Merge pull request #991 from aledbf/ssl-refactoring

Remove secret sync loop
This commit is contained in:
Manuel Alejandro de Brito Fontes 2017-07-19 12:19:36 -04:00 committed by GitHub
commit e59ac13eba
3 changed files with 67 additions and 66 deletions

View file

@ -24,27 +24,27 @@ import (
"github.com/golang/glog" "github.com/golang/glog"
api "k8s.io/client-go/pkg/api/v1" api "k8s.io/client-go/pkg/api/v1"
extensions "k8s.io/client-go/pkg/apis/extensions/v1beta1"
"k8s.io/client-go/tools/cache" "k8s.io/client-go/tools/cache"
"k8s.io/ingress/core/pkg/ingress" "k8s.io/ingress/core/pkg/ingress"
"k8s.io/ingress/core/pkg/ingress/annotations/parser"
"k8s.io/ingress/core/pkg/net/ssl" "k8s.io/ingress/core/pkg/net/ssl"
) )
// syncSecret keeps in sync Secrets used by Ingress rules with the files on // syncSecret keeps in sync Secrets used by Ingress rules with the files on
// disk to allow copy of the content of the secret to disk to be used // disk to allow copy of the content of the secret to disk to be used
// by external processes. // by external processes.
func (ic *GenericController) syncSecret() { func (ic *GenericController) syncSecret(key string) {
glog.V(3).Infof("starting syncing of secrets") glog.V(3).Infof("starting syncing of secret %v", key)
var cert *ingress.SSLCert var cert *ingress.SSLCert
var err error var err error
for _, k := range ic.secretTracker.List() {
key := k.(string)
cert, err = ic.getPemCertificate(key) cert, err = ic.getPemCertificate(key)
if err != nil { if err != nil {
glog.Warningf("error obtaining PEM from secret %v: %v", key, err) glog.Warningf("error obtaining PEM from secret %v: %v", key, err)
continue return
} }
// create certificates and add or update the item in the store // create certificates and add or update the item in the store
@ -53,19 +53,18 @@ func (ic *GenericController) syncSecret() {
s := cur.(*ingress.SSLCert) s := cur.(*ingress.SSLCert)
if reflect.DeepEqual(s, cert) { if reflect.DeepEqual(s, cert) {
// no need to update // no need to update
continue return
} }
glog.Infof("updating secret %v in the local store", key) glog.Infof("updating secret %v in the local store", key)
ic.sslCertTracker.Update(key, cert) ic.sslCertTracker.Update(key, cert)
ic.reloadRequired = true ic.reloadRequired = true
continue return
} }
glog.Infof("adding secret %v to the local store", key) glog.Infof("adding secret %v to the local store", key)
ic.sslCertTracker.Add(key, cert) ic.sslCertTracker.Add(key, cert)
ic.reloadRequired = true ic.reloadRequired = true
} }
}
// getPemCertificate receives a secret, and creates a ingress.SSLCert as return. // getPemCertificate receives a secret, and creates a ingress.SSLCert as return.
// It parses the secret and verifies if it's a keypair, or a 'ca.crt' secret only. // It parses the secret and verifies if it's a keypair, or a 'ca.crt' secret only.
@ -112,6 +111,26 @@ func (ic *GenericController) getPemCertificate(secretName string) (*ingress.SSLC
return s, nil return s, nil
} }
// secrReferenced checks if a secret is referenced or not by one or more Ingress rules
func (ic *GenericController) secrReferenced(name, namespace string) bool {
for _, ingIf := range ic.ingLister.Store.List() {
ing := ingIf.(*extensions.Ingress)
str, err := parser.GetStringAnnotation("ingress.kubernetes.io/auth-tls-secret", ing)
if err == nil && str == fmt.Sprintf("%v/%v", namespace, name) {
return true
}
if ing.Namespace != namespace {
continue
}
for _, tls := range ing.Spec.TLS {
if tls.SecretName == name {
return true
}
}
}
return false
}
// sslCertTracker holds a store of referenced Secrets in Ingress rules // sslCertTracker holds a store of referenced Secrets in Ingress rules
type sslCertTracker struct { type sslCertTracker struct {
cache.ThreadSafeStore cache.ThreadSafeStore
@ -123,13 +142,6 @@ func newSSLCertTracker() *sslCertTracker {
} }
} }
// secretTracker holds a store of Secrets func (s *sslCertTracker) DeleteAll(key string) {
type secretTracker struct { s.Delete(key)
cache.ThreadSafeStore
}
func newSecretTracker() *secretTracker {
return &secretTracker{
cache.NewThreadSafeStore(cache.Indexers{}, cache.Indices{}),
}
} }

View file

@ -110,7 +110,6 @@ func buildGenericControllerForBackendSSL() *GenericController {
mapController: buildControllerForBackendSSL(), mapController: buildControllerForBackendSSL(),
sslCertTracker: newSSLCertTracker(), sslCertTracker: newSSLCertTracker(),
secretTracker: newSecretTracker(),
} }
} }
@ -157,7 +156,6 @@ func TestSyncSecret(t *testing.T) {
for _, foo := range foos { for _, foo := range foos {
t.Run(foo.tn, func(t *testing.T) { t.Run(foo.tn, func(t *testing.T) {
ic := buildGenericControllerForBackendSSL() ic := buildGenericControllerForBackendSSL()
ic.secretTracker.Add(foo.secretName, foo.secretName)
// init secret for getPemCertificate // init secret for getPemCertificate
secret := buildSecretForBackendSSL() secret := buildSecretForBackendSSL()
@ -166,16 +164,17 @@ func TestSyncSecret(t *testing.T) {
secret.Data = foo.Data secret.Data = foo.Data
ic.secrLister.Add(secret) ic.secrLister.Add(secret)
key := "default/foo_secret"
// for add // for add
ic.syncSecret() ic.syncSecret(key)
if foo.expectSuccess { if foo.expectSuccess {
// validate // validate
_, exist := ic.sslCertTracker.Get(foo.secretName) _, exist := ic.sslCertTracker.Get(key)
if !exist { if !exist {
t.Errorf("Failed to sync secret: %s", foo.secretName) t.Errorf("Failed to sync secret: %s", foo.secretName)
} else { } else {
// for update // for update
ic.syncSecret() ic.syncSecret(key)
} }
} }
}) })

View file

@ -32,7 +32,6 @@ import (
"k8s.io/apimachinery/pkg/fields" "k8s.io/apimachinery/pkg/fields"
"k8s.io/apimachinery/pkg/util/intstr" "k8s.io/apimachinery/pkg/util/intstr"
"k8s.io/apimachinery/pkg/util/runtime" "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/apimachinery/pkg/util/wait"
clientset "k8s.io/client-go/kubernetes" clientset "k8s.io/client-go/kubernetes"
"k8s.io/client-go/kubernetes/scheme" "k8s.io/client-go/kubernetes/scheme"
unversionedcore "k8s.io/client-go/kubernetes/typed/core/v1" unversionedcore "k8s.io/client-go/kubernetes/typed/core/v1"
@ -51,7 +50,6 @@ import (
"k8s.io/ingress/core/pkg/ingress/defaults" "k8s.io/ingress/core/pkg/ingress/defaults"
"k8s.io/ingress/core/pkg/ingress/resolver" "k8s.io/ingress/core/pkg/ingress/resolver"
"k8s.io/ingress/core/pkg/ingress/status" "k8s.io/ingress/core/pkg/ingress/status"
"k8s.io/ingress/core/pkg/ingress/status/leaderelection/resourcelock"
"k8s.io/ingress/core/pkg/ingress/store" "k8s.io/ingress/core/pkg/ingress/store"
"k8s.io/ingress/core/pkg/k8s" "k8s.io/ingress/core/pkg/k8s"
"k8s.io/ingress/core/pkg/net/ssl" "k8s.io/ingress/core/pkg/net/ssl"
@ -99,8 +97,6 @@ type GenericController struct {
// local store of SSL certificates // local store of SSL certificates
// (only certificates used in ingress) // (only certificates used in ingress)
sslCertTracker *sslCertTracker sslCertTracker *sslCertTracker
// store of secret names referenced from Ingress
secretTracker *secretTracker
syncRateLimiter flowcontrol.RateLimiter syncRateLimiter flowcontrol.RateLimiter
@ -167,7 +163,6 @@ func newIngressController(config *Configuration) *GenericController {
Component: "ingress-controller", Component: "ingress-controller",
}), }),
sslCertTracker: newSSLCertTracker(), sslCertTracker: newSSLCertTracker(),
secretTracker: newSecretTracker(),
} }
ic.syncQueue = task.NewTaskQueue(ic.syncIngress) ic.syncQueue = task.NewTaskQueue(ic.syncIngress)
@ -219,26 +214,29 @@ func newIngressController(config *Configuration) *GenericController {
} }
secrEventHandler := cache.ResourceEventHandlerFuncs{ secrEventHandler := cache.ResourceEventHandlerFuncs{
AddFunc: func(obj interface{}) {
sec := obj.(*api.Secret)
key := fmt.Sprintf("%v/%v", sec.Namespace, sec.Name)
if ic.secrReferenced(sec.Namespace, sec.Name) {
ic.syncSecret(key)
}
},
UpdateFunc: func(old, cur interface{}) { UpdateFunc: func(old, cur interface{}) {
if !reflect.DeepEqual(old, cur) { if !reflect.DeepEqual(old, cur) {
ic.syncSecret() sec := cur.(*api.Secret)
key := fmt.Sprintf("%v/%v", sec.Namespace, sec.Name)
ic.syncSecret(key)
} }
}, },
DeleteFunc: func(obj interface{}) { DeleteFunc: func(obj interface{}) {
sec := obj.(*api.Secret) sec := obj.(*api.Secret)
key := fmt.Sprintf("%v/%v", sec.Namespace, sec.Name) key := fmt.Sprintf("%v/%v", sec.Namespace, sec.Name)
ic.sslCertTracker.Delete(key) ic.sslCertTracker.DeleteAll(key)
ic.secretTracker.Delete(key)
}, },
} }
eventHandler := cache.ResourceEventHandlerFuncs{ eventHandler := cache.ResourceEventHandlerFuncs{
AddFunc: func(obj interface{}) { AddFunc: func(obj interface{}) {
ep := obj.(*api.Endpoints)
_, found := ep.Annotations[resourcelock.LeaderElectionRecordAnnotationKey]
if found {
return
}
ic.syncQueue.Enqueue(obj) ic.syncQueue.Enqueue(obj)
}, },
DeleteFunc: func(obj interface{}) { DeleteFunc: func(obj interface{}) {
@ -246,12 +244,6 @@ func newIngressController(config *Configuration) *GenericController {
}, },
UpdateFunc: func(old, cur interface{}) { UpdateFunc: func(old, cur interface{}) {
if !reflect.DeepEqual(old, cur) { if !reflect.DeepEqual(old, cur) {
ep := cur.(*api.Endpoints)
_, found := ep.Annotations[resourcelock.LeaderElectionRecordAnnotationKey]
if found {
return
}
ic.syncQueue.Enqueue(cur) ic.syncQueue.Enqueue(cur)
} }
}, },
@ -754,8 +746,8 @@ func (ic *GenericController) getBackendServers() ([]*ingress.Backend, []*ingress
// GetAuthCertificate ... // GetAuthCertificate ...
func (ic GenericController) GetAuthCertificate(secretName string) (*resolver.AuthSSLCert, error) { func (ic GenericController) GetAuthCertificate(secretName string) (*resolver.AuthSSLCert, error) {
if _, exists := ic.secretTracker.Get(secretName); !exists { if _, exists := ic.sslCertTracker.Get(secretName); !exists {
ic.secretTracker.Add(secretName, secretName) ic.syncSecret(secretName)
} }
_, err := ic.GetSecret(secretName) _, err := ic.GetSecret(secretName)
@ -1168,9 +1160,9 @@ func (ic GenericController) extractSecretNames(ing *extensions.Ingress) {
} }
key := fmt.Sprintf("%v/%v", ing.Namespace, tls.SecretName) key := fmt.Sprintf("%v/%v", ing.Namespace, tls.SecretName)
_, exists := ic.secretTracker.Get(key) _, exists := ic.sslCertTracker.Get(key)
if !exists { if !exists {
ic.secretTracker.Add(key, key) ic.syncSecret(key)
} }
} }
} }
@ -1219,8 +1211,6 @@ func (ic GenericController) Start() {
go ic.syncQueue.Run(10*time.Second, ic.stopCh) go ic.syncQueue.Run(10*time.Second, ic.stopCh)
go wait.Forever(ic.syncSecret, 10*time.Second)
if ic.syncStatus != nil { if ic.syncStatus != nil {
go ic.syncStatus.Run(ic.stopCh) go ic.syncStatus.Run(ic.stopCh)
} }