2019-03-14 14:56:06 +00:00
package ingress
2019-02-21 22:08:05 +00:00
import (
"context"
2019-04-01 13:30:07 +00:00
"errors"
2019-02-21 22:08:05 +00:00
"flag"
"fmt"
"math"
"os"
"reflect"
"sort"
"strconv"
"strings"
"time"
"github.com/cenkalti/backoff"
2019-07-10 07:26:04 +00:00
"github.com/containous/traefik/pkg/config/dynamic"
2019-03-15 08:42:03 +00:00
"github.com/containous/traefik/pkg/job"
"github.com/containous/traefik/pkg/log"
"github.com/containous/traefik/pkg/safe"
"github.com/containous/traefik/pkg/tls"
2019-02-21 22:08:05 +00:00
corev1 "k8s.io/api/core/v1"
"k8s.io/api/extensions/v1beta1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/apimachinery/pkg/util/intstr"
)
const (
annotationKubernetesIngressClass = "kubernetes.io/ingress.class"
traefikDefaultIngressClass = "traefik"
)
// Provider holds configurations of the provider.
type Provider struct {
2019-07-01 09:30:05 +00:00
Endpoint string ` description:"Kubernetes server endpoint (required for external cluster client)." json:"endpoint,omitempty" toml:"endpoint,omitempty" yaml:"endpoint,omitempty" `
Token string ` description:"Kubernetes bearer token (not needed for in-cluster client)." json:"token,omitempty" toml:"token,omitempty" yaml:"token,omitempty" `
CertAuthFilePath string ` description:"Kubernetes certificate authority file path (not needed for in-cluster client)." json:"certAuthFilePath,omitempty" toml:"certAuthFilePath,omitempty" yaml:"certAuthFilePath,omitempty" `
DisablePassHostHeaders bool ` description:"Kubernetes disable PassHost Headers." json:"disablePassHostHeaders,omitempty" toml:"disablePassHostHeaders,omitempty" yaml:"disablePassHostHeaders,omitempty" export:"true" `
Namespaces [ ] string ` description:"Kubernetes namespaces." json:"namespaces,omitempty" toml:"namespaces,omitempty" yaml:"namespaces,omitempty" export:"true" `
LabelSelector string ` description:"Kubernetes Ingress label selector to use." json:"labelSelector,omitempty" toml:"labelSelector,omitempty" yaml:"labelSelector,omitempty" export:"true" `
IngressClass string ` description:"Value of kubernetes.io/ingress.class annotation to watch for." json:"ingressClass,omitempty" toml:"ingressClass,omitempty" yaml:"ingressClass,omitempty" export:"true" `
IngressEndpoint * EndpointIngress ` description:"Kubernetes Ingress Endpoint." json:"ingressEndpoint,omitempty" toml:"ingressEndpoint,omitempty" yaml:"ingressEndpoint,omitempty" `
2019-02-21 22:08:05 +00:00
lastConfiguration safe . Safe
}
2019-03-18 09:10:04 +00:00
// EndpointIngress holds the endpoint information for the Kubernetes provider
type EndpointIngress struct {
2019-07-01 09:30:05 +00:00
IP string ` description:"IP used for Kubernetes Ingress endpoints." json:"ip,omitempty" toml:"ip,omitempty" yaml:"ip,omitempty" `
Hostname string ` description:"Hostname used for Kubernetes Ingress endpoints." json:"hostname,omitempty" toml:"hostname,omitempty" yaml:"hostname,omitempty" `
PublishedService string ` description:"Published Kubernetes Service to copy status from." json:"publishedService,omitempty" toml:"publishedService,omitempty" yaml:"publishedService,omitempty" `
2019-03-18 09:10:04 +00:00
}
2019-03-14 14:56:06 +00:00
func ( p * Provider ) newK8sClient ( ctx context . Context , ingressLabelSelector string ) ( * clientWrapper , error ) {
2019-02-21 22:08:05 +00:00
ingLabelSel , err := labels . Parse ( ingressLabelSelector )
if err != nil {
return nil , fmt . Errorf ( "invalid ingress label selector: %q" , ingressLabelSelector )
}
2019-03-14 14:56:06 +00:00
logger := log . FromContext ( ctx )
logger . Infof ( "ingress label selector is: %q" , ingLabelSel )
2019-02-21 22:08:05 +00:00
withEndpoint := ""
if p . Endpoint != "" {
