mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-11 17:04:22 -05:00
0d12e37c96
* Include EXC0014 and fix issues. * Include EXC0012 and fix issues. Signed-off-by: Fabian Kammel <fk@edgeless.systems> Co-authored-by: Otto Bittner <cobittner@posteo.net>
390 lines
11 KiB
Go
390 lines
11 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
package resources
|
|
|
|
import (
|
|
"crypto/x509"
|
|
"crypto/x509/pkix"
|
|
|
|
"github.com/edgelesssys/constellation/v2/bootstrapper/internal/certificate"
|
|
"github.com/edgelesssys/constellation/v2/internal/kubernetes"
|
|
"github.com/edgelesssys/constellation/v2/internal/versions"
|
|
appsv1 "k8s.io/api/apps/v1"
|
|
corev1 "k8s.io/api/core/v1"
|
|
rbacv1 "k8s.io/api/rbac/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/util/intstr"
|
|
"k8s.io/apiserver/pkg/apis/apiserver"
|
|
)
|
|
|
|
const (
|
|
// KonnectivityCertificateFilename is the path to the kubelets certificate.
|
|
KonnectivityCertificateFilename = "/etc/kubernetes/konnectivity.crt"
|
|
// KonnectivityKeyFilename is the path to the kubelets private key.
|
|
KonnectivityKeyFilename = "/etc/kubernetes/konnectivity.key"
|
|
)
|
|
|
|
// KonnectivityAgents bundles all necessary agent deployments.
|
|
type KonnectivityAgents struct {
|
|
DaemonSet appsv1.DaemonSet
|
|
ClusterRoleBinding rbacv1.ClusterRoleBinding
|
|
ServiceAccount corev1.ServiceAccount
|
|
}
|
|
|
|
// KonnectivityServerStaticPod deployment.
|
|
type KonnectivityServerStaticPod struct {
|
|
StaticPod corev1.Pod
|
|
}
|
|
|
|
// EgressSelectorConfiguration deployment.
|
|
type EgressSelectorConfiguration struct {
|
|
EgressSelectorConfiguration apiserver.EgressSelectorConfiguration
|
|
}
|
|
|
|
// NewKonnectivityAgents create new KonnectivityAgents.
|
|
func NewKonnectivityAgents(konnectivityServerAddress string) *KonnectivityAgents {
|
|
return &KonnectivityAgents{
|
|
DaemonSet: appsv1.DaemonSet{
|
|
TypeMeta: metav1.TypeMeta{
|
|
APIVersion: "apps/v1",
|
|
Kind: "DaemonSet",
|
|
},
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "konnectivity-agent",
|
|
Namespace: "kube-system",
|
|
Labels: map[string]string{
|
|
"k8s-app": "konnectivity-agent",
|
|
"addonmanager.kubernetes.io/mode": "Reconcile",
|
|
},
|
|
},
|
|
Spec: appsv1.DaemonSetSpec{
|
|
Selector: &metav1.LabelSelector{
|
|
MatchLabels: map[string]string{
|
|
"k8s-app": "konnectivity-agent",
|
|
},
|
|
},
|
|
Template: corev1.PodTemplateSpec{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Labels: map[string]string{
|
|
"k8s-app": "konnectivity-agent",
|
|
},
|
|
},
|
|
Spec: corev1.PodSpec{
|
|
PriorityClassName: "system-cluster-critical",
|
|
Tolerations: []corev1.Toleration{
|
|
{
|
|
Key: "node-role.kubernetes.io/master",
|
|
Operator: corev1.TolerationOpExists,
|
|
Effect: corev1.TaintEffectNoSchedule,
|
|
},
|
|
{
|
|
Key: "node-role.kubernetes.io/control-plane",
|
|
Operator: corev1.TolerationOpExists,
|
|
Effect: corev1.TaintEffectNoSchedule,
|
|
},
|
|
{
|
|
Key: "CriticalAddonsOnly",
|
|
Operator: corev1.TolerationOpExists,
|
|
},
|
|
{
|
|
Key: "node.kubernetes.io/not-ready",
|
|
Operator: corev1.TolerationOpExists,
|
|
Effect: corev1.TaintEffectNoExecute,
|
|
},
|
|
},
|
|
Containers: []corev1.Container{
|
|
{
|
|
Name: "konnectivity-agent",
|
|
Image: versions.KonnectivityAgentImage,
|
|
Command: []string{
|
|
"/proxy-agent",
|
|
},
|
|
Args: []string{
|
|
"--logtostderr=true",
|
|
"--proxy-server-host=" + konnectivityServerAddress,
|
|
"--ca-cert=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt",
|
|
"--proxy-server-port=8132",
|
|
"--admin-server-port=8133",
|
|
"--health-server-port=8134",
|
|
"--service-account-token-path=/var/run/secrets/tokens/konnectivity-agent-token",
|
|
"--agent-identifiers=host=$(HOST_IP)",
|
|
// we will be able to avoid constant polling when either one is done:
|
|
// https://github.com/kubernetes-sigs/apiserver-network-proxy/issues/358
|
|
// https://github.com/kubernetes-sigs/apiserver-network-proxy/issues/273
|
|
"--sync-forever=true",
|
|
// Ensure stable connection to the konnectivity server.
