8e5b17cf13
Signed-off-by: Mrunal Patel <mrunalp@gmail.com>
619 lines
23 KiB
Go
619 lines
23 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package genericapiserver
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"encoding/pem"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"net"
|
|
"net/http"
|
|
goruntime "runtime"
|
|
"sort"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/emicklei/go-restful/swagger"
|
|
"github.com/go-openapi/spec"
|
|
"github.com/pborman/uuid"
|
|
"gopkg.in/natefinch/lumberjack.v2"
|
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
openapicommon "k8s.io/apimachinery/pkg/openapi"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
|
"k8s.io/apiserver/pkg/authentication/authenticator"
|
|
authenticatorunion "k8s.io/apiserver/pkg/authentication/request/union"
|
|
"k8s.io/apiserver/pkg/authentication/user"
|
|
"k8s.io/apiserver/pkg/authorization/authorizer"
|
|
authorizerunion "k8s.io/apiserver/pkg/authorization/union"
|
|
"k8s.io/apiserver/pkg/healthz"
|
|
apirequest "k8s.io/apiserver/pkg/request"
|
|
"k8s.io/kubernetes/pkg/admission"
|
|
"k8s.io/kubernetes/pkg/api"
|
|
authhandlers "k8s.io/kubernetes/pkg/auth/handlers"
|
|
"k8s.io/kubernetes/pkg/client/restclient"
|
|
genericapifilters "k8s.io/kubernetes/pkg/genericapiserver/api/filters"
|
|
apiopenapi "k8s.io/kubernetes/pkg/genericapiserver/api/openapi"
|
|
genericauthenticator "k8s.io/kubernetes/pkg/genericapiserver/authenticator"
|
|
genericauthorizer "k8s.io/kubernetes/pkg/genericapiserver/authorizer"
|
|
genericfilters "k8s.io/kubernetes/pkg/genericapiserver/filters"
|
|
"k8s.io/kubernetes/pkg/genericapiserver/mux"
|
|
"k8s.io/kubernetes/pkg/genericapiserver/options"
|
|
"k8s.io/kubernetes/pkg/genericapiserver/routes"
|
|
certutil "k8s.io/kubernetes/pkg/util/cert"
|
|
"k8s.io/kubernetes/pkg/version"
|
|
)
|
|
|
|
const (
|
|
// DefaultLegacyAPIPrefix is where the the legacy APIs will be located.
|
|
DefaultLegacyAPIPrefix = "/api"
|
|
|
|
// APIGroupPrefix is where non-legacy API group will be located.
|
|
APIGroupPrefix = "/apis"
|
|
)
|
|
|
|
// Config is a structure used to configure a GenericAPIServer.
|
|
// It's members are sorted rougly in order of importance for composers.
|
|
type Config struct {
|
|
// SecureServingInfo is required to serve https
|
|
SecureServingInfo *SecureServingInfo
|
|
|
|
// LoopbackClientConfig is a config for a privileged loopback connection to the API server
|
|
// This is required for proper functioning of the PostStartHooks on a GenericAPIServer
|
|
LoopbackClientConfig *restclient.Config
|
|
// Authenticator determines which subject is making the request
|
|
Authenticator authenticator.Request
|
|
// Authorizer determines whether the subject is allowed to make the request based only
|
|
// on the RequestURI
|
|
Authorizer authorizer.Authorizer
|
|
// AdmissionControl performs deep inspection of a given request (including content)
|
|
// to set values and determine whether its allowed
|
|
AdmissionControl admission.Interface
|
|
CorsAllowedOriginList []string
|
|
|
|
EnableSwaggerUI bool
|
|
EnableIndex bool
|
|
EnableProfiling bool
|
|
// Requires generic profiling enabled
|
|
EnableContentionProfiling bool
|
|
EnableGarbageCollection bool
|
|
EnableMetrics bool
|
|
|
|
// Version will enable the /version endpoint if non-nil
|
|
Version *version.Info
|
|
// AuditWriter is the destination for audit logs. If nil, they will not be written.
|
|
AuditWriter io.Writer
|
|
// SupportsBasicAuth indicates that's at least one Authenticator supports basic auth
|
|
// If this is true, a basic auth challenge is returned on authentication failure
|
|
// TODO(roberthbailey): Remove once the server no longer supports http basic auth.
|
|
SupportsBasicAuth bool
|
|
// ExternalAddress is the host name to use for external (public internet) facing URLs (e.g. Swagger)
|
|
// Will default to a value based on secure serving info and available ipv4 IPs.
|
|
ExternalAddress string
|
|
|
|
//===========================================================================
|
|
// Fields you probably don't care about changing
|
|
//===========================================================================
|
|
|
|
// BuildHandlerChainsFunc allows you to build custom handler chains by decorating the apiHandler.
|
|
BuildHandlerChainsFunc func(apiHandler http.Handler, c *Config) (secure, insecure http.Handler)
|
|
// DiscoveryAddresses is used to build the IPs pass to discovery. If nil, the ExternalAddress is
|
|
// always reported
|
|
DiscoveryAddresses DiscoveryAddresses
|
|
// The default set of healthz checks. There might be more added via AddHealthzChecks dynamically.
|
|
HealthzChecks []healthz.HealthzChecker
|
|
// LegacyAPIGroupPrefixes is used to set up URL parsing for authorization and for validating requests
|
|
// to InstallLegacyAPIGroup. New API servers don't generally have legacy groups at all.
|
|
LegacyAPIGroupPrefixes sets.String
|
|
// RequestContextMapper maps requests to contexts. Exported so downstream consumers can provider their own mappers
|
|
// TODO confirm that anyone downstream actually uses this and doesn't just need an accessor
|
|
RequestContextMapper apirequest.RequestContextMapper
|
|
// Serializer is required and provides the interface for serializing and converting objects to and from the wire
|
|
// The default (api.Codecs) usually works fine.
|
|
Serializer runtime.NegotiatedSerializer
|
|
// OpenAPIConfig will be used in generating OpenAPI spec. This is nil by default. Use DefaultOpenAPIConfig for "working" defaults.
|
|
OpenAPIConfig *openapicommon.Config
|
|
// SwaggerConfig will be used in generating Swagger spec. This is nil by default. Use DefaultSwaggerConfig for "working" defaults.
|
|
SwaggerConfig *swagger.Config
|
|
|
|
// If specified, requests will be allocated a random timeout between this value, and twice this value.
|
|
// Note that it is up to the request handlers to ignore or honor this timeout. In seconds.
|
|
MinRequestTimeout int
|
|
// MaxRequestsInFlight is the maximum number of parallel non-long-running requests. Every further
|
|
// request has to wait. Applies only to non-mutating requests.
|
|
MaxRequestsInFlight int
|
|
// MaxMutatingRequestsInFlight is the maximum number of parallel mutating requests. Every further
|
|
// request has to wait.
|
|
MaxMutatingRequestsInFlight int
|
|
// Predicate which is true for paths of long-running http requests
|
|
LongRunningFunc genericfilters.LongRunningRequestCheck
|
|
|
|
// InsecureServingInfo is required to serve http. HTTP does NOT include authentication or authorization.
|
|
// You shouldn't be using this. It makes sig-auth sad.
|
|
InsecureServingInfo *ServingInfo
|
|
|
|
//===========================================================================
|
|
// values below here are targets for removal
|
|
//===========================================================================
|
|
|
|
// The port on PublicAddress where a read-write server will be installed.
|
|
// Defaults to 6443 if not set.
|
|
ReadWritePort int
|
|
// PublicAddress is the IP address where members of the cluster (kubelet,
|
|
// kube-proxy, services, etc.) can reach the GenericAPIServer.
|
|
// If nil or 0.0.0.0, the host's default interface will be used.
|
|
PublicAddress net.IP
|
|
}
|
|
|
|
type ServingInfo struct {
|
|
// BindAddress is the ip:port to serve on
|
|
BindAddress string
|
|
// BindNetwork is the type of network to bind to - defaults to "tcp", accepts "tcp",
|
|
// "tcp4", and "tcp6".
|
|
BindNetwork string
|
|
}
|
|
|
|
type SecureServingInfo struct {
|
|
ServingInfo
|
|
|
|
// Cert is the main server cert which is used if SNI does not match. Cert must be non-nil and is
|
|
// allowed to be in SNICerts.