withEndpoint = fmt . Sprintf ( " with endpoint %v" , p . Endpoint )
}
2019-03-14 14:56:06 +00:00
var cl * clientWrapper
2019-03-11 13:54:05 +00:00
switch {
case os . Getenv ( "KUBERNETES_SERVICE_HOST" ) != "" && os . Getenv ( "KUBERNETES_SERVICE_PORT" ) != "" :
2019-03-14 14:56:06 +00:00
logger . Infof ( "Creating in-cluster Provider client%s" , withEndpoint )
2019-02-21 22:08:05 +00:00
cl , err = newInClusterClient ( p . Endpoint )
2019-03-11 13:54:05 +00:00
case os . Getenv ( "KUBECONFIG" ) != "" :
2019-03-14 14:56:06 +00:00
logger . Infof ( "Creating cluster-external Provider client from KUBECONFIG %s" , os . Getenv ( "KUBECONFIG" ) )
2019-03-11 13:54:05 +00:00
cl , err = newExternalClusterClientFromFile ( os . Getenv ( "KUBECONFIG" ) )
default :
2019-03-14 14:56:06 +00:00
logger . Infof ( "Creating cluster-external Provider client%s" , withEndpoint )
2019-02-21 22:08:05 +00:00
cl , err = newExternalClusterClient ( p . Endpoint , p . Token , p . CertAuthFilePath )
}
if err == nil {
cl . ingressLabelSelector = ingLabelSel
}
return cl , err
}
// Init the provider.
func ( p * Provider ) Init ( ) error {
2019-03-27 14:02:06 +00:00
return nil
2019-02-21 22:08:05 +00:00
}
// Provide allows the k8s provider to provide configurations to traefik
// using the given configuration channel.
2019-07-10 07:26:04 +00:00
func ( p * Provider ) Provide ( configurationChan chan <- dynamic . Message , pool * safe . Pool ) error {
2019-03-14 14:56:06 +00:00
ctxLog := log . With ( context . Background ( ) , log . Str ( log . ProviderName , "kubernetes" ) )
2019-02-21 22:08:05 +00:00
logger := log . FromContext ( ctxLog )
// Tell glog (used by client-go) to log into STDERR. Otherwise, we risk
// certain kinds of API errors getting logged into a directory not
// available in a `FROM scratch` Docker container, causing glog to abort
// hard with an exit code > 0.
err := flag . Set ( "logtostderr" , "true" )
if err != nil {
return err
}
logger . Debugf ( "Using Ingress label selector: %q" , p . LabelSelector )
k8sClient , err := p . newK8sClient ( ctxLog , p . LabelSelector )
if err != nil {
return err
}
pool . Go ( func ( stop chan bool ) {
operation := func ( ) error {
stopWatch := make ( chan struct { } , 1 )
defer close ( stopWatch )
2019-03-14 14:56:06 +00:00
2019-02-21 22:08:05 +00:00
eventsChan , err := k8sClient . WatchAll ( p . Namespaces , stopWatch )
if err != nil {
logger . Errorf ( "Error watching kubernetes events: %v" , err )
timer := time . NewTimer ( 1 * time . Second )
select {
case <- timer . C :
return err
case <- stop :
return nil
}
}
2019-03-14 14:56:06 +00:00
2019-02-21 22:08:05 +00:00
for {
select {
case <- stop :
return nil
case event := <- eventsChan :
conf := p . loadConfigurationFromIngresses ( ctxLog , k8sClient )
if reflect . DeepEqual ( p . lastConfiguration . Get ( ) , conf ) {
logger . Debugf ( "Skipping Kubernetes event kind %T" , event )
} else {
p . lastConfiguration . Set ( conf )
2019-07-10 07:26:04 +00:00
configurationChan <- dynamic . Message {
2019-02-21 22:08:05 +00:00
ProviderName : "kubernetes" ,
Configuration : conf ,
}
}
}
}
}
notify := func ( err error , time time . Duration ) {
logger . Errorf ( "Provider connection error: %s; retrying in %s" , err , time )
}
err := backoff . RetryNotify ( safe . OperationWithRecover ( operation ) , job . NewBackOff ( backoff . NewExponentialBackOff ( ) ) , notify )
if err != nil {
logger . Errorf ( "Cannot connect to Provider: %s" , err )
}
} )
return nil
}
func checkStringQuoteValidity ( value string ) error {
_ , err := strconv . Unquote ( ` " ` + value + ` " ` )
return err
}
2019-07-10 07:26:04 +00:00
func loadService ( client Client , namespace string , backend v1beta1 . IngressBackend ) ( * dynamic . Service , error ) {
2019-02-21 22:08:05 +00:00
service , exists , err := client . GetService ( namespace , backend . ServiceName )
if err != nil {
return nil , err
}
if ! exists {
return nil , errors . New ( "service not found" )
}
2019-07-10 07:26:04 +00:00
var servers [ ] dynamic . Server
2019-02-21 22:08:05 +00:00
var portName string
var portSpec corev1 . ServicePort
var match bool
for _ , p := range service . Spec . Ports {
if ( backend . ServicePort . Type == intstr . Int && backend . ServicePort . IntVal == p . Port ) ||
( backend . ServicePort . Type == intstr . String && backend . ServicePort . StrVal == p . Name ) {
portName = p . Name
portSpec = p
match = true
break
}
}
if ! match {
return nil , errors . New ( "service port not found" )
}
if service . Spec . Type == corev1 . ServiceTypeExternalName {
2019-07-10 07:26:04 +00:00
servers = append ( servers , dynamic . Server {
2019-06-05 20:18:06 +00:00
URL : fmt . Sprintf ( "http://%s:%d" , service . Spec . ExternalName , portSpec . Port ) ,
2019-02-21 22:08:05 +00:00
} )
} else {
endpoints , endpointsExists , endpointsErr := client . GetEndpoints ( namespace , backend . ServiceName )
if endpointsErr != nil {
return nil , endpointsErr
}
if ! endpointsExists {
return nil , errors . New ( "endpoints not found" )
}
if len ( endpoints . Subsets ) == 0 {
return nil , errors . New ( "subset not found" )
}
var port int32
for _ , subset := range endpoints . Subsets {
for _ , p := range subset . Ports {
if portName == p . Name {
port = p . Port
break
}
}
if port == 0 {
return nil , errors . New ( "cannot define a port" )
}
protocol := "http"
2019-03-06 09:03:29 +00:00
if port == 443 || strings . HasPrefix ( portName , "https" ) {
2019-02-21 22:08:05 +00:00
protocol = "https"
}
for _ , addr := range subset . Addresses {
2019-07-10 07:26:04 +00:00
servers = append ( servers , dynamic . Server {
2019-06-05 20:18:06 +00:00
URL : fmt . Sprintf ( "%s://%s:%d" , protocol , addr . IP , port ) ,
2019-02-21 22:08:05 +00:00
} )
}
}
}
2019-07-10 07:26:04 +00:00
return & dynamic . Service {
LoadBalancer : & dynamic . LoadBalancerService {
2019-02-21 22:08:05 +00:00
Servers : servers ,
PassHostHeader : true ,
} ,
} , nil
}
2019-07-10 07:26:04 +00:00
func ( p * Provider ) loadConfigurationFromIngresses ( ctx context . Context , client Client ) * dynamic . Configuration {
conf := & dynamic . Configuration {
HTTP : & dynamic . HTTPConfiguration {
Routers : map [ string ] * dynamic . Router { } ,
Middlewares : map [ string ] * dynamic . Middleware { } ,
Services : map [ string ] * dynamic . Service { } ,
2019-03-14 08:30:04 +00:00
} ,
2019-07-10 07:26:04 +00:00
TCP : & dynamic . TCPConfiguration { } ,
2019-02-21 22:08:05 +00:00
}
ingresses := client . GetIngresses ( )
2019-06-27 21:58:03 +00:00
tlsConfigs := make ( map [ string ] * tls . CertAndStores )
2019-02-21 22:08:05 +00:00
for _ , ingress := range ingresses {
ctx = log . With ( ctx , log . Str ( "ingress" , ingress . Name ) , log . Str ( "namespace" , ingress . Namespace ) )
if ! shouldProcessIngress ( p . IngressClass , ingress . Annotations [ annotationKubernetesIngressClass ] ) {
continue
}
err := getTLS ( ctx , ingress , client , tlsConfigs )
if err != nil {
log . FromContext ( ctx ) . Errorf ( "Error configuring TLS: %v" , err )
}
if len ( ingress . Spec . Rules ) == 0 {
if ingress . Spec . Backend != nil {
2019-03-14 08:30:04 +00:00
if _ , ok := conf . HTTP . Services [ "default-backend" ] ; ok {
2019-02-21 22:08:05 +00:00
log . FromContext ( ctx ) . Error ( "The default backend already exists." )
continue
}
service , err := loadService ( client , ingress . Namespace , * ingress . Spec . Backend )
if err != nil {
log . FromContext ( ctx ) .
