxyEndpoint string
  23. }
  24. // IsValid checks if AuthEntry is still valid at runtime. AuthEntries expire at 1/2 of their original
  25. // requested window.
  26. func (authEntry *AuthEntry) IsValid(testTime time.Time) bool {
  27. validWindow := authEntry.ExpiresAt.Sub(authEntry.RequestedAt)
  28. refreshTime := authEntry.ExpiresAt.Add(-1 * validWindow / time.Duration(2))
  29. return testTime.Before(refreshTime)
  30. }
  31. // CredentialsCache is a simple interface for getting/setting auth credentials
  32. // so that we don't request new tokens when previous ones haven't expired
  33. type CredentialsCache interface {
  34. Get(registry string) *AuthEntry
  35. Set(registry string, entry *AuthEntry)
  36. List() []*AuthEntry
  37. }
  38. // AuthGetter retrieves
  39. type AuthGetter struct {
  40. Client *api.Client
  41. Cache CredentialsCache
  42. ProjectID uint
  43. }
  44. func (a *AuthGetter) GetCredentials(serverURL string) (user string, secret string, err error) {
  45. if strings.Contains(serverURL, "gcr.io") {
  46. return a.GetGCRCredentials(serverURL, a.ProjectID)
  47. } else if strings.Contains(serverURL, "registry.digitalocean.com") {
  48. return a.GetDOCRCredentials(serverURL, a.ProjectID)
  49. } else if strings.Contains(serverURL, "index.docker.io") {
  50. return a.GetDockerHubCredentials(serverURL, a.ProjectID)
  51. }
  52. return a.GetECRCredentials(serverURL, a.ProjectID)
  53. }
  54. func (a *AuthGetter) GetGCRCredentials(serverURL string, projID uint) (user string, secret string, err error) {
  55. if err != nil {
  56. return "", "", err
  57. }
  58. cachedEntry := a.Cache.Get(serverURL)
  59. var token string
  60. if cachedEntry != nil && cachedEntry.IsValid(time.Now()) {
  61. token = cachedEntry.AuthorizationToken
  62. } else {
  63. // get a token from the server
  64. tokenResp, err := a.Client.GetGCRAuthorizationToken(context.Background(), projID, &types.GetRegistryGCRTokenRequest{
  65. ServerURL: serverURL,
  66. })
  67. if err != nil {
  68. return "", "", err
  69. }
  70. token = tokenResp.Token
  71. // set the token in cache
  72. a.Cache.Set(serverURL, &AuthEntry{
  73. AuthorizationToken: token,
  74. RequestedAt: time.Now(),
  75. ExpiresAt: *tokenResp.ExpiresAt,
  76. ProxyEndpoint: serverURL,
  77. })
  78. }
  79. return "oauth2accesstoken", token, nil
  80. }
  81. func (a *AuthGetter) GetDOCRCredentials(serverURL string, projID uint) (user string, secret string, err error) {
  82. cachedEntry := a.Cache.Get(serverURL)
  83. var token string
  84. if cachedEntry != nil && cachedEntry.IsValid(time.Now()) {
  85. token = cachedEntry.AuthorizationToken
  86. } else {
  87. // get a token from the server
  88. tokenResp, err := a.Client.GetDOCRAuthorizationToken(context.Background(), projID, &types.GetRegistryGCRTokenRequest{
  89. ServerURL: serverURL,
  90. })
  91. if err != nil {
  92. return "", "", err
  93. }
  94. token = tokenResp.Token
  95. if t := *tokenResp.ExpiresAt; len(token) > 0 && !t.IsZero() {
  96. // set the token in cache
  97. a.Cache.Set(serverURL, &AuthEntry{
  98. AuthorizationToken: token,
  99. RequestedAt: time.Now(),
  100. ExpiresAt: t,
  101. ProxyEndpoint: serverURL,
  102. })
  103. }
  104. }
  105. return token, token, nil
  106. }
  107. var ecrPattern = regexp.MustCompile(`(^[a-zA-Z0-9][a-zA-Z0-9-_]*)\.dkr\.ecr(\-fips)?\.([a-zA-Z0-9][a-zA-Z0-9-_]*)\.amazonaws\.com(\.cn)?`)
  108. func (a *AuthGetter) GetECRCredentials(serverURL string, projID uint) (user string, secret string, err error) {
  109. // parse the server url for region
  110. matches := ecrPattern.FindStringSubmatch(serverURL)
  111. if len(matches) == 0 {
  112. err := fmt.Errorf("only ECR registry URLs are supported")
  113. return "", "", err
  114. } else if len(matches) < 3 {
  115. err := fmt.Errorf("%s is not a valid ECR repository URI", serverURL)
  116. return "", "", err
  117. }
  118. cachedEntry := a.Cache.Get(serverURL)
  119. var token string
  120. if cachedEntry != nil && cachedEntry.IsValid(time.Now()) {
  121. token = cachedEntry.AuthorizationToken
  122. } else {
  123. // get a token from the server
  124. tokenResp, err := a.Client.GetECRAuthorizationToken(context.Background(), projID, &types.GetRegistryECRTokenRequest{
  125. Region: matches[3],
  126. AccountID: matches[1],
  127. })
  128. if err != nil {
  129. return "", "", err
  130. }
  131. token = tokenResp.Token
  132. // set the token in cache
  133. a.Cache.Set(serverURL, &AuthEntry{
  134. AuthorizationToken: token,
  135. RequestedAt: time.Now(),
  136. ExpiresAt: *tokenResp.ExpiresAt,
  137. ProxyEndpoint: serverURL,
  138. })
  139. }
  140. return decodeDockerToken(token)
  141. }
  142. func (a *AuthGetter) GetDockerHubCredentials(serverURL string, projID uint) (user string, secret string, err error) {
  143. cachedEntry := a.Cache.Get(serverURL)
  144. var token string
  145. if cachedEntry != nil && cachedEntry.IsValid(time.Now()) {
  146. token = cachedEntry.AuthorizationToken
  147. } else {
