
* images/kube-webhook-certgen/rootfs/README.md: remove trailing whitespace Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com> * images/kube-webhook-certgen/rootfs: improve code formatting Automatically using gofumpt. Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com> * images/kube-webhook-certgen/rootfs: remove executable bits from files Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com> * images/kube-webhook-certgen/rootfs/cmd: remove unreachable code log.Fatal(|f) will alread call os.Exit(1), so this code is never reached. Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com> * images/kube-webhook-certgen/rootfs/pkg/k8s: fix unit tests Right now they fail as everything else migrated from using v1beta1 to v1. Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com> * images/kube-webhook-certgen/rootfs: create clientset in cmd package So one can easily mock the client, without touching unexported parts of the code and to soften the dependency between CLI code (kubeconfig path). Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com> * images/kube-webhook-certgen/rootfs/cmd: simplify bool logic Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com> * images/kube-webhook-certgen/rootfs/pkg/k8s: improve formatting Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com> * images/kube-webhook-certgen/rootfs/pkg/k8s: improve variable names Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com> * images/kube-webhook-certgen/rootfs/pkg/k8s: refactor a bit Move patching logic to separate functions. Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com> * images/kube-webhook-certgen/rootfs/pkg/k8s: fix error log messages In patchMutating() function, log messages were waying still patching validating webhook. Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com>
41 lines
1.6 KiB
Go
41 lines
1.6 KiB
Go
package cmd
|
|
|
|
import (
|
|
"github.com/jet/kube-webhook-certgen/pkg/certs"
|
|
"github.com/jet/kube-webhook-certgen/pkg/k8s"
|
|
log "github.com/sirupsen/logrus"
|
|
"github.com/spf13/cobra"
|
|
)
|
|
|
|
var create = &cobra.Command{
|
|
Use: "create",
|
|
Short: "Generate a ca and server cert+key and store the results in a secret 'secret-name' in 'namespace'",
|
|
Long: "Generate a ca and server cert+key and store the results in a secret 'secret-name' in 'namespace'",
|
|
PreRun: configureLogging,
|
|
Run: createCommand,
|
|
}
|
|
|
|
func createCommand(cmd *cobra.Command, args []string) {
|
|
k := k8s.New(newKubernetesClient(cfg.kubeconfig))
|
|
ca := k.GetCaFromSecret(cfg.secretName, cfg.namespace)
|
|
if ca == nil {
|
|
log.Info("creating new secret")
|
|
newCa, newCert, newKey := certs.GenerateCerts(cfg.host)
|
|
ca = newCa
|
|
k.SaveCertsToSecret(cfg.secretName, cfg.namespace, cfg.certName, cfg.keyName, ca, newCert, newKey)
|
|
} else {
|
|
log.Info("secret already exists")
|
|
}
|
|
}
|
|
|
|
func init() {
|
|
rootCmd.AddCommand(create)
|
|
create.Flags().StringVar(&cfg.host, "host", "", "Comma-separated hostnames and IPs to generate a certificate for")
|
|
create.Flags().StringVar(&cfg.secretName, "secret-name", "", "Name of the secret where certificate information will be written")
|
|
create.Flags().StringVar(&cfg.namespace, "namespace", "", "Namespace of the secret where certificate information will be written")
|
|
create.Flags().StringVar(&cfg.certName, "cert-name", "cert", "Name of cert file in the secret")
|
|
create.Flags().StringVar(&cfg.keyName, "key-name", "key", "Name of key file in the secret")
|
|
create.MarkFlagRequired("host")
|
|
create.MarkFlagRequired("secret-name")
|
|
create.MarkFlagRequired("namespace")
|
|
}
|