2769c62c8a
* Added metatada-path as a flag to set-manifest Change-Id: Id26f20c4a6350b4aae34da850bbfcab42cbe9f21
684 lines
21 KiB
Go
684 lines
21 KiB
Go
/*
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package config
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"sort"
|
|
|
|
"k8s.io/client-go/tools/clientcmd"
|
|
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
|
|
"sigs.k8s.io/yaml"
|
|
|
|
"opendev.org/airship/airshipctl/pkg/log"
|
|
"opendev.org/airship/airshipctl/pkg/util"
|
|
)
|
|
|
|
// Where possible, json tags match the cli argument names.
|
|
// Top level config objects and all values required for proper functioning are not "omitempty".
|
|
// Any truly optional piece of config is allowed to be omitted.
|
|
|
|
// Config holds the information required by airshipctl commands
|
|
// It is somewhat a superset of what a kubeconfig looks like, we allow for this overlaps by providing
|
|
// a mechanism to consume or produce a kubeconfig into / from the airship config.
|
|
type Config struct {
|
|
// +optional
|
|
Kind string `json:"kind,omitempty"`
|
|
|
|
// +optional
|
|
APIVersion string `json:"apiVersion,omitempty"`
|
|
|
|
// Permissions is a struct of permissions for file and directory
|
|
Permissions Permissions `json:"permissions,omitempty"`
|
|
|
|
// Contexts is a map of referenceable names to context configs
|
|
Contexts map[string]*Context `json:"contexts"`
|
|
|
|
// Manifests is a map of referenceable names to documents
|
|
Manifests map[string]*Manifest `json:"manifests"`
|
|
|
|
// EncryptionConfigs is a map of referenceable names to encryption configs
|
|
EncryptionConfigs map[string]*EncryptionConfig `json:"encryptionConfigs"`
|
|
|
|
// CurrentContext is the name of the context that you would like to use by default
|
|
CurrentContext string `json:"currentContext"`
|
|
|
|
// Management configuration defines management information for all baremetal hosts in a cluster.
|
|
ManagementConfiguration map[string]*ManagementConfiguration `json:"managementConfiguration"`
|
|
|
|
// loadedConfigPath is the full path to the the location of the config
|
|
// file from which this config was loaded
|
|
// +not persisted in file
|
|
loadedConfigPath string
|
|
|
|
// kubeConfigPath is the full path to the the location of the
|
|
// kubeconfig file associated with this airship config instance
|
|
// +not persisted in file
|
|
kubeConfigPath string
|
|
|
|
// Private instance of Kube Config content as an object
|
|
kubeConfig *clientcmdapi.Config
|
|
}
|
|
|
|
// Permissions has the permissions for file and directory
|
|
type Permissions struct {
|
|
DirectoryPermission uint32
|
|
FilePermission uint32
|
|
}
|
|
|
|
// Factory is a function which returns ready to use config object and error (if any)
|
|
type Factory func() (*Config, error)
|
|
|
|
// CreateFactory returns function which creates ready to use Config object
|
|
func CreateFactory(airshipConfigPath *string, kubeConfigPath *string) Factory {
|
|
return func() (*Config, error) {
|
|
cfg := NewConfig()
|
|
cfg.kubeConfig = NewKubeConfig()
|
|
|
|
var acp, kcp string
|
|
if airshipConfigPath != nil {
|
|
acp = *airshipConfigPath
|
|
}
|
|
if kubeConfigPath != nil {
|
|
kcp = *kubeConfigPath
|
|
}
|
|
|
|
cfg.initConfigPath(acp, kcp)
|
|
err := cfg.LoadConfig(cfg.loadedConfigPath, cfg.kubeConfigPath, false)
|
|
if err != nil {
|
|
// Should stop airshipctl
|
|
log.Fatal("Failed to load or initialize config: ", err)
|
|
}
|
|
|
|
return cfg, cfg.EnsureComplete()
|
|
}
|
|
}
|
|