|
|
Cert *tls.Certificate
|
|
|
|
// CACert is an optional certificate authority used for the loopback connection of the Admission controllers.
|
|
// If this is nil, the certificate authority is extracted from Cert or a matching SNI certificate.
|
|
CACert *tls.Certificate
|
|
|
|
// SNICerts are the TLS certificates by name used for SNI.
|
|
SNICerts map[string]*tls.Certificate
|
|
|
|
// ClientCA is the certificate bundle for all the signers that you'll recognize for incoming client certificates
|
|
ClientCA *x509.CertPool
|
|
}
|
|
|
|
// NewConfig returns a Config struct with the default values
|
|
func NewConfig() *Config {
|
|
config := &Config{
|
|
Serializer: api.Codecs,
|
|
ReadWritePort: 6443,
|
|
RequestContextMapper: apirequest.NewRequestContextMapper(),
|
|
BuildHandlerChainsFunc: DefaultBuildHandlerChain,
|
|
LegacyAPIGroupPrefixes: sets.NewString(DefaultLegacyAPIPrefix),
|
|
HealthzChecks: []healthz.HealthzChecker{healthz.PingHealthz},
|
|
EnableIndex: true,
|
|
|
|
// Default to treating watch as a long-running operation
|
|
// Generic API servers have no inherent long-running subresources
|
|
LongRunningFunc: genericfilters.BasicLongRunningRequestCheck(sets.NewString("watch"), sets.NewString()),
|
|
}
|
|
|
|
// this keeps the defaults in sync
|
|
defaultOptions := options.NewServerRunOptions()
|
|
// unset fields that can be overridden to avoid setting values so that we won't end up with lingering values.
|
|
// TODO we probably want to run the defaults the other way. A default here drives it in the CLI flags
|
|
defaultOptions.AuditLogPath = ""
|
|
return config.ApplyOptions(defaultOptions)
|
|
}
|
|
|
|
func DefaultOpenAPIConfig(definitions *openapicommon.OpenAPIDefinitions) *openapicommon.Config {
|
|
return &openapicommon.Config{
|
|
ProtocolList: []string{"https"},
|
|
IgnorePrefixes: []string{"/swaggerapi"},
|
|
Info: &spec.Info{
|
|
InfoProps: spec.InfoProps{
|
|
Title: "Generic API Server",
|
|
Version: "unversioned",
|
|
},
|
|
},
|
|
DefaultResponse: &spec.Response{
|
|
ResponseProps: spec.ResponseProps{
|
|
Description: "Default Response.",
|
|
},
|
|
},
|
|
GetOperationIDAndTags: apiopenapi.GetOperationIDAndTags,
|
|
Definitions: definitions,
|
|
}
|
|
}
|
|
|
|
// DefaultSwaggerConfig returns a default configuration without WebServiceURL and
|
|
// WebServices set.
|
|
func DefaultSwaggerConfig() *swagger.Config {
|
|
return &swagger.Config{
|
|
ApiPath: "/swaggerapi/",
|
|
SwaggerPath: "/swaggerui/",
|
|
SwaggerFilePath: "/swagger-ui/",
|
|
SchemaFormatHandler: func(typeName string) string {
|
|
switch typeName {
|
|
case "metav1.Time", "*metav1.Time":
|
|
return "date-time"
|
|
}
|
|
return ""
|
|
},
|
|
}
|
|
}
|
|
|
|
func (c *Config) ApplySecureServingOptions(secureServing *options.SecureServingOptions) (*Config, error) {
|
|
if secureServing == nil || secureServing.ServingOptions.BindPort <= 0 {
|
|
return c, nil
|
|
}
|
|
|
|
secureServingInfo := &SecureServingInfo{
|
|
ServingInfo: ServingInfo{
|
|
BindAddress: net.JoinHostPort(secureServing.ServingOptions.BindAddress.String(), strconv.Itoa(secureServing.ServingOptions.BindPort)),
|
|
},
|
|
}
|
|
|
|
serverCertFile, serverKeyFile := secureServing.ServerCert.CertKey.CertFile, secureServing.ServerCert.CertKey.KeyFile
|
|
|
|
// load main cert
|
|
