Skip to content

Commit 70cd3f2

Browse files
committed
Automatically allow egress IPs on ManagedSeeds
Signed-off-by: Justin Lamp <[email protected]>
1 parent a2359a5 commit 70cd3f2

File tree

5 files changed

+288
-1
lines changed

5 files changed

+288
-1
lines changed

charts/gardener-extension-acl/templates/rbac.yaml

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,16 @@ rules:
1818
- delete
1919
resources:
2020
- envoyfilters
21+
- apiGroups:
22+
- ""
23+
resources:
24+
- services
25+
resourceNames:
26+
- istio-ingressgateway
27+
verbs:
28+
- get
29+
- list
30+
- watch
2131
- apiGroups:
2232
- extensions.gardener.cloud
2333
resources:
@@ -144,6 +154,23 @@ rules:
144154
- watch
145155
---
146156
apiVersion: rbac.authorization.k8s.io/v1
157+
kind: Role
158+
metadata:
159+
labels:
160+
{{ include "labels" . | indent 4 }}
161+
name: {{ include "name" . }}
162+
namespace: kube-system
163+
rules:
164+
- apiGroups:
165+
- ""
166+
resources:
167+
- configmaps
168+
resourceNames:
169+
- shoot-info
170+
verbs:
171+
- get
172+
---
173+
apiVersion: rbac.authorization.k8s.io/v1
147174
kind: ClusterRoleBinding
148175
metadata:
149176
name: {{ include "name" . }}
@@ -157,3 +184,19 @@ subjects:
157184
- kind: ServiceAccount
158185
name: {{ include "name" . }}
159186
namespace: {{ .Release.Namespace }}
187+
---
188+
apiVersion: rbac.authorization.k8s.io/v1
189+
kind: RoleBinding
190+
metadata:
191+
name: {{ include "name" . }}
192+
namespace: kube-system
193+
labels:
194+
{{ include "labels" . | indent 4 }}
195+
roleRef:
196+
apiGroup: rbac.authorization.k8s.io
197+
kind: Role
198+
name: {{ include "name" . }}
199+
subjects:
200+
- kind: ServiceAccount
201+
name: {{ include "name" . }}
202+
namespace: {{ .Release.Namespace }}

