2014-12-18 20:30:19 +00:00
|
|
|
// Package silly provides a simple authentication scheme that checks for the
|
|
|
|
// existence of an Authorization header and issues access if is present and
|
|
|
|
// non-empty.
|
|
|
|
//
|
|
|
|
// This package is present as an example implementation of a minimal
|
|
|
|
// auth.AccessController and for testing. This is not suitable for any kind of
|
|
|
|
// production security.
|
|
|
|
package silly
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
|
2014-12-24 00:01:38 +00:00
|
|
|
"github.com/docker/distribution/auth"
|
2015-02-04 01:59:24 +00:00
|
|
|
"golang.org/x/net/context"
|
2014-12-18 20:30:19 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// accessController provides a simple implementation of auth.AccessController
|
|
|
|
// that simply checks for a non-empty Authorization header. It is useful for
|
|
|
|
// demonstration and testing.
|
|
|
|
type accessController struct {
|
|
|
|
realm string
|
|
|
|
service string
|
|
|
|
}
|
|
|
|
|
|
|
|
var _ auth.AccessController = &accessController{}
|
|
|
|
|
|
|
|
func newAccessController(options map[string]interface{}) (auth.AccessController, error) {
|
|
|
|
realm, present := options["realm"]
|
|
|
|
if _, ok := realm.(string); !present || !ok {
|
|
|
|
return nil, fmt.Errorf(`"realm" must be set for silly access controller`)
|
|
|
|
}
|
|
|
|
|
|
|
|
service, present := options["service"]
|
|
|
|
if _, ok := service.(string); !present || !ok {
|
|
|
|
return nil, fmt.Errorf(`"service" must be set for silly access controller`)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &accessController{realm: realm.(string), service: service.(string)}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Authorized simply checks for the existence of the authorization header,
|
|
|
|
// responding with a bearer challenge if it doesn't exist.
|
2015-02-04 01:59:24 +00:00
|
|
|
func (ac *accessController) Authorized(ctx context.Context, accessRecords ...auth.Access) (context.Context, error) {
|
|
|
|
req, err := auth.RequestFromContext(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2014-12-18 20:30:19 +00:00
|
|
|
if req.Header.Get("Authorization") == "" {
|
|
|
|
challenge := challenge{
|
|
|
|
realm: ac.realm,
|
|
|
|
service: ac.service,
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(accessRecords) > 0 {
|
|
|
|
var scopes []string
|
|
|
|
for _, access := range accessRecords {
|
2014-12-19 01:20:35 +00:00
|
|
|
scopes = append(scopes, fmt.Sprintf("%s:%s:%s", access.Type, access.Resource.Name, access.Action))
|
2014-12-18 20:30:19 +00:00
|
|
|
}
|
|
|
|
challenge.scope = strings.Join(scopes, " ")
|
|
|
|
}
|
|
|
|
|
2015-02-04 01:59:24 +00:00
|
|
|
return nil, &challenge
|
2014-12-18 20:30:19 +00:00
|
|
|
}
|
|
|
|
|
2015-02-04 01:59:24 +00:00
|
|
|
return context.WithValue(ctx, "auth.user", auth.UserInfo{Name: "silly"}), nil
|
2014-12-18 20:30:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type challenge struct {
|
|
|
|
realm string
|
|
|
|
service string
|
|
|
|
scope string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ch *challenge) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
|
|
header := fmt.Sprintf("Bearer realm=%q,service=%q", ch.realm, ch.service)
|
|
|
|
|
|
|
|
if ch.scope != "" {
|
|
|
|
header = fmt.Sprintf("%s,scope=%q", header, ch.scope)
|
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Authorization", header)
|
|
|
|
w.WriteHeader(http.StatusUnauthorized)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ch *challenge) Error() string {
|
|
|
|
return fmt.Sprintf("silly authentication challenge: %#v", ch)
|
|
|
|
}
|
|
|
|
|
|
|
|
// init registers the silly auth backend.
|
|
|
|
func init() {
|
|
|
|
auth.Register("silly", auth.InitFunc(newAccessController))
|
|
|
|
}
|