|
|
// CreateConfig saves default config to specified paths
|
|
func CreateConfig(airshipConfigPath string, kubeConfigPath string) error {
|
|
cfg := NewConfig()
|
|
cfg.kubeConfig = NewKubeConfig()
|
|
cfg.initConfigPath(airshipConfigPath, kubeConfigPath)
|
|
return cfg.PersistConfig(true)
|
|
}
|
|
|
|
// initConfigPath - Initializes loadedConfigPath and kubeConfigPath variable for Config object
|
|
func (c *Config) initConfigPath(airshipConfigPath string, kubeConfigPath string) {
|
|
switch {
|
|
case airshipConfigPath != "":
|
|
// The loadedConfigPath may already have been received as a command line argument
|
|
c.loadedConfigPath = airshipConfigPath
|
|
case os.Getenv(AirshipConfigEnv) != "":
|
|
// Otherwise, we can check if we got the path via ENVIRONMENT variable
|
|
c.loadedConfigPath = os.Getenv(AirshipConfigEnv)
|
|
default:
|
|
// Otherwise, we'll try putting it in the home directory
|
|
c.loadedConfigPath = filepath.Join(util.UserHomeDir(), AirshipConfigDir, AirshipConfig)
|
|
}
|
|
|
|
switch {
|
|
case kubeConfigPath != "":
|
|
// The kubeConfigPath may already have been received as a command line argument
|
|
c.kubeConfigPath = kubeConfigPath
|
|
case os.Getenv(AirshipKubeConfigEnv) != "":
|
|
// Otherwise, we can check if we got the path via ENVIRONMENT variable
|
|
c.kubeConfigPath = os.Getenv(AirshipKubeConfigEnv)
|
|
default:
|
|
// Otherwise, we'll try putting it in the home directory
|
|
c.kubeConfigPath = filepath.Join(util.UserHomeDir(), AirshipConfigDir, AirshipKubeConfig)
|
|
}
|
|
}
|
|
|
|
// LoadConfig populates the Config object using the files found at
|
|
// airshipConfigPath and kubeConfigPath
|
|
func (c *Config) LoadConfig(airshipConfigPath, kubeConfigPath string, create bool) error {
|
|
err := c.loadFromAirConfig(airshipConfigPath, create)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = c.loadKubeConfig(kubeConfigPath, create)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// loadFromAirConfig populates the Config from the file found at airshipConfigPath.
|
|
// If there is no file at airshipConfigPath, this function does nothing.
|
|
// An error is returned if:
|
|
// * airshipConfigPath is the empty string
|
|
// * the file at airshipConfigPath is inaccessible
|
|
// * the file at airshipConfigPath cannot be marshaled into Config
|
|
func (c *Config) loadFromAirConfig(airshipConfigPath string, create bool) error {
|
|
if airshipConfigPath == "" {
|
|
return errors.New("configuration file location was not provided")
|
|
}
|
|
|
|
// Remember where I loaded the Config from
|
|
c.loadedConfigPath = airshipConfigPath
|
|
|
|
// If I can read from the file, load from it
|
|
// throw an error otherwise
|
|
if _, err := os.Stat(airshipConfigPath); os.IsNotExist(err) && create {
|
|
return nil
|
|
} else if err != nil {
|
|
return err
|
|
}
|
|
|
|
return util.ReadYAMLFile(airshipConfigPath, c)
|
|
}
|
|
|
|
func (c *Config) loadKubeConfig(kubeConfigPath string, create bool) error {
|
|
// Will need this for persisting the changes
|
|
c.kubeConfigPath = kubeConfigPath
|
|
|
|
// If I can read from the file, load from it
|
|
var err error
|
|
if _, err = os.Stat(kubeConfigPath); os.IsNotExist(err) && create {
|
|
// Default kubeconfig matching Airship target cluster
|
|
c.kubeConfig = NewKubeConfig()
|
|
return nil
|
|
} else if err != nil {
|
|
return err
|
|
}
|
|
|
|
c.kubeConfig, err = clientcmd.LoadFromFile(kubeConfigPath)
|
|
return err
|
|
}
|
|
|
|
// EnsureComplete verifies that a Config object is ready to use.
|
|
// A complete Config object meets the following criteria:
|
|
// * At least 1 Context is defined
|
|
// * At least 1 Manifest is defined
|
|
// * The CurrentContext is set
|
|
// * The CurrentContext identifies an existing Context
|
|
// * The CurrentContext identifies an existing Manifest
|
|
func (c *Config) EnsureComplete() error {
|
|
if len(c.Contexts) == 0 {
|
|
return ErrMissingConfig{
|
|
What: "At least one Context needs to be defined",
|
|
}
|
|
}
|
|
|
|
if len(c.Manifests) == 0 {
|
|
return ErrMissingConfig{
|
|
What: "At least one Manifest needs to be defined",
|
|
}
|
|
}
|
|
|
|
if c.CurrentContext == "" {
|
|
return ErrMissingConfig{
|
|
What: "Current Context is not defined",
|
|
}
|
|
}
|
|
|
|
currentContext, found := c.Contexts[c.CurrentContext]
|
|
if !found {
|
|
return ErrMissingConfig{
|
|
What: fmt.Sprintf("Current Context (%s) does not identify a defined Context", c.CurrentContext),
|
|
}
|
|
}
|
|
|
|
if _, found := c.Manifests[currentContext.Manifest]; !found {
|
|
return ErrMissingConfig{
|
|
What: fmt.Sprintf("Current Context (%s) does not identify a defined Manifest", c.CurrentContext),
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// PersistConfig updates the airshipctl config and kubeconfig files to match
|
|
// the current Config and KubeConfig objects.
|
|
// If either file did not previously exist, the file will be created.
|
|
// Otherwise, the file will be overwritten
|
|
func (c *Config) PersistConfig(persistKubeConfig bool) error {
|
|
airshipConfigYaml, err := c.ToYaml()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// WriteFile doesn't create the directory, create it if needed
|
|
configDir := filepath.Dir(c.loadedConfigPath)
|
|
err = os.MkdirAll(configDir, os.FileMode(c.Permissions.DirectoryPermission))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Write the Airship Config file
|
|
err = ioutil.WriteFile(c.loadedConfigPath, airshipConfigYaml, os.FileMode(c.Permissions.FilePermission))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Change the permission of directory
|
|
err = os.Chmod(configDir, os.FileMode(c.Permissions.DirectoryPermission))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Change the permission of config file
|
|
err = os.Chmod(c.loadedConfigPath, os.FileMode(c.Permissions.FilePermission))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if persistKubeConfig {
|
|
// Persist the kubeconfig file referenced
|
|
if err := clientcmd.WriteToFile(*c.kubeConfig, c.kubeConfigPath); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Config) String() string {
|
|
yamlData, err := c.ToYaml()
|
|
// This is hiding the error perhaps
|
|
if err != nil {
|
|
return ""
|
|
}
|
|
return string(yamlData)
|
|
}
|
|
|
|
// ToYaml returns a YAML document
|
|
// It serializes the given Config object to a valid YAML document
|
|
func (c *Config) ToYaml() ([]byte, error) {
|
|
return yaml.Marshal(&c)
|
|
}
|
|
|
|
// LoadedConfigPath returns the file path of airship config
|
|
// from where the current Config object is created
|
|
func (c *Config) LoadedConfigPath() string {
|
|
return c.loadedConfigPath
|
|
}
|
|
|
|
// SetLoadedConfigPath updates the file path of airship config
|
|
// in the Config object
|
|
func (c *Config) SetLoadedConfigPath(lcp string) {
|
|
c.loadedConfigPath = lcp
|
|
}
|
|
|
|
// KubeConfigPath returns the file path of the kube config
|
|
// from Config object
|
|
func (c *Config) KubeConfigPath() string {
|
|
return c.kubeConfigPath
|
|
}
|
|
|
|
// SetKubeConfigPath updates the file path of the kubeconfig
|
|
// in Config object
|
|
func (c *Config) SetKubeConfigPath(kubeConfigPath string) {
|
|
c.kubeConfigPath = kubeConfigPath
|
|
}
|
|
|
|
// KubeConfig returns kube config object from the
|
|
// context of current Config object
|
|
func (c *Config) KubeConfig() *clientcmdapi.Config {
|
|
return c.kubeConfig
|
|
}
|
|
|
|
// SetKubeConfig updates kube config in Config object
|
|
func (c *Config) SetKubeConfig(kubeConfig *clientcmdapi.Config) {
|
|
c.kubeConfig = kubeConfig
|
|
}
|
|
|
|
// GetContext returns a context instance
|
|
func (c *Config) GetContext(cName string) (*Context, error) {
|
|
context, exists := c.Contexts[cName]
|
|
if !exists {
|
|
return nil, ErrMissingConfig{What: fmt.Sprintf("Context with name '%s'", cName)}
|
|
}
|
|
return context, nil
|
|
}
|
|
|
|
// GetContexts returns all of the contexts associated with the Config sorted by name
|
|
func (c *Config) GetContexts() []*Context {
|
|
keys := make([]string, 0, len(c.Contexts))
|
|
for name := range c.Contexts {
|
|
keys = append(keys, name)
|
|
}
|
|
sort.Strings(keys)
|
|
|
|
contexts := make([]*Context, 0, len(c.Contexts))
|
|
for _, name := range keys {
|
|
contexts = append(contexts, c.Contexts[name])
|
|
}
|
|
return contexts
|
|
}
|
|
|
|
// GetManagementConfiguration retrieves a management configuration by name.
