Skip to content

kubernetes-sigs/apiserver-network-proxy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

8bf6a95 · Feb 11, 2020
Jan 15, 2020
Feb 11, 2020
Feb 6, 2020
May 1, 2019
Feb 7, 2020
Feb 11, 2020
Feb 7, 2020
Feb 7, 2020
Sep 10, 2019
Apr 16, 2019
Apr 16, 2019
Feb 7, 2020
Feb 6, 2020
Jan 14, 2020
Apr 16, 2019
Nov 11, 2019
Apr 16, 2019
Feb 7, 2020
Feb 6, 2020

Repository files navigation

apiserver-network-proxy

Created due to kubernetes/org#715.

Community, discussion, contribution, and support

Learn how to engage with the Kubernetes community on the community page.

You can reach the maintainers of this project at:

Code of conduct

Participation in the Kubernetes community is governed by the Kubernetes Code of Conduct.

Build

Please make sure you have the REGISTRY and PROJECT_ID environment variables set. For local builds these can be set to anything. For image builds these determine the location of your image. For GCE the registry should be gcr.io and PROJECT_ID should be the project you want to use the images in.

Local builds

make clean
make certs
make build

Build images

build docker/proxy-server
build docker/proxy-agent

Examples

The current examples run two actual services as well as a sample client on one end and a sample destination for requests on the other.

  • Proxy service: The proxy service takes the API server requests and forwards them appropriately.
  • Agent service: The agent service connects to the proxy and then allows traffic to be forwarded to it.

GRPC Client using mTLS Proxy with dial back Agent

client =HTTP over GRPC=> (:8090) proxy (:8091) <=GRPC= agent =HTTP=> SimpleHTTPServer(:8000)
  |                                                    ^
  |                          Tunnel                    |
  +----------------------------------------------------+
  • Start SimpleHTTPServer (Sample destination)
python -m SimpleHTTPServer
  • Start proxy service
./bin/proxy-server --server-ca-cert=certs/master/issued/ca.crt --server-cert=certs/master/issued/proxy-master.crt --server-key=certs/master/private/proxy-master.key --cluster-ca-cert=certs/agent/issued/ca.crt --cluster-cert=certs/agent/issued/proxy-master.crt --cluster-key=certs/agent/private/proxy-master.key
  • Start agent service
./bin/proxy-agent --ca-cert=certs/agent/issued/ca.crt --agent-cert=certs/agent/issued/proxy-agent.crt --agent-key=certs/agent/private/proxy-agent.key
  • Run client (mTLS enabled sample client)
./bin/proxy-test-client --ca-cert=certs/master/issued/ca.crt --client-cert=certs/master/issued/proxy-client.crt --client-key=certs/master/private/proxy-client.key

HTTP-Connect Client using mTLS Proxy with dial back Agent (Either curl OR test client)

client =HTTP-CONNECT=> (:8090) proxy (:8091) <=GRPC= agent =HTTP=> SimpleHTTPServer(:8000)
  |                                                    ^
  |                          Tunnel                    |
  +----------------------------------------------------+
  • Start SimpleHTTPServer (Sample destination)
python -m SimpleHTTPServer
  • Start proxy service
./bin/proxy-server --mode=http-connect --server-ca-cert=certs/master/issued/ca.crt --server-cert=certs/master/issued/proxy-master.crt --server-key=certs/master/private/proxy-master.key --cluster-ca-cert=certs/agent/issued/ca.crt --cluster-cert=certs/agent/issued/proxy-master.crt --cluster-key=certs/agent/private/proxy-master.key
  • Start agent service
./bin/proxy-agent --ca-cert=certs/agent/issued/ca.crt --agent-cert=certs/agent/issued/proxy-agent.crt --agent-key=certs/agent/private/proxy-agent.key
  • Run client (mTLS & http-connect enabled sample client)
./bin/proxy-test-client --mode=http-connect  --proxy-host=127.0.0.1 --ca-cert=certs/master/issued/ca.crt --client-cert=certs/master/issued/proxy-client.crt --client-key=certs/master/private/proxy-client.key
  • Run curl client (curl using a mTLS http-connect proxy)
curl -v -p --proxy-key certs/master/private/proxy-client.key --proxy-cert certs/master/issued/proxy-client.crt --proxy-cacert certs/master/issued/ca.crt --proxy-cert-type PEM -x https://127.0.0.1:8090  http://localhost:8000```

Running on kubernetes

See following README.md

Troubleshoot

Undefined ProtoPackageIsVersion3

As explained in golang/protobuf#763 (comment), protoc-gen-go binary has to be built from the vendored version:

go install ./vendor/github.com/golang/protobuf/protoc-gen-go
make gen