Add nodeutil opt to bootstrapping from rest.Config
This uses a rest.Config to bootstrap TLS for the http server, webhook auth, and the client. This can be expanded later to do other kinds of TLS bootstrapping. For now this seems to get the job done in terms of what VK expects for permissions on the cluster. Signed-off-by: Brian Goff <cpuguy83@gmail.com>
This commit is contained in:
@@ -5,25 +5,28 @@ import (
|
||||
"crypto/x509"
|
||||
"fmt"
|
||||
"os"
|
||||
|
||||
"k8s.io/client-go/rest"
|
||||
)
|
||||
|
||||
// WithTLSConfig returns a NodeOpt which creates a base TLSConfig with the default cipher suites and tls min verions.
|
||||
// The tls config can be modified through functional options.
|
||||
func WithTLSConfig(opts ...func(*tls.Config) error) NodeOpt {
|
||||
return func(cfg *NodeConfig) error {
|
||||
tlsCfg := &tls.Config{
|
||||
MinVersion: tls.VersionTLS12,
|
||||
PreferServerCipherSuites: true,
|
||||
CipherSuites: DefaultServerCiphers(),
|
||||
ClientAuth: tls.RequestClientCert,
|
||||
if cfg.TLSConfig == nil {
|
||||
cfg.TLSConfig = &tls.Config{
|
||||
MinVersion: tls.VersionTLS12,
|
||||
PreferServerCipherSuites: true,
|
||||
CipherSuites: DefaultServerCiphers(),
|
||||
ClientAuth: tls.RequestClientCert,
|
||||
}
|
||||
}
|
||||
for _, o := range opts {
|
||||
if err := o(tlsCfg); err != nil {
|
||||
if err := o(cfg.TLSConfig); err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
cfg.TLSConfig = tlsCfg
|
||||
return nil
|
||||
}
|
||||
}
|
||||
@@ -45,7 +48,7 @@ func WithKeyPairFromPath(cert, key string) func(*tls.Config) error {
|
||||
return func(cfg *tls.Config) error {
|
||||
cert, err := tls.LoadX509KeyPair(cert, key)
|
||||
if err != nil {
|
||||
return err
|
||||
return fmt.Errorf("error loading x509 key pair: %w", err)
|
||||
}
|
||||
cfg.Certificates = append(cfg.Certificates, cert)
|
||||
return nil
|
||||
@@ -56,7 +59,7 @@ func WithKeyPairFromPath(cert, key string) func(*tls.Config) error {
|
||||
// If a cert pool is not defined on the tls config an empty one will be created.
|
||||
func WithCACert(pem []byte) func(*tls.Config) error {
|
||||
return func(cfg *tls.Config) error {
|
||||
if cfg.ClientCAs == nil {
|
||||
if cfg.RootCAs == nil {
|
||||
cfg.ClientCAs = x509.NewCertPool()
|
||||
}
|
||||
if !cfg.ClientCAs.AppendCertsFromPEM(pem) {
|
||||
@@ -81,3 +84,48 @@ func DefaultServerCiphers() []uint16 {
|
||||
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
||||
}
|
||||
}
|
||||
|
||||
func tlsFromRestConfig(r *rest.Config) func(*tls.Config) error {
|
||||
return func(cfg *tls.Config) error {
|
||||
var err error
|
||||
|
||||
cfg.ClientAuth = tls.RequestClientCert
|
||||
|
||||
certData := r.CertData
|
||||
if certData == nil && r.CertFile != "" {
|
||||
certData, err = os.ReadFile(r.CertFile)
|
||||
if err != nil {
|
||||
return fmt.Errorf("error reading cert file from clientset: %w", err)
|
||||
}
|
||||
}
|
||||
|
||||
keyData := r.KeyData
|
||||
if keyData == nil && r.KeyFile != "" {
|
||||
keyData, err = os.ReadFile(r.KeyFile)
|
||||
if err != nil {
|
||||
return fmt.Errorf("error reading key file from clientset: %w", err)
|
||||
}
|
||||
}
|
||||
if keyData != nil && certData != nil {
|
||||
pem, err := tls.X509KeyPair(certData, keyData)
|
||||
if err != nil {
|
||||
return fmt.Errorf("error creating key pair from clientset: %w", err)
|
||||
}
|
||||
cfg.Certificates = append(cfg.Certificates, pem)
|
||||
cfg.ClientAuth = tls.RequestClientCert
|
||||
}
|
||||
|
||||
caData := r.CAData
|
||||
if certData == nil && r.CAFile != "" {
|
||||
caData, err = os.ReadFile(r.CAFile)
|
||||
if err != nil {
|
||||
return fmt.Errorf("error reading ca file from clientset: %w", err)
|
||||
}
|
||||
}
|
||||
if caData != nil {
|
||||
return WithCACert(caData)(cfg)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user