2014-03-18 20:00:41 +04:00
|
|
|
package initialize
|
2014-03-05 04:36:05 +04:00
|
|
|
|
|
|
|
import (
|
2014-05-10 07:33:34 +04:00
|
|
|
"errors"
|
2014-03-13 03:52:32 +04:00
|
|
|
"fmt"
|
2014-03-05 04:36:05 +04:00
|
|
|
"log"
|
2014-06-18 23:08:10 +04:00
|
|
|
"path"
|
2014-03-05 04:36:05 +04:00
|
|
|
|
2014-09-28 20:15:25 +04:00
|
|
|
"github.com/coreos/coreos-cloudinit/third_party/gopkg.in/yaml.v1"
|
|
|
|
|
2014-06-18 23:08:10 +04:00
|
|
|
"github.com/coreos/coreos-cloudinit/network"
|
2014-03-18 20:00:41 +04:00
|
|
|
"github.com/coreos/coreos-cloudinit/system"
|
|
|
|
)
|
2014-03-06 02:30:38 +04:00
|
|
|
|
2014-05-10 07:33:34 +04:00
|
|
|
// CloudConfigFile represents a CoreOS specific configuration option that can generate
|
|
|
|
// an associated system.File to be written to disk
|
|
|
|
type CloudConfigFile interface {
|
|
|
|
// File should either return (*system.File, error), or (nil, nil) if nothing
|
|
|
|
// needs to be done for this configuration option.
|
2014-09-28 20:15:25 +04:00
|
|
|
File(root string) (*system.File, error)
|
2014-05-10 07:33:34 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
// CloudConfigUnit represents a CoreOS specific configuration option that can generate
|
2014-06-06 03:12:40 +04:00
|
|
|
// associated system.Units to be created/enabled appropriately
|
2014-05-10 07:33:34 +04:00
|
|
|
type CloudConfigUnit interface {
|
2014-09-28 20:15:25 +04:00
|
|
|
Units(root string) ([]system.Unit, error)
|
|
|
|
}
|
|
|
|
|
|
|
|
// CloudConfig encapsulates the entire cloud-config configuration file and maps directly to YAML
|
|
|
|
type CloudConfig struct {
|
|
|
|
SSHAuthorizedKeys []string `yaml:"ssh_authorized_keys"`
|
|
|
|
Coreos struct {
|
|
|
|
Etcd EtcdEnvironment
|
|
|
|
Fleet FleetEnvironment
|
|
|
|
OEM OEMRelease
|
|
|
|
Update UpdateConfig
|
|
|
|
Units []system.Unit
|
|
|
|
}
|
|
|
|
WriteFiles []system.File `yaml:"write_files"`
|
|
|
|
Hostname string
|
|
|
|
Users []system.User
|
|
|
|
ManageEtcHosts EtcHosts `yaml:"manage_etc_hosts"`
|
|
|
|
NetworkConfigPath string
|
|
|
|
NetworkConfig string
|
|
|
|
}
|
|
|
|
|
|
|
|
type warner func(format string, v ...interface{})
|
|
|
|
|
|
|
|
// warnOnUnrecognizedKeys parses the contents of a cloud-config file and calls
|
|
|
|
// warn(msg, key) for every unrecognized key (i.e. those not present in CloudConfig)
|
|
|
|
func warnOnUnrecognizedKeys(contents string, warn warner) {
|
|
|
|
// Generate a map of all understood cloud config options
|
|
|
|
var cc map[string]interface{}
|
|
|
|
b, _ := yaml.Marshal(&CloudConfig{})
|
|
|
|
yaml.Unmarshal(b, &cc)
|
|
|
|
|
|
|
|
// Now unmarshal the entire provided contents
|
|
|
|
var c map[string]interface{}
|
|
|
|
yaml.Unmarshal([]byte(contents), &c)
|
|
|
|
|
|
|
|
// Check that every key in the contents exists in the cloud config
|
|
|
|
for k, _ := range c {
|
|
|
|
if _, ok := cc[k]; !ok {
|
|
|
|
warn("Warning: unrecognized key %q in provided cloud config - ignoring section", k)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for unrecognized coreos options, if any are set
|
|
|
|
if coreos, ok := c["coreos"]; ok {
|
|
|
|
