auth.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361
  1. package docker
  2. import (
  3. "context"
  4. "encoding/base64"
  5. "encoding/json"
  6. "fmt"
  7. "io/ioutil"
  8. "os"
  9. "path/filepath"
  10. "regexp"
  11. "strings"
  12. "time"
  13. api "github.com/porter-dev/porter/api/client"
  14. "github.com/porter-dev/porter/api/types"
  15. "k8s.io/client-go/util/homedir"
  16. )
  17. // AuthEntry is a stored token for registry access with an expiration time.
  18. type AuthEntry struct {
  19. AuthorizationToken string
  20. RequestedAt time.Time
  21. ExpiresAt time.Time
  22. ProxyEndpoint string
  23. }
  24. // IsValid checks if AuthEntry is still valid at runtime. AuthEntries expire at 1/2 of their original
  25. // requested window.
  26. func (authEntry *AuthEntry) IsValid(testTime time.Time) bool {
  27. validWindow := authEntry.ExpiresAt.Sub(authEntry.RequestedAt)
  28. refreshTime := authEntry.ExpiresAt.Add(-1 * validWindow / time.Duration(2))
  29. return testTime.Before(refreshTime)
  30. }
  31. // CredentialsCache is a simple interface for getting/setting auth credentials
  32. // so that we don't request new tokens when previous ones haven't expired
  33. type CredentialsCache interface {
  34. Get(registry string) *AuthEntry
  35. Set(registry string, entry *AuthEntry)
  36. List() []*AuthEntry
  37. }
  38. // AuthGetter retrieves
  39. type AuthGetter struct {
  40. Client *api.Client
  41. Cache CredentialsCache
  42. ProjectID uint
  43. }
  44. func (a *AuthGetter) GetCredentials(serverURL string) (user string, secret string, err error) {
  45. if strings.Contains(serverURL, "gcr.io") {
  46. return a.GetGCRCredentials(serverURL, a.ProjectID)
  47. } else if strings.Contains(serverURL, "registry.digitalocean.com") {
  48. return a.GetDOCRCredentials(serverURL, a.ProjectID)
  49. } else if strings.Contains(serverURL, "index.docker.io") {
  50. return a.GetDockerHubCredentials(serverURL, a.ProjectID)
  51. }
  52. return a.GetECRCredentials(serverURL, a.ProjectID)
  53. }
  54. func (a *AuthGetter) GetGCRCredentials(serverURL string, projID uint) (user string, secret string, err error) {
  55. if err != nil {
  56. return "", "", err
  57. }
  58. cachedEntry := a.Cache.Get(serverURL)
  59. var token string
  60. if cachedEntry != nil && cachedEntry.IsValid(time.Now()) {
  61. token = cachedEntry.AuthorizationToken
  62. } else {
  63. // get a token from the server
  64. tokenResp, err := a.Client.GetGCRAuthorizationToken(context.Background(), projID, &types.GetRegistryGCRTokenRequest{
  65. ServerURL: serverURL,
  66. })
  67. if err != nil {
  68. return "", "", err
  69. }
  70. token = tokenResp.Token
  71. // set the token in cache
  72. a.Cache.Set(serverURL, &AuthEntry{
  73. AuthorizationToken: token,
  74. RequestedAt: time.Now(),
  75. ExpiresAt: *tokenResp.ExpiresAt,
  76. ProxyEndpoint: serverURL,
  77. })
  78. }
  79. return "oauth2accesstoken", token, nil
  80. }
  81. func (a *AuthGetter) GetDOCRCredentials(serverURL string, projID uint) (user string, secret string, err error) {
  82. cachedEntry := a.Cache.Get(serverURL)
  83. var token string
  84. if cachedEntry != nil && cachedEntry.IsValid(time.Now()) {
  85. token = cachedEntry.AuthorizationToken
  86. } else {
  87. // get a token from the server
  88. tokenResp, err := a.Client.GetDOCRAuthorizationToken(context.Background(), projID, &types.GetRegistryGCRTokenRequest{
  89. ServerURL: serverURL,
  90. })
  91. if err != nil {
  92. return "", "", err
  93. }
  94. token = tokenResp.Token
  95. if t := *tokenResp.ExpiresAt; len(token) > 0 && !t.IsZero() {
