mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-27 05:27:21 +00:00
150 lines
6.6 KiB
Go
150 lines
6.6 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package file
|
|
|
|
import (
|
|
"context"
|
|
"time"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
v1 "k8s.io/api/core/v1"
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
"k8s.io/client-go/tools/clientcmd"
|
|
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
|
|
bootstrapapi "k8s.io/cluster-bootstrap/token/api"
|
|
"k8s.io/klog/v2"
|
|
|
|
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
|
kubeconfigutil "k8s.io/kubernetes/cmd/kubeadm/app/util/kubeconfig"
|
|
)
|
|
|
|
// RetrieveValidatedConfigInfo connects to the API Server and makes sure it can talk
|
|
// securely to the API Server using the provided CA cert and
|
|
// optionally refreshes the cluster-info information from the cluster-info ConfigMap
|
|
func RetrieveValidatedConfigInfo(filepath string, discoveryTimeout time.Duration) (*clientcmdapi.Config, error) {
|
|
config, err := clientcmd.LoadFromFile(filepath)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return ValidateConfigInfo(config, discoveryTimeout)
|
|
}
|
|
|
|
// ValidateConfigInfo connects to the API Server and makes sure it can talk
|
|
// securely to the API Server using the provided CA cert/client certificates and
|
|
// optionally refreshes the cluster-info information from the cluster-info ConfigMap
|
|
func ValidateConfigInfo(config *clientcmdapi.Config, discoveryTimeout time.Duration) (*clientcmdapi.Config, error) {
|
|
if len(config.Clusters) < 1 {
|
|
return nil, errors.New("the provided kubeconfig file must have at least one Cluster defined")
|
|
}
|
|
currentClusterName, currentCluster := kubeconfigutil.GetClusterFromKubeConfig(config)
|
|
if currentCluster == nil {
|
|
return nil, errors.New("the provided kubeconfig file must have a unnamed Cluster or a CurrentContext that specifies a non-nil Cluster")
|
|
}
|
|
if err := clientcmd.Validate(*config); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// If the kubeconfig points to a file for the CA, make sure the CA file contents are embedded
|
|
if err := kubeconfigutil.EnsureCertificateAuthorityIsEmbedded(currentCluster); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// If the discovery file config contains authentication credentials
|
|
if kubeconfigutil.HasAuthenticationCredentials(config) {
|
|
klog.V(1).Info("[discovery] Using authentication credentials from the discovery file for validating TLS connection")
|
|
|
|
// We should ensure that all the authentication info is embedded in config file, so everything will work also when
|
|
// the kubeconfig file will be stored in /etc/kubernetes/boostrap-kubelet.conf
|
|
if err := kubeconfigutil.EnsureAuthenticationInfoAreEmbedded(config); err != nil {
|
|
return nil, err
|
|
}
|
|
} else {
|
|
// If the discovery file config does not contains authentication credentials
|
|
klog.V(1).Info("[discovery] Discovery file does not contains authentication credentials, using unauthenticated request for validating TLS connection")
|
|
}
|
|
|
|
// Try to read the cluster-info config map; this step was required by the original design in order
|
|
// to validate the TLS connection to the server early in the process
|
|
client, err := kubeconfigutil.ToClientSet(config)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
klog.V(1).Infof("[discovery] Created cluster-info discovery client, requesting info from %q\n", currentCluster.Server)
|
|
|
|
var clusterinfoCM *v1.ConfigMap
|
|
|
|
err = wait.Poll(constants.DiscoveryRetryInterval, discoveryTimeout, func() (bool, error) {
|
|
var err error
|
|
clusterinfoCM, err = client.CoreV1().ConfigMaps(metav1.NamespacePublic).Get(context.TODO(), bootstrapapi.ConfigMapClusterInfo, metav1.GetOptions{})
|
|
if err != nil {
|
|
if apierrors.IsForbidden(err) {
|
|
// If the request is unauthorized, the cluster admin has not granted access to the cluster info configmap for unauthenticated users
|
|
// In that case, trust the cluster admin and do not refresh the cluster-info data
|
|
klog.Warningf("[discovery] Could not access the %s ConfigMap for refreshing the cluster-info information, but the TLS cert is valid so proceeding...\n", bootstrapapi.ConfigMapClusterInfo)
|
|
return true, nil
|
|
}
|
|
klog.V(1).Infof("[discovery] Error reading the %s ConfigMap, will try again: %v\n", bootstrapapi.ConfigMapClusterInfo, err)
|
|
return false, nil
|
|
}
|
|
return true, nil
|
|
})
|
|
if err == wait.ErrWaitTimeout {
|
|
return nil, errors.Errorf("Abort reading the %s ConfigMap after timeout of %v", bootstrapapi.ConfigMapClusterInfo, discoveryTimeout)
|
|
}
|
|
|
|
// If we couldn't fetch the cluster-info ConfigMap, just return the cluster-info object the user provided
|
|
if clusterinfoCM == nil {
|
|
return config, nil
|
|
}
|
|
|
|
// We somehow got hold of the ConfigMap, try to read some data from it. If we can't, fallback on the user-provided file
|
|
refreshedBaseKubeConfig, err := tryParseClusterInfoFromConfigMap(clusterinfoCM)
|
|
if err != nil {
|
|
klog.V(1).Infof("[discovery] The %s ConfigMap isn't set up properly (%v), but the TLS cert is valid so proceeding...\n", bootstrapapi.ConfigMapClusterInfo, err)
|
|
return config, nil
|
|
}
|
|
|
|
_, refreshedCluster := kubeconfigutil.GetClusterFromKubeConfig(refreshedBaseKubeConfig)
|
|
if currentCluster.Server != refreshedCluster.Server {
|
|
klog.Warningf("[discovery] the API Server endpoint %q in use is different from the endpoint %q which defined in the %s ConfigMap", currentCluster.Server, refreshedCluster.Server, bootstrapapi.ConfigMapClusterInfo)
|
|
}
|
|
|
|
if len(currentCluster.CertificateAuthorityData) == 0 && len(refreshedCluster.CertificateAuthorityData) > 0 {
|
|
config.Clusters[currentClusterName].CertificateAuthorityData = refreshedCluster.CertificateAuthorityData
|
|
klog.V(1).Infof("[discovery] Synced CertificateAuthorityData from the %s ConfigMap", bootstrapapi.ConfigMapClusterInfo)
|
|
}
|
|
|
|
return config, nil
|
|
}
|
|
|
|
// tryParseClusterInfoFromConfigMap tries to parse a kubeconfig file from a ConfigMap key
|
|
func tryParseClusterInfoFromConfigMap(cm *v1.ConfigMap) (*clientcmdapi.Config, error) {
|
|
kubeConfigString, ok := cm.Data[bootstrapapi.KubeConfigKey]
|
|
if !ok || len(kubeConfigString) == 0 {
|
|
return nil, errors.Errorf("no %s key in ConfigMap", bootstrapapi.KubeConfigKey)
|
|
}
|
|
parsedKubeConfig, err := clientcmd.Load([]byte(kubeConfigString))
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "couldn't parse the kubeconfig file in the %s ConfigMap", bootstrapapi.ConfigMapClusterInfo)
|
|
}
|
|
return parsedKubeConfig, nil
|
|
}
|