mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-11 00:44:20 -05:00
607 lines
23 KiB
Go
607 lines
23 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
// This binary can be build from siderolabs/talos projects. Located at:
|
|
// https://github.com/siderolabs/talos/tree/master/hack/docgen
|
|
//
|
|
//go:generate docgen ./state.go ./state_doc.go Configuration
|
|
|
|
// package state defines the structure of the Constellation state file.
|
|
package state
|
|
|
|
import (
|
|
"encoding/hex"
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
|
|
"dario.cat/mergo"
|
|
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
|
|
"github.com/edgelesssys/constellation/v2/internal/constants"
|
|
"github.com/edgelesssys/constellation/v2/internal/file"
|
|
"github.com/edgelesssys/constellation/v2/internal/semver"
|
|
"github.com/edgelesssys/constellation/v2/internal/validation"
|
|
)
|
|
|
|
const (
|
|
// Version1 is the first version of the state file.
|
|
Version1 = "v1"
|
|
)
|
|
|
|
const (
|
|
// PreCreate are the constraints that should be enforced when the state file
|
|
// is validated before cloud infrastructure is created.
|
|
PreCreate ConstraintSet = iota
|
|
// PreInit are the constraints that should be enforced when the state file
|
|
// is validated before the first Constellation node is initialized.
|
|
PreInit
|
|
// PostInit are the constraints that should be enforced when the state file
|
|
// is validated after the cluster was initialized.
|
|
PostInit
|
|
)
|
|
|
|
// ConstraintSet defines which constraints the state file
|
|
// should be validated against.
|
|
type ConstraintSet int
|
|
|
|
// ReadFromFile reads the state file at the given path and validates it.
|
|
// If the state file is valid, the state is returned. Otherwise, an error
|
|
// describing why the validation failed is returned.
|
|
func ReadFromFile(fileHandler file.Handler, path string) (*State, error) {
|
|
state := &State{}
|
|
if err := fileHandler.ReadYAML(path, &state); err != nil {
|
|
return nil, fmt.Errorf("reading state file: %w", err)
|
|
}
|
|
|
|
return state, nil
|
|
}
|
|
|
|
// CreateOrRead reads the state file at the given path, if it exists, and returns the state.
|
|
// If the file does not exist, a new state is created and written to disk.
|
|
func CreateOrRead(fileHandler file.Handler, path string) (*State, error) {
|
|
state, err := ReadFromFile(fileHandler, path)
|
|
if err != nil {
|
|
if !errors.Is(err, os.ErrNotExist) {
|
|
return nil, fmt.Errorf("reading state file: %w", err)
|
|
}
|
|
newState := New()
|
|
return newState, newState.WriteToFile(fileHandler, path)
|
|
}
|
|
return state, nil
|
|
}
|
|
|
|
// State describe the entire state to describe a Constellation cluster.
|
|
type State struct {
|
|
// description: |
|
|
// Schema version of this state file.
|
|
Version string `yaml:"version"`
|
|
|
|
// TODO(msanft): Add link to self-managed infrastructure docs once existing.
|
|
|
|
// description: |
|
|
// State of the cluster's cloud resources. These values are retrieved during
|
|
// cluster creation. In the case of self-managed infrastructure, the marked
|
|
// fields in this struct should be filled by the user as per
|
|
// https://docs.edgeless.systems/constellation/workflows/create.
|
|
Infrastructure Infrastructure `yaml:"infrastructure"`
|
|
// description: |
|
|
// DO NOT EDIT. State of the Constellation Kubernetes cluster.
|
|
// These values are set during cluster initialization and should not be changed.
|
|
ClusterValues ClusterValues `yaml:"clusterValues"`
|
|
}
|
|
|
|
// ClusterValues describe the (Kubernetes) cluster state, set during initialization of the cluster.
|
|
type ClusterValues struct {
|
|
// description: |
|
|
// Unique identifier of the cluster.
|
|
ClusterID string `yaml:"clusterID"`
|
|
// description: |
|
|
// Unique identifier of the owner of the cluster.