  96. // set the token in cache
  97. a.Cache.Set(serverURL, &AuthEntry{
  98. AuthorizationToken: token,
  99. RequestedAt: time.Now(),
  100. ExpiresAt: t,
  101. ProxyEndpoint: serverURL,
  102. })
  103. }
  104. }
  105. return token, token, nil
  106. }
  107. var ecrPattern = regexp.MustCompile(`(^[a-zA-Z0-9][a-zA-Z0-9-_]*)\.dkr\.ecr(\-fips)?\.([a-zA-Z0-9][a-zA-Z0-9-_]*)\.amazonaws\.com(\.cn)?`)
  108. func (a *AuthGetter) GetECRCredentials(serverURL string, projID uint) (user string, secret string, err error) {
  109. // parse the server url for region
  110. matches := ecrPattern.FindStringSubmatch(serverURL)
  111. if len(matches) == 0 {
  112. err := fmt.Errorf("only ECR registry URLs are supported")
  113. return "", "", err
  114. } else if len(matches) < 3 {
  115. err := fmt.Errorf("%s is not a valid ECR repository URI", serverURL)
  116. return "", "", err
  117. }
  118. cachedEntry := a.Cache.Get(serverURL)
  119. var token string
  120. if cachedEntry != nil && cachedEntry.IsValid(time.Now()) {
  121. token = cachedEntry.AuthorizationToken
  122. } else {
  123. // get a token from the server
  124. tokenResp, err := a.Client.GetECRAuthorizationToken(context.Background(), projID, &types.GetRegistryECRTokenRequest{
  125. Region: matches[3],
  126. })
  127. if err != nil {
  128. return "", "", err
  129. }
  130. token = tokenResp.Token
  131. // set the token in cache
  132. a.Cache.Set(serverURL, &AuthEntry{
  133. AuthorizationToken: token,
  134. RequestedAt: time.Now(),
  135. ExpiresAt: *tokenResp.ExpiresAt,
  136. ProxyEndpoint: serverURL,
  137. })
  138. }
  139. return decodeDockerToken(token)
  140. }
  141. func (a *AuthGetter) GetDockerHubCredentials(serverURL string, projID uint) (user string, secret string, err error) {
  142. cachedEntry := a.Cache.Get(serverURL)
  143. var token string
  144. if cachedEntry != nil && cachedEntry.IsValid(time.Now()) {
  145. token = cachedEntry.AuthorizationToken
  146. } else {
  147. // get a token from the server
  148. tokenResp, err := a.Client.GetDockerhubAuthorizationToken(context.Background(), projID)
  149. if err != nil {
  150. return "", "", err
  151. }
  152. token = tokenResp.Token
  153. // set the token in cache
  154. a.Cache.Set(serverURL, &AuthEntry{
  155. AuthorizationToken: token,
  156. RequestedAt: time.Now(),
  157. ExpiresAt: *tokenResp.ExpiresAt,
  158. ProxyEndpoint: serverURL,
  159. })
  160. }
  161. return decodeDockerToken(token)
  162. }
  163. func decodeDockerToken(token string) (string, string, error) {
  164. decodedToken, err := base64.StdEncoding.DecodeString(token)
  165. if err != nil {
  166. return "", "", fmt.Errorf("Invalid token: %v", err)
  167. }
  168. parts := strings.SplitN(string(decodedToken), ":", 2)
  169. if len(parts) < 2 {
  170. return "", "", fmt.Errorf("Invalid token: expected two parts, got %d", len(parts))
  171. }
  172. return parts[0], parts[1], nil
  173. }
  174. type FileCredentialCache struct {
  175. path string
  176. filename string
  177. cachePrefixKey string
  178. }
  179. const registryCacheVersion = "1.0"
  180. type RegistryCache struct {
  181. Registries map[string]*AuthEntry
  182. Version string
  183. }
  184. type fileCredentialCache struct {
  185. path string
  186. filename string
  187. cachePrefixKey string
  188. }
  189. func newRegistryCache() *RegistryCache {
  190. return &RegistryCache{
  191. Registries: make(map[string]*AuthEntry),
  192. Version: registryCacheVersion,
  193. }
  194. }
  195. // NewFileCredentialsCache returns a new file credentials cache.
