Skip to content

Commit 6b74d5e

Browse files
committed
First pass at fixing non-inclusive verbage.
Switched easy fix uses of master to either control plane or fronted as appropriate. However we still have references to the git branch and also to a feature gate. The latter requires a backward compatible method to fix. Fixed easy-rsa-master as per Jefftree.
1 parent bbc5a52 commit 6b74d5e

File tree

9 files changed

+58
-60
lines changed

9 files changed

+58
-60
lines changed

Makefile

+17-17
Original file line numberDiff line numberDiff line change
@@ -118,9 +118,9 @@ proto/agent/agent.pb.go: proto/agent/agent.proto
118118
easy-rsa.tar.gz:
119119
curl -L -o easy-rsa.tar.gz --connect-timeout 20 --retry 6 --retry-delay 2 https://github.com/OpenVPN/easy-rsa/archive/refs/tags/v3.0.8.tar.gz
120120

121-
easy-rsa-master: easy-rsa.tar.gz
121+
easy-rsa: easy-rsa.tar.gz
122122
tar xvf easy-rsa.tar.gz
123-
mv easy-rsa-3.0.8 easy-rsa-master
123+
mv easy-rsa-3.0.8 easy-rsa
124124

125125
cfssl:
126126
@if ! command -v cfssl &> /dev/null; then \
@@ -136,34 +136,34 @@ cfssljson:
136136

137137
.PHONY: certs
138138
certs: export PATH := $(shell pwd):$(PATH)
139-
certs: easy-rsa-master cfssl cfssljson
139+
certs: easy-rsa cfssl cfssljson
140140
# set up easy-rsa
141-
cp -rf easy-rsa-master/easyrsa3 easy-rsa-master/master
142-
cp -rf easy-rsa-master/easyrsa3 easy-rsa-master/agent
141+
cp -rf easy-rsa/easyrsa3 easy-rsa/frontend
142+
cp -rf easy-rsa/easyrsa3 easy-rsa/agent
143143
# create the client <-> server-proxy connection certs
144-
cd easy-rsa-master/master; \
144+
cd easy-rsa/frontend; \
145145
./easyrsa init-pki; \
146146
./easyrsa --batch "--req-cn=127.0.0.1@$(date +%s)" build-ca nopass; \
147-
./easyrsa --subject-alt-name="DNS:kubernetes,DNS:localhost,IP:127.0.0.1" build-server-full "proxy-master" nopass; \
147+
./easyrsa --subject-alt-name="DNS:kubernetes,DNS:localhost,IP:127.0.0.1" build-server-full "proxy-frontend" nopass; \
148148
./easyrsa build-client-full proxy-client nopass; \
149149
echo '{"signing":{"default":{"expiry":"43800h","usages":["signing","key encipherment","client auth"]}}}' > "ca-config.json"; \
150150
echo '{"CN":"proxy","names":[{"O":"system:nodes"}],"hosts":[""],"key":{"algo":"rsa","size":2048}}' | cfssl gencert -ca=pki/ca.crt -ca-key=pki/private/ca.key -config=ca-config.json - | cfssljson -bare proxy
151-
mkdir -p certs/master
152-
cp -r easy-rsa-master/master/pki/private certs/master
153-
cp -r easy-rsa-master/master/pki/issued certs/master
154-
cp easy-rsa-master/master/pki/ca.crt certs/master/issued
151+
mkdir -p certs/frontend
152+
cp -r easy-rsa/frontend/pki/private certs/frontend
153+
cp -r easy-rsa/frontend/pki/issued certs/frontend
154+
cp easy-rsa/frontend/pki/ca.crt certs/frontend/issued
155155
# create the agent <-> server-proxy connection certs
156-
cd easy-rsa-master/agent; \
156+
cd easy-rsa/agent; \
157157
./easyrsa init-pki; \
158158
./easyrsa --batch "--req-cn=$(PROXY_SERVER_IP)@$(date +%s)" build-ca nopass; \
159-
./easyrsa --subject-alt-name="DNS:kubernetes,DNS:localhost,IP:$(PROXY_SERVER_IP)" build-server-full "proxy-master" nopass; \
159+
./easyrsa --subject-alt-name="DNS:kubernetes,DNS:localhost,IP:$(PROXY_SERVER_IP)" build-server-full "proxy-frontend" nopass; \
160160
./easyrsa build-client-full proxy-agent nopass; \
161161
echo '{"signing":{"default":{"expiry":"43800h","usages":["signing","key encipherment","agent auth"]}}}' > "ca-config.json"; \
162162
echo '{"CN":"proxy","names":[{"O":"system:nodes"}],"hosts":[""],"key":{"algo":"rsa","size":2048}}' | cfssl gencert -ca=pki/ca.crt -ca-key=pki/private/ca.key -config=ca-config.json - | cfssljson -bare proxy
163163
mkdir -p certs/agent
164-
cp -r easy-rsa-master/agent/pki/private certs/agent
165-
cp -r easy-rsa-master/agent/pki/issued certs/agent
166-
cp easy-rsa-master/agent/pki/ca.crt certs/agent/issued
164+
cp -r easy-rsa/agent/pki/private certs/agent
165+
cp -r easy-rsa/agent/pki/issued certs/agent
166+
cp easy-rsa/agent/pki/ca.crt certs/agent/issued
167167

