# Copyright 2013 dotCloud inc. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. import base64 import fileinput import json import os import six from ..utils import utils from .. import errors INDEX_URL = 'https://index.docker.io/v1/' DOCKER_CONFIG_FILENAME = '.dockercfg' def expand_registry_url(hostname, insecure=False): if hostname.startswith('http:') or hostname.startswith('https:'): return hostname if utils.ping_registry('https://' + hostname): return 'https://' + hostname elif insecure: return 'http://' + hostname else: raise errors.DockerException( "HTTPS endpoint unresponsive and insecure mode isn't enabled." ) def resolve_repository_name(repo_name, insecure=False): if '://' in repo_name: raise errors.InvalidRepository( 'Repository name cannot contain a scheme ({0})'.format(repo_name)) parts = repo_name.split('/', 1) if '.' not in parts[0] and ':' not in parts[0] and parts[0] != 'localhost': # This is a docker index repo (ex: foo/bar or ubuntu) return INDEX_URL, repo_name if len(parts) < 2: raise errors.InvalidRepository( 'Invalid repository name ({0})'.format(repo_name)) if 'index.docker.io' in parts[0]: raise errors.InvalidRepository( 'Invalid repository name, try "{0}" instead'.format(parts[1]) ) return expand_registry_url(parts[0], insecure), parts[1] def resolve_authconfig(authconfig, registry=None): """ Returns the authentication data from the given auth configuration for a specific registry. As with the Docker client, legacy entries in the config with full URLs are stripped down to hostnames before checking for a match. Returns None if no match was found. """ # Default to the public index server registry = convert_to_hostname(registry) if registry else INDEX_URL if registry in authconfig: return authconfig[registry] for key, config in six.iteritems(authconfig): if convert_to_hostname(key) == registry: return config return None def convert_to_hostname(url): return url.replace('http://', '').replace('https://', '').split('/', 1)[0] def encode_auth(auth_info): return base64.b64encode(auth_info.get('username', '') + b':' + auth_info.get('password', '')) def decode_auth(auth): if isinstance(auth, six.string_types): auth = auth.encode('ascii') s = base64.b64decode(auth) login, pwd = s.split(b':', 1) return login.decode('ascii'), pwd.decode('ascii') def encode_header(auth): auth_json = json.dumps(auth).encode('ascii') return base64.b64encode(auth_json) def encode_full_header(auth): """ Returns the given auth block encoded for the X-Registry-Config header. """ return encode_header({'configs': auth}) def load_config(config_path=None): """ Loads authentication data from a Docker configuration file in the given root directory or if config_path is passed use given path. """ conf = {} data = None config_file = config_path or os.path.join(os.path.expanduser('~'), DOCKER_CONFIG_FILENAME) # if config path doesn't exist return empty config if not os.path.exists(config_file): return {} # First try as JSON try: with open(config_file) as f: conf = {} for registry, entry in six.iteritems(json.load(f)): username, password = decode_auth(entry['auth']) conf[registry] = { 'username': username, 'password': password, 'email': entry['email'], 'serveraddress': registry, } return conf except: pass # If that fails, we assume the configuration file contains a single # authentication token for the public registry in the following format: # # auth = AUTH_TOKEN # email = email@domain.com try: data = [] for line in fileinput.input(config_file): data.append(line.strip().split(' = ')[1]) if len(data) < 2: # Not enough data raise errors.InvalidConfigFile( 'Invalid or empty configuration file!') username, password = decode_auth(data[0]) conf[INDEX_URL] = { 'username': username, 'password': password, 'email': data[1], 'serveraddress': INDEX_URL, } return conf except: pass # If all fails, return an empty config return {}