  148. // get a token from the server
  149. tokenResp, err := a.Client.GetDockerhubAuthorizationToken(context.Background(), projID)
  150. if err != nil {
  151. return "", "", err
  152. }
  153. token = tokenResp.Token
  154. // set the token in cache
  155. a.Cache.Set(serverURL, &AuthEntry{
  156. AuthorizationToken: token,
  157. RequestedAt: time.Now(),
  158. ExpiresAt: *tokenResp.ExpiresAt,
  159. ProxyEndpoint: serverURL,
  160. })
  161. }
  162. return decodeDockerToken(token)
  163. }
  164. func decodeDockerToken(token string) (string, string, error) {
  165. decodedToken, err := base64.StdEncoding.DecodeString(token)
  166. if err != nil {
  167. return "", "", fmt.Errorf("Invalid token: %v", err)
  168. }
  169. parts := strings.SplitN(string(decodedToken), ":", 2)
  170. if len(parts) < 2 {
  171. return "", "", fmt.Errorf("Invalid token: expected two parts, got %d", len(parts))
  172. }
  173. return parts[0], parts[1], nil
  174. }
  175. type FileCredentialCache struct {
  176. path string
  177. filename string
  178. cachePrefixKey string
  179. }
  180. const registryCacheVersion = "1.0"
  181. type RegistryCache struct {
  182. Registries map[string]*AuthEntry
  183. Version string
  184. }
  185. type fileCredentialCache struct {
  186. path string
  187. filename string
  188. cachePrefixKey string
  189. }
  190. func newRegistryCache() *RegistryCache {
  191. return &RegistryCache{
  192. Registries: make(map[string]*AuthEntry),
  193. Version: registryCacheVersion,
  194. }
  195. }
  196. // NewFileCredentialsCache returns a new file credentials cache.
  197. //
  198. // path is used for temporary files during save, and filename should be a relative filename
  199. // in the same directory where the cache is serialized and deserialized.
  200. //
  201. // cachePrefixKey is used for scoping credentials for a given credential cache (i.e. region and
  202. // accessKey).
  203. func NewFileCredentialsCache() CredentialsCache {
  204. home := homedir.HomeDir()
  205. path := filepath.Join(home, ".porter")
  206. if _, err := os.Stat(path); err != nil {
  207. os.MkdirAll(path, 0700)
  208. }
  209. return &FileCredentialCache{path: path, filename: "cache.json"}
  210. }
  211. func (f *FileCredentialCache) Get(registry string) *AuthEntry {
  212. registryCache := f.init()
  213. return registryCache.Registries[f.cachePrefixKey+registry]
  214. }
  215. func (f *FileCredentialCache) Set(registry string, entry *AuthEntry) {
  216. registryCache := f.init()
  217. registryCache.Registries[f.cachePrefixKey+registry] = entry
  218. f.save(registryCache)
  219. }
  220. func (f *FileCredentialCache) Clear() {
  221. os.Remove(f.fullFilePath())
  222. }
  223. // List returns all of the available AuthEntries (regardless of prefix)
  224. func (f *FileCredentialCache) List() []*AuthEntry {
  225. registryCache := f.init()
  226. // optimize allocation for copy
  227. entries := make([]*AuthEntry, 0, len(registryCache.Registries))
  228. for _, entry := range registryCache.Registries {
  229. entries = append(entries, entry)
  230. }
  231. return entries
  232. }
  233. func (f *FileCredentialCache) fullFilePath() string {
  234. return filepath.Join(f.path, f.filename)
  235. }
  236. // Saves credential cache to disk. This writes to a temporary file first, then moves the file to the config location.
  237. // This eliminates from reading partially written credential files, and reduces (but does not eliminate) concurrent
  238. // file access. There is not guarantee here for handling multiple writes at once since there is no out of process locking.
  239. func (f *FileCredentialCache) save(registryCache *RegistryCache) error {
  240. file, err := ioutil.TempFile(f.path, ".config.json.tmp")
  241. if err != nil {
  242. return err
  243. }
  244. buff, err := json.MarshalIndent(registryCache, "", " ")
  245. if err != nil {
  246. file.Close()
  247. os.Remove(file.Name())
  248. return err
  249. }
  250. _, err = file.Write(buff)
  251. if err != nil {
  252. file.Close()
  253. os.Remove(file.Name())
  254. return err
  255. }
  256. file.Close()
  257. // note this is only atomic when relying on linux syscalls
  258. os.Rename(file.Name(), f.fullFilePath())
  259. return err
  260. }
  261. func (f *FileCredentialCache) init() *RegistryCache {
  262. registryCache, err := f.load()
  263. if err != nil {
  264. f.Clear()
  265. registryCache = newRegistryCache()
  266. }
  267. return registryCache
  268. }
  269. // Loading a cache from disk will return errors for malformed or incompatible cache files.
  270. func (f *FileCredentialCache) load() (*RegistryCache, error) {
  271. registryCache := newRegistryCache()
  272. file, err := os.Open(f.fullFilePath())
  273. if os.IsNotExist(err) {
  274. return registryCache, nil
  275. }
  276. if err != nil {
  277. return nil, err
  278. }
  279. defer file.Close()
  280. if err = json.NewDecoder(file).Decode(&registryCache); err != nil {
  281. return nil, err
  282. }
  283. return registryCache, nil
  284. }