kops/nodeup/pkg/model/networking/cilium.go

214 lines
5.4 KiB
Go

/*
Copyright 2020 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package networking
import (
"errors"
"fmt"
"os"
"path/filepath"
"golang.org/x/sys/unix"
"k8s.io/kops/nodeup/pkg/model"
"k8s.io/kops/upup/pkg/fi"
"k8s.io/kops/upup/pkg/fi/nodeup/nodetasks"
"k8s.io/kops/util/pkg/distributions"
)
// CiliumBuilder writes Cilium's assets
type CiliumBuilder struct {
*model.NodeupModelContext
}
var _ fi.NodeupModelBuilder = &CiliumBuilder{}
// Build is responsible for configuring the network cni
func (b *CiliumBuilder) Build(c *fi.NodeupModelBuilderContext) error {
// As long as the Cilium Etcd cluster exists, we should do this
if b.NodeupConfig.UseCiliumEtcd {
if err := b.buildCiliumEtcdSecrets(c); err != nil {
return err
}
}
if b.NodeupConfig.Networking.Cilium == nil {
return nil
}
if err := b.buildBPFMount(c); err != nil {
return fmt.Errorf("failed to create bpf mount unit: %w", err)
}
if err := b.buildCgroup2Mount(c); err != nil {
return fmt.Errorf("failed to create cgroupv2 mount unit: %w", err)
}
if (b.Distribution.IsUbuntu() && b.Distribution.Version() >= 22.04) ||
b.Distribution == distributions.DistributionAmazonLinux2023 {
// Make systemd-networkd ignore foreign settings, else it may
// unexpectedly delete IP rules and routes added by CNI
contents := `
# Do not clobber any routes or rules added by CNI.
[Network]
ManageForeignRoutes=no
ManageForeignRoutingPolicyRules=no
`
c.AddTask(&nodetasks.File{
Path: "/usr/lib/systemd/networkd.conf.d/40-disable-manage-foreign-routes.conf",
Contents: fi.NewStringResource(contents),
Type: nodetasks.FileType_File,
OnChangeExecute: [][]string{{"systemctl", "restart", "systemd-networkd"}},
})
}
return nil
}
func (b *CiliumBuilder) buildBPFMount(c *fi.NodeupModelBuilderContext) error {
var fsdata unix.Statfs_t
err := unix.Statfs("/sys/fs/bpf", &fsdata)
if err != nil {
return fmt.Errorf("error checking for /sys/fs/bpf: %v", err)
}
// equivalent to unix.BPF_FS_MAGIC in golang.org/x/sys/unix
BPF_FS_MAGIC := uint32(0xcafe4a11)
// systemd v238 includes the bpffs mount by default; and gives an error "has a bad unit file setting" if we try to mount it again (see mount_point_is_api)
alreadyMounted := uint32(fsdata.Type) == BPF_FS_MAGIC
if !alreadyMounted {
unit := `
[Unit]
Description=Cilium BPF mounts
Documentation=http://docs.cilium.io/
DefaultDependencies=no
Before=local-fs.target umount.target kubelet.service
[Mount]
What=bpffs
Where=/sys/fs/bpf
Type=bpf
[Install]
WantedBy=multi-user.target
`
service := &nodetasks.Service{
Name: "sys-fs-bpf.mount",
Definition: fi.PtrTo(unit),
}
service.InitDefaults()
c.AddTask(service)
}
return nil
}
func (b *CiliumBuilder) buildCgroup2Mount(c *fi.NodeupModelBuilderContext) error {
cgroupPath := "/run/cilium/cgroupv2"
var fsdata unix.Statfs_t
err := unix.Statfs(cgroupPath, &fsdata)
// If the path does not exist, systemd will create it
if err != nil && !errors.Is(err, os.ErrNotExist) {
return fmt.Errorf("error checking for /run/cilium/cgroupv2: %v", err)
}
CGROUP_FS_MAGIC := uint32(0x63677270)
alreadyMounted := uint32(fsdata.Type) == CGROUP_FS_MAGIC
if !alreadyMounted {
unit := `
[Unit]
Description=Cilium Cgroup2 mounts
Documentation=http://docs.cilium.io/
DefaultDependencies=no
Before=local-fs.target umount.target kubelet.service
[Mount]
What=cgroup2
Where=/run/cilium/cgroupv2
Type=cgroup2
[Install]
WantedBy=multi-user.target
`
service := &nodetasks.Service{
Name: "run-cilium-cgroupv2.mount",
Definition: fi.PtrTo(unit),
SmartRestart: fi.PtrTo(false),
}
service.InitDefaults()
c.AddTask(service)
}
return nil
}
func (b *CiliumBuilder) buildCiliumEtcdSecrets(c *fi.NodeupModelBuilderContext) error {
name := "etcd-client-cilium"
dir := "/etc/kubernetes/pki/cilium"
signer := "etcd-clients-ca-cilium"
c.AddTask(&nodetasks.File{
Path: filepath.Join(dir, "etcd-ca.crt"),
Contents: fi.NewStringResource(b.NodeupConfig.CAs[signer]),
Type: nodetasks.FileType_File,
Mode: fi.PtrTo("0600"),
})
if b.HasAPIServer {
issueCert := &nodetasks.IssueCert{
Name: name,
Signer: signer,
KeypairID: b.NodeupConfig.KeypairIDs[signer],
Type: "client",
Subject: nodetasks.PKIXName{
CommonName: "cilium",
},
}
c.AddTask(issueCert)
return issueCert.AddFileTasks(c, dir, name, "", nil)
} else {
cert, key, err := b.GetBootstrapCert(name, signer)
if err != nil {
return err
}
c.AddTask(&nodetasks.File{
Path: filepath.Join(dir, name+".crt"),
Contents: cert,
Type: nodetasks.FileType_File,
Mode: fi.PtrTo("0644"),
BeforeServices: []string{"kubelet.service"},
})
c.AddTask(&nodetasks.File{
Path: filepath.Join(dir, name+".key"),
Contents: key,
Type: nodetasks.FileType_File,
Mode: fi.PtrTo("0400"),
BeforeServices: []string{"kubelet.service"},
})
return nil
}
}