mirror of
				https://github.com/containers/podman.git
				synced 2025-11-04 08:56:05 +08:00 
			
		
		
		
	This commit removes error message string from utils.Error in pkg/api. Param was not used inside a function for quite a long time [NO NEW TESTS NEEDED] Signed-off-by: Jakub Guzik <jguzik@redhat.com>
		
			
				
	
	
		
			69 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			69 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package compat
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
	"net/http"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	DockerClient "github.com/containers/image/v5/docker"
 | 
						|
	"github.com/containers/image/v5/types"
 | 
						|
	"github.com/containers/podman/v4/libpod"
 | 
						|
	"github.com/containers/podman/v4/pkg/api/handlers/utils"
 | 
						|
	api "github.com/containers/podman/v4/pkg/api/types"
 | 
						|
	"github.com/containers/podman/v4/pkg/domain/entities"
 | 
						|
	docker "github.com/docker/docker/api/types"
 | 
						|
	"github.com/pkg/errors"
 | 
						|
)
 | 
						|
 | 
						|
func stripAddressOfScheme(address string) string {
 | 
						|
	for _, s := range []string{"https", "http"} {
 | 
						|
		address = strings.TrimPrefix(address, s+"://")
 | 
						|
	}
 | 
						|
	return address
 | 
						|
}
 | 
						|
 | 
						|
func Auth(w http.ResponseWriter, r *http.Request) {
 | 
						|
	var authConfig docker.AuthConfig
 | 
						|
	err := json.NewDecoder(r.Body).Decode(&authConfig)
 | 
						|
	if err != nil {
 | 
						|
		utils.Error(w, http.StatusInternalServerError, errors.Wrapf(err, "failed to parse request"))
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	skipTLS := types.NewOptionalBool(false)
 | 
						|
	if strings.HasPrefix(authConfig.ServerAddress, "https://localhost/") || strings.HasPrefix(authConfig.ServerAddress, "https://localhost:") || strings.HasPrefix(authConfig.ServerAddress, "localhost:") {
 | 
						|
		// support for local testing
 | 
						|
		skipTLS = types.NewOptionalBool(true)
 | 
						|
	}
 | 
						|
 | 
						|
	runtime := r.Context().Value(api.RuntimeKey).(*libpod.Runtime)
 | 
						|
	sysCtx := runtime.SystemContext()
 | 
						|
	sysCtx.DockerInsecureSkipTLSVerify = skipTLS
 | 
						|
 | 
						|
	fmt.Println("Authenticating with existing credentials...")
 | 
						|
	registry := stripAddressOfScheme(authConfig.ServerAddress)
 | 
						|
	if err := DockerClient.CheckAuth(context.Background(), sysCtx, authConfig.Username, authConfig.Password, registry); err == nil {
 | 
						|
		utils.WriteResponse(w, http.StatusOK, entities.AuthReport{
 | 
						|
			IdentityToken: "",
 | 
						|
			Status:        "Login Succeeded",
 | 
						|
		})
 | 
						|
	} else {
 | 
						|
		var msg string
 | 
						|
 | 
						|
		var unauthErr DockerClient.ErrUnauthorizedForCredentials
 | 
						|
		if errors.As(err, &unauthErr) {
 | 
						|
			msg = "401 Unauthorized"
 | 
						|
		} else {
 | 
						|
			msg = err.Error()
 | 
						|
		}
 | 
						|
 | 
						|
		utils.WriteResponse(w, http.StatusInternalServerError, struct {
 | 
						|
			Message string `json:"message"`
 | 
						|
		}{
 | 
						|
			Message: "login attempt to " + authConfig.ServerAddress + " failed with status: " + msg,
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 |