mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 13:50:01 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			224 lines
		
	
	
		
			6.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			224 lines
		
	
	
		
			6.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2016 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package certificates
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"time"
 | |
| 
 | |
| 	"k8s.io/kubernetes/pkg/api/v1"
 | |
| 	certificates "k8s.io/kubernetes/pkg/apis/certificates/v1alpha1"
 | |
| 	"k8s.io/kubernetes/pkg/client/cache"
 | |
| 	clientset "k8s.io/kubernetes/pkg/client/clientset_generated/release_1_5"
 | |
| 	v1core "k8s.io/kubernetes/pkg/client/clientset_generated/release_1_5/typed/core/v1"
 | |
| 	"k8s.io/kubernetes/pkg/client/record"
 | |
| 	"k8s.io/kubernetes/pkg/controller"
 | |
| 	"k8s.io/kubernetes/pkg/runtime"
 | |
| 	utilruntime "k8s.io/kubernetes/pkg/util/runtime"
 | |
| 	"k8s.io/kubernetes/pkg/util/wait"
 | |
| 	"k8s.io/kubernetes/pkg/util/workqueue"
 | |
| 	"k8s.io/kubernetes/pkg/watch"
 | |
| 
 | |
| 	"github.com/cloudflare/cfssl/config"
 | |
| 	"github.com/cloudflare/cfssl/signer"
 | |
| 	"github.com/cloudflare/cfssl/signer/local"
 | |
| 	"github.com/golang/glog"
 | |
| )
 | |
| 
 | |
| type AutoApprover interface {
 | |
| 	AutoApprove(csr *certificates.CertificateSigningRequest) (*certificates.CertificateSigningRequest, error)
 | |
| }
 | |
| 
 | |
| type CertificateController struct {
 | |
| 	kubeClient clientset.Interface
 | |
| 
 | |
| 	// CSR framework and store
 | |
| 	csrController *cache.Controller
 | |
| 	csrStore      cache.StoreToCertificateRequestLister
 | |
| 
 | |
| 	syncHandler func(csrKey string) error
 | |
| 
 | |
| 	approver AutoApprover
 | |
| 
 | |
| 	signer *local.Signer
 | |
| 
 | |
| 	queue workqueue.RateLimitingInterface
 | |
| }
 | |
| 
 | |
| func NewCertificateController(kubeClient clientset.Interface, syncPeriod time.Duration, caCertFile, caKeyFile string, approver AutoApprover) (*CertificateController, error) {
 | |
| 	// Send events to the apiserver
 | |
| 	eventBroadcaster := record.NewBroadcaster()
 | |
| 	eventBroadcaster.StartLogging(glog.Infof)
 | |
| 	eventBroadcaster.StartRecordingToSink(&v1core.EventSinkImpl{Interface: kubeClient.Core().Events("")})
 | |
| 
 | |
| 	// Configure cfssl signer
 | |
| 	// TODO: support non-default policy and remote/pkcs11 signing
 | |
| 	policy := &config.Signing{
 | |
| 		Default: config.DefaultConfig(),
 | |
| 	}
 | |
| 	ca, err := local.NewSignerFromFile(caCertFile, caKeyFile, policy)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	cc := &CertificateController{
 | |
| 		kubeClient: kubeClient,
 | |
| 		queue:      workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), "certificate"),
 | |
| 		signer:     ca,
 | |
| 		approver:   approver,
 | |
| 	}
 | |
| 
 | |
| 	// Manage the addition/update of certificate requests
 | |
| 	cc.csrStore.Store, cc.csrController = cache.NewInformer(
 | |
| 		&cache.ListWatch{
 | |
| 			ListFunc: func(options v1.ListOptions) (runtime.Object, error) {
 | |
| 				return cc.kubeClient.Certificates().CertificateSigningRequests().List(options)
 | |
| 			},
 | |
| 			WatchFunc: func(options v1.ListOptions) (watch.Interface, error) {
 | |
| 				return cc.kubeClient.Certificates().CertificateSigningRequests().Watch(options)
 | |
| 			},
 | |
| 		},
 | |
| 		&certificates.CertificateSigningRequest{},
 | |
| 		syncPeriod,
 | |
| 		cache.ResourceEventHandlerFuncs{
 | |
| 			AddFunc: func(obj interface{}) {
 | |
| 				csr := obj.(*certificates.CertificateSigningRequest)
 | |
| 				glog.V(4).Infof("Adding certificate request %s", csr.Name)
 | |
| 				cc.enqueueCertificateRequest(obj)
 | |
| 			},
 | |
| 			UpdateFunc: func(old, new interface{}) {
 | |
| 				oldCSR := old.(*certificates.CertificateSigningRequest)
 | |
| 				glog.V(4).Infof("Updating certificate request %s", oldCSR.Name)
 | |
| 				cc.enqueueCertificateRequest(new)
 | |
| 			},
 | |
| 			DeleteFunc: func(obj interface{}) {
 | |
| 				csr, ok := obj.(*certificates.CertificateSigningRequest)
 | |
| 				if !ok {
 | |
| 					tombstone, ok := obj.(cache.DeletedFinalStateUnknown)
 | |
| 					if !ok {
 | |
| 						glog.V(2).Infof("Couldn't get object from tombstone %#v", obj)
 | |
| 						return
 | |
| 					}
 | |
| 					csr, ok = tombstone.Obj.(*certificates.CertificateSigningRequest)
 | |
| 					if !ok {
 | |
| 						glog.V(2).Infof("Tombstone contained object that is not a CSR: %#v", obj)
 | |
| 						return
 | |
| 					}
 | |
| 				}
 | |
| 				glog.V(4).Infof("Deleting certificate request %s", csr.Name)
 | |
| 				cc.enqueueCertificateRequest(obj)
 | |
| 			},
 | |
| 		},
 | |
| 	)
 | |
| 	cc.syncHandler = cc.maybeSignCertificate
 | |
| 	return cc, nil
 | |
| }
 | |
| 
 | |
| // Run the main goroutine responsible for watching and syncing jobs.
 | |
| func (cc *CertificateController) Run(workers int, stopCh <-chan struct{}) {
 | |
| 	defer utilruntime.HandleCrash()
 | |
| 	defer cc.queue.ShutDown()
 | |
| 
 | |
| 	go cc.csrController.Run(stopCh)
 | |
| 
 | |
| 	glog.Infof("Starting certificate controller manager")
 | |
| 	for i := 0; i < workers; i++ {
 | |
| 		go wait.Until(cc.worker, time.Second, stopCh)
 | |
| 	}
 | |
| 	<-stopCh
 | |
| 	glog.Infof("Shutting down certificate controller")
 | |
| }
 | |
| 
 | |
| // worker runs a thread that dequeues CSRs, handles them, and marks them done.
 | |
| func (cc *CertificateController) worker() {
 | |
| 	for cc.processNextWorkItem() {
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // processNextWorkItem deals with one key off the queue.  It returns false when it's time to quit.
 | |
| func (cc *CertificateController) processNextWorkItem() bool {
 | |
| 	cKey, quit := cc.queue.Get()
 | |
| 	if quit {
 | |
| 		return false
 | |
| 	}
 | |
| 	defer cc.queue.Done(cKey)
 | |
| 
 | |
| 	err := cc.syncHandler(cKey.(string))
 | |
| 	if err == nil {
 | |
| 		cc.queue.Forget(cKey)
 | |
| 		return true
 | |
| 	}
 | |
| 
 | |
| 	cc.queue.AddRateLimited(cKey)
 | |
| 	utilruntime.HandleError(fmt.Errorf("Sync %v failed with : %v", cKey, err))
 | |
| 	return true
 | |
| }
 | |
| 
 | |
| func (cc *CertificateController) enqueueCertificateRequest(obj interface{}) {
 | |
| 	key, err := controller.KeyFunc(obj)
 | |
| 	if err != nil {
 | |
| 		utilruntime.HandleError(fmt.Errorf("Couldn't get key for object %+v: %v", obj, err))
 | |
| 		return
 | |
| 	}
 | |
| 	cc.queue.Add(key)
 | |
| }
 | |
| 
 | |
| // maybeSignCertificate will inspect the certificate request and, if it has
 | |
| // been approved and meets policy expectations, generate an X509 cert using the
 | |
| // cluster CA assets. If successful it will update the CSR approve subresource
 | |
| // with the signed certificate.
 | |
| func (cc *CertificateController) maybeSignCertificate(key string) error {
 | |
| 	startTime := time.Now()
 | |
| 	defer func() {
 | |
| 		glog.V(4).Infof("Finished syncing certificate request %q (%v)", key, time.Now().Sub(startTime))
 | |
| 	}()
 | |
| 	obj, exists, err := cc.csrStore.Store.GetByKey(key)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if !exists {
 | |
| 		glog.V(3).Infof("csr has been deleted: %v", key)
 | |
| 		return nil
 | |
| 	}
 | |
| 	csr := obj.(*certificates.CertificateSigningRequest)
 | |
| 
 | |
| 	if cc.approver != nil {
 | |
| 		csr, err = cc.approver.AutoApprove(csr)
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("error auto approving csr: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// At this point, the controller needs to:
 | |
| 	// 1. Check the approval conditions
 | |
| 	// 2. Generate a signed certificate
 | |
| 	// 3. Update the Status subresource
 | |
| 
 | |
| 	if csr.Status.Certificate == nil && IsCertificateRequestApproved(csr) {
 | |
| 		pemBytes := csr.Spec.Request
 | |
| 		req := signer.SignRequest{Request: string(pemBytes)}
 | |
| 		certBytes, err := cc.signer.Sign(req)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		csr.Status.Certificate = certBytes
 | |
| 	}
 | |
| 
 | |
| 	_, err = cc.kubeClient.Certificates().CertificateSigningRequests().UpdateStatus(csr)
 | |
| 	return err
 | |
| }
 |