Add required apiserver serviceaccount flags

In v1.20, TokenRequest and TokenRequestProjection become GA features,
and the following flags are required by the API server:
* --service-account-issuer
* --service-account-key-file
* --service-account-signing-key-file

This change ensures that the flags are set, and that the required keys
are in the right places.

Change-Id: I6606c5b1c9ff005d1943b424e3e7ad4d20b68408
This commit is contained in:
Phil Sphicas 2021-03-31 06:32:01 +00:00
parent f3febea043
commit 9533be32a1
13 changed files with 94 additions and 0 deletions

View File

@ -171,6 +171,7 @@ spec:
- --etcd-keyfile={{ tuple "etcd" "client" $envAll.Values.conf.paths.pki "key" $envAll | include "local.cert_bundle_path" }} - --etcd-keyfile={{ tuple "etcd" "client" $envAll.Values.conf.paths.pki "key" $envAll | include "local.cert_bundle_path" }}
- --allow-privileged=true - --allow-privileged=true
- --service-account-key-file={{ $envAll.Values.conf.paths.sapubkey }} - --service-account-key-file={{ $envAll.Values.conf.paths.sapubkey }}
- --service-account-signing-key-file={{ $envAll.Values.conf.paths.saprivkey }}
- --authentication-token-webhook-config-file={{ $envAll.Values.conf.paths.conf }} - --authentication-token-webhook-config-file={{ $envAll.Values.conf.paths.conf }}
- --authorization-webhook-config-file={{ $envAll.Values.conf.paths.conf }} - --authorization-webhook-config-file={{ $envAll.Values.conf.paths.conf }}
{{- range $key, $val := .Values.conf.apiserver }} {{- range $key, $val := .Values.conf.apiserver }}
@ -200,6 +201,10 @@ spec:
mountPath: {{ $envAll.Values.conf.paths.sapubkey }} mountPath: {{ $envAll.Values.conf.paths.sapubkey }}
subPath: service-account.pub subPath: service-account.pub
readOnly: true readOnly: true
- name: secrets-etc
mountPath: {{ $envAll.Values.conf.paths.saprivkey }}
subPath: service-account.key
readOnly: true
- name: configmap-etc - name: configmap-etc
mountPath: {{ $envAll.Values.conf.paths.conf }} mountPath: {{ $envAll.Values.conf.paths.conf }}
subPath: webhook.kubeconfig subPath: webhook.kubeconfig
@ -273,6 +278,10 @@ spec:
configMap: configMap:
name: {{ .Release.Name }}-etc name: {{ .Release.Name }}-etc
defaultMode: 0444 defaultMode: 0444
- name: secrets-etc
secret:
secretName: {{ .Release.Name }}-keys
defaultMode: 0444
- name: configmap-bin - name: configmap-bin
configMap: configMap:
name: {{ .Release.Name }}-bin name: {{ .Release.Name }}-bin

View File

@ -0,0 +1,27 @@
{{/*
Copyright 2021 AT&T Intellectual Property. All other rights reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/}}
{{- if .Values.manifests.secret_keys }}
{{- $envAll := . }}
---
apiVersion: v1
kind: Secret
metadata:
name: {{ .Release.Name }}-keys
type: Opaque
data:
service-account.key: {{ .Values.secrets.service_account.private_key | b64enc }}
{{- end }}

