Fix sync of secrets (kube lego)
This commit is contained in:
parent
cbb703c950
commit
73bca9f192
3 changed files with 47 additions and 15 deletions
|
@ -24,9 +24,12 @@ import (
|
||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
|
|
||||||
apiv1 "k8s.io/api/core/v1"
|
apiv1 "k8s.io/api/core/v1"
|
||||||
|
extensions "k8s.io/api/extensions/v1beta1"
|
||||||
"k8s.io/client-go/tools/cache"
|
"k8s.io/client-go/tools/cache"
|
||||||
|
|
||||||
"k8s.io/ingress/core/pkg/ingress"
|
"k8s.io/ingress/core/pkg/ingress"
|
||||||
|
"k8s.io/ingress/core/pkg/ingress/annotations/class"
|
||||||
|
"k8s.io/ingress/core/pkg/ingress/annotations/parser"
|
||||||
"k8s.io/ingress/core/pkg/net/ssl"
|
"k8s.io/ingress/core/pkg/net/ssl"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -56,12 +59,15 @@ func (ic *GenericController) syncSecret(key string) {
|
||||||
ic.syncSecret(key)
|
ic.syncSecret(key)
|
||||||
// this update must trigger an update
|
// this update must trigger an update
|
||||||
// (like an update event from a change in Ingress)
|
// (like an update event from a change in Ingress)
|
||||||
ic.syncIngress("secret-update")
|
ic.syncIngress("update-secret")
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
glog.Infof("adding secret %v to the local store", key)
|
glog.Infof("adding secret %v to the local store", key)
|
||||||
ic.sslCertTracker.Add(key, cert)
|
ic.sslCertTracker.Add(key, cert)
|
||||||
|
// this new secret must trigger an update
|
||||||
|
// (like an update event from a change in Ingress)
|
||||||
|
ic.syncIngress("add-secret")
|
||||||
}
|
}
|
||||||
|
|
||||||
// getPemCertificate receives a secret, and creates a ingress.SSLCert as return.
|
// getPemCertificate receives a secret, and creates a ingress.SSLCert as return.
|
||||||
|
@ -120,6 +126,41 @@ func (ic *GenericController) getPemCertificate(secretName string) (*ingress.SSLC
|
||||||
return s, nil
|
return s, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// checkMissingSecrets verify if one or more ingress rules contains a reference
|
||||||
|
// to a secret that is not present in the local secret store.
|
||||||
|
// In this case we call syncSecret.
|
||||||
|
func (ic *GenericController) checkMissingSecrets() {
|
||||||
|
for _, key := range ic.listers.Ingress.ListKeys() {
|
||||||
|
if obj, exists, _ := ic.listers.Ingress.GetByKey(key); exists {
|
||||||
|
ing := obj.(*extensions.Ingress)
|
||||||
|
|
||||||
|
if !class.IsValid(ing, ic.cfg.IngressClass, ic.cfg.DefaultIngressClass) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tls := range ing.Spec.TLS {
|
||||||
|
if tls.SecretName == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
key := fmt.Sprintf("%v/%v", ing.Namespace, tls.SecretName)
|
||||||
|
if _, ok := ic.sslCertTracker.Get(key); !ok {
|
||||||
|
ic.syncSecret(key)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
key, _ := parser.GetStringAnnotation("ingress.kubernetes.io/auth-tls-secret", ing)
|
||||||
|
if key == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, ok := ic.sslCertTracker.Get(key); !ok {
|
||||||
|
ic.syncSecret(key)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// sslCertTracker holds a store of referenced Secrets in Ingress rules
|
// sslCertTracker holds a store of referenced Secrets in Ingress rules
|
||||||
type sslCertTracker struct {
|
type sslCertTracker struct {
|
||||||
cache.ThreadSafeStore
|
cache.ThreadSafeStore
