Compare commits

..

44 Commits

Author SHA1 Message Date
Martin Šalata
f7dc6589f5 Make the deployment and the jobs run in a non-root environment 2021-07-26 10:32:43 +02:00
Martin Šalata
233491dec9 Make the cert signer use the v1 CSR instead of v1beta1 (deprecated since k8s v1.19) 2021-07-26 10:30:36 +02:00
Martin Šalata
56595e3e72 Set release version of helm/chart-releaser-action 2021-05-26 10:24:25 +02:00
Martin Šalata
6c5bd77b69 Rewrite CSR creation into jq to be more robust 2021-05-26 10:24:11 +02:00
Martin Šalata
c999960415 Make github release from release/legacy-csr 2021-05-26 09:38:30 +02:00
Martin Šalata
43fd3fd847 Move helm directory to charts 2021-04-13 12:43:20 +02:00
Martin Šalata
8e6dbd40c7 Bump versions 2021-04-13 12:40:34 +02:00
Martin Šalata
963ad89613 Rename jobs name for clarity 2021-04-13 12:40:23 +02:00
Martin Šalata
b5f4aead92 Refactor serve method 2021-04-13 12:39:51 +02:00
Martin Šalata
a8f458a770 Refactor helper methods into a separate file 2021-04-08 09:12:18 +02:00
Martin Šalata
26a7b374e2 Add update permission for secrets 2021-04-06 11:03:57 +02:00
Martin Šalata
f098c48dcf Add a check for the correct secret type 2021-04-06 10:07:54 +02:00
Martin Šalata
6e67d5b87c Move k8s client setup to the constructor 2021-04-06 09:59:10 +02:00
Martin Šalata
eb5fe7944b Set ttlSecondsAfterFinished on Jobs to prevent helm upgrade failures 2021-04-06 09:50:54 +02:00
Martin Šalata
c41499b934 Use GITHUB_TOKEN for releasing helm chart 2021-04-05 22:30:28 +02:00
salatamartin
bc86f0e9ab Merge pull request #1 from ysoftdevs/devel 2021-04-05 22:08:13 +02:00
Martin Šalata
c22716b470 Bump the chart version 2021-04-05 22:07:35 +02:00
Martin Šalata
ea8755766c Correct the Readme 2021-04-05 22:02:35 +02:00
Martin Šalata
ec9cd60d14 Use github-hosted images in helm 2021-04-05 22:02:22 +02:00
Martin Šalata
6234301c85 Switch dockerhub for Github's docker registry 2021-04-05 22:01:05 +02:00
Martin Šalata
af35fd73f0 Add devel to the docker releases 2021-04-05 21:02:19 +02:00
Martin Šalata
c97fc465e8 Add devel to the docker releases 2021-04-05 21:01:32 +02:00
Martin Šalata
1523ba232b Set cron job to run once a week 2021-04-05 09:06:41 +02:00
Martin Šalata
42be5e1041 Ignore webhook failures to allow entering hibernation 2021-04-04 21:23:00 +02:00
Martin Šalata
5d9930238a Fix apiGroup of certificatesigningrequests 2021-04-04 21:09:13 +02:00
Martin Šalata
ed1b29e8b5 Make CertificateSigningRequest namespaced 2021-04-04 20:36:21 +02:00
Martin Šalata
761a43ed1f Fix certificate generation script arguments 2021-04-04 20:26:44 +02:00
Martin Šalata
4e360ac34f Bump docker and helm versions 2021-04-04 18:47:19 +02:00
Martin Šalata
ee0e41ff32 Add secret type in readme 2021-04-04 18:47:02 +02:00
Martin Šalata
6c4db7d4d1 Standardize secret names 2021-04-04 18:45:24 +02:00
Martin Šalata
c7708d06e5 Add info to readme 2021-04-04 18:24:50 +02:00
Martin Šalata
7b45185392 Bump the chart version to 0.0.6 2021-04-03 13:39:16 +02:00
Martin Šalata
7b2c52406e Allow ignoring secret creating errors to preserve _some_ k8s functionality in case of issues 2021-04-03 13:38:21 +02:00
Martin Šalata
9219b83a9b Parametrize target secret name 2021-04-03 13:32:06 +02:00
Martin Šalata
184e0d3c07 Fix make fmt target 2021-04-03 13:25:27 +02:00
Martin Šalata
c8b6950f98 Fix chart-releaser condition 2021-04-02 23:57:56 +02:00
Martin Šalata
af6d743799 Fix chart-releaser condition 2021-04-02 23:54:59 +02:00
Martin Šalata
c8b307852f Bump images version 2021-04-02 23:48:27 +02:00
Martin Šalata
49a95747e6 Make helm releaser more robust 2021-04-02 23:44:16 +02:00
Martin Šalata
c80ce5e9a6 Setup release of docker images to dockerhub 2021-04-02 23:15:08 +02:00
Martin Šalata
cfa76c2953 Make make target naming matching 2021-04-02 22:57:47 +02:00
Martin Šalata
ed73fc0e65 Remove setup make step 2021-04-02 22:51:36 +02:00
Martin Šalata
9e86a2da44 Fix go build parentheses 2021-04-02 22:48:10 +02:00
Martin Šalata
efeb131dd1 Add a Github workflow for building docker images 2021-04-02 22:45:52 +02:00
24 changed files with 342 additions and 182 deletions

