-
Notifications
You must be signed in to change notification settings - Fork 233
/
Copy pathbuilder.go
363 lines (314 loc) · 13.2 KB
/
builder.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
package builder
import (
"encoding/json"
"fmt"
"strings"
"github.com/go-openapi/swag"
"github.com/openshift/assisted-service/internal/common"
"github.com/openshift/assisted-service/internal/installcfg"
"github.com/openshift/assisted-service/internal/network"
"github.com/openshift/assisted-service/internal/provider/registry"
"github.com/openshift/assisted-service/models"
"github.com/openshift/assisted-service/pkg/mirrorregistries"
"github.com/pkg/errors"
"github.com/sirupsen/logrus"
"github.com/thoas/go-funk"
)
const minimalOpenShiftVersionForImageDigestSupport = "4.14.0-0.0"
//go:generate mockgen -source=builder.go -package=builder -destination=mock_installcfg.go
type InstallConfigBuilder interface {
GetInstallConfig(cluster *common.Cluster, clusterInfraenvs []*common.InfraEnv, rhRootCA string) ([]byte, error)
ValidateInstallConfigPatch(cluster *common.Cluster, clusterInfraenvs []*common.InfraEnv, patch string) error
}
type installConfigBuilder struct {
log logrus.FieldLogger
mirrorRegistriesBuilder mirrorregistries.ServiceMirrorRegistriesConfigBuilder
providerRegistry registry.ProviderRegistry
}
func NewInstallConfigBuilder(
log logrus.FieldLogger,
mirrorRegistriesBuilder mirrorregistries.ServiceMirrorRegistriesConfigBuilder,
providerRegistry registry.ProviderRegistry) InstallConfigBuilder {
return &installConfigBuilder{
log: log,
mirrorRegistriesBuilder: mirrorRegistriesBuilder,
providerRegistry: providerRegistry,
}
}
func (i *installConfigBuilder) countHostsByRole(cluster *common.Cluster, role models.HostRole) int {
var count int
for _, host := range cluster.Hosts {
if common.GetEffectiveRole(host) == role {
count += 1
}
}
return count
}
func (i *installConfigBuilder) generateNoProxy(cluster *common.Cluster) string {
noProxy := strings.TrimSpace(cluster.NoProxy)
if noProxy == "*" {
return noProxy
}
splitNoProxy := funk.FilterString(strings.Split(noProxy, ","), func(s string) bool { return s != "" })
// Add internal OCP DNS domain
splitNoProxy = append(splitNoProxy, "."+cluster.Name+"."+cluster.BaseDNSDomain)
// Add cluster networks, service networks and machine networks
for _, clusterNetwork := range cluster.ClusterNetworks {
splitNoProxy = append(splitNoProxy, string(clusterNetwork.Cidr))
}
for _, serviceNetwork := range cluster.ServiceNetworks {
splitNoProxy = append(splitNoProxy, string(serviceNetwork.Cidr))
}
for _, machineNetwork := range cluster.MachineNetworks {
splitNoProxy = append(splitNoProxy, string(machineNetwork.Cidr))
}
return strings.Join(splitNoProxy, ",")
}
func (i *installConfigBuilder) getBasicInstallConfig(cluster *common.Cluster) (*installcfg.InstallerConfigBaremetal, error) {
networkType := swag.StringValue(cluster.NetworkType)
i.log.Infof("Selected network type %s for cluster %s", networkType, cluster.ID.String())
cfg := &installcfg.InstallerConfigBaremetal{
APIVersion: "v1",
BaseDomain: cluster.BaseDNSDomain,
Metadata: struct {
Name string `json:"name"`
}{
Name: cluster.Name,
},
Compute: []struct {
Hyperthreading string `json:"hyperthreading,omitempty"`
Name string `json:"name"`
Replicas int `json:"replicas"`
}{
{
Hyperthreading: i.getHypethreadingConfiguration(cluster, "worker"),
Name: string(models.HostRoleWorker),
Replicas: i.countHostsByRole(cluster, models.HostRoleWorker),
},
},
ControlPlane: struct {
Hyperthreading string `json:"hyperthreading,omitempty"`
Name string `json:"name"`
Replicas int `json:"replicas"`
}{
Hyperthreading: i.getHypethreadingConfiguration(cluster, "master"),
Name: string(models.HostRoleMaster),
Replicas: i.countHostsByRole(cluster, models.HostRoleMaster),
},
PullSecret: cluster.PullSecret,
SSHKey: cluster.SSHPublicKey,
}
cfg.Networking.NetworkType = networkType
for _, network := range cluster.ClusterNetworks {
cfg.Networking.ClusterNetwork = append(cfg.Networking.ClusterNetwork,
installcfg.ClusterNetwork{Cidr: string(network.Cidr), HostPrefix: int(network.HostPrefix)})
}
for _, network := range cluster.MachineNetworks {
cfg.Networking.MachineNetwork = append(cfg.Networking.MachineNetwork,
installcfg.MachineNetwork{Cidr: string(network.Cidr)})
}
for _, network := range cluster.ServiceNetworks {
cfg.Networking.ServiceNetwork = append(cfg.Networking.ServiceNetwork, string(network.Cidr))
}
if cluster.HTTPProxy != "" || cluster.HTTPSProxy != "" {
cfg.Proxy = &installcfg.Proxy{
HTTPProxy: cluster.HTTPProxy,
HTTPSProxy: cluster.HTTPSProxy,
NoProxy: i.generateNoProxy(cluster),
