mirror of
https://github.com/kubernetes-sigs/external-dns.git
synced 2025-08-05 17:16:59 +02:00
444 lines
12 KiB
Go
444 lines
12 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package source
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"net/url"
|
|
"os"
|
|
"sort"
|
|
"strings"
|
|
"sync"
|
|
"text/template"
|
|
"time"
|
|
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"sigs.k8s.io/external-dns/endpoint"
|
|
)
|
|
|
|
const (
|
|
defaultIdleConnTimeout = 30 * time.Second
|
|
// DefaultRoutegroupVersion is the default version for route groups.
|
|
DefaultRoutegroupVersion = "zalando.org/v1"
|
|
routeGroupListResource = "/apis/%s/routegroups"
|
|
routeGroupNamespacedResource = "/apis/%s/namespaces/%s/routegroups"
|
|
)
|
|
|
|
type routeGroupSource struct {
|
|
cli routeGroupListClient
|
|
apiServer string
|
|
namespace string
|
|
apiEndpoint string
|
|
annotationFilter string
|
|
fqdnTemplate *template.Template
|
|
combineFQDNAnnotation bool
|
|
ignoreHostnameAnnotation bool
|
|
}
|
|
|
|
// for testing
|
|
type routeGroupListClient interface {
|
|
getRouteGroupList(string) (*routeGroupList, error)
|
|
}
|
|
|
|
type routeGroupClient struct {
|
|
mu sync.Mutex
|
|
quit chan struct{}
|
|
client *http.Client
|
|
token string
|
|
tokenFile string
|
|
}
|
|
|
|
func newRouteGroupClient(token, tokenPath string, timeout time.Duration) *routeGroupClient {
|
|
const (
|
|
tokenFile = "/var/run/secrets/kubernetes.io/serviceaccount/token"
|
|
rootCAFile = "/var/run/secrets/kubernetes.io/serviceaccount/ca.crt"
|
|
)
|
|
if tokenPath != "" {
|
|
tokenPath = tokenFile
|
|
}
|
|
|
|
tr := &http.Transport{
|
|
DialContext: (&net.Dialer{
|
|
Timeout: timeout,
|
|
KeepAlive: 30 * time.Second,
|
|
DualStack: true,
|
|
}).DialContext,
|
|
TLSHandshakeTimeout: 3 * time.Second,
|
|
ResponseHeaderTimeout: timeout,
|
|
IdleConnTimeout: defaultIdleConnTimeout,
|
|
MaxIdleConns: 5,
|
|
MaxIdleConnsPerHost: 5,
|
|
}
|
|
cli := &routeGroupClient{
|
|
client: &http.Client{
|
|
Transport: tr,
|
|
},
|
|
quit: make(chan struct{}),
|
|
tokenFile: tokenPath,
|
|
token: token,
|
|
}
|
|
|
|
go func() {
|
|
for {
|
|
select {
|
|
case <-time.After(tr.IdleConnTimeout):
|
|
tr.CloseIdleConnections()
|
|
cli.updateToken()
|
|
case <-cli.quit:
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
|
|
// in cluster config, errors are treated as not running in cluster
|
|
cli.updateToken()
|
|
|
|
// cluster internal use custom CA to reach TLS endpoint
|
|
rootCA, err := os.ReadFile(rootCAFile)
|
|
if err != nil {
|
|
return cli
|
|
}
|
|
certPool := x509.NewCertPool()
|
|
if !certPool.AppendCertsFromPEM(rootCA) {
|
|
return cli
|
|
}
|
|
|
|
tr.TLSClientConfig = &tls.Config{
|
|
MinVersion: tls.VersionTLS12,
|
|
RootCAs: certPool,
|
|
}
|
|
|
|
return cli
|
|
}
|
|
|
|
func (cli *routeGroupClient) updateToken() {
|
|
if cli.tokenFile == "" {
|
|
return
|
|
}
|
|
|
|
token, err := os.ReadFile(cli.tokenFile)
|
|
if err != nil {
|
|
log.Errorf("Failed to read token from file (%s): %v", cli.tokenFile, err)
|
|
return
|
|
}
|
|
|
|
cli.mu.Lock()
|
|
cli.token = string(token)
|
|
cli.mu.Unlock()
|
|
}
|
|
|
|
func (cli *routeGroupClient) getToken() string {
|
|
cli.mu.Lock()
|
|
defer cli.mu.Unlock()
|
|
return cli.token
|
|
}
|
|
|
|