if len(serverCertFile) != 0 || len(serverKeyFile) != 0 {
|
|
tlsCert, err := tls.LoadX509KeyPair(serverCertFile, serverKeyFile)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to load server certificate: %v", err)
|
|
}
|
|
secureServingInfo.Cert = &tlsCert
|
|
}
|
|
|
|
// optionally load CA cert
|
|
if len(secureServing.ServerCert.CACertFile) != 0 {
|
|
pemData, err := ioutil.ReadFile(secureServing.ServerCert.CACertFile)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to read certificate authority from %q: %v", secureServing.ServerCert.CACertFile, err)
|
|
}
|
|
block, pemData := pem.Decode(pemData)
|
|
if block == nil {
|
|
return nil, fmt.Errorf("no certificate found in certificate authority file %q", secureServing.ServerCert.CACertFile)
|
|
}
|
|
if block.Type != "CERTIFICATE" {
|
|
return nil, fmt.Errorf("expected CERTIFICATE block in certiticate authority file %q, found: %s", secureServing.ServerCert.CACertFile, block.Type)
|
|
}
|
|
secureServingInfo.CACert = &tls.Certificate{
|
|
Certificate: [][]byte{block.Bytes},
|
|
}
|
|
}
|
|
|
|
// load SNI certs
|
|
namedTlsCerts := make([]namedTlsCert, 0, len(secureServing.SNICertKeys))
|
|
for _, nck := range secureServing.SNICertKeys {
|
|
tlsCert, err := tls.LoadX509KeyPair(nck.CertFile, nck.KeyFile)
|
|
namedTlsCerts = append(namedTlsCerts, namedTlsCert{
|
|
tlsCert: tlsCert,
|
|
names: nck.Names,
|
|
})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to load SNI cert and key: %v", err)
|
|
}
|
|
}
|
|
var err error
|
|
secureServingInfo.SNICerts, err = getNamedCertificateMap(namedTlsCerts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
c.SecureServingInfo = secureServingInfo
|
|
c.ReadWritePort = secureServing.ServingOptions.BindPort
|
|
|
|
return c, nil
|
|
}
|
|
|
|
func (c *Config) ApplyInsecureServingOptions(insecureServing *options.ServingOptions) *Config {
|
|
if insecureServing == nil || insecureServing.BindPort <= 0 {
|
|
return c
|
|
}
|
|
|
|
c.InsecureServingInfo = &ServingInfo{
|
|
BindAddress: net.JoinHostPort(insecureServing.BindAddress.String(), strconv.Itoa(insecureServing.BindPort)),
|
|
}
|
|
|
|
return c
|
|
}
|
|
|
|
func (c *Config) ApplyClientCert(clientCAFile string) (*Config, error) {
|
|
if c.SecureServingInfo != nil {
|
|
if len(clientCAFile) > 0 {
|
|
clientCAs, err := certutil.CertsFromFile(clientCAFile)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to load client CA file: %v", err)
|
|
}
|
|
if c.SecureServingInfo.ClientCA == nil {
|
|
c.SecureServingInfo.ClientCA = x509.NewCertPool()
|
|
}
|
|
for _, cert := range clientCAs {
|
|
c.SecureServingInfo.ClientCA.AddCert(cert)
|
|
}
|
|
}
|
|
}
|
|
|
|
return c, nil
|
|
}
|
|
|
|
func (c *Config) ApplyDelegatingAuthenticationOptions(o *options.DelegatingAuthenticationOptions) (*Config, error) {
|
|
if o == nil {
|
|
return c, nil
|
|
}
|
|
|
|
var err error
|
|
c, err = c.ApplyClientCert(o.ClientCert.ClientCA)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to load client CA file: %v", err)
|
|
}
|
|
c, err = c.ApplyClientCert(o.RequestHeader.ClientCAFile)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to load client CA file: %v", err)
|
|
}
|
|
|
|
cfg, err := o.ToAuthenticationConfig()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
authenticator, securityDefinitions, err := cfg.New()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