51
.github/workflows/release-chart.yaml vendored Normal file
View File

@@ -0,0 +1,51 @@
name: Release Charts
on:
push:
branches:
- main
- release/legacy-csr
paths:
- 'charts/**'
jobs:
release:
runs-on: ubuntu-latest
steps:
- name: Checkout
uses: actions/checkout@v1
- name: Configure Git
run: |
git config user.name "$GITHUB_ACTOR"
git config user.email "$GITHUB_ACTOR@users.noreply.github.com"
- name: Install Helm
uses: azure/setup-helm@v1
with:
version: v3.4.0
- name: Helm version checker
id: helm_version_checker
continue-on-error: true
run: |
helm repo add imagepullsecret-injector https://ysoftdevs.github.io/imagepullsecret-injector
helm repo update
newVersion="$(helm show chart helm/imagepullsecret-injector | grep version: | awk '{print $2}')"
echo "Trying to upload version $newVersion"
uploadedVersions="$(helm search repo imagepullsecret-injector/imagepullsecret-injector -l | tail -n +2 | awk '{print $2}')"
echo "Found these versions in upstream: $uploadedVersions"
for uploadedVersion in $uploadedVersions; do
if [ "$newVersion" == "$uploadedVersion" ]; then
echo "Found a matching version in upstream, failing this task and skipping the release"
exit 1
fi
done
echo "No matching version found, running the release"
- name: Run chart-releaser
if: steps.helm_version_checker.outcome == 'success'
uses: helm/chart-releaser-action@v1.2.1
env:
CR_TOKEN: '${{ secrets.GITHUB_TOKEN }}'

View File

@@ -1,11 +1,10 @@
name: Release Charts name: Release docker images
on: on:
push: push:
branches: branches:
- main - main
paths: - devel
- 'helm/**'
jobs: jobs:
release: release:
@@ -14,21 +13,18 @@ jobs:
- name: Checkout - name: Checkout
uses: actions/checkout@v1 uses: actions/checkout@v1
with: with:
ref: main ref: ${{ github.ref }}
- name: Configure Git - name: Configure Git
run: | run: |
git config user.name "$GITHUB_ACTOR" git config user.name "$GITHUB_ACTOR"
git config user.email "$GITHUB_ACTOR@users.noreply.github.com" git config user.email "$GITHUB_ACTOR@users.noreply.github.com"
- name: Install Helm - name: Build and push docker images (make image)
uses: azure/setup-helm@v1 run: make image
with:
version: v3.4.0
- name: Run chart-releaser
uses: helm/chart-releaser-action@master
with:
charts_dir: 'helm'
env: env:
CR_TOKEN: '${{ secrets.CR_TOKEN }}' DOCKER_USER: ${GITHUB_ACTOR}
DOCKER_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- name: Logout from dockerhub (make docker-logout)
run: make docker-logout

