Compare commits

...

7 Commits

Author SHA1 Message Date
Martin Šalata
26a7b374e2 Add update permission for secrets 2021-04-06 11:03:57 +02:00
Martin Šalata
f098c48dcf Add a check for the correct secret type 2021-04-06 10:07:54 +02:00
Martin Šalata
6e67d5b87c Move k8s client setup to the constructor 2021-04-06 09:59:10 +02:00
Martin Šalata
eb5fe7944b Set ttlSecondsAfterFinished on Jobs to prevent helm upgrade failures 2021-04-06 09:50:54 +02:00
Martin Šalata
c41499b934 Use GITHUB_TOKEN for releasing helm chart 2021-04-05 22:30:28 +02:00
salatamartin
bc86f0e9ab Merge pull request #1 from ysoftdevs/devel 2021-04-05 22:08:13 +02:00
Martin Šalata
af35fd73f0 Add devel to the docker releases 2021-04-05 21:02:19 +02:00
8 changed files with 48 additions and 26 deletions

View File

@@ -52,4 +52,4 @@ jobs:
with:
charts_dir: 'helm'
env:
CR_TOKEN: '${{ secrets.CR_TOKEN }}'
CR_TOKEN: '${{ secrets.GITHUB_TOKEN }}'

View File

@@ -1 +1 @@
0.0.9
0.0.10

View File

@@ -60,9 +60,9 @@ func main() {
glog.Infof("Running with config: %+v", parameters)
whsvr := &WebhookServer{
config: &parameters,
server: &http.Server{
whsvr, err := NewWebhookServer(
&parameters,
&http.Server{
Addr: fmt.Sprintf(":%v", parameters.port),
// This is quite inefficient as it loads file contents on every TLS ClientHello, but ¯\_(ツ)_/¯
TLSConfig: &tls.Config{GetCertificate: func(info *tls.ClientHelloInfo) (*tls.Certificate, error) {
@@ -71,6 +71,9 @@ func main() {
return &cert, err
}},
},
)
if err != nil {
glog.Exitf("Could not create the Webhook server: %v", err)
}
// define http server and server handler

View File

@@ -30,6 +30,7 @@ var (
type WebhookServer struct {
server *http.Server
config *WhSvrParameters
client *kubernetes.Clientset
}
// Webhook Server parameters
@@ -57,6 +58,26 @@ var (
}
)
func NewWebhookServer(parameters *WhSvrParameters, server *http.Server) (*WebhookServer, error) {
config, err := rest.InClusterConfig()
if err != nil {
glog.Errorf("Could not create k8s client: %v", err)
return nil, err
}
clientset, err := kubernetes.NewForConfig(config)
if err != nil {
glog.Errorf("Could not create k8s clientset: %v", err)
return nil, err
}
return &WebhookServer{
config: parameters,
server: server,
client: clientset,
}, nil
}
func DefaultParametersObject() WhSvrParameters {
return WhSvrParameters{
port: 8443,
@@ -126,46 +147,41 @@ func getCurrentNamespace() string {
func (whsvr *WebhookServer) ensureSecrets(ar *v1beta1.AdmissionReview) error {
glog.Infof("Ensuring existing secrets")
namespace := ar.Request.Namespace
targetNamespace := ar.Request.Namespace
config, err := rest.InClusterConfig()
if err != nil {
glog.Errorf("Could not create k8s client: %v", err)
return err
}
clientset, err := kubernetes.NewForConfig(config)
if err != nil {
glog.Errorf("Could not create k8s clientset: %v", err)
return err
}
currentNamespace := getCurrentNamespace()
glog.Infof("Looking for the source secret")
sourceSecret, err := clientset.CoreV1().Secrets(whsvr.config.sourceImagePullSecretNamespace).Get(whsvr.config.sourceImagePullSecretName, metav1.GetOptions{})
sourceSecret, err := whsvr.client.CoreV1().Secrets(whsvr.config.sourceImagePullSecretNamespace).Get(whsvr.config.sourceImagePullSecretName, metav1.GetOptions{})
if err != nil {
glog.Errorf("Could not fetch source secret %s in namespace %s: %v", whsvr.config.sourceImagePullSecretName, currentNamespace, err)
return err
}
if sourceSecret.Type != corev1.SecretTypeDockerConfigJson {
err := fmt.Errorf("source secret %s in namespace %s exists, but has incorrect type (is %s, should be %s)", whsvr.config.sourceImagePullSecretName, currentNamespace, sourceSecret.Type, corev1.SecretTypeDockerConfigJson)
glog.Errorf("%v", err)
return err
}
glog.Infof("Source secret found")
glog.Infof("Looking for the existing target secret")
secret, err := clientset.CoreV1().Secrets(namespace).Get(whsvr.config.targetImagePullSecretName, metav1.GetOptions{})
secret, err := whsvr.client.CoreV1().Secrets(targetNamespace).Get(whsvr.config.targetImagePullSecretName, metav1.GetOptions{})
if err != nil && !errors.IsNotFound(err) {
glog.Errorf("Could not fetch secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, namespace, err)
glog.Errorf("Could not fetch secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, targetNamespace, err)
return err
}
if err != nil && errors.IsNotFound(err) {
glog.Infof("Target secret not found, creating a new one")
if _, createErr := clientset.CoreV1().Secrets(namespace).Create(&corev1.Secret{
if _, createErr := whsvr.client.CoreV1().Secrets(targetNamespace).Create(&corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: whsvr.config.targetImagePullSecretName,
Namespace: namespace,
Namespace: targetNamespace,
},
Data: sourceSecret.Data,
Type: sourceSecret.Type,
}); createErr != nil {
glog.Errorf("Could not create secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, namespace, err)
glog.Errorf("Could not create secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, targetNamespace, err)
return err
}
glog.Infof("Target secret created successfully")
@@ -174,8 +190,8 @@ func (whsvr *WebhookServer) ensureSecrets(ar *v1beta1.AdmissionReview) error {
glog.Infof("Target secret found, updating")
secret.Data = sourceSecret.Data
if _, err := clientset.CoreV1().Secrets(namespace).Update(secret); err != nil {
glog.Errorf("Could not update secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, namespace, err)
if _, err := whsvr.client.CoreV1().Secrets(targetNamespace).Update(secret); err != nil {
glog.Errorf("Could not update secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, targetNamespace, err)
return err
}
glog.Infof("Target secret updated successfully")

View File

@@ -15,9 +15,9 @@ type: application
# This is the chart version. This version number should be incremented each time you make changes
# to the chart and its templates, including the app version.
# Versions are expected to follow Semantic Versioning (https://semver.org/)
version: 0.0.16
version: 0.0.19
# This is the version number of the application being deployed. This version number should be
# incremented each time you make changes to the application. Versions are not expected to
# follow Semantic Versioning. They should reflect the version the application is using.
appVersion: 0.0.9
appVersion: 0.0.10

View File

@@ -12,6 +12,7 @@ spec:
labels:
{{- include "imagepullsecret-injector.labels" . | nindent 8 }}
spec:
ttlSecondsAfterFinished: 30
template:
spec:
serviceAccountName: imagepullsecret-injector-cert-gen

View File

@@ -5,6 +5,7 @@ metadata:
labels:
{{- include "imagepullsecret-injector.labels" . | nindent 4 }}
spec:
ttlSecondsAfterFinished: 30
template:
spec:
serviceAccountName: imagepullsecret-injector-cert-gen

View File

@@ -25,6 +25,7 @@ rules:
- create
- get
- delete
- update
- apiGroups:
- ""
resources: