mirror of
https://github.com/siderolabs/talos.git
synced 2025-10-27 14:31:11 +01:00
fix: handle errors to watch apid/trustd certs
Fixes #8345 Both `apid` and `trustd` services use a gRPC connection back to `machined` to watch changes to the certificates (new certificates being issued). This refactors the code to follow regular conventions, so that a failure to watch will crash the process, and they have a way to restart and re-establish the watch. Use the context and errgroup consistently. Signed-off-by: Andrey Smirnov <andrey.smirnov@siderolabs.com>
This commit is contained in:
parent
c79d69c2e2
commit
67ac6933d3
@ -81,7 +81,7 @@ func apidMain() error {
|
|||||||
stateClient := v1alpha1.NewStateClient(runtimeConn)
|
stateClient := v1alpha1.NewStateClient(runtimeConn)
|
||||||
resources := state.WrapCore(client.NewAdapter(stateClient))
|
resources := state.WrapCore(client.NewAdapter(stateClient))
|
||||||
|
|
||||||
tlsConfig, err := provider.NewTLSConfig(resources)
|
tlsConfig, err := provider.NewTLSConfig(ctx, resources)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to create remote certificate provider: %w", err)
|
return fmt.Errorf("failed to create remote certificate provider: %w", err)
|
||||||
}
|
}
|
||||||
@ -225,6 +225,10 @@ func apidMain() error {
|
|||||||
return socketServer.Serve(socketListener)
|
return socketServer.Serve(socketListener)
|
||||||
})
|
})
|
||||||
|
|
||||||
|
errGroup.Go(func() error {
|
||||||
|
return tlsConfig.Watch(ctx)
|
||||||
|
})
|
||||||
|
|
||||||
errGroup.Go(func() error {
|
errGroup.Go(func() error {
|
||||||
<-ctx.Done()
|
<-ctx.Done()
|
||||||
|
|
||||||
|
|||||||
@ -9,7 +9,6 @@ import (
|
|||||||
"context"
|
"context"
|
||||||
stdlibtls "crypto/tls"
|
stdlibtls "crypto/tls"
|
||||||
"fmt"
|
"fmt"
|
||||||
"log"
|
|
||||||
"sync"
|
"sync"
|
||||||
|
|
||||||
"github.com/cosi-project/runtime/pkg/resource"
|
"github.com/cosi-project/runtime/pkg/resource"
|
||||||
@ -22,15 +21,14 @@ import (
|
|||||||
// TLSConfig provides client & server TLS configs for apid.
|
// TLSConfig provides client & server TLS configs for apid.
|
||||||
type TLSConfig struct {
|
type TLSConfig struct {
|
||||||
certificateProvider *certificateProvider
|
certificateProvider *certificateProvider
|
||||||
|
watchCh <-chan state.Event
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewTLSConfig builds provider from configuration and endpoints.
|
// NewTLSConfig builds provider from configuration and endpoints.
|
||||||
//
|
func NewTLSConfig(ctx context.Context, resources state.State) (*TLSConfig, error) {
|
||||||
//nolint:gocyclo
|
|
||||||
func NewTLSConfig(resources state.State) (*TLSConfig, error) {
|
|
||||||
watchCh := make(chan state.Event)
|
watchCh := make(chan state.Event)
|
||||||
|
|
||||||
if err := resources.Watch(context.TODO(), resource.NewMetadata(secrets.NamespaceName, secrets.APIType, secrets.APIID, resource.VersionUndefined), watchCh); err != nil {
|
if err := resources.Watch(ctx, resource.NewMetadata(secrets.NamespaceName, secrets.APIType, secrets.APIID, resource.VersionUndefined), watchCh); err != nil {
|
||||||
return nil, fmt.Errorf("error setting up watch: %w", err)
|
return nil, fmt.Errorf("error setting up watch: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -38,7 +36,13 @@ func NewTLSConfig(resources state.State) (*TLSConfig, error) {
|
|||||||
provider := &certificateProvider{}
|
provider := &certificateProvider{}
|
||||||
|
|
||||||
for {
|
for {
|
||||||
event := <-watchCh
|
var event state.Event
|
||||||
|
|
||||||
|
select {
|
||||||
|
case <-ctx.Done():
|
||||||
|
return nil, ctx.Err()
|
||||||
|
case event = <-watchCh:
|
||||||
|
}
|
||||||
|
|
||||||
switch event.Type {
|
switch event.Type {
|
||||||
case state.Created, state.Updated:
|
case state.Created, state.Updated:
|
||||||
@ -56,36 +60,40 @@ func NewTLSConfig(resources state.State) (*TLSConfig, error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
break
|
return &TLSConfig{
|
||||||
|
certificateProvider: provider,
|
||||||
|
watchCh: watchCh,
|
||||||
|
}, nil
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
go func() {
|
// Watch for changes in API certificates and updates the TLSConfig.
