Operator UI - Provide and store License key - New License section in Operator UI will allow user to provide the license key via input form - New License section in Operator UI will allow the user to fetch the license key using subnet credentials - Console backend has to verify provided license is valid - https://godoc.org/github.com/minio/minio/pkg/licverifier#example-package - Console backend has to store the license key in k8s secrets Operator UI - Set license to tenant during provisioning - Check if license key exists in k8s secret during tenant creation - If License is present attach the license-key jwt to the new console tenant via an environment variable Operator UI - Set license for an existing tenant - Tenant view will display information about the current status of the Tenant License - If Tenant doesn't have a License then Operator-UI will allow to attach new license by clicking the Add License button - Console backend will extract the license from the k8s secret and save the license-key jwt in the tenant console environment variable and redeploy
66 lines
2.4 KiB
Go
66 lines
2.4 KiB
Go
// This file is part of MinIO Kubernetes Cloud
|
|
// Copyright (c) 2020 MinIO, Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package cluster
|
|
|
|
import (
|
|
operator "github.com/minio/operator/pkg/client/clientset/versioned"
|
|
"k8s.io/client-go/kubernetes"
|
|
"k8s.io/client-go/rest"
|
|
certutil "k8s.io/client-go/util/cert"
|
|
)
|
|
|
|
// getTLSClientConfig will return the right TLS configuration for the K8S client based on the configured TLS certificate
|
|
func getTLSClientConfig() rest.TLSClientConfig {
|
|
var defaultRootCAFile = "/var/run/secrets/kubernetes.io/serviceaccount/ca.crt"
|
|
var customRootCAFile = getK8sAPIServerTLSRootCA()
|
|
tlsClientConfig := rest.TLSClientConfig{}
|
|
// if console is running inside k8s by default he will have access to the CA Cert from the k8s local authority
|
|
if _, err := certutil.NewPool(defaultRootCAFile); err == nil {
|
|
tlsClientConfig.CAFile = defaultRootCAFile
|
|
}
|
|
// if the user explicitly define a custom CA certificate, instead, we will use that
|
|
if customRootCAFile != "" {
|
|
if _, err := certutil.NewPool(customRootCAFile); err == nil {
|
|
tlsClientConfig.CAFile = customRootCAFile
|
|
}
|
|
}
|
|
return tlsClientConfig
|
|
}
|
|
|
|
// This operation will run only once at console startup
|
|
var tlsClientConfig = getTLSClientConfig()
|
|
|
|
func GetK8sConfig(token string) *rest.Config {
|
|
config := &rest.Config{
|
|
Host: GetK8sAPIServer(),
|
|
TLSClientConfig: tlsClientConfig,
|
|
APIPath: "/",
|
|
BearerToken: token,
|
|
}
|
|
return config
|
|
}
|
|
|
|
// OperatorClient returns an operator client using GetK8sConfig for its config
|
|
func OperatorClient(token string) (*operator.Clientset, error) {
|
|
return operator.NewForConfig(GetK8sConfig(token))
|
|
}
|
|
|
|
// K8sClient returns kubernetes client using GetK8sConfig for its config
|
|
func K8sClient(token string) (*kubernetes.Clientset, error) {
|
|
return kubernetes.NewForConfig(GetK8sConfig(token))
|
|
}
|