kops/nodeup/pkg/model/kube_apiserver_healthcheck.go

204 lines
5.3 KiB
Go

/*
Copyright 2020 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package model
import (
"crypto/x509"
"crypto/x509/pkix"
"fmt"
"path/filepath"
corev1 "k8s.io/api/core/v1"
"k8s.io/klog"
"k8s.io/kops/pkg/apis/nodeup"
"k8s.io/kops/pkg/pki"
"k8s.io/kops/pkg/wellknownusers"
"k8s.io/kops/upup/pkg/fi"
"k8s.io/kops/upup/pkg/fi/nodeup/nodetasks"
"sigs.k8s.io/yaml"
)
func (b *KubeAPIServerBuilder) findHealthcheckManifest() *nodeup.StaticManifest {
if b.NodeupConfig == nil {
return nil
}
for _, manifest := range b.NodeupConfig.StaticManifests {
if manifest.Key == "kube-apiserver-healthcheck" {
return manifest
}
}
return nil
}
func (b *KubeAPIServerBuilder) addHealthcheckSidecar(pod *corev1.Pod) error {
manifest := b.findHealthcheckManifest()
if manifest == nil {
return nil
}
p := b.ConfigBase.Join(manifest.Path)
data, err := p.ReadFile()
if err != nil {
return fmt.Errorf("error reading kube-apiserver-healthcheck manifest %s: %v", manifest.Path, err)
}
sidecar := &corev1.Pod{}
if err := yaml.Unmarshal(data, sidecar); err != nil {
return fmt.Errorf("error parsing kube-apiserver-healthcheck manifest %s: %v", manifest.Path, err)
}
// Quick-and-dirty merge of the fields we care about
pod.Spec.Containers = append(pod.Spec.Containers, sidecar.Spec.Containers...)
pod.Spec.Volumes = append(pod.Spec.Volumes, sidecar.Spec.Volumes...)
return nil
}
func (b *KubeAPIServerBuilder) addHealthcheckSidecarTasks(c *fi.ModelBuilderContext) error {
id := "kube-apiserver-healthcheck"
secretsDir := "/etc/kubernetes/" + id + "/secrets"
userID := wellknownusers.KubeApiserverHealthcheckID
userName := wellknownusers.KubeApiserverHealthcheckName
// We create user a user and hardcode its UID to 10012 as
// that is the ID used inside the container.
{
c.AddTask(&nodetasks.UserTask{
Name: userName,
UID: userID,
Shell: "/sbin/nologin",
Home: secretsDir,
})
}
clientKey, clientCert, err := b.buildClientKeypair(id)
if err != nil {
return err
}
c.AddTask(&nodetasks.File{
Path: filepath.Join(secretsDir),
Type: nodetasks.FileType_Directory,
Mode: s("0755"),
})
clientCertBytes, err := clientCert.AsBytes()
if err != nil {
return err
}
c.AddTask(&nodetasks.File{
Path: filepath.Join(secretsDir, "client.crt"),
Contents: fi.NewBytesResource(clientCertBytes),
Type: nodetasks.FileType_File,
Mode: s("0644"),
Owner: s(userName),
})
clientKeyBytes, err := clientKey.AsBytes()
if err != nil {
return err
}
c.AddTask(&nodetasks.File{
Path: filepath.Join(secretsDir, "client.key"),
Contents: fi.NewBytesResource(clientKeyBytes),
Type: nodetasks.FileType_File,
Mode: s("0600"),
Owner: s(userName),
})
cert, err := b.GetCert(fi.CertificateId_CA)
if err != nil {
return err
}
c.AddTask(&nodetasks.File{
Path: filepath.Join(secretsDir, "ca.crt"),
Contents: fi.NewBytesResource(cert),
Type: nodetasks.FileType_File,
Mode: s("0644"),
Owner: s(userName),
})
return nil
}
func (b *KubeAPIServerBuilder) buildClientKeypair(commonName string) (*pki.PrivateKey, *pki.Certificate, error) {
signerID := fi.CertificateId_CA
var signerKey *pki.PrivateKey
{
k, err := b.KeyStore.FindPrivateKey(signerID)
if err != nil {
return nil, nil, err
}
if k == nil {
return nil, nil, fmt.Errorf("private key %q not found", signerID)
}
signerKey = k
}
var signerCertificate *pki.Certificate
{
cert, err := b.KeyStore.FindCert(signerID)
if err != nil {
return nil, nil, err
}
if cert == nil {
return nil, nil, fmt.Errorf("certificate %q not found", signerID)
}
signerCertificate = cert
}
privateKey, err := pki.GeneratePrivateKey()
if err != nil {
return nil, nil, err
}
template := &x509.Certificate{
BasicConstraintsValid: true,
IsCA: false,
Subject: pkix.Name{
CommonName: commonName,
},
}
// https://tools.ietf.org/html/rfc5280#section-4.2.1.3
//
// Digital signature allows the certificate to be used to verify
// digital signatures used during TLS negotiation.
template.KeyUsage = template.KeyUsage | x509.KeyUsageDigitalSignature
// KeyEncipherment allows the cert/key pair to be used to encrypt
// keys, including the symmetric keys negotiated during TLS setup
// and used for data transfer.
template.KeyUsage = template.KeyUsage | x509.KeyUsageKeyEncipherment
// ClientAuth allows the cert to be used by a TLS client to
// authenticate itself to the TLS server.
template.ExtKeyUsage = append(template.ExtKeyUsage, x509.ExtKeyUsageClientAuth)
klog.Infof("signing certificate for %q", commonName)
cert, err := pki.SignNewCertificate(privateKey, template, signerCertificate.Certificate, signerKey)
if err != nil {
return nil, nil, fmt.Errorf("error signing certificate for %q: %v", commonName, err)
}
return privateKey, cert, nil
}