mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 13:50:01 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			323 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			323 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2015 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package create
 | |
| 
 | |
| import (
 | |
| 	"github.com/spf13/cobra"
 | |
| 
 | |
| 	"k8s.io/cli-runtime/pkg/genericclioptions"
 | |
| 	cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/generate"
 | |
| 	generateversioned "k8s.io/kubernetes/pkg/kubectl/generate/versioned"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/util/i18n"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/util/templates"
 | |
| )
 | |
| 
 | |
| // NewCmdCreateSecret groups subcommands to create various types of secrets
 | |
| func NewCmdCreateSecret(f cmdutil.Factory, ioStreams genericclioptions.IOStreams) *cobra.Command {
 | |
| 	cmd := &cobra.Command{
 | |
| 		Use:   "secret",
 | |
| 		Short: i18n.T("Create a secret using specified subcommand"),
 | |
| 		Long:  "Create a secret using specified subcommand.",
 | |
| 		Run:   cmdutil.DefaultSubCommandRun(ioStreams.ErrOut),
 | |
| 	}
 | |
| 	cmd.AddCommand(NewCmdCreateSecretDockerRegistry(f, ioStreams))
 | |
| 	cmd.AddCommand(NewCmdCreateSecretTLS(f, ioStreams))
 | |
| 	cmd.AddCommand(NewCmdCreateSecretGeneric(f, ioStreams))
 | |
| 
 | |
| 	return cmd
 | |
| }
 | |
| 
 | |
| var (
 | |
| 	secretLong = templates.LongDesc(i18n.T(`
 | |
| 		Create a secret based on a file, directory, or specified literal value.
 | |
| 
 | |
| 		A single secret may package one or more key/value pairs.
 | |
| 
 | |
| 		When creating a secret based on a file, the key will default to the basename of the file, and the value will
 | |
| 		default to the file content. If the basename is an invalid key or you wish to chose your own, you may specify
 | |
| 		an alternate key.
 | |
| 
 | |
| 		When creating a secret based on a directory, each file whose basename is a valid key in the directory will be
 | |
| 		packaged into the secret. Any directory entries except regular files are ignored (e.g. subdirectories,
 | |
| 		symlinks, devices, pipes, etc).`))
 | |
| 
 | |
| 	secretExample = templates.Examples(i18n.T(`
 | |
| 	  # Create a new secret named my-secret with keys for each file in folder bar
 | |
| 	  kubectl create secret generic my-secret --from-file=path/to/bar
 | |
| 
 | |
| 	  # Create a new secret named my-secret with specified keys instead of names on disk
 | |
| 	  kubectl create secret generic my-secret --from-file=ssh-privatekey=~/.ssh/id_rsa --from-file=ssh-publickey=~/.ssh/id_rsa.pub
 | |
| 
 | |
| 	  # Create a new secret named my-secret with key1=supersecret and key2=topsecret
 | |
| 	  kubectl create secret generic my-secret --from-literal=key1=supersecret --from-literal=key2=topsecret
 | |
| 
 | |
| 	  # Create a new secret named my-secret using a combination of a file and a literal
 | |
| 	  kubectl create secret generic my-secret --from-file=ssh-privatekey=~/.ssh/id_rsa --from-literal=passphrase=topsecret
 | |
| 
 | |
| 	  # Create a new secret named my-secret from an env file
 | |
| 	  kubectl create secret generic my-secret --from-env-file=path/to/bar.env`))
 | |
| )
 | |
| 
 | |
| // SecretGenericOpts holds the options for 'create secret' sub command
 | |
| type SecretGenericOpts struct {
 | |
| 	CreateSubcommandOptions *CreateSubcommandOptions
 | |
| }
 | |
| 
 | |
| // NewCmdCreateSecretGeneric is a command to create generic secrets from files, directories, or literal values
 | |
| func NewCmdCreateSecretGeneric(f cmdutil.Factory, ioStreams genericclioptions.IOStreams) *cobra.Command {
 | |
| 	options := &SecretGenericOpts{
 | |
| 		CreateSubcommandOptions: NewCreateSubcommandOptions(ioStreams),
 | |
| 	}
 | |
| 
 | |
| 	cmd := &cobra.Command{
 | |
| 		Use:                   "generic NAME [--type=string] [--from-file=[key=]source] [--from-literal=key1=value1] [--dry-run]",
 | |
| 		DisableFlagsInUseLine: true,
 | |
| 		Short:                 i18n.T("Create a secret from a local file, directory or literal value"),
 | |
| 		Long:                  secretLong,
 | |
| 		Example:               secretExample,
 | |
| 		Run: func(cmd *cobra.Command, args []string) {
 | |
| 			cmdutil.CheckErr(options.Complete(f, cmd, args))
 | |
| 			cmdutil.CheckErr(options.Run())
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	options.CreateSubcommandOptions.PrintFlags.AddFlags(cmd)
 | |
| 
 | |
| 	cmdutil.AddApplyAnnotationFlags(cmd)
 | |
| 	cmdutil.AddValidateFlags(cmd)
 | |
| 	cmdutil.AddGeneratorFlags(cmd, generateversioned.SecretV1GeneratorName)
 | |
| 	cmd.Flags().StringSlice("from-file", []string{}, "Key files can be specified using their file path, in which case a default name will be given to them, or optionally with a name and file path, in which case the given name will be used.  Specifying a directory will iterate each named file in the directory that is a valid secret key.")