if set, ok := coreos.(map[interface{}]interface{}); ok {
|
|
|
|
known := cc["coreos"].(map[interface{}]interface{})
|
|
|
|
for k, _ := range set {
|
|
|
|
if key, ok := k.(string); ok {
|
|
|
|
if _, ok := known[key]; !ok {
|
|
|
|
warn("Warning: unrecognized key %q in coreos section of provided cloud config - ignoring", key)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
warn("Warning: unrecognized key %q in coreos section of provided cloud config - ignoring", k)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for any badly-specified users, if any are set
|
|
|
|
if users, ok := c["users"]; ok {
|
|
|
|
var known map[string]interface{}
|
|
|
|
b, _ := yaml.Marshal(&system.User{})
|
|
|
|
yaml.Unmarshal(b, &known)
|
|
|
|
|
|
|
|
if set, ok := users.([]interface{}); ok {
|
|
|
|
for _, u := range set {
|
|
|
|
if user, ok := u.(map[interface{}]interface{}); ok {
|
|
|
|
for k, _ := range user {
|
|
|
|
if key, ok := k.(string); ok {
|
|
|
|
if _, ok := known[key]; !ok {
|
|
|
|
warn("Warning: unrecognized key %q in user section of cloud config - ignoring", key)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
warn("Warning: unrecognized key %q in user section of cloud config - ignoring", k)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for any badly-specified files, if any are set
|
|
|
|
if files, ok := c["write_files"]; ok {
|
|
|
|
var known map[string]interface{}
|
|
|
|
b, _ := yaml.Marshal(&system.File{})
|
|
|
|
yaml.Unmarshal(b, &known)
|
|
|
|
|
|
|
|
if set, ok := files.([]interface{}); ok {
|
|
|
|
for _, f := range set {
|
|
|
|
if file, ok := f.(map[interface{}]interface{}); ok {
|
|
|
|
for k, _ := range file {
|
|
|
|
if key, ok := k.(string); ok {
|
|
|
|
if _, ok := known[key]; !ok {
|
|
|
|
warn("Warning: unrecognized key %q in file section of cloud config - ignoring", key)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
warn("Warning: unrecognized key %q in file section of cloud config - ignoring", k)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewCloudConfig instantiates a new CloudConfig from the given contents (a
|
|
|
|
// string of YAML), returning any error encountered. It will ignore unknown
|
|
|
|
// fields but log encountering them.
|
|
|
|
func NewCloudConfig(contents string) (*CloudConfig, error) {
|
|
|
|
var cfg CloudConfig
|
|
|
|
err := yaml.Unmarshal([]byte(contents), &cfg)
|
|
|
|
if err != nil {
|
|
|
|
return &cfg, err
|
|
|
|
}
|
|
|
|
warnOnUnrecognizedKeys(contents, log.Printf)
|
|
|
|
return &cfg, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cc CloudConfig) String() string {
|
|
|
|
bytes, err := yaml.Marshal(cc)
|
|
|
|
if err != nil {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
stringified := string(bytes)
|
|
|
|
stringified = fmt.Sprintf("#cloud-config\n%s", stringified)
|
|
|
|
|
|
|
|
return stringified
|
2014-05-10 07:33:34 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Apply renders a CloudConfig to an Environment. This can involve things like
|
|
|
|
// configuring the hostname, adding new users, writing various configuration
|
|
|
|
// files to disk, and manipulating systemd services.