c.Authenticator = authenticator
|
|
if c.OpenAPIConfig != nil {
|
|
c.OpenAPIConfig.SecurityDefinitions = securityDefinitions
|
|
}
|
|
c.SupportsBasicAuth = false
|
|
|
|
return c, nil
|
|
}
|
|
|
|
func (c *Config) ApplyDelegatingAuthorizationOptions(o *options.DelegatingAuthorizationOptions) (*Config, error) {
|
|
if o == nil {
|
|
return c, nil
|
|
}
|
|
|
|
cfg, err := o.ToAuthorizationConfig()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
authorizer, err := cfg.New()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
c.Authorizer = authorizer
|
|
|
|
return c, nil
|
|
}
|
|
|
|
// ApplyOptions applies the run options to the method receiver and returns self
|
|
func (c *Config) ApplyOptions(options *options.ServerRunOptions) *Config {
|
|
if len(options.AuditLogPath) != 0 {
|
|
c.AuditWriter = &lumberjack.Logger{
|
|
Filename: options.AuditLogPath,
|
|
MaxAge: options.AuditLogMaxAge,
|
|
MaxBackups: options.AuditLogMaxBackups,
|
|
MaxSize: options.AuditLogMaxSize,
|
|
}
|
|
}
|
|
|
|
c.CorsAllowedOriginList = options.CorsAllowedOriginList
|
|
c.EnableGarbageCollection = options.EnableGarbageCollection
|
|
c.EnableProfiling = options.EnableProfiling
|
|
c.EnableContentionProfiling = options.EnableContentionProfiling
|
|
c.EnableSwaggerUI = options.EnableSwaggerUI
|
|
c.ExternalAddress = options.ExternalHost
|
|
c.MaxRequestsInFlight = options.MaxRequestsInFlight
|
|
c.MaxMutatingRequestsInFlight = options.MaxMutatingRequestsInFlight
|
|
c.MinRequestTimeout = options.MinRequestTimeout
|
|
c.PublicAddress = options.AdvertiseAddress
|
|
|
|
return c
|
|
}
|
|
|
|
type completedConfig struct {
|
|
*Config
|
|
}
|
|
|
|
// Complete fills in any fields not set that are required to have valid data and can be derived
|
|
// from other fields. If you're going to `ApplyOptions`, do that first. It's mutating the receiver.
|
|
func (c *Config) Complete() completedConfig {
|
|
if len(c.ExternalAddress) == 0 && c.PublicAddress != nil {
|
|
hostAndPort := c.PublicAddress.String()
|
|
if c.ReadWritePort != 0 {
|
|
hostAndPort = net.JoinHostPort(hostAndPort, strconv.Itoa(c.ReadWritePort))
|
|
}
|
|
c.ExternalAddress = hostAndPort
|
|
}
|
|
if c.OpenAPIConfig != nil && c.OpenAPIConfig.SecurityDefinitions != nil {
|
|
// Setup OpenAPI security: all APIs will have the same authentication for now.
|
|
c.OpenAPIConfig.DefaultSecurity = []map[string][]string{}
|
|
keys := []string{}
|
|
for k := range *c.OpenAPIConfig.SecurityDefinitions {
|
|
keys = append(keys, k)
|
|
}
|
|
sort.Strings(keys)
|
|
for _, k := range keys {
|
|
c.OpenAPIConfig.DefaultSecurity = append(c.OpenAPIConfig.DefaultSecurity, map[string][]string{k: {}})
|
|
}
|
|
if c.OpenAPIConfig.CommonResponses == nil {
|
|
c.OpenAPIConfig.CommonResponses = map[int]spec.Response{}
|
|
}
|
|
if _, exists := c.OpenAPIConfig.CommonResponses[http.StatusUnauthorized]; !exists {
|
|
c.OpenAPIConfig.CommonResponses[http.StatusUnauthorized] = spec.Response{
|
|
ResponseProps: spec.ResponseProps{
|
|
Description: "Unauthorized",
|
|
},
|
|
}
|
|
}
|
|
}
|
|
if c.SwaggerConfig != nil && len(c.SwaggerConfig.WebServicesUrl) == 0 {
|
|
if c.SecureServingInfo != nil {
|
|
c.SwaggerConfig.WebServicesUrl = "https://" + c.ExternalAddress
|
|
} else {
|
|
c.SwaggerConfig.WebServicesUrl = "http://" + c.ExternalAddress
