get_token.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608
  1. package registry
  2. import (
  3. "encoding/base64"
  4. "fmt"
  5. "net/http"
  6. "strings"
  7. "time"
  8. "github.com/porter-dev/porter/internal/telemetry"
  9. "connectrpc.com/connect"
  10. "github.com/aws/aws-sdk-go/aws/arn"
  11. "github.com/aws/aws-sdk-go/service/ecr"
  12. porterv1 "github.com/porter-dev/api-contracts/generated/go/porter/v1"
  13. "github.com/porter-dev/porter/api/server/handlers"
  14. "github.com/porter-dev/porter/api/server/shared"
  15. "github.com/porter-dev/porter/api/server/shared/apierrors"
  16. "github.com/porter-dev/porter/api/server/shared/config"
  17. "github.com/porter-dev/porter/api/types"
  18. "github.com/porter-dev/porter/internal/models"
  19. "github.com/porter-dev/porter/internal/oauth"
  20. "github.com/porter-dev/porter/internal/registry"
  21. )
  22. type RegistryGetECRTokenHandler struct {
  23. handlers.PorterHandlerReadWriter
  24. }
  25. func NewRegistryGetECRTokenHandler(
  26. config *config.Config,
  27. decoderValidator shared.RequestDecoderValidator,
  28. writer shared.ResultWriter,
  29. ) *RegistryGetECRTokenHandler {
  30. return &RegistryGetECRTokenHandler{
  31. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  32. }
  33. }
  34. func (c *RegistryGetECRTokenHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  35. ctx := r.Context()
  36. proj, _ := ctx.Value(types.ProjectScope).(*models.Project)
  37. request := &types.GetRegistryECRTokenRequest{}
  38. if ok := c.DecodeAndValidate(w, r, request); !ok {
  39. return
  40. }
  41. if proj.GetFeatureFlag(models.CapiProvisionerEnabled, c.Config().LaunchDarklyClient) {
  42. ecrRequest := porterv1.ECRTokenForRegistryRequest{
  43. ProjectId: int64(proj.ID),
  44. Region: request.Region,
  45. AwsAccountId: request.AccountID,
  46. }
  47. ecrResponse, err := c.Config().ClusterControlPlaneClient.ECRTokenForRegistry(ctx, connect.NewRequest(&ecrRequest))
  48. if err != nil {
  49. e := fmt.Errorf("error getting ecr token for capi cluster: %v", err)
  50. c.HandleAPIError(w, r, apierrors.NewErrInternal(e))
  51. return
  52. }
  53. if ecrResponse.Msg == nil {
  54. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("nil message received for ecr token")))
  55. return
  56. }
  57. expiry := ecrResponse.Msg.Expiry.AsTime()
  58. resp := &types.GetRegistryTokenResponse{
  59. Token: ecrResponse.Msg.Token,
  60. ExpiresAt: expiry,
  61. }
  62. c.WriteResult(w, r, resp)
  63. return
  64. }
  65. // list registries and find one that matches the region
  66. regs, err := c.Repo().Registry().ListRegistriesByProjectID(proj.ID)
  67. if err != nil {
  68. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  69. return
  70. }
  71. var token string
  72. var expiresAt time.Time
  73. for _, reg := range regs {
  74. if reg.AWSIntegrationID != 0 {
  75. awsInt, err := c.Repo().AWSIntegration().ReadAWSIntegration(reg.ProjectID, reg.AWSIntegrationID)
  76. if err != nil {
  77. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  78. return
  79. }
  80. // if the aws integration doesn't have an ARN populated, populate it
  81. if awsInt.AWSArn == "" {
  82. err = awsInt.PopulateAWSArn()
  83. if err != nil {
  84. continue
  85. }
  86. }
  87. parsedARN, err := arn.Parse(awsInt.AWSArn)
  88. if err != nil {
  89. continue
  90. }
  91. // if the account id is passed as part of the request, verify the account id matches the account id in the ARN
  92. if awsInt.AWSRegion == request.Region && (request.AccountID == "" || request.AccountID == parsedARN.AccountID) {
  93. // get the aws integration and session
  94. sess, err := awsInt.GetSession()
  95. if err != nil {
  96. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  97. return
  98. }
  99. ecrSvc := ecr.New(sess)
  100. output, err := ecrSvc.GetAuthorizationToken(&ecr.GetAuthorizationTokenInput{})
  101. if err != nil {
  102. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  103. return
  104. }
  105. if output == nil || output.AuthorizationData == nil || len(output.AuthorizationData) == 0 {
  106. continue
  107. }
  108. token = *output.AuthorizationData[0].AuthorizationToken
  109. expiresAt = *output.AuthorizationData[0].ExpiresAt
  110. }
  111. }
  112. }
  113. resp := &types.GetRegistryTokenResponse{
  114. Token: token,
  115. ExpiresAt: expiresAt,
  116. }
  117. c.WriteResult(w, r, resp)
  118. }
  119. type RegistryGetGCRTokenHandler struct {
  120. handlers.PorterHandlerReadWriter
  121. }
  122. func NewRegistryGetGCRTokenHandler(
  123. config *config.Config,
  124. decoderValidator shared.RequestDecoderValidator,
  125. writer shared.ResultWriter,
  126. ) *RegistryGetGCRTokenHandler {
  127. return &RegistryGetGCRTokenHandler{
  128. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  129. }
  130. }
  131. func (c *RegistryGetGCRTokenHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  132. ctx, span := telemetry.NewSpan(r.Context(), "serve-registry-get-gcr-token")
  133. defer span.End()
  134. proj, _ := ctx.Value(types.ProjectScope).(*models.Project)
  135. request := &types.GetRegistryGCRTokenRequest{}
  136. if ok := c.DecodeAndValidate(w, r, request); !ok {
  137. return
  138. }
  139. // list registries and find one that matches the region
  140. regs, err := c.Repo().Registry().ListRegistriesByProjectID(proj.ID)
  141. if err != nil {
  142. e := telemetry.Error(ctx, span, err, "error listing registries by project id")
  143. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusInternalServerError))
  144. return
  145. }
  146. var token string
  147. var expiresAt time.Time
  148. for _, reg := range regs {
  149. if reg.GCPIntegrationID != 0 && strings.Contains(reg.URL, request.ServerURL) {
  150. _reg := registry.Registry(*reg)
  151. oauthTok, err := _reg.GetGCRToken(ctx, c.Repo())
  152. if err != nil {
  153. // if the oauth token is not nil, we still return the token but log an error
  154. if oauthTok == nil {
  155. e := telemetry.Error(ctx, span, err, "error getting gcr token")
  156. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusInternalServerError))
  157. return
  158. }
  159. e := telemetry.Error(ctx, span, err, "error getting gcr token, but token was returned")
  160. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(e))
  161. }
  162. token = oauthTok.AccessToken
  163. expiresAt = oauthTok.Expiry
  164. break
  165. }
  166. }
  167. resp := &types.GetRegistryTokenResponse{
  168. Token: token,
  169. ExpiresAt: expiresAt,
  170. }
  171. c.WriteResult(w, r, resp)
  172. }
  173. type RegistryGetGARTokenHandler struct {
  174. handlers.PorterHandlerReadWriter
  175. }
  176. func NewRegistryGetGARTokenHandler(
  177. config *config.Config,
  178. decoderValidator shared.RequestDecoderValidator,
  179. writer shared.ResultWriter,
  180. ) *RegistryGetGARTokenHandler {
  181. return &RegistryGetGARTokenHandler{
  182. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  183. }
  184. }
  185. func (c *RegistryGetGARTokenHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  186. ctx, span := telemetry.NewSpan(r.Context(), "serve-registry-get-gar-token")
  187. defer span.End()
  188. proj, _ := ctx.Value(types.ProjectScope).(*models.Project)
  189. request := &types.GetRegistryGCRTokenRequest{}
  190. if ok := c.DecodeAndValidate(w, r, request); !ok {
  191. err := telemetry.Error(ctx, span, nil, "error decoding request")
  192. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  193. return
  194. }
  195. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "server-url", Value: request.ServerURL})
  196. // list registries and find one that matches the region
  197. regs, err := c.Repo().Registry().ListRegistriesByProjectID(proj.ID)
  198. if err != nil {
  199. e := telemetry.Error(ctx, span, err, "error listing registries by project id")
  200. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusInternalServerError))