View File

@ -103,6 +103,7 @@ certificates:
secrets: secrets:
service_account: service_account:
public_key: placeholder public_key: placeholder
private_key: placeholder
identity: identity:
admin: apiserver-webhook-keystone-creds-admin admin: apiserver-webhook-keystone-creds-admin
webhook: apiserver-webhook-keystone-creds-webhook webhook: apiserver-webhook-keystone-creds-webhook
@ -302,6 +303,7 @@ conf:
conf: '/etc/webhook_apiserver/webhook.kubeconfig' conf: '/etc/webhook_apiserver/webhook.kubeconfig'
policy: '/etc/webhook_apiserver/conf/policy.json' policy: '/etc/webhook_apiserver/conf/policy.json'
sapubkey: '/etc/webhook_apiserver/pki/service-accounts.pub' sapubkey: '/etc/webhook_apiserver/pki/service-accounts.pub'
saprivkey: '/etc/webhook_apiserver/pki/service-accounts.key'
encryption_provider: '/etc/webhook_apiserver/encryption_provider.json' encryption_provider: '/etc/webhook_apiserver/encryption_provider.json'
# Every key below 'apiserver' yields a dynamic configuration file # Every key below 'apiserver' yields a dynamic configuration file
# and can mutate the apiserver command-line args. # and can mutate the apiserver command-line args.
@ -354,6 +356,9 @@ conf:
# rules: # rules:
# - level: Metadata # - level: Metadata
# #
service_account_issuer:
command_options:
- --service-account-issuer=https://kubernetes.default.svc.cluster.local
policy: policy:
- resource: - resource:
verbs: verbs:
@ -427,5 +432,6 @@ manifests:
pod_test: false pod_test: false
secret_keystone: true secret_keystone: true
secret_tls: true secret_tls: true
secret_keys: true
service: true service: true
network_policy: false network_policy: false

View File

@ -26,4 +26,5 @@ data:
apiserver-key.pem: {{ .Values.secrets.tls.key | b64enc }} apiserver-key.pem: {{ .Values.secrets.tls.key | b64enc }}
etcd-client-key.pem: {{ .Values.secrets.etcd.tls.key | b64enc }} etcd-client-key.pem: {{ .Values.secrets.etcd.tls.key | b64enc }}
kubelet-client-key.pem: {{ .Values.secrets.kubelet.tls.key | default .Values.secrets.tls.key | b64enc }} kubelet-client-key.pem: {{ .Values.secrets.kubelet.tls.key | default .Values.secrets.tls.key | b64enc }}
service-account.key: {{ .Values.secrets.service_account.private_key | b64enc }}
{{- end }} {{- end }}

View File

@ -36,6 +36,7 @@ const:
- --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname - --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname
- --secure-port=$(APISERVER_PORT) - --secure-port=$(APISERVER_PORT)
- --service-account-key-file=/etc/kubernetes/apiserver/pki/service-account.pub - --service-account-key-file=/etc/kubernetes/apiserver/pki/service-account.pub
- --service-account-signing-key-file=/etc/kubernetes/apiserver/pki/service-account.key
- --tls-cert-file=/etc/kubernetes/apiserver/pki/apiserver.pem - --tls-cert-file=/etc/kubernetes/apiserver/pki/apiserver.pem
- --tls-private-key-file=/etc/kubernetes/apiserver/pki/apiserver-key.pem - --tls-private-key-file=/etc/kubernetes/apiserver/pki/apiserver-key.pem
@ -52,6 +53,7 @@ const:
/etc/kubernetes/apiserver/pki/kubelet-client-key.pem: /keys/kubelet-client-key.pem /etc/kubernetes/apiserver/pki/kubelet-client-key.pem: /keys/kubelet-client-key.pem
/etc/kubernetes/apiserver/pki/kubelet-client.pem: /certs/kubelet-client.pem /etc/kubernetes/apiserver/pki/kubelet-client.pem: /certs/kubelet-client.pem
/etc/kubernetes/apiserver/pki/service-account.pub: /certs/service-account.pub /etc/kubernetes/apiserver/pki/service-account.pub: /certs/service-account.pub
/etc/kubernetes/apiserver/pki/service-account.key: /keys/service-account.key
/etc/kubernetes/manifests/kubernetes-apiserver.yaml: /tmp/etc/kubernetes-apiserver.yaml /etc/kubernetes/manifests/kubernetes-apiserver.yaml: /tmp/etc/kubernetes-apiserver.yaml
images: images:
@ -163,6 +165,9 @@ conf:
- name: key1 - name: key1
secret: Xw2UcbjILTJM6QiFZ0WPSbUvjtoT8OJC/Nl8qqYWjGk= secret: Xw2UcbjILTJM6QiFZ0WPSbUvjtoT8OJC/Nl8qqYWjGk=
- identity: {} - identity: {}
service_account_issuer:
command_options:
- --service-account-issuer=https://kubernetes.default.svc.cluster.local
apiserver: apiserver:
arguments: arguments:
@ -214,6 +219,7 @@ secrets:
key: placeholder key: placeholder
service_account: service_account:
public_key: placeholder public_key: placeholder
private_key: placeholder
etcd: etcd:
tls: tls:
ca: placeholder ca: placeholder

View File

@ -697,6 +697,13 @@ metadata:
path: . path: .
dest: dest:
path: .values.secrets.service_account.public_key path: .values.secrets.service_account.public_key
-
src:
schema: deckhand/PrivateKey/v1
name: service-account
path: .
dest:
path: .values.secrets.service_account.private_key
- src: - src:
schema: promenade/EncryptionPolicy/v1 schema: promenade/EncryptionPolicy/v1

View File

@ -714,6 +714,13 @@ metadata:
path: . path: .
dest: dest:
path: .values.secrets.service_account.public_key path: .values.secrets.service_account.public_key
-
src:
schema: deckhand/PrivateKey/v1
name: service-account
path: .
dest:
path: .values.secrets.service_account.private_key
data: data:
chart_name: apiserver chart_name: apiserver

View File

@ -594,6 +594,13 @@ metadata:
path: . path: .
dest: dest:
path: .values.secrets.service_account.public_key path: .values.secrets.service_account.public_key
-
src:
schema: deckhand/PrivateKey/v1
name: service-account
path: .
dest:
path: .values.secrets.service_account.private_key
- -
src: src:

View File

@ -600,6 +600,13 @@ metadata:
path: . path: .
dest: dest:
path: .values.secrets.service_account.public_key path: .values.secrets.service_account.public_key
-
src:
schema: deckhand/PrivateKey/v1
name: service-account
path: .
dest:
path: .values.secrets.service_account.private_key
- -
src: src:

View File

@ -10,7 +10,9 @@
- --kubelet-client-certificate=/etc/kubernetes/apiserver/pki/kubelet-client.pem - --kubelet-client-certificate=/etc/kubernetes/apiserver/pki/kubelet-client.pem
- --kubelet-client-key=/etc/kubernetes/apiserver/pki/kubelet-client-key.pem - --kubelet-client-key=/etc/kubernetes/apiserver/pki/kubelet-client-key.pem
- --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname - --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname
- --service-account-issuer=https://kubernetes.default.svc.cluster.local
- --service-account-key-file=/etc/kubernetes/apiserver/pki/service-account.pub - --service-account-key-file=/etc/kubernetes/apiserver/pki/service-account.pub
- --service-account-signing-key-file=/etc/kubernetes/apiserver/pki/service-account.key
- --tls-cert-file=/etc/kubernetes/apiserver/pki/apiserver.pem - --tls-cert-file=/etc/kubernetes/apiserver/pki/apiserver.pem
- --tls-private-key-file=/etc/kubernetes/apiserver/pki/apiserver-key.pem - --tls-private-key-file=/etc/kubernetes/apiserver/pki/apiserver-key.pem
{%- for argument in config.get_path('Genesis:apiserver.arguments', []) %} {%- for argument in config.get_path('Genesis:apiserver.arguments', []) %}

View File

@ -0,0 +1 @@
{{ config.get(schema='deckhand/PrivateKey/v1', name='service-account') }}

View File

@ -607,6 +607,13 @@ metadata:
path: . path: .
dest: dest:
path: .values.secrets.service_account.public_key path: .values.secrets.service_account.public_key
-
src:
schema: deckhand/PrivateKey/v1
name: service-account
path: .
dest:
path: .values.secrets.service_account.private_key
data: data:
chart_name: apiserver chart_name: apiserver

View File

@ -627,6 +627,13 @@ metadata:
path: . path: .
dest: dest:
path: .values.secrets.service_account.public_key path: .values.secrets.service_account.public_key
-
src:
schema: deckhand/PrivateKey/v1
name: service-account
path: .
dest:
path: .values.secrets.service_account.private_key
data: data:
chart_name: apiserver chart_name: apiserver