a81a450e7e
Merged into tinqs/studio: - cmd/tinqs-cli/ — tinqs-cli (Go binary, from bot/cli) - cmd/tea/ — Gitea CLI tool (from tinqs/cli-tea) - services/bot/ — Bot service (from tinqs-ltd/bot on git.arikigame.com) - services/admin/ — Admin panel (from tinqs/admin) - services/team-tool/ — Team Tool (from tinqs/team-tool) - services/proxy/ — tinqs-proxy (from bot/proxy) - web/landing/ — tinqs.com website (from tinqs/website) - web/docs/ — Platform docs (from tinqs/docs) - web/blog/ — Blog (placeholder) - runner/ — Ephemeral CI runner (from tinqs/runner) All source repos will be deleted after verification.
81 lines
2.3 KiB
Go
81 lines
2.3 KiB
Go
// Copyright 2023 The Gitea Authors. All rights reserved.
|
|
// Copyright 2021 The nektos/act Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
//go:build !(WITHOUT_DOCKER || !(linux || darwin || windows || netbsd))
|
|
|
|
package container
|
|
|
|
import (
|
|
"context"
|
|
|
|
"gitea.com/gitea/runner/act/common"
|
|
|
|
"github.com/distribution/reference"
|
|
"github.com/docker/cli/cli/config"
|
|
"github.com/docker/cli/cli/config/credentials"
|
|
"github.com/moby/moby/api/types/registry"
|
|
)
|
|
|
|
func LoadDockerAuthConfig(ctx context.Context, image string) (registry.AuthConfig, error) {
|
|
logger := common.Logger(ctx)
|
|
// config.LoadDefaultConfigFile panics on nil io.Writer when the config
|
|
// file is malformed; use config.Load to route errors through the logger.
|
|
cfg, err := config.Load(config.Dir())
|
|
if err != nil {
|
|
logger.Warnf("Could not load docker config: %v", err)
|
|
return registry.AuthConfig{}, err
|
|
}
|
|
if !cfg.ContainsAuth() {
|
|
cfg.CredentialsStore = credentials.DetectDefaultStore(cfg.CredentialsStore)
|
|
}
|
|
|
|
registryKey := registryAuthConfigKey("docker.io")
|
|
if image != "" {
|
|
if registryRef, refErr := reference.ParseNormalizedNamed(image); refErr != nil {
|
|
logger.Warnf("Could not normalize image reference: %v", refErr)
|
|
} else {
|
|
registryKey = registryAuthConfigKey(reference.Domain(registryRef))
|
|
}
|
|
}
|
|
|
|
authConfig, err := cfg.GetAuthConfig(registryKey)
|
|
if err != nil {
|
|
logger.Warnf("Could not get auth config from docker config: %v", err)
|
|
return registry.AuthConfig{}, err
|
|
}
|
|
|
|
return registry.AuthConfig(authConfig), nil
|
|
}
|
|
|
|
func LoadDockerAuthConfigs(ctx context.Context) map[string]registry.AuthConfig {
|
|
logger := common.Logger(ctx)
|
|
cfg, err := config.Load(config.Dir())
|
|
if err != nil {
|
|
logger.Warnf("Could not load docker config: %v", err)
|
|
return nil
|
|
}
|
|
if !cfg.ContainsAuth() {
|
|
cfg.CredentialsStore = credentials.DetectDefaultStore(cfg.CredentialsStore)
|
|
}
|
|
|
|
creds, err := cfg.GetAllCredentials()
|
|
if err != nil {
|
|
logger.Warnf("Could not get docker auth configs: %v", err)
|
|
return nil
|
|
}
|
|
authConfigs := make(map[string]registry.AuthConfig, len(creds))
|
|
for k, v := range creds {
|
|
authConfigs[k] = registry.AuthConfig(v)
|
|
}
|
|
|
|
return authConfigs
|
|
}
|
|
|
|
func registryAuthConfigKey(domainName string) string {
|
|
if domainName == "docker.io" || domainName == "index.docker.io" {
|
|
return "https://index.docker.io/v1/"
|
|
}
|
|
return domainName
|
|
}
|