|
|
OwnerID string `yaml:"ownerID"`
|
|
// description: |
|
|
// Salt used to generate the ClusterID on the bootstrapping node.
|
|
MeasurementSalt HexBytes `yaml:"measurementSalt"`
|
|
}
|
|
|
|
// Infrastructure describe the state related to the cloud resources of the cluster.
|
|
type Infrastructure struct {
|
|
// description: |
|
|
// Unique identifier the cluster's cloud resources are tagged with.
|
|
UID string `yaml:"uid"`
|
|
// description: |
|
|
// Endpoint the cluster can be reached at. This is the endpoint that is being used by the CLI.
|
|
ClusterEndpoint string `yaml:"clusterEndpoint"`
|
|
// description: |
|
|
// The Cluster uses to reach itself. This might differ from the ClusterEndpoint in case e.g.,
|
|
// an internal load balancer is used.
|
|
InClusterEndpoint string `yaml:"inClusterEndpoint"`
|
|
// description: |
|
|
// Secret used to authenticate the bootstrapping node.
|
|
InitSecret HexBytes `yaml:"initSecret"`
|
|
// description: |
|
|
// List of Subject Alternative Names (SANs) to add to the Kubernetes API server certificate.
|
|
// If no SANs should be added, this field can be left empty.
|
|
APIServerCertSANs []string `yaml:"apiServerCertSANs"`
|
|
// description: |
|
|
// Name used in the cluster's named resources.
|
|
Name string `yaml:"name"`
|
|
// description: |
|
|
// CIDR range of the cluster's nodes.
|
|
IPCidrNode string `yaml:"ipCidrNode"`
|
|
// description: |
|
|
// Values specific to a Constellation cluster running on Azure.
|
|
Azure *Azure `yaml:"azure,omitempty"`
|
|
// description: |
|
|
// Values specific to a Constellation cluster running on GCP.
|
|
GCP *GCP `yaml:"gcp,omitempty"`
|
|
}
|
|
|
|
// GCP describes the infra state related to GCP.
|
|
type GCP struct {
|
|
// description: |
|
|
// Project ID of the GCP project the cluster is running in.
|
|
ProjectID string `yaml:"projectID"`
|
|
// description: |
|
|
// CIDR range of the cluster's pods.
|
|
IPCidrPod string `yaml:"ipCidrPod"`
|
|
}
|
|
|
|
// Azure describes the infra state related to Azure.
|
|
type Azure struct {
|
|
// description: |
|
|
// Resource Group the cluster's resources are placed in.
|
|
ResourceGroup string `yaml:"resourceGroup"`
|
|
// description: |
|
|
// ID of the Azure subscription the cluster is running in.
|
|
SubscriptionID string `yaml:"subscriptionID"`
|
|
// description: |
|
|
// Security group name of the cluster's resource group.
|
|
NetworkSecurityGroupName string `yaml:"networkSecurityGroupName"`
|
|
// description: |
|
|
// Name of the cluster's load balancer.
|
|
LoadBalancerName string `yaml:"loadBalancerName"`
|
|
// description: |
|
|
// ID of the UAMI the cluster's nodes are running with.
|
|
UserAssignedIdentity string `yaml:"userAssignedIdentity"`
|
|
// description: |
|
|
// MAA endpoint that can be used as a fallback for veryifying the ID key digests
|
|
// in the cluster's attestation report if the enforcement policy is set accordingly.
|
|
// Can be left empty otherwise.
|
|
AttestationURL string `yaml:"attestationURL"`
|
|
}
|
|
|
|
// New creates a new cluster state (file).
|
|
func New() *State {
|
|
return &State{
|
|
Version: Version1,
|
|
}
|
|
}
|
|
|
|
// SetInfrastructure sets the infrastructure state.
|
|
func (s *State) SetInfrastructure(infrastructure Infrastructure) *State {
|
|
s.Infrastructure = infrastructure
|
|
return s
|
|
}
|
|
|
|
// SetClusterValues sets the cluster values.
|
|
func (s *State) SetClusterValues(clusterValues ClusterValues) *State {
|
|
s.ClusterValues = clusterValues
|
|
return s
|
|
}
|
|
|
|
// WriteToFile writes the state to the given path, overwriting any existing file.
|
|
func (s *State) WriteToFile(fileHandler file.Handler, path string) error {
|
|
if err := fileHandler.WriteYAML(path, s, file.OptMkdirAll, file.OptOverwrite); err != nil {
|
|
return fmt.Errorf("writing state file: %w", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Merge merges the state information from other into the current state.
|
|
// If a field is set in both states, the value of the other state is used.
|
|
func (s *State) Merge(other *State) (*State, error) {
|
|
if err := mergo.Merge(s, other, mergo.WithOverride); err != nil {
|
|
return nil, fmt.Errorf("merging state file: %w", err)
|
|
}
|
|
return s, nil
|
|
}
|
|
|
|
/*
|
|
Validate validates the state against the given constraint set and CSP, which can be one of
|
|
- PreCreate, which is the constraint set that should be enforced before "constellation create" is run.
|
|
- PreInit, which is the constraint set that should be enforced before "constellation apply" is run.
|
|
- PostInit, which is the constraint set that should be enforced after "constellation apply" is run.
|
|
*/
|
|
func (s *State) Validate(constraintSet ConstraintSet, csp cloudprovider.Provider) error {
|
|
v := validation.NewValidator()
|
|
|
|
switch constraintSet {
|
|
case PreCreate:
|
|
return v.Validate(s, validation.ValidateOptions{
|
|
OverrideConstraints: s.preCreateConstraints,
|
|
})
|
|
case PreInit:
|
|
return v.Validate(s, validation.ValidateOptions{
|
|
OverrideConstraints: s.preInitConstraints,
|
|
})
|
|
case PostInit:
|
|
return v.Validate(s, validation.ValidateOptions{
|
|
OverrideConstraints: s.postInitConstraints(csp),
|
|
})
|
|
default:
|
|
return errors.New("unknown constraint set")
|
|
}
|
|
}
|
|
|
|
// preCreateConstraints are the constraints on the state that should be enforced
|
|
// before a Constellation cluster is created.
|
|
//
|
|
// The constraints check if the state file version is valid,
|
|
// and if all fields are empty, which is a requirement pre-create.
|
|
func (s *State) preCreateConstraints() []*validation.Constraint {
|
|
return []*validation.Constraint{
|
|
// state version needs to be accepted by the parsing CLI.
|
|
validation.OneOf(s.Version, []string{Version1}).
|
|
WithFieldTrace(s, &s.Version),
|
|
// Infrastructure must be empty.
|
|
// As the infrastructure struct contains slices, we cannot use the
|
|
// Empty constraint on the entire struct. Instead, we need to check
|
|
// each field individually.
|
|
validation.Empty(s.Infrastructure.UID).
|
|
WithFieldTrace(s, &s.Infrastructure.UID),
|
|
validation.Empty(s.Infrastructure.ClusterEndpoint).
|
|
WithFieldTrace(s, &s.Infrastructure.ClusterEndpoint),
|
|
validation.Empty(s.Infrastructure.InClusterEndpoint).
|
|
WithFieldTrace(s, &s.Infrastructure.InClusterEndpoint),
|
|
validation.Empty(s.Infrastructure.Name).
|
|
WithFieldTrace(s, &s.Infrastructure.Name),
|
|
validation.Empty(s.Infrastructure.IPCidrNode).
|
|
WithFieldTrace(s, &s.Infrastructure.IPCidrNode),
|
|
validation.EmptySlice(s.Infrastructure.APIServerCertSANs).
|
|
WithFieldTrace(s, &s.Infrastructure.APIServerCertSANs),
|
|
validation.EmptySlice(s.Infrastructure.InitSecret).
|
|
WithFieldTrace(s, &s.Infrastructure.InitSecret),
|
|
// ClusterValues must be empty.
|
|
// As the clusterValues struct contains slices, we cannot use the
|
|
// Empty constraint on the entire struct. Instead, we need to check
|
|
// each field individually.
|
|
validation.Empty(s.ClusterValues.ClusterID).
|
|
WithFieldTrace(s, &s.ClusterValues.ClusterID),
|
|
// ownerID is currently unused as functionality is not implemented
|
|
// Therefore, we don't want to validate it
|
|
// validation.Empty(s.ClusterValues.OwnerID).
|
|
// WithFieldTrace(s, &s.ClusterValues.OwnerID),
|
|
validation.EmptySlice(s.ClusterValues.MeasurementSalt).
|
|
WithFieldTrace(s, &s.ClusterValues.MeasurementSalt),
|
|
}
|
|
}
|
|
|
|
// preInitConstraints are the constraints on the state that should be enforced
|
|
// *before* a Constellation cluster is initialized. (i.e. before "constellation apply" is run.)
|
|
//
|
|
// The constraints check if the infrastructure state is valid, and if the cluster values
|
|
// are empty, which is required for the cluster to initialize correctly.
|
|
func (s *State) preInitConstraints() []*validation.Constraint {
|
|
return []*validation.Constraint{
|
|
// state version needs to be accepted by the parsing CLI.
|
|
validation.OneOf(s.Version, []string{Version1}).
|
|
WithFieldTrace(s, &s.Version),
|
|
// infrastructure must be valid.
|
|
// out-of-cluster endpoint needs to be a valid DNS name or IP address.
|
|
validation.Or(
|
|
validation.DNSName(s.Infrastructure.ClusterEndpoint).
|
|
WithFieldTrace(s, &s.Infrastructure.ClusterEndpoint),
|
|
validation.IPAddress(s.Infrastructure.ClusterEndpoint).
|
|
WithFieldTrace(s, &s.Infrastructure.ClusterEndpoint),
|
|
),
|
|
// in-cluster endpoint needs to be a valid DNS name or IP address.
|
|
validation.Or(
|
|
validation.DNSName(s.Infrastructure.InClusterEndpoint).
|
|
WithFieldTrace(s, &s.Infrastructure.InClusterEndpoint),
|
|
validation.IPAddress(s.Infrastructure.InClusterEndpoint).
|
|
WithFieldTrace(s, &s.Infrastructure.InClusterEndpoint),
|
|
),
|
|
// Node IP Cidr needs to be a valid CIDR range.
|
|
validation.CIDR(s.Infrastructure.IPCidrNode).
|
|
WithFieldTrace(s, &s.Infrastructure.IPCidrNode),
|
|
// UID needs to be filled.
|
|
validation.NotEmpty(s.Infrastructure.UID).
|
|
WithFieldTrace(s, &s.Infrastructure.UID),
|
|
// Name needs to be filled.
|
|
validation.NotEmpty(s.Infrastructure.Name).
|
|
WithFieldTrace(s, &s.Infrastructure.Name),
|
|
// GCP values need to be nil, empty, or valid.
|
|
validation.Or(
|
|
validation.Or(
|
|
// nil.
|
|
validation.Equal(s.Infrastructure.GCP, nil).
|
|
WithFieldTrace(s, &s.Infrastructure.GCP),
|
|
// empty.
|
|
validation.IfNotNil(
|
|
s.Infrastructure.GCP,
|
|
func() *validation.Constraint {
|
|
return validation.Empty(*s.Infrastructure.GCP).
|
|
WithFieldTrace(s, &s.Infrastructure.GCP)
|
|
},
|
|
),
|
|
),
|
|
// valid.
|
|
validation.IfNotNil(
|
|
s.Infrastructure.GCP,
|
|
func() *validation.Constraint {
|
|
return validation.And(
|
|
validation.EvaluateAll,
|
|
// ProjectID needs to be filled.
|
|
validation.NotEmpty(s.Infrastructure.GCP.ProjectID).
|
|
WithFieldTrace(s, &s.Infrastructure.GCP.ProjectID),
|
|
// Pod IP Cidr needs to be a valid CIDR range.
|
|
validation.CIDR(s.Infrastructure.GCP.IPCidrPod).
|
|
WithFieldTrace(s, &s.Infrastructure.GCP.IPCidrPod),
|
|
)
|
|
},
|
|
),
|
|
),
|
|
// Azure values need to be nil, empty, or valid.
|
|
validation.Or(
|
|
validation.Or(
|
|
// nil.
|
|
validation.Equal(s.Infrastructure.Azure, nil).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure),
|
|
// empty.
|
|
validation.IfNotNil(
|
|
s.Infrastructure.Azure,
|
|
func() *validation.Constraint {
|
|
return validation.And(
|
|
validation.EvaluateAll,
|
|
validation.Empty(s.Infrastructure.Azure.ResourceGroup).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.ResourceGroup),
|
|
validation.Empty(s.Infrastructure.Azure.SubscriptionID).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.SubscriptionID),
|
|
validation.Empty(s.Infrastructure.Azure.NetworkSecurityGroupName).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.NetworkSecurityGroupName),
|
|
validation.Empty(s.Infrastructure.Azure.LoadBalancerName).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.LoadBalancerName),
|
|
validation.Empty(s.Infrastructure.Azure.UserAssignedIdentity).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.UserAssignedIdentity),
|
|
validation.Empty(s.Infrastructure.Azure.AttestationURL).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.AttestationURL),
|
|
)
|
|
},
|
|
),
|
|
),
|
|
// valid.
|
|
validation.IfNotNil(
|
|
s.Infrastructure.Azure,
|
|
func() *validation.Constraint {
|
|
return validation.And(
|
|
validation.EvaluateAll,
|
|
validation.NotEmpty(s.Infrastructure.Azure.ResourceGroup).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.ResourceGroup),
|
|
validation.NotEmpty(s.Infrastructure.Azure.SubscriptionID).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.SubscriptionID),
|
|
validation.NotEmpty(s.Infrastructure.Azure.NetworkSecurityGroupName).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.NetworkSecurityGroupName),
|
|
validation.NotEmpty(s.Infrastructure.Azure.LoadBalancerName).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.LoadBalancerName),
|
|
validation.NotEmpty(s.Infrastructure.Azure.UserAssignedIdentity).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.UserAssignedIdentity),
|
|
validation.NotEmpty(s.Infrastructure.Azure.AttestationURL).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.AttestationURL),
|
|
)
|
|
},
|
|
),
|
|
),
|
|
// ClusterValues must be empty.
|
|
// As the clusterValues struct contains slices, we cannot use the
|
|
// Empty constraint on the entire struct. Instead, we need to check
|
|
// each field individually.
|
|
validation.Empty(s.ClusterValues.ClusterID).
|
|
WithFieldTrace(s, &s.ClusterValues.ClusterID),
|
|
// ownerID is currently unused as functionality is not implemented
|
|
// Therefore, we don't want to validate it
|
|
// validation.Empty(s.ClusterValues.OwnerID).
|
|
// WithFieldTrace(s, &s.ClusterValues.OwnerID),
|
|
validation.EmptySlice(s.ClusterValues.MeasurementSalt).
|
|
WithFieldTrace(s, &s.ClusterValues.MeasurementSalt),
|
|
}
|
|
}
|
|
|
|
// postInitConstraints are the constraints on the state that should be enforced
|
|
// *after* a Constellation cluster is initialized. (i.e. before "constellation apply" is run.)
|
|
//
|
|
// The constraints check if the infrastructure state and cluster state
|
|
// is valid, so that the cluster can be used correctly.
|
|
func (s *State) postInitConstraints(csp cloudprovider.Provider) func() []*validation.Constraint {
|
|
return func() []*validation.Constraint {
|
|
constraints := []*validation.Constraint{
|
|
// state version needs to be accepted by the parsing CLI.
|
|
validation.OneOf(s.Version, []string{Version1}).
|
|
WithFieldTrace(s, &s.Version),
|
|
// infrastructure must be valid.
|
|
// out-of-cluster endpoint needs to be a valid DNS name or IP address.
|
|
validation.Or(
|
|
validation.DNSName(s.Infrastructure.ClusterEndpoint).
|
|
WithFieldTrace(s, &s.Infrastructure.ClusterEndpoint),
|
|
validation.IPAddress(s.Infrastructure.ClusterEndpoint).
|
|
WithFieldTrace(s, &s.Infrastructure.ClusterEndpoint),
|
|
),
|
|
// in-cluster endpoint needs to be a valid DNS name or IP address.
|
|
validation.Or(
|
|
validation.DNSName(s.Infrastructure.InClusterEndpoint).
|
|
WithFieldTrace(s, &s.Infrastructure.InClusterEndpoint),
|
|
validation.IPAddress(s.Infrastructure.InClusterEndpoint).
|
|
WithFieldTrace(s, &s.Infrastructure.InClusterEndpoint),
|
|
),
|
|
// Node IP Cidr needs to be a valid CIDR range.
|
|
validation.CIDR(s.Infrastructure.IPCidrNode).
|
|
WithFieldTrace(s, &s.Infrastructure.IPCidrNode),
|
|
// UID needs to be filled.
|
|
validation.NotEmpty(s.Infrastructure.UID).
|
|
WithFieldTrace(s, &s.Infrastructure.UID),
|
|
// Name needs to be filled.
|
|
validation.NotEmpty(s.Infrastructure.Name).
|
|
WithFieldTrace(s, &s.Infrastructure.Name),
|
|
// ClusterValues need to be valid.
|
|
// ClusterID needs to be filled.
|
|
validation.NotEmpty(s.ClusterValues.ClusterID).
|
|
WithFieldTrace(s, &s.ClusterValues.ClusterID),
|
|
// ownerID is currently unused as functionality is not implemented
|
|
// Therefore, we don't want to validate it
|
|
// validation.NotEmpty(s.ClusterValues.OwnerID).
|
|
// WithFieldTrace(s, &s.ClusterValues.OwnerID),
|
|
// MeasurementSalt needs to be filled.
|
|
validation.NotEmptySlice(s.ClusterValues.MeasurementSalt).
|
|
WithFieldTrace(s, &s.ClusterValues.MeasurementSalt),
|
|
}
|
|
|
|
switch csp {
|
|
case cloudprovider.Azure:
|
|
constraints = append(constraints,
|
|
// GCP values need to be nil or empty.
|
|
validation.Or(
|
|
validation.Equal(s.Infrastructure.GCP, nil).
|
|
WithFieldTrace(s, &s.Infrastructure.GCP),
|
|
validation.IfNotNil(
|
|
s.Infrastructure.GCP,
|
|
func() *validation.Constraint {
|
|
return validation.Empty(s.Infrastructure.GCP).
|
|
WithFieldTrace(s, &s.Infrastructure.GCP)
|
|
},
|
|
)),
|
|
// Azure values need to be valid.
|
|
validation.IfNotNil(
|
|
s.Infrastructure.Azure,
|
|
func() *validation.Constraint {
|
|
return validation.And(
|
|
validation.EvaluateAll,
|
|
validation.NotEmpty(s.Infrastructure.Azure.ResourceGroup).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.ResourceGroup),
|
|
validation.NotEmpty(s.Infrastructure.Azure.SubscriptionID).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.SubscriptionID),
|
|
validation.NotEmpty(s.Infrastructure.Azure.NetworkSecurityGroupName).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.NetworkSecurityGroupName),
|
|
validation.NotEmpty(s.Infrastructure.Azure.LoadBalancerName).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.LoadBalancerName),
|
|
validation.NotEmpty(s.Infrastructure.Azure.UserAssignedIdentity).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.UserAssignedIdentity),
|
|
validation.NotEmpty(s.Infrastructure.Azure.AttestationURL).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure.AttestationURL),
|
|
)
|
|
},
|
|
),
|
|
)
|
|
case cloudprovider.GCP:
|
|
constraints = append(constraints,
|
|
// Azure values need to be nil or empty.
|
|
validation.Or(
|
|
validation.Equal(s.Infrastructure.Azure, nil).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure),
|
|
validation.IfNotNil(
|
|
s.Infrastructure.Azure,
|
|
func() *validation.Constraint {
|
|
return validation.Empty(s.Infrastructure.Azure).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure)
|
|
},
|
|
)),
|
|
// GCP values need to be valid.
|
|
validation.IfNotNil(
|
|
s.Infrastructure.GCP,
|
|
func() *validation.Constraint {
|
|
return validation.And(
|
|
validation.EvaluateAll,
|
|
// ProjectID needs to be filled.
|
|
validation.NotEmpty(s.Infrastructure.GCP.ProjectID).
|
|
WithFieldTrace(s, &s.Infrastructure.GCP.ProjectID),
|
|
// Pod IP Cidr needs to be a valid CIDR range.
|
|
validation.CIDR(s.Infrastructure.GCP.IPCidrPod).
|
|
WithFieldTrace(s, &s.Infrastructure.GCP.IPCidrPod),
|
|
)
|
|
},
|
|
),
|
|
)
|
|
default:
|
|
constraints = append(constraints,
|
|
// GCP values need to be nil or empty.
|
|
validation.Or(
|
|
validation.Equal(s.Infrastructure.GCP, nil).
|
|
WithFieldTrace(s, &s.Infrastructure.GCP),
|
|
validation.IfNotNil(
|
|
s.Infrastructure.GCP,
|
|
func() *validation.Constraint {
|
|
return validation.Empty(s.Infrastructure.GCP).
|
|
WithFieldTrace(s, &s.Infrastructure.GCP)
|
|
},
|
|
)),
|
|
// Azure values need to be nil or empty.
|
|
validation.Or(
|
|
validation.Equal(s.Infrastructure.Azure, nil).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure),
|
|
validation.IfNotNil(
|
|
s.Infrastructure.Azure,
|
|
func() *validation.Constraint {
|
|
return validation.Empty(s.Infrastructure.Azure).
|
|
WithFieldTrace(s, &s.Infrastructure.Azure)
|
|
},
|
|
)),
|
|
)
|
|
}
|
|
return constraints
|
|
}
|
|
}
|
|
|
|
// Constraints is a no-op implementation to fulfill the "Validatable" interface.
|
|
func (s *State) Constraints() []*validation.Constraint {
|
|
return []*validation.Constraint{}
|
|
}
|
|
|
|
// Migrate migrates the state to the current version.
|
|
// This is mostly done to pass the validation of the current version.
|
|
// The infrastructure will be overwritten by the terraform outputs after the validation.
|
|
func (s *State) Migrate() error {
|
|
// In v2.13.0 the ClusterEndpoint and InClusterEndpoint fields were added.
|
|
// So they are expected to be empty when upgrading to this version.
|
|
// TODO(3u13r): Remove on main after v2.13.0 is released.
|
|
if constants.BinaryVersion().MajorMinorEqual(semver.NewFromInt(2, 13, 0, "")) {
|
|
if s.Infrastructure.InClusterEndpoint == "" {
|
|
s.Infrastructure.InClusterEndpoint = s.Infrastructure.ClusterEndpoint
|
|
}
|
|
if s.Infrastructure.IPCidrNode == "" {
|
|
s.Infrastructure.IPCidrNode = "192.168.2.1/32"
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// HexBytes is a byte slice that is marshalled to and from a hex string.
|
|
type HexBytes []byte
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
|
func (h *HexBytes) UnmarshalYAML(unmarshal func(any) error) error {
|
|
var hexString string
|
|
if err := unmarshal(&hexString); err != nil {
|
|
// TODO(msanft): Remove with v2.14.0
|
|
// fall back to unmarshalling as a byte slice for backwards compatibility
|
|
var oldHexBytes []byte
|
|
if err := unmarshal(&oldHexBytes); err != nil {
|
|
return fmt.Errorf("unmarshalling hex bytes: %w", err)
|
|
}
|
|
hexString = hex.EncodeToString(oldHexBytes)
|
|
}
|
|
|
|
bytes, err := hex.DecodeString(hexString)
|
|
if err != nil {
|
|
return fmt.Errorf("decoding hex bytes: %w", err)
|
|
}
|
|
|
|
*h = bytes
|
|
return nil
|
|
}
|
|
|
|
// MarshalYAML implements the yaml.Marshaler interface.
|
|
func (h HexBytes) MarshalYAML() (any, error) {
|
|
return hex.EncodeToString(h), nil
|
|
}
|