mirror of
https://github.com/ceph/ceph-csi.git
synced 2025-06-13 10:33:35 +00:00
rbd: create token and use it for vault SA
create the token if kubernetes version in 1.24+ and use it for vault sa. Signed-off-by: Madhu Rajanna <madhupr007@gmail.com> Signed-off-by: Rakshith R <rar@redhat.com>
This commit is contained in:
committed by
mergify[bot]
parent
d7bf51b255
commit
7a2dd4c3cf
@ -23,9 +23,13 @@ import (
|
||||
"io/ioutil"
|
||||
"os"
|
||||
|
||||
"github.com/ceph/ceph-csi/internal/util/k8s"
|
||||
|
||||
"github.com/libopenstorage/secrets/vault"
|
||||
authenticationv1 "k8s.io/api/authentication/v1"
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/client-go/kubernetes"
|
||||
)
|
||||
|
||||
const (
|
||||
@ -35,6 +39,9 @@ const (
|
||||
// should be available in the Tenants namespace. This ServiceAccount
|
||||
// will be used to connect to Hashicorp Vault.
|
||||
vaultTenantSAName = "ceph-csi-vault-sa"
|
||||
// Kubernetes version which requires ServiceAccount token creation.
|
||||
// Kubernetes 1.24 => 1 * 1000 + 24.
|
||||
kubeMinVersionForCreateToken = 1024
|
||||
)
|
||||
|
||||
/*
|
||||
@ -292,9 +299,9 @@ func (kms *vaultTenantSA) getToken() (string, error) {
|
||||
}
|
||||
|
||||
for _, secretRef := range sa.Secrets {
|
||||
secret, err := c.CoreV1().Secrets(kms.Tenant).Get(context.TODO(), secretRef.Name, metav1.GetOptions{})
|
||||
if err != nil {
|
||||
return "", fmt.Errorf("failed to get Secret %s/%s: %w", kms.Tenant, secretRef.Name, err)
|
||||
secret, sErr := c.CoreV1().Secrets(kms.Tenant).Get(context.TODO(), secretRef.Name, metav1.GetOptions{})
|
||||
if sErr != nil {
|
||||
return "", fmt.Errorf("failed to get Secret %s/%s: %w", kms.Tenant, secretRef.Name, sErr)
|
||||
}
|
||||
|
||||
token, ok := secret.Data["token"]
|
||||
@ -303,7 +310,7 @@ func (kms *vaultTenantSA) getToken() (string, error) {
|
||||
}
|
||||
}
|
||||
|
||||
return "", fmt.Errorf("failed to find token in ServiceAccount %s/%s", kms.Tenant, kms.tenantSAName)
|
||||
return kms.createToken(sa, c)
|
||||
}
|
||||
|
||||
// getTokenPath creates a temporary directory structure that contains the token
|
||||
@ -327,3 +334,33 @@ func (kms *vaultTenantSA) getTokenPath() (string, error) {
|
||||
|
||||
return dir + "/token", nil
|
||||
}
|
||||
|
||||
// createToken creates required service account token for kubernetes 1.24+,
|
||||
// else returns error.
|
||||
// From kubernetes v1.24+, secret for service account tokens are not
|
||||
// automatically created. Hence, use the create token api to fetch it.
|
||||
// refer: https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.24.md \
|
||||
// #no-really-you-must-read-this-before-you-upgrade-1 .
|
||||
func (kms *vaultTenantSA) createToken(sa *corev1.ServiceAccount, client *kubernetes.Clientset) (string, error) {
|
||||
major, minor, err := k8s.GetServerVersion(client)
|
||||
if err != nil {
|
||||
return "", fmt.Errorf("failed to get server version: %w", err)
|
||||
}
|
||||
|
||||
if (major*1000 + minor) >= kubeMinVersionForCreateToken {
|
||||
tokenRequest := &authenticationv1.TokenRequest{}
|
||||
token, err := client.CoreV1().ServiceAccounts(kms.Tenant).CreateToken(
|
||||
context.TODO(),
|
||||
sa.Name,
|
||||
tokenRequest,
|
||||
metav1.CreateOptions{},
|
||||
)
|
||||
if err != nil {
|
||||
return "", fmt.Errorf("failed to create token for service account %s/%s: %w", kms.Tenant, sa.Name, err)
|
||||
}
|
||||
|
||||
return token.Status.Token, nil
|
||||
}
|
||||
|
||||
return "", fmt.Errorf("failed to find token in ServiceAccount %s/%s", kms.Tenant, kms.tenantSAName)
|
||||
}
|
||||
|
Reference in New Issue
Block a user