mirror of
https://github.com/ansible-collections/community.docker.git
synced 2026-04-11 20:29:57 +00:00
Vendor parts of the Docker SDK for Python
This is a combination of the latest git version
(db7f8b8bb6)
with some fixes to make it compatible with Python 2.7
and adjusting some imports.
This commit is contained in:
parent
bcd6e57450
commit
f39977573b
14
plugins/module_utils/_api/context/__init__.py
Normal file
14
plugins/module_utils/_api/context/__init__.py
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
# This code is part of the Ansible collection community.docker, but is an independent component.
|
||||||
|
# This particular file, and this file only, is based on the Docker SDK for Python (https://github.com/docker/docker-py/)
|
||||||
|
#
|
||||||
|
# Copyright (c) 2016-2025 Docker, Inc.
|
||||||
|
#
|
||||||
|
# It is licensed under the Apache 2.0 license (see LICENSES/Apache-2.0.txt in this collection)
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
from __future__ import (absolute_import, division, print_function)
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
from .api import ContextAPI
|
||||||
|
from .context import Context
|
||||||
218
plugins/module_utils/_api/context/api.py
Normal file
218
plugins/module_utils/_api/context/api.py
Normal file
@ -0,0 +1,218 @@
|
|||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
# This code is part of the Ansible collection community.docker, but is an independent component.
|
||||||
|
# This particular file, and this file only, is based on the Docker SDK for Python (https://github.com/docker/docker-py/)
|
||||||
|
#
|
||||||
|
# Copyright (c) 2016-2025 Docker, Inc.
|
||||||
|
#
|
||||||
|
# It is licensed under the Apache 2.0 license (see LICENSES/Apache-2.0.txt in this collection)
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
from __future__ import (absolute_import, division, print_function)
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
import json
|
||||||
|
import os
|
||||||
|
|
||||||
|
from .. import errors
|
||||||
|
|
||||||
|
from .config import (
|
||||||
|
METAFILE,
|
||||||
|
get_current_context_name,
|
||||||
|
get_meta_dir,
|
||||||
|
write_context_name_to_docker_config,
|
||||||
|
)
|
||||||
|
from .context import Context
|
||||||
|
|
||||||
|
|
||||||
|
class ContextAPI(object):
|
||||||
|
"""Context API.
|
||||||
|
Contains methods for context management:
|
||||||
|
create, list, remove, get, inspect.
|
||||||
|
"""
|
||||||
|
DEFAULT_CONTEXT = Context("default", "swarm")
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def create_context(
|
||||||
|
cls, name, orchestrator=None, host=None, tls_cfg=None,
|
||||||
|
default_namespace=None, skip_tls_verify=False):
|
||||||
|
"""Creates a new context.
|
||||||
|
Returns:
|
||||||
|
(Context): a Context object.
|
||||||
|
Raises:
|
||||||
|
:py:class:`docker.errors.MissingContextParameter`
|
||||||
|
If a context name is not provided.
|
||||||
|
:py:class:`docker.errors.ContextAlreadyExists`
|
||||||
|
If a context with the name already exists.
|
||||||
|
:py:class:`docker.errors.ContextException`
|
||||||
|
If name is default.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
>>> from docker.context import ContextAPI
|
||||||
|
>>> ctx = ContextAPI.create_context(name='test')
|
||||||
|
>>> print(ctx.Metadata)
|
||||||
|
{
|
||||||
|
"Name": "test",
|
||||||
|
"Metadata": {},
|
||||||
|
"Endpoints": {
|
||||||
|
"docker": {
|
||||||
|
"Host": "unix:///var/run/docker.sock",
|
||||||
|
"SkipTLSVerify": false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
"""
|
||||||
|
if not name:
|
||||||
|
raise errors.MissingContextParameter("name")
|
||||||
|
if name == "default":
|
||||||
|
raise errors.ContextException(
|
||||||
|
'"default" is a reserved context name')
|
||||||
|
ctx = Context.load_context(name)
|
||||||
|
if ctx:
|
||||||
|
raise errors.ContextAlreadyExists(name)
|
||||||
|
endpoint = "docker"
|
||||||
|
if orchestrator and orchestrator != "swarm":
|
||||||
|
endpoint = orchestrator
|
||||||
|
ctx = Context(name, orchestrator)
|
||||||
|
ctx.set_endpoint(
|
||||||
|
endpoint, host, tls_cfg,
|
||||||
|
skip_tls_verify=skip_tls_verify,
|
||||||
|
def_namespace=default_namespace)
|
||||||
|
ctx.save()
|
||||||
|
return ctx
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def get_context(cls, name=None):
|
||||||
|
"""Retrieves a context object.
