2019-03-06 09:01:12 -05:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
|
|
|
|
"github.com/docker/cli/cli/config/configfile"
|
|
|
|
"github.com/docker/cli/cli/context/docker"
|
|
|
|
"github.com/docker/cli/cli/context/kubernetes"
|
|
|
|
"github.com/docker/cli/cli/context/store"
|
|
|
|
cliflags "github.com/docker/cli/cli/flags"
|
|
|
|
"github.com/docker/docker/pkg/homedir"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
// DefaultContextName is the name reserved for the default context (config & env based)
|
|
|
|
DefaultContextName = "default"
|
|
|
|
)
|
|
|
|
|
|
|
|
// DefaultContext contains the default context data for all enpoints
|
|
|
|
type DefaultContext struct {
|
2019-04-18 09:12:30 -04:00
|
|
|
Meta store.Metadata
|
2019-03-06 09:01:12 -05:00
|
|
|
TLS store.ContextTLSData
|
|
|
|
}
|
|
|
|
|
|
|
|
// DefaultContextResolver is a function which resolves the default context base on the configuration and the env variables
|
|
|
|
type DefaultContextResolver func() (*DefaultContext, error)
|
|
|
|
|
|
|
|
// ContextStoreWithDefault implements the store.Store interface with a support for the default context
|
|
|
|
type ContextStoreWithDefault struct {
|
|
|
|
store.Store
|
|
|
|
Resolver DefaultContextResolver
|
|
|
|
}
|
|
|
|
|
2019-04-18 09:12:30 -04:00
|
|
|
// resolveDefaultContext creates a Metadata for the current CLI invocation parameters
|
2019-03-06 09:01:12 -05:00
|
|
|
func resolveDefaultContext(opts *cliflags.CommonOptions, config *configfile.ConfigFile, stderr io.Writer) (*DefaultContext, error) {
|
|
|
|
stackOrchestrator, err := GetStackOrchestrator("", "", config.StackOrchestrator, stderr)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
contextTLSData := store.ContextTLSData{
|
|
|
|
Endpoints: make(map[string]store.EndpointTLSData),
|
|
|
|
}
|
2019-04-18 09:12:30 -04:00
|
|
|
contextMetadata := store.Metadata{
|
2019-03-06 09:01:12 -05:00
|
|
|
Endpoints: make(map[string]interface{}),
|
|
|
|
Metadata: DockerContext{
|
|
|
|
Description: "",
|
|
|
|
StackOrchestrator: stackOrchestrator,
|
|
|
|
},
|
|
|
|
Name: DefaultContextName,
|
|
|
|
}
|
|
|
|
|
|
|
|
dockerEP, err := resolveDefaultDockerEndpoint(opts)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
contextMetadata.Endpoints[docker.DockerEndpoint] = dockerEP.EndpointMeta
|
|
|
|
if dockerEP.TLSData != nil {
|
|
|
|
contextTLSData.Endpoints[docker.DockerEndpoint] = *dockerEP.TLSData.ToStoreTLSData()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Default context uses env-based kubeconfig for Kubernetes endpoint configuration
|
|
|
|
kubeconfig := os.Getenv("KUBECONFIG")
|
|
|
|
if kubeconfig == "" {
|
|
|
|
kubeconfig = filepath.Join(homedir.Get(), ".kube/config")
|
|
|
|
}
|
|
|
|
kubeEP, err := kubernetes.FromKubeConfig(kubeconfig, "", "")
|
|
|
|
if (stackOrchestrator == OrchestratorKubernetes || stackOrchestrator == OrchestratorAll) && err != nil {
|
|
|
|
return nil, errors.Wrapf(err, "default orchestrator is %s but kubernetes endpoint could not be found", stackOrchestrator)
|
|
|
|
}
|
|
|
|
if err == nil {
|
|
|
|
