/
listener_render.go
168 lines (136 loc) · 4.78 KB
/
listener_render.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
package renderer
import (
"encoding/base64"
"fmt"
corev1 "k8s.io/api/core/v1"
gwapiv1 "sigs.k8s.io/gateway-api/apis/v1"
stnrconfv1 "github.com/l7mp/stunner/pkg/apis/v1"
"github.com/l7mp/stunner-gateway-operator/internal/store"
stnrgwv1 "github.com/l7mp/stunner-gateway-operator/api/v1"
)
func stnrListenerName(gw *gwapiv1.Gateway, l *gwapiv1.Listener) string {
return fmt.Sprintf("%s/%s", store.GetObjectKey(gw), string(l.Name))
}
func (r *Renderer) renderListener(gw *gwapiv1.Gateway, gwConf *stnrgwv1.GatewayConfig, l *gwapiv1.Listener, rs []*stnrgwv1.UDPRoute, ap gwAddrPort) (*stnrconfv1.ListenerConfig, error) {
r.log.V(4).Info("renderListener", "gateway", store.GetObjectKey(gw), "gateway-config",
store.GetObjectKey(gwConf), "listener", l.Name, "route number", len(rs), "public-addr", ap.String())
proto, err := r.getProtocol(l.Protocol)
if err != nil {
return nil, err
}
lc := stnrconfv1.ListenerConfig{
Name: stnrListenerName(gw, l),
Protocol: proto.String(),
Addr: "$STUNNER_ADDR", // Addr will be filled in from the pod environment
Port: int(l.Port),
}
// set public address-port
if ap.addr != "" && ap.port > 0 {
lc.PublicAddr = ap.addr
lc.PublicPort = ap.port
}
if cert, key, ok := r.getTLS(gw, l); ok {
lc.Cert = cert
lc.Key = key
}
for _, r := range rs {
lc.Routes = append(lc.Routes, store.GetObjectKey(r))
}
// remove cert/key from dump
tmp := lc
tmp.Cert = "<SECRET>"
tmp.Key = "<SECRET>"
r.log.V(2).Info("renderListener ready", "gateway", store.GetObjectKey(gw), "gateway-config",
store.GetObjectKey(gwConf), "listener", l.Name, "route number", len(rs), "result",
fmt.Sprintf("%#v", tmp))
return &lc, nil
}
func (r *Renderer) getTLS(gw *gwapiv1.Gateway, l *gwapiv1.Listener) (string, string, bool) {
proto, err := r.getProtocol(l.Protocol)
if err != nil {
return "", "", false
}
if l.TLS == nil || (l.TLS.Mode != nil && *l.TLS.Mode != gwapiv1.TLSModeTerminate) ||
(proto != stnrconfv1.ListenerProtocolTURNTLS && proto != stnrconfv1.ListenerProtocolTURNDTLS) {
return "", "", false
}
if len(l.TLS.CertificateRefs) == 0 {
r.log.Info("no CertificateRef found in Gateway listener", "gateway", store.GetObjectKey(gw),
"listener", l.Name)
return "", "", false
}
if len(l.TLS.CertificateRefs) > 1 {
r.log.Info("too many CertificateRef found in Gateway listener, using the first one",
"gateway", store.GetObjectKey(gw), "listener", l.Name)
}
for _, ref := range l.TLS.CertificateRefs {
ref := ref
n, err := getSecretNameFromRef(&ref, gw.GetNamespace())
if err != nil {
r.log.Info("ignoring secret-reference to an unknown or invalid object",
"gateway", store.GetObjectKey(gw),
"ref", dumpSecretRef(&ref, gw.GetNamespace()),
"error", err.Error())
continue
}
secret := store.Secrets.GetObject(n)
if secret == nil {
r.log.Info("secret not found", "gateway", store.GetObjectKey(gw),
"listener", l.Name, "secret", n.String())
// fall through: we may find another workable cert-ref
continue
}
if secret.Type != corev1.SecretTypeTLS {
r.log.Info("expecting Secret of type \"kubernetes.io/tls\" (trying to "+
"use Secret anyway)", "gateway", store.GetObjectKey(gw), "listener",
l.Name, "secret", n.String())
}
// make this foolproof
cert, certOk := secret.Data["tls.crt"]
if !certOk {
cert, certOk = secret.Data["crt"]
if !certOk {
cert, certOk = secret.Data["cert"]
}
}
key, keyOk := secret.Data["tls.key"]
if !keyOk {
key, keyOk = secret.Data["key"]
}
if !certOk || !keyOk {
r.log.Info("cannot find cert and/or key in Secret", "gateway",
store.GetObjectKey(gw), "listener", l.Name, "secret", n.String())
continue
}
return base64.StdEncoding.EncodeToString(cert),
base64.StdEncoding.EncodeToString(key), true
}
return "", "", false
}
// normalize protocol aliases
func (r *Renderer) getProtocol(proto gwapiv1.ProtocolType) (stnrconfv1.ListenerProtocol, error) {
protocol := string(proto)
switch protocol {
case "UDP":
protocol = "TURN-UDP" // v0.16: resolves to TURN-UDP
r.log.Info("use of DEPRECATED protocol", "deprecated-protocol", "UDP",
"valid-protocol", "TURN-UDP")
case "TCP":
protocol = "TURN-TCP" // v0.16: resolves to TURN-TCP
r.log.Info("use of DEPRECATED protocol", "deprecated-protocol", "TCP",
"valid-protocol", "TURN-TCP")
case "TLS":
protocol = "TURN-TLS" // v0.16: resolves to TURN-TLS
r.log.Info("use of DEPRECATED protocol", "deprecated-protocol", "TLS",
"valid-protocol", "TURN-TLS")
case "DTLS":
protocol = "TURN-DTLS" // v0.16: resolves to TURN-DTLS
r.log.Info("use of DEPRECATED protocol", "deprecated-protocol", "DTLS",
"valid-protocol", "TURN-DTLS")
}
ret, err := stnrconfv1.NewListenerProtocol(protocol)
if err != nil {
return ret, NewNonCriticalError(InvalidProtocol)
}
return ret, nil
}