}
}
if err := i.handleMirrorRegistry(cfg, cluster); err != nil {
return nil, err
}
return cfg, nil
}
func (i *installConfigBuilder) handleMirrorRegistry(cfg *installcfg.InstallerConfigBaremetal, cluster *common.Cluster) error {
isOpenShiftVersionRecentEnough, err := common.BaseVersionGreaterOrEqual(minimalOpenShiftVersionForImageDigestSupport, cluster.OpenshiftVersion)
if err != nil {
return err
}
configuration, err := cluster.GetMirrorRegistryConfiguration()
if err != nil {
return err
}
i.log.Debugf("found OpenShift version %s, setting mirror registry %+v", cluster.OpenshiftVersion, configuration)
if isOpenShiftVersionRecentEnough {
if err = i.setImageDigestMirrorSet(cfg, configuration); err != nil {
return err
}
} else {
// If version does not support ImageDigestSources, set ImageContent
if err = i.setImageContentSources(cfg, configuration); err != nil {
return err
}
}
return nil
}
func (i *installConfigBuilder) setImageDigestMirrorSet(cfg *installcfg.InstallerConfigBaremetal, configuration *common.MirrorRegistryConfiguration) error {
var imageDigestSourceList []installcfg.ImageDigestSource
// check if mirror registry is configured in the cluster config
if common.IsMirrorConfigurationSet(configuration) {
i.log.Infof("Found cluster mirror configuration, setting imageDigestSourceList with %+v", configuration.ImageDigestMirrors)
imageDigestSourceList = make([]installcfg.ImageDigestSource, len(configuration.ImageDigestMirrors))
for k, _registry := range configuration.ImageDigestMirrors {
mirrors := make([]string, len(_registry.Mirrors))
for j, mirror := range _registry.Mirrors {
mirrors[j] = string(mirror)
}
imageDigestSourceList[k] = installcfg.ImageDigestSource{Source: _registry.Source, Mirrors: mirrors}
}
} else if i.mirrorRegistriesBuilder.IsMirrorRegistriesConfigured() {
// check if mirror registry is configured for the entire env
i.log.Infof("Found service mirror configuration, setting imageDigestSourceList")
mirrorRegistriesConfigs, err := i.mirrorRegistriesBuilder.ExtractLocationMirrorDataFromRegistries()
if err != nil {
i.log.WithError(err).Errorf("Failed to get the mirror registries conf need for ImageDigestSources")
return err
}
imageDigestSourceList = make([]installcfg.ImageDigestSource, len(mirrorRegistriesConfigs))
for j, mirrorRegistriesConfig := range mirrorRegistriesConfigs {
imageDigestSourceList[j] = installcfg.ImageDigestSource{Source: mirrorRegistriesConfig.Location, Mirrors: mirrorRegistriesConfig.Mirror}
}
}
cfg.ImageDigestSources = imageDigestSourceList
return nil
}
func (i *installConfigBuilder) setImageContentSources(cfg *installcfg.InstallerConfigBaremetal, configuration *common.MirrorRegistryConfiguration) error {
var imageContentSourceList []installcfg.ImageContentSource
if common.IsMirrorConfigurationSet(configuration) {
i.log.Infof("Found cluster mirror configuration, setting imageContentSourceList with %+v", configuration.ImageDigestMirrors)
imageContentSourceList = make([]installcfg.ImageContentSource, len(configuration.ImageDigestMirrors))
for j, _registry := range configuration.ImageDigestMirrors {
mirrors := make([]string, len(_registry.Mirrors))
for k, mirror := range _registry.Mirrors {
mirrors[k] = string(mirror)
}
imageContentSourceList[j] = installcfg.ImageContentSource{Source: _registry.Source, Mirrors: mirrors}
}
} else if i.mirrorRegistriesBuilder.IsMirrorRegistriesConfigured() {
mirrorRegistriesConfigs, err := i.mirrorRegistriesBuilder.ExtractLocationMirrorDataFromRegistries()
if err != nil {
i.log.WithError(err).Errorf("Failed to get the mirror registries conf need for ImageContentSources")
return err
}
imageContentSourceList = make([]installcfg.ImageContentSource, len(mirrorRegistriesConfigs))
for j, mirrorRegistriesConfig := range mirrorRegistriesConfigs {
imageContentSourceList[j] = installcfg.ImageContentSource{Source: mirrorRegistriesConfig.Location, Mirrors: mirrorRegistriesConfig.Mirror}
}
}
cfg.DeprecatedImageContentSources = imageContentSourceList
return nil
}
func (i *installConfigBuilder) applyConfigOverrides(overrides string, cfg *installcfg.InstallerConfigBaremetal) error {
if overrides == "" {
return nil
}
overrideDecoder := json.NewDecoder(strings.NewReader(overrides))
overrideDecoder.DisallowUnknownFields()
if err := overrideDecoder.Decode(cfg); err != nil {
return err
}
return nil
}
func (i *installConfigBuilder) getInstallConfig(cluster *common.Cluster, clusterInfraenvs []*common.InfraEnv, rhRootCA string) (*installcfg.InstallerConfigBaremetal, error) {
// We need to ensure the first machine network CIDR containing one of the bootstrap host IPs.