|
||||||
|
Args:
|
||||||
|
name (str): The name of the context
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
>>> from docker.context import ContextAPI
|
||||||
|
>>> ctx = ContextAPI.get_context(name='test')
|
||||||
|
>>> print(ctx.Metadata)
|
||||||
|
{
|
||||||
|
"Name": "test",
|
||||||
|
"Metadata": {},
|
||||||
|
"Endpoints": {
|
||||||
|
"docker": {
|
||||||
|
"Host": "unix:///var/run/docker.sock",
|
||||||
|
"SkipTLSVerify": false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
"""
|
||||||
|
if not name:
|
||||||
|
name = get_current_context_name()
|
||||||
|
if name == "default":
|
||||||
|
return cls.DEFAULT_CONTEXT
|
||||||
|
return Context.load_context(name)
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def contexts(cls):
|
||||||
|
"""Context list.
|
||||||
|
Returns:
|
||||||
|
(Context): List of context objects.
|
||||||
|
Raises:
|
||||||
|
:py:class:`docker.errors.APIError`
|
||||||
|
If the server returns an error.
|
||||||
|
"""
|
||||||
|
names = []
|
||||||
|
for dirname, dirnames, fnames in os.walk(get_meta_dir()):
|
||||||
|
for filename in fnames + dirnames:
|
||||||
|
if filename == METAFILE:
|
||||||
|
try:
|
||||||
|
data = json.load(
|
||||||
|
open(os.path.join(dirname, filename)))
|
||||||
|
names.append(data["Name"])
|
||||||
|
except Exception as e:
|
||||||
|
raise errors.ContextException(
|
||||||
|
f"Failed to load metafile {filename}: {e}",
|
||||||
|
) from e
|
||||||
|
|
||||||
|
contexts = [cls.DEFAULT_CONTEXT]
|
||||||
|
for name in names:
|
||||||
|
contexts.append(Context.load_context(name))
|
||||||
|
return contexts
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def get_current_context(cls):
|
||||||
|
"""Get current context.
|
||||||
|
Returns:
|
||||||
|
(Context): current context object.
|
||||||
|
"""
|
||||||
|
return cls.get_context()
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def set_current_context(cls, name="default"):
|
||||||
|
ctx = cls.get_context(name)
|
||||||
|
if not ctx:
|
||||||
|
raise errors.ContextNotFound(name)
|
||||||
|
|
||||||
|
err = write_context_name_to_docker_config(name)
|
||||||
|
if err:
|
||||||
|
raise errors.ContextException(
|
||||||
|
f'Failed to set current context: {err}')
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def remove_context(cls, name):
|
||||||
|
"""Remove a context. Similar to the ``docker context rm`` command.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
name (str): The name of the context
|
||||||
|
|
||||||
|
Raises:
|
||||||
|
:py:class:`docker.errors.MissingContextParameter`
|
||||||
|
If a context name is not provided.
|
||||||
|
:py:class:`docker.errors.ContextNotFound`
|
||||||
|
If a context with the name does not exist.
|
||||||
|
:py:class:`docker.errors.ContextException`
|
||||||
|
If name is default.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
>>> from docker.context import ContextAPI
|
||||||
|
>>> ContextAPI.remove_context(name='test')
|
||||||
|
>>>
|
||||||
|
"""
|
||||||
|
if not name:
|
||||||
|
raise errors.MissingContextParameter("name")
|
||||||
|
if name == "default":
|
||||||
|
raise errors.ContextException(
|
||||||
|
'context "default" cannot be removed')
|
||||||
|
ctx = Context.load_context(name)
|
||||||
|
if not ctx:
|
||||||
|
raise errors.ContextNotFound(name)
|
||||||
|
if name == get_current_context_name():
|
||||||
|
write_context_name_to_docker_config(None)
|
||||||
|
ctx.remove()
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def inspect_context(cls, name="default"):
|
||||||
|
"""Remove a context. Similar to the ``docker context inspect`` command.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
name (str): The name of the context
|
||||||
|
|
||||||
|
Raises:
|
||||||
|
:py:class:`docker.errors.MissingContextParameter`
|
||||||
|
If a context name is not provided.
