138 lines
3.7 KiB
Go
138 lines
3.7 KiB
Go
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package commands
|
|
|
|
import (
|
|
"bufio"
|
|
gocontext "context"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"strings"
|
|
|
|
"github.com/containerd/console"
|
|
"github.com/containerd/containerd/remotes"
|
|
"github.com/containerd/containerd/remotes/docker"
|
|
"github.com/containerd/containerd/remotes/docker/config"
|
|
"github.com/pkg/errors"
|
|
"github.com/urfave/cli"
|
|
)
|
|
|
|
// PushTracker returns a new InMemoryTracker which tracks the ref status
|
|
var PushTracker = docker.NewInMemoryTracker()
|
|
|
|
func passwordPrompt() (string, error) {
|
|
c := console.Current()
|
|
defer c.Reset()
|
|
|
|
if err := c.DisableEcho(); err != nil {
|
|
return "", errors.Wrap(err, "failed to disable echo")
|
|
}
|
|
|
|
line, _, err := bufio.NewReader(c).ReadLine()
|
|
if err != nil {
|
|
return "", errors.Wrap(err, "failed to read line")
|
|
}
|
|
return string(line), nil
|
|
}
|
|
|
|
// GetResolver prepares the resolver from the environment and options
|
|
func GetResolver(ctx gocontext.Context, clicontext *cli.Context) (remotes.Resolver, error) {
|
|
username := clicontext.String("user")
|
|
var secret string
|
|
if i := strings.IndexByte(username, ':'); i > 0 {
|
|
secret = username[i+1:]
|
|
username = username[0:i]
|
|
}
|
|
options := docker.ResolverOptions{
|
|
Tracker: PushTracker,
|
|
}
|
|
if username != "" {
|
|
if secret == "" {
|
|
fmt.Printf("Password: ")
|
|
|
|
var err error
|
|
secret, err = passwordPrompt()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
fmt.Print("\n")
|
|
}
|
|
} else if rt := clicontext.String("refresh"); rt != "" {
|
|
secret = rt
|
|
}
|
|
|
|
hostOptions := config.HostOptions{}
|
|
hostOptions.Credentials = func(host string) (string, string, error) {
|
|
// If host doesn't match...
|
|
// Only one host
|
|
return username, secret, nil
|
|
}
|
|
if clicontext.Bool("plain-http") {
|
|
hostOptions.DefaultScheme = "http"
|
|
}
|
|
defaultTLS, err := resolverDefaultTLS(clicontext)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
hostOptions.DefaultTLS = defaultTLS
|
|
if hostDir := clicontext.String("hosts-dir"); hostDir != "" {
|
|
hostOptions.HostDir = config.HostDirFromRoot(hostDir)
|
|
}
|
|
|
|
options.Hosts = config.ConfigureHosts(ctx, hostOptions)
|
|
|
|
return docker.NewResolver(options), nil
|
|
}
|
|
|
|
func resolverDefaultTLS(clicontext *cli.Context) (*tls.Config, error) {
|
|
config := &tls.Config{}
|
|
|
|
if clicontext.Bool("skip-verify") {
|
|
config.InsecureSkipVerify = true
|
|
}
|
|
|
|
if tlsRootPath := clicontext.String("tlscacert"); tlsRootPath != "" {
|
|
tlsRootData, err := ioutil.ReadFile(tlsRootPath)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "failed to read %q", tlsRootPath)
|
|
}
|
|
|
|
config.RootCAs = x509.NewCertPool()
|
|
if !config.RootCAs.AppendCertsFromPEM(tlsRootData) {
|
|
return nil, fmt.Errorf("failed to load TLS CAs from %q: invalid data", tlsRootPath)
|
|
}
|
|
}
|
|
|
|
tlsCertPath := clicontext.String("tlscert")
|
|
tlsKeyPath := clicontext.String("tlskey")
|
|
if tlsCertPath != "" || tlsKeyPath != "" {
|
|
if tlsCertPath == "" || tlsKeyPath == "" {
|
|
return nil, errors.New("flags --tlscert and --tlskey must be set together")
|
|
}
|
|
keyPair, err := tls.LoadX509KeyPair(tlsCertPath, tlsKeyPath)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "failed to load TLS client credentials (cert=%q, key=%q)", tlsCertPath, tlsKeyPath)
|
|
}
|
|
config.Certificates = []tls.Certificate{keyPair}
|
|
}
|
|
|
|
return config, nil
|
|
}
|