Wouter Verlaek 72d9152a71 [image-builder] Enable TLS in workspace clusters
Fix cyclic import cycle

Update altnames

Update golden testdata, todo

Update grpc opts

Testing

Remove blocking dial

Only add TLS in ws cluster

Conditional TLS

Add comments
2022-12-20 02:45:29 -03:00

183 lines
5.6 KiB
Go

// Copyright (c) 2021 Gitpod GmbH. All rights reserved.
// Licensed under the GNU Affero General Public License (AGPL).
// See License.AGPL.txt in the project root for license information.
package wsmanager
import (
"github.com/gitpod-io/gitpod/installer/pkg/cluster"
"github.com/gitpod-io/gitpod/installer/pkg/common"
wsdaemon "github.com/gitpod-io/gitpod/installer/pkg/components/ws-daemon"
"github.com/gitpod-io/gitpod/installer/pkg/config/v1"
appsv1 "k8s.io/api/apps/v1"
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/resource"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/utils/pointer"
)
func deployment(ctx *common.RenderContext) ([]runtime.Object, error) {
labels := common.CustomizeLabel(ctx, Component, common.TypeMetaDeployment)
configHash, err := common.ObjectHash(configmap(ctx))
if err != nil {
return nil, err
}
var volumes []corev1.Volume
var volumeMounts []corev1.VolumeMount
if ctx.Config.Kind == config.InstallationWorkspace {
// Image builder TLS is only enabled in workspace clusters. This check
// can be removed once image-builder-mk3 has been removed from application clusters
// (https://github.com/gitpod-io/gitpod/issues/7845).
volumes = append(volumes, corev1.Volume{
Name: common.ImageBuilderVolumeTLSCerts,
VolumeSource: corev1.VolumeSource{
Secret: &corev1.SecretVolumeSource{SecretName: common.ImageBuilderTLSSecret},
},
})
volumeMounts = append(volumeMounts, corev1.VolumeMount{
Name: common.ImageBuilderVolumeTLSCerts,
MountPath: "/image-builder-mk3-tls-certs",
ReadOnly: true,
})
}
podSpec := corev1.PodSpec{
PriorityClassName: common.SystemNodeCritical,
Affinity: common.NodeAffinity(cluster.AffinityLabelWorkspaceServices),
EnableServiceLinks: pointer.Bool(false),
ServiceAccountName: Component,
SecurityContext: &corev1.PodSecurityContext{
RunAsUser: pointer.Int64(31002),
},
Containers: []corev1.Container{{
Name: Component,
Args: []string{"run", "--config", "/config/config.json"},
Image: ctx.ImageName(ctx.Config.Repository, Component, ctx.VersionManifest.Components.WSManager.Version),
ImagePullPolicy: corev1.PullIfNotPresent,
Resources: common.ResourceRequirements(ctx, Component, Component, corev1.ResourceRequirements{
Requests: corev1.ResourceList{
"cpu": resource.MustParse("100m"),
"memory": resource.MustParse("32Mi"),
},
}),
Ports: []corev1.ContainerPort{
{
Name: RPCPortName,
ContainerPort: RPCPort,
},
},
SecurityContext: &corev1.SecurityContext{
Privileged: pointer.Bool(false),
AllowPrivilegeEscalation: pointer.Bool(false),
},
Env: common.CustomizeEnvvar(ctx, Component, common.MergeEnv(
common.DefaultEnv(&ctx.Config),
common.WorkspaceTracingEnv(ctx, Component),
[]corev1.EnvVar{{Name: "GRPC_GO_RETRY", Value: "on"}},
)),
VolumeMounts: append(
[]corev1.VolumeMount{
{
Name: VolumeConfig,
MountPath: "/config",
ReadOnly: true,
}, {
Name: VolumeWorkspaceTemplate,
MountPath: WorkspaceTemplatePath,
ReadOnly: true,
}, {
Name: wsdaemon.VolumeTLSCerts,
MountPath: "/ws-daemon-tls-certs",
ReadOnly: true,
}, {
Name: VolumeTLSCerts,
MountPath: "/certs",
ReadOnly: true,
},
},
volumeMounts...,
),
},
*common.KubeRBACProxyContainerWithConfig(ctx),
},
Volumes: append(
[]corev1.Volume{
{
Name: VolumeConfig,
VolumeSource: corev1.VolumeSource{
ConfigMap: &corev1.ConfigMapVolumeSource{
LocalObjectReference: corev1.LocalObjectReference{Name: Component},
},
},
},
{
Name: VolumeWorkspaceTemplate,
VolumeSource: corev1.VolumeSource{
ConfigMap: &corev1.ConfigMapVolumeSource{
LocalObjectReference: corev1.LocalObjectReference{Name: WorkspaceTemplateConfigMap},
},
},
},
{
Name: wsdaemon.VolumeTLSCerts,
VolumeSource: corev1.VolumeSource{
Secret: &corev1.SecretVolumeSource{SecretName: wsdaemon.TLSSecretName},
},
},
{
Name: VolumeTLSCerts,
VolumeSource: corev1.VolumeSource{
Secret: &corev1.SecretVolumeSource{SecretName: TLSSecretNameSecret},
},
},
},
volumes...,
),
}
err = common.AddStorageMounts(ctx, &podSpec, Component)
if err != nil {
return nil, err
}
if vol, mnt, _, ok := common.CustomCACertVolume(ctx); ok {
podSpec.Volumes = append(podSpec.Volumes, *vol)
container := podSpec.Containers[0]
container.VolumeMounts = append(container.VolumeMounts, *mnt)
podSpec.Containers[0] = container
}
return []runtime.Object{
&appsv1.Deployment{
TypeMeta: common.TypeMetaDeployment,
ObjectMeta: metav1.ObjectMeta{
Name: Component,
Namespace: ctx.Namespace,
Labels: labels,
Annotations: common.CustomizeAnnotation(ctx, Component, common.TypeMetaDeployment),
},
Spec: appsv1.DeploymentSpec{
Selector: &metav1.LabelSelector{MatchLabels: common.DefaultLabels(Component)},
Replicas: common.Replicas(ctx, Component),
Strategy: common.DeploymentStrategy,
Template: corev1.PodTemplateSpec{
ObjectMeta: metav1.ObjectMeta{
Name: Component,
Namespace: ctx.Namespace,
Labels: labels,
Annotations: common.CustomizeAnnotation(ctx, Component, common.TypeMetaDeployment, func() map[string]string {
return map[string]string{
common.AnnotationConfigChecksum: configHash,
}
}),
},
Spec: podSpec,
},
},
},
}, nil
}