|
||||||
|
:py:class:`docker.errors.ContextNotFound`
|
||||||
|
If a context with the name does not exist.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
>>> from docker.context import ContextAPI
|
||||||
|
>>> ContextAPI.remove_context(name='test')
|
||||||
|
>>>
|
||||||
|
"""
|
||||||
|
if not name:
|
||||||
|
raise errors.MissingContextParameter("name")
|
||||||
|
if name == "default":
|
||||||
|
return cls.DEFAULT_CONTEXT()
|
||||||
|
ctx = Context.load_context(name)
|
||||||
|
if not ctx:
|
||||||
|
raise errors.ContextNotFound(name)
|
||||||
|
|
||||||
|
return ctx()
|
||||||
93
plugins/module_utils/_api/context/config.py
Normal file
93
plugins/module_utils/_api/context/config.py
Normal file
@ -0,0 +1,93 @@
|
|||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
# This code is part of the Ansible collection community.docker, but is an independent component.
|
||||||
|
# This particular file, and this file only, is based on the Docker SDK for Python (https://github.com/docker/docker-py/)
|
||||||
|
#
|
||||||
|
# Copyright (c) 2016-2025 Docker, Inc.
|
||||||
|
#
|
||||||
|
# It is licensed under the Apache 2.0 license (see LICENSES/Apache-2.0.txt in this collection)
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
from __future__ import (absolute_import, division, print_function)
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
import hashlib
|
||||||
|
import json
|
||||||
|
import os
|
||||||
|
|
||||||
|
from ..constants import DEFAULT_UNIX_SOCKET, IS_WINDOWS_PLATFORM
|
||||||
|
from ..utils.config import find_config_file
|
||||||
|
from ..utils.utils import parse_host
|
||||||
|
|
||||||
|
METAFILE = "meta.json"
|
||||||
|
|
||||||
|
|
||||||
|
def get_current_context_name():
|
||||||
|
name = "default"
|
||||||
|
docker_cfg_path = find_config_file()
|
||||||
|
if docker_cfg_path:
|
||||||
|
try:
|
||||||
|
with open(docker_cfg_path) as f:
|
||||||
|
name = json.load(f).get("currentContext", "default")
|
||||||
|
except Exception:
|
||||||
|
return "default"
|
||||||
|
return name
|
||||||
|
|
||||||
|
|
||||||
|
def write_context_name_to_docker_config(name=None):
|
||||||
|
if name == 'default':
|
||||||
|
name = None
|
||||||
|
docker_cfg_path = find_config_file()
|
||||||
|
config = {}
|
||||||
|
if docker_cfg_path:
|
||||||
|
try:
|
||||||
|
with open(docker_cfg_path) as f:
|
||||||
|
config = json.load(f)
|
||||||
|
except Exception as e:
|
||||||
|
return e
|
||||||
|
current_context = config.get("currentContext", None)
|
||||||
|
if current_context and not name:
|
||||||
|
del config["currentContext"]
|
||||||
|
elif name:
|
||||||
|
config["currentContext"] = name
|
||||||
|
else:
|
||||||
|
return
|
||||||
|
try:
|
||||||
|
with open(docker_cfg_path, "w") as f:
|
||||||
|
json.dump(config, f, indent=4)
|
||||||
|
except Exception as e:
|
||||||
|
return e
|
||||||
|
|
||||||
|
|
||||||
|
def get_context_id(name):
|
||||||
|
return hashlib.sha256(name.encode('utf-8')).hexdigest()
|
||||||
|
|
||||||
|
|
||||||
|
def get_context_dir():
|
||||||
|
return os.path.join(os.path.dirname(find_config_file() or ""), "contexts")
|
||||||
|
|
||||||
|
|
||||||
|
def get_meta_dir(name=None):
|
||||||
|
meta_dir = os.path.join(get_context_dir(), "meta")
|
||||||
|
if name:
|
||||||
|
