mirror of
https://github.com/siderolabs/talos.git
synced 2025-11-01 00:41:40 +01:00
This PR can be split into two parts: * controllers * apid binding into COSI world Controllers ----------- * `k8s.EndpointController` provides control plane endpoints on worker nodes (it isn't required for now on control plane nodes) * `secrets.RootController` now provides OS top-level secrets (CA cert) and secret configuration * `secrets.APIController` generates API secrets (certificates) in a bit different way for workers and control plane nodes: controlplane nodes generate directly, while workers reach out to `trustd` on control plane nodes via `k8s.Endpoint` resource apid Binding ------------ Resource `secrets.API` provides binding to protobuf by converting itself back and forth to protobuf spec. apid no longer receives machine configuration, instead it receives gRPC-backed socket to access Resource API. apid watches `secrets.API` resource, fetches certs and CA from it and uses that in its TLS configuration. Signed-off-by: Andrey Smirnov <smirnov.andrey@gmail.com>
46 lines
1.1 KiB
Go
46 lines
1.1 KiB
Go
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
package secrets
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/cosi-project/runtime/pkg/resource"
|
|
"github.com/cosi-project/runtime/pkg/state"
|
|
)
|
|
|
|
// APIReadyCondition implements condition which waits for the API certs to be ready.
|
|
type APIReadyCondition struct {
|
|
state state.State
|
|
}
|
|
|
|
// NewAPIReadyCondition builds a coondition which waits for the API certs to be ready.
|
|
func NewAPIReadyCondition(state state.State) *APIReadyCondition {
|
|
return &APIReadyCondition{
|
|
state: state,
|
|
}
|
|
}
|
|
|
|
func (condition *APIReadyCondition) String() string {
|
|
return "api certificates"
|
|
}
|
|
|
|
// Wait implements condition interface.
|
|
func (condition *APIReadyCondition) Wait(ctx context.Context) error {
|
|
_, err := condition.state.WatchFor(
|
|
ctx,
|
|
resource.NewMetadata(NamespaceName, APIType, APIID, resource.VersionUndefined),
|
|
state.WithCondition(func(r resource.Resource) (bool, error) {
|
|
if resource.IsTombstone(r) {
|
|
return false, nil
|
|
}
|
|
|
|
return true, nil
|
|
}),
|
|
)
|
|
|
|
return err
|
|
}
|