|
||||||
for {
|
func (tlsConfig *TLSConfig) Watch(ctx context.Context) error {
|
||||||
event := <-watchCh
|
for {
|
||||||
|
var event state.Event
|
||||||
|
|
||||||
switch event.Type {
|
select {
|
||||||
case state.Created, state.Updated:
|
case <-ctx.Done():
|
||||||
// expected
|
return nil
|
||||||
case state.Destroyed, state.Bootstrapped:
|
case event = <-tlsConfig.watchCh:
|
||||||
// ignore, we'll get another event
|
|
||||||
continue
|
|
||||||
case state.Errored:
|
|
||||||
log.Printf("error watching for API certificates: %s", event.Error)
|
|
||||||
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
apiCerts := event.Resource.(*secrets.API) //nolint:errcheck,forcetypeassert
|
|
||||||
|
|
||||||
if err := provider.Update(apiCerts); err != nil {
|
|
||||||
log.Printf("failed updating cert: %v", err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}()
|
|
||||||
|
|
||||||
return &TLSConfig{
|
switch event.Type {
|
||||||
certificateProvider: provider,
|
case state.Created, state.Updated:
|
||||||
}, nil
|
// expected
|
||||||
|
case state.Destroyed, state.Bootstrapped:
|
||||||
|
// ignore, we'll get another event
|
||||||
|
continue
|
||||||
|
case state.Errored:
|
||||||
|
return fmt.Errorf("error watching API certificates: %w", event.Error)
|
||||||
|
}
|
||||||
|
|
||||||
|
apiCerts := event.Resource.(*secrets.API) //nolint:errcheck,forcetypeassert
|
||||||
|
|
||||||
|
if err := tlsConfig.certificateProvider.Update(apiCerts); err != nil {
|
||||||
|
return fmt.Errorf("failed updating cert: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// ServerConfig generates server-side tls.Config.
|
// ServerConfig generates server-side tls.Config.
|
||||||
|
|||||||
@ -22,15 +22,15 @@ import (
|
|||||||
// TLSConfig provides client & server TLS configs for trustd.
|
// TLSConfig provides client & server TLS configs for trustd.
|
||||||
type TLSConfig struct {
|
type TLSConfig struct {
|
||||||
certificateProvider *certificateProvider
|
certificateProvider *certificateProvider
|
||||||
|
|
||||||
|
watchCh <-chan state.Event
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewTLSConfig builds provider from configuration and endpoints.
|
// NewTLSConfig builds provider from configuration and endpoints.
|
||||||
//
|
func NewTLSConfig(ctx context.Context, resources state.State) (*TLSConfig, error) {
|
||||||
//nolint:gocyclo
|
|
||||||
func NewTLSConfig(resources state.State) (*TLSConfig, error) {
|
|
||||||
watchCh := make(chan state.Event)
|
watchCh := make(chan state.Event)
|
||||||
|
|
||||||
if err := resources.Watch(context.TODO(), resource.NewMetadata(secrets.NamespaceName, secrets.TrustdType, secrets.TrustdID, resource.VersionUndefined), watchCh); err != nil {
|
if err := resources.Watch(ctx, resource.NewMetadata(secrets.NamespaceName, secrets.TrustdType, secrets.TrustdID, resource.VersionUndefined), watchCh); err != nil {
|
||||||
return nil, fmt.Errorf("error setting up watch: %w", err)
|
return nil, fmt.Errorf("error setting up watch: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -38,7 +38,13 @@ func NewTLSConfig(resources state.State) (*TLSConfig, error) {
|
|||||||
provider := &certificateProvider{}
|
provider := &certificateProvider{}
|
||||||
|
|
||||||
for {
|
for {
|
||||||
event := <-watchCh
|
var event state.Event
|
||||||
|
|
||||||
|
select {
|
||||||
|
case <-ctx.Done():
|
||||||
|
return nil, ctx.Err()
|
||||||
|
case event = <-watchCh:
|
||||||
|
}
|
||||||
|
|
||||||
switch event.Type {
|
switch event.Type {
|
||||||
case state.Created, state.Updated:
|
case state.Created, state.Updated:
|
||||||
@ -56,34 +62,40 @@ func NewTLSConfig(resources state.State) (*TLSConfig, error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
break
|
return &TLSConfig{
|
||||||
|
certificateProvider: provider,
|
||||||
|
watchCh: watchCh,
|
||||||
|
}, nil
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
go func() {
|
// Watch for updates to trustd certificates.