return os.path.join(meta_dir, get_context_id(name))
|
||||||
|
return meta_dir
|
||||||
|
|
||||||
|
|
||||||
|
def get_meta_file(name):
|
||||||
|
return os.path.join(get_meta_dir(name), METAFILE)
|
||||||
|
|
||||||
|
|
||||||
|
def get_tls_dir(name=None, endpoint=""):
|
||||||
|
context_dir = get_context_dir()
|
||||||
|
if name:
|
||||||
|
return os.path.join(context_dir, "tls", get_context_id(name), endpoint)
|
||||||
|
return os.path.join(context_dir, "tls")
|
||||||
|
|
||||||
|
|
||||||
|
def get_context_host(path=None, tls=False):
|
||||||
|
host = parse_host(path, IS_WINDOWS_PLATFORM, tls)
|
||||||
|
if host == DEFAULT_UNIX_SOCKET:
|
||||||
|
# remove http+ from default docker socket url
|
||||||
|
if host.startswith("http+"):
|
||||||
|
host = host[5:]
|
||||||
|
return host
|
||||||
261
plugins/module_utils/_api/context/context.py
Normal file
261
plugins/module_utils/_api/context/context.py
Normal file
@ -0,0 +1,261 @@
|
|||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
# This code is part of the Ansible collection community.docker, but is an independent component.
|
||||||
|
# This particular file, and this file only, is based on the Docker SDK for Python (https://github.com/docker/docker-py/)
|
||||||
|
#
|
||||||
|
# Copyright (c) 2016-2025 Docker, Inc.
|
||||||
|
#
|
||||||
|
# It is licensed under the Apache 2.0 license (see LICENSES/Apache-2.0.txt in this collection)
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
from __future__ import (absolute_import, division, print_function)
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
import json
|
||||||
|
import os
|
||||||
|
from shutil import copyfile, rmtree
|
||||||
|
|
||||||
|
from ..errors import ContextException
|
||||||
|
from ..tls import TLSConfig
|
||||||
|
|
||||||
|
from .config import (
|
||||||
|
get_context_host,
|
||||||
|
get_meta_dir,
|
||||||
|
get_meta_file,
|
||||||
|
get_tls_dir,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class Context(object):
|
||||||
|
"""A context."""
|
||||||
|
|
||||||
|
def __init__(self, name, orchestrator=None, host=None, endpoints=None,
|
||||||
|
tls=False):
|
||||||
|
if not name:
|
||||||
|
raise Exception("Name not provided")
|
||||||
|
self.name = name
|
||||||
|
self.context_type = None
|
||||||
|
self.orchestrator = orchestrator
|
||||||
|
self.endpoints = {}
|
||||||
|
self.tls_cfg = {}
|
||||||
|
self.meta_path = "IN MEMORY"
|
||||||
|
self.tls_path = "IN MEMORY"
|
||||||
|
|
||||||
|
if not endpoints:
|
||||||
|
# set default docker endpoint if no endpoint is set
|
||||||
|
default_endpoint = "docker" if (
|
||||||
|
not orchestrator or orchestrator == "swarm"
|
||||||
|
) else orchestrator
|
||||||
|
|
||||||
|
self.endpoints = {
|
||||||
|
default_endpoint: {
|
||||||
|
"Host": get_context_host(host, tls),
|
||||||
|
"SkipTLSVerify": not tls
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
|
||||||
|
# check docker endpoints
|
||||||
|
for k, v in endpoints.items():
|
||||||
|
if not isinstance(v, dict):
|
||||||
|
# unknown format
|
||||||
|
raise ContextException(
|
||||||
|
f"Unknown endpoint format for context {name}: {v}",
|
||||||
|
)
|
||||||
|
|
||||||
|
self.endpoints[k] = v
|
||||||
|
if k != "docker":
|
||||||
|
continue
|
||||||
|
|
||||||
|
