Merge pull request #1 from srhb/k8s-nodeauth
nixos/k8s: Enable Node authorizer and NodeRestriction by default
This commit is contained in:
commit
f44a81e19f
@ -301,8 +301,8 @@ in {
|
|||||||
Kubernetes apiserver authorization mode (AlwaysAllow/AlwaysDeny/ABAC/RBAC). See
|
Kubernetes apiserver authorization mode (AlwaysAllow/AlwaysDeny/ABAC/RBAC). See
|
||||||
<link xlink:href="http://kubernetes.io/docs/admin/authorization.html"/>
|
<link xlink:href="http://kubernetes.io/docs/admin/authorization.html"/>
|
||||||
'';
|
'';
|
||||||
default = ["RBAC"];
|
default = ["RBAC" "Node"];
|
||||||
type = types.listOf (types.enum ["AlwaysAllow" "AlwaysDeny" "ABAC" "RBAC"]);
|
type = types.listOf (types.enum ["AlwaysAllow" "AlwaysDeny" "ABAC" "RBAC" "Node"]);
|
||||||
};
|
};
|
||||||
|
|
||||||
authorizationPolicy = mkOption {
|
authorizationPolicy = mkOption {
|
||||||
@ -344,7 +344,7 @@ in {
|
|||||||
Kubernetes admission control plugins to use. See
|
Kubernetes admission control plugins to use. See
|
||||||
<link xlink:href="http://kubernetes.io/docs/admin/admission-controllers/"/>
|
<link xlink:href="http://kubernetes.io/docs/admin/admission-controllers/"/>
|
||||||
'';
|
'';
|
||||||
default = ["NamespaceLifecycle" "LimitRanger" "ServiceAccount" "ResourceQuota" "DefaultStorageClass" "DefaultTolerationSeconds"];
|
default = ["NamespaceLifecycle" "LimitRanger" "ServiceAccount" "ResourceQuota" "DefaultStorageClass" "DefaultTolerationSeconds" "NodeRestriction"];
|
||||||
example = [
|
example = [
|
||||||
"NamespaceLifecycle" "NamespaceExists" "LimitRanger"
|
"NamespaceLifecycle" "NamespaceExists" "LimitRanger"
|
||||||
"SecurityContextDeny" "ServiceAccount" "ResourceQuota"
|
"SecurityContextDeny" "ServiceAccount" "ResourceQuota"
|
||||||
|
@ -8,7 +8,7 @@ let
|
|||||||
mkKubernetesBaseTest =
|
mkKubernetesBaseTest =
|
||||||
{ name, domain ? "my.zyx", test, machines
|
{ name, domain ? "my.zyx", test, machines
|
||||||
, pkgs ? import <nixpkgs> { inherit system; }
|
, pkgs ? import <nixpkgs> { inherit system; }
|
||||||
, certs ? import ./certs.nix { inherit pkgs; externalDomain = domain; }
|
, certs ? import ./certs.nix { inherit pkgs; externalDomain = domain; kubelets = attrNames machines; }
|
||||||
, extraConfiguration ? null }:
|
, extraConfiguration ? null }:
|
||||||
let
|
let
|
||||||
masterName = head (filter (machineName: any (role: role == "master") machines.${machineName}.roles) (attrNames machines));
|
masterName = head (filter (machineName: any (role: role == "master") machines.${machineName}.roles) (attrNames machines));
|
||||||
|
@ -2,7 +2,8 @@
|
|||||||
pkgs ? import <nixpkgs> {},
|
pkgs ? import <nixpkgs> {},
|
||||||
internalDomain ? "cloud.yourdomain.net",
|
internalDomain ? "cloud.yourdomain.net",
|
||||||
externalDomain ? "myawesomecluster.cluster.yourdomain.net",
|
externalDomain ? "myawesomecluster.cluster.yourdomain.net",
|
||||||
serviceClusterIp ? "10.0.0.1"
|
serviceClusterIp ? "10.0.0.1",
|
||||||
|
kubelets
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
runWithCFSSL = name: cmd:
|
runWithCFSSL = name: cmd:
|
||||||
@ -123,9 +124,10 @@ let
|
|||||||
};
|
};
|
||||||
|
|
||||||
apiserver-client = {
|
apiserver-client = {
|
||||||
kubelet = createClientCertKey {
|
kubelet = hostname: createClientCertKey {
|
||||||
inherit ca;
|
inherit ca;
|
||||||
cn = "apiserver-client-kubelet";
|
name = "apiserver-client-kubelet-${hostname}";
|
||||||
|
cn = "system:node:${hostname}.${externalDomain}";
|
||||||
groups = ["system:nodes"];
|
groups = ["system:nodes"];
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -175,10 +177,9 @@ in {
|
|||||||
paths = [
|
paths = [
|
||||||
(writeCFSSL (noKey ca))
|
(writeCFSSL (noKey ca))
|
||||||
(writeCFSSL kubelet)
|
(writeCFSSL kubelet)
|
||||||
(writeCFSSL apiserver-client.kubelet)
|
|
||||||
(writeCFSSL apiserver-client.kube-proxy)
|
(writeCFSSL apiserver-client.kube-proxy)
|
||||||
(writeCFSSL etcd-client)
|
(writeCFSSL etcd-client)
|
||||||
];
|
] ++ map (hostname: writeCFSSL (apiserver-client.kubelet hostname)) kubelets;
|
||||||
};
|
};
|
||||||
|
|
||||||
admin = writeCFSSL apiserver-client.admin;
|
admin = writeCFSSL apiserver-client.admin;
|
||||||
|
@ -3,7 +3,7 @@ with import ./base.nix { inherit system; };
|
|||||||
let
|
let
|
||||||
domain = "my.zyx";
|
domain = "my.zyx";
|
||||||
|
|
||||||
certs = import ./certs.nix { externalDomain = domain; };
|
certs = import ./certs.nix { externalDomain = domain; kubelets = [ "machine1" "machine2" ]; };
|
||||||
|
|
||||||
redisPod = pkgs.writeText "redis-pod.json" (builtins.toJSON {
|
redisPod = pkgs.writeText "redis-pod.json" (builtins.toJSON {
|
||||||
kind = "Pod";
|
kind = "Pod";
|
||||||
|
@ -29,8 +29,8 @@ let
|
|||||||
tlsKeyFile = "${certs.worker}/kubelet-key.pem";
|
tlsKeyFile = "${certs.worker}/kubelet-key.pem";
|
||||||
hostname = "${config.networking.hostName}.${config.networking.domain}";
|
hostname = "${config.networking.hostName}.${config.networking.domain}";
|
||||||
kubeconfig = {
|
kubeconfig = {
|
||||||
certFile = "${certs.worker}/apiserver-client-kubelet.pem";
|
certFile = "${certs.worker}/apiserver-client-kubelet-${config.networking.hostName}.pem";
|
||||||
keyFile = "${certs.worker}/apiserver-client-kubelet-key.pem";
|
keyFile = "${certs.worker}/apiserver-client-kubelet-${config.networking.hostName}-key.pem";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
controllerManager = {
|
controllerManager = {
|
||||||
|
Loading…
x
Reference in New Issue
Block a user