  201. return
  202. }
  203. if len(regs) == 0 {
  204. e := telemetry.Error(ctx, span, err, "no registries found")
  205. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusNotFound))
  206. return
  207. }
  208. if proj.GetFeatureFlag(models.CapiProvisionerEnabled, c.Config().LaunchDarklyClient) {
  209. var registryURL string
  210. for _, reg := range regs {
  211. if strings.Contains(reg.URL, request.ServerURL) {
  212. registryURL = reg.URL
  213. break
  214. }
  215. }
  216. if registryURL == "" {
  217. for _, reg := range regs {
  218. if strings.Contains(reg.URL, "-docker.pkg.dev") {
  219. registryURL = reg.URL
  220. break
  221. }
  222. }
  223. if registryURL == "" {
  224. e := telemetry.Error(ctx, span, err, "no matching registry found")
  225. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusNotFound))
  226. return
  227. }
  228. }
  229. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "registry-url", Value: registryURL})
  230. regInput := connect.NewRequest(&porterv1.TokenForRegistryRequest{
  231. ProjectId: int64(proj.ID),
  232. RegistryUri: registryURL,
  233. })
  234. regOutput, err := c.Config().ClusterControlPlaneClient.TokenForRegistry(ctx, regInput)
  235. if err != nil {
  236. e := telemetry.Error(ctx, span, err, "error getting gar token")
  237. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusInternalServerError))
  238. return
  239. }
  240. if regOutput == nil || regOutput.Msg == nil {
  241. e := telemetry.Error(ctx, span, err, "error reading gar token")
  242. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusInternalServerError))
  243. return
  244. }
  245. if regOutput.Msg.Token == "" {
  246. e := telemetry.Error(ctx, span, err, "no token for for registry")
  247. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusInternalServerError))
  248. return
  249. }
  250. resp := &types.GetRegistryTokenResponse{
  251. Token: regOutput.Msg.Token,
  252. ExpiresAt: regOutput.Msg.Expiry.AsTime(),
  253. }
  254. c.WriteResult(w, r, resp)
  255. return
  256. }
  257. var token string
  258. var expiresAt time.Time
  259. for _, reg := range regs {
  260. if reg.GCPIntegrationID != 0 && strings.Contains(reg.URL, request.ServerURL) {
  261. _reg := registry.Registry(*reg)
  262. oauthTok, err := _reg.GetGARToken(ctx, c.Repo())
  263. if err != nil {
  264. // if the oauth token is not nil, we still return the token but log an error
  265. if oauthTok == nil {
  266. e := telemetry.Error(ctx, span, err, "error getting gar token")
  267. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusInternalServerError))
  268. return
  269. }
  270. e := telemetry.Error(ctx, span, err, "error getting gar token, but token was returned")
  271. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(e))
  272. }
  273. if oauthTok == nil {
  274. continue
  275. }
  276. token = oauthTok.AccessToken
  277. expiresAt = oauthTok.Expiry
  278. break
  279. }
  280. }
  281. if token == "" && len(regs) > 0 {
  282. _reg := registry.Registry(*regs[0])
  283. oauthTok, err := _reg.GetGARToken(ctx, c.Repo())
  284. if err != nil {
  285. // if the oauth token is not nil, we still return the token but log an error
  286. if oauthTok == nil {
  287. e := telemetry.Error(ctx, span, err, "error getting gar token")
  288. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusInternalServerError))
  289. return
  290. }
  291. e := telemetry.Error(ctx, span, err, "error getting gar token, but token was returned")
  292. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(e))
  293. }
  294. if oauthTok != nil {
  295. token = oauthTok.AccessToken
  296. expiresAt = oauthTok.Expiry
  297. }
  298. }
  299. resp := &types.GetRegistryTokenResponse{
  300. Token: token,
  301. ExpiresAt: expiresAt,
  302. }
  303. c.WriteResult(w, r, resp)
  304. }
  305. type RegistryGetDOCRTokenHandler struct {
  306. handlers.PorterHandlerReadWriter
  307. }
  308. func NewRegistryGetDOCRTokenHandler(
