mirror of
				https://gitea.com/Lydanne/buildx.git
				synced 2025-11-04 10:03:42 +08:00 
			
		
		
		
	Tested with `kind` and GKE. Note: "nodes" shown in `docker buildx ls` are unrelated to Kubernetes "nodes". Probably buildx should come up with an alternative term. Usage: $ kind create cluster $ export KUBECONFIG="$(kind get kubeconfig-path --name="kind")" $ docker buildx create --driver kubernetes --driver-opt replicas=3 --use $ docker buildx build -t foo --load . `--load` loads the image into the local Docker. Driver opts: - `image=IMAGE` - Sets the container image to be used for running buildkit. - `namespace=NS` - Sets the Kubernetes namespace. Defaults to the current namespace. - `replicas=N` - Sets the number of `Pod` replicas. Defaults to 1. - `rootless=(true|false)` - Run the container as a non-root user without `securityContext.privileged`. Defaults to false. - `loadbalance=(sticky|random)` - Load-balancing strategy. If set to "sticky", the pod is chosen using the hash of the context path. Defaults to "sticky" Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
		
			
				
	
	
		
			75 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			75 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2015 The Go Authors. All rights reserved.
 | 
						|
// Use of this source code is governed by a BSD-style
 | 
						|
// license that can be found in the LICENSE file.
 | 
						|
 | 
						|
package google
 | 
						|
 | 
						|
import (
 | 
						|
	"crypto/rsa"
 | 
						|
	"fmt"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"golang.org/x/oauth2"
 | 
						|
	"golang.org/x/oauth2/internal"
 | 
						|
	"golang.org/x/oauth2/jws"
 | 
						|
)
 | 
						|
 | 
						|
// JWTAccessTokenSourceFromJSON uses a Google Developers service account JSON
 | 
						|
// key file to read the credentials that authorize and authenticate the
 | 
						|
// requests, and returns a TokenSource that does not use any OAuth2 flow but
 | 
						|
// instead creates a JWT and sends that as the access token.
 | 
						|
// The audience is typically a URL that specifies the scope of the credentials.
 | 
						|
//
 | 
						|
// Note that this is not a standard OAuth flow, but rather an
 | 
						|
// optimization supported by a few Google services.
 | 
						|
// Unless you know otherwise, you should use JWTConfigFromJSON instead.
 | 
						|
func JWTAccessTokenSourceFromJSON(jsonKey []byte, audience string) (oauth2.TokenSource, error) {
 | 
						|
	cfg, err := JWTConfigFromJSON(jsonKey)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("google: could not parse JSON key: %v", err)
 | 
						|
	}
 | 
						|
	pk, err := internal.ParseKey(cfg.PrivateKey)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("google: could not parse key: %v", err)
 | 
						|
	}
 | 
						|
	ts := &jwtAccessTokenSource{
 | 
						|
		email:    cfg.Email,
 | 
						|
		audience: audience,
 | 
						|
		pk:       pk,
 | 
						|
		pkID:     cfg.PrivateKeyID,
 | 
						|
	}
 | 
						|
	tok, err := ts.Token()
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	return oauth2.ReuseTokenSource(tok, ts), nil
 | 
						|
}
 | 
						|
 | 
						|
type jwtAccessTokenSource struct {
 | 
						|
	email, audience string
 | 
						|
	pk              *rsa.PrivateKey
 | 
						|
	pkID            string
 | 
						|
}
 | 
						|
 | 
						|
func (ts *jwtAccessTokenSource) Token() (*oauth2.Token, error) {
 | 
						|
	iat := time.Now()
 | 
						|
	exp := iat.Add(time.Hour)
 | 
						|
	cs := &jws.ClaimSet{
 | 
						|
		Iss: ts.email,
 | 
						|
		Sub: ts.email,
 | 
						|
		Aud: ts.audience,
 | 
						|
		Iat: iat.Unix(),
 | 
						|
		Exp: exp.Unix(),
 | 
						|
	}
 | 
						|
	hdr := &jws.Header{
 | 
						|
		Algorithm: "RS256",
 | 
						|
		Typ:       "JWT",
 | 
						|
		KeyID:     string(ts.pkID),
 | 
						|
	}
 | 
						|
	msg, err := jws.Encode(hdr, cs, ts.pk)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("google: could not encode JWT: %v", err)
 | 
						|
	}
 | 
						|
	return &oauth2.Token{AccessToken: msg, TokenType: "Bearer", Expiry: exp}, nil
 | 
						|
}
 |