deploy/extension/base/controller-registration.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ kind: ControllerDeployment
44
metadata:
55
name: acl
66
helm:
7-
rawChart: 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
7+
rawChart: H4sIAAAAAAAAA+0ba2/jNnI/61fwvFd0t6jkR2KnNbBA3SS3DZAXkm0Oh6IIaIm22UiiSlLOeh/3229IyrKsR2Q7Wee29XywJXI4HHIeHA6pMeYeCQm3yXtJQkFZaGPXb754SmgBHHS7+h8g/6+f23v77U630+up8vZ+u91+gbpPykUFxEJijtALzph8CK+u/iuFcbn8nQnxAzoOGSeP70MJuLe/Xyl/EHtO/r3Ofu8Faj2+63r4m8v/JbrEUhIeCiQZMhJH9xMSomFMfY+GYxRh9w6PiXCsl+jdhAok4ihiXMIDaImPxj4bogBLdwLY3yNOfCzplEA7OcmU49ADAiEZQy0L0auIkxF9Tzx0TwHvH68ddBH6M8RC3VKxhCLCkU9D4ljO0fXttQTegMQhCwIgcHN4jTzKheWMqWzqX8O+5Qw/8Kb+nRdMxk31M38V07C5IDSE8cURGlGfCOs7R9xH8DvEd/ArA3j+L6DeYE5ZLNDJ0TF0GHH2B3Gl5VCP4KbBgyLLmQqXeaRpPbdUV4cK+z+cYC6dGQ78J+ijzv47rYO8/bf2ujv73wbgiN4QruTeR9O2haMofW20nVbD8ohwOY2kLhqgX2BdQK7SDjRiHMkJQW8TFUKDw1OUqpFjhTggfVSuYNZ03kvLgW6+IoP5i0GF/UsSRODGiXiKSHD9+K/XBpewi/+2ALXyv4U1HtZh4cho07Wgxv+3O52c/++09vf2dv5/G/Dxo408CMQg6mooh91A9ufPVoXTVsgk9DSKlW3p4yHxhQOrh3NHZoaGfomHEMcR0COHsqaiv0SjgsQU+3HCyMePiIauH3spew5KGj7ASLFtnkFFpY8qMJL+dU/FUdAQNCZ0iW7uXBGfYEGcc2DuQc5oADG0YQwhVUFH6I6G3olADSE5hMjQ443qGXpRuCjFrCgGdomiMsHiUsfSQGiCO91eP0fJkXi8aBZBX3KEGt+In74ReUxOIiYoBNqzh0jonksI9jcmCDOWmbzPn5/bLP42UOv/XRaO6DjAka3lNoV9D+M2g/jtnlNJVtkj1MX/+73c/h8eDnb+fyuQeKIl27zRMr6Yi1hZpm3bVm6roJxXH/bQSj3OcGQFRGIPS9wHmzahf7nzLtejpJGIcJln1cXGXRg/3S/x7or8JygEfZZoX2HP2dE9ittlpe2jT4rIgyNfJvdXdE+19u+RyGezACZh43RAjf13u3v5+K/d7u32/1uBvGFDvCOaqXUfpcJf2bzXNmQEMKHjiY2nmEIh9amc2WbZgfBBsJi7YJ9zRXVcn8VeU84iIA9YkjPfJ3wlfyAi4qoOOZlSNdxfqFCRySkNqOyjlq6JfOpiYThPXENSeMhiIKR5FzAk5SkM9zrHebqaX+oZAnP7Sghk5lYBDkMmdZpUzItW9NMoAXdC3DsRB5nle2HgpQ54SZ6vdEyH/um8S/h0fgYJXqqEbmOliKDxWg/axKPAx4K3TLhnCrJ6oAAC7XvGQf/GBZkz24MZQdj32T3xVmvBQWg0IDYouSAcmFy0rxHVD3Me52qjACaGwShnhz4W4nw5wyVmAuRq/9hqJciqQ+qSgesq1Tl/2Gq02ECfMWwXeDofdp2xGdCSWMZKNhxFtMvY9y8ZaPRsSctzddlmmI8zArKRbQf4vTJRN+YcpsrmRL2oBPqbDMWFdernBPl6FroiS13RmxDsy4nW2vVpZxrX9eNRgYc+sTPNs1ST6sNFLajDH4yGqPF9I0/LnCbYLCJc26q9MNsqTk2Ti3mLQdogTxs8pqcWZeVmtMl6byqiqRzmEhWdp7XVOcybpn4WaXXOn2DPo6o59gfGOA6pxwuzt8CyExuyXYWXHW4FpfJpLDiDAmOpQScJ4zxLqfEl9VlWHmpb0jMJp1klN3Z3ejw4Or66PT49Pnx3cnF+ez44O76+HBwep5gI6XzBvzgL+plChEaU+N4VGS2XJuXKl/ZTx++kS2bVPNQ5/Dm/J2eDt8c3wOzF1e3FzfHVv69O3hV47aNEHRYhcbM0Rl5DUOlKncVJC/W6KNl/gGZJi09IchosPG+7VSMqQcDIlRcG24J1LTvDWjEvOZ2CxxiTY+FiH5vDixH2Bclgujgy0QYlYllGHmdRH/02OD39PVMOK8lAnLPwCiLBPnAck3zlr0ItLz0IaDv5qrecxVGxDgbisiC65EwdPy5zYUKcK7N+HZERjn25qXpMmR8H5EwtQ6Ko5DWhQYarQFEwultUoeyYwSup49zcPBVEudYwzCAKS+Oq3LvzrWp2mjfaqaZ6YoRyxjygsd9pZQaVjPK5w/taqN3/RQwcuuCxPgEcxt6YrL0RrL3/sZ/P/+y1Dnb3P7YCiQGOJXqlIv6yLc9r1C5LAUU6TFzsFS+Zd5Qqys9aUb7cpnGd3R7Ek7+GyebSN+RFPKwd76N3eV+FG6i1fz7E7iMvgtTmf7r5+18HB+1d/mcrkLdqLW4cywnscj/owMm5+0Gfey1Svj7MGeFXzCfrGPg6pstjX63zNgLWdOSkF307u9OnApgDvqAcVuZhgqCcjvr3oVo/3Cur1U9R+hRHwDLRjy4EKsmjB9auHzNBqyqHbQGbQXQGQxZFjlKzyWeoioRcM2/C9BYKtbHlnnml4YhjAbGSK2NottKgHsPLAjX32gRzkPFqDJTOaoGrqhRekakAhxBveWlpDRMZ2d2XyXbBWiLaAmuNRpGJdB3aUAjwmpGDsZ0SXQBVYMG8UJ8R611zRaeZoRYGWJzwKhOuVEnOfCLyBUMwSDA0U77AyFWtyey60mjABokTKRrmDYLx0Lx8YcVQafAydhanIbVcLLredEJcBv6Bhg+LUIdJOUkkHT6S4Lxch2CmbuUcVIaZzJDnc1RlOl5AhbIbTsYwi/xhPoNYpc7C8T0ZThi7M7u72DRa3X9tKpvylSjH4hjo3ePZip5k/ZW4sASvs8auE5GrGzBJertybS4z3/SooEKfBEhO2rD4lSzjj4tMfjYu6osFKNBFktqbT8MDHAJWMXSq4Qe2KOqOuZ5p0/h66TRhLflV7qg2VLoNZrdCm7Yy7f838/3c0X4Ravd/yRkWNrOw0U6wLv+z127n8j8dKNzt/7YBlRd7ctr/rJkcMG6mM8/LTL1jdyTN6z/3RH6lUGv/0wg/9juguvvfe/n7f+2Dbu9gZ//bgNwBjJI2CVWe1CsLD5QhqhM1Ffbm4wJAkhTqLpk3SNAIf2q/YXK6JUzPg8vs5YXlMpPFTW9Y6EKaPU1Kq8xFjW+/+9ZKj71omJxmZ8+O3CjWrHLyZ0w5zFijmiNnQcKBdoiKtFnjgYHkm2WO9NS1oYDx2UYsmKabcJG0XM5vIwRGBEF7etpddqVMlReuldWdwQGC2ZdlhWhKzLFb5rxfMZ5FdhZ4X00+fttQ4f+nZkaf5gPQWv/f3St8/707/9sOmItj2lnOP9Too/HE5cq3w9S4d1Sau3QV3wQp0x/3kQ4WpFW4YHYyOmfyEtyJMnYre8zWRx1VkMkXKFcERBKXrL1ro9sKGlbW2TV6+2e0YVlg7AovWazSewZlPr/ovTVtIG0tO1JFutbhNK6ISRoBE5m7XQoxd/kMuoDCyjtfixspmQts6SqVJ2QV76b10W+/W1b5hStT9xKV3ahQN99fovm1+L5+XlymwBD5EV2GkJnLq4xqTKSMRL/ZFO7kHvMPVP7kkamDP8ScOC4LFuWLJ0fckeat+kg/IZ65fZf0k1U+TsaOPg5R7RwSt9pOoofJpU5FbplNrYGNltNxfgShzBW1b3JKycfMjZ3T38EOdrCDHexgBzvYwQ7+B6z5p1QAUAAA
88
values:
99
image:
1010
tag: latest