|
||||||
|
|
|
@ -36,6 +36,7 @@ import (
|
||||||
"k8s.io/apimachinery/pkg/util/intstr"
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
"k8s.io/apimachinery/pkg/util/runtime"
|
"k8s.io/apimachinery/pkg/util/runtime"
|
||||||
"k8s.io/apimachinery/pkg/util/sets"
|
"k8s.io/apimachinery/pkg/util/sets"
|
||||||
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
clientset "k8s.io/client-go/kubernetes"
|
clientset "k8s.io/client-go/kubernetes"
|
||||||
"k8s.io/client-go/kubernetes/scheme"
|
"k8s.io/client-go/kubernetes/scheme"
|
||||||
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
v1core "k8s.io/client-go/kubernetes/typed/core/v1"
|
||||||
|
@ -682,7 +683,6 @@ func (ic *GenericController) getBackendServers(ingresses []*extensions.Ingress)
|
||||||
return aUpstreams, aServers
|
return aUpstreams, aServers
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
// GetAuthCertificate is used by the auth-tls annotations to get a cert from a secret
|
// GetAuthCertificate is used by the auth-tls annotations to get a cert from a secret
|
||||||
func (ic GenericController) GetAuthCertificate(secretName string) (*resolver.AuthSSLCert, error) {
|
func (ic GenericController) GetAuthCertificate(secretName string) (*resolver.AuthSSLCert, error) {
|
||||||
if _, exists := ic.sslCertTracker.Get(secretName); !exists {
|
if _, exists := ic.sslCertTracker.Get(secretName); !exists {
|
||||||
|
@ -1220,6 +1220,8 @@ func (ic *GenericController) Start() {
|
||||||
go ic.secrController.Run(ic.stopCh)
|
go ic.secrController.Run(ic.stopCh)
|
||||||
go ic.mapController.Run(ic.stopCh)
|
go ic.mapController.Run(ic.stopCh)
|
||||||
|
|
||||||
|
go wait.Until(ic.checkMissingSecrets, 30*time.Second, ic.stopCh)
|
||||||
|
|
||||||
// Wait for all involved caches to be synced, before processing items from the queue is started
|
// Wait for all involved caches to be synced, before processing items from the queue is started
|
||||||
if !cache.WaitForCacheSync(ic.stopCh,
|
if !cache.WaitForCacheSync(ic.stopCh,
|
||||||
ic.ingController.HasSynced,
|
ic.ingController.HasSynced,
|
||||||
|
@ -1233,19 +1235,7 @@ func (ic *GenericController) Start() {
|
||||||
}
|
}
|
||||||
|
|
||||||
// initial sync of secrets to avoid unnecessary reloads
|
// initial sync of secrets to avoid unnecessary reloads
|
||||||
for _, key := range ic.listers.Ingress.ListKeys() {
|
ic.checkMissingSecrets()
|
||||||
if obj, exists, _ := ic.listers.Ingress.GetByKey(key); exists {
|
|
||||||
ing := obj.(*extensions.Ingress)
|
|
||||||
|
|
||||||
if !class.IsValid(ing, ic.cfg.IngressClass, ic.cfg.DefaultIngressClass) {
|
|
||||||
a, _ := parser.GetStringAnnotation(class.IngressKey, ing)
|
|
||||||
glog.Infof("ignoring add for ingress %v based on annotation %v with value %v", ing.Name, class.IngressKey, a)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
ic.readSecrets(ing)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
createDefaultSSLCertificate()
|
createDefaultSSLCertificate()
|
||||||
|
|
||||||
|
|
|
@ -113,6 +113,7 @@ func (ic *GenericController) createListers(disableNodeLister bool) {
|
||||||
}
|
}
|
||||||
key := fmt.Sprintf("%v/%v", sec.Namespace, sec.Name)
|
key := fmt.Sprintf("%v/%v", sec.Namespace, sec.Name)
|
||||||
ic.sslCertTracker.DeleteAll(key)
|
ic.sslCertTracker.DeleteAll(key)
|
||||||
|
ic.syncQueue.Enqueue(key)
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue