mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-13 05:46:16 +00:00
Always track kubelet -> API connections
This commit is contained in:
parent
858c861ac0
commit
52876f77e9
@ -547,14 +547,14 @@ func run(s *options.KubeletServer, kubeDeps *kubelet.Dependencies) (err error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
}
|
||||||
// we set exitAfter to five minutes because we use this client configuration to request new certs - if we are unable
|
// we set exitAfter to five minutes because we use this client configuration to request new certs - if we are unable
|
||||||
// to request new certs, we will be unable to continue normal operation. Exiting the process allows a wrapper
|
// to request new certs, we will be unable to continue normal operation. Exiting the process allows a wrapper
|
||||||
// or the bootstrapping credentials to potentially lay down new initial config.
|
// or the bootstrapping credentials to potentially lay down new initial config.
|
||||||
if err := kubeletcertificate.UpdateTransport(wait.NeverStop, clientConfig, clientCertificateManager, 5*time.Minute); err != nil {
|
_, err := kubeletcertificate.UpdateTransport(wait.NeverStop, clientConfig, clientCertificateManager, 5*time.Minute)
|
||||||
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
kubeClient, err = clientset.NewForConfig(clientConfig)
|
kubeClient, err = clientset.NewForConfig(clientConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -38,6 +38,8 @@ import (
|
|||||||
//
|
//
|
||||||
// The config must not already provide an explicit transport.
|
// The config must not already provide an explicit transport.
|
||||||
//
|
//
|
||||||
|
// The returned function allows forcefully closing all active connections.
|
||||||
|
//
|
||||||
// The returned transport periodically checks the manager to determine if the
|
// The returned transport periodically checks the manager to determine if the
|
||||||
// certificate has changed. If it has, the transport shuts down all existing client
|
// certificate has changed. If it has, the transport shuts down all existing client
|
||||||
// connections, forcing the client to re-handshake with the server and use the
|
// connections, forcing the client to re-handshake with the server and use the
|
||||||
@ -51,23 +53,32 @@ import (
|
|||||||
//
|
//
|
||||||
// stopCh should be used to indicate when the transport is unused and doesn't need
|
// stopCh should be used to indicate when the transport is unused and doesn't need
|
||||||
// to continue checking the manager.
|
// to continue checking the manager.
|
||||||
func UpdateTransport(stopCh <-chan struct{}, clientConfig *restclient.Config, clientCertificateManager certificate.Manager, exitAfter time.Duration) error {
|
func UpdateTransport(stopCh <-chan struct{}, clientConfig *restclient.Config, clientCertificateManager certificate.Manager, exitAfter time.Duration) (func(), error) {
|
||||||
return updateTransport(stopCh, 10*time.Second, clientConfig, clientCertificateManager, exitAfter)
|
return updateTransport(stopCh, 10*time.Second, clientConfig, clientCertificateManager, exitAfter)
|
||||||
}
|
}
|
||||||
|
|
||||||
// updateTransport is an internal method that exposes how often this method checks that the
|
// updateTransport is an internal method that exposes how often this method checks that the
|
||||||
// client cert has changed.
|
// client cert has changed.
|
||||||
func updateTransport(stopCh <-chan struct{}, period time.Duration, clientConfig *restclient.Config, clientCertificateManager certificate.Manager, exitAfter time.Duration) error {
|
func updateTransport(stopCh <-chan struct{}, period time.Duration, clientConfig *restclient.Config, clientCertificateManager certificate.Manager, exitAfter time.Duration) (func(), error) {
|
||||||
if clientConfig.Transport != nil {
|
if clientConfig.Transport != nil || clientConfig.Dial != nil {
|
||||||
return fmt.Errorf("there is already a transport configured")
|
return nil, fmt.Errorf("there is already a transport or dialer configured")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Custom dialer that will track all connections it creates.
|
||||||
|
t := &connTracker{
|
||||||
|
dialer: &net.Dialer{Timeout: 30 * time.Second, KeepAlive: 30 * time.Second},
|
||||||
|
conns: make(map[*closableConn]struct{}),
|
||||||
|
}
|
||||||
|
|
||||||
tlsConfig, err := restclient.TLSConfigFor(clientConfig)
|
tlsConfig, err := restclient.TLSConfigFor(clientConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("unable to configure TLS for the rest client: %v", err)
|
return nil, fmt.Errorf("unable to configure TLS for the rest client: %v", err)
|
||||||
}
|
}
|
||||||
if tlsConfig == nil {
|
if tlsConfig == nil {
|
||||||
tlsConfig = &tls.Config{}
|
tlsConfig = &tls.Config{}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if clientCertificateManager != nil {
|
||||||
tlsConfig.Certificates = nil
|
tlsConfig.Certificates = nil
|
||||||
tlsConfig.GetClientCertificate = func(requestInfo *tls.CertificateRequestInfo) (*tls.Certificate, error) {
|
tlsConfig.GetClientCertificate = func(requestInfo *tls.CertificateRequestInfo) (*tls.Certificate, error) {
|
||||||
cert := clientCertificateManager.Current()
|
cert := clientCertificateManager.Current()
|
||||||
@ -77,12 +88,6 @@ func updateTransport(stopCh <-chan struct{}, period time.Duration, clientConfig
|
|||||||
return cert, nil
|
return cert, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Custom dialer that will track all connections it creates.
|
|
||||||
t := &connTracker{
|
|
||||||
dialer: &net.Dialer{Timeout: 30 * time.Second, KeepAlive: 30 * time.Second},
|
|
||||||
conns: make(map[*closableConn]struct{}),
|
|
||||||
}
|
|
||||||
|
|
||||||
lastCertAvailable := time.Now()
|
lastCertAvailable := time.Now()
|
||||||
lastCert := clientCertificateManager.Current()
|
lastCert := clientCertificateManager.Current()
|
||||||
go wait.Until(func() {
|
go wait.Until(func() {
|
||||||
@ -125,6 +130,7 @@ func updateTransport(stopCh <-chan struct{}, period time.Duration, clientConfig
|
|||||||
// See: https://github.com/kubernetes-incubator/bootkube/pull/663#issuecomment-318506493
|
// See: https://github.com/kubernetes-incubator/bootkube/pull/663#issuecomment-318506493
|
||||||
t.closeAllConns()
|
t.closeAllConns()
|
||||||
}, period, stopCh)
|
}, period, stopCh)
|
||||||
|
}
|
||||||
|
|
||||||
clientConfig.Transport = utilnet.SetTransportDefaults(&http.Transport{
|
clientConfig.Transport = utilnet.SetTransportDefaults(&http.Transport{
|
||||||
Proxy: http.ProxyFromEnvironment,
|
Proxy: http.ProxyFromEnvironment,
|
||||||
@ -142,7 +148,8 @@ func updateTransport(stopCh <-chan struct{}, period time.Duration, clientConfig
|
|||||||
clientConfig.CAData = nil
|
clientConfig.CAData = nil
|
||||||
clientConfig.CAFile = ""
|
clientConfig.CAFile = ""
|
||||||
clientConfig.Insecure = false
|
clientConfig.Insecure = false
|
||||||
return nil
|
|
||||||
|
return t.closeAllConns, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// connTracker is a dialer that tracks all open connections it creates.
|
// connTracker is a dialer that tracks all open connections it creates.
|
||||||
|
@ -187,7 +187,7 @@ func TestRotateShutsDownConnections(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Check for a new cert every 10 milliseconds
|
// Check for a new cert every 10 milliseconds
|
||||||
if err := updateTransport(stop, 10*time.Millisecond, c, m, 0); err != nil {
|
if _, err := updateTransport(stop, 10*time.Millisecond, c, m, 0); err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user