2023-08-15 18:57:07 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
2023-08-17 18:43:21 +00:00
|
|
|
// SPDX-License-Identifier: BUSL-1.1
|
2023-08-15 18:57:07 +00:00
|
|
|
|
|
|
|
package proxystateconverter
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2023-08-29 21:39:29 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/go-hclog"
|
|
|
|
|
2023-08-15 18:57:07 +00:00
|
|
|
"github.com/hashicorp/consul/agent/proxycfg"
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
|
|
|
"github.com/hashicorp/consul/agent/xds/configfetcher"
|
2023-08-29 15:15:34 +00:00
|
|
|
proxytracker "github.com/hashicorp/consul/internal/mesh/proxy-tracker"
|
2024-01-29 20:08:31 +00:00
|
|
|
"github.com/hashicorp/consul/internal/resource"
|
2023-09-22 16:51:15 +00:00
|
|
|
pbmesh "github.com/hashicorp/consul/proto-public/pbmesh/v2beta1"
|
|
|
|
"github.com/hashicorp/consul/proto-public/pbmesh/v2beta1/pbproxystate"
|
2023-08-15 18:57:07 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Converter converts a single snapshot into a ProxyState.
|
|
|
|
type Converter struct {
|
|
|
|
Logger hclog.Logger
|
|
|
|
CfgFetcher configfetcher.ConfigFetcher
|
2023-08-29 15:15:34 +00:00
|
|
|
proxyState *proxytracker.ProxyState
|
2023-08-15 18:57:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewConverter(
|
|
|
|
logger hclog.Logger,
|
|
|
|
cfgFetcher configfetcher.ConfigFetcher,
|
|
|
|
) *Converter {
|
|
|
|
return &Converter{
|
|
|
|
Logger: logger,
|
|
|
|
CfgFetcher: cfgFetcher,
|
2023-08-29 15:15:34 +00:00
|
|
|
proxyState: &proxytracker.ProxyState{
|
2023-08-24 22:44:14 +00:00
|
|
|
ProxyState: &pbmesh.ProxyState{
|
|
|
|
Listeners: make([]*pbproxystate.Listener, 0),
|
|
|
|
Clusters: make(map[string]*pbproxystate.Cluster),
|
|
|
|
Routes: make(map[string]*pbproxystate.Route),
|
|
|
|
Endpoints: make(map[string]*pbproxystate.Endpoints),
|
|
|
|
},
|
2023-08-15 18:57:07 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-29 15:15:34 +00:00
|
|
|
func (g *Converter) ProxyStateFromSnapshot(cfgSnap *proxycfg.ConfigSnapshot) (*proxytracker.ProxyState, error) {
|
2023-08-15 18:57:07 +00:00
|
|
|
err := g.resourcesFromSnapshot(cfgSnap)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to generate FullProxyState: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return g.proxyState, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Converter) resourcesFromSnapshot(cfgSnap *proxycfg.ConfigSnapshot) error {
|
|
|
|
err := g.tlsConfigFromSnapshot(cfgSnap)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = g.listenersFromSnapshot(cfgSnap)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-08-17 19:55:54 +00:00
|
|
|
|
|
|
|
err = g.endpointsFromSnapshot(cfgSnap)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = g.clustersFromSnapshot(cfgSnap)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-08-17 21:04:53 +00:00
|
|
|
err = g.routesFromSnapshot(cfgSnap)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-08-17 18:43:21 +00:00
|
|
|
//g.secretsFromSnapshot(cfgSnap)
|
2023-08-15 18:57:07 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Converter) tlsConfigFromSnapshot(cfgSnap *proxycfg.ConfigSnapshot) error {
|
|
|
|
proxyStateTLS := &pbproxystate.TLS{}
|
|
|
|
g.proxyState.TrustBundles = make(map[string]*pbproxystate.TrustBundle)
|
|
|
|
g.proxyState.LeafCertificates = make(map[string]*pbproxystate.LeafCertificate)
|
|
|
|
|
|
|
|
// Set the TLS in the top level proxyState
|
|
|
|
g.proxyState.Tls = proxyStateTLS
|
|
|
|
|
|
|
|
// Add local trust bundle
|
2024-01-29 20:08:31 +00:00
|
|
|
g.proxyState.TrustBundles[resource.DefaultPeerName] = &pbproxystate.TrustBundle{
|
2023-08-15 18:57:07 +00:00
|
|
|
TrustDomain: cfgSnap.Roots.TrustDomain,
|
|
|
|
Roots: []string{cfgSnap.RootPEMs()},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add peered trust bundles for remote peers that will dial this proxy.
|
|
|
|
for _, peeringTrustBundle := range cfgSnap.PeeringTrustBundles() {
|
|
|
|
g.proxyState.TrustBundles[peeringTrustBundle.PeerName] = &pbproxystate.TrustBundle{
|
|
|
|
TrustDomain: peeringTrustBundle.GetTrustDomain(),
|
|
|
|
Roots: peeringTrustBundle.RootPEMs,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add upstream peer trust bundles for dialing upstreams in remote peers.
|
|
|
|
upstreamsSnapshot, err := cfgSnap.ToConfigSnapshotUpstreams()
|
|
|
|
if err != nil {
|
|
|
|
if !(cfgSnap.Kind == structs.ServiceKindMeshGateway || cfgSnap.Kind == structs.ServiceKindTerminatingGateway) {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if upstreamsSnapshot != nil {
|
|
|
|
upstreamsSnapshot.UpstreamPeerTrustBundles.ForEachKeyE(func(k proxycfg.PeerName) error {
|
|
|
|
tbs, ok := upstreamsSnapshot.UpstreamPeerTrustBundles.Get(k)
|
|
|
|
if ok {
|
|
|
|
g.proxyState.TrustBundles[k] = &pbproxystate.TrustBundle{
|
|
|
|
TrustDomain: tbs.TrustDomain,
|
|
|
|
Roots: tbs.RootPEMs,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
if cfgSnap.MeshConfigTLSOutgoing() != nil {
|
|
|
|
proxyStateTLS.OutboundTlsParameters = makeTLSParametersFromTLSConfig(cfgSnap.MeshConfigTLSOutgoing().TLSMinVersion,
|
|
|
|
cfgSnap.MeshConfigTLSOutgoing().TLSMaxVersion, cfgSnap.MeshConfigTLSOutgoing().CipherSuites)
|
|
|
|
}
|
|
|
|
|
|
|
|
if cfgSnap.MeshConfigTLSIncoming() != nil {
|
|
|
|
proxyStateTLS.InboundTlsParameters = makeTLSParametersFromTLSConfig(cfgSnap.MeshConfigTLSIncoming().TLSMinVersion,
|
|
|
|
cfgSnap.MeshConfigTLSIncoming().TLSMaxVersion, cfgSnap.MeshConfigTLSIncoming().CipherSuites)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|