mirror of https://github.com/linkerd/linkerd2.git
162 lines
5.8 KiB
Go
162 lines
5.8 KiB
Go
package injector
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/linkerd/linkerd2/controller/k8s"
|
|
"github.com/linkerd/linkerd2/pkg/config"
|
|
"github.com/linkerd/linkerd2/pkg/inject"
|
|
pkgK8s "github.com/linkerd/linkerd2/pkg/k8s"
|
|
"github.com/linkerd/linkerd2/pkg/version"
|
|
log "github.com/sirupsen/logrus"
|
|
admissionv1beta1 "k8s.io/api/admission/v1beta1"
|
|
v1 "k8s.io/api/core/v1"
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/client-go/tools/record"
|
|
)
|
|
|
|
const (
|
|
eventTypeSkipped = "InjectionSkipped"
|
|
eventTypeInjected = "Injected"
|
|
)
|
|
|
|
// Inject returns an AdmissionResponse containing the patch, if any, to apply
|
|
// to the pod (proxy sidecar and eventually the init container to set it up)
|
|
func Inject(
|
|
ctx context.Context,
|
|
api *k8s.API,
|
|
request *admissionv1beta1.AdmissionRequest,
|
|
recorder record.EventRecorder,
|
|
) (*admissionv1beta1.AdmissionResponse, error) {
|
|
log.Debugf("request object bytes: %s", request.Object.Raw)
|
|
|
|
// Build the resource config based off the request metadata and kind of
|
|
// object. This is later used to build the injection report and generated
|
|
// patch.
|
|
valuesConfig, err := config.Values(pkgK8s.MountPathValuesConfig)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
namespace, err := api.NS().Lister().Get(request.Namespace)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
nsAnnotations := namespace.GetAnnotations()
|
|
resourceConfig := inject.NewResourceConfig(valuesConfig, inject.OriginWebhook).
|
|
WithOwnerRetriever(ownerRetriever(ctx, api, request.Namespace)).
|
|
WithNsAnnotations(nsAnnotations).
|
|
WithKind(request.Kind.Kind)
|
|
|
|
// Build the injection report.
|
|
report, err := resourceConfig.ParseMetaAndYAML(request.Object.Raw)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
log.Infof("received %s", report.ResName())
|
|
|
|
// If the resource has an owner, then it should be retrieved for recording
|
|
// events.
|
|
var parent *runtime.Object
|
|
var ownerKind string
|
|
if ownerRef := resourceConfig.GetOwnerRef(); ownerRef != nil {
|
|
objs, err := api.GetObjects(request.Namespace, ownerRef.Kind, ownerRef.Name, labels.Everything())
|
|
if err != nil {
|
|
log.Warnf("couldn't retrieve parent object %s-%s-%s; error: %s", request.Namespace, ownerRef.Kind, ownerRef.Name, err)
|
|
} else if len(objs) == 0 {
|
|
log.Warnf("couldn't retrieve parent object %s-%s-%s", request.Namespace, ownerRef.Kind, ownerRef.Name)
|
|
} else {
|
|
parent = &objs[0]
|
|
}
|
|
ownerKind = strings.ToLower(ownerRef.Kind)
|
|
}
|
|
|
|
configLabels := configToPrometheusLabels(resourceConfig)
|
|
proxyInjectionAdmissionRequests.With(admissionRequestLabels(ownerKind, request.Namespace, report.InjectAnnotationAt, configLabels)).Inc()
|
|
|
|
// If the pod's namespace has the opaque ports annotation but the pod does
|
|
// not, then it should be added to the pod template metadata.
|
|
opaquePorts, opaquePortsOk := resourceConfig.GetOpaquePorts()
|
|
if resourceConfig.IsPod() && opaquePortsOk {
|
|
resourceConfig.AppendPodAnnotation(pkgK8s.ProxyOpaquePortsAnnotation, opaquePorts)
|
|
}
|
|
|
|
// If the resource is injectable then admit it after creating a patch that
|
|
// adds the proxy-init and proxy containers.