pkg/controller/actuator.go

Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ import (
3636
"github.com/pkg/errors"
3737
istionetworkv1beta1 "istio.io/client-go/pkg/apis/networking/v1beta1"
3838
appsv1 "k8s.io/api/apps/v1"
39+
corev1 "k8s.io/api/core/v1"
3940
"k8s.io/apimachinery/pkg/runtime"
4041
"k8s.io/apimachinery/pkg/runtime/serializer"
4142
"k8s.io/client-go/rest"
@@ -48,6 +49,8 @@ import (
4849
"github.com/stackitcloud/gardener-extension-acl/pkg/extensionspec"
4950
"github.com/stackitcloud/gardener-extension-acl/pkg/helper"
5051
"github.com/stackitcloud/gardener-extension-acl/pkg/imagevector"
52+
53+
apierrors "k8s.io/apimachinery/pkg/api/errors"
5154
)
5255

5356
const (
@@ -87,13 +90,15 @@ func NewActuator(mgr manager.Manager, cfg config.Config) extension.Actuator {
8790
return &actuator{
8891
extensionConfig: cfg,
8992
client: mgr.GetClient(),
93+
reader: mgr.GetAPIReader(),
9094
config: mgr.GetConfig(),
9195
decoder: serializer.NewCodecFactory(mgr.GetScheme(), serializer.EnableStrict).UniversalDecoder(),
9296
}
9397
}
9498

9599
type actuator struct {
96100
client client.Client
101+
reader client.Reader
97102
config *rest.Config
98103
decoder runtime.Decoder
99104
extensionConfig config.Config
@@ -147,6 +152,18 @@ func (a *actuator) Reconcile(ctx context.Context, log logr.Logger, ex *extension
147152

148153
alwaysAllowedCIDRs = append(alwaysAllowedCIDRs, helper.GetSeedSpecificAllowedCIDRs(cluster.Seed)...)
149154

155+
// In casese where the istio-ingressgateway is exposed with the Proxy IPMode some
156+
// CNIs (like cilium for example) do not hairpin NAT the traffic to it, which
157+
// will result in the destination IP being set to the egressIP of the cluster.
158+
// In that case the AlertManager ApiServerNoteReachable check will fail.
159+
if a.usesProxyTypeLBService(ctx, log, istioLabels) {
160+
egressCIDRs, err := a.getSeedEgressIPOnManagedSeeds(ctx)
161+
if err != nil {
162+
return err
163+
}
164+
alwaysAllowedCIDRs = append(alwaysAllowedCIDRs, egressCIDRs...)
165+
}
166+
150167
if len(a.extensionConfig.AdditionalAllowedCIDRs) >= 1 {
151168
alwaysAllowedCIDRs = append(alwaysAllowedCIDRs, a.extensionConfig.AdditionalAllowedCIDRs...)
152169
}
@@ -446,3 +463,68 @@ func (a *actuator) findDefaultIstioLabels(
446463

447464
return gw.Spec.Selector, nil
448465
}
466+
467+
// usesProxyTypeLBService checks the `istio-ingressgateway` LoadBalancer Service
468+
// selected by its labels whether it is exposing the service with the Proxy IPMode
469+
func (a *actuator) usesProxyTypeLBService(
470+
ctx context.Context,
471+
log logr.Logger,
472+
labels map[string]string,
473+
) bool {
474+
svcs := corev1.ServiceList{}
475+
labelsSelector := client.MatchingLabels(labels)
476+
fieldSelector := client.MatchingFields{"metadata.name": v1beta1constants.DefaultSNIIngressServiceName}
477+
err := a.reader.List(ctx, &svcs, labelsSelector, fieldSelector)
478+
if err != nil {
479+
log.Error(err, "unable to fetch Services for Istio Ingressgateways", "labels", labels)
480+
return false
481+
}
482+
483+
switch len(svcs.Items) {
484+
case 1:
485+
for _, ing := range svcs.Items[0].Status.LoadBalancer.Ingress {
486+
if m := ing.IPMode; m != nil && *m == corev1.LoadBalancerIPModeProxy {
487+
return true
488+
}
489+
}
490+
case 0:
491+
log.Error(nil, "unable to find Istio Ingressgateway service", "name", v1beta1constants.DefaultSNIIngressServiceName, "labels", labels)
492+
default:
493+
log.Error(nil, "found more than one IngressGateway service", "name", v1beta1constants.DefaultSNIIngressServiceName, "labels", labels)
494+
}
495+
496+
return false
497+
}
498+
499+
// getSeedEgressIPOnManagedSeeds returns the egressIP CIDRs of the ManagedSeed, if the
500+
// Seed is not a shoot, it will return an empty list
501+
func (a *actuator) getSeedEgressIPOnManagedSeeds(ctx context.Context) ([]string, error) {
502+
cm := corev1.ConfigMap{}
503+
if err := a.client.Get(ctx,
504+
client.ObjectKey{
505+
Name: v1beta1constants.ConfigMapNameShootInfo,
506+
Namespace: "kube-system",
507+
},
508+
&cm); err != nil {
509+
if apierrors.IsNotFound(err) {
510+
return []string{}, nil
511+
}
512+
return nil, err
513+
}
514+
515+
cidrsStr, ok := cm.Data["egressCIDRs"]
516+
if !ok {
517+
return nil, errors.New("unable to get egress CIDRs from shoot-info ConfigMap")
518+
}
519+
520+
var cidrs []string
521+
for i := range strings.SplitSeq(cidrsStr, ",") {
522+
_, _, err := net.ParseCIDR(i)
523+
if err != nil {
524+
return nil, err
525+
}
526+
cidrs = append(cidrs, i)
527+
}
528+
529+
return cidrs, nil
530+
}

pkg/controller/actuator_test.go

Lines changed: 104 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,15 @@ import (
77
extensionsv1alpha1 "github.com/gardener/gardener/pkg/apis/extensions/v1alpha1"
88
"github.com/gardener/gardener/pkg/apis/resources/v1alpha1"
99
. "github.com/gardener/gardener/pkg/utils/test/matchers"
10+
"github.com/go-logr/logr"
1011
. "github.com/onsi/ginkgo/v2"
1112
. "github.com/onsi/gomega"
1213
istionetworkingv1beta1 "istio.io/client-go/pkg/apis/networking/v1beta1"
1314
corev1 "k8s.io/api/core/v1"
1415
apierrors "k8s.io/apimachinery/pkg/api/errors"
1516
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
1617
"k8s.io/apimachinery/pkg/types"
18+
"k8s.io/utils/ptr"
1719

1820
"github.com/stackitcloud/gardener-extension-acl/pkg/controller/config"
1921
"github.com/stackitcloud/gardener-extension-acl/pkg/envoyfilters"
@@ -26,11 +28,13 @@ var _ = Describe("actuator test", func() {
2628
shootNamespace1, shootNamespace2 string
2729
istioNamespace1, istioNamespace2 string
2830
istioNamespace1Selector, istioNamespace2Selector map[string]string
31+
istioIngressGatewayServiceName string
2932
)
3033

3134
BeforeEach(func() {
3235
shootNamespace1 = createNewShootNamespace()
3336
istioNamespace1 = createNewIstioNamespace()
37+
istioIngressGatewayServiceName = "istio-ingressgateway"
3438
istioNamespace1Selector = map[string]string{
3539
"app": "istio-ingressgateway",
3640
"istio": istioNamespace1,
@@ -41,6 +45,24 @@ var _ = Describe("actuator test", func() {
4145
createNewIstioDeployment(istioNamespace1, istioNamespace1Selector)
4246
createNewCluster(shootNamespace1)
4347
createNewInfrastructure(shootNamespace1)
48+
createNewService(
49+
istioIngressGatewayServiceName,
50+
istioNamespace1,
51+
istioNamespace1Selector,
52+
corev1.ServiceTypeLoadBalancer,
53+
)
54+
updateServiceStatus(
55+
istioIngressGatewayServiceName,
56+
istioNamespace1,
57+
corev1.ServiceStatus{
58+
LoadBalancer: corev1.LoadBalancerStatus{
59+
Ingress: []corev1.LoadBalancerIngress{{
60+
IP: "1.1.1.1",
61+
IPMode: ptr.To(corev1.LoadBalancerIPModeProxy),
62+
}},
63+
},
64+
},
65+
)
4466

4567
a = getNewActuator()
4668
})
@@ -222,6 +244,87 @@ var _ = Describe("actuator test", func() {
222244
})
223245
})
224246