  309. config *config.Config,
  310. decoderValidator shared.RequestDecoderValidator,
  311. writer shared.ResultWriter,
  312. ) *RegistryGetDOCRTokenHandler {
  313. return &RegistryGetDOCRTokenHandler{
  314. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  315. }
  316. }
  317. func (c *RegistryGetDOCRTokenHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  318. proj, _ := r.Context().Value(types.ProjectScope).(*models.Project)
  319. request := &types.GetRegistryDOCRTokenRequest{}
  320. if ok := c.DecodeAndValidate(w, r, request); !ok {
  321. return
  322. }
  323. // list registries and find one that matches the region
  324. regs, err := c.Repo().Registry().ListRegistriesByProjectID(proj.ID)
  325. if err != nil {
  326. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  327. return
  328. }
  329. var token string
  330. var expiresAt time.Time
  331. for _, reg := range regs {
  332. if reg.DOIntegrationID != 0 && strings.Contains(reg.URL, request.ServerURL) {
  333. oauthInt, err := c.Repo().OAuthIntegration().ReadOAuthIntegration(reg.ProjectID, reg.DOIntegrationID)
  334. if err != nil {
  335. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  336. return
  337. }
  338. tok, expiry, err := oauth.GetAccessToken(
  339. oauthInt.SharedOAuthModel,
  340. c.Config().DOConf,
  341. oauth.MakeUpdateOAuthIntegrationTokenFunction(oauthInt, c.Repo()),
  342. )
  343. if err != nil {
  344. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  345. return
  346. }
  347. token = tok
  348. expiresAt = *expiry
  349. break
  350. }
  351. }
  352. resp := &types.GetRegistryTokenResponse{
  353. Token: token,
  354. ExpiresAt: expiresAt,
  355. }
  356. c.WriteResult(w, r, resp)
  357. }
  358. type RegistryGetDockerhubTokenHandler struct {
  359. handlers.PorterHandlerReadWriter
  360. }
  361. func NewRegistryGetDockerhubTokenHandler(
  362. config *config.Config,
  363. decoderValidator shared.RequestDecoderValidator,
  364. writer shared.ResultWriter,
  365. ) *RegistryGetDockerhubTokenHandler {
  366. return &RegistryGetDockerhubTokenHandler{
  367. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  368. }
  369. }
  370. func (c *RegistryGetDockerhubTokenHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  371. proj, _ := r.Context().Value(types.ProjectScope).(*models.Project)
  372. // list registries and find one that matches the region
  373. regs, err := c.Repo().Registry().ListRegistriesByProjectID(proj.ID)
  374. if err != nil {
  375. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  376. return
  377. }
  378. var token string
  379. var expiresAt time.Time
  380. for _, reg := range regs {
  381. if reg.BasicIntegrationID != 0 && strings.Contains(reg.URL, "index.docker.io") {
  382. basic, err := c.Repo().BasicIntegration().ReadBasicIntegration(reg.ProjectID, reg.BasicIntegrationID)
  383. if err != nil {
  384. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  385. return
  386. }
  387. token = base64.StdEncoding.EncodeToString([]byte(string(basic.Username) + ":" + string(basic.Password)))
  388. // we'll just set an arbitrary 30-day expiry time (this is not enforced)
  389. timeExpires := time.Now().Add(30 * 24 * 3600 * time.Second)
  390. expiresAt = timeExpires
  391. }
  392. }
  393. resp := &types.GetRegistryTokenResponse{
  394. Token: token,
  395. ExpiresAt: expiresAt,
  396. }
  397. c.WriteResult(w, r, resp)
  398. }
  399. type RegistryGetACRTokenHandler struct {
  400. handlers.PorterHandlerReadWriter
  401. }
  402. func NewRegistryGetACRTokenHandler(
  403. config *config.Config,
  404. decoderValidator shared.RequestDecoderValidator,
  405. writer shared.ResultWriter,
  406. ) *RegistryGetACRTokenHandler {
  407. return &RegistryGetACRTokenHandler{
  408. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  409. }
  410. }
  411. func (c *RegistryGetACRTokenHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  412. ctx, span := telemetry.NewSpan(r.Context(), "serve-acr-token")