|
|
func (c *Config) GetManagementConfiguration(name string) (*ManagementConfiguration, error) {
|
|
managementCfg, exists := c.ManagementConfiguration[name]
|
|
if !exists {
|
|
return nil, ErrManagementConfigurationNotFound{Name: name}
|
|
}
|
|
|
|
return managementCfg, nil
|
|
}
|
|
|
|
// AddContext creates a new context and returns the instance of
|
|
// newly created context
|
|
func (c *Config) AddContext(theContext *ContextOptions) *Context {
|
|
// Create the new Airship config context
|
|
nContext := NewContext()
|
|
c.Contexts[theContext.Name] = nContext
|
|
nContext.NameInKubeconf = theContext.Name
|
|
|
|
// Ok , I have initialized structs for the Context information
|
|
// We can use Modify to populate the correct information
|
|
c.ModifyContext(nContext, theContext)
|
|
nContext.ClusterType()
|
|
return nContext
|
|
}
|
|
|
|
// ModifyContext updates Context object with given given context options
|
|
func (c *Config) ModifyContext(context *Context, theContext *ContextOptions) {
|
|
if theContext.ManagementConfiguration != "" {
|
|
context.ManagementConfiguration = theContext.ManagementConfiguration
|
|
}
|
|
if theContext.Manifest != "" {
|
|
context.Manifest = theContext.Manifest
|
|
}
|
|
if theContext.EncryptionConfig != "" {
|
|
context.EncryptionConfig = theContext.EncryptionConfig
|
|
}
|
|
}
|
|
|
|
// GetCurrentContext methods Returns the appropriate information for the current context
|
|
// Current Context holds labels for the appropriate config objects
|
|
// ClusterType is the name of the clustertype for this context, it should be a flag we pass to it??
|
|
// Manifest is the default manifest to be use with this context
|
|
// Purpose for this method is simplifying the current context information
|
|
func (c *Config) GetCurrentContext() (*Context, error) {
|
|
currentContext, err := c.GetContext(c.CurrentContext)
|
|
if err != nil {
|
|
// this should not happen since Ensure Complete checks for this
|
|
return nil, err
|
|
}
|
|
return currentContext, nil
|
|
}
|
|
|
|
// CurrentContextManifest returns the manifest for the current context
|
|
func (c *Config) CurrentContextManifest() (*Manifest, error) {
|
|
currentContext, err := c.GetCurrentContext()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return c.Manifests[currentContext.Manifest], nil
|
|
}
|
|
|
|
// CurrentContextEntryPoint returns path to build bundle based on clusterType and phase
|
|
// example CurrentContextEntryPoint("ephemeral", "initinfra")
|
|
func (c *Config) CurrentContextEntryPoint(phase string) (string, error) {
|
|
clusterType, err := c.CurrentContextClusterType()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
ccm, err := c.CurrentContextManifest()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
_, exists := ccm.Repositories[ccm.PrimaryRepositoryName]
|
|
if !exists {
|
|
return "", ErrMissingPrimaryRepo{}
|
|
}
|
|
epp := path.Join(ccm.TargetPath, ccm.SubPath, clusterType, phase)
|
|
if _, err := os.Stat(epp); err != nil {
|
|
return "", ErrMissingPhaseDocument{PhaseName: phase}
|
|
}
|
|
return epp, nil
|
|
}
|
|
|
|
// CurrentContextTargetPath returns target path from current context's manifest
|
|
func (c *Config) CurrentContextTargetPath() (string, error) {
|
|
ccm, err := c.CurrentContextManifest()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return ccm.TargetPath, nil
|
|
}
|
|
|
|
// CurrentContextClusterType returns cluster type of current context
|
|
func (c *Config) CurrentContextClusterType() (string, error) {
|
|
context, err := c.GetCurrentContext()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return context.ClusterType(), nil
