File: keyserver_list.go

package info (click to toggle)
singularity-container 4.0.3%2Bds1-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 21,672 kB
  • sloc: asm: 3,857; sh: 2,125; ansic: 1,677; awk: 414; makefile: 110; python: 99
file content (117 lines) | stat: -rw-r--r-- 2,880 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
// Copyright (c) 2019-2023, Sylabs Inc. All rights reserved.
// Copyright (c) 2020, Control Command Inc. All rights reserved.
// This software is licensed under a 3-clause BSD license. Please consult the
// LICENSE.md file distributed with the sources of this project regarding your
// rights to use or distribute this software.

package singularity

import (
	"fmt"
	"net/url"
	"os"
	"strings"
	"text/tabwriter"

	"github.com/sylabs/singularity/v4/internal/pkg/remote"
	"github.com/sylabs/singularity/v4/internal/pkg/remote/credential"
	"github.com/sylabs/singularity/v4/internal/pkg/remote/endpoint"
)

// KeyserverList prints information about remote configurations
func KeyserverList(remoteName string, usrConfigFile string) (err error) {
	c := &remote.Config{}

	// opening config file
	file, err := os.OpenFile(usrConfigFile, os.O_RDONLY|os.O_CREATE, 0o600)
	if err != nil {
		if os.IsNotExist(err) {
			return fmt.Errorf("no remote configurations")
		}
		return fmt.Errorf("while opening remote config file: %s", err)
	}
	defer file.Close()

	// read file contents to config struct
	c, err = remote.ReadFrom(file)
	if err != nil {
		return fmt.Errorf("while parsing remote config data: %s", err)
	}

	if err := syncSysConfig(c); err != nil {
		return err
	}

	keyserverCredentials := make(map[string]*credential.Config)
	for _, cred := range c.Credentials {
		u, err := url.Parse(cred.URI)
		if err != nil {
			return err
		}

		switch u.Scheme {
		case "http", "https":
			keyserverCredentials[cred.URI] = cred
		}
	}

	defaultRemote, err := c.GetDefault()
	if err != nil {
		return fmt.Errorf("error getting default remote-endpoint: %w", err)
	}

	remotes := c.Remotes
	if remoteName != "" {
		ep, ok := c.Remotes[remoteName]
		if !ok {
			return fmt.Errorf("no remote-endpoint with the name %q found", remoteName)
		}
		remotes = map[string]*endpoint.Config{remoteName: ep}
	}

	for epName, ep := range remotes {
		fmt.Println()
		isSystem := ""
		if ep.System {
			isSystem = "*"
		}
		isDefault := ""
		if ep == defaultRemote {
			isDefault = "^"
		}
		fmt.Printf("%s %s%s\n", epName, isSystem, isDefault)

		if err := ep.UpdateKeyserversConfig(); err != nil {
			fmt.Println("(unable to fetch associated keyserver info for this endpoint)")
			continue
		}

		order := 1
		tw := tabwriter.NewWriter(os.Stdout, 0, 0, 2, ' ', 0)
		for _, kc := range ep.Keyservers {
			if kc.Skip {
				continue
			}
			secure := "TLS"
			if kc.Insecure {
				secure = "no TLS"
			}
			loggedInStr := ""
			if _, ok := keyserverCredentials[kc.URI]; ok {
				loggedInStr = "+"
			}
			fmt.Fprintf(tw, " \t#%d\t%s\t%s\t%s\n", order, kc.URI, secure, loggedInStr)
			order++
		}
		tw.Flush()
	}

	fmt.Println()
	fmt.Print(strings.Join([]string{
		"(* = system endpoint, ^ = default endpoint,",
		" + = user is logged in directly to this keyserver)",
	}, "\n"))
	fmt.Println()

	return nil
}