2023-01-27 21:37:20 +00:00
|
|
|
// Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
2022-12-12 19:15:34 +00:00
|
|
|
|
2023-08-24 22:02:42 +00:00
|
|
|
//go:build !plan9
|
|
|
|
|
2022-12-12 19:15:34 +00:00
|
|
|
// tailscale-operator provides a way to expose services running in a Kubernetes
|
|
|
|
// cluster to your Tailnet.
|
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"os"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2022-12-13 23:37:35 +00:00
|
|
|
"github.com/go-logr/zapr"
|
|
|
|
"go.uber.org/zap"
|
|
|
|
"go.uber.org/zap/zapcore"
|
2022-12-14 20:21:16 +00:00
|
|
|
"golang.org/x/oauth2/clientcredentials"
|
2022-12-12 19:15:34 +00:00
|
|
|
appsv1 "k8s.io/api/apps/v1"
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
|
|
|
"k8s.io/apimachinery/pkg/types"
|
2023-08-23 15:20:14 +00:00
|
|
|
"k8s.io/client-go/rest"
|
2022-12-12 19:15:34 +00:00
|
|
|
"sigs.k8s.io/controller-runtime/pkg/builder"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/cache"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/client/config"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/handler"
|
|
|
|
logf "sigs.k8s.io/controller-runtime/pkg/log"
|
2022-12-13 23:37:35 +00:00
|
|
|
kzap "sigs.k8s.io/controller-runtime/pkg/log/zap"
|
2022-12-12 19:15:34 +00:00
|
|
|
"sigs.k8s.io/controller-runtime/pkg/manager"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/manager/signals"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/reconcile"
|
|
|
|
"tailscale.com/client/tailscale"
|
2023-02-23 02:26:17 +00:00
|
|
|
"tailscale.com/hostinfo"
|
2022-12-14 20:21:16 +00:00
|
|
|
"tailscale.com/ipn"
|
2022-12-12 19:15:34 +00:00
|
|
|
"tailscale.com/ipn/store/kubestore"
|
|
|
|
"tailscale.com/tsnet"
|
|
|
|
"tailscale.com/types/logger"
|
2023-04-06 23:01:35 +00:00
|
|
|
"tailscale.com/version"
|
2022-12-12 19:15:34 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func main() {
|
2022-12-14 20:21:16 +00:00
|
|
|
// Required to use our client API. We're fine with the instability since the
|
|
|
|
// client lives in the same repo as this code.
|
|
|
|
tailscale.I_Acknowledge_This_API_Is_Unstable = true
|
|
|
|
|
2022-12-13 05:00:10 +00:00
|
|
|
var (
|
2023-02-03 22:47:52 +00:00
|
|
|
tsNamespace = defaultEnv("OPERATOR_NAMESPACE", "")
|
|
|
|
tslogging = defaultEnv("OPERATOR_LOGGING", "info")
|
|
|
|
image = defaultEnv("PROXY_IMAGE", "tailscale/tailscale:latest")
|
2023-05-17 10:54:27 +00:00
|
|
|
priorityClassName = defaultEnv("PROXY_PRIORITY_CLASS_NAME", "")
|
2023-02-03 22:47:52 +00:00
|
|
|
tags = defaultEnv("PROXY_TAGS", "tag:k8s")
|
2023-02-23 02:26:17 +00:00
|
|
|
shouldRunAuthProxy = defaultBool("AUTH_PROXY", false)
|
2022-12-13 05:00:10 +00:00
|
|
|
)
|
|
|
|
|
2022-12-13 23:37:35 +00:00
|
|
|
var opts []kzap.Opts
|
|
|
|
switch tslogging {
|
|
|
|
case "info":
|
|
|
|
opts = append(opts, kzap.Level(zapcore.InfoLevel))
|
|
|
|
case "debug":
|
|
|
|
opts = append(opts, kzap.Level(zapcore.DebugLevel))
|
|
|
|
case "dev":
|
|
|
|
opts = append(opts, kzap.UseDevMode(true), kzap.Level(zapcore.DebugLevel))
|
|
|
|
}
|
|
|
|
zlog := kzap.NewRaw(opts...).Sugar()
|
|
|
|
logf.SetLogger(zapr.NewLogger(zlog.Desugar()))
|
2022-12-14 20:21:16 +00:00
|
|
|
|
2023-08-23 15:20:14 +00:00
|
|
|
s, tsClient := initTSNet(zlog)
|
2023-08-23 18:39:33 +00:00
|
|
|
defer s.Close()
|
2023-08-23 15:20:14 +00:00
|
|
|
restConfig := config.GetConfigOrDie()
|
|
|
|
if shouldRunAuthProxy {
|
|
|
|
launchAuthProxy(zlog, restConfig, s)
|
|
|
|
}
|
|
|
|
startReconcilers(zlog, tsNamespace, restConfig, tsClient, image, priorityClassName, tags)
|
|
|
|
}
|
|
|
|
|
|
|
|
// initTSNet initializes the tsnet.Server and logs in to Tailscale. It uses the
|
|
|
|
// CLIENT_ID_FILE and CLIENT_SECRET_FILE environment variables to authenticate
|
|
|
|
// with Tailscale.
