talos/internal/pkg/configuration/configuration.go
Dmitriy Matrenichev 93e55b85f2
chore: bump golangci-lint to v1.50.0
I had to do several things:
- contextcheck now supports Go 1.18 generics, but I had to disable it because of this https://github.com/kkHAIKE/contextcheck/issues/9
- dupword produces to many false positives, so it's also disabled
- revive found all packages which didn't have a documentation comment before. And tehre is A LOT of them. I updated some of them, but gave up at some point and just added them to exclude rules for now.
- change lint-vulncheck to use `base` stage as base

Signed-off-by: Dmitriy Matrenichev <dmitry.matrenichev@siderolabs.com>
2022-10-20 18:33:19 +03:00

194 lines
5.2 KiB
Go

// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
// Package configuration implements configuration generation.
package configuration
import (
"context"
"fmt"
"net/url"
"os"
"github.com/siderolabs/gen/slices"
"github.com/siderolabs/go-pointer"
"github.com/talos-systems/talos/pkg/machinery/api/machine"
"github.com/talos-systems/talos/pkg/machinery/config"
"github.com/talos-systems/talos/pkg/machinery/config/configloader"
"github.com/talos-systems/talos/pkg/machinery/config/types/v1alpha1"
"github.com/talos-systems/talos/pkg/machinery/config/types/v1alpha1/generate"
v1alpha1machine "github.com/talos-systems/talos/pkg/machinery/config/types/v1alpha1/machine"
"github.com/talos-systems/talos/pkg/machinery/constants"
)
// Generate config for GenerateConfiguration grpc.
//
//nolint:gocyclo,cyclop
func Generate(ctx context.Context, in *machine.GenerateConfigurationRequest) (reply *machine.GenerateConfigurationResponse, err error) {
var c config.Provider
if in.MachineConfig == nil || in.ClusterConfig == nil || in.ClusterConfig.ControlPlane == nil {
return nil, fmt.Errorf("invalid generate request")
}
switch in.ConfigVersion {
case "v1alpha1":
machineType := v1alpha1machine.Type(in.MachineConfig.Type)
options := []generate.GenOption{}
if in.MachineConfig.NetworkConfig != nil {
networkConfig := &v1alpha1.NetworkConfig{
NetworkHostname: in.MachineConfig.NetworkConfig.Hostname,
}
networkInterfaces := in.MachineConfig.NetworkConfig.Interfaces
if len(networkInterfaces) > 0 {
networkConfig.NetworkInterfaces = make([]*v1alpha1.Device, len(networkInterfaces))
for i, device := range networkInterfaces {
iface := &v1alpha1.Device{
DeviceInterface: device.Interface,
DeviceMTU: int(device.Mtu),
DeviceCIDR: device.Cidr,
DeviceDHCP: pointer.To(device.Dhcp),
DeviceIgnore: pointer.To(device.Ignore),
DeviceRoutes: slices.Map(device.Routes, func(route *machine.RouteConfig) *v1alpha1.Route {
return &v1alpha1.Route{
RouteNetwork: route.Network,
RouteGateway: route.Gateway,
RouteMetric: route.Metric,
}
}),
}
if device.DhcpOptions != nil {
iface.DeviceDHCPOptions = &v1alpha1.DHCPOptions{
DHCPRouteMetric: device.DhcpOptions.RouteMetric,
}
}
networkConfig.NetworkInterfaces[i] = iface
}
}
options = append(options, generate.WithNetworkOptions(v1alpha1.WithNetworkConfig(networkConfig)))
}
if in.MachineConfig.InstallConfig != nil {
if in.MachineConfig.InstallConfig.InstallDisk != "" {
options = append(options, generate.WithInstallDisk(in.MachineConfig.InstallConfig.InstallDisk))
}
if in.MachineConfig.InstallConfig.InstallImage != "" {
options = append(options, generate.WithInstallImage(in.MachineConfig.InstallConfig.InstallImage))
}
}
if in.ClusterConfig.ClusterNetwork != nil {
if in.ClusterConfig.ClusterNetwork.DnsDomain != "" {
options = append(options, generate.WithDNSDomain(in.ClusterConfig.ClusterNetwork.DnsDomain))
}
if in.ClusterConfig.ClusterNetwork.CniConfig != nil {
options = append(options, generate.WithClusterCNIConfig(&v1alpha1.CNIConfig{
CNIName: in.ClusterConfig.ClusterNetwork.CniConfig.Name,
CNIUrls: in.ClusterConfig.ClusterNetwork.CniConfig.Urls,
}))
}
}
options = append(options, generate.WithAllowSchedulingOnControlPlanes(in.ClusterConfig.AllowSchedulingOnControlPlanes))
var (
input *generate.Input
cfgBytes []byte
taloscfgBytes []byte
baseConfig config.Provider
secrets *generate.SecretsBundle
)
baseConfig, err = configloader.NewFromFile(constants.ConfigPath)
clock := generate.NewClock()
if in.OverrideTime != nil {
clock.SetFixedTimestamp(in.OverrideTime.AsTime())
}
switch {
case os.IsNotExist(err):
secrets, err = generate.NewSecretsBundle(clock)
if err != nil {
return nil, err
}
case err != nil:
return nil, err
default:
secrets = generate.NewSecretsBundleFromConfig(clock, baseConfig)
}
input, err = generate.NewInput(
in.ClusterConfig.Name,
in.ClusterConfig.ControlPlane.Endpoint,
in.MachineConfig.KubernetesVersion,
secrets,
options...,
)
if err != nil {
return nil, err
}
c, err = generate.Config(
machineType,
input,
)
if err != nil {
return nil, err
}
cfgBytes, err = c.Bytes()
if err != nil {
return nil, err
}
talosconfig, err := generate.Talosconfig(input, options...)
if err != nil {
return nil, err
}
endpoint, err := url.Parse(in.ClusterConfig.ControlPlane.Endpoint)
if err != nil {
return nil, err
}
talosconfig.Contexts[talosconfig.Context].Endpoints = []string{
endpoint.Hostname(),
}
taloscfgBytes, err = talosconfig.Bytes()
if err != nil {
return nil, err
}
reply = &machine.GenerateConfigurationResponse{
Messages: []*machine.GenerateConfiguration{
{
Data: [][]byte{cfgBytes},
Talosconfig: taloscfgBytes,
},
},
}
default:
return nil, fmt.Errorf("unsupported config version %s", in.ConfigVersion)
}
return reply, nil
}