summaryrefslogtreecommitdiff
path: root/src/conf_mode
diff options
context:
space:
mode:
authorZen3515 <7106408+Zen3515@users.noreply.github.com>2023-01-30 15:58:11 +0700
committerZen3515 <7106408+Zen3515@users.noreply.github.com>2023-01-30 16:03:15 +0700
commitb17251334c57c2f6875c19ad4e6c6127aa9e1811 (patch)
tree2937cf711f3641da2d0c174bda72a83ab9b102a1 /src/conf_mode
parent3c750f9b12b54d872848f6571deb02245ba8e28a (diff)
downloadvyos-1x-b17251334c57c2f6875c19ad4e6c6127aa9e1811.tar.gz
vyos-1x-b17251334c57c2f6875c19ad4e6c6127aa9e1811.zip
container: T4959: Add container registry authentication config for containers
Diffstat (limited to 'src/conf_mode')
-rwxr-xr-xsrc/conf_mode/container.py27
1 files changed, 26 insertions, 1 deletions
diff --git a/src/conf_mode/container.py b/src/conf_mode/container.py
index 08861053d..8d2e1afec 100755
--- a/src/conf_mode/container.py
+++ b/src/conf_mode/container.py
@@ -18,8 +18,8 @@ import os
from ipaddress import ip_address
from ipaddress import ip_network
-from time import sleep
from json import dumps as json_write
+from json import dump as json_write_file
from vyos.base import Warning
from vyos.config import Config
@@ -28,6 +28,7 @@ from vyos.configdict import node_changed
from vyos.util import call
from vyos.util import cmd
from vyos.util import run
+from vyos.util import rc_cmd
from vyos.util import write_file
from vyos.template import inc_ip
from vyos.template import is_ipv4
@@ -40,6 +41,7 @@ airbag.enable()
config_containers_registry = '/etc/containers/registries.conf'
config_containers_storage = '/etc/containers/storage.conf'
+config_containers_auth = '/etc/containers/auth.json'
systemd_unit_path = '/run/systemd/system'
def _cmd(command):
@@ -218,6 +220,10 @@ def verify(container):
if v6_prefix > 1:
raise ConfigError(f'Only one IPv6 prefix can be defined for network "{network}"!')
+ if 'registry' in container:
+ for registry, registry_config in container['registry'].items():
+ if ('username' in registry_config) != ('password' in registry_config):
+ raise ConfigError(f'Must either not defined username and password, or defined both for registry {registry}')
# A network attached to a container can not be deleted
if {'network_remove', 'name'} <= set(container):
@@ -300,6 +306,12 @@ def generate(container):
os.unlink(config_containers_storage)
return None
+ # no matter we configure container registry or not, auth file is needed
+ if os.path.exists(config_containers_auth):
+ os.unlink(config_containers_auth)
+ with open(config_containers_auth, "w") as f:
+ json_write_file({}, f)
+
if 'network' in container:
for network, network_config in container['network'].items():
tmp = {
@@ -331,6 +343,19 @@ def generate(container):
write_file(f'/etc/cni/net.d/{network}.conflist', json_write(tmp, indent=2))
+ if 'registry' in container:
+ for registry, registry_config in container['registry'].items():
+ if 'disable' in registry_config:
+ continue
+
+ if 'username' in registry_config and 'password' in registry_config:
+ login_username = registry_config['username']
+ login_password = registry_config['password']
+ cmd = f'podman login --authfile {config_containers_auth} --username {login_username} --password {login_password} {registry}'
+ rc, out = rc_cmd(cmd)
+ if rc != 0:
+ raise ConfigError(out)
+
render(config_containers_registry, 'container/registries.conf.j2', container)
render(config_containers_storage, 'container/storage.conf.j2', container)