  413. defer span.End()
  414. proj, _ := ctx.Value(types.ProjectScope).(*models.Project)
  415. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "project-id", Value: proj.ID})
  416. request := &types.GetRegistryACRTokenRequest{}
  417. if ok := c.DecodeAndValidate(w, r, request); !ok {
  418. err := telemetry.Error(ctx, span, nil, "error decoding request")
  419. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  420. return
  421. }
  422. if request.ServerURL == "" {
  423. err := telemetry.Error(ctx, span, nil, "missing server url")
  424. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  425. return
  426. }
  427. serverUrl := strings.TrimSuffix(request.ServerURL, "/")
  428. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "server-url", Value: serverUrl})
  429. // list registries and find one that matches the region
  430. regs, err := c.Repo().Registry().ListRegistriesByProjectID(proj.ID)
  431. if err != nil {
  432. err = telemetry.Error(ctx, span, err, "error getting registries by project id")
  433. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  434. return
  435. }
  436. var token string
  437. var expiresAt time.Time
  438. var matchingReg *models.Registry
  439. for _, reg := range regs {
  440. if strings.Contains(reg.URL, serverUrl) {
  441. matchingReg = reg
  442. }
  443. }
  444. if matchingReg == nil {
  445. err := telemetry.Error(ctx, span, err, "no matching registry")
  446. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  447. return
  448. }
  449. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "registry-name", Value: matchingReg.Name})
  450. if proj.GetFeatureFlag(models.CapiProvisionerEnabled, c.Config().LaunchDarklyClient) {
  451. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "capi-provisioned", Value: true})
  452. if c.Config().ClusterControlPlaneClient == nil {
  453. err := telemetry.Error(ctx, span, nil, "cluster control plane client cannot be nil")
  454. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  455. return
  456. }
  457. tokenReq := connect.NewRequest(&porterv1.TokenForRegistryRequest{
  458. ProjectId: int64(proj.ID),
  459. RegistryUri: matchingReg.URL,
  460. })
  461. tokenResp, err := c.Config().ClusterControlPlaneClient.TokenForRegistry(ctx, tokenReq)
  462. if err != nil {
  463. err = telemetry.Error(ctx, span, err, "error getting token response from ccp")
  464. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  465. return
  466. }
  467. if tokenResp.Msg == nil || tokenResp.Msg.Token == "" {
  468. err := telemetry.Error(ctx, span, nil, "no token found in response")
  469. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  470. return
  471. }
  472. token = tokenResp.Msg.Token
  473. // we'll just set an arbitrary 30-day expiry time (this is not enforced)
  474. timeExpires := time.Now().UTC().Add(30 * 24 * time.Hour)
  475. expiresAt = timeExpires
  476. }
  477. if matchingReg.AzureIntegrationID != 0 {
  478. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "capi-provisioned", Value: false})
  479. _reg := registry.Registry(*matchingReg)
  480. username, pw, err := _reg.GetACRCredentials(c.Repo())
  481. if err != nil {
  482. err = telemetry.Error(ctx, span, err, "error getting token response from ccp")
  483. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  484. return
  485. }
  486. token = base64.StdEncoding.EncodeToString([]byte(string(username) + ":" + string(pw)))
  487. // we'll just set an arbitrary 30-day expiry time (this is not enforced)
  488. timeExpires := time.Now().UTC().Add(30 * 24 * time.Hour)
  489. expiresAt = timeExpires
  490. }
  491. if token == "" {
  492. err := telemetry.Error(ctx, span, nil, "missing token")
  493. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  494. return
  495. }
  496. resp := &types.GetRegistryTokenResponse{
  497. Token: token,
  498. ExpiresAt: expiresAt,
  499. }
  500. c.WriteResult(w, r, resp)
  501. }