 | |
| 	cmd.Flags().StringArray("from-literal", []string{}, "Specify a key and literal value to insert in secret (i.e. mykey=somevalue)")
 | |
| 	cmd.Flags().String("from-env-file", "", "Specify the path to a file to read lines of key=val pairs to create a secret (i.e. a Docker .env file).")
 | |
| 	cmd.Flags().String("type", "", i18n.T("The type of secret to create"))
 | |
| 	cmd.Flags().Bool("append-hash", false, "Append a hash of the secret to its name.")
 | |
| 	return cmd
 | |
| }
 | |
| 
 | |
| // Complete completes all the required options
 | |
| func (o *SecretGenericOpts) Complete(f cmdutil.Factory, cmd *cobra.Command, args []string) error {
 | |
| 	name, err := NameFromCommandArgs(cmd, args)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	var generator generate.StructuredGenerator
 | |
| 	switch generatorName := cmdutil.GetFlagString(cmd, "generator"); generatorName {
 | |
| 	case generateversioned.SecretV1GeneratorName:
 | |
| 		generator = &generateversioned.SecretGeneratorV1{
 | |
| 			Name:           name,
 | |
| 			Type:           cmdutil.GetFlagString(cmd, "type"),
 | |
| 			FileSources:    cmdutil.GetFlagStringSlice(cmd, "from-file"),
 | |
| 			LiteralSources: cmdutil.GetFlagStringArray(cmd, "from-literal"),
 | |
| 			EnvFileSource:  cmdutil.GetFlagString(cmd, "from-env-file"),
 | |
| 			AppendHash:     cmdutil.GetFlagBool(cmd, "append-hash"),
 | |
| 		}
 | |
| 	default:
 | |
| 		return errUnsupportedGenerator(cmd, generatorName)
 | |
| 	}
 | |
| 
 | |
| 	return o.CreateSubcommandOptions.Complete(f, cmd, args, generator)
 | |
| }
 | |
| 
 | |
| // Run calls the CreateSubcommandOptions.Run in SecretGenericOpts instance
 | |
| func (o *SecretGenericOpts) Run() error {
 | |
| 	return o.CreateSubcommandOptions.Run()
 | |
| }
 | |
| 
 | |
| var (
 | |
| 	secretForDockerRegistryLong = templates.LongDesc(i18n.T(`
 | |
| 		Create a new secret for use with Docker registries.
 | |
| 
 | |
| 		Dockercfg secrets are used to authenticate against Docker registries.
 | |
| 
 | |
| 		When using the Docker command line to push images, you can authenticate to a given registry by running:
 | |
| 			'$ docker login DOCKER_REGISTRY_SERVER --username=DOCKER_USER --password=DOCKER_PASSWORD --email=DOCKER_EMAIL'.
 | |
| 
 | |
| 	That produces a ~/.dockercfg file that is used by subsequent 'docker push' and 'docker pull' commands to
 | |
| 		authenticate to the registry. The email address is optional.
 | |
| 
 | |
| 		When creating applications, you may have a Docker registry that requires authentication.  In order for the
 | |
| 		nodes to pull images on your behalf, they have to have the credentials.  You can provide this information
 | |
| 		by creating a dockercfg secret and attaching it to your service account.`))
 | |
| 
 | |
| 	secretForDockerRegistryExample = templates.Examples(i18n.T(`
 | |
| 		  # If you don't already have a .dockercfg file, you can create a dockercfg secret directly by using:
 | |
| 		  kubectl create secret docker-registry my-secret --docker-server=DOCKER_REGISTRY_SERVER --docker-username=DOCKER_USER --docker-password=DOCKER_PASSWORD --docker-email=DOCKER_EMAIL`))
 | |
| )
 | |
| 
 | |
| // SecretDockerRegistryOpts holds the options for 'create secret docker-registry' sub command
 | |
| type SecretDockerRegistryOpts struct {
 | |
| 	CreateSubcommandOptions *CreateSubcommandOptions
 | |
| }
 | |
| 
 | |
| // NewCmdCreateSecretDockerRegistry is a macro command for creating secrets to work with Docker registries
 | |
| func NewCmdCreateSecretDockerRegistry(f cmdutil.Factory, ioStreams genericclioptions.IOStreams) *cobra.Command {
 | |
| 	options := &SecretDockerRegistryOpts{
 | |
| 		CreateSubcommandOptions: NewCreateSubcommandOptions(ioStreams),
 | |
| 	}
 | |
| 
 | |
| 	cmd := &cobra.Command{
 | |
| 		Use:                   "docker-registry NAME --docker-username=user --docker-password=password --docker-email=email [--docker-server=string] [--from-literal=key1=value1] [--dry-run]",
 | |
| 		DisableFlagsInUseLine: true,
 | |
| 		Short:                 i18n.T("Create a secret for use with a Docker registry"),
 | |
| 		Long:                  secretForDockerRegistryLong,
 | |
| 		Example:               secretForDockerRegistryExample,
 | |
| 		Run: func(cmd *cobra.Command, args []string) {
 | |
| 			cmdutil.CheckErr(options.Complete(f, cmd, args))
 | |
| 			cmdutil.CheckErr(options.Run())
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	options.CreateSubcommandOptions.PrintFlags.AddFlags(cmd)
 | |
| 
 | |
| 	cmdutil.AddApplyAnnotationFlags(cmd)
 | |
| 	cmdutil.AddValidateFlags(cmd)
 | |
| 	cmdutil.AddGeneratorFlags(cmd, generateversioned.SecretForDockerRegistryV1GeneratorName)
 | |
| 	cmd.Flags().String("docker-username", "", i18n.T("Username for Docker registry authentication"))
 | |
| 	cmd.MarkFlagRequired("docker-username")
 | |
| 	cmd.Flags().String("docker-password", "", i18n.T("Password for Docker registry authentication"))
 | |
| 	cmd.MarkFlagRequired("docker-password")
 | |
| 	cmd.Flags().String("docker-email", "", i18n.T("Email for Docker registry"))
 | |
| 	cmd.Flags().String("docker-server", "https://index.docker.io/v1/", i18n.T("Server location for Docker registry"))
 | |
| 	cmd.Flags().Bool("append-hash", false, "Append a hash of the secret to its name.")
 | |
| 	cmd.Flags().StringSlice("from-file", []string{}, "Key files can be specified using their file path, in which case a default name will be given to them, or optionally with a name and file path, in which case the given name will be used.  Specifying a directory will iterate each named file in the directory that is a valid secret key.")
 | |
| 
 | |
| 	return cmd
 | |
| }
 | |
| 
 | |
| // Complete completes all the required options
 | |
| func (o *SecretDockerRegistryOpts) Complete(f cmdutil.Factory, cmd *cobra.Command, args []string) error {
 | |
| 	name, err := NameFromCommandArgs(cmd, args)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	fromFileFlag := cmdutil.GetFlagStringSlice(cmd, "from-file")
 | |
| 	if len(fromFileFlag) == 0 {
 | |
| 		requiredFlags := []string{"docker-username", "docker-password", "docker-server"}
 | |
| 		for _, requiredFlag := range requiredFlags {
 | |
| 			if value := cmdutil.GetFlagString(cmd, requiredFlag); len(value) == 0 {
 | |
| 				return cmdutil.UsageErrorf(cmd, "flag %s is required", requiredFlag)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	var generator generate.StructuredGenerator
 | |
| 	switch generatorName := cmdutil.GetFlagString(cmd, "generator"); generatorName {
 | |
| 	case generateversioned.SecretForDockerRegistryV1GeneratorName:
 | |
| 		generator = &generateversioned.SecretForDockerRegistryGeneratorV1{
 | |
| 			Name:        name,
 | |
| 			Username:    cmdutil.GetFlagString(cmd, "docker-username"),
 | |
| 			Email:       cmdutil.GetFlagString(cmd, "docker-email"),
 | |
| 			Password:    cmdutil.GetFlagString(cmd, "docker-password"),
 | |
| 			Server:      cmdutil.GetFlagString(cmd, "docker-server"),
 | |
| 			AppendHash:  cmdutil.GetFlagBool(cmd, "append-hash"),
 | |
| 			FileSources: cmdutil.GetFlagStringSlice(cmd, "from-file"),
 | |
| 		}
 | |
| 	default:
 | |
| 		return errUnsupportedGenerator(cmd, generatorName)
 | |
| 	}
 | |
| 
 | |
| 	return o.CreateSubcommandOptions.Complete(f, cmd, args, generator)
 | |
| }
 | |
| 
 | |
| // Run calls CreateSubcommandOptions.Run in SecretDockerRegistryOpts instance
 | |
| func (o *SecretDockerRegistryOpts) Run() error {
 | |
| 	return o.CreateSubcommandOptions.Run()
 | |
| }
 | |
| 
 | |
| var (
 | |
| 	secretForTLSLong = templates.LongDesc(i18n.T(`
 | |
| 		Create a TLS secret from the given public/private key pair.
