Merge pull request #991 from aledbf/ssl-refactoring
Remove secret sync loop
This commit is contained in:
commit
e59ac13eba
3 changed files with 67 additions and 66 deletions
|
@ -24,27 +24,27 @@ import (
|
||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
|
|
||||||
api "k8s.io/client-go/pkg/api/v1"
|
api "k8s.io/client-go/pkg/api/v1"
|
||||||
|
extensions "k8s.io/client-go/pkg/apis/extensions/v1beta1"
|
||||||
"k8s.io/client-go/tools/cache"
|
"k8s.io/client-go/tools/cache"
|
||||||
|
|
||||||
"k8s.io/ingress/core/pkg/ingress"
|
"k8s.io/ingress/core/pkg/ingress"
|
||||||
|
"k8s.io/ingress/core/pkg/ingress/annotations/parser"
|
||||||
"k8s.io/ingress/core/pkg/net/ssl"
|
"k8s.io/ingress/core/pkg/net/ssl"
|
||||||
)
|
)
|
||||||
|
|
||||||
// syncSecret keeps in sync Secrets used by Ingress rules with the files on
|
// syncSecret keeps in sync Secrets used by Ingress rules with the files on
|
||||||
// disk to allow copy of the content of the secret to disk to be used
|
// disk to allow copy of the content of the secret to disk to be used
|
||||||
// by external processes.
|
// by external processes.
|
||||||
func (ic *GenericController) syncSecret() {
|
func (ic *GenericController) syncSecret(key string) {
|
||||||
glog.V(3).Infof("starting syncing of secrets")
|
glog.V(3).Infof("starting syncing of secret %v", key)
|
||||||
|
|
||||||
var cert *ingress.SSLCert
|
var cert *ingress.SSLCert
|
||||||
var err error
|
var err error
|
||||||
|
|
||||||
for _, k := range ic.secretTracker.List() {
|
|
||||||
key := k.(string)
|
|
||||||
cert, err = ic.getPemCertificate(key)
|
cert, err = ic.getPemCertificate(key)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Warningf("error obtaining PEM from secret %v: %v", key, err)
|
glog.Warningf("error obtaining PEM from secret %v: %v", key, err)
|
||||||
continue
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// create certificates and add or update the item in the store
|
// create certificates and add or update the item in the store
|
||||||
|
@ -53,18 +53,17 @@ func (ic *GenericController) syncSecret() {
|
||||||
s := cur.(*ingress.SSLCert)
|
s := cur.(*ingress.SSLCert)
|
||||||
if reflect.DeepEqual(s, cert) {
|
if reflect.DeepEqual(s, cert) {
|
||||||
// no need to update
|
// no need to update
|
||||||
continue
|
return
|
||||||
}
|
}
|
||||||
glog.Infof("updating secret %v in the local store", key)
|
glog.Infof("updating secret %v in the local store", key)
|
||||||
ic.sslCertTracker.Update(key, cert)
|
ic.sslCertTracker.Update(key, cert)
|
||||||
ic.reloadRequired = true
|
ic.reloadRequired = true
|
||||||
continue
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
glog.Infof("adding secret %v to the local store", key)
|
glog.Infof("adding secret %v to the local store", key)
|
||||||
ic.sslCertTracker.Add(key, cert)
|
ic.sslCertTracker.Add(key, cert)
|
||||||
ic.reloadRequired = true
|
ic.reloadRequired = true
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// getPemCertificate receives a secret, and creates a ingress.SSLCert as return.
|
// getPemCertificate receives a secret, and creates a ingress.SSLCert as return.
|
||||||
|
@ -112,6 +111,26 @@ func (ic *GenericController) getPemCertificate(secretName string) (*ingress.SSLC
|
||||||
return s, nil
|
return s, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// secrReferenced checks if a secret is referenced or not by one or more Ingress rules
|
||||||
|
func (ic *GenericController) secrReferenced(name, namespace string) bool {
|
||||||
|
for _, ingIf := range ic.ingLister.Store.List() {
|
||||||
|
ing := ingIf.(*extensions.Ingress)
|
||||||
|
str, err := parser.GetStringAnnotation("ingress.kubernetes.io/auth-tls-secret", ing)
|
||||||
|
if err == nil && str == fmt.Sprintf("%v/%v", namespace, name) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
if ing.Namespace != namespace {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
for _, tls := range ing.Spec.TLS {
|
||||||
|
if tls.SecretName == name {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
// sslCertTracker holds a store of referenced Secrets in Ingress rules
|
// sslCertTracker holds a store of referenced Secrets in Ingress rules
|
||||||
type sslCertTracker struct {
|
type sslCertTracker struct {
|
||||||
cache.ThreadSafeStore
|
cache.ThreadSafeStore
|
||||||
|
@ -123,13 +142,6 @@ func newSSLCertTracker() *sslCertTracker {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// secretTracker holds a store of Secrets
|
func (s *sslCertTracker) DeleteAll(key string) {
|
||||||
type secretTracker struct {
|
s.Delete(key)
|
||||||
cache.ThreadSafeStore
|
|
||||||
}
|
|
||||||
|
|
||||||
func newSecretTracker() *secretTracker {
|
|
||||||
return &secretTracker{
|
|
||||||
cache.NewThreadSafeStore(cache.Indexers{}, cache.Indices{}),
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -110,7 +110,6 @@ func buildGenericControllerForBackendSSL() *GenericController {
|
||||||
mapController: buildControllerForBackendSSL(),
|
mapController: buildControllerForBackendSSL(),
|
||||||
|
|
||||||
sslCertTracker: newSSLCertTracker(),
|
sslCertTracker: newSSLCertTracker(),
|
||||||
secretTracker: newSecretTracker(),
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -157,7 +156,6 @@ func TestSyncSecret(t *testing.T) {
|
||||||
for _, foo := range foos {
|
for _, foo := range foos {
|
||||||
t.Run(foo.tn, func(t *testing.T) {
|
t.Run(foo.tn, func(t *testing.T) {
|
||||||
ic := buildGenericControllerForBackendSSL()
|
ic := buildGenericControllerForBackendSSL()
|
||||||
ic.secretTracker.Add(foo.secretName, foo.secretName)
|
|
||||||
|
|
||||||
// init secret for getPemCertificate
|
// init secret for getPemCertificate
|
||||||
secret := buildSecretForBackendSSL()
|
secret := buildSecretForBackendSSL()
|
||||||
|
@ -166,16 +164,17 @@ func TestSyncSecret(t *testing.T) {
|
||||||
secret.Data = foo.Data
|
secret.Data = foo.Data
|
||||||
ic.secrLister.Add(secret)
|
ic.secrLister.Add(secret)
|
||||||
|
|
||||||
|
key := "default/foo_secret"
|
||||||
// for add
|
// for add
|
||||||
ic.syncSecret()
|
ic.syncSecret(key)
|
||||||
if foo.expectSuccess {
|
if foo.expectSuccess {
|
||||||
// validate
|
// validate
|
||||||
_, exist := ic.sslCertTracker.Get(foo.secretName)
|
_, exist := ic.sslCertTracker.Get(key)
|
||||||
if !exist {
|
if !exist {
|
||||||
t.Errorf("Failed to sync secret: %s", foo.secretName)
|
t.Errorf("Failed to sync secret: %s", foo.secretName)
|
||||||
} else {
|
} else {
|
||||||
// for update
|
// for update
|
||||||
ic.syncSecret()
|
ic.syncSecret(key)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
|
@ -32,7 +32,6 @@ import (
|
||||||
"k8s.io/apimachinery/pkg/fields"
|
"k8s.io/apimachinery/pkg/fields"
|
||||||
"k8s.io/apimachinery/pkg/util/intstr"
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
"k8s.io/apimachinery/pkg/util/runtime"
|
"k8s.io/apimachinery/pkg/util/runtime"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
|
||||||
clientset "k8s.io/client-go/kubernetes"
|
clientset "k8s.io/client-go/kubernetes"
|
||||||
"k8s.io/client-go/kubernetes/scheme"
|
"k8s.io/client-go/kubernetes/scheme"
|
||||||
unversionedcore "k8s.io/client-go/kubernetes/typed/core/v1"
|
unversionedcore "k8s.io/client-go/kubernetes/typed/core/v1"
|
||||||
|
@ -51,7 +50,6 @@ import (
|
||||||
"k8s.io/ingress/core/pkg/ingress/defaults"
|
"k8s.io/ingress/core/pkg/ingress/defaults"
|
||||||
"k8s.io/ingress/core/pkg/ingress/resolver"
|
"k8s.io/ingress/core/pkg/ingress/resolver"
|
||||||
"k8s.io/ingress/core/pkg/ingress/status"
|
"k8s.io/ingress/core/pkg/ingress/status"
|
||||||
"k8s.io/ingress/core/pkg/ingress/status/leaderelection/resourcelock"
|
|
||||||
"k8s.io/ingress/core/pkg/ingress/store"
|
"k8s.io/ingress/core/pkg/ingress/store"
|
||||||
"k8s.io/ingress/core/pkg/k8s"
|
"k8s.io/ingress/core/pkg/k8s"
|
||||||
"k8s.io/ingress/core/pkg/net/ssl"
|
"k8s.io/ingress/core/pkg/net/ssl"
|
||||||
|
@ -99,8 +97,6 @@ type GenericController struct {
|
||||||
// local store of SSL certificates
|
// local store of SSL certificates
|
||||||
// (only certificates used in ingress)
|
// (only certificates used in ingress)
|
||||||
sslCertTracker *sslCertTracker
|
sslCertTracker *sslCertTracker
|
||||||
// store of secret names referenced from Ingress
|
|
||||||
secretTracker *secretTracker
|
|
||||||
|
|
||||||
syncRateLimiter flowcontrol.RateLimiter
|
syncRateLimiter flowcontrol.RateLimiter
|
||||||
|
|
||||||
|
@ -167,7 +163,6 @@ func newIngressController(config *Configuration) *GenericController {
|
||||||
Component: "ingress-controller",
|
Component: "ingress-controller",
|
||||||
}),
|
}),
|
||||||
sslCertTracker: newSSLCertTracker(),
|
sslCertTracker: newSSLCertTracker(),
|
||||||
secretTracker: newSecretTracker(),
|
|
||||||
}
|
}
|
||||||
|
|
||||||
ic.syncQueue = task.NewTaskQueue(ic.syncIngress)
|
ic.syncQueue = task.NewTaskQueue(ic.syncIngress)
|
||||||
|
@ -219,26 +214,29 @@ func newIngressController(config *Configuration) *GenericController {
|
||||||
}
|
}
|
||||||
|
|
||||||
secrEventHandler := cache.ResourceEventHandlerFuncs{
|
secrEventHandler := cache.ResourceEventHandlerFuncs{
|
||||||
|
AddFunc: func(obj interface{}) {
|
||||||
|
sec := obj.(*api.Secret)
|
||||||
|
key := fmt.Sprintf("%v/%v", sec.Namespace, sec.Name)
|
||||||
|
if ic.secrReferenced(sec.Namespace, sec.Name) {
|
||||||
|
ic.syncSecret(key)
|
||||||
|
}
|
||||||
|
},
|
||||||
UpdateFunc: func(old, cur interface{}) {
|
UpdateFunc: func(old, cur interface{}) {
|
||||||
if !reflect.DeepEqual(old, cur) {
|
if !reflect.DeepEqual(old, cur) {
|
||||||
ic.syncSecret()
|
sec := cur.(*api.Secret)
|
||||||
|
key := fmt.Sprintf("%v/%v", sec.Namespace, sec.Name)
|
||||||
|
ic.syncSecret(key)
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
DeleteFunc: func(obj interface{}) {
|
DeleteFunc: func(obj interface{}) {
|
||||||
sec := obj.(*api.Secret)
|
sec := obj.(*api.Secret)
|
||||||
key := fmt.Sprintf("%v/%v", sec.Namespace, sec.Name)
|
key := fmt.Sprintf("%v/%v", sec.Namespace, sec.Name)
|
||||||
ic.sslCertTracker.Delete(key)
|
ic.sslCertTracker.DeleteAll(key)
|
||||||
ic.secretTracker.Delete(key)
|
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
eventHandler := cache.ResourceEventHandlerFuncs{
|
eventHandler := cache.ResourceEventHandlerFuncs{
|
||||||
AddFunc: func(obj interface{}) {
|
AddFunc: func(obj interface{}) {
|
||||||
ep := obj.(*api.Endpoints)
|
|
||||||
_, found := ep.Annotations[resourcelock.LeaderElectionRecordAnnotationKey]
|
|
||||||
if found {
|
|
||||||
return
|
|
||||||
}
|
|
||||||
ic.syncQueue.Enqueue(obj)
|
ic.syncQueue.Enqueue(obj)
|
||||||
},
|
},
|
||||||
DeleteFunc: func(obj interface{}) {
|
DeleteFunc: func(obj interface{}) {
|
||||||
|
@ -246,12 +244,6 @@ func newIngressController(config *Configuration) *GenericController {
|
||||||
},
|
},
|
||||||
UpdateFunc: func(old, cur interface{}) {
|
UpdateFunc: func(old, cur interface{}) {
|
||||||
if !reflect.DeepEqual(old, cur) {
|
if !reflect.DeepEqual(old, cur) {
|
||||||
ep := cur.(*api.Endpoints)
|
|
||||||
_, found := ep.Annotations[resourcelock.LeaderElectionRecordAnnotationKey]
|
|
||||||
if found {
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
ic.syncQueue.Enqueue(cur)
|
ic.syncQueue.Enqueue(cur)
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
@ -754,8 +746,8 @@ func (ic *GenericController) getBackendServers() ([]*ingress.Backend, []*ingress
|
||||||
|
|
||||||
// GetAuthCertificate ...
|
// GetAuthCertificate ...
|
||||||
func (ic GenericController) GetAuthCertificate(secretName string) (*resolver.AuthSSLCert, error) {
|
func (ic GenericController) GetAuthCertificate(secretName string) (*resolver.AuthSSLCert, error) {
|
||||||
if _, exists := ic.secretTracker.Get(secretName); !exists {
|
if _, exists := ic.sslCertTracker.Get(secretName); !exists {
|
||||||
ic.secretTracker.Add(secretName, secretName)
|
ic.syncSecret(secretName)
|
||||||
}
|
}
|
||||||
|
|
||||||
_, err := ic.GetSecret(secretName)
|
_, err := ic.GetSecret(secretName)
|
||||||
|
@ -1168,9 +1160,9 @@ func (ic GenericController) extractSecretNames(ing *extensions.Ingress) {
|
||||||
}
|
}
|
||||||
|
|
||||||
key := fmt.Sprintf("%v/%v", ing.Namespace, tls.SecretName)
|
key := fmt.Sprintf("%v/%v", ing.Namespace, tls.SecretName)
|
||||||
_, exists := ic.secretTracker.Get(key)
|
_, exists := ic.sslCertTracker.Get(key)
|
||||||
if !exists {
|
if !exists {
|
||||||
ic.secretTracker.Add(key, key)
|
ic.syncSecret(key)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1219,8 +1211,6 @@ func (ic GenericController) Start() {
|
||||||
|
|
||||||
go ic.syncQueue.Run(10*time.Second, ic.stopCh)
|
go ic.syncQueue.Run(10*time.Second, ic.stopCh)
|
||||||
|
|
||||||
go wait.Forever(ic.syncSecret, 10*time.Second)
|
|
||||||
|
|
||||||
if ic.syncStatus != nil {
|
if ic.syncStatus != nil {
|
||||||
go ic.syncStatus.Run(ic.stopCh)
|
go ic.syncStatus.Run(ic.stopCh)
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue