/* Copyright 2019 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package gcemodel import ( "fmt" "k8s.io/apimachinery/pkg/util/sets" "k8s.io/klog/v2" "k8s.io/kops/pkg/apis/kops" "k8s.io/kops/pkg/featureflag" "k8s.io/kops/pkg/model/iam" "k8s.io/kops/upup/pkg/fi" "k8s.io/kops/upup/pkg/fi/cloudup/gce" "k8s.io/kops/upup/pkg/fi/cloudup/gcetasks" "k8s.io/kops/util/pkg/vfs" ) // StorageAclBuilder configures storage acls type StorageAclBuilder struct { *GCEModelContext Cloud gce.GCECloud Lifecycle *fi.Lifecycle } var _ fi.ModelBuilder = &NetworkModelBuilder{} // Build creates the tasks that set up storage acls func (b *StorageAclBuilder) Build(c *fi.ModelBuilderContext) error { serviceAccount, err := b.Cloud.ServiceAccount() if err != nil { return fmt.Errorf("error fetching ServiceAccount: %v", err) } if featureflag.GoogleCloudBucketACL.Enabled() { clusterPath := b.Cluster.Spec.ConfigBase p, err := vfs.Context.BuildVfsPath(clusterPath) if err != nil { return fmt.Errorf("cannot parse cluster path %q: %v", clusterPath, err) } switch p := p.(type) { case *vfs.GSPath: // It's not ideal that we have to do this at the bucket level, // but GCS doesn't seem to have a way to do subtrees (like AWS IAM does) // Note this permission only lets us list objects, not read them c.AddTask(&gcetasks.StorageBucketAcl{ Name: s("serviceaccount-statestore-list"), Lifecycle: b.Lifecycle, Bucket: s(p.Bucket()), Entity: s("user-" + serviceAccount), Role: s("READER"), }) } klog.Warningf("we need to split master / node roles") nodeRole, err := iam.BuildNodeRoleSubject(kops.InstanceGroupRoleMaster) if err != nil { return err } writeablePaths, err := iam.WriteableVFSPaths(b.Cluster, nodeRole) if err != nil { return err } buckets := sets.NewString() for _, p := range writeablePaths { if gcsPath, ok := p.(*vfs.GSPath); ok { bucket := gcsPath.Bucket() if buckets.Has(bucket) { continue } klog.Warningf("adding bucket level write ACL to gs://%s to support etcd backup", bucket) c.AddTask(&gcetasks.StorageBucketAcl{ Name: s("serviceaccount-backup-readwrite-" + bucket), Lifecycle: b.Lifecycle, Bucket: s(bucket), Entity: s("user-" + serviceAccount), Role: s("WRITER"), }) buckets.Insert(bucket) } else { klog.Warningf("unknown path, can't apply IAM policy: %q", p) } } } return nil }