|
|
injectable, reasons := report.Injectable()
|
|
if injectable {
|
|
resourceConfig.AppendPodAnnotation(pkgK8s.CreatedByAnnotation, fmt.Sprintf("linkerd/proxy-injector %s", version.Version))
|
|
patchJSON, err := resourceConfig.GetPodPatch(true)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if parent != nil {
|
|
recorder.Event(*parent, v1.EventTypeNormal, eventTypeInjected, "Linkerd sidecar proxy injected")
|
|
}
|
|
log.Infof("injection patch generated for: %s", report.ResName())
|
|
log.Debugf("injection patch: %s", patchJSON)
|
|
proxyInjectionAdmissionResponses.With(admissionResponseLabels(ownerKind, request.Namespace, "false", "", report.InjectAnnotationAt, configLabels)).Inc()
|
|
patchType := admissionv1beta1.PatchTypeJSONPatch
|
|
return &admissionv1beta1.AdmissionResponse{
|
|
UID: request.UID,
|
|
Allowed: true,
|
|
PatchType: &patchType,
|
|
Patch: patchJSON,
|
|
}, nil
|
|
}
|
|
|
|
// If the resource is not injectable but does need the opaque ports
|
|
// annotation added, then admit it after creating a patch that adds the
|
|
// annotation.
|
|
if opaquePortsOk {
|
|
patchJSON, err := resourceConfig.CreateAnnotationPatch(opaquePorts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
log.Infof("annotation patch generated for: %s", report.ResName())
|
|
log.Debugf("annotation patch: %s", patchJSON)
|
|
proxyInjectionAdmissionResponses.With(admissionResponseLabels(ownerKind, request.Namespace, "false", "", report.InjectAnnotationAt, configLabels)).Inc()
|
|
patchType := admissionv1beta1.PatchTypeJSONPatch
|
|
return &admissionv1beta1.AdmissionResponse{
|
|
UID: request.UID,
|
|
Allowed: true,
|
|
PatchType: &patchType,
|
|
Patch: patchJSON,
|
|
}, nil
|
|
}
|
|
|
|
// The resource should be admitted without a patch. If it is a pod, create
|
|
// an event to record that injection was skipped.
|
|
if resourceConfig.IsPod() {
|
|
var readableReasons, metricReasons string
|
|
metricReasons = strings.Join(reasons, ",")
|
|
for _, reason := range reasons {
|
|
readableReasons = readableReasons + ", " + inject.Reasons[reason]
|
|
}
|
|
// removing the initial comma, space
|
|
readableReasons = readableReasons[2:]
|
|
if parent != nil {
|
|
recorder.Eventf(*parent, v1.EventTypeNormal, eventTypeSkipped, "Linkerd sidecar proxy injection skipped: %s", readableReasons)
|
|
}
|
|
log.Infof("skipped %s: %s", report.ResName(), readableReasons)
|
|
proxyInjectionAdmissionResponses.With(admissionResponseLabels(ownerKind, request.Namespace, "true", metricReasons, report.InjectAnnotationAt, configLabels)).Inc()
|
|
return &admissionv1beta1.AdmissionResponse{
|
|
UID: request.UID,
|
|
Allowed: true,
|
|
}, nil
|
|
}
|
|
return &admissionv1beta1.AdmissionResponse{
|
|
UID: request.UID,
|
|
Allowed: true,
|
|
}, nil
|
|
}
|
|
|
|
func ownerRetriever(ctx context.Context, api *k8s.API, ns string) inject.OwnerRetrieverFunc {
|
|
return func(p *v1.Pod) (string, string) {
|
|
p.SetNamespace(ns)
|
|
return api.GetOwnerKindAndName(ctx, p, true)
|
|
}
|
|
}
|