contextMetadata.Endpoints[kubernetes.KubernetesEndpoint] = kubeEP.EndpointMeta
|
|
|
|
if kubeEP.TLSData != nil {
|
|
|
|
contextTLSData.Endpoints[kubernetes.KubernetesEndpoint] = *kubeEP.TLSData.ToStoreTLSData()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return &DefaultContext{Meta: contextMetadata, TLS: contextTLSData}, nil
|
|
|
|
}
|
|
|
|
|
2019-04-18 09:12:30 -04:00
|
|
|
// List implements store.Store's List
|
|
|
|
func (s *ContextStoreWithDefault) List() ([]store.Metadata, error) {
|
|
|
|
contextList, err := s.Store.List()
|
2019-03-06 09:01:12 -05:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defaultContext, err := s.Resolver()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return append(contextList, defaultContext.Meta), nil
|
|
|
|
}
|
|
|
|
|
2019-04-18 09:12:30 -04:00
|
|
|
// CreateOrUpdate is not allowed for the default context and fails
|
|
|
|
func (s *ContextStoreWithDefault) CreateOrUpdate(meta store.Metadata) error {
|
2019-03-06 09:01:12 -05:00
|
|
|
if meta.Name == DefaultContextName {
|
|
|
|
return errors.New("default context cannot be created nor updated")
|
|
|
|
}
|
2019-04-18 09:12:30 -04:00
|
|
|
return s.Store.CreateOrUpdate(meta)
|
2019-03-06 09:01:12 -05:00
|
|
|
}
|
|
|
|
|
2019-04-18 09:12:30 -04:00
|
|
|
// Remove is not allowed for the default context and fails
|
|
|
|
func (s *ContextStoreWithDefault) Remove(name string) error {
|
2019-03-06 09:01:12 -05:00
|
|
|
if name == DefaultContextName {
|
|
|
|
return errors.New("default context cannot be removed")
|
|
|
|
}
|
2019-04-18 09:12:30 -04:00
|
|
|
return s.Store.Remove(name)
|
2019-03-06 09:01:12 -05:00
|
|
|
}
|
|
|
|
|
2019-04-18 09:12:30 -04:00
|
|
|
// GetMetadata implements store.Store's GetMetadata
|
|
|
|
func (s *ContextStoreWithDefault) GetMetadata(name string) (store.Metadata, error) {
|
2019-03-06 09:01:12 -05:00
|
|
|
if name == DefaultContextName {
|
|
|
|
defaultContext, err := s.Resolver()
|
|
|
|
if err != nil {
|
2019-04-18 09:12:30 -04:00
|
|
|
return store.Metadata{}, err
|
2019-03-06 09:01:12 -05:00
|
|
|
}
|
|
|
|
return defaultContext.Meta, nil
|
|
|
|
}
|
2019-04-18 09:12:30 -04:00
|
|
|
return s.Store.GetMetadata(name)
|
2019-03-06 09:01:12 -05:00
|
|
|
}
|
|
|
|
|
2019-04-18 09:12:30 -04:00
|
|
|
// ResetTLSMaterial is not implemented for default context and fails
|
|
|
|
func (s *ContextStoreWithDefault) ResetTLSMaterial(name string, data *store.ContextTLSData) error {
|
2019-03-06 09:01:12 -05:00
|
|
|
if name == DefaultContextName {
|
2019-04-18 09:12:30 -04:00
|
|
|
return errors.New("The default context store does not support ResetTLSMaterial")
|
2019-03-06 09:01:12 -05:00
|
|
|
}
|
2019-04-18 09:12:30 -04:00
|
|
|
return s.Store.ResetTLSMaterial(name, data)
|
2019-03-06 09:01:12 -05:00
|
|
|
}
|
|
|
|
|
2019-04-18 09:12:30 -04:00
|
|
|
// ResetEndpointTLSMaterial is not implemented for default context and fails
|
|
|
|
func (s *ContextStoreWithDefault) ResetEndpointTLSMaterial(contextName string, endpointName string, data *store.EndpointTLSData) error {
|
2019-03-06 09:01:12 -05:00
|
|
|
if contextName == DefaultContextName {
|
2019-04-18 09:12:30 -04:00
|
|
|
return errors.New("The default context store does not support ResetEndpointTLSMaterial")
|
2019-03-06 09:01:12 -05:00
|
|
|
}
|
2019-04-18 09:12:30 -04:00
|
|
|
return s.Store.ResetEndpointTLSMaterial(contextName, endpointName, data)
|
2019-03-06 09:01:12 -05:00
|
|
|
}
|
|
|
|
|
2019-04-18 09:12:30 -04:00
|
|
|
// ListTLSFiles implements store.Store's ListTLSFiles
|
|
|
|
func (s *ContextStoreWithDefault) ListTLSFiles(name string) (map[string]store.EndpointFiles, error) {
|
2019-03-06 09:01:12 -05:00
|
|
|
if name == DefaultContextName {
|
|
|
|
defaultContext, err := s.Resolver()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
tlsfiles := make(map[string]store.EndpointFiles)
|
|
|
|
for epName, epTLSData := range defaultContext.TLS.Endpoints {
|
|
|
|
var files store.EndpointFiles
|
|
|
|
for filename := range epTLSData.Files {
|
|
|
|
files = append(files, filename)
|
|
|
|
}
|
|
|
|
tlsfiles[epName] = files
|
|
|
|
}
|
|
|
|
return tlsfiles, nil
|
|
|
|
}
|
2019-04-18 09:12:30 -04:00
|
|
|
return s.Store.ListTLSFiles(name)
|
2019-03-06 09:01:12 -05:00
|
|
|
}
|
|
|
|
|
2019-04-18 09:12:30 -04:00
|
|
|
// GetTLSData implements store.Store's GetTLSData
|
|
|
|
func (s *ContextStoreWithDefault) GetTLSData(contextName, endpointName, fileName string) ([]byte, error) {
|
2019-03-06 09:01:12 -05:00
|
|
|
if contextName == DefaultContextName {
|
|
|
|
defaultContext, err := s.Resolver()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if defaultContext.TLS.Endpoints[endpointName].Files[fileName] == nil {
|
|
|
|
return nil, &noDefaultTLSDataError{endpointName: endpointName, fileName: fileName}
|
|
|
|
}
|
|
|
|
return defaultContext.TLS.Endpoints[endpointName].Files[fileName], nil
|
|
|
|
|
|
|
|
}
|
2019-04-18 09:12:30 -04:00
|
|
|
return s.Store.GetTLSData(contextName, endpointName, fileName)
|
2019-03-06 09:01:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
type noDefaultTLSDataError struct {
|
|
|
|
endpointName string
|
|
|
|
fileName string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *noDefaultTLSDataError) Error() string {
|
|
|
|
return fmt.Sprintf("tls data for %s/%s/%s does not exist", DefaultContextName, e.endpointName, e.fileName)
|
|
|
|
}
|
|
|
|
|
|
|
|
// NotFound satisfies interface github.com/docker/docker/errdefs.ErrNotFound
|
|
|
|
func (e *noDefaultTLSDataError) NotFound() {}
|
|
|
|
|
|
|
|
// IsTLSDataDoesNotExist satisfies github.com/docker/cli/cli/context/store.tlsDataDoesNotExist
|
|
|
|
func (e *noDefaultTLSDataError) IsTLSDataDoesNotExist() {}
|
|
|
|
|
2019-04-18 09:12:30 -04:00
|
|
|
// GetStorageInfo implements store.Store's GetStorageInfo
|
|
|
|
func (s *ContextStoreWithDefault) GetStorageInfo(contextName string) store.StorageInfo {
|
2019-03-06 09:01:12 -05:00
|
|
|
if contextName == DefaultContextName {
|
2019-04-18 09:12:30 -04:00
|
|
|
return store.StorageInfo{MetadataPath: "<IN MEMORY>", TLSPath: "<IN MEMORY>"}
|
2019-03-06 09:01:12 -05:00
|
|
|
}
|
2019-04-18 09:12:30 -04:00
|
|
|
return s.Store.GetStorageInfo(contextName)
|
2019-03-06 09:01:12 -05:00
|
|
|
}
|