// Copyright (c) Tailscale Inc & AUTHORS // SPDX-License-Identifier: BSD-3-Clause //go:build linux package main import ( "context" "encoding/json" "fmt" "net/http" "net/netip" "os" "tailscale.com/kube/kubeapi" "tailscale.com/kube/kubeclient" "tailscale.com/kube/kubetypes" "tailscale.com/tailcfg" ) // kubeClient is a wrapper around Tailscale's internal kube client that knows how to talk to the kube API server. We use // this rather than any of the upstream Kubernetes client libaries to avoid extra imports. type kubeClient struct { kubeclient.Client stateSecret string } func newKubeClient(root string, stateSecret string) (*kubeClient, error) { if root != "/" { // If we are running in a test, we need to set the root path to the fake // service account directory. kubeclient.SetRootPathForTesting(root) } var err error kc, err := kubeclient.New("tailscale-container") if err != nil { return nil, fmt.Errorf("Error creating kube client: %w", err) } if (root != "/") || os.Getenv("TS_KUBERNETES_READ_API_SERVER_ADDRESS_FROM_ENV") == "true" { // Derive the API server address from the environment variables // Used to set http server in tests, or optionally enabled by flag kc.SetURL(fmt.Sprintf("https://%s:%s", os.Getenv("KUBERNETES_SERVICE_HOST"), os.Getenv("KUBERNETES_SERVICE_PORT_HTTPS"))) } return &kubeClient{Client: kc, stateSecret: stateSecret}, nil } // storeDeviceID writes deviceID to 'device_id' data field of the named // Kubernetes Secret. func (kc *kubeClient) storeDeviceID(ctx context.Context, deviceID tailcfg.StableNodeID) error { s := &kubeapi.Secret{ Data: map[string][]byte{ kubetypes.KeyDeviceID: []byte(deviceID), }, } return kc.StrategicMergePatchSecret(ctx, kc.stateSecret, s, "tailscale-container") } // storeDeviceEndpoints writes device's tailnet IPs and MagicDNS name to fields // 'device_ips', 'device_fqdn' of the named Kubernetes Secret. func (kc *kubeClient) storeDeviceEndpoints(ctx context.Context, fqdn string, addresses []netip.Prefix) error { var ips []string for _, addr := range addresses { ips = append(ips, addr.Addr().String()) } deviceIPs, err := json.Marshal(ips) if err != nil { return err } s := &kubeapi.Secret{ Data: map[string][]byte{ kubetypes.KeyDeviceFQDN: []byte(fqdn), kubetypes.KeyDeviceIPs: deviceIPs, }, } return kc.StrategicMergePatchSecret(ctx, secretName, s, "tailscale-container") } // deleteAuthKey deletes the 'authkey' field of the given kube // secret. No-op if there is no authkey in the secret. func (kc *kubeClient) deleteAuthKey(ctx context.Context) error { // m is a JSON Patch data structure, see https://jsonpatch.com/ or RFC 6902. m := []kubeclient.JSONPatch{ { Op: "remove", Path: "/data/authkey", }, } if err := kc.JSONPatchResource(ctx, kc.stateSecret, kubeclient.TypeSecrets, m); err != nil { if s, ok := err.(*kubeapi.Status); ok && s.Code == http.StatusUnprocessableEntity { // This is kubernetes-ese for "the field you asked to // delete already doesn't exist", aka no-op. return nil } return err } return nil } // storeCapVer stores the current capability version of tailscale and, if provided, UID of the Pod in the tailscale // state Secret. This can be used to observe the current capability version of tailscaled running in this container. func (kc *kubeClient) storeCapVer(ctx context.Context, podUID string) error { capVerS := fmt.Sprintf("%d", tailcfg.CurrentCapabilityVersion) if podUID != "" { capVerS += fmt.Sprintf(":%s", podUID) } s := &kubeapi.Secret{ Data: map[string][]byte{ kubetypes.KeyCapVer: []byte(capVerS), }, } return kc.StrategicMergePatchSecret(ctx, kc.stateSecret, s, "tailscale-container") }