-
Notifications
You must be signed in to change notification settings - Fork 47
/
main.go
339 lines (282 loc) · 9.86 KB
/
main.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
/*
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package main
import (
"context"
"crypto/tls"
"flag"
"fmt"
"net/http"
"os"
"path"
// Import all Kubernetes client auth plugins (e.g. Azure, GCP, OIDC, etc.)
// to ensure that exec-entrypoint and run can make use of them.
_ "k8s.io/client-go/plugin/pkg/client/auth"
ocpconfigv1 "github.com/openshift/api/config/v1"
"github.com/openshift/library-go/pkg/crypto"
"github.com/prometheus/client_golang/prometheus/promhttp"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/cache"
"sigs.k8s.io/controller-runtime/pkg/certwatcher"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/healthz"
"sigs.k8s.io/controller-runtime/pkg/log/zap"
"sigs.k8s.io/controller-runtime/pkg/metrics"
metricsserver "sigs.k8s.io/controller-runtime/pkg/metrics/server"
"sigs.k8s.io/controller-runtime/pkg/webhook"
ssp "kubevirt.io/ssp-operator/api/v1beta2"
"kubevirt.io/ssp-operator/internal/common"
"kubevirt.io/ssp-operator/internal/controllers"
sspMetrics "kubevirt.io/ssp-operator/pkg/monitoring/metrics/ssp-operator"
"kubevirt.io/ssp-operator/pkg/monitoring/rules"
"kubevirt.io/ssp-operator/webhooks"
// +kubebuilder:scaffold:imports
)
var (
setupLog = ctrl.Log.WithName("setup")
// Default certificate directory operator-sdk expects to have
sdkTLSDir = fmt.Sprintf("%s/k8s-webhook-server/serving-certs", os.TempDir())
)
const (
// Do not change the leader election ID, otherwise multiple SSP operator instances
// can be running during upgrade.
leaderElectionID = "734f7229.kubevirt.io"
// Certificate directory and file names OLM mounts certificates to
olmTLSDir = "/apiserver.local.config/certificates"
olmTLSCrt = "apiserver.crt"
olmTLSKey = "apiserver.key"
// Default cert file names operator-sdk expects to have
sdkTLSCrt = "tls.crt"
sdkTLSKey = "tls.key"
webhookPort = 9443
)
// This callback executes on each client call returning a new config to be used
// please be aware that the APIServer is using http keepalive so this is going to
// be executed only after a while for fresh connections and not on existing ones
func getConfigForClient(ctx context.Context, cfg *tls.Config, cache cache.Cache) (*tls.Config, error) {
var sspList ssp.SSPList
err := cache.List(ctx, &sspList)
if err != nil {
return nil, err
}
if len(sspList.Items) == 0 || sspList.Items[0].Spec.TLSSecurityProfile == nil {
cfg.MinVersion = crypto.DefaultTLSVersion()
cfg.CipherSuites = nil
return cfg, nil
}
tlsProfile := sspList.Items[0].Spec.TLSSecurityProfile
if tlsProfile.Type == ocpconfigv1.TLSProfileCustomType {
minVersion, err := crypto.TLSVersion(string(tlsProfile.Custom.MinTLSVersion))
if err != nil {
return nil, err
}
cfg.MinVersion = minVersion
cfg.CipherSuites = common.CipherIDs(tlsProfile.Custom.Ciphers, &ctrl.Log)
return cfg, nil
}
minVersion, err := crypto.TLSVersion(string(ocpconfigv1.TLSProfiles[tlsProfile.Type].MinTLSVersion))
if err != nil {
return nil, err
}
cfg.MinVersion = minVersion
cfg.CipherSuites = common.CipherIDs(ocpconfigv1.TLSProfiles[tlsProfile.Type].Ciphers, &ctrl.Log)
return cfg, nil
}
type prometheusServer struct {
cache cache.Cache
certPath string
keyPath string
serverAddress string
}
// NeedLeaderElection implements the LeaderElectionRunnable interface, which indicates
// the prometheus server doesn't need leader election.
func (s *prometheusServer) NeedLeaderElection() bool {
return false
}
func (s *prometheusServer) Start(ctx context.Context) error {
setupLog.Info("Starting Prometheus metrics endpoint server with TLS")
handler := promhttp.HandlerFor(metrics.Registry, promhttp.HandlerOpts{})
mux := http.NewServeMux()
mux.Handle("/metrics", handler)
server := &http.Server{
Addr: s.serverAddress,
Handler: mux,
}
certWatcher, err := certwatcher.New(s.certPath, s.keyPath)
if err != nil {
return err
}
go func() {
// TODO: change context, so it can be closed when
// this function returns an error
if err := certWatcher.Start(ctx); err != nil {
setupLog.Error(err, "certificate watcher error")
}
}()
idleConnsClosed := make(chan struct{})
go func() {
// TODO: make sure that the goroutine finishes when
// this function returns an error
<-ctx.Done()
setupLog.Info("shutting down Prometheus metrics server")
if err := server.Shutdown(context.Background()); err != nil {
setupLog.Error(err, "error shutting down the HTTP server")
}
close(idleConnsClosed)
}()
server.TLSConfig = s.getPrometheusTLSConfig(ctx, certWatcher)
if err := server.ListenAndServeTLS(s.certPath, s.keyPath); err != nil && err != http.ErrServerClosed {
setupLog.Error(err, "Failed to start Prometheus metrics endpoint server")
return err
}
<-idleConnsClosed
return nil
}
func (s *prometheusServer) getPrometheusTLSConfig(ctx context.Context, certWatcher *certwatcher.CertWatcher) *tls.Config {
return &tls.Config{
GetConfigForClient: func(_ *tls.ClientHelloInfo) (*tls.Config, error) {
cfg := &tls.Config{}
cfg.GetCertificate = certWatcher.GetCertificate
return getConfigForClient(ctx, cfg, s.cache)
},
}
}
func newPrometheusServer(metricsAddr string, cache cache.Cache) (*prometheusServer, error) {
if err := sspMetrics.SetupMetrics(); err != nil {
return nil, err
}
if err := rules.SetupRules(); err != nil {
return nil, err
}
return &prometheusServer{
certPath: path.Join(sdkTLSDir, sdkTLSCrt),
keyPath: path.Join(sdkTLSDir, sdkTLSKey),
cache: cache,
serverAddress: metricsAddr,
}, nil
}
func main() {
var metricsAddr string
var enableLeaderElection bool
var probeAddr string
flag.StringVar(&metricsAddr, "metrics-bind-address", ":8443", "The address the metric endpoint binds to.")