self.endpoints[k]["Host"] = v.get("Host", get_context_host(
|
||||||
|
host, tls))
|
||||||
|
self.endpoints[k]["SkipTLSVerify"] = bool(v.get(
|
||||||
|
"SkipTLSVerify", not tls))
|
||||||
|
|
||||||
|
def set_endpoint(
|
||||||
|
self, name="docker", host=None, tls_cfg=None,
|
||||||
|
skip_tls_verify=False, def_namespace=None):
|
||||||
|
self.endpoints[name] = {
|
||||||
|
"Host": get_context_host(host, not skip_tls_verify),
|
||||||
|
"SkipTLSVerify": skip_tls_verify
|
||||||
|
}
|
||||||
|
if def_namespace:
|
||||||
|
self.endpoints[name]["DefaultNamespace"] = def_namespace
|
||||||
|
|
||||||
|
if tls_cfg:
|
||||||
|
self.tls_cfg[name] = tls_cfg
|
||||||
|
|
||||||
|
def inspect(self):
|
||||||
|
return self.__call__()
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def load_context(cls, name):
|
||||||
|
meta = Context._load_meta(name)
|
||||||
|
if meta:
|
||||||
|
instance = cls(
|
||||||
|
meta["Name"],
|
||||||
|
orchestrator=meta["Metadata"].get("StackOrchestrator", None),
|
||||||
|
endpoints=meta.get("Endpoints", None))
|
||||||
|
instance.context_type = meta["Metadata"].get("Type", None)
|
||||||
|
instance._load_certs()
|
||||||
|
instance.meta_path = get_meta_dir(name)
|
||||||
|
return instance
|
||||||
|
return None
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def _load_meta(cls, name):
|
||||||
|
meta_file = get_meta_file(name)
|
||||||
|
if not os.path.isfile(meta_file):
|
||||||
|
return None
|
||||||
|
|
||||||
|
metadata = {}
|
||||||
|
try:
|
||||||
|
with open(meta_file) as f:
|
||||||
|
metadata = json.load(f)
|
||||||
|
except (OSError, KeyError, ValueError) as e:
|
||||||
|
# unknown format
|
||||||
|
raise Exception(
|
||||||
|
f"Detected corrupted meta file for context {name} : {e}"
|
||||||
|
) from e
|
||||||
|
|
||||||
|
# for docker endpoints, set defaults for
|
||||||
|
# Host and SkipTLSVerify fields
|
||||||
|
for k, v in metadata["Endpoints"].items():
|
||||||
|
if k != "docker":
|
||||||
|
continue
|
||||||
|
metadata["Endpoints"][k]["Host"] = v.get(
|
||||||
|
"Host", get_context_host(None, False))
|
||||||
|
metadata["Endpoints"][k]["SkipTLSVerify"] = bool(
|
||||||
|
v.get("SkipTLSVerify", True))
|
||||||
|
|
||||||
|
return metadata
|
||||||
|
|
||||||
|
def _load_certs(self):
|
||||||
|
certs = {}
|
||||||
|
tls_dir = get_tls_dir(self.name)
|
||||||
|
for endpoint in self.endpoints.keys():
|
||||||
|
if not os.path.isdir(os.path.join(tls_dir, endpoint)):
|
||||||
|
continue
|
||||||
|
ca_cert = None
|
||||||
|
cert = None
|
||||||
|
key = None
|
||||||
|
for filename in os.listdir(os.path.join(tls_dir, endpoint)):
|
||||||
|
if filename.startswith("ca"):
|
||||||
|
ca_cert = os.path.join(tls_dir, endpoint, filename)
|
||||||
|
elif filename.startswith("cert"):
|
||||||
|
cert = os.path.join(tls_dir, endpoint, filename)
|
||||||
|
elif filename.startswith("key"):
|
||||||
|
key = os.path.join(tls_dir, endpoint, filename)
|
||||||
|
if all([ca_cert, cert, key]):
|
||||||
|
verify = None
|
||||||
|
if endpoint == "docker" and not self.endpoints["docker"].get(
|
||||||
|
"SkipTLSVerify", False):
|
||||||
|
verify = True
|
||||||
|
certs[endpoint] = TLSConfig(
|
||||||
|
client_cert=(cert, key), ca_cert=ca_cert, verify=verify)
|
||||||
|
self.tls_cfg = certs
|
||||||
|
self.tls_path = tls_dir
|
||||||
|
|
||||||
|
def save(self):
|
||||||
|
meta_dir = get_meta_dir(self.name)
|
||||||
|
if not os.path.isdir(meta_dir):
|
||||||
|
os.makedirs(meta_dir)
|
||||||
|
with open(get_meta_file(self.name), "w") as f:
|
||||||
|
f.write(json.dumps(self.Metadata))
|
||||||
|
|
||||||
|
tls_dir = get_tls_dir(self.name)
|
||||||
|
for endpoint, tls in self.tls_cfg.items():
|
||||||
|
if not os.path.isdir(os.path.join(tls_dir, endpoint)):
|
||||||
|
os.makedirs(os.path.join(tls_dir, endpoint))
|
||||||
|
|
||||||
|
ca_file = tls.ca_cert
|
||||||
|
if ca_file:
|
||||||
|
copyfile(ca_file, os.path.join(
|
||||||
|
tls_dir, endpoint, os.path.basename(ca_file)))
|
||||||
|
|
||||||
|
if tls.cert:
|
||||||
|
cert_file, key_file = tls.cert
|
||||||
|
copyfile(cert_file, os.path.join(
|
||||||
|
tls_dir, endpoint, os.path.basename(cert_file)))
|
||||||
|
copyfile(key_file, os.path.join(
|
||||||
|
tls_dir, endpoint, os.path.basename(key_file)))
|
||||||
|
|
||||||
|
self.meta_path = get_meta_dir(self.name)
|
||||||
|
self.tls_path = get_tls_dir(self.name)
|
||||||
|
|
||||||
|
def remove(self):
|
||||||
|
if os.path.isdir(self.meta_path):
|
||||||
|
rmtree(self.meta_path)
|
||||||
|
if os.path.isdir(self.tls_path):
|
||||||
|
rmtree(self.tls_path)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<{self.__class__.__name__}: '{self.name}'>"
|
||||||
|
|
||||||
|
def __str__(self):
|
||||||
|
return json.dumps(self.__call__(), indent=2)
|
||||||
|
|
||||||
|
def __call__(self):
|
||||||
|
result = self.Metadata
|
||||||
|
result.update(self.TLSMaterial)
|
||||||
|
result.update(self.Storage)
|
||||||
|
return result
|
||||||
|
|
||||||
|
def is_docker_host(self):
|
||||||
|
return self.context_type is None
|
||||||
|
|
||||||
|
@property
|
||||||
|
def Name(self):
|
||||||
|
return self.name
|
||||||
|
|
||||||
|
@property
|
||||||
|
def Host(self):
|
||||||
|
if not self.orchestrator or self.orchestrator == "swarm":
|
||||||
|
endpoint = self.endpoints.get("docker", None)
|
||||||
|
if endpoint:
|
||||||
|
return endpoint.get("Host", None)
|
||||||
|
return None
|
||||||
|
|
||||||
|
return self.endpoints[self.orchestrator].get("Host", None)
|
||||||
|
|
||||||
|
@property
|
||||||
|
def Orchestrator(self):
|
||||||
|
return self.orchestrator
|
||||||
|
|
||||||
|
@property
|
||||||
|
def Metadata(self):
|
||||||
|
meta = {}
|
||||||
|
if self.orchestrator:
|
||||||
|
meta = {"StackOrchestrator": self.orchestrator}
|
||||||
|
return {
|
||||||
|
"Name": self.name,
|
||||||
|
"Metadata": meta,
|
||||||
|
"Endpoints": self.endpoints
|
||||||
|
}
|
||||||
|
|
||||||
|
@property
|
||||||
|
def TLSConfig(self):
|
||||||
|
key = self.orchestrator
|
||||||
|
if not key or key == "swarm":
|
||||||
|
key = "docker"
|
||||||
|
if key in self.tls_cfg.keys():
|
||||||
|
return self.tls_cfg[key]
|
||||||
|
return None
|
||||||
|
|
||||||
|
@property
|
||||||
|
def TLSMaterial(self):
|
||||||
|
certs = {}
|
||||||
|
for endpoint, tls in self.tls_cfg.items():
|
||||||
|
cert, key = tls.cert
|
||||||
|
certs[endpoint] = list(
|
||||||
|
map(os.path.basename, [tls.ca_cert, cert, key]))
|
||||||
|
return {
|
||||||
|
"TLSMaterial": certs
|
||||||
|
}
|
||||||
|
|
||||||
|
@property
|
||||||
|
def Storage(self):
|
||||||
|
return {
|
||||||
|
"Storage": {
|
||||||
|
"MetadataPath": self.meta_path,
|
||||||
|
"TLSPath": self.tls_path
|
||||||
|
}}
|
||||||
67
tests/unit/plugins/module_utils/_api/test_context.py
Normal file
67
tests/unit/plugins/module_utils/_api/test_context.py
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
# This code is part of the Ansible collection community.docker, but is an independent component.
|
||||||
|
# This particular file, and this file only, is based on the Docker SDK for Python (https://github.com/docker/docker-py/)
|
||||||
|
#
|
||||||
|
# Copyright (c) 2016-2025 Docker, Inc.
|
||||||
|
#
|
||||||
|
# It is licensed under the Apache 2.0 license (see LICENSES/Apache-2.0.txt in this collection)
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
from __future__ import (absolute_import, division, print_function)
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
import unittest
|
||||||
|
|
||||||
|
import pytest
|
||||||
|
|
||||||
|
from ansible_collections.community.docker.plugins.module_utils._api import errors
|
||||||
|
from ansible_collections.community.docker.plugins.module_utils._api.constants import (
|
||||||
|
DEFAULT_NPIPE,
|
||||||
|
DEFAULT_UNIX_SOCKET,
|
||||||
|
IS_WINDOWS_PLATFORM,
|
||||||
|
)
|
||||||
|
from ansible_collections.community.docker.plugins.module_utils._api.context import Context, ContextAPI
|
||||||
|
|
||||||
|
|
||||||
|
class BaseContextTest(unittest.TestCase):
|
||||||
|
@pytest.mark.skipif(
|
||||||
|
IS_WINDOWS_PLATFORM, reason='Linux specific path check'
|
||||||
|
)
|
||||||
|
def test_url_compatibility_on_linux(self):
|
||||||
|
c = Context("test")
|
||||||
|
assert c.Host == DEFAULT_UNIX_SOCKET[5:]
|
||||||
|
|
||||||
|
@pytest.mark.skipif(
|
||||||
|
not IS_WINDOWS_PLATFORM, reason='Windows specific path check'
|
||||||
|
)
|
||||||
|
def test_url_compatibility_on_windows(self):
|
||||||
|
c = Context("test")
|
||||||
|
assert c.Host == DEFAULT_NPIPE
|
||||||
|
|
||||||
|
def test_fail_on_default_context_create(self):
|
||||||
|
with pytest.raises(errors.ContextException):
|
||||||
|
ContextAPI.create_context("default")
|
||||||
|
|
||||||
|
def test_default_in_context_list(self):
|
||||||
|
found = False
|
||||||
|
ctx = ContextAPI.contexts()
|
||||||
|
for c in ctx:
|
||||||
|
if c.Name == "default":
|
||||||
|
found = True
|
||||||
|
assert found is True
|
||||||
|
|
||||||
|
def test_get_current_context(self):
|
||||||
|
assert ContextAPI.get_current_context().Name == "default"
|
||||||
|
|
||||||
|
def test_https_host(self):
|
||||||
|
c = Context("test", host="tcp://testdomain:8080", tls=True)
|
||||||
|
assert c.Host == "https://testdomain:8080"
|
||||||
|
|
||||||
|
def test_context_inspect_without_params(self):
|
||||||
|
ctx = ContextAPI.inspect_context()
|
||||||
|
assert ctx["Name"] == "default"
|
||||||
|
assert ctx["Metadata"]["StackOrchestrator"] == "swarm"
|
||||||
|
assert ctx["Endpoints"]["docker"]["Host"] in (
|
||||||
|
DEFAULT_NPIPE,
|
||||||
|
DEFAULT_UNIX_SOCKET[5:],
|
||||||
|
)
|
||||||
Loading…
Reference in New Issue
Block a user