|
2014-09-28 20:15:25 +04:00
|
|
|
func Apply(cfg CloudConfig, env *Environment) error {
|
2014-03-13 09:30:24 +04:00
|
|
|
if cfg.Hostname != "" {
|
2014-03-18 20:00:41 +04:00
|
|
|
if err := system.SetHostname(cfg.Hostname); err != nil {
|
2014-03-13 09:30:24 +04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
log.Printf("Set hostname to %s", cfg.Hostname)
|
|
|
|
}
|
|
|
|
|
2014-05-10 07:33:34 +04:00
|
|
|
for _, user := range cfg.Users {
|
|
|
|
if user.Name == "" {
|
|
|
|
log.Printf("User object has no 'name' field, skipping")
|
|
|
|
continue
|
2014-03-23 22:06:43 +04:00
|
|
|
}
|
2014-03-13 21:56:59 +04:00
|
|
|
|
2014-05-10 07:33:34 +04:00
|
|
|
if system.UserExists(&user) {
|
|
|
|
log.Printf("User '%s' exists, ignoring creation-time fields", user.Name)
|
|
|
|
if user.PasswordHash != "" {
|
|
|
|
log.Printf("Setting '%s' user's password", user.Name)
|
|
|
|
if err := system.SetUserPassword(user.Name, user.PasswordHash); err != nil {
|
|
|
|
log.Printf("Failed setting '%s' user's password: %v", user.Name, err)
|
2014-03-13 21:56:59 +04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2014-05-10 07:33:34 +04:00
|
|
|
} else {
|
|
|
|
log.Printf("Creating user '%s'", user.Name)
|
|
|
|
if err := system.CreateUser(&user); err != nil {
|
|
|
|
log.Printf("Failed creating user '%s': %v", user.Name, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2014-03-13 21:56:59 +04:00
|
|
|
|
2014-05-10 07:33:34 +04:00
|
|
|
if len(user.SSHAuthorizedKeys) > 0 {
|
|
|
|
log.Printf("Authorizing %d SSH keys for user '%s'", len(user.SSHAuthorizedKeys), user.Name)
|
|
|
|
if err := system.AuthorizeSSHKeys(user.Name, env.SSHKeyName(), user.SSHAuthorizedKeys); err != nil {
|
|
|
|
return err
|
2014-03-13 21:56:59 +04:00
|
|
|
}
|
2014-05-10 07:33:34 +04:00
|
|
|
}
|
|
|
|
if user.SSHImportGithubUser != "" {
|
|
|
|
log.Printf("Authorizing github user %s SSH keys for CoreOS user '%s'", user.SSHImportGithubUser, user.Name)
|
|
|
|
if err := SSHImportGithubUser(user.Name, user.SSHImportGithubUser); err != nil {
|
|
|
|
return err
|
2014-03-19 19:54:45 +04:00
|
|
|
}
|
2014-05-10 07:33:34 +04:00
|
|
|
}
|
|
|
|
if user.SSHImportURL != "" {
|
|
|
|
log.Printf("Authorizing SSH keys for CoreOS user '%s' from '%s'", user.Name, user.SSHImportURL)
|
|
|
|
if err := SSHImportKeysFromURL(user.Name, user.SSHImportURL); err != nil {
|
|
|
|
return err
|
2014-03-23 02:26:18 +04:00
|
|
|
}
|
2014-03-13 21:56:59 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-03-13 22:39:31 +04:00
|
|
|
if len(cfg.SSHAuthorizedKeys) > 0 {
|
2014-03-18 20:00:41 +04:00
|
|
|
err := system.AuthorizeSSHKeys("core", env.SSHKeyName(), cfg.SSHAuthorizedKeys)
|
2014-03-05 04:36:05 +04:00
|
|
|
if err == nil {
|
|
|
|
log.Printf("Authorized SSH keys for core user")
|
|
|
|
} else {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-09-28 20:15:25 +04:00
|
|
|
for _, ccf := range []CloudConfigFile{cfg.Coreos.OEM, cfg.Coreos.Update, cfg.ManageEtcHosts} {
|
|
|
|
f, err := ccf.File(env.Root())
|
2014-05-10 07:33:34 +04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if f != nil {
|
2014-09-28 20:15:25 +04:00
|
|
|
cfg.WriteFiles = append(cfg.WriteFiles, *f)
|
2014-03-12 04:46:58 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-09-28 20:15:25 +04:00
|
|
|
for _, ccu := range []CloudConfigUnit{cfg.Coreos.Etcd, cfg.Coreos.Fleet, cfg.Coreos.Update} {
|
|
|
|
u, err := ccu.Units(env.Root())
|
2014-05-10 07:33:34 +04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2014-09-28 20:15:25 +04:00
|
|
|
cfg.Coreos.Units = append(cfg.Coreos.Units, u...)
|
2014-03-05 04:36:05 +04:00
|
|
|
}
|
|
|
|
|
2014-07-11 02:44:52 +04:00
|
|
|
wroteEnvironment := false
|
2014-09-28 20:15:25 +04:00
|
|
|
for _, file := range cfg.WriteFiles {
|
2014-07-11 02:44:52 +04:00
|
|
|
fullPath, err := system.WriteFile(&file, env.Root())
|
2014-06-05 23:48:32 +04:00
|
|
|
if err != nil {
|
2014-05-10 07:33:34 +04:00
|
|
|
return err
|
2014-05-07 04:44:18 +04:00
|
|
|
}
|
2014-07-11 02:44:52 +04:00
|
|
|
if path.Clean(file.Path) == "/etc/environment" {
|
|
|
|
wroteEnvironment = true
|
|
|
|
}
|
|
|
|
log.Printf("Wrote file %s to filesystem", fullPath)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !wroteEnvironment {
|
|
|
|
ef := env.DefaultEnvironmentFile()
|
|
|
|
if ef != nil {
|
|
|
|
err := system.WriteEnvFile(ef, env.Root())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
log.Printf("Updated /etc/environment")
|
|
|
|
}
|
2014-05-07 04:44:18 +04:00
|
|
|
}
|
|
|
|
|
2014-06-18 23:08:10 +04:00
|
|
|
if env.NetconfType() != "" {
|
|
|
|
var interfaces []network.InterfaceGenerator
|
2014-08-18 23:20:25 +04:00
|
|
|
var err error
|
2014-06-18 23:08:10 +04:00
|
|
|
switch env.NetconfType() {
|
|
|
|
case "debian":
|
2014-08-18 23:20:25 +04:00
|
|
|
interfaces, err = network.ProcessDebianNetconf(cfg.NetworkConfig)
|
2014-08-16 05:14:34 +04:00
|
|
|
case "digitalocean":
|
|
|
|
interfaces, err = network.ProcessDigitalOceanNetconf(cfg.NetworkConfig)
|
2014-06-18 23:08:10 +04:00
|
|
|
default:
|
|
|
|
return fmt.Errorf("Unsupported network config format %q", env.NetconfType())
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := system.WriteNetworkdConfigs(interfaces); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := system.RestartNetwork(interfaces); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-06-06 04:40:53 +04:00
|
|
|
um := system.NewUnitManager(env.Root())
|
2014-09-28 20:15:25 +04:00
|
|
|
return processUnits(cfg.Coreos.Units, env.Root(), um)
|
2014-06-06 04:40:53 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// processUnits takes a set of Units and applies them to the given root using
|
|
|
|
// the given UnitManager. This can involve things like writing unit files to
|
|
|
|
// disk, masking/unmasking units, or invoking systemd
|
|
|
|
// commands against units. It returns any error encountered.
|
|
|
|
func processUnits(units []system.Unit, root string, um system.UnitManager) error {
|
2014-09-03 04:11:17 +04:00
|
|
|
type action struct {
|
|
|
|
unit string
|
|
|
|
command string
|
|
|
|
}
|
|
|
|
actions := make([]action, 0, len(units))
|
2014-05-10 07:33:34 +04:00
|
|
|
reload := false
|
2014-06-06 04:40:53 +04:00
|
|
|
for _, unit := range units {
|
|
|
|
dst := unit.Destination(root)
|
2014-05-10 07:33:34 +04:00
|
|
|
if unit.Content != "" {
|
|
|
|
log.Printf("Writing unit %s to filesystem at path %s", unit.Name, dst)
|
2014-06-06 04:40:53 +04:00
|
|
|
if err := um.PlaceUnit(&unit, dst); err != nil {
|
2014-05-10 07:33:34 +04:00
|
|
|
return err
|
2014-04-15 20:00:19 +04:00
|
|
|
}
|
2014-05-10 07:33:34 +04:00
|
|
|
log.Printf("Placed unit %s at %s", unit.Name, dst)
|
|
|
|
reload = true
|
|
|
|
}
|
2014-03-20 02:52:24 +04:00
|
|
|
|
2014-05-10 07:33:34 +04:00
|
|
|
if unit.Mask {
|
|
|
|
log.Printf("Masking unit file %s", unit.Name)
|
2014-06-06 04:40:53 +04:00
|
|
|
if err := um.MaskUnit(&unit); err != nil {
|
2014-06-04 03:49:26 +04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else if unit.Runtime {
|
|
|
|
log.Printf("Ensuring runtime unit file %s is unmasked", unit.Name)
|
2014-06-06 04:40:53 +04:00
|
|
|
if err := um.UnmaskUnit(&unit); err != nil {
|
2014-05-10 07:33:34 +04:00
|
|
|
return err
|
2014-03-13 02:43:51 +04:00
|
|
|
}
|
2014-05-10 07:33:34 +04:00
|
|
|
}
|
2014-03-13 02:43:51 +04:00
|
|
|
|
2014-05-10 07:33:34 +04:00
|
|
|
if unit.Enable {
|
|
|
|
if unit.Group() != "network" {
|
2014-05-27 02:16:24 +04:00
|
|
|
log.Printf("Enabling unit file %s", unit.Name)
|
2014-06-06 04:40:53 +04:00
|
|
|
if err := um.EnableUnitFile(unit.Name, unit.Runtime); err != nil {
|
2014-05-10 07:33:34 +04:00
|
|
|
return err
|
2014-03-25 01:12:52 +04:00
|
|
|
}
|
2014-05-10 07:33:34 +04:00
|
|
|
log.Printf("Enabled unit %s", unit.Name)
|
|
|
|
} else {
|
|
|
|
log.Printf("Skipping enable for network-like unit %s", unit.Name)
|
2014-03-13 02:43:51 +04:00
|
|
|
}
|
|
|
|
}
|
2014-03-20 02:52:24 +04:00
|
|
|
|
2014-05-10 07:33:34 +04:00
|
|
|
if unit.Group() == "network" {
|
2014-09-03 04:11:17 +04:00
|
|
|
actions = append(actions, action{"systemd-networkd.service", "restart"})
|
2014-05-10 07:33:34 +04:00
|
|
|
} else if unit.Command != "" {
|
2014-09-03 04:11:17 +04:00
|
|
|
actions = append(actions, action{unit.Name, unit.Command})
|
2014-05-06 00:16:07 +04:00
|
|
|
}
|
2014-05-10 07:33:34 +04:00
|
|
|
}
|
2014-05-06 00:16:07 +04:00
|
|
|
|
2014-05-10 07:33:34 +04:00
|
|
|
if reload {
|
2014-06-06 04:40:53 +04:00
|
|
|
if err := um.DaemonReload(); err != nil {
|
2014-05-10 07:33:34 +04:00
|
|
|
return errors.New(fmt.Sprintf("failed systemd daemon-reload: %v", err))
|
2014-03-20 02:52:24 +04:00
|
|
|
}
|
2014-03-13 02:43:51 +04:00
|
|
|
}
|
|
|
|
|
2014-09-03 04:11:17 +04:00
|
|
|
for _, action := range actions {
|
|
|
|
log.Printf("Calling unit command '%s %s'", action.command, action.unit)
|
|
|
|
res, err := um.RunUnitCommand(action.command, action.unit)
|
2014-05-10 07:33:34 +04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2014-04-02 02:02:12 +04:00
|
|
|
}
|
2014-09-03 04:11:17 +04:00
|
|
|
log.Printf("Result of '%s %s': %s", action.command, action.unit, res)
|
2014-04-02 02:02:12 +04:00
|
|
|
}
|
|
|
|
|
2014-03-05 04:36:05 +04:00
|
|
|
return nil
|
|
|
|
}
|