Skip to content

Commit

Permalink
Merge pull request #2081 from cartermckinnon/add-kubeconfig-flag
Browse files Browse the repository at this point in the history
Add --kubeconfig flag for out-of-cluster auth
  • Loading branch information
k8s-ci-robot authored Jul 8, 2024
2 parents c257e5b + 21c583c commit a789247
Show file tree
Hide file tree
Showing 3 changed files with 60 additions and 40 deletions.
4 changes: 2 additions & 2 deletions cmd/main.go
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ func main() {

switch cmd {
case "pre-stop-hook":
clientset, clientErr := metadata.DefaultKubernetesAPIClient()
clientset, clientErr := metadata.DefaultKubernetesAPIClient(options.Kubeconfig)()
if clientErr != nil {
klog.ErrorS(err, "unable to communicate with k8s API")
} else {
Expand Down Expand Up @@ -140,7 +140,7 @@ func main() {

cfg := metadata.MetadataServiceConfig{
EC2MetadataClient: metadata.DefaultEC2MetadataClient,
K8sAPIClient: metadata.DefaultKubernetesAPIClient,
K8sAPIClient: metadata.DefaultKubernetesAPIClient(options.Kubeconfig),
}

region := os.Getenv("AWS_REGION")
Expand Down
90 changes: 52 additions & 38 deletions pkg/cloud/metadata/k8s.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,56 +27,70 @@ import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes"
"k8s.io/client-go/rest"
"k8s.io/client-go/tools/clientcmd"
"k8s.io/client-go/util/cert"
"k8s.io/klog/v2"
)

type KubernetesAPIClient func() (kubernetes.Interface, error)

var DefaultKubernetesAPIClient = func() (kubernetes.Interface, error) {
// creates the in-cluster config
config, err := rest.InClusterConfig()
if err != nil {
if errors.Is(err, os.ErrNotExist) {
klog.InfoS("InClusterConfig failed to read token file, retrieving file from sandbox mount point")
// CONTAINER_SANDBOX_MOUNT_POINT env is set upon container creation in containerd v1.6+
// it provides the absolute host path to the container volume.
sandboxMountPoint := os.Getenv("CONTAINER_SANDBOX_MOUNT_POINT")
if sandboxMountPoint == "" {
return nil, fmt.Errorf("CONTAINER_SANDBOX_MOUNT_POINT environment variable is not set")
}

tokenFile := filepath.Join(sandboxMountPoint, "var", "run", "secrets", "kubernetes.io", "serviceaccount", "token")
rootCAFile := filepath.Join(sandboxMountPoint, "var", "run", "secrets", "kubernetes.io", "serviceaccount", "ca.crt")

token, tokenErr := os.ReadFile(tokenFile)
func DefaultKubernetesAPIClient(kubeconfig string) KubernetesAPIClient {
return func() (clientset kubernetes.Interface, err error) {
var config *rest.Config
if kubeconfig != "" {
config, err = clientcmd.NewNonInteractiveDeferredLoadingClientConfig(
&clientcmd.ClientConfigLoadingRules{ExplicitPath: kubeconfig},
&clientcmd.ConfigOverrides{},
).ClientConfig()
if err != nil {
return nil, tokenErr
}

tlsClientConfig := rest.TLSClientConfig{}
if _, certErr := cert.NewPool(rootCAFile); err != nil {
return nil, fmt.Errorf("expected to load root CA config from %s, but got err: %w", rootCAFile, certErr)
} else {
tlsClientConfig.CAFile = rootCAFile
}

config = &rest.Config{
Host: "https://" + net.JoinHostPort(os.Getenv("KUBERNETES_SERVICE_HOST"), os.Getenv("KUBERNETES_SERVICE_PORT")),
TLSClientConfig: tlsClientConfig,
BearerToken: string(token),
BearerTokenFile: tokenFile,
return nil, err
}
} else {
// creates the in-cluster config
config, err = rest.InClusterConfig()
if err != nil {
if errors.Is(err, os.ErrNotExist) {
klog.InfoS("InClusterConfig failed to read token file, retrieving file from sandbox mount point")
// CONTAINER_SANDBOX_MOUNT_POINT env is set upon container creation in containerd v1.6+
// it provides the absolute host path to the container volume.
sandboxMountPoint := os.Getenv("CONTAINER_SANDBOX_MOUNT_POINT")
if sandboxMountPoint == "" {
return nil, fmt.Errorf("CONTAINER_SANDBOX_MOUNT_POINT environment variable is not set")
}

tokenFile := filepath.Join(sandboxMountPoint, "var", "run", "secrets", "kubernetes.io", "serviceaccount", "token")
rootCAFile := filepath.Join(sandboxMountPoint, "var", "run", "secrets", "kubernetes.io", "serviceaccount", "ca.crt")

token, tokenErr := os.ReadFile(tokenFile)
if err != nil {
return nil, tokenErr
}

tlsClientConfig := rest.TLSClientConfig{}
if _, certErr := cert.NewPool(rootCAFile); err != nil {
return nil, fmt.Errorf("expected to load root CA config from %s, but got err: %w", rootCAFile, certErr)
} else {
tlsClientConfig.CAFile = rootCAFile
}

config = &rest.Config{
Host: "https://" + net.JoinHostPort(os.Getenv("KUBERNETES_SERVICE_HOST"), os.Getenv("KUBERNETES_SERVICE_PORT")),
TLSClientConfig: tlsClientConfig,
BearerToken: string(token),
BearerTokenFile: tokenFile,
}
} else {
return nil, err
}
}
}
// creates the clientset
clientset, err = kubernetes.NewForConfig(config)
if err != nil {
return nil, err
}
return clientset, nil
}
// creates the clientset
clientset, err := kubernetes.NewForConfig(config)
if err != nil {
return nil, err
}
return clientset, nil
}

func KubernetesAPIInstanceInfo(clientset kubernetes.Interface) (*Metadata, error) {
Expand Down
6 changes: 6 additions & 0 deletions pkg/driver/options.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,10 @@ import (
type Options struct {
Mode Mode

// Kubeconfig is an absolute path to a kubeconfig file.
// If empty, the in-cluster config will be loaded.
Kubeconfig string

// #### Server options ####

//Endpoint is the endpoint for the CSI driver server
Expand Down Expand Up @@ -86,6 +90,8 @@ type Options struct {
}

func (o *Options) AddFlags(f *flag.FlagSet) {
f.StringVar(&o.Kubeconfig, "kubeconfig", "", "Absolute path to a kubeconfig file. The default is the emtpy string, which causes the in-cluster config to be used")

// Server options
f.StringVar(&o.Endpoint, "endpoint", DefaultCSIEndpoint, "Endpoint for the CSI driver server")
f.StringVar(&o.HttpEndpoint, "http-endpoint", "", "The TCP network address where the HTTP server for metrics will listen (example: `:8080`). The default is empty string, which means the server is disabled.")
Expand Down

0 comments on commit a789247

Please sign in to comment.