1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78
|
// Copyright (c) 2019-2023, Sylabs Inc. All rights reserved.
// Copyright (c) 2020, Control Command Inc. All rights reserved.
// This software is licensed under a 3-clause BSD license. Please consult the
// LICENSE.md file distributed with the sources of this project regarding your
// rights to use or distribute this software.
package singularity
import (
"fmt"
"net/url"
"os"
"text/tabwriter"
"github.com/sylabs/singularity/v4/internal/pkg/remote"
"github.com/sylabs/singularity/v4/internal/pkg/remote/credential"
)
// RegistryList prints information about remote configurations
func RegistryList(usrConfigFile string) (err error) {
c := &remote.Config{}
// opening config file
file, err := os.OpenFile(usrConfigFile, os.O_RDONLY|os.O_CREATE, 0o600)
if err != nil {
if os.IsNotExist(err) {
return fmt.Errorf("no remote configurations")
}
return fmt.Errorf("while opening remote config file: %s", err)
}
defer file.Close()
// read file contents to config struct
c, err = remote.ReadFrom(file)
if err != nil {
return fmt.Errorf("while parsing remote config data: %s", err)
}
if err := syncSysConfig(c); err != nil {
return err
}
var registryCredentials []*credential.Config
for _, cred := range c.Credentials {
u, err := url.Parse(cred.URI)
if err != nil {
return err
}
switch u.Scheme {
case "oras", "docker":
registryCredentials = append(registryCredentials, cred)
}
}
if len(registryCredentials) < 1 {
fmt.Println()
fmt.Println("(no registries with stored login information found)")
fmt.Println()
return nil
}
fmt.Println()
tw := tabwriter.NewWriter(os.Stdout, 0, 0, 2, ' ', 0)
fmt.Fprintf(tw, "%s\t%s\n", "URI", "SECURE?")
for _, r := range registryCredentials {
secure := "✓"
if r.Insecure {
secure = "✗!"
}
fmt.Fprintf(tw, "%s\t%s\n", r.URI, secure)
}
tw.Flush()
fmt.Println()
return nil
}
|