func (cli *routeGroupClient) getRouteGroupList(url string) (*routeGroupList, error) {
|
|
resp, err := cli.get(url)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
if resp.StatusCode != 200 {
|
|
return nil, fmt.Errorf("failed to get routegroup list from %s, got: %s", url, resp.Status)
|
|
}
|
|
|
|
var rgs routeGroupList
|
|
err = json.NewDecoder(resp.Body).Decode(&rgs)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &rgs, nil
|
|
}
|
|
|
|
func (cli *routeGroupClient) get(url string) (*http.Response, error) {
|
|
req, err := http.NewRequest("GET", url, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return cli.do(req)
|
|
}
|
|
|
|
func (cli *routeGroupClient) do(req *http.Request) (*http.Response, error) {
|
|
if tok := cli.getToken(); tok != "" && req.Header.Get("Authorization") == "" {
|
|
req.Header.Set("Authorization", "Bearer "+tok)
|
|
}
|
|
return cli.client.Do(req)
|
|
}
|
|
|
|
// NewRouteGroupSource creates a new routeGroupSource with the given config.
|
|
func NewRouteGroupSource(timeout time.Duration, token, tokenPath, apiServerURL, namespace, annotationFilter, fqdnTemplate, routegroupVersion string, combineFqdnAnnotation, ignoreHostnameAnnotation bool) (Source, error) {
|
|
tmpl, err := parseTemplate(fqdnTemplate)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if routegroupVersion == "" {
|
|
routegroupVersion = DefaultRoutegroupVersion
|
|
}
|
|
cli := newRouteGroupClient(token, tokenPath, timeout)
|
|
|
|
u, err := url.Parse(apiServerURL)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
apiServer := u.String()
|
|
// strip port if well known port, because of TLS certificate match
|
|
if u.Scheme == "https" && u.Port() == "443" {
|
|
// correctly handle IPv6 addresses by keeping surrounding `[]`.
|
|
apiServer = "https://" + strings.TrimSuffix(u.Host, ":443")
|
|
}
|
|
|
|
sc := &routeGroupSource{
|
|
cli: cli,
|
|
apiServer: apiServer,
|
|
namespace: namespace,
|
|
apiEndpoint: apiServer + fmt.Sprintf(routeGroupListResource, routegroupVersion),
|
|
annotationFilter: annotationFilter,
|
|
fqdnTemplate: tmpl,
|
|
combineFQDNAnnotation: combineFqdnAnnotation,
|
|
ignoreHostnameAnnotation: ignoreHostnameAnnotation,
|
|
}
|
|
if namespace != "" {
|
|
sc.apiEndpoint = apiServer + fmt.Sprintf(routeGroupNamespacedResource, routegroupVersion, namespace)
|
|
}
|
|
|
|
log.Infoln("Created route group source")
|
|
return sc, nil
|
|
}
|
|
|
|
// AddEventHandler for routegroup is currently a no op, because we do not implement caching, yet.
|
|
func (sc *routeGroupSource) AddEventHandler(ctx context.Context, handler func()) {}
|
|
|
|
// Endpoints returns endpoint objects for each host-target combination that should be processed.
|
|
// Retrieves all routeGroup resources on all namespaces.
|
|
// Logic is ported from ingress without fqdnTemplate
|
|
func (sc *routeGroupSource) Endpoints(ctx context.Context) ([]*endpoint.Endpoint, error) {
|
|
rgList, err := sc.cli.getRouteGroupList(sc.apiEndpoint)
|
|
if err != nil {
|
|
log.Errorf("Failed to get RouteGroup list: %v", err)
|
|
return nil, err
|
|
}
|
|
rgList, err = sc.filterByAnnotations(rgList)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
endpoints := []*endpoint.Endpoint{}
|
|
for _, rg := range rgList.Items {
|
|
// Check controller annotation to see if we are responsible.
