-
Notifications
You must be signed in to change notification settings - Fork 89
/
keyserver_list.go
117 lines (101 loc) · 2.81 KB
/
keyserver_list.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
// Copyright (c) 2019-2023, Sylabs Inc. All rights reserved.
// Copyright (c) 2020, Control Command Inc. All rights reserved.
// This software is licensed under a 3-clause BSD license. Please consult the
// LICENSE.md file distributed with the sources of this project regarding your
// rights to use or distribute this software.
package singularity
import (
"fmt"
"net/url"
"os"
"strings"
"text/tabwriter"
"github.com/sylabs/singularity/v4/internal/pkg/remote"
"github.com/sylabs/singularity/v4/internal/pkg/remote/credential"
"github.com/sylabs/singularity/v4/internal/pkg/remote/endpoint"
)
// KeyserverList prints information about remote configurations
func KeyserverList(remoteName string, usrConfigFile string) (err error) {
c := &remote.Config{}
// opening config file
file, err := os.OpenFile(usrConfigFile, os.O_RDONLY|os.O_CREATE, 0o600)
if err != nil {
if os.IsNotExist(err) {
return fmt.Errorf("no remote configurations")
}
return fmt.Errorf("while opening remote config file: %s", err)
}
defer file.Close()
// read file contents to config struct
c, err = remote.ReadFrom(file)
if err != nil {
return fmt.Errorf("while parsing remote config data: %s", err)
}
if err := syncSysConfig(c); err != nil {
return err
}
keyserverCredentials := make(map[string]*credential.Config)
for _, cred := range c.Credentials {
u, err := url.Parse(cred.URI)
if err != nil {
return err
}
switch u.Scheme {
case "http", "https":
keyserverCredentials[cred.URI] = cred
}
}
defaultRemote, err := c.GetDefault()
if err != nil {
return fmt.Errorf("error getting default remote-endpoint: %w", err)
}
remotes := c.Remotes
if remoteName != "" {
ep, ok := c.Remotes[remoteName]
if !ok {
return fmt.Errorf("no remote-endpoint with the name %q found", remoteName)
}
remotes = map[string]*endpoint.Config{remoteName: ep}
}
for epName, ep := range remotes {
fmt.Println()
isSystem := ""
if ep.System {
isSystem = "*"
}
isDefault := ""
if ep == defaultRemote {
isDefault = "^"
}
fmt.Printf("%s %s%s\n", epName, isSystem, isDefault)
if err := ep.UpdateKeyserversConfig(); err != nil {
fmt.Println("(unable to fetch associated keyserver info for this endpoint)")
continue
}
order := 1
tw := tabwriter.NewWriter(os.Stdout, 0, 0, 2, ' ', 0)
for _, kc := range ep.Keyservers {
if kc.Skip {
continue
}
secure := "TLS"
if kc.Insecure {
secure = "no TLS"
}
loggedInStr := ""
if _, ok := keyserverCredentials[kc.URI]; ok {
loggedInStr = "+"
}
fmt.Fprintf(tw, " \t#%d\t%s\t%s\t%s\n", order, kc.URI, secure, loggedInStr)
order++
}
tw.Flush()
}
fmt.Println()
fmt.Print(strings.Join([]string{
"(* = system endpoint, ^ = default endpoint,",
" + = user is logged in directly to this keyserver)",
}, "\n"))
fmt.Println()
return nil
}