cert-manager/cmd/webhook/app/webhook.go
JoshVanL c3e2aae551
Fix binary names, printing errors, and help messages
Signed-off-by: JoshVanL <vleeuwenjoshua@gmail.com>
2020-06-26 13:47:11 +01:00

110 lines
3.7 KiB
Go

/*
Copyright 2020 The Jetstack cert-manager contributors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package app
import (
"context"
"fmt"
"github.com/spf13/cobra"
"k8s.io/client-go/tools/clientcmd"
"github.com/jetstack/cert-manager/cmd/webhook/app/options"
"github.com/jetstack/cert-manager/pkg/logs"
logf "github.com/jetstack/cert-manager/pkg/logs"
"github.com/jetstack/cert-manager/pkg/util"
"github.com/jetstack/cert-manager/pkg/webhook"
"github.com/jetstack/cert-manager/pkg/webhook/authority"
"github.com/jetstack/cert-manager/pkg/webhook/handlers"
"github.com/jetstack/cert-manager/pkg/webhook/server"
"github.com/jetstack/cert-manager/pkg/webhook/server/tls"
)
var validationHook handlers.ValidatingAdmissionHook = handlers.NewRegistryBackedValidator(logs.Log, webhook.Scheme, webhook.ValidationRegistry)
var mutationHook handlers.MutatingAdmissionHook = handlers.NewSchemeBackedDefaulter(logs.Log, webhook.Scheme)
var conversionHook handlers.ConversionHook = handlers.NewSchemeBackedConverter(logs.Log, webhook.Scheme)
func NewServer(opts options.WebhookOptions, stopCh <-chan struct{}) (*server.Server, error) {
rootCtx := util.ContextWithStopCh(context.Background(), stopCh)
rootCtx = logf.NewContext(rootCtx, nil, "webhook")
log := logf.FromContext(rootCtx)
var source tls.CertificateSource
switch {
case options.FileTLSSourceEnabled(opts):
log.Info("using TLS certificate from local filesystem", "private_key_path", opts.TLSKeyFile, "certificate", opts.TLSCertFile)
source = &tls.FileCertificateSource{
CertPath: opts.TLSCertFile,
KeyPath: opts.TLSKeyFile,
Log: log,
}
case options.DynamicTLSSourceEnabled(opts):
restcfg, err := clientcmd.BuildConfigFromFlags("", opts.Kubeconfig)
if err != nil {
return nil, err
}
log.Info("using dynamic certificate generating using CA stored in Secret resource", "secret_namespace", opts.DynamicServingCASecretNamespace, "secret_name", opts.DynamicServingCASecretName)
source = &tls.DynamicSource{
DNSNames: opts.DynamicServingDNSNames,
Authority: &authority.DynamicAuthority{
SecretNamespace: opts.DynamicServingCASecretNamespace,
SecretName: opts.DynamicServingCASecretName,
RESTConfig: restcfg,
Log: log,
},
Log: log,
}
default:
log.Info("warning: serving insecurely as tls certificate data not provided")
}
return &server.Server{
ListenAddr: fmt.Sprintf(":%d", opts.ListenPort),
HealthzAddr: fmt.Sprintf(":%d", opts.HealthzPort),
EnablePprof: true,
CertificateSource: source,
CipherSuites: opts.TLSCipherSuites,
MinTLSVersion: opts.MinTLSVersion,
ValidationWebhook: validationHook,
MutationWebhook: mutationHook,
ConversionWebhook: conversionHook,
Log: log,
}, nil
}
func NewServerCommand(stopCh <-chan struct{}) *cobra.Command {
var opts options.WebhookOptions
cmd := &cobra.Command{
Use: "webhook",
Short: fmt.Sprintf("Webhook component providing API validation, mutation and conversion functionality for cert-manager (%s) (%s)", util.AppVersion, util.AppGitCommit),
RunE: func(cmd *cobra.Command, args []string) error {
srv, err := NewServer(opts, stopCh)
if err != nil {
return err
}
return srv.Run(stopCh)
},
}
opts.AddFlags(cmd.Flags())
return cmd
}