pipeline/pkg/credentials/dockercreds/creds.go
Eli Zucker 9f318209cd Change copyright authors from Knative to Tekton.
Also changed the copyright years to 2019.
2019-06-26 18:39:14 -05:00

217 lines
5.4 KiB
Go

/*
Copyright 2019 The Tekton Authors
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package dockercreds
import (
"encoding/base64"
"encoding/json"
"flag"
"fmt"
"io/ioutil"
"os"
"path/filepath"
"strings"
"golang.org/x/xerrors"
corev1 "k8s.io/api/core/v1"
"github.com/tektoncd/pipeline/pkg/credentials"
)
const annotationPrefix = "tekton.dev/docker-"
var config basicDocker
var dockerConfig string
var dockerCfg string
func flags(fs *flag.FlagSet) {
config = basicDocker{make(map[string]entry)}
fs.Var(&config, "basic-docker", "List of secret=url pairs.")
fs.StringVar(&dockerConfig, "docker-config", "", "Docker config.json secret file.")
fs.StringVar(&dockerCfg, "docker-cfg", "", "Docker .dockercfg secret file.")
}
func init() {
flags(flag.CommandLine)
}
// As the flag is read, this status is populated.
// basicDocker implements flag.Value
type basicDocker struct {
Entries map[string]entry `json:"auths"`
}
func (dc *basicDocker) String() string {
if dc == nil {
// According to flag.Value this can happen.
return ""
}
var urls []string
for k, v := range dc.Entries {
urls = append(urls, fmt.Sprintf("%s=%s", v.Secret, k))
}
return strings.Join(urls, ",")
}
func (dc *basicDocker) Set(value string) error {
parts := strings.Split(value, "=")
if len(parts) != 2 {
return xerrors.Errorf("Expect entries of the form secret=url, got: %v", value)
}
secret := parts[0]
url := parts[1]
if _, ok := dc.Entries[url]; ok {
return xerrors.Errorf("Multiple entries for url: %v", url)
}
e, err := newEntry(secret)
if err != nil {
return err
}
dc.Entries[url] = *e
return nil
}
type configFile struct {
Auth map[string]entry `json:"auths"`
}
type entry struct {
Secret string `json:"-"`
Username string `json:"username,omitempty"`
Password string `json:"password,omitempty"`
Auth string `json:"auth"`
Email string `json:"email,omitempty"`
}
func newEntry(secret string) (*entry, error) {
secretPath := credentials.VolumeName(secret)
ub, err := ioutil.ReadFile(filepath.Join(secretPath, corev1.BasicAuthUsernameKey))
if err != nil {
return nil, err
}
username := string(ub)
pb, err := ioutil.ReadFile(filepath.Join(secretPath, corev1.BasicAuthPasswordKey))
if err != nil {
return nil, err
}
password := string(pb)
return &entry{
Secret: secret,
Username: username,
Password: password,
Auth: base64.StdEncoding.EncodeToString([]byte(fmt.Sprintf("%s:%s", username, password))),
Email: "not@val.id",
}, nil
}
type basicDockerBuilder struct{}
// NewBuilder returns a new builder for Docker credentials.
func NewBuilder() credentials.Builder { return &basicDockerBuilder{} }
// MatchingAnnotations extracts flags for the credential helper
// from the supplied secret and returns a slice (of length 0 or
// greater) of applicable domains.
func (*basicDockerBuilder) MatchingAnnotations(secret *corev1.Secret) []string {
var flags []string
switch secret.Type {
case corev1.SecretTypeBasicAuth:
for _, v := range credentials.SortAnnotations(secret.Annotations, annotationPrefix) {
flags = append(flags, fmt.Sprintf("-basic-docker=%s=%s", secret.Name, v))
}
case corev1.SecretTypeDockerConfigJson:
flags = append(flags, fmt.Sprintf("-docker-config=%s", secret.Name))
case corev1.SecretTypeDockercfg:
flags = append(flags, fmt.Sprintf("-docker-cfg=%s", secret.Name))
default:
return flags
}
return flags
}
func (*basicDockerBuilder) Write() error {
dockerDir := filepath.Join(os.Getenv("HOME"), ".docker")
basicDocker := filepath.Join(dockerDir, "config.json")
if err := os.MkdirAll(dockerDir, os.ModePerm); err != nil {
return err
}
cf := configFile{Auth: config.Entries}
auth := map[string]entry{}
if dockerCfg != "" {
dockerConfigAuthMap, err := authsFromDockerCfg(dockerCfg)
if err != nil {
return err
}
for k, v := range dockerConfigAuthMap {
auth[k] = v
}
}
if dockerConfig != "" {
dockerConfigAuthMap, err := authsFromDockerConfig(dockerConfig)
if err != nil {
return err
}
for k, v := range dockerConfigAuthMap {
auth[k] = v
}
}
for k, v := range config.Entries {
auth[k] = v
}
cf.Auth = auth
content, err := json.Marshal(cf)
if err != nil {
return err
}
return ioutil.WriteFile(basicDocker, content, 0600)
}
func authsFromDockerCfg(secret string) (map[string]entry, error) {
secretPath := credentials.VolumeName(secret)
m := make(map[string]entry)
data, err := ioutil.ReadFile(filepath.Join(secretPath, corev1.DockerConfigKey))
if err != nil {
return m, err
}
err = json.Unmarshal(data, &m)
return m, err
}
func authsFromDockerConfig(secret string) (map[string]entry, error) {
secretPath := credentials.VolumeName(secret)
m := make(map[string]entry)
c := configFile{}
data, err := ioutil.ReadFile(filepath.Join(secretPath, corev1.DockerConfigJsonKey))
if err != nil {
return m, err
}
if err := json.Unmarshal(data, &c); err != nil {
return m, err
}
for k, v := range c.Auth {
m[k] = v
}
return m, nil
}