|
|
"--keepalive-time=60m",
|
|
"--sync-interval=5s",
|
|
"--sync-interval-cap=30s",
|
|
"--probe-interval=5s",
|
|
"--v=3",
|
|
},
|
|
Env: []corev1.EnvVar{
|
|
{
|
|
Name: "HOST_IP",
|
|
ValueFrom: &corev1.EnvVarSource{
|
|
FieldRef: &corev1.ObjectFieldSelector{
|
|
APIVersion: "v1",
|
|
FieldPath: "status.hostIP",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
VolumeMounts: []corev1.VolumeMount{
|
|
{
|
|
Name: "konnectivity-agent-token",
|
|
MountPath: "/var/run/secrets/tokens",
|
|
ReadOnly: true,
|
|
},
|
|
},
|
|
LivenessProbe: &corev1.Probe{
|
|
ProbeHandler: corev1.ProbeHandler{
|
|
HTTPGet: &corev1.HTTPGetAction{
|
|
Path: "/healthz",
|
|
Port: intstr.FromInt(8134),
|
|
},
|
|
},
|
|
InitialDelaySeconds: 15,
|
|
TimeoutSeconds: 15,
|
|
},
|
|
},
|
|
},
|
|
ServiceAccountName: "konnectivity-agent",
|
|
Volumes: []corev1.Volume{
|
|
{
|
|
Name: "konnectivity-agent-token",
|
|
VolumeSource: corev1.VolumeSource{
|
|
Projected: &corev1.ProjectedVolumeSource{
|
|
Sources: []corev1.VolumeProjection{
|
|
{
|
|
ServiceAccountToken: &corev1.ServiceAccountTokenProjection{
|
|
Audience: "system:konnectivity-server",
|
|
Path: "konnectivity-agent-token",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
ClusterRoleBinding: rbacv1.ClusterRoleBinding{
|
|
TypeMeta: metav1.TypeMeta{
|
|
APIVersion: "rbac.authorization.k8s.io/v1",
|
|
Kind: "ClusterRoleBinding",
|
|
},
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "system:konnectivity-server",
|
|
Labels: map[string]string{
|
|
"kubernetes.io/cluster-service": "true",
|
|
"addonmanager.kubernetes.io/mode": "Reconcile",
|
|
},
|
|
},
|
|
RoleRef: rbacv1.RoleRef{
|
|
APIGroup: "rbac.authorization.k8s.io",
|
|
Kind: "ClusterRole",
|
|
Name: "system:auth-delegator",
|
|
},
|
|
Subjects: []rbacv1.Subject{
|
|
{
|
|
APIGroup: "rbac.authorization.k8s.io",
|
|
Kind: "User",
|
|
Name: "system:konnectivity-server",
|
|
},
|
|
},
|
|
},
|
|
ServiceAccount: corev1.ServiceAccount{
|
|
TypeMeta: metav1.TypeMeta{
|
|
APIVersion: "v1",
|
|
Kind: "ServiceAccount",
|
|
},
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "konnectivity-agent",
|
|
Namespace: "kube-system",
|
|
Labels: map[string]string{
|
|
"kubernetes.io/cluster-service": "true",
|
|
"addonmanager.kubernetes.io/mode": "Reconcile",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
// NewKonnectivityServerStaticPod create a new KonnectivityServerStaticPod.
|
|
func NewKonnectivityServerStaticPod() *KonnectivityServerStaticPod {
|
|
udsHostPathType := corev1.HostPathDirectoryOrCreate
|
|
return &KonnectivityServerStaticPod{
|
|
StaticPod: corev1.Pod{
|
|
TypeMeta: metav1.TypeMeta{
|
|
APIVersion: "v1",
|
|
Kind: "Pod",
|
|
},
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "konnectivity-server",
|
|
Namespace: "kube-system",
|
|
},
|
|
Spec: corev1.PodSpec{
|
|
PriorityClassName: "system-cluster-critical",
|
|
HostNetwork: true,
|
|
Containers: []corev1.Container{
|
|
{
|
|
Name: "konnectivity-server-container",
|
|
Image: versions.KonnectivityServerImage,
|
|
Command: []string{"/proxy-server"},
|
|
Args: []string{
|
|
"--logtostderr=true",
|
|
// This needs to be consistent with the value set in egressSelectorConfiguration.
|
|
"--uds-name=/etc/kubernetes/konnectivity-server/konnectivity-server.socket",
|
|
// The following two lines assume the Konnectivity server is
|
|
// deployed on the same machine as the apiserver, and the certs and
|
|
// key of the API Server are at the specified location.