|
|
|
|
func initTSNet(zlog *zap.SugaredLogger) (*tsnet.Server, *tailscale.Client) {
|
|
|
|
hostinfo.SetApp("k8s-operator")
|
|
|
|
var (
|
|
|
|
clientIDPath = defaultEnv("CLIENT_ID_FILE", "")
|
|
|
|
clientSecretPath = defaultEnv("CLIENT_SECRET_FILE", "")
|
|
|
|
hostname = defaultEnv("OPERATOR_HOSTNAME", "tailscale-operator")
|
|
|
|
kubeSecret = defaultEnv("OPERATOR_SECRET", "")
|
|
|
|
operatorTags = defaultEnv("OPERATOR_INITIAL_TAGS", "tag:k8s-operator")
|
|
|
|
)
|
|
|
|
startlog := zlog.Named("startup")
|
2022-12-14 20:21:16 +00:00
|
|
|
if clientIDPath == "" || clientSecretPath == "" {
|
|
|
|
startlog.Fatalf("CLIENT_ID_FILE and CLIENT_SECRET_FILE must be set")
|
|
|
|
}
|
|
|
|
clientID, err := os.ReadFile(clientIDPath)
|
|
|
|
if err != nil {
|
|
|
|
startlog.Fatalf("reading client ID %q: %v", clientIDPath, err)
|
|
|
|
}
|
|
|
|
clientSecret, err := os.ReadFile(clientSecretPath)
|
|
|
|
if err != nil {
|
|
|
|
startlog.Fatalf("reading client secret %q: %v", clientSecretPath, err)
|
|
|
|
}
|
|
|
|
credentials := clientcredentials.Config{
|
|
|
|
ClientID: string(clientID),
|
|
|
|
ClientSecret: string(clientSecret),
|
|
|
|
TokenURL: "https://login.tailscale.com/api/v2/oauth/token",
|
|
|
|
}
|
|
|
|
tsClient := tailscale.NewClient("-", nil)
|
|
|
|
tsClient.HTTPClient = credentials.Client(context.Background())
|
2023-02-23 02:26:17 +00:00
|
|
|
|
2022-12-12 19:15:34 +00:00
|
|
|
s := &tsnet.Server{
|
|
|
|
Hostname: hostname,
|
2022-12-13 23:37:35 +00:00
|
|
|
Logf: zlog.Named("tailscaled").Debugf,
|
2022-12-12 19:15:34 +00:00
|
|
|
}
|
|
|
|
if kubeSecret != "" {
|
|
|
|
st, err := kubestore.New(logger.Discard, kubeSecret)
|
|
|
|
if err != nil {
|
2022-12-13 23:37:35 +00:00
|
|
|
startlog.Fatalf("creating kube store: %v", err)
|
2022-12-12 19:15:34 +00:00
|
|
|
}
|
|
|
|
s.Store = st
|
|
|
|
}
|
|
|
|
if err := s.Start(); err != nil {
|
2022-12-13 23:37:35 +00:00
|
|
|
startlog.Fatalf("starting tailscale server: %v", err)
|
2022-12-12 19:15:34 +00:00
|
|
|
}
|
|
|
|
lc, err := s.LocalClient()
|
|
|
|
if err != nil {
|
2022-12-13 23:37:35 +00:00
|
|
|
startlog.Fatalf("getting local client: %v", err)
|
2022-12-12 19:15:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ctx := context.Background()
|
2022-12-14 20:21:16 +00:00
|
|
|
loginDone := false
|
2022-12-12 19:15:34 +00:00
|
|
|
machineAuthShown := false
|
|
|
|
waitOnline:
|
|
|
|
for {
|
2022-12-14 20:21:16 +00:00
|
|
|
startlog.Debugf("querying tailscaled status")
|
2022-12-12 19:15:34 +00:00
|
|
|
st, err := lc.StatusWithoutPeers(ctx)
|
|
|
|
if err != nil {
|
2022-12-13 23:37:35 +00:00