|
||||||
for {
|
func (tlsConfig *TLSConfig) Watch(ctx context.Context) error {
|
||||||
event := <-watchCh
|
for {
|
||||||
|
var event state.Event
|
||||||
|
|
||||||
switch event.Type {
|
select {
|
||||||
case state.Created, state.Updated:
|
case <-ctx.Done():
|
||||||
// expected
|
return nil
|
||||||
case state.Destroyed, state.Bootstrapped:
|
case event = <-tlsConfig.watchCh:
|
||||||
// ignore, we'll get another event
|
|
||||||
continue
|
|
||||||
case state.Errored:
|
|
||||||
log.Printf("error watching for trustd certificates: %s", event.Error)
|
|
||||||
}
|
|
||||||
|
|
||||||
trustdCerts := event.Resource.(*secrets.Trustd) //nolint:errcheck,forcetypeassert
|
|
||||||
|
|
||||||
if err := provider.Update(trustdCerts); err != nil {
|
|
||||||
log.Printf("failed updating cert: %v", err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}()
|
|
||||||
|
|
||||||
return &TLSConfig{
|
switch event.Type {
|
||||||
certificateProvider: provider,
|
case state.Created, state.Updated:
|
||||||
}, nil
|
// expected
|
||||||
|
case state.Destroyed, state.Bootstrapped:
|
||||||
|
// ignore, we'll get another event
|
||||||
|
continue
|
||||||
|
case state.Errored:
|
||||||
|
log.Printf("error watching for trustd certificates: %s", event.Error)
|
||||||
|
}
|
||||||
|
|
||||||
|
trustdCerts := event.Resource.(*secrets.Trustd) //nolint:errcheck,forcetypeassert
|
||||||
|
|
||||||
|
if err := tlsConfig.certificateProvider.Update(trustdCerts); err != nil {
|
||||||
|
return fmt.Errorf("failed updating cert: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// ServerConfig generates server-side tls.Config.
|
// ServerConfig generates server-side tls.Config.
|
||||||
|
|||||||
@ -2,6 +2,7 @@
|
|||||||
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||||
|
|
||||||
|
// Package trustd implements trustd functionality.
|
||||||
package trustd
|
package trustd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
@ -78,7 +79,7 @@ func trustdMain() error {
|
|||||||
stateClient := v1alpha1.NewStateClient(runtimeConn)
|
stateClient := v1alpha1.NewStateClient(runtimeConn)
|
||||||
resources := state.WrapCore(client.NewAdapter(stateClient))
|
resources := state.WrapCore(client.NewAdapter(stateClient))
|
||||||
|
|
||||||
tlsConfig, err := provider.NewTLSConfig(resources)
|
tlsConfig, err := provider.NewTLSConfig(ctx, resources)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to create remote certificate provider: %w", err)
|
return fmt.Errorf("failed to create remote certificate provider: %w", err)
|
||||||
}
|
}
|
||||||
@ -114,6 +115,10 @@ func trustdMain() error {
|
|||||||
return networkServer.Serve(networkListener)
|
return networkServer.Serve(networkListener)
|
||||||
})
|
})
|
||||||
|
|
||||||
|
errGroup.Go(func() error {
|
||||||
|
return tlsConfig.Watch(ctx)
|
||||||
|
})
|
||||||
|
|
||||||
errGroup.Go(func() error {
|
errGroup.Go(func() error {
|
||||||
<-ctx.Done()
|
<-ctx.Done()
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user