so that CertificateRequets will be re-synced on informed Secrets which are referenced with "cert-manager.io/private-key-secret-name" Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
222 lines
8.4 KiB
Go
222 lines
8.4 KiB
Go
/*
|
|
Copyright 2020 The cert-manager Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package certificaterequests
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/go-logr/logr"
|
|
k8sErrors "k8s.io/apimachinery/pkg/api/errors"
|
|
corelisters "k8s.io/client-go/listers/core/v1"
|
|
"k8s.io/client-go/tools/cache"
|
|
"k8s.io/client-go/tools/record"
|
|
"k8s.io/client-go/util/workqueue"
|
|
"k8s.io/utils/clock"
|
|
|
|
v1 "github.com/cert-manager/cert-manager/pkg/apis/certmanager/v1"
|
|
cmclient "github.com/cert-manager/cert-manager/pkg/client/clientset/versioned"
|
|
cmlisters "github.com/cert-manager/cert-manager/pkg/client/listers/certmanager/v1"
|
|
controllerpkg "github.com/cert-manager/cert-manager/pkg/controller"
|
|
"github.com/cert-manager/cert-manager/pkg/controller/certificaterequests/util"
|
|
"github.com/cert-manager/cert-manager/pkg/issuer"
|
|
logf "github.com/cert-manager/cert-manager/pkg/logs"
|
|
)
|
|
|
|
var keyFunc = controllerpkg.KeyFunc
|
|
|
|
// Issuer implements the functionality to sign a certificate request for a
|
|
// particular issuer type.
|
|
type Issuer interface {
|
|
Sign(context.Context, *v1.CertificateRequest, v1.GenericIssuer) (*issuer.IssueResponse, error)
|
|
}
|
|
|
|
// Issuer Contractor builds a Issuer instance using the given controller
|
|
// context.
|
|
type IssuerConstructor func(*controllerpkg.Context) Issuer
|
|
|
|
// RegisterExtraInformerFn is a function used by CertificateRequest controller
|
|
// implementations to add custom workqueue functions based on informers not
|
|
// covered in the main shared controller implementation.
|
|
// The returned set of InformerSyncs will be waited on when the controller
|
|
// starts.
|
|
type RegisterExtraInformerFn func(*controllerpkg.Context, logr.Logger, workqueue.RateLimitingInterface) ([]cache.InformerSynced, error)
|
|
|
|
// Controller is an implementation of the queueingController for
|
|
// certificate requests.
|
|
type Controller struct {
|
|
helper issuer.Helper
|
|
|
|
// clientset used to update cert-manager API resources
|
|
cmClient cmclient.Interface
|
|
|
|
// fieldManager is the manager name used for the Apply operations.
|
|
fieldManager string
|
|
|
|
certificateRequestLister cmlisters.CertificateRequestLister
|
|
|
|
// we need to wait for Secrets to be synced to avoid a situation where CA issuer's Secret
|
|
// is not yet in cached at a time when issuance is attempted,
|
|
// more details at https://github.com/cert-manager/cert-manager/issues/5216
|
|
secretLister corelisters.SecretLister
|
|
|
|
queue workqueue.RateLimitingInterface
|
|
|
|
// logger to be used by this controller
|
|
log logr.Logger
|
|
|
|
// used to record Events about resources to the API
|
|
recorder record.EventRecorder
|
|
|
|
// the issuer kind to react to when a certificate request is synced
|
|
issuerType string
|
|
|
|
issuerLister cmlisters.IssuerLister
|
|
clusterIssuerLister cmlisters.ClusterIssuerLister
|
|
|
|
//registerExtraInformers is a list of functions that CertificateRequest
|
|
//controllers can use to register custom informers.
|
|
registerExtraInformers []RegisterExtraInformerFn
|
|
|
|
// Issuer to call sign function
|
|
issuerConstructor IssuerConstructor
|
|
issuer Issuer
|
|
|
|
// used for testing
|
|
clock clock.Clock
|
|
|
|
reporter *util.Reporter
|
|
}
|
|
|
|
// New will construct a new certificaterequest controller using the given
|
|
// Issuer implementation.
|
|
// Note: the registerExtraInfromers passed here will be 'waited' for when
|
|
// starting to ensure their corresponding listers have synced.
|
|
// The caller is responsible for ensuring the informer work functions are setup
|
|
// correctly on any informer.
|
|
// It's also the callers responsibility to ensure the Run function on the
|
|
// informer is called in order to start the reflector. This is handled
|
|
// automatically when the informer factory's Start method is called, if the
|
|
// given informer was obtained using a SharedInformerFactory.
|
|
func New(issuerType string, issuerConstructor IssuerConstructor, registerExtraInformers ...RegisterExtraInformerFn) *Controller {
|
|
return &Controller{
|
|
issuerType: issuerType,
|
|
issuerConstructor: issuerConstructor,
|
|
registerExtraInformers: registerExtraInformers,
|
|
}
|
|
}
|
|
|
|
// Register registers and constructs the controller using the provided context.
|
|
// It returns the workqueue to be used to enqueue items, a list of
|
|
// InformerSynced functions that must be synced, or an error.
|
|
func (c *Controller) Register(ctx *controllerpkg.Context) (workqueue.RateLimitingInterface, []cache.InformerSynced, error) {
|
|
componentName := "certificaterequests-issuer-" + c.issuerType
|
|
|
|
// construct a new named logger to be reused throughout the controller
|
|
c.log = logf.FromContext(ctx.RootContext, componentName)
|
|
|
|
// create a queue used to queue up items to be processed
|
|
c.queue = workqueue.NewNamedRateLimitingQueue(controllerpkg.DefaultItemBasedRateLimiter(), componentName)
|
|
|
|
secretsInformer := ctx.KubeSharedInformerFactory.Core().V1().Secrets()
|
|
issuerInformer := ctx.SharedInformerFactory.Certmanager().V1().Issuers()
|
|
c.issuerLister = issuerInformer.Lister()
|
|
c.secretLister = secretsInformer.Lister()
|
|
|
|
// obtain references to all the informers used by this controller
|
|
certificateRequestInformer := ctx.SharedInformerFactory.Certmanager().V1().CertificateRequests()
|
|
|
|
// build a list of InformerSynced functions that will be returned by the
|
|
// Register method. The controller will only begin processing items once all
|
|
// of these informers have synced.
|
|
|
|
mustSync := []cache.InformerSynced{
|
|
certificateRequestInformer.Informer().HasSynced,
|
|
issuerInformer.Informer().HasSynced,
|
|
secretsInformer.Informer().HasSynced,
|
|
}
|
|
for _, reg := range c.registerExtraInformers {
|
|
ms, err := reg(ctx, c.log, c.queue)
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("failed to register extra informer: %w", err)
|
|
}
|
|
mustSync = append(mustSync, ms...)
|
|
}
|
|
|
|
// if scoped to a single namespace
|
|
// if we are running in non-namespaced mode (i.e. --namespace=""), we also
|
|
// register event handlers and obtain a lister for clusterissuers.
|
|
if ctx.Namespace == "" {
|
|
clusterIssuerInformer := ctx.SharedInformerFactory.Certmanager().V1().ClusterIssuers()
|
|
c.clusterIssuerLister = clusterIssuerInformer.Lister()
|
|
// register handler function for clusterissuer resources
|
|
clusterIssuerInformer.Informer().AddEventHandler(&controllerpkg.BlockingEventHandler{WorkFunc: c.handleGenericIssuer})
|
|
mustSync = append(mustSync, clusterIssuerInformer.Informer().HasSynced)
|
|
}
|
|
|
|
// set all the references to the listers for used by the Sync function
|
|
c.certificateRequestLister = certificateRequestInformer.Lister()
|
|
|
|
// register handler functions
|
|
certificateRequestInformer.Informer().AddEventHandler(&controllerpkg.QueuingEventHandler{Queue: c.queue})
|
|
issuerInformer.Informer().AddEventHandler(&controllerpkg.BlockingEventHandler{WorkFunc: c.handleGenericIssuer})
|
|
// create an issuer helper for reading generic issuers
|
|
c.helper = issuer.NewHelper(c.issuerLister, c.clusterIssuerLister)
|
|
|
|
// clock is used to set the FailureTime of failed CertificateRequests
|
|
c.clock = ctx.Clock
|
|
// recorder records events about resources to the Kubernetes api
|
|
c.recorder = ctx.Recorder
|
|
c.reporter = util.NewReporter(c.clock, c.recorder)
|
|
c.cmClient = ctx.CMClient
|
|
c.fieldManager = ctx.FieldManager
|
|
|
|
// Construct the issuer implementation with the built component context.
|
|
c.issuer = c.issuerConstructor(ctx)
|
|
|
|
c.log.V(logf.DebugLevel).Info("new certificate request controller registered",
|
|
"type", c.issuerType)
|
|
|
|
return c.queue, mustSync, nil
|
|
}
|
|
|
|
// ProcessItem is the worker function that will be called with a new key from
|
|
// the workqueue. A key corresponds to a certificate request object.
|
|
func (c *Controller) ProcessItem(ctx context.Context, key string) error {
|
|
log := logf.FromContext(ctx)
|
|
dbg := log.V(logf.DebugLevel)
|
|
|
|
namespace, name, err := cache.SplitMetaNamespaceKey(key)
|
|
if err != nil {
|
|
log.Error(err, "invalid resource key")
|
|
return nil
|
|
}
|
|
|
|
cr, err := c.certificateRequestLister.CertificateRequests(namespace).Get(name)
|
|
if err != nil {
|
|
if k8sErrors.IsNotFound(err) {
|
|
dbg.Info(fmt.Sprintf("certificate request in work queue no longer exists: %s", err))
|
|
return nil
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
ctx = logf.NewContext(ctx, logf.WithResource(log, cr))
|
|
return c.Sync(ctx, cr)
|
|
}
|