|
|
}
|
|
|
|
// CurrentContextClusterName returns cluster name of current context
|
|
func (c *Config) CurrentContextClusterName() (string, error) {
|
|
context, err := c.GetCurrentContext()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return context.ClusterName(), nil
|
|
}
|
|
|
|
// GetManifests returns all of the Manifests associated with the Config sorted by name
|
|
func (c *Config) GetManifests() []*Manifest {
|
|
keys := make([]string, 0, len(c.Manifests))
|
|
for name := range c.Manifests {
|
|
keys = append(keys, name)
|
|
}
|
|
sort.Strings(keys)
|
|
|
|
manifests := make([]*Manifest, 0, len(c.Manifests))
|
|
for _, name := range keys {
|
|
manifests = append(manifests, c.Manifests[name])
|
|
}
|
|
return manifests
|
|
}
|
|
|
|
// AddManifest creates new Manifest
|
|
func (c *Config) AddManifest(theManifest *ManifestOptions) *Manifest {
|
|
nManifest := NewManifest()
|
|
c.Manifests[theManifest.Name] = nManifest
|
|
err := c.ModifyManifest(nManifest, theManifest)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
return nManifest
|
|
}
|
|
|
|
// ModifyManifest set actual values to manifests
|
|
func (c *Config) ModifyManifest(manifest *Manifest, theManifest *ManifestOptions) error {
|
|
if theManifest.IsPrimary {
|
|
manifest.PrimaryRepositoryName = theManifest.RepoName
|
|
}
|
|
if theManifest.SubPath != "" {
|
|
manifest.SubPath = theManifest.SubPath
|
|
}
|
|
if theManifest.TargetPath != "" {
|
|
manifest.TargetPath = theManifest.TargetPath
|
|
}
|
|
if theManifest.MetadataPath != "" {
|
|
manifest.MetadataPath = theManifest.MetadataPath
|
|
}
|
|
// There is no repository details to be updated
|
|
if theManifest.RepoName == "" {
|
|
return nil
|
|
}
|
|
//when setting an existing repository as primary, verify whether the repository exists
|
|
//and user is also not passing any repository URL
|
|
if theManifest.IsPrimary && theManifest.URL == "" && (manifest.Repositories[theManifest.RepoName] == nil) {
|
|
return ErrRepositoryNotFound{theManifest.RepoName}
|
|
}
|
|
repository, exists := manifest.Repositories[theManifest.RepoName]
|
|
if !exists {
|
|
_, err := c.AddRepository(manifest, theManifest)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
err := c.ModifyRepository(repository, theManifest)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// AddRepository creates new Repository
|
|
func (c *Config) AddRepository(manifest *Manifest, theManifest *ManifestOptions) (*Repository, error) {
|
|
nRepository := NewRepository()
|
|
manifest.Repositories[theManifest.RepoName] = nRepository
|
|
err := c.ModifyRepository(nRepository, theManifest)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return nRepository, nil
|
|
}
|
|
|
|
// ModifyRepository set actual values to repository
|
|
func (c *Config) ModifyRepository(repository *Repository, theManifest *ManifestOptions) error {
|
|
if theManifest.URL != "" {
|
|
repository.URLString = theManifest.URL
|
|
}
|
|
if theManifest.Branch != "" {
|
|
repository.CheckoutOptions.Branch = theManifest.Branch
|
|
}
|
|
if theManifest.CommitHash != "" {
|
|
repository.CheckoutOptions.CommitHash = theManifest.CommitHash
|
|
}
|
|
if theManifest.Tag != "" {
|
|
repository.CheckoutOptions.Tag = theManifest.Tag
|
|
}
|
|
if theManifest.Force {
|
|
repository.CheckoutOptions.ForceCheckout = theManifest.Force
|
|
}
|
|
possibleValues := [3]string{repository.CheckoutOptions.CommitHash,
|
|
repository.CheckoutOptions.Branch, repository.CheckoutOptions.Tag}
|
|
var count int
|
|
for _, val := range possibleValues {
|
|
if val != "" {
|
|
count++
|
|
}
|
|
}
|
|
if count > 1 {
|
|
return ErrMutuallyExclusiveCheckout{}
|
|
}
|
|
if count == 0 {
|
|
return ErrMissingRepoCheckoutOptions{}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// GetEncryptionConfigs returns all the encryption configs associated with the Config sorted by name
|
|
func (c *Config) GetEncryptionConfigs() []*EncryptionConfig {
|
|
keys := make([]string, 0, len(c.EncryptionConfigs))
|
|
for name := range c.EncryptionConfigs {
|
|
keys = append(keys, name)
|
|
}
|
|
sort.Strings(keys)
|
|
|
|
encryptionConfigs := make([]*EncryptionConfig, 0, len(c.EncryptionConfigs))
|
|
for _, name := range keys {
|
|
encryptionConfigs = append(encryptionConfigs, c.EncryptionConfigs[name])
|
|
}
|
|
return encryptionConfigs
|
|
}
|
|
|
|
// AddEncryptionConfig creates a new encryption config
|
|
func (c *Config) AddEncryptionConfig(options *EncryptionConfigOptions) *EncryptionConfig {
|
|
encryptionConfig := &EncryptionConfig{
|
|
EncryptionKeyFileSource: EncryptionKeyFileSource{
|
|
EncryptionKeyPath: options.EncryptionKeyPath,
|
|
DecryptionKeyPath: options.DecryptionKeyPath,
|
|
},
|
|
EncryptionKeySecretSource: EncryptionKeySecretSource{
|
|
KeySecretName: options.KeySecretName,
|
|
KeySecretNamespace: options.KeySecretNamespace,
|
|
},
|
|
}
|
|
if c.EncryptionConfigs == nil {
|
|
c.EncryptionConfigs = make(map[string]*EncryptionConfig)
|
|
}
|
|
c.EncryptionConfigs[options.Name] = encryptionConfig
|
|
return encryptionConfig
|
|
}
|
|
|
|
// ModifyEncryptionConfig sets existing values to existing encryption config
|
|
func (c *Config) ModifyEncryptionConfig(encryptionConfig *EncryptionConfig, options *EncryptionConfigOptions) {
|
|
if options.EncryptionKeyPath != "" {
|
|
encryptionConfig.EncryptionKeyPath = options.EncryptionKeyPath
|
|
}
|
|
if options.DecryptionKeyPath != "" {
|
|
encryptionConfig.DecryptionKeyPath = options.DecryptionKeyPath
|
|
}
|
|
if options.KeySecretName != "" {
|
|
encryptionConfig.KeySecretName = options.KeySecretName
|
|
}
|
|
if options.KeySecretNamespace != "" {
|
|
encryptionConfig.KeySecretNamespace = options.KeySecretNamespace
|
|
}
|
|
return
|
|
}
|
|
|
|
// CurrentContextManagementConfig returns the management options for the current context
|
|
func (c *Config) CurrentContextManagementConfig() (*ManagementConfiguration, error) {
|
|
currentContext, err := c.GetCurrentContext()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if currentContext.ManagementConfiguration == "" {
|
|
return nil, ErrMissingConfig{
|
|
What: fmt.Sprintf("No management config listed for cluster %s", currentContext.NameInKubeconf),
|
|
}
|
|
}
|
|
|
|
managementCfg, exists := c.ManagementConfiguration[currentContext.ManagementConfiguration]
|
|
if !exists {
|
|
return nil, ErrMissingManagementConfiguration{context: currentContext}
|
|
}
|
|
|
|
return managementCfg, nil
|
|
}
|
|
|
|
// Purge removes the config file
|
|
func (c *Config) Purge() error {
|
|
return os.Remove(c.loadedConfigPath)
|
|
}
|
|
|
|
// CurrentContextManifestMetadata gets manifest metadata
|
|
func (c *Config) CurrentContextManifestMetadata() (*Metadata, error) {
|
|
manifest, err := c.CurrentContextManifest()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
meta := &Metadata{
|
|
// Populate with empty values to avoid nil pointers
|
|
Inventory: &InventoryMeta{},
|
|
PhaseMeta: &PhaseMeta{},
|
|
}
|
|
err = util.ReadYAMLFile(filepath.Join(manifest.TargetPath, manifest.MetadataPath), meta)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return meta, nil
|
|
}
|