168168
## --------------------------------------
169169
## Docker
@@ -308,4 +308,4 @@ release-alias-tag: # Adds the tag to the last build tag. BASE_REF comes from the
308308
.PHONY: clean
309309
clean:
310310
go clean -testcache
311-
rm -rf proto/agent/agent.pb.go konnectivity-client/proto/client/client.pb.go easy-rsa.tar.gz easy-rsa-master cfssl cfssljson certs bin proto/agent/mocks
311+
rm -rf proto/agent/agent.pb.go konnectivity-client/proto/client/client.pb.go easy-rsa.tar.gz easy-rsa cfssl cfssljson certs bin proto/agent/mocks

README.md

+18-18
Original file line numberDiff line numberDiff line change
@@ -62,10 +62,10 @@ requests on the other.
6262
### GRPC Client using mTLS Proxy with dial back Agent
6363

6464
```
65-
client =HTTP over GRPC=> (:8090) proxy (:8091) <=GRPC= agent =HTTP=> http-test-server(:8000)
66-
| ^
67-
| Tunnel |
68-
+----------------------------------------------------+
65+
Frontend client =HTTP over GRPC=> (:8090) proxy (:8091) <=GRPC= agent =HTTP=> http-test-server(:8000)
66+
| ^
67+
| Tunnel |
68+
+---------------------------------------------------------------+
6969
```
7070

7171
- Start Simple test HTTP Server (Sample destination)
@@ -75,7 +75,7 @@ client =HTTP over GRPC=> (:8090) proxy (:8091) <=GRPC= agent =HTTP=> http-test-s
7575

7676
- Start proxy service
7777
```console
78-
./bin/proxy-server --server-ca-cert=certs/master/issued/ca.crt --server-cert=certs/master/issued/proxy-master.crt --server-key=certs/master/private/proxy-master.key --cluster-ca-cert=certs/agent/issued/ca.crt --cluster-cert=certs/agent/issued/proxy-master.crt --cluster-key=certs/agent/private/proxy-master.key
78+
./bin/proxy-server --server-ca-cert=certs/frontend/issued/ca.crt --server-cert=certs/frontend/issued/proxy-frontend.crt --server-key=certs/frontend/private/proxy-frontend.key --cluster-ca-cert=certs/agent/issued/ca.crt --cluster-cert=certs/agent/issued/proxy-frontend.crt --cluster-key=certs/agent/private/proxy-frontend.key
7979
```
8080

8181
- Start agent service
@@ -85,16 +85,16 @@ client =HTTP over GRPC=> (:8090) proxy (:8091) <=GRPC= agent =HTTP=> http-test-s
8585

8686
- Run client (mTLS enabled sample client)
8787
```console
88-
./bin/proxy-test-client --ca-cert=certs/master/issued/ca.crt --client-cert=certs/master/issued/proxy-client.crt --client-key=certs/master/private/proxy-client.key
88+
./bin/proxy-test-client --ca-cert=certs/frontend/issued/ca.crt --client-cert=certs/frontend/issued/proxy-client.crt --client-key=certs/frontend/private/proxy-client.key
8989
```
9090

9191
### GRPC+UDS Client using Proxy with dial back Agent
9292

9393
```
94-
client =HTTP over GRPC+UDS=> (/tmp/uds-proxy) proxy (:8091) <=GRPC= agent =HTTP=> SimpleHTTPServer(:8000)
95-
| ^
96-
| Tunnel |
97-
+----------------------------------------------------+
94+
Frontend client =HTTP over GRPC+UDS=> (/tmp/uds-proxy) proxy (:8091) <=GRPC= agent =HTTP=> SimpleHTTPServer(:8000)
95+
| ^
96+
| Tunnel |
97+
+----------------------------------------------------------------------------+
9898
```
9999

100100
- Start Simple test HTTP Server (Sample destination)
@@ -104,7 +104,7 @@ client =HTTP over GRPC+UDS=> (/tmp/uds-proxy) proxy (:8091) <=GRPC= agent =HTTP=
104104

105105
- Start proxy service
106106
```console
107-
./bin/proxy-server --server-port=0 --uds-name=/tmp/uds-proxy --cluster-ca-cert=certs/agent/issued/ca.crt --cluster-cert=certs/agent/issued/proxy-master.crt --cluster-key=certs/agent/private/proxy-master.key
107+
./bin/proxy-server --server-port=0 --uds-name=/tmp/uds-proxy --cluster-ca-cert=certs/agent/issued/ca.crt --cluster-cert=certs/agent/issued/proxy-frontend.crt --cluster-key=certs/agent/private/proxy-frontend.key
108108
```
109109

110110
- Start agent service
@@ -121,10 +121,10 @@ client =HTTP over GRPC+UDS=> (/tmp/uds-proxy) proxy (:8091) <=GRPC= agent =HTTP=
121121
### HTTP-Connect Client using mTLS Proxy with dial back Agent (Either curl OR test client)
122122

123123
```
124-
client =HTTP-CONNECT=> (:8090) proxy (:8091) <=GRPC= agent =HTTP=> SimpleHTTPServer(:8000)
125-
| ^
126-
| Tunnel |
127-
+----------------------------------------------------+
124+
Frontend client =HTTP-CONNECT=> (:8090) proxy (:8091) <=GRPC= agent =HTTP=> SimpleHTTPServer(:8000)
125+
| ^
126+
| Tunnel |
127+
+-------------------------------------------------------------+
128128
```
129129

130130
- Start SimpleHTTPServer (Sample destination)
@@ -134,7 +134,7 @@ client =HTTP-CONNECT=> (:8090) proxy (:8091) <=GRPC= agent =HTTP=> SimpleHTTPSer
134134

135135
- Start proxy service
136136
```console
137-
./bin/proxy-server --mode=http-connect --server-ca-cert=certs/master/issued/ca.crt --server-cert=certs/master/issued/proxy-master.crt --server-key=certs/master/private/proxy-master.key --cluster-ca-cert=certs/agent/issued/ca.crt --cluster-cert=certs/agent/issued/proxy-master.crt --cluster-key=certs/agent/private/proxy-master.key
137+
./bin/proxy-server --mode=http-connect --server-ca-cert=certs/frontend/issued/ca.crt --server-cert=certs/frontend/issued/proxy-frontend.crt --server-key=certs/frontend/private/proxy-frontend.key --cluster-ca-cert=certs/agent/issued/ca.crt --cluster-cert=certs/agent/issued/proxy-frontend.crt --cluster-key=certs/agent/private/proxy-frontend.key
138138
```
139139

140140
- Start agent service
@@ -144,12 +144,12 @@ client =HTTP-CONNECT=> (:8090) proxy (:8091) <=GRPC= agent =HTTP=> SimpleHTTPSer
144144

145145
- Run client (mTLS & http-connect enabled sample client)
146146
```console
147-
./bin/proxy-test-client --mode=http-connect --proxy-host=127.0.0.1 --ca-cert=certs/master/issued/ca.crt --client-cert=certs/master/issued/proxy-client.crt --client-key=certs/master/private/proxy-client.key
147+
./bin/proxy-test-client --mode=http-connect --proxy-host=127.0.0.1 --ca-cert=certs/frontend/issued/ca.crt --client-cert=certs/frontend/issued/proxy-client.crt --client-key=certs/frontend/private/proxy-client.key
148148
```
149149

150150
- Run curl client (curl using a mTLS http-connect proxy)
151151
```console
152-
curl -v -p --proxy-key certs/master/private/proxy-client.key --proxy-cert certs/master/issued/proxy-client.crt --proxy-cacert certs/master/issued/ca.crt --proxy-cert-type PEM -x https://127.0.0.1:8090 http://localhost:8000```
152+
curl -v -p --proxy-key certs/frontend/private/proxy-client.key --proxy-cert certs/frontend/issued/proxy-client.crt --proxy-cacert certs/frontend/issued/ca.crt --proxy-cert-type PEM -x https://127.0.0.1:8090 http://localhost:8000
153153
```
154154