WithField ( "serviceName" , ingress . Spec . Backend . ServiceName ) .
WithField ( "servicePort" , ingress . Spec . Backend . ServicePort . String ( ) ) .
Errorf ( "Cannot create service: %v" , err )
continue
}
2019-07-10 07:26:04 +00:00
conf . HTTP . Routers [ "/" ] = & dynamic . Router {
2019-02-21 22:08:05 +00:00
Rule : "PathPrefix(`/`)" ,
Priority : math . MinInt32 ,
Service : "default-backend" ,
}
2019-03-14 08:30:04 +00:00
conf . HTTP . Services [ "default-backend" ] = service
2019-02-21 22:08:05 +00:00
}
}
for _ , rule := range ingress . Spec . Rules {
if err := checkStringQuoteValidity ( rule . Host ) ; err != nil {
log . FromContext ( ctx ) . Errorf ( "Invalid syntax for host: %s" , rule . Host )
continue
}
for _ , p := range rule . HTTP . Paths {
service , err := loadService ( client , ingress . Namespace , p . Backend )
if err != nil {
log . FromContext ( ctx ) .
WithField ( "serviceName" , p . Backend . ServiceName ) .
WithField ( "servicePort" , p . Backend . ServicePort . String ( ) ) .
Errorf ( "Cannot create service: %v" , err )
continue
}
if err = checkStringQuoteValidity ( p . Path ) ; err != nil {
log . FromContext ( ctx ) . Errorf ( "Invalid syntax for path: %s" , p . Path )
continue
}
serviceName := ingress . Namespace + "/" + p . Backend . ServiceName + "/" + p . Backend . ServicePort . String ( )
2019-06-11 13:12:04 +00:00
serviceName = strings . ReplaceAll ( serviceName , "." , "-" )
2019-02-21 22:08:05 +00:00
var rules [ ] string
if len ( rule . Host ) > 0 {
rules = [ ] string { "Host(`" + rule . Host + "`)" }
}
if len ( p . Path ) > 0 {
rules = append ( rules , "PathPrefix(`" + p . Path + "`)" )
}
2019-07-10 07:26:04 +00:00
conf . HTTP . Routers [ strings . Replace ( rule . Host , "." , "-" , - 1 ) + p . Path ] = & dynamic . Router {
2019-02-21 22:08:05 +00:00
Rule : strings . Join ( rules , " && " ) ,
Service : serviceName ,
}
2019-03-14 08:30:04 +00:00
conf . HTTP . Services [ serviceName ] = service
2019-02-21 22:08:05 +00:00
}
2019-03-18 09:10:04 +00:00
err := p . updateIngressStatus ( ingress , client )
if err != nil {
log . FromContext ( ctx ) . Errorf ( "Error while updating ingress status: %v" , err )
}
2019-02-21 22:08:05 +00:00
}
}
2019-06-27 21:58:03 +00:00
certs := getTLSConfig ( tlsConfigs )
if len ( certs ) > 0 {
2019-07-10 07:26:04 +00:00
conf . TLS = & dynamic . TLSConfiguration {
2019-06-27 21:58:03 +00:00
Certificates : certs ,
}
}
2019-02-21 22:08:05 +00:00
return conf
}
func shouldProcessIngress ( ingressClass string , ingressClassAnnotation string ) bool {
return ingressClass == ingressClassAnnotation ||
( len ( ingressClass ) == 0 && ingressClassAnnotation == traefikDefaultIngressClass )
}
2019-06-27 21:58:03 +00:00
func getTLS ( ctx context . Context , ingress * v1beta1 . Ingress , k8sClient Client , tlsConfigs map [ string ] * tls . CertAndStores ) error {
2019-02-21 22:08:05 +00:00
for _ , t := range ingress . Spec . TLS {
if t . SecretName == "" {
log . FromContext ( ctx ) . Debugf ( "Skipping TLS sub-section: No secret name provided" )
continue
}
configKey := ingress . Namespace + "/" + t . SecretName
if _ , tlsExists := tlsConfigs [ configKey ] ; ! tlsExists {
secret , exists , err := k8sClient . GetSecret ( ingress . Namespace , t . SecretName )
if err != nil {
return fmt . Errorf ( "failed to fetch secret %s/%s: %v" , ingress . Namespace , t . SecretName , err )
}
if ! exists {
return fmt . Errorf ( "secret %s/%s does not exist" , ingress . Namespace , t . SecretName )
}
cert , key , err := getCertificateBlocks ( secret , ingress . Namespace , t . SecretName )
