github.com/noironetworks/cilium-net@v1.6.12/pkg/k8s/labels.go (about)

     1  // Copyright 2018 Authors of Cilium
     2  //
     3  // Licensed under the Apache License, Version 2.0 (the "License");
     4  // you may not use this file except in compliance with the License.
     5  // You may obtain a copy of the License at
     6  //
     7  //     http://www.apache.org/licenses/LICENSE-2.0
     8  //
     9  // Unless required by applicable law or agreed to in writing, software
    10  // distributed under the License is distributed on an "AS IS" BASIS,
    11  // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    12  // See the License for the specific language governing permissions and
    13  // limitations under the License.
    14  
    15  package k8s
    16  
    17  import (
    18  	"regexp"
    19  
    20  	k8sConst "github.com/cilium/cilium/pkg/k8s/apis/cilium.io"
    21  	"github.com/cilium/cilium/pkg/logging/logfields"
    22  	"github.com/cilium/cilium/pkg/option"
    23  	"github.com/cilium/cilium/pkg/policy"
    24  
    25  	"github.com/sirupsen/logrus"
    26  	corev1 "k8s.io/api/core/v1"
    27  	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
    28  )
    29  
    30  const (
    31  	// AnnotationIstioSidecarStatus is the annotation added by Istio into a pod
    32  	// when it is injected with a sidecar proxy.
    33  	// Since Istio 0.5.0, the value of this annotation is a serialized JSON object
    34  	// with the following structure ("imagePullSecrets" was added in Istio 0.8.0):
    35  	//
    36  	//     {
    37  	//         "version": "0213afe1274259d2f23feb4820ad2f8eb8609b84a5538e5f51f711545b6bde88",
    38  	//         "initContainers": ["sleep", "istio-init"],
    39  	//         "containers": ["istio-proxy"],
    40  	//         "volumes": ["cilium-unix-sock-dir", "istio-envoy", "istio-certs"],
    41  	//         "imagePullSecrets": null
    42  	//     }
    43  	AnnotationIstioSidecarStatus = "sidecar.istio.io/status"
    44  
    45  	// DefaultSidecarIstioProxyImageRegexp is the default regexp compiled into
    46  	// SidecarIstioProxyImageRegexp.
    47  	DefaultSidecarIstioProxyImageRegexp = "cilium/istio_proxy"
    48  )
    49  
    50  var (
    51  	// SidecarIstioProxyImageRegexp is the regular expression matching
    52  	// compatible Istio sidecar istio-proxy container image names.
    53  	// This is set by the "sidecar-istio-proxy-image" configuration flag.
    54  	SidecarIstioProxyImageRegexp = regexp.MustCompile(DefaultSidecarIstioProxyImageRegexp)
    55  )
    56  
    57  // isInjectedWithIstioSidecarProxy returns whether the given pod has been
    58  // injected by Istio with a sidecar proxy that is compatible with Cilium.
    59  func isInjectedWithIstioSidecarProxy(scopedLog *logrus.Entry, pod *corev1.Pod) bool {
    60  	istioStatusString, ok := pod.GetAnnotations()[AnnotationIstioSidecarStatus]
    61  	if !ok {
    62  		// Istio's injection annotation was not found.
    63  		scopedLog.Debugf("No %s annotation", AnnotationIstioSidecarStatus)
    64  		return false
    65  	}
    66  
    67  	scopedLog.Debugf("Found %s annotation with value: %s",
    68  		AnnotationIstioSidecarStatus, istioStatusString)
    69  
    70  	// Check that there's an "istio-proxy" container that uses an image
    71  	// compatible with Cilium.
    72  	for _, container := range pod.Spec.Containers {
    73  		if container.Name != "istio-proxy" {
    74  			continue
    75  		}
    76  		scopedLog.Debug("Found istio-proxy container in pod")
    77  
    78  		if !SidecarIstioProxyImageRegexp.MatchString(container.Image) {
    79  			continue
    80  		}
    81  		scopedLog.Debugf("istio-proxy container runs Cilium-compatible image: %s", container.Image)
    82  
    83  		for _, mount := range container.VolumeMounts {
    84  			if mount.MountPath != "/var/run/cilium" {
    85  				continue
    86  			}
    87  			scopedLog.Debug("istio-proxy container has volume mounted into /var/run/cilium")
    88  
    89  			return true
    90  		}
    91  	}
    92  
    93  	scopedLog.Debug("No Cilium-compatible istio-proxy container found")
    94  	return false
    95  }
    96  
    97  // GetPodLabels returns the labels of a pod
    98  func GetPodLabels(namespace, podName string) (map[string]string, error) {
    99  	scopedLog := log.WithFields(logrus.Fields{
   100  		logfields.K8sNamespace: namespace,
   101  		logfields.K8sPodName:   podName,
   102  	})
   103  	scopedLog.Debug("Connecting to k8s apiserver to retrieve labels for pod")
   104  
   105  	result, err := Client().CoreV1().Pods(namespace).Get(podName, metav1.GetOptions{})
   106  	if err != nil {
   107  		return nil, err
   108  	}
   109  
   110  	// Also get all labels from the namespace where the pod is running
   111  	k8sNs, err := Client().CoreV1().Namespaces().Get(namespace, metav1.GetOptions{})
   112  	if err != nil {
   113  		return nil, err
   114  	}
   115  
   116  	k8sLabels := result.GetLabels()
   117  	if k8sLabels == nil {
   118  		k8sLabels = map[string]string{}
   119  	}
   120  	for k, v := range k8sNs.GetLabels() {
   121  		k8sLabels[policy.JoinPath(k8sConst.PodNamespaceMetaLabels, k)] = v
   122  	}
   123  	k8sLabels[k8sConst.PodNamespaceLabel] = namespace
   124  
   125  	if result.Spec.ServiceAccountName != "" {
   126  		k8sLabels[k8sConst.PolicyLabelServiceAccount] = result.Spec.ServiceAccountName
   127  	} else {
   128  		delete(k8sLabels, k8sConst.PolicyLabelServiceAccount)
   129  	}
   130  
   131  	// If the pod has been injected with an Istio sidecar proxy compatible with
   132  	// Cilium, add a label to notify that.
   133  	// If the pod already contains that label to explicitly enable or disable
   134  	// the sidecar proxy mode, keep it as is.
   135  	if _, ok := k8sLabels[k8sConst.PolicyLabelIstioSidecarProxy]; !ok &&
   136  		isInjectedWithIstioSidecarProxy(scopedLog, result) {
   137  		k8sLabels[k8sConst.PolicyLabelIstioSidecarProxy] = "true"
   138  	}
   139  
   140  	k8sLabels[k8sConst.PolicyLabelCluster] = option.Config.ClusterName
   141  
   142  	return k8sLabels, nil
   143  }