247+
Describe("reconciliation of an extension object running on a managedSeed", func() {
248+
AfterEach(func() {
249+
deleteShootInfo()
250+
})
251+
252+
It("should not get the egressIPs if the LoadBalancer IPMode is not set to Proxy", func() {
253+
updateServiceStatus(
254+
istioIngressGatewayServiceName,
255+
istioNamespace1,
256+
corev1.ServiceStatus{},
257+
)
258+
Expect(a.usesProxyTypeLBService(ctx, logr.Logger{}, istioNamespace1Selector)).To(BeFalse())
259+
260+
updateServiceStatus(
261+
istioIngressGatewayServiceName,
262+
istioNamespace1,
263+
corev1.ServiceStatus{
264+
LoadBalancer: corev1.LoadBalancerStatus{
265+
Ingress: []corev1.LoadBalancerIngress{{
266+
IP: "1.1.1.1",
267+
IPMode: ptr.To(corev1.LoadBalancerIPModeVIP),
268+
}},
269+
},
270+
},
271+
)
272+
Expect(a.usesProxyTypeLBService(ctx, logr.Logger{}, istioNamespace1Selector)).To(BeFalse())
273+
})
274+
275+
It("should get the egressIPs if the LoadBalancer IPMode is set to Proxy", func() {
276+
Expect(a.usesProxyTypeLBService(ctx, logr.Logger{}, istioNamespace1Selector)).To(BeTrue())
277+
})
278+
279+
It("should return an empty slice of egressIPs if no shoot-info ConfigMap exists", func() {
280+
cidrs, err := a.getSeedEgressIPOnManagedSeeds(ctx)
281+
Expect(err).ToNot(HaveOccurred())
282+
Expect(cidrs).To(BeEmpty())
283+
})
284+
285+
It("should fail to return egressIPs if the shoot-info ConfigMap contains invalid CIDRs", func() {
286+
createShootInfo([]string{"1.1.1.1", "1.1.1.2/32"})
287+
288+
_, err := a.getSeedEgressIPOnManagedSeeds(ctx)
289+
Expect(err).To(HaveOccurred())
290+
})
291+
292+
It("should return the egressIP CIDRs of the shoot-info ConfigMap", func() {
293+
c := []string{"1.1.1.1/32", "1.1.1.2/32"}
294+
createShootInfo(c)
295+
296+
cidrs, err := a.getSeedEgressIPOnManagedSeeds(ctx)
297+
Expect(err).ToNot(HaveOccurred())
298+
Expect(cidrs).To(BeEquivalentTo(c))
299+
})
300+
301+
It("should create ACLs including egressIPs of managedSeed", func() {
302+
createShootInfo([]string{"1.1.1.1/32", "1.1.1.2/32"})
303+
304+
extSpec := extensionspec.ExtensionSpec{
305+
Rule: &envoyfilters.ACLRule{
306+
Cidrs: []string{"1.2.3.4/24"},
307+
Action: "ALLOW",
308+
Type: "remote_ip",
309+
},
310+
}
311+
extSpecJSON, err := json.Marshal(extSpec)
312+
Expect(err).NotTo(HaveOccurred())
313+
ext := createNewExtension(shootNamespace1, extSpecJSON)
314+
Expect(ext).To(Not(BeNil()))
315+
316+
Expect(a.Reconcile(ctx, logger, ext)).To(Succeed())
317+
318+
mr := &v1alpha1.ManagedResource{}
319+
Expect(k8sClient.Get(ctx, types.NamespacedName{Name: ResourceNameSeed, Namespace: shootNamespace1}, mr)).To(Succeed())
320+
secret := &corev1.Secret{}
321+
Expect(k8sClient.Get(ctx, types.NamespacedName{Name: mr.Spec.SecretRefs[0].Name, Namespace: shootNamespace1}, secret)).To(Succeed())
322+
Expect(secret.Data["seed"]).To(ContainSubstring("1.2.3.4"))
323+
Expect(secret.Data["seed"]).To(ContainSubstring("1.1.1.1"))
324+
Expect(secret.Data["seed"]).To(ContainSubstring("1.1.1.2"))
325+
})
326+
})
327+
225328
Describe("a shoot switching the istio namespace (e.g. when being migrated to HA)", func() {
226329
It("should modify the EnvoyFilter objects accordingly", func() {
227330
By("1) creating the EnvoyFilter object correctly in the ORIGINAL namespace")
@@ -453,6 +556,7 @@ var _ = Describe("actuator unit test", func() {
453556
func getNewActuator() *actuator {
454557
return &actuator{
455558
client: k8sClient,
559+
reader: k8sClient,
456560
config: cfg,
457561
extensionConfig: config.Config{
458562
ChartPath: "../../charts",

0 commit comments

Comments
 (0)