|
|
}
|
|
}
|
|
if c.DiscoveryAddresses == nil {
|
|
c.DiscoveryAddresses = DefaultDiscoveryAddresses{DefaultAddress: c.ExternalAddress}
|
|
}
|
|
|
|
// If the loopbackclientconfig is specified AND it has a token for use against the API server
|
|
// wrap the authenticator and authorizer in loopback authentication logic
|
|
if c.Authenticator != nil && c.Authorizer != nil && c.LoopbackClientConfig != nil && len(c.LoopbackClientConfig.BearerToken) > 0 {
|
|
privilegedLoopbackToken := c.LoopbackClientConfig.BearerToken
|
|
var uid = uuid.NewRandom().String()
|
|
tokens := make(map[string]*user.DefaultInfo)
|
|
tokens[privilegedLoopbackToken] = &user.DefaultInfo{
|
|
Name: user.APIServerUser,
|
|
UID: uid,
|
|
Groups: []string{user.SystemPrivilegedGroup},
|
|
}
|
|
|
|
tokenAuthenticator := genericauthenticator.NewAuthenticatorFromTokens(tokens)
|
|
c.Authenticator = authenticatorunion.New(tokenAuthenticator, c.Authenticator)
|
|
|
|
tokenAuthorizer := genericauthorizer.NewPrivilegedGroups(user.SystemPrivilegedGroup)
|
|
c.Authorizer = authorizerunion.New(tokenAuthorizer, c.Authorizer)
|
|
}
|
|
|
|
return completedConfig{c}
|
|
}
|
|
|
|
// SkipComplete provides a way to construct a server instance without config completion.
|
|
func (c *Config) SkipComplete() completedConfig {
|
|
return completedConfig{c}
|
|
}
|
|
|
|
// New returns a new instance of GenericAPIServer from the given config.
|
|
// Certain config fields will be set to a default value if unset,
|
|
// including:
|
|
// ServiceClusterIPRange
|
|
// ServiceNodePortRange
|
|
// MasterCount
|
|
// ReadWritePort
|
|
// PublicAddress
|
|
// Public fields:
|
|
// Handler -- The returned GenericAPIServer has a field TopHandler which is an
|
|
// http.Handler which handles all the endpoints provided by the GenericAPIServer,
|
|
// including the API, the UI, and miscellaneous debugging endpoints. All
|
|
// these are subject to authorization and authentication.
|
|
// InsecureHandler -- an http.Handler which handles all the same
|
|
// endpoints as Handler, but no authorization and authentication is done.
|
|
// Public methods:
|
|
// HandleWithAuth -- Allows caller to add an http.Handler for an endpoint
|
|
// that uses the same authentication and authorization (if any is configured)
|
|
// as the GenericAPIServer's built-in endpoints.
|
|
// If the caller wants to add additional endpoints not using the GenericAPIServer's
|
|
// auth, then the caller should create a handler for those endpoints, which delegates the
|
|
// any unhandled paths to "Handler".
|
|
func (c completedConfig) New() (*GenericAPIServer, error) {
|
|
if c.Serializer == nil {
|
|
return nil, fmt.Errorf("Genericapiserver.New() called with config.Serializer == nil")
|
|
}
|
|
|
|
s := &GenericAPIServer{
|
|
discoveryAddresses: c.DiscoveryAddresses,
|
|
LoopbackClientConfig: c.LoopbackClientConfig,
|
|
legacyAPIGroupPrefixes: c.LegacyAPIGroupPrefixes,
|
|
admissionControl: c.AdmissionControl,
|
|
requestContextMapper: c.RequestContextMapper,
|
|
Serializer: c.Serializer,
|
|
|
|
minRequestTimeout: time.Duration(c.MinRequestTimeout) * time.Second,
|
|
|
|
SecureServingInfo: c.SecureServingInfo,
|
|
InsecureServingInfo: c.InsecureServingInfo,
|
|
ExternalAddress: c.ExternalAddress,
|
|
|
|
