/
config.go
112 lines (104 loc) · 3.78 KB
/
config.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
package cloudconfig
import (
"github.com/giantswarm/certs/v4/pkg/certs"
"github.com/giantswarm/k8sclient/v7/pkg/k8sclient"
"github.com/giantswarm/microerror"
"github.com/giantswarm/micrologger"
"github.com/giantswarm/randomkeys/v3"
"github.com/giantswarm/aws-operator/v15/service/internal/cloudtags"
"github.com/giantswarm/aws-operator/v15/service/internal/encrypter"
"github.com/giantswarm/aws-operator/v15/service/internal/hamaster"
"github.com/giantswarm/aws-operator/v15/service/internal/images"
event "github.com/giantswarm/aws-operator/v15/service/internal/recorder"
)
type Config struct {
CertsSearcher certs.Interface
CloudTags cloudtags.Interface
Encrypter encrypter.Interface
Event event.Interface
HAMaster hamaster.Interface
Images images.Interface
K8sClient k8sclient.Interface
Logger micrologger.Logger
RandomKeysSearcher randomkeys.Interface
APIExtraArgs []string
CalicoCIDR int
CalicoMTU int
CalicoSubnet string
ClusterIPRange string
DockerDaemonCIDR string
DockerhubToken string
ExternalSNAT bool
IgnitionPath string
KubeletExtraArgs []string
ClusterDomain string
NetworkSetupDockerImage string
PodInfraContainerImage string
RegistryDomain string
RegistryMirrors []string
SSHUserList string
SSOPublicKey string
}
func (c Config) Validate() error {
if c.CertsSearcher == nil {
return microerror.Maskf(invalidConfigError, "%T.CertsSearcher must not be empty", c)
}
if c.Encrypter == nil {
return microerror.Maskf(invalidConfigError, "%T.Encrypter must not be empty", c)
}
if c.Event == nil {
return microerror.Maskf(invalidConfigError, "%T.Event must not be empty", c)
}
if c.HAMaster == nil {
return microerror.Maskf(invalidConfigError, "%T.HAMaster must not be empty", c)
}
if c.Images == nil {
return microerror.Maskf(invalidConfigError, "%T.Images must not be empty", c)
}
if c.K8sClient == nil {
return microerror.Maskf(invalidConfigError, "%T.K8sClient must not be empty", c)
}
if c.Logger == nil {
return microerror.Maskf(invalidConfigError, "%T.Logger must not be empty", c)
}
if c.RandomKeysSearcher == nil {
return microerror.Maskf(invalidConfigError, "%T.RandomKeysSearcher must not be empty", c)
}
if c.CalicoCIDR == 0 {
return microerror.Maskf(invalidConfigError, "%T.CalicoCIDR must not be empty", c)
}
if c.CalicoMTU == 0 {
return microerror.Maskf(invalidConfigError, "%T.CalicoMTU must not be empty", c)
}
if c.CalicoSubnet == "" {
return microerror.Maskf(invalidConfigError, "%T.CalicoSubnet must not be empty", c)
}
if c.ClusterDomain == "" {
return microerror.Maskf(invalidConfigError, "%T.ClusterDomain must not be empty", c)
}
if c.ClusterIPRange == "" {
return microerror.Maskf(invalidConfigError, "%T.ClusterIPRange must not be empty", c)
}
if c.DockerDaemonCIDR == "" {
return microerror.Maskf(invalidConfigError, "%T.DockerDaemonCIDR must not be empty", c)
}
if c.DockerhubToken == "" {
return microerror.Maskf(invalidConfigError, "%T.DockerhubToken must not be empty", c)
}
if c.IgnitionPath == "" {
return microerror.Maskf(invalidConfigError, "%T.IgnitionPath must not be empty", c)
}
if c.NetworkSetupDockerImage == "" {
return microerror.Maskf(invalidConfigError, "%T.NetworkSetupDockerImage must not be empty", c)
}
if c.RegistryDomain == "" {
return microerror.Maskf(invalidConfigError, "%T.RegistryDomain must not be empty", c)
}
if c.SSHUserList == "" {
return microerror.Maskf(invalidConfigError, "%T.SSHUserList must not be empty", c)
}
if c.SSOPublicKey == "" {
return microerror.Maskf(invalidConfigError, "%T.SSOPublicKey must not be empty", c)
}
return nil
}