155155
### Running on kubernetes

cmd/agent/main.go

-1
Original file line numberDiff line numberDiff line change
@@ -50,4 +50,3 @@ func main() {
5050
os.Exit(1)
5151
}
5252
}
53-

cmd/server/app/server.go

+11-12
Original file line numberDiff line numberDiff line change
@@ -87,16 +87,16 @@ func (p *Proxy) run(o *options.ProxyRunOptions) error {
8787
KubernetesClient: k8sClient,
8888
AuthenticationAudience: o.AuthenticationAudience,
8989
}
90-
klog.V(1).Infoln("Starting master server for client connections.")
90+
klog.V(1).Infoln("Starting frontend server for client connections.")
9191
ps, err := server.GenProxyStrategiesFromStr(o.ProxyStrategies)
9292
if err != nil {
9393
return err
9494
}
9595
server := server.NewProxyServer(o.ServerID, ps, int(o.ServerCount), authOpt)
9696

97-
masterStop, err := p.runMasterServer(ctx, o, server)
97+
frontendStop, err := p.runFrontendServer(ctx, o, server)
9898
if err != nil {
99-
return fmt.Errorf("failed to run the master server: %v", err)
99+
return fmt.Errorf("failed to run the frontend server: %v", err)
100100
}
101101

102102
klog.V(1).Infoln("Starting agent server for tunnel connections.")
@@ -119,8 +119,8 @@ func (p *Proxy) run(o *options.ProxyRunOptions) error {
119119
<-stopCh
120120
klog.V(1).Infoln("Shutting down server.")
121121

122-
if masterStop != nil {
123-
masterStop()
122+
if frontendStop != nil {
123+
frontendStop()
124124
}
125125

126126
return nil
@@ -155,14 +155,14 @@ func getUDSListener(ctx context.Context, udsName string) (net.Listener, error) {
155155
return lis, nil
156156
}
157157

158-
func (p *Proxy) runMasterServer(ctx context.Context, o *options.ProxyRunOptions, server *server.ProxyServer) (StopFunc, error) {
158+
func (p *Proxy) runFrontendServer(ctx context.Context, o *options.ProxyRunOptions, server *server.ProxyServer) (StopFunc, error) {
159159
if o.UdsName != "" {
160-
return p.runUDSMasterServer(ctx, o, server)
160+
return p.runUDSFrontendServer(ctx, o, server)
161161
}
162-
return p.runMTLSMasterServer(ctx, o, server)
162+
return p.runMTLSFrontendServer(ctx, o, server)
163163
}
164164

165-
func (p *Proxy) runUDSMasterServer(ctx context.Context, o *options.ProxyRunOptions, s *server.ProxyServer) (StopFunc, error) {
165+
func (p *Proxy) runUDSFrontendServer(ctx context.Context, o *options.ProxyRunOptions, s *server.ProxyServer) (StopFunc, error) {
166166
if o.DeleteUDSFile {
167167
if err := os.Remove(o.UdsName); err != nil && !os.IsNotExist(err) {
168168
klog.ErrorS(err, "failed to delete file", "file", o.UdsName)
@@ -237,7 +237,7 @@ func (p *Proxy) getTLSConfig(caFile, certFile, keyFile string) (*tls.Config, err
237237
return tlsConfig, nil
238238
}
239239

240-
func (p *Proxy) runMTLSMasterServer(ctx context.Context, o *options.ProxyRunOptions, s *server.ProxyServer) (StopFunc, error) {
240+
func (p *Proxy) runMTLSFrontendServer(ctx context.Context, o *options.ProxyRunOptions, s *server.ProxyServer) (StopFunc, error) {
241241
var stop StopFunc
242242

243243
var tlsConfig *tls.Config
@@ -277,7 +277,7 @@ func (p *Proxy) runMTLSMasterServer(ctx context.Context, o *options.ProxyRunOpti
277277
go func() {
278278
err := server.ListenAndServeTLS("", "") // empty files defaults to tlsConfig
279279
if err != nil {
280-
klog.ErrorS(err, "failed to listen on master port")
280+
klog.ErrorS(err, "failed to listen on frontend port")
281281
}
282282
}()
283283
}
@@ -371,4 +371,3 @@ func (p *Proxy) runHealthServer(o *options.ProxyRunOptions, server *server.Proxy
371371

