mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-30 18:20:19 +00:00
07b05616a0
Bumps [k8s.io/kubernetes](https://github.com/kubernetes/kubernetes) from 1.26.2 to 1.27.2. - [Release notes](https://github.com/kubernetes/kubernetes/releases) - [Commits](https://github.com/kubernetes/kubernetes/compare/v1.26.2...v1.27.2) --- updated-dependencies: - dependency-name: k8s.io/kubernetes dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
98 lines
3.1 KiB
Go
98 lines
3.1 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package server
|
|
|
|
import (
|
|
"fmt"
|
|
"net"
|
|
|
|
restclient "k8s.io/client-go/rest"
|
|
netutils "k8s.io/utils/net"
|
|
)
|
|
|
|
// LoopbackClientServerNameOverride is passed to the apiserver from the loopback client in order to
|
|
// select the loopback certificate via SNI if TLS is used.
|
|
const LoopbackClientServerNameOverride = "apiserver-loopback-client"
|
|
|
|
func (s *SecureServingInfo) NewClientConfig(caCert []byte) (*restclient.Config, error) {
|
|
if s == nil || (s.Cert == nil && len(s.SNICerts) == 0) {
|
|
return nil, nil
|
|
}
|
|
|
|
host, port, err := LoopbackHostPort(s.Listener.Addr().String())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &restclient.Config{
|
|
// Do not limit loopback client QPS.
|
|
QPS: -1,
|
|
Host: "https://" + net.JoinHostPort(host, port),
|
|
TLSClientConfig: restclient.TLSClientConfig{
|
|
CAData: caCert,
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
func (s *SecureServingInfo) NewLoopbackClientConfig(token string, loopbackCert []byte) (*restclient.Config, error) {
|
|
c, err := s.NewClientConfig(loopbackCert)
|
|
if err != nil || c == nil {
|
|
return c, err
|
|
}
|
|
|
|
c.BearerToken = token
|
|
// override the ServerName to select our loopback certificate via SNI. This name is also
|
|
// used by the client to compare the returns server certificate against.
|
|
c.TLSClientConfig.ServerName = LoopbackClientServerNameOverride
|
|
|
|
return c, nil
|
|
}
|
|
|
|
// LoopbackHostPort returns the host and port loopback REST clients should use
|
|
// to contact the server.
|
|
func LoopbackHostPort(bindAddress string) (string, string, error) {
|
|
host, port, err := net.SplitHostPort(bindAddress)
|
|
if err != nil {
|
|
// should never happen
|
|
return "", "", fmt.Errorf("invalid server bind address: %q", bindAddress)
|
|
}
|
|
|
|
isIPv6 := netutils.IsIPv6String(host)
|
|
|
|
// Value is expected to be an IP or DNS name, not "0.0.0.0".
|
|
if host == "0.0.0.0" || host == "::" {
|
|
// Get ip of local interface, but fall back to "localhost".
|
|
// Note that "localhost" is resolved with the external nameserver first with Go's stdlib.
|
|
// So if localhost.<yoursearchdomain> resolves, we don't get a 127.0.0.1 as expected.
|
|
host = getLoopbackAddress(isIPv6)
|
|
}
|
|
return host, port, nil
|
|
}
|
|
|
|
// getLoopbackAddress returns the ip address of local loopback interface. If any error occurs or loopback interface is not found, will fall back to "localhost"
|
|
func getLoopbackAddress(wantIPv6 bool) string {
|
|
addrs, err := net.InterfaceAddrs()
|
|
if err == nil {
|
|
for _, address := range addrs {
|
|
if ipnet, ok := address.(*net.IPNet); ok && ipnet.IP.IsLoopback() && wantIPv6 == netutils.IsIPv6(ipnet.IP) {
|
|
return ipnet.IP.String()
|
|
}
|
|
}
|
|
}
|
|
return "localhost"
|
|
}
|