  196. //
  197. // path is used for temporary files during save, and filename should be a relative filename
  198. // in the same directory where the cache is serialized and deserialized.
  199. //
  200. // cachePrefixKey is used for scoping credentials for a given credential cache (i.e. region and
  201. // accessKey).
  202. func NewFileCredentialsCache() CredentialsCache {
  203. home := homedir.HomeDir()
  204. path := filepath.Join(home, ".porter")
  205. if _, err := os.Stat(path); err != nil {
  206. os.MkdirAll(path, 0700)
  207. }
  208. return &FileCredentialCache{path: path, filename: "cache.json"}
  209. }
  210. func (f *FileCredentialCache) Get(registry string) *AuthEntry {
  211. registryCache := f.init()
  212. return registryCache.Registries[f.cachePrefixKey+registry]
  213. }
  214. func (f *FileCredentialCache) Set(registry string, entry *AuthEntry) {
  215. registryCache := f.init()
  216. registryCache.Registries[f.cachePrefixKey+registry] = entry
  217. f.save(registryCache)
  218. }
  219. func (f *FileCredentialCache) Clear() {
  220. os.Remove(f.fullFilePath())
  221. }
  222. // List returns all of the available AuthEntries (regardless of prefix)
  223. func (f *FileCredentialCache) List() []*AuthEntry {
  224. registryCache := f.init()
  225. // optimize allocation for copy
  226. entries := make([]*AuthEntry, 0, len(registryCache.Registries))
  227. for _, entry := range registryCache.Registries {
  228. entries = append(entries, entry)
  229. }
  230. return entries
  231. }
  232. func (f *FileCredentialCache) fullFilePath() string {
  233. return filepath.Join(f.path, f.filename)
  234. }
  235. // Saves credential cache to disk. This writes to a temporary file first, then moves the file to the config location.
  236. // This eliminates from reading partially written credential files, and reduces (but does not eliminate) concurrent
  237. // file access. There is not guarantee here for handling multiple writes at once since there is no out of process locking.
  238. func (f *FileCredentialCache) save(registryCache *RegistryCache) error {
  239. file, err := ioutil.TempFile(f.path, ".config.json.tmp")
  240. if err != nil {
  241. return err
  242. }
  243. buff, err := json.MarshalIndent(registryCache, "", " ")
  244. if err != nil {
  245. file.Close()
  246. os.Remove(file.Name())
  247. return err
  248. }
  249. _, err = file.Write(buff)
  250. if err != nil {
  251. file.Close()
  252. os.Remove(file.Name())
  253. return err
  254. }
  255. file.Close()
  256. // note this is only atomic when relying on linux syscalls
  257. os.Rename(file.Name(), f.fullFilePath())
  258. return err
  259. }
  260. func (f *FileCredentialCache) init() *RegistryCache {
  261. registryCache, err := f.load()
  262. if err != nil {
  263. f.Clear()
  264. registryCache = newRegistryCache()
  265. }
  266. return registryCache
  267. }
  268. // Loading a cache from disk will return errors for malformed or incompatible cache files.
  269. func (f *FileCredentialCache) load() (*RegistryCache, error) {
  270. registryCache := newRegistryCache()
  271. file, err := os.Open(f.fullFilePath())
  272. if os.IsNotExist(err) {
  273. return registryCache, nil
  274. }
  275. if err != nil {
  276. return nil, err
  277. }
  278. defer file.Close()
  279. if err = json.NewDecoder(file).Decode(&registryCache); err != nil {
  280. return nil, err
  281. }
  282. return registryCache, nil
  283. }