|
|
|
startlog.Fatalf("getting status: %v", err)
|
2022-12-12 19:15:34 +00:00
|
|
|
}
|
|
|
|
switch st.BackendState {
|
|
|
|
case "Running":
|
|
|
|
break waitOnline
|
|
|
|
case "NeedsLogin":
|
2022-12-14 20:21:16 +00:00
|
|
|
if loginDone {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
caps := tailscale.KeyCapabilities{
|
|
|
|
Devices: tailscale.KeyDeviceCapabilities{
|
|
|
|
Create: tailscale.KeyDeviceCreateCapabilities{
|
|
|
|
Reusable: false,
|
|
|
|
Preauthorized: true,
|
|
|
|
Tags: strings.Split(operatorTags, ","),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2023-05-13 01:50:30 +00:00
|
|
|
authkey, _, err := tsClient.CreateKey(ctx, caps)
|
2022-12-14 20:21:16 +00:00
|
|
|
if err != nil {
|
|
|
|
startlog.Fatalf("creating operator authkey: %v", err)
|
2022-12-12 19:15:34 +00:00
|
|
|
}
|
2022-12-14 20:21:16 +00:00
|
|
|
if err := lc.Start(ctx, ipn.Options{
|
|
|
|
AuthKey: authkey,
|
|
|
|
}); err != nil {
|
|
|
|
startlog.Fatalf("starting tailscale: %v", err)
|
|
|
|
}
|
|
|
|
if err := lc.StartLoginInteractive(ctx); err != nil {
|
|
|
|
startlog.Fatalf("starting login: %v", err)
|
|
|
|
}
|
|
|
|
startlog.Debugf("requested login by authkey")
|
|
|
|
loginDone = true
|
2022-12-12 19:15:34 +00:00
|
|
|
case "NeedsMachineAuth":
|
|
|
|
if !machineAuthShown {
|
2023-03-01 19:16:42 +00:00
|
|
|
startlog.Infof("Machine approval required, please visit the admin panel to approve")
|
2022-12-12 19:15:34 +00:00
|
|
|
machineAuthShown = true
|
|
|
|
}
|
|
|
|
default:
|
2022-12-13 23:37:35 +00:00
|
|
|
startlog.Debugf("waiting for tailscale to start: %v", st.BackendState)
|
2022-12-12 19:15:34 +00:00
|
|
|
}
|
|
|
|
time.Sleep(time.Second)
|
|
|
|
}
|
2023-08-23 15:20:14 +00:00
|
|
|
return s, tsClient
|
|
|
|
}
|
2022-12-12 19:15:34 +00:00
|
|
|
|
2023-08-23 15:20:14 +00:00
|
|
|
// startReconcilers starts the controller-runtime manager and registers the
|
|
|
|
// ServiceReconciler.
|
|
|
|
func startReconcilers(zlog *zap.SugaredLogger, tsNamespace string, restConfig *rest.Config, tsClient *tailscale.Client, image, priorityClassName, tags string) {
|
|
|
|
startlog := zlog.Named("startReconcilers")
|
2022-12-12 19:15:34 +00:00
|
|
|
// For secrets and statefulsets, we only get permission to touch the objects
|
|
|
|
// in the controller's own namespace. This cannot be expressed by
|
|
|
|
// .Watches(...) below, instead you have to add a per-type field selector to
|
|
|
|
// the cache that sits a few layers below the builder stuff, which will
|
|
|
|
// implicitly filter what parts of the world the builder code gets to see at
|
|
|
|
// all.
|
2023-05-19 16:44:12 +00:00
|
|
|
nsFilter := cache.ByObject{
|
|
|
|
Field: client.InNamespace(tsNamespace).AsSelector(),
|
2022-12-12 19:15:34 +00:00
|
|
|
}
|
2023-02-03 22:47:52 +00:00
|
|
|
mgr, err := manager.New(restConfig, manager.Options{
|
2023-05-19 16:44:12 +00:00
|
|
|
Cache: cache.Options{
|
|
|
|
ByObject: map[client.Object]cache.ByObject{
|
2022-12-12 19:15:34 +00:00
|
|
|
&corev1.Secret{}: nsFilter,
|
|
|
|
&appsv1.StatefulSet{}: nsFilter,
|
|
|
|
},
|
2023-05-19 16:44:12 +00:00
|
|
|
},
|
2022-12-12 19:15:34 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
2022-12-13 23:37:35 +00:00
|
|
|
startlog.Fatalf("could not create manager: %v", err)
|
2022-12-12 19:15:34 +00:00
|
|
|
}
|
2022-12-14 20:21:16 +00:00
|
|
|
|
2023-05-19 16:44:12 +00:00
|
|
|
reconcileFilter := handler.EnqueueRequestsFromMapFunc(func(_ context.Context, o client.Object) []reconcile.Request {
|
2022-12-12 19:15:34 +00:00
|
|
|
ls := o.GetLabels()
|
|
|
|
if ls[LabelManaged] != "true" {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if ls[LabelParentType] != "svc" {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return []reconcile.Request{
|
|
|
|
{
|
|
|
|
NamespacedName: types.NamespacedName{
|
|
|
|
Namespace: ls[LabelParentNamespace],
|
|
|
|
Name: ls[LabelParentName],
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
})
|
|
|
|
err = builder.
|
|
|
|
ControllerManagedBy(mgr).
|
|
|
|
For(&corev1.Service{}).
|
2023-05-19 16:44:12 +00:00
|
|
|
Watches(&appsv1.StatefulSet{}, reconcileFilter).
|
|
|
|
Watches(&corev1.Secret{}, reconcileFilter).
|
2023-08-23 15:20:14 +00:00
|
|
|
Complete(&ServiceReconciler{
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: mgr.GetClient(),
|
|
|
|
tsClient: tsClient,
|
|
|
|
defaultTags: strings.Split(tags, ","),
|
|
|
|
operatorNamespace: tsNamespace,
|
|
|
|
proxyImage: image,
|
|
|
|
proxyPriorityClassName: priorityClassName,
|
|
|
|
},
|
|
|
|
Client: mgr.GetClient(),
|
|
|
|
logger: zlog.Named("service-reconciler"),
|
|
|
|
})
|
2022-12-12 19:15:34 +00:00
|
|
|
if err != nil {
|
2022-12-13 23:37:35 +00:00
|
|
|
startlog.Fatalf("could not create controller: %v", err)
|
2022-12-12 19:15:34 +00:00
|
|
|
}
|
|
|
|
|
2023-04-06 23:01:35 +00:00
|
|
|
startlog.Infof("Startup complete, operator running, version: %s", version.Long())
|
2022-12-12 19:15:34 +00:00
|
|
|
if err := mgr.Start(signals.SetupSignalHandler()); err != nil {
|
2022-12-13 23:37:35 +00:00
|
|
|
startlog.Fatalf("could not start manager: %v", err)
|
2022-12-12 19:15:34 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-12-12 23:37:20 +00:00
|
|
|
type tsClient interface {
|
2023-05-13 01:50:30 +00:00
|
|
|
CreateKey(ctx context.Context, caps tailscale.KeyCapabilities) (string, *tailscale.Key, error)
|
2023-08-23 15:20:14 +00:00
|
|
|
DeleteDevice(ctx context.Context, nodeStableID string) error
|
2022-12-12 19:15:34 +00:00
|
|
|
}
|