flag.StringVar(&probeAddr, "health-probe-bind-address", ":8081", "The address the probe endpoint binds to.")
flag.BoolVar(&enableLeaderElection, "leader-elect", false,
"Enable leader election for controller manager. "+
"Enabling this will ensure there is only one active controller manager.")
opts := zap.Options{}
opts.BindFlags(flag.CommandLine)
flag.Parse()
ctrl.SetLogger(zap.New(zap.UseFlagOptions(&opts)))
err := createCertificateSymlinks()
if err != nil {
setupLog.Error(err, "Error creating certificate symlinks")
os.Exit(1)
}
ctx := ctrl.SetupSignalHandler()
apiConfig, err := ctrl.GetConfig()
if err != nil {
setupLog.Error(err, "error getting API config")
os.Exit(1)
}
// Using closure so that the temporary client is cleaned up after it is not needed anymore.
ctrls, err := func() ([]controllers.Controller, error) {
apiClient, err := client.New(apiConfig, client.Options{
Scheme: common.Scheme,
})
if err != nil {
return nil, err
}
return controllers.CreateControllers(ctx, apiClient)
}()
if err != nil {
setupLog.Error(err, "error creating controllers")
os.Exit(1)
}
var mgr ctrl.Manager
getTLSOptsFunc := func(cfg *tls.Config) {
cfg.GetConfigForClient = func(_ *tls.ClientHelloInfo) (*tls.Config, error) {
return getConfigForClient(ctx, cfg, mgr.GetCache())
}
}
mgr, err = ctrl.NewManager(apiConfig, ctrl.Options{
Scheme: common.Scheme,
Metrics: metricsserver.Options{
BindAddress: "0",
},
HealthProbeBindAddress: probeAddr,
LeaderElection: enableLeaderElection,
LeaderElectionID: leaderElectionID,
WebhookServer: webhook.NewServer(webhook.Options{
Port: webhookPort,
TLSOpts: []func(*tls.Config){getTLSOptsFunc},
}),
})
if err != nil {
setupLog.Error(err, "unable to start manager")
os.Exit(1)
}
if os.Getenv("ENABLE_WEBHOOKS") != "false" {
if err = webhooks.Setup(mgr); err != nil {
setupLog.Error(err, "unable to create webhook", "webhook", "SSP")
os.Exit(1)
}
}
metricsServer, err := newPrometheusServer(metricsAddr, mgr.GetCache())
if err != nil {
setupLog.Error(err, "unable create Prometheus server")
os.Exit(1)
}
if err := mgr.Add(metricsServer); err != nil {
setupLog.Error(err, "unable to set up metrics")
os.Exit(1)
}
if err := mgr.AddReadyzCheck("check", healthz.Ping); err != nil {
setupLog.Error(err, "unable to set up ready check")
os.Exit(1)
}
if err := mgr.AddHealthzCheck("health", healthz.Ping); err != nil {
setupLog.Error(err, "unable to set up health check")
os.Exit(1)
}
// +kubebuilder:scaffold:builder
if err = controllers.StartControllers(ctx, mgr, ctrls); err != nil {
setupLog.Error(err, "unable to create or start controller", "controller", "SSP")
os.Exit(1)
}
}
func createCertificateSymlinks() error {
olmDir, olmDirErr := os.Stat(olmTLSDir)
_, sdkDirErr := os.Stat(sdkTLSDir)
// If certificates are generated by OLM, we should use OLM certificates mount path
if olmDirErr == nil && olmDir.IsDir() && os.IsNotExist(sdkDirErr) {
// For some reason, OLM maps the cert/key files to apiserver.crt/apiserver.key
// instead of tls.crt/tls.key like the SDK expects. Creating symlinks to allow
// the operator to find and use them.
setupLog.Info("OLM cert directory found, copying cert files")
err := os.MkdirAll(sdkTLSDir, 0755)
if err != nil {
return fmt.Errorf("failed to create %s: %w", sdkTLSCrt, err)
}
err = os.Symlink(path.Join(olmTLSDir, olmTLSCrt), path.Join(sdkTLSDir, sdkTLSCrt))
if err != nil {
return err
}
err = os.Symlink(path.Join(olmTLSDir, olmTLSKey), path.Join(sdkTLSDir, sdkTLSKey))
if err != nil {
return err
}
} else {
setupLog.Info("OLM cert directory not found, using default cert directory")
}
return nil
}