|
|
controller, ok := rg.Metadata.Annotations[controllerAnnotationKey]
|
|
if ok && controller != controllerAnnotationValue {
|
|
log.Debugf("Skipping routegroup %s/%s because controller value does not match, found: %s, required: %s",
|
|
rg.Metadata.Namespace, rg.Metadata.Name, controller, controllerAnnotationValue)
|
|
continue
|
|
}
|
|
|
|
eps := sc.endpointsFromRouteGroup(rg)
|
|
|
|
if (sc.combineFQDNAnnotation || len(eps) == 0) && sc.fqdnTemplate != nil {
|
|
tmplEndpoints, err := sc.endpointsFromTemplate(rg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if sc.combineFQDNAnnotation {
|
|
eps = append(eps, tmplEndpoints...)
|
|
} else {
|
|
eps = tmplEndpoints
|
|
}
|
|
}
|
|
|
|
if len(eps) == 0 {
|
|
log.Debugf("No endpoints could be generated from routegroup %s/%s", rg.Metadata.Namespace, rg.Metadata.Name)
|
|
continue
|
|
}
|
|
|
|
log.Debugf("Endpoints generated from ingress: %s/%s: %v", rg.Metadata.Namespace, rg.Metadata.Name, eps)
|
|
endpoints = append(endpoints, eps...)
|
|
}
|
|
|
|
for _, ep := range endpoints {
|
|
sort.Sort(ep.Targets)
|
|
}
|
|
|
|
return endpoints, nil
|
|
}
|
|
|
|
func (sc *routeGroupSource) endpointsFromTemplate(rg *routeGroup) ([]*endpoint.Endpoint, error) {
|
|
// Process the whole template string
|
|
var buf bytes.Buffer
|
|
err := sc.fqdnTemplate.Execute(&buf, rg)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to apply template on routegroup %s/%s: %v", rg.Metadata.Namespace, rg.Metadata.Name, err)
|
|
}
|
|
|
|
hostnames := buf.String()
|
|
|
|
resource := fmt.Sprintf("routegroup/%s/%s", rg.Metadata.Namespace, rg.Metadata.Name)
|
|
|
|
// error handled in endpointsFromRouteGroup(), otherwise duplicate log
|
|
ttl := getTTLFromAnnotations(rg.Metadata.Annotations, resource)
|
|
|
|
targets := getTargetsFromTargetAnnotation(rg.Metadata.Annotations)
|
|
|
|
if len(targets) == 0 {
|
|
targets = targetsFromRouteGroupStatus(rg.Status)
|
|
}
|
|
|
|
providerSpecific, setIdentifier := getProviderSpecificAnnotations(rg.Metadata.Annotations)
|
|
|
|
var endpoints []*endpoint.Endpoint
|
|
// splits the FQDN template and removes the trailing periods
|
|
hostnameList := strings.Split(strings.ReplaceAll(hostnames, " ", ""), ",")
|
|
for _, hostname := range hostnameList {
|
|
hostname = strings.TrimSuffix(hostname, ".")
|
|
endpoints = append(endpoints, endpointsForHostname(hostname, targets, ttl, providerSpecific, setIdentifier, resource)...)
|
|
}
|
|
return endpoints, nil
|
|
}
|
|
|
|
// annotation logic ported from source/ingress.go without Spec.TLS part, because it'S not supported in RouteGroup
|
|
func (sc *routeGroupSource) endpointsFromRouteGroup(rg *routeGroup) []*endpoint.Endpoint {
|
|
endpoints := []*endpoint.Endpoint{}
|
|
|
|
resource := fmt.Sprintf("routegroup/%s/%s", rg.Metadata.Namespace, rg.Metadata.Name)
|
|
|
|
ttl := getTTLFromAnnotations(rg.Metadata.Annotations, resource)
|
|
|
|
targets := getTargetsFromTargetAnnotation(rg.Metadata.Annotations)
|
|
if len(targets) == 0 {
|
|
for _, lb := range rg.Status.LoadBalancer.RouteGroup {
|
|
if lb.IP != "" {
|
|
targets = append(targets, lb.IP)
|
|
}
|
|
if lb.Hostname != "" {
|
|
targets = append(targets, lb.Hostname)
|
|
}
|
|
}
|
|
}
|
|
|
|
providerSpecific, setIdentifier := getProviderSpecificAnnotations(rg.Metadata.Annotations)
|
|
|
|
for _, src := range rg.Spec.Hosts {
|
|
if src == "" {
|
|
continue
|
|
}
|
|
endpoints = append(endpoints, endpointsForHostname(src, targets, ttl, providerSpecific, setIdentifier, resource)...)
