|
1 | 1 | local context = std.extVar('context'); |
2 | 2 |
|
3 | | -{ |
4 | | - ignition: { |
5 | | - version: '3.1.0', |
6 | | - config: { |
7 | | - merge: [ { |
8 | | - source: 'https://%s:22623/config/%s' % [ context.data.ignitionHost, std.get(context.data, 'ignitionConfigName', 'worker') ], |
9 | | - } ], |
10 | | - }, |
11 | | - security: { |
12 | | - tls: { |
13 | | - certificateAuthorities: [ { |
14 | | - source: 'data:text/plain;charset=utf-8;base64,%s' % [ std.base64(context.data.ignitionCA) ], |
15 | | - } ], |
| 3 | +// Tries to load user data from a secret specific to the machineset. |
| 4 | +// The variable contains `null` if the secret is not found. |
| 5 | +// The secret is expected to be named `<machineset>-user-data-managed`. |
| 6 | +// The machine set name is read from the machine labels. |
| 7 | +local userData = |
| 8 | + local machineSet = |
| 9 | + std.get( |
| 10 | + std.get(context.machine.metadata, 'labels', {}), |
| 11 | + 'machine.openshift.io/cluster-api-machineset' |
| 12 | + ); |
| 13 | + if machineSet != null then |
| 14 | + local secretName = std.trace("Looking for '%s-user-data-managed'", '%s-user-data-managed' % machineSet); |
| 15 | + local uds = std.filter(function(s) s.metadata.name == secretName, context.secrets); |
| 16 | + if std.length(uds) == 1 && std.objectHas(uds[0].data, 'userData') then |
| 17 | + std.trace("Found user data secret for machineset '%s'", |
| 18 | + machineSet, |
| 19 | + std.parseJson(std.decodeUTF8(std.base64DecodeBytes(uds[0].data.userData)))) |
| 20 | + else |
| 21 | + std.trace("No user data secret found for machineset '%s'", machineSet, null) |
| 22 | +; |
| 23 | + |
| 24 | +( |
| 25 | + if userData != null then |
| 26 | + userData |
| 27 | + else |
| 28 | + { |
| 29 | + ignition: { |
| 30 | + version: '3.1.0', |
| 31 | + config: { |
| 32 | + merge: [{ |
| 33 | + source: 'https://%s:22623/config/%s' % [context.data.ignitionHost, std.get(context.data, 'ignitionConfigName', 'worker')], |
| 34 | + }], |
| 35 | + }, |
| 36 | + security: { |
| 37 | + tls: { |
| 38 | + certificateAuthorities: [{ |
| 39 | + source: 'data:text/plain;charset=utf-8;base64,%s' % [std.base64(context.data.ignitionCA)], |
| 40 | + }], |
| 41 | + }, |
| 42 | + }, |
16 | 43 | }, |
17 | | - }, |
18 | | - }, |
19 | | - systemd: { |
20 | | - units: [ { |
| 44 | + } |
| 45 | +) { |
| 46 | + systemd+: { |
| 47 | + units+: [{ |
21 | 48 | name: 'cloudscale-hostkeys.service', |
22 | 49 | enabled: true, |
23 | 50 | contents: "[Unit]\nDescription=Print SSH Public Keys to tty\nAfter=sshd-keygen.target\n\n[Install]\nWantedBy=multi-user.target\n\n[Service]\nType=oneshot\nStandardOutput=tty\nTTYPath=/dev/ttyS0\nExecStart=/bin/sh -c \"echo '-----BEGIN SSH HOST KEY KEYS-----'; cat /etc/ssh/ssh_host_*key.pub; echo '-----END SSH HOST KEY KEYS-----'\"", |
24 | | - } ], |
| 51 | + }], |
25 | 52 | }, |
26 | | - storage: { |
27 | | - files: [ { |
| 53 | + storage+: { |
| 54 | + files+: [{ |
28 | 55 | filesystem: 'root', |
29 | 56 | path: '/etc/hostname', |
30 | 57 | mode: 420, |
31 | 58 | contents: { |
32 | 59 | source: 'data:,%s' % context.machine.metadata.name, |
33 | 60 | }, |
34 | | - } ], |
| 61 | + }], |
35 | 62 | }, |
36 | 63 | } |
0 commit comments