 | |
| 
 | |
| 		The public/private key pair must exist before hand. The public key certificate must be .PEM encoded and match
 | |
| 		the given private key.`))
 | |
| 
 | |
| 	secretForTLSExample = templates.Examples(i18n.T(`
 | |
| 	  # Create a new TLS secret named tls-secret with the given key pair:
 | |
| 	  kubectl create secret tls tls-secret --cert=path/to/tls.cert --key=path/to/tls.key`))
 | |
| )
 | |
| 
 | |
| // SecretTLSOpts holds the options for 'create secret tls' sub command
 | |
| type SecretTLSOpts struct {
 | |
| 	CreateSubcommandOptions *CreateSubcommandOptions
 | |
| }
 | |
| 
 | |
| // NewCmdCreateSecretTLS is a macro command for creating secrets to work with Docker registries
 | |
| func NewCmdCreateSecretTLS(f cmdutil.Factory, ioStreams genericclioptions.IOStreams) *cobra.Command {
 | |
| 	options := &SecretTLSOpts{
 | |
| 		CreateSubcommandOptions: NewCreateSubcommandOptions(ioStreams),
 | |
| 	}
 | |
| 
 | |
| 	cmd := &cobra.Command{
 | |
| 		Use:                   "tls NAME --cert=path/to/cert/file --key=path/to/key/file [--dry-run]",
 | |
| 		DisableFlagsInUseLine: true,
 | |
| 		Short:                 i18n.T("Create a TLS secret"),
 | |
| 		Long:                  secretForTLSLong,
 | |
| 		Example:               secretForTLSExample,
 | |
| 		Run: func(cmd *cobra.Command, args []string) {
 | |
| 			cmdutil.CheckErr(options.Complete(f, cmd, args))
 | |
| 			cmdutil.CheckErr(options.Run())
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	options.CreateSubcommandOptions.PrintFlags.AddFlags(cmd)
 | |
| 
 | |
| 	cmdutil.AddApplyAnnotationFlags(cmd)
 | |
| 	cmdutil.AddValidateFlags(cmd)
 | |
| 	cmdutil.AddGeneratorFlags(cmd, generateversioned.SecretForTLSV1GeneratorName)
 | |
| 	cmd.Flags().String("cert", "", i18n.T("Path to PEM encoded public key certificate."))
 | |
| 	cmd.Flags().String("key", "", i18n.T("Path to private key associated with given certificate."))
 | |
| 	cmd.Flags().Bool("append-hash", false, "Append a hash of the secret to its name.")
 | |
| 	return cmd
 | |
| }
 | |
| 
 | |
| // Complete completes all the required options
 | |
| func (o *SecretTLSOpts) Complete(f cmdutil.Factory, cmd *cobra.Command, args []string) error {
 | |
| 	name, err := NameFromCommandArgs(cmd, args)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	requiredFlags := []string{"cert", "key"}
 | |
| 	for _, requiredFlag := range requiredFlags {
 | |
| 		if value := cmdutil.GetFlagString(cmd, requiredFlag); len(value) == 0 {
 | |
| 			return cmdutil.UsageErrorf(cmd, "flag %s is required", requiredFlag)
 | |
| 		}
 | |
| 	}
 | |
| 	var generator generate.StructuredGenerator
 | |
| 	switch generatorName := cmdutil.GetFlagString(cmd, "generator"); generatorName {
 | |
| 	case generateversioned.SecretForTLSV1GeneratorName:
 | |
| 		generator = &generateversioned.SecretForTLSGeneratorV1{
 | |
| 			Name:       name,
 | |
| 			Key:        cmdutil.GetFlagString(cmd, "key"),
 | |
| 			Cert:       cmdutil.GetFlagString(cmd, "cert"),
 | |
| 			AppendHash: cmdutil.GetFlagBool(cmd, "append-hash"),
 | |
| 		}
 | |
| 	default:
 | |
| 		return errUnsupportedGenerator(cmd, generatorName)
 | |
| 	}
 | |
| 
 | |
| 	return o.CreateSubcommandOptions.Complete(f, cmd, args, generator)
 | |
| }
 | |
| 
 | |
| // Run calls CreateSubcommandOptions.Run in the SecretTLSOpts instance
 | |
| func (o *SecretTLSOpts) Run() error {
 | |
| 	return o.CreateSubcommandOptions.Run()
 | |
| }
 |