mirror of https://github.com/docker/docs.git
185 lines
5.2 KiB
Go
185 lines
5.2 KiB
Go
package client
|
|
|
|
import (
|
|
"bufio"
|
|
"fmt"
|
|
"io"
|
|
"os"
|
|
"runtime"
|
|
"strings"
|
|
|
|
Cli "github.com/docker/docker/cli"
|
|
"github.com/docker/docker/cliconfig"
|
|
"github.com/docker/docker/cliconfig/credentials"
|
|
flag "github.com/docker/docker/pkg/mflag"
|
|
"github.com/docker/docker/pkg/term"
|
|
"github.com/docker/engine-api/client"
|
|
"github.com/docker/engine-api/types"
|
|
)
|
|
|
|
// CmdLogin logs in or registers a user to a Docker registry service.
|
|
//
|
|
// If no server is specified, the user will be logged into or registered to the registry's index server.
|
|
//
|
|
// Usage: docker login SERVER
|
|
func (cli *DockerCli) CmdLogin(args ...string) error {
|
|
cmd := Cli.Subcmd("login", []string{"[SERVER]"}, Cli.DockerCommands["login"].Description+".\nIf no server is specified, the default is defined by the daemon.", true)
|
|
cmd.Require(flag.Max, 1)
|
|
|
|
flUser := cmd.String([]string{"u", "-username"}, "", "Username")
|
|
flPassword := cmd.String([]string{"p", "-password"}, "", "Password")
|
|
flEmail := cmd.String([]string{"e", "-email"}, "", "Email")
|
|
|
|
cmd.ParseFlags(args, true)
|
|
|
|
// On Windows, force the use of the regular OS stdin stream. Fixes #14336/#14210
|
|
if runtime.GOOS == "windows" {
|
|
cli.in = os.Stdin
|
|
}
|
|
|
|
var serverAddress string
|
|
if len(cmd.Args()) > 0 {
|
|
serverAddress = cmd.Arg(0)
|
|
} else {
|
|
serverAddress = cli.electAuthServer()
|
|
}
|
|
|
|
authConfig, err := cli.configureAuth(*flUser, *flPassword, *flEmail, serverAddress)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
response, err := cli.client.RegistryLogin(authConfig)
|
|
if err != nil {
|
|
if client.IsErrUnauthorized(err) {
|
|
if err2 := eraseCredentials(cli.configFile, authConfig.ServerAddress); err2 != nil {
|
|
fmt.Fprintf(cli.out, "WARNING: could not save credentials: %v\n", err2)
|
|
}
|
|
}
|
|
return err
|
|
}
|
|
|
|
if err := storeCredentials(cli.configFile, authConfig); err != nil {
|
|
return fmt.Errorf("Error saving credentials: %v", err)
|
|
}
|
|
|
|
if response.Status != "" {
|
|
fmt.Fprintf(cli.out, "%s\n", response.Status)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (cli *DockerCli) promptWithDefault(prompt string, configDefault string) {
|
|
if configDefault == "" {
|
|
fmt.Fprintf(cli.out, "%s: ", prompt)
|
|
} else {
|
|
fmt.Fprintf(cli.out, "%s (%s): ", prompt, configDefault)
|
|
}
|
|
}
|
|
|
|
func (cli *DockerCli) configureAuth(flUser, flPassword, flEmail, serverAddress string) (types.AuthConfig, error) {
|
|
authconfig, err := getCredentials(cli.configFile, serverAddress)
|
|
if err != nil {
|
|
return authconfig, err
|
|
}
|
|
|
|
authconfig.Username = strings.TrimSpace(authconfig.Username)
|
|
|
|
if flUser = strings.TrimSpace(flUser); flUser == "" {
|
|
cli.promptWithDefault("Username", authconfig.Username)
|
|
flUser = readInput(cli.in, cli.out)
|
|
flUser = strings.TrimSpace(flUser)
|
|
if flUser == "" {
|
|
flUser = authconfig.Username
|
|
}
|
|
}
|
|
|
|
if flUser == "" {
|
|
return authconfig, fmt.Errorf("Error: Non-null Username Required")
|
|
}
|
|
|
|
if flPassword == "" {
|
|
oldState, err := term.SaveState(cli.inFd)
|
|
if err != nil {
|
|
return authconfig, err
|
|
}
|
|
fmt.Fprintf(cli.out, "Password: ")
|
|
term.DisableEcho(cli.inFd, oldState)
|
|
|
|
flPassword = readInput(cli.in, cli.out)
|
|
fmt.Fprint(cli.out, "\n")
|
|
|
|
term.RestoreTerminal(cli.inFd, oldState)
|
|
if flPassword == "" {
|
|
return authconfig, fmt.Errorf("Error: Password Required")
|
|
}
|
|
}
|
|
|
|
// Assume that a different username means they may not want to use
|
|
// the email from the config file, so prompt it
|
|
if flUser != authconfig.Username {
|
|
if flEmail == "" {
|
|
cli.promptWithDefault("Email", authconfig.Email)
|
|
flEmail = readInput(cli.in, cli.out)
|
|
if flEmail == "" {
|
|
flEmail = authconfig.Email
|
|
}
|
|
}
|
|
} else {
|
|
// However, if they don't override the username use the
|
|
// email from the cmd line if specified. IOW, allow
|
|
// then to change/override them. And if not specified, just
|
|
// use what's in the config file
|
|
if flEmail == "" {
|
|
flEmail = authconfig.Email
|
|
}
|
|
}
|
|
|
|
authconfig.Username = flUser
|
|
authconfig.Password = flPassword
|
|
authconfig.Email = flEmail
|
|
authconfig.ServerAddress = serverAddress
|
|
|
|
return authconfig, nil
|
|
}
|
|
|
|
func readInput(in io.Reader, out io.Writer) string {
|
|
reader := bufio.NewReader(in)
|
|
line, _, err := reader.ReadLine()
|
|
if err != nil {
|
|
fmt.Fprintln(out, err.Error())
|
|
os.Exit(1)
|
|
}
|
|
return string(line)
|
|
}
|
|
|
|
// getCredentials loads the user credentials from a credentials store.
|
|
// The store is determined by the config file settings.
|
|
func getCredentials(c *cliconfig.ConfigFile, serverAddress string) (types.AuthConfig, error) {
|
|
s := loadCredentialsStore(c)
|
|
return s.Get(serverAddress)
|
|
}
|
|
|
|
// storeCredentials saves the user credentials in a credentials store.
|
|
// The store is determined by the config file settings.
|
|
func storeCredentials(c *cliconfig.ConfigFile, auth types.AuthConfig) error {
|
|
s := loadCredentialsStore(c)
|
|
return s.Store(auth)
|
|
}
|
|
|
|
// eraseCredentials removes the user credentials from a credentials store.
|
|
// The store is determined by the config file settings.
|
|
func eraseCredentials(c *cliconfig.ConfigFile, serverAddress string) error {
|
|
s := loadCredentialsStore(c)
|
|
return s.Erase(serverAddress)
|
|
}
|
|
|
|
// loadCredentialsStore initializes a new credentials store based
|
|
// in the settings provided in the configuration file.
|
|
func loadCredentialsStore(c *cliconfig.ConfigFile) credentials.Store {
|
|
if c.CredentialsStore != "" {
|
|
return credentials.NewNativeStore(c)
|
|
}
|
|
return credentials.NewFileStore(c)
|
|
}
|