mirror of https://github.com/kubernetes/kops.git
214 lines
5.4 KiB
Go
214 lines
5.4 KiB
Go
/*
|
|
Copyright 2020 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package networking
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
"golang.org/x/sys/unix"
|
|
|
|
"k8s.io/kops/nodeup/pkg/model"
|
|
"k8s.io/kops/upup/pkg/fi"
|
|
"k8s.io/kops/upup/pkg/fi/nodeup/nodetasks"
|
|
"k8s.io/kops/util/pkg/distributions"
|
|
)
|
|
|
|
// CiliumBuilder writes Cilium's assets
|
|
type CiliumBuilder struct {
|
|
*model.NodeupModelContext
|
|
}
|
|
|
|
var _ fi.NodeupModelBuilder = &CiliumBuilder{}
|
|
|
|
// Build is responsible for configuring the network cni
|
|
func (b *CiliumBuilder) Build(c *fi.NodeupModelBuilderContext) error {
|
|
// As long as the Cilium Etcd cluster exists, we should do this
|
|
if b.NodeupConfig.UseCiliumEtcd {
|
|
if err := b.buildCiliumEtcdSecrets(c); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if b.NodeupConfig.Networking.Cilium == nil {
|
|
return nil
|
|
}
|
|
|
|
if err := b.buildBPFMount(c); err != nil {
|
|
return fmt.Errorf("failed to create bpf mount unit: %w", err)
|
|
}
|
|
|
|
if err := b.buildCgroup2Mount(c); err != nil {
|
|
return fmt.Errorf("failed to create cgroupv2 mount unit: %w", err)
|
|
}
|
|
|
|
if (b.Distribution.IsUbuntu() && b.Distribution.Version() >= 22.04) ||
|
|
b.Distribution == distributions.DistributionAmazonLinux2023 {
|
|
// Make systemd-networkd ignore foreign settings, else it may
|
|
// unexpectedly delete IP rules and routes added by CNI
|
|
contents := `
|
|
# Do not clobber any routes or rules added by CNI.
|
|
[Network]
|
|
ManageForeignRoutes=no
|
|
ManageForeignRoutingPolicyRules=no
|
|
`
|
|
c.AddTask(&nodetasks.File{
|
|
Path: "/usr/lib/systemd/networkd.conf.d/40-disable-manage-foreign-routes.conf",
|
|
Contents: fi.NewStringResource(contents),
|
|
Type: nodetasks.FileType_File,
|
|
OnChangeExecute: [][]string{{"systemctl", "restart", "systemd-networkd"}},
|
|
})
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (b *CiliumBuilder) buildBPFMount(c *fi.NodeupModelBuilderContext) error {
|
|
var fsdata unix.Statfs_t
|
|
err := unix.Statfs("/sys/fs/bpf", &fsdata)
|
|
if err != nil {
|
|
return fmt.Errorf("error checking for /sys/fs/bpf: %v", err)
|
|
}
|
|
|
|
// equivalent to unix.BPF_FS_MAGIC in golang.org/x/sys/unix
|
|
BPF_FS_MAGIC := uint32(0xcafe4a11)
|
|
|
|
// systemd v238 includes the bpffs mount by default; and gives an error "has a bad unit file setting" if we try to mount it again (see mount_point_is_api)
|
|
alreadyMounted := uint32(fsdata.Type) == BPF_FS_MAGIC
|
|
|
|
if !alreadyMounted {
|
|
unit := `
|
|
[Unit]
|
|
Description=Cilium BPF mounts
|
|
Documentation=http://docs.cilium.io/
|
|
DefaultDependencies=no
|
|
Before=local-fs.target umount.target kubelet.service
|
|
|
|
[Mount]
|
|
What=bpffs
|
|
Where=/sys/fs/bpf
|
|
Type=bpf
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|
|
`
|
|
|
|
service := &nodetasks.Service{
|
|
Name: "sys-fs-bpf.mount",
|
|
Definition: fi.PtrTo(unit),
|
|
}
|
|
service.InitDefaults()
|
|
c.AddTask(service)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (b *CiliumBuilder) buildCgroup2Mount(c *fi.NodeupModelBuilderContext) error {
|
|
cgroupPath := "/run/cilium/cgroupv2"
|
|
|
|
var fsdata unix.Statfs_t
|
|
err := unix.Statfs(cgroupPath, &fsdata)
|
|
|
|
// If the path does not exist, systemd will create it
|
|
if err != nil && !errors.Is(err, os.ErrNotExist) {
|
|
return fmt.Errorf("error checking for /run/cilium/cgroupv2: %v", err)
|
|
}
|
|
|
|
CGROUP_FS_MAGIC := uint32(0x63677270)
|
|
|
|
alreadyMounted := uint32(fsdata.Type) == CGROUP_FS_MAGIC
|
|
|
|
if !alreadyMounted {
|
|
unit := `
|
|
[Unit]
|
|
Description=Cilium Cgroup2 mounts
|
|
Documentation=http://docs.cilium.io/
|
|
DefaultDependencies=no
|
|
Before=local-fs.target umount.target kubelet.service
|
|
|
|
[Mount]
|
|
What=cgroup2
|
|
Where=/run/cilium/cgroupv2
|
|
Type=cgroup2
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|
|
`
|
|
|
|
service := &nodetasks.Service{
|
|
Name: "run-cilium-cgroupv2.mount",
|
|
Definition: fi.PtrTo(unit),
|
|
SmartRestart: fi.PtrTo(false),
|
|
}
|
|
service.InitDefaults()
|
|
c.AddTask(service)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (b *CiliumBuilder) buildCiliumEtcdSecrets(c *fi.NodeupModelBuilderContext) error {
|
|
name := "etcd-client-cilium"
|
|
dir := "/etc/kubernetes/pki/cilium"
|
|
signer := "etcd-clients-ca-cilium"
|
|
c.AddTask(&nodetasks.File{
|
|
Path: filepath.Join(dir, "etcd-ca.crt"),
|
|
Contents: fi.NewStringResource(b.NodeupConfig.CAs[signer]),
|
|
Type: nodetasks.FileType_File,
|
|
Mode: fi.PtrTo("0600"),
|
|
})
|
|
if b.HasAPIServer {
|
|
issueCert := &nodetasks.IssueCert{
|
|
Name: name,
|
|
Signer: signer,
|
|
KeypairID: b.NodeupConfig.KeypairIDs[signer],
|
|
Type: "client",
|
|
Subject: nodetasks.PKIXName{
|
|
CommonName: "cilium",
|
|
},
|
|
}
|
|
c.AddTask(issueCert)
|
|
return issueCert.AddFileTasks(c, dir, name, "", nil)
|
|
} else {
|
|
cert, key, err := b.GetBootstrapCert(name, signer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
c.AddTask(&nodetasks.File{
|
|
Path: filepath.Join(dir, name+".crt"),
|
|
Contents: cert,
|
|
Type: nodetasks.FileType_File,
|
|
Mode: fi.PtrTo("0644"),
|
|
BeforeServices: []string{"kubelet.service"},
|
|
})
|
|
|
|
c.AddTask(&nodetasks.File{
|
|
Path: filepath.Join(dir, name+".key"),
|
|
Contents: key,
|
|
Type: nodetasks.FileType_File,
|
|
Mode: fi.PtrTo("0400"),
|
|
BeforeServices: []string{"kubelet.service"},
|
|
})
|
|
|
|
return nil
|
|
}
|
|
}
|