|
|
}
|
|
|
|
// Skip endpoints if we do not want entries from annotations
|
|
if !sc.ignoreHostnameAnnotation {
|
|
hostnameList := getHostnamesFromAnnotations(rg.Metadata.Annotations)
|
|
for _, hostname := range hostnameList {
|
|
endpoints = append(endpoints, endpointsForHostname(hostname, targets, ttl, providerSpecific, setIdentifier, resource)...)
|
|
}
|
|
}
|
|
return endpoints
|
|
}
|
|
|
|
// filterByAnnotations filters a list of routeGroupList by a given annotation selector.
|
|
func (sc *routeGroupSource) filterByAnnotations(rgs *routeGroupList) (*routeGroupList, error) {
|
|
selector, err := getLabelSelector(sc.annotationFilter)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// empty filter returns original list
|
|
if selector.Empty() {
|
|
return rgs, nil
|
|
}
|
|
|
|
var filteredList []*routeGroup
|
|
for _, rg := range rgs.Items {
|
|
// include ingress if its annotations match the selector
|
|
if matchLabelSelector(selector, rg.Metadata.Annotations) {
|
|
filteredList = append(filteredList, rg)
|
|
}
|
|
}
|
|
rgs.Items = filteredList
|
|
|
|
return rgs, nil
|
|
}
|
|
|
|
func targetsFromRouteGroupStatus(status routeGroupStatus) endpoint.Targets {
|
|
var targets endpoint.Targets
|
|
|
|
for _, lb := range status.LoadBalancer.RouteGroup {
|
|
if lb.IP != "" {
|
|
targets = append(targets, lb.IP)
|
|
}
|
|
if lb.Hostname != "" {
|
|
targets = append(targets, lb.Hostname)
|
|
}
|
|
}
|
|
|
|
return targets
|
|
}
|
|
|
|
type routeGroupList struct {
|
|
Kind string `json:"kind"`
|
|
APIVersion string `json:"apiVersion"`
|
|
Metadata routeGroupListMetadata `json:"metadata"`
|
|
Items []*routeGroup `json:"items"`
|
|
}
|
|
|
|
type routeGroupListMetadata struct {
|
|
SelfLink string `json:"selfLink"`
|
|
ResourceVersion string `json:"resourceVersion"`
|
|
}
|
|
|
|
type routeGroup struct {
|
|
Metadata itemMetadata `json:"metadata"`
|
|
Spec routeGroupSpec `json:"spec"`
|
|
Status routeGroupStatus `json:"status"`
|
|
}
|
|
|
|
type itemMetadata struct {
|
|
Namespace string `json:"namespace"`
|
|
Name string `json:"name"`
|
|
Annotations map[string]string `json:"annotations"`
|
|
}
|
|
|
|
type routeGroupSpec struct {
|
|
Hosts []string `json:"hosts"`
|
|
}
|
|
|
|
type routeGroupStatus struct {
|
|
LoadBalancer routeGroupLoadBalancerStatus `json:"loadBalancer"`
|
|
}
|
|
|
|
type routeGroupLoadBalancerStatus struct {
|
|
RouteGroup []routeGroupLoadBalancer `json:"routeGroup"`
|
|
}
|
|
|
|
type routeGroupLoadBalancer struct {
|
|
IP string `json:"ip,omitempty"`
|
|
Hostname string `json:"hostname,omitempty"`
|
|
}
|