|
|
"--cluster-cert=/etc/kubernetes/pki/apiserver.crt",
|
|
"--cluster-key=/etc/kubernetes/pki/apiserver.key",
|
|
// This needs to be consistent with the value set in egressSelectorConfiguration.
|
|
"--mode=grpc",
|
|
"--server-port=0",
|
|
"--agent-port=8132",
|
|
"--admin-port=8133",
|
|
"--health-port=8134",
|
|
"--v=5",
|
|
"--agent-namespace=kube-system",
|
|
"--agent-service-account=konnectivity-agent",
|
|
"--kubeconfig=/etc/kubernetes/konnectivity-server.conf",
|
|
"--authentication-audience=system:konnectivity-server",
|
|
"--proxy-strategies=default",
|
|
},
|
|
LivenessProbe: &corev1.Probe{
|
|
ProbeHandler: corev1.ProbeHandler{
|
|
HTTPGet: &corev1.HTTPGetAction{
|
|
Path: "/healthz",
|
|
Port: intstr.FromInt(8134),
|
|
},
|
|
},
|
|
InitialDelaySeconds: 30,
|
|
TimeoutSeconds: 60,
|
|
},
|
|
Ports: []corev1.ContainerPort{
|
|
{
|
|
Name: "agent-port",
|
|
ContainerPort: 8132,
|
|
HostPort: 8132,
|
|
},
|
|
{
|
|
Name: "admin-port",
|
|
ContainerPort: 8133,
|
|
HostPort: 8133,
|
|
},
|
|
{
|
|
Name: "health-port",
|
|
ContainerPort: 8134,
|
|
HostPort: 8134,
|
|
},
|
|
},
|
|
VolumeMounts: []corev1.VolumeMount{
|
|
{
|
|
Name: "k8s-certs",
|
|
MountPath: "/etc/kubernetes/pki",
|
|
ReadOnly: true,
|
|
},
|
|
{
|
|
Name: "kubeconfig",
|
|
MountPath: "/etc/kubernetes/konnectivity-server.conf",
|
|
ReadOnly: true,
|
|
},
|
|
{
|
|
Name: "konnectivity-uds",
|
|
MountPath: "/etc/kubernetes/konnectivity-server",
|
|
ReadOnly: false,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
Volumes: []corev1.Volume{
|
|
{
|
|
Name: "k8s-certs",
|
|
VolumeSource: corev1.VolumeSource{
|
|
HostPath: &corev1.HostPathVolumeSource{
|
|
Path: "/etc/kubernetes/pki",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "kubeconfig",
|
|
VolumeSource: corev1.VolumeSource{
|
|
HostPath: &corev1.HostPathVolumeSource{
|
|
Path: "/etc/kubernetes/konnectivity-server.conf",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "konnectivity-uds",
|
|
VolumeSource: corev1.VolumeSource{
|
|
HostPath: &corev1.HostPathVolumeSource{
|
|
Path: "/etc/kubernetes/konnectivity-server",
|
|
Type: &udsHostPathType,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
// NewEgressSelectorConfiguration creates a new EgressSelectorConfiguration.
|
|
func NewEgressSelectorConfiguration() *EgressSelectorConfiguration {
|
|
return &EgressSelectorConfiguration{
|
|
EgressSelectorConfiguration: apiserver.EgressSelectorConfiguration{
|
|
TypeMeta: metav1.TypeMeta{
|
|
APIVersion: "apiserver.k8s.io/v1beta1",
|
|
Kind: "EgressSelectorConfiguration",
|
|
},
|
|
EgressSelections: []apiserver.EgressSelection{
|
|
{
|
|
Name: "cluster",
|
|
Connection: apiserver.Connection{
|
|
ProxyProtocol: "GRPC",
|
|
Transport: &apiserver.Transport{
|
|
UDS: &apiserver.UDSTransport{
|
|
UDSName: "/etc/kubernetes/konnectivity-server/konnectivity-server.socket",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
// Marshal to Kubernetes YAML.
|
|
func (v *KonnectivityAgents) Marshal() ([]byte, error) {
|
|
return kubernetes.MarshalK8SResources(v)
|
|
}
|
|
|
|
// Marshal to Kubernetes YAML.
|
|
func (v *KonnectivityServerStaticPod) Marshal() ([]byte, error) {
|
|
return kubernetes.MarshalK8SResources(v)
|
|
}
|
|
|
|
// Marshal to Kubernetes YAML.
|
|
func (v *EgressSelectorConfiguration) Marshal() ([]byte, error) {
|
|
return kubernetes.MarshalK8SResources(v)
|
|
}
|
|
|
|
// GetKonnectivityCertificateRequest returns a certificate request and matching private key for the konnectivity server.
|
|
func GetKonnectivityCertificateRequest() (certificateRequest []byte, privateKey []byte, err error) {
|
|
csrTemplate := &x509.CertificateRequest{
|
|
Subject: pkix.Name{
|
|
CommonName: "system:konnectivity-server",
|
|
},
|
|
}
|
|
return certificate.GetCertificateRequest(csrTemplate)
|
|
}
|