apiGroupsForDiscovery: map[string]metav1.APIGroup{},
|
|
|
|
swaggerConfig: c.SwaggerConfig,
|
|
openAPIConfig: c.OpenAPIConfig,
|
|
|
|
postStartHooks: map[string]postStartHookEntry{},
|
|
healthzChecks: c.HealthzChecks,
|
|
}
|
|
|
|
s.HandlerContainer = mux.NewAPIContainer(http.NewServeMux(), c.Serializer)
|
|
|
|
s.installAPI(c.Config)
|
|
|
|
s.Handler, s.InsecureHandler = c.BuildHandlerChainsFunc(s.HandlerContainer.ServeMux, c.Config)
|
|
|
|
return s, nil
|
|
}
|
|
|
|
func DefaultBuildHandlerChain(apiHandler http.Handler, c *Config) (secure, insecure http.Handler) {
|
|
generic := func(handler http.Handler) http.Handler {
|
|
handler = genericfilters.WithCORS(handler, c.CorsAllowedOriginList, nil, nil, nil, "true")
|
|
handler = genericfilters.WithPanicRecovery(handler, c.RequestContextMapper)
|
|
handler = genericfilters.WithTimeoutForNonLongRunningRequests(handler, c.RequestContextMapper, c.LongRunningFunc)
|
|
handler = genericfilters.WithMaxInFlightLimit(handler, c.MaxRequestsInFlight, c.MaxMutatingRequestsInFlight, c.RequestContextMapper, c.LongRunningFunc)
|
|
handler = genericapifilters.WithRequestInfo(handler, NewRequestInfoResolver(c), c.RequestContextMapper)
|
|
handler = apirequest.WithRequestContext(handler, c.RequestContextMapper)
|
|
return handler
|
|
}
|
|
audit := func(handler http.Handler) http.Handler {
|
|
return genericapifilters.WithAudit(handler, c.RequestContextMapper, c.AuditWriter)
|
|
}
|
|
protect := func(handler http.Handler) http.Handler {
|
|
handler = genericapifilters.WithAuthorization(handler, c.RequestContextMapper, c.Authorizer)
|
|
handler = genericapifilters.WithImpersonation(handler, c.RequestContextMapper, c.Authorizer)
|
|
handler = audit(handler) // before impersonation to read original user
|
|
handler = authhandlers.WithAuthentication(handler, c.RequestContextMapper, c.Authenticator, authhandlers.Unauthorized(c.SupportsBasicAuth))
|
|
return handler
|
|
}
|
|
|
|
return generic(protect(apiHandler)), generic(audit(apiHandler))
|
|
}
|
|
|
|
func (s *GenericAPIServer) installAPI(c *Config) {
|
|
if c.EnableIndex {
|
|
routes.Index{}.Install(s.HandlerContainer)
|
|
}
|
|
if c.SwaggerConfig != nil && c.EnableSwaggerUI {
|
|
routes.SwaggerUI{}.Install(s.HandlerContainer)
|
|
}
|
|
if c.EnableProfiling {
|
|
routes.Profiling{}.Install(s.HandlerContainer)
|
|
if c.EnableContentionProfiling {
|
|
goruntime.SetBlockProfileRate(1)
|
|
}
|
|
}
|
|
if c.EnableMetrics {
|
|
if c.EnableProfiling {
|
|
routes.MetricsWithReset{}.Install(s.HandlerContainer)
|
|
} else {
|
|
routes.DefaultMetrics{}.Install(s.HandlerContainer)
|
|
}
|
|
}
|
|
routes.Version{Version: c.Version}.Install(s.HandlerContainer)
|
|
s.HandlerContainer.Add(s.DynamicApisDiscovery())
|
|
}
|
|
|
|
func NewRequestInfoResolver(c *Config) *apirequest.RequestInfoFactory {
|
|
apiPrefixes := sets.NewString(strings.Trim(APIGroupPrefix, "/")) // all possible API prefixes
|
|
legacyAPIPrefixes := sets.String{} // APIPrefixes that won't have groups (legacy)
|
|
for legacyAPIPrefix := range c.LegacyAPIGroupPrefixes {
|
|
apiPrefixes.Insert(strings.Trim(legacyAPIPrefix, "/"))
|
|
legacyAPIPrefixes.Insert(strings.Trim(legacyAPIPrefix, "/"))
|
|
}
|
|
|
|
return &apirequest.RequestInfoFactory{
|
|
APIPrefixes: apiPrefixes,
|
|
GrouplessAPIPrefixes: legacyAPIPrefixes,
|
|
}
|
|
}
|