123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223 |
- /*
- Copyright 2018 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package rootcacertpublisher
- import (
- "context"
- "fmt"
- "reflect"
- "time"
- v1 "k8s.io/api/core/v1"
- apierrors "k8s.io/apimachinery/pkg/api/errors"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- utilruntime "k8s.io/apimachinery/pkg/util/runtime"
- "k8s.io/apimachinery/pkg/util/wait"
- coreinformers "k8s.io/client-go/informers/core/v1"
- clientset "k8s.io/client-go/kubernetes"
- corelisters "k8s.io/client-go/listers/core/v1"
- "k8s.io/client-go/tools/cache"
- "k8s.io/client-go/util/workqueue"
- "k8s.io/component-base/metrics/prometheus/ratelimiter"
- "k8s.io/klog"
- )
- // RootCACertConfigMapName is name of the configmap which stores certificates
- // to access api-server
- const RootCACertConfigMapName = "kube-root-ca.crt"
- // NewPublisher construct a new controller which would manage the configmap
- // which stores certificates in each namespace. It will make sure certificate
- // configmap exists in each namespace.
- func NewPublisher(cmInformer coreinformers.ConfigMapInformer, nsInformer coreinformers.NamespaceInformer, cl clientset.Interface, rootCA []byte) (*Publisher, error) {
- e := &Publisher{
- client: cl,
- rootCA: rootCA,
- queue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), "root_ca_cert_publisher"),
- }
- if cl.CoreV1().RESTClient().GetRateLimiter() != nil {
- if err := ratelimiter.RegisterMetricAndTrackRateLimiterUsage("root_ca_cert_publisher", cl.CoreV1().RESTClient().GetRateLimiter()); err != nil {
- return nil, err
- }
- }
- cmInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
- DeleteFunc: e.configMapDeleted,
- UpdateFunc: e.configMapUpdated,
- })
- e.cmLister = cmInformer.Lister()
- e.cmListerSynced = cmInformer.Informer().HasSynced
- nsInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
- AddFunc: e.namespaceAdded,
- UpdateFunc: e.namespaceUpdated,
- })
- e.nsListerSynced = nsInformer.Informer().HasSynced
- e.syncHandler = e.syncNamespace
- return e, nil
- }
- // Publisher manages certificate ConfigMap objects inside Namespaces
- type Publisher struct {
- client clientset.Interface
- rootCA []byte
- // To allow injection for testing.
- syncHandler func(key string) error
- cmLister corelisters.ConfigMapLister
- cmListerSynced cache.InformerSynced
- nsListerSynced cache.InformerSynced
- queue workqueue.RateLimitingInterface
- }
- // Run starts process
- func (c *Publisher) Run(workers int, stopCh <-chan struct{}) {
- defer utilruntime.HandleCrash()
- defer c.queue.ShutDown()
- klog.Infof("Starting root CA certificate configmap publisher")
- defer klog.Infof("Shutting down root CA certificate configmap publisher")
- if !cache.WaitForNamedCacheSync("crt configmap", stopCh, c.cmListerSynced) {
- return
- }
- for i := 0; i < workers; i++ {
- go wait.Until(c.runWorker, time.Second, stopCh)
- }
- <-stopCh
- }
- func (c *Publisher) configMapDeleted(obj interface{}) {
- cm, err := convertToCM(obj)
- if err != nil {
- utilruntime.HandleError(err)
- return
- }
- if cm.Name != RootCACertConfigMapName {
- return
- }
- c.queue.Add(cm.Namespace)
- }
- func (c *Publisher) configMapUpdated(_, newObj interface{}) {
- cm, err := convertToCM(newObj)
- if err != nil {
- utilruntime.HandleError(err)
- return
- }
- if cm.Name != RootCACertConfigMapName {
- return
- }
- c.queue.Add(cm.Namespace)
- }
- func (c *Publisher) namespaceAdded(obj interface{}) {
- namespace := obj.(*v1.Namespace)
- c.queue.Add(namespace.Name)
- }
- func (c *Publisher) namespaceUpdated(oldObj interface{}, newObj interface{}) {
- newNamespace := newObj.(*v1.Namespace)
- if newNamespace.Status.Phase != v1.NamespaceActive {
- return
- }
- c.queue.Add(newNamespace.Name)
- }
- func (c *Publisher) runWorker() {
- for c.processNextWorkItem() {
- }
- }
- // processNextWorkItem deals with one key off the queue. It returns false when
- // it's time to quit.
- func (c *Publisher) processNextWorkItem() bool {
- key, quit := c.queue.Get()
- if quit {
- return false
- }
- defer c.queue.Done(key)
- if err := c.syncHandler(key.(string)); err != nil {
- utilruntime.HandleError(fmt.Errorf("syncing %q failed: %v", key, err))
- c.queue.AddRateLimited(key)
- return true
- }
- c.queue.Forget(key)
- return true
- }
- func (c *Publisher) syncNamespace(ns string) error {
- startTime := time.Now()
- defer func() {
- klog.V(4).Infof("Finished syncing namespace %q (%v)", ns, time.Since(startTime))
- }()
- cm, err := c.cmLister.ConfigMaps(ns).Get(RootCACertConfigMapName)
- switch {
- case apierrors.IsNotFound(err):
- _, err := c.client.CoreV1().ConfigMaps(ns).Create(context.TODO(), &v1.ConfigMap{
- ObjectMeta: metav1.ObjectMeta{
- Name: RootCACertConfigMapName,
- },
- Data: map[string]string{
- "ca.crt": string(c.rootCA),
- },
- }, metav1.CreateOptions{})
- return err
- case err != nil:
- return err
- }
- data := map[string]string{
- "ca.crt": string(c.rootCA),
- }
- if reflect.DeepEqual(cm.Data, data) {
- return nil
- }
- cm.Data = data
- _, err = c.client.CoreV1().ConfigMaps(ns).Update(context.TODO(), cm, metav1.UpdateOptions{})
- return err
- }
- func convertToCM(obj interface{}) (*v1.ConfigMap, error) {
- cm, ok := obj.(*v1.ConfigMap)
- if !ok {
- tombstone, ok := obj.(cache.DeletedFinalStateUnknown)
- if !ok {
- return nil, fmt.Errorf("couldn't get object from tombstone %#v", obj)
- }
- cm, ok = tombstone.Obj.(*v1.ConfigMap)
- if !ok {
- return nil, fmt.Errorf("tombstone contained object that is not a ConfigMap %#v", obj)
- }
- }
- return cm, nil
- }
|