ingress-nginx-helm/internal/ingress/resolver/main.go

89 lines
2.8 KiB
Go
Raw Normal View History

/*
Copyright 2017 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package resolver
import (
2017-09-17 18:42:31 +00:00
apiv1 "k8s.io/api/core/v1"
2017-11-07 22:02:12 +00:00
"k8s.io/ingress-nginx/internal/ingress/defaults"
)
2017-11-08 20:58:57 +00:00
// Resolver is an interface that knows how to extract information from a controller
type Resolver interface {
// GetDefaultBackend returns the backend that must be used as default
GetDefaultBackend() defaults.Backend
// GetConfigMap searches for configmap containing the namespace and name usting the character /
GetConfigMap(string) (*apiv1.ConfigMap, error)
// GetSecret searches for secrets containing the namespace and name using a the character /
2017-09-17 18:42:31 +00:00
GetSecret(string) (*apiv1.Secret, error)
// GetAuthCertificate resolves a given secret name into an SSL certificate and CRL.
// The secret must contain 2 keys named:
2017-11-08 20:58:57 +00:00
// ca.crt: contains the certificate chain used for authentication
// ca.crl: contains the revocation list used for authentication
2017-01-10 12:16:18 +00:00
GetAuthCertificate(string) (*AuthSSLCert, error)
// GetService searches for services containing the namespace and name using a the character /
2017-09-17 18:42:31 +00:00
GetService(string) (*apiv1.Service, error)
2017-08-25 15:50:08 +00:00
}
2017-01-10 12:16:18 +00:00
// AuthSSLCert contains the necessary information to do certificate based
// authentication of an ingress location
type AuthSSLCert struct {
// Secret contains the name of the secret this was fetched from
Secret string `json:"secret"`
// CAFileName contains the path to the secrets 'ca.crt'
CAFileName string `json:"caFilename"`
2019-08-13 21:14:55 +00:00
// CASHA contains the SHA1 hash of the 'ca.crt' or combinations of (tls.crt, tls.key, tls.crt) depending on certs in secret
CASHA string `json:"caSha"`
// CRLFileName contains the path to the secrets 'ca.crl'
CRLFileName string `json:"crlFileName"`
// CRLSHA contains the SHA1 hash of the 'ca.crl' file
CRLSHA string `json:"crlSha"`
}
2017-07-27 03:07:59 +00:00
// Equal tests for equality between two AuthSSLCert types
func (asslc1 *AuthSSLCert) Equal(assl2 *AuthSSLCert) bool {
if asslc1 == assl2 {
return true
}
if asslc1 == nil || assl2 == nil {
return false
}
if asslc1.Secret != assl2.Secret {
return false
}
if asslc1.CAFileName != assl2.CAFileName {
return false
}
2019-08-13 21:14:55 +00:00
if asslc1.CASHA != assl2.CASHA {
return false
}
if asslc1.CRLFileName != assl2.CRLFileName {
return false
}
if asslc1.CRLSHA != assl2.CRLSHA {
return false
}
return true
}