if err != nil {
return err
}
2019-06-27 21:58:03 +00:00
tlsConfigs [ configKey ] = & tls . CertAndStores {
Certificate : tls . Certificate {
2019-02-21 22:08:05 +00:00
CertFile : tls . FileOrContent ( cert ) ,
KeyFile : tls . FileOrContent ( key ) ,
} ,
}
}
}
return nil
}
2019-06-27 21:58:03 +00:00
func getTLSConfig ( tlsConfigs map [ string ] * tls . CertAndStores ) [ ] * tls . CertAndStores {
2019-02-21 22:08:05 +00:00
var secretNames [ ] string
for secretName := range tlsConfigs {
secretNames = append ( secretNames , secretName )
}
sort . Strings ( secretNames )
2019-06-27 21:58:03 +00:00
var configs [ ] * tls . CertAndStores
2019-02-21 22:08:05 +00:00
for _ , secretName := range secretNames {
configs = append ( configs , tlsConfigs [ secretName ] )
}
return configs
}
func getCertificateBlocks ( secret * corev1 . Secret , namespace , secretName string ) ( string , string , error ) {
var missingEntries [ ] string
tlsCrtData , tlsCrtExists := secret . Data [ "tls.crt" ]
if ! tlsCrtExists {
missingEntries = append ( missingEntries , "tls.crt" )
}
tlsKeyData , tlsKeyExists := secret . Data [ "tls.key" ]
if ! tlsKeyExists {
missingEntries = append ( missingEntries , "tls.key" )
}
if len ( missingEntries ) > 0 {
return "" , "" , fmt . Errorf ( "secret %s/%s is missing the following TLS data entries: %s" ,
namespace , secretName , strings . Join ( missingEntries , ", " ) )
}
cert := string ( tlsCrtData )
if cert == "" {
missingEntries = append ( missingEntries , "tls.crt" )
}
key := string ( tlsKeyData )
if key == "" {
missingEntries = append ( missingEntries , "tls.key" )
}
if len ( missingEntries ) > 0 {
return "" , "" , fmt . Errorf ( "secret %s/%s contains the following empty TLS data entries: %s" ,
namespace , secretName , strings . Join ( missingEntries , ", " ) )
}
return cert , key , nil
}
2019-03-18 09:10:04 +00:00
func ( p * Provider ) updateIngressStatus ( i * v1beta1 . Ingress , k8sClient Client ) error {
// Only process if an EndpointIngress has been configured
if p . IngressEndpoint == nil {
return nil
}
if len ( p . IngressEndpoint . PublishedService ) == 0 {
if len ( p . IngressEndpoint . IP ) == 0 && len ( p . IngressEndpoint . Hostname ) == 0 {
return errors . New ( "publishedService or ip or hostname must be defined" )
}
return k8sClient . UpdateIngressStatus ( i . Namespace , i . Name , p . IngressEndpoint . IP , p . IngressEndpoint . Hostname )
}
serviceInfo := strings . Split ( p . IngressEndpoint . PublishedService , "/" )
if len ( serviceInfo ) != 2 {
return fmt . Errorf ( "invalid publishedService format (expected 'namespace/service' format): %s" , p . IngressEndpoint . PublishedService )
}
serviceNamespace , serviceName := serviceInfo [ 0 ] , serviceInfo [ 1 ]
service , exists , err := k8sClient . GetService ( serviceNamespace , serviceName )
if err != nil {
return fmt . Errorf ( "cannot get service %s, received error: %s" , p . IngressEndpoint . PublishedService , err )
}
if exists && service . Status . LoadBalancer . Ingress == nil {
// service exists, but has no Load Balancer status
log . Debugf ( "Skipping updating Ingress %s/%s due to service %s having no status set" , i . Namespace , i . Name , p . IngressEndpoint . PublishedService )
return nil
}
if ! exists {
return fmt . Errorf ( "missing service: %s" , p . IngressEndpoint . PublishedService )
}
return k8sClient . UpdateIngressStatus ( i . Namespace , i . Name , service . Status . LoadBalancer . Ingress [ 0 ] . IP , service . Status . LoadBalancer . Ingress [ 0 ] . Hostname )
}