mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			132 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			132 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2015 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package kubectl
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
 | 
						|
	"k8s.io/kubernetes/pkg/api"
 | 
						|
	"k8s.io/kubernetes/pkg/credentialprovider"
 | 
						|
	"k8s.io/kubernetes/pkg/runtime"
 | 
						|
)
 | 
						|
 | 
						|
// SecretForDockerRegistryGeneratorV1 supports stable generation of a docker registry secret
 | 
						|
type SecretForDockerRegistryGeneratorV1 struct {
 | 
						|
	// Name of secret (required)
 | 
						|
	Name string
 | 
						|
	// Username for registry (required)
 | 
						|
	Username string
 | 
						|
	// Email for registry (required)
 | 
						|
	Email string
 | 
						|
	// Password for registry (required)
 | 
						|
	Password string
 | 
						|
	// Server for registry (required)
 | 
						|
	Server string
 | 
						|
}
 | 
						|
 | 
						|
// Ensure it supports the generator pattern that uses parameter injection
 | 
						|
var _ Generator = &SecretForDockerRegistryGeneratorV1{}
 | 
						|
 | 
						|
// Ensure it supports the generator pattern that uses parameters specified during construction
 | 
						|
var _ StructuredGenerator = &SecretForDockerRegistryGeneratorV1{}
 | 
						|
 | 
						|
// Generate returns a secret using the specified parameters
 | 
						|
func (s SecretForDockerRegistryGeneratorV1) Generate(genericParams map[string]interface{}) (runtime.Object, error) {
 | 
						|
	err := ValidateParams(s.ParamNames(), genericParams)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	params := map[string]string{}
 | 
						|
	for key, value := range genericParams {
 | 
						|
		strVal, isString := value.(string)
 | 
						|
		if !isString {
 | 
						|
			return nil, fmt.Errorf("expected string, saw %v for '%s'", value, key)
 | 
						|
		}
 | 
						|
		params[key] = strVal
 | 
						|
	}
 | 
						|
	delegate := &SecretForDockerRegistryGeneratorV1{
 | 
						|
		Name:     params["name"],
 | 
						|
		Username: params["docker-username"],
 | 
						|
		Email:    params["docker-email"],
 | 
						|
		Password: params["docker-password"],
 | 
						|
		Server:   params["docker-server"],
 | 
						|
	}
 | 
						|
	return delegate.StructuredGenerate()
 | 
						|
}
 | 
						|
 | 
						|
// StructuredGenerate outputs a secret object using the configured fields
 | 
						|
func (s SecretForDockerRegistryGeneratorV1) StructuredGenerate() (runtime.Object, error) {
 | 
						|
	if err := s.validate(); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	dockercfgContent, err := handleDockercfgContent(s.Username, s.Password, s.Email, s.Server)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	secret := &api.Secret{}
 | 
						|
	secret.Name = s.Name
 | 
						|
	secret.Type = api.SecretTypeDockercfg
 | 
						|
	secret.Data = map[string][]byte{}
 | 
						|
	secret.Data[api.DockerConfigKey] = dockercfgContent
 | 
						|
	return secret, nil
 | 
						|
}
 | 
						|
 | 
						|
// ParamNames returns the set of supported input parameters when using the parameter injection generator pattern
 | 
						|
func (s SecretForDockerRegistryGeneratorV1) ParamNames() []GeneratorParam {
 | 
						|
	return []GeneratorParam{
 | 
						|
		{"name", true},
 | 
						|
		{"docker-username", true},
 | 
						|
		{"docker-email", true},
 | 
						|
		{"docker-password", true},
 | 
						|
		{"docker-server", true},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// validate validates required fields are set to support structured generation
 | 
						|
func (s SecretForDockerRegistryGeneratorV1) validate() error {
 | 
						|
	if len(s.Name) == 0 {
 | 
						|
		return fmt.Errorf("name must be specified")
 | 
						|
	}
 | 
						|
	if len(s.Username) == 0 {
 | 
						|
		return fmt.Errorf("username must be specified")
 | 
						|
	}
 | 
						|
	if len(s.Email) == 0 {
 | 
						|
		return fmt.Errorf("email must be specified")
 | 
						|
	}
 | 
						|
	if len(s.Password) == 0 {
 | 
						|
		return fmt.Errorf("password must be specified")
 | 
						|
	}
 | 
						|
	if len(s.Server) == 0 {
 | 
						|
		return fmt.Errorf("server must be specified")
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// handleDockercfgContent serializes a dockercfg json file
 | 
						|
func handleDockercfgContent(username, password, email, server string) ([]byte, error) {
 | 
						|
	dockercfgAuth := credentialprovider.DockerConfigEntry{
 | 
						|
		Username: username,
 | 
						|
		Password: password,
 | 
						|
		Email:    email,
 | 
						|
	}
 | 
						|
 | 
						|
	dockerCfg := map[string]credentialprovider.DockerConfigEntry{server: dockercfgAuth}
 | 
						|
 | 
						|
	return json.Marshal(dockerCfg)
 | 
						|
}
 |