372372
return nil
373373
}
374-

cmd/server/main.go

-1
Original file line numberDiff line numberDiff line change
@@ -51,4 +51,3 @@ func main() {
5151
os.Exit(1)
5252
}
5353
}
54-

cmd/test-server/main.go

+5-5
Original file line numberDiff line numberDiff line change
@@ -111,17 +111,17 @@ func (p *TestServer) run(o *TestServerRunOptions) error {
111111
defer cancel()
112112

113113
klog.Info("Starting test http server for client requests.")
114-
masterStop, err := p.runMasterServer(ctx, o)
114+
testStop, err := p.runTestServer(ctx, o)
115115
if err != nil {
116-
return fmt.Errorf("failed to run the master server: %v", err)
116+
return fmt.Errorf("failed to run the test server: %v", err)
117117
}
118118

119119
stopCh := SetupSignalHandler()
120120
<-stopCh
121121
klog.Info("Shutting down server.")
122122

123-
if masterStop != nil {
124-
masterStop()
123+
if testStop != nil {
124+
testStop()
125125
}
126126

127127
return nil
@@ -187,7 +187,7 @@ func sleepReturnSuccess(w http.ResponseWriter, req *http.Request) {
187187
returnSuccess(w, req)
188188
}
189189

190-
func (p *TestServer) runMasterServer(ctx context.Context, o *TestServerRunOptions) (StopFunc, error) {
190+
func (p *TestServer) runTestServer(ctx context.Context, o *TestServerRunOptions) (StopFunc, error) {
191191
muxHandler := http.NewServeMux()
192192
muxHandler.HandleFunc("/success", returnSuccess)
193193
muxHandler.HandleFunc("/sleep", sleepReturnSuccess)

examples/kubernetes/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ CLUSTER_KEY=/etc/srv/kubernetes/pki/apiserver.key
3232
```
3333

3434
# Register SERVER_TOKEN in [static-token-file](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#static-token-file)
35-
Append the output of the following line to the [static-token-file](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#static-token-file) and restart **kube-apiserver** on the master
35+
Append the output of the following line to the [static-token-file](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#static-token-file) and restart **kube-apiserver** on the control plane.
3636
```bash
3737
echo "${SERVER_TOKEN},system:konnectivity-server,uid:system:konnectivity-server"
3838
```
@@ -46,7 +46,7 @@ K8S_API_PID=$(sudo crictl ps | grep kube-apiserver | awk '{ print $1; }')
4646
sudo crictl stop ${K8S_API_PID}
4747
```
4848

49-
# Save following config at /etc/srv/kubernetes/konnectivity-server/kubeconfig on master VM
49+
# Save following config at /etc/srv/kubernetes/konnectivity-server/kubeconfig on control plane VM
5050
```bash
5151
SERVER_TOKEN=${SERVER_TOKEN} envsubst < examples/kubernetes/kubeconfig
5252
```

pkg/features/features.go

+1
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ const (
2525
// NodeToMasterTraffic enables the traffic initiated in the agents side
2626
// to flow to the server side e.g. Kubelet to KAS and pods to KAS traffic
2727
// (KEP-2025).
28+
// TODO (#issues/232) Determine how to safely fix the feature gate name.
2829
NodeToMasterTraffic featuregate.Feature = "NodeToMasterTraffic"
2930
)
3031

pkg/server/metrics/metrics.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ var (
4545
type ServerMetrics struct {
4646
latencies *prometheus.HistogramVec
4747
connections *prometheus.GaugeVec
48-
backend *prometheus.GaugeVec
48+
backend *prometheus.GaugeVec
4949
}
5050

5151
// newServerMetrics create a new ServerMetrics, configured with default metric names.
@@ -80,14 +80,14 @@ func newServerMetrics() *ServerMetrics {
8080
},
8181
[]string{},
8282
)
83-
83+
8484
prometheus.MustRegister(latencies)
8585
prometheus.MustRegister(connections)
8686
prometheus.MustRegister(backend)
8787
return &ServerMetrics{
88-
latencies: latencies,
88+
latencies: latencies,
8989
connections: connections,
90-
backend: backend,
90+
backend: backend,
9191
}
9292
}
9393

0 commit comments

Comments
 (0)