// This is necessary because the cluster-etcd-operator component relies on this specific configuration.
// In most flows this is indirectly happens, but for cluster with user-managed load balancer there might
// be more than one machine network for the nodes, which requires manual set.
// reference - https://github.com/openshift/cluster-etcd-operator/blob/cee7f9bbea0fce240a74872e3c3baf069bc5eaac/pkg/cmd/render/render.go#L490
if network.IsLoadBalancerUserManaged(cluster) {
var err error
cluster.MachineNetworks, err = network.SetBootStrapHostIPRelatedMachineNetworkFirst(cluster, i.log)
if err != nil {
return nil, errors.Wrap(err, "failed to set the bootstap host related machine network as the first machine network element")
}
}
cfg, err := i.getBasicInstallConfig(cluster)
if err != nil {
return nil, err
}
err = i.providerRegistry.AddPlatformToInstallConfig(cfg, cluster, clusterInfraenvs)
if err != nil {
return nil, fmt.Errorf(
"error while adding Platfom %s to install config, error is: %w", common.PlatformTypeValue(cluster.Platform.Type), err)
}
err = i.applyConfigOverrides(cluster.InstallConfigOverrides, cfg)
if err != nil {
return nil, err
}
caContent := i.mergeAllCASources(cluster, clusterInfraenvs, rhRootCA, cfg.AdditionalTrustBundle)
if caContent != "" {
cfg.AdditionalTrustBundle = caContent
}
return cfg, nil
}
func (i *installConfigBuilder) GetInstallConfig(cluster *common.Cluster, clusterInfraenvs []*common.InfraEnv, rhRootCA string) ([]byte, error) {
cfg, err := i.getInstallConfig(cluster, clusterInfraenvs, rhRootCA)
if err != nil {
return nil, err
}
return json.Marshal(*cfg)
}
func (i *installConfigBuilder) ValidateInstallConfigPatch(cluster *common.Cluster, clusterInfraenvs []*common.InfraEnv, patch string) error {
config, err := i.getInstallConfig(cluster, clusterInfraenvs, "")
if err != nil {
return err
}
err = i.applyConfigOverrides(patch, config)
if err != nil {
return err
}
return config.Validate()
}
func (i *installConfigBuilder) getHypethreadingConfiguration(cluster *common.Cluster, machineType string) string {
switch cluster.Hyperthreading {
case models.ClusterHyperthreadingAll:
return "Enabled"
case models.ClusterHyperthreadingMasters:
if machineType == "master" {
return "Enabled"
}
case models.ClusterHyperthreadingWorkers:
if machineType == "worker" {
return "Enabled"
}
}
return "Disabled"
}
// mergeAllCASources merges all the CA sources into a single string, seperated
// by newlines. CA sources include:
// - The Red Hat root CA (used during the product's CI tests),
// - User configured mirror registry CAs
// - Additional trust bundle from the cluster's infraenvs
// - Certs from user-provided install config overrides
func (i *installConfigBuilder) mergeAllCASources(cluster *common.Cluster,
clusterInfraenvs []*common.InfraEnv, rhRootCA string, installConfigOverrideCerts string) string {
certs := []string{}
if installConfigOverrideCerts != "" {
certs = append(certs, installConfigOverrideCerts)
}
if rhRootCA != "" {
certs = append(certs, rhRootCA)
}
if i.mirrorRegistriesBuilder.IsMirrorRegistriesConfigured() {
caContents, err := i.mirrorRegistriesBuilder.GetMirrorCA()
if err == nil {
certs = append(certs, string(caContents))
}
}
mirrorConfiguration, _ := cluster.GetMirrorRegistryConfiguration()
if mirrorConfiguration != nil && mirrorConfiguration.CaBundleCrt != "" {
certs = append(certs, mirrorConfiguration.CaBundleCrt)
}
// Add CA trust bundles from host infraenvs
for _, infraenv := range clusterInfraenvs {
if infraenv.AdditionalTrustBundle != "" {
certs = append(certs, infraenv.AdditionalTrustBundle)
}
mirrorConfiguration, _ = infraenv.GetMirrorRegistryConfiguration()
if mirrorConfiguration != nil && mirrorConfiguration.CaBundleCrt != "" {
certs = append(certs, mirrorConfiguration.CaBundleCrt)
}
}
return strings.TrimSpace(strings.Join(certs, "\n"))
}