Merge pull request #1465 from dmcgowan/token-server-oauth

Integration token server supporting oauth
This commit is contained in:
Richard Scothern 2016-06-13 15:01:06 -07:00 committed by GitHub
commit 70928bcf90
3 changed files with 25 additions and 14 deletions

View File

@ -33,6 +33,7 @@
package auth package auth
import ( import (
"errors"
"fmt" "fmt"
"net/http" "net/http"
@ -49,6 +50,14 @@ const (
UserNameKey = "auth.user.name" UserNameKey = "auth.user.name"
) )
var (
// ErrInvalidCredential is returned when the auth token does not authenticate correctly.
ErrInvalidCredential = errors.New("invalid authorization credential")
// ErrAuthenticationFailure returned when authentication fails.
ErrAuthenticationFailure = errors.New("authentication failure")
)
// UserInfo carries information about // UserInfo carries information about
// an autenticated/authorized client. // an autenticated/authorized client.
type UserInfo struct { type UserInfo struct {
@ -97,6 +106,11 @@ type AccessController interface {
Authorized(ctx context.Context, access ...Access) (context.Context, error) Authorized(ctx context.Context, access ...Access) (context.Context, error)
} }
// CredentialAuthenticator is an object which is able to authenticate credentials
type CredentialAuthenticator interface {
AuthenticateUser(username, password string) error
}
// WithUser returns a context with the authorized user info. // WithUser returns a context with the authorized user info.
func WithUser(ctx context.Context, user UserInfo) context.Context { func WithUser(ctx context.Context, user UserInfo) context.Context {
return userInfoContext{ return userInfoContext{

View File

@ -6,7 +6,6 @@
package htpasswd package htpasswd
import ( import (
"errors"
"fmt" "fmt"
"net/http" "net/http"
"os" "os"
@ -15,14 +14,6 @@ import (
"github.com/docker/distribution/registry/auth" "github.com/docker/distribution/registry/auth"
) )
var (
// ErrInvalidCredential is returned when the auth token does not authenticate correctly.
ErrInvalidCredential = errors.New("invalid authorization credential")
// ErrAuthenticationFailure returned when authentication failure to be presented to agent.
ErrAuthenticationFailure = errors.New("authentication failure")
)
type accessController struct { type accessController struct {
realm string realm string
htpasswd *htpasswd htpasswd *htpasswd
@ -65,21 +56,25 @@ func (ac *accessController) Authorized(ctx context.Context, accessRecords ...aut
if !ok { if !ok {
return nil, &challenge{ return nil, &challenge{
realm: ac.realm, realm: ac.realm,
err: ErrInvalidCredential, err: auth.ErrInvalidCredential,
} }
} }
if err := ac.htpasswd.authenticateUser(username, password); err != nil { if err := ac.AuthenticateUser(username, password); err != nil {
context.GetLogger(ctx).Errorf("error authenticating user %q: %v", username, err) context.GetLogger(ctx).Errorf("error authenticating user %q: %v", username, err)
return nil, &challenge{ return nil, &challenge{
realm: ac.realm, realm: ac.realm,
err: ErrAuthenticationFailure, err: auth.ErrAuthenticationFailure,
} }
} }
return auth.WithUser(ctx, auth.UserInfo{Name: username}), nil return auth.WithUser(ctx, auth.UserInfo{Name: username}), nil
} }
func (ac *accessController) AuthenticateUser(username, password string) error {
return ac.htpasswd.authenticateUser(username, password)
}
// challenge implements the auth.Challenge interface. // challenge implements the auth.Challenge interface.
type challenge struct { type challenge struct {
realm string realm string

View File

@ -6,6 +6,8 @@ import (
"io" "io"
"strings" "strings"
"github.com/docker/distribution/registry/auth"
"golang.org/x/crypto/bcrypt" "golang.org/x/crypto/bcrypt"
) )
@ -33,12 +35,12 @@ func (htpasswd *htpasswd) authenticateUser(username string, password string) err
// timing attack paranoia // timing attack paranoia
bcrypt.CompareHashAndPassword([]byte{}, []byte(password)) bcrypt.CompareHashAndPassword([]byte{}, []byte(password))
return ErrAuthenticationFailure return auth.ErrAuthenticationFailure
} }
err := bcrypt.CompareHashAndPassword([]byte(credentials), []byte(password)) err := bcrypt.CompareHashAndPassword([]byte(credentials), []byte(password))
if err != nil { if err != nil {
return ErrAuthenticationFailure return auth.ErrAuthenticationFailure
} }
return nil return nil