View File

@@ -1,7 +1,8 @@
# Image URL to use all building/pushing image targets; # Image URL to use all building/pushing image targets;
# Use your own docker registry and image name for dev/test by overridding the # Use your own docker registry and image name for dev/test by overridding the
# IMAGE_REPO, IMAGE_NAME and IMAGE_TAG environment variable. # IMAGE_REPO, IMAGE_NAME and IMAGE_TAG environment variable.
IMAGE_REPO ?= marshallmarshall REPOSITORY_BASE ?= ghcr.io
IMAGE_REPO ?= $(REPOSITORY_BASE)/ysoftdevs/imagepullsecret-injector
IMAGE_NAME ?= imagepullsecret-injector IMAGE_NAME ?= imagepullsecret-injector
GENERATOR_IMAGE_NAME ?= webhook-cert-generator GENERATOR_IMAGE_NAME ?= webhook-cert-generator
@@ -18,7 +19,7 @@ export GOPATH ?= $(GOPATH_DEFAULT)
TESTARGS_DEFAULT := "-v" TESTARGS_DEFAULT := "-v"
export TESTARGS ?= $(TESTARGS_DEFAULT) export TESTARGS ?= $(TESTARGS_DEFAULT)
DEST := $(GOPATH)/src/$(GIT_HOST)/$(BASE_DIR) DEST := $(GOPATH)/src/$(GIT_HOST)/$(BASE_DIR)
IMAGE_TAG ?= $(shell cat "$(REPO_ROOT)/VERSION")-$(shell git describe --match=$(git rev-parse --short=8 HEAD) --tags --always --dirty) IMAGE_TAG ?= $(shell cat "$(REPO_ROOT)/VERSION")
LOCAL_OS := $(shell uname) LOCAL_OS := $(shell uname)
@@ -45,7 +46,7 @@ endif
############################################################ ############################################################
fmt: fmt:
@echo "Run go fmt..." @go fmt ./cmd/...
############################################################ ############################################################
# lint section # lint section
@@ -78,9 +79,15 @@ build-linux:
# image section # image section
############################################################ ############################################################
image: build-image push-image image: docker-login build-image push-image
build-image: build-linux docker-login:
@echo "$(DOCKER_TOKEN)" | docker login -u "$(DOCKER_USER)" --password-stdin "$(REPOSITORY_BASE)"
docker-logout:
@docker logout
build-image:
@echo "Building the docker image: $(IMAGE_REPO)/$(IMAGE_NAME):$(IMAGE_TAG)..." @echo "Building the docker image: $(IMAGE_REPO)/$(IMAGE_NAME):$(IMAGE_TAG)..."
@docker build -t $(IMAGE_REPO)/$(IMAGE_NAME):$(IMAGE_TAG) -f build/Dockerfile . @docker build -t $(IMAGE_REPO)/$(IMAGE_NAME):$(IMAGE_TAG) -f build/Dockerfile .
@echo "Building the docker image: $(IMAGE_REPO)/$(GENERATOR_IMAGE_NAME):$(IMAGE_TAG)..." @echo "Building the docker image: $(IMAGE_REPO)/$(GENERATOR_IMAGE_NAME):$(IMAGE_TAG)..."

View File

@@ -2,6 +2,10 @@
The responsibility of this webhook is to patch all newly created/updated service account and make sure they all contained proper imagepullsecret configuration. The responsibility of this webhook is to patch all newly created/updated service account and make sure they all contained proper imagepullsecret configuration.
This repo produces one helm chart available via helm repository https://ysoftdevs.github.io/imagepullsecret-injector. There are also 2 docker images:
- `ghcr.io/ysoftdevs/imagepullsecret-injector/imagepullsecret-injector` - the image containing the webhook itself
- `ghcr.io/ysoftdevs/imagepullsecret-injector/webhook-cert-generator` - helper image responsible for (re)generating the certificates
## Helm description ## Helm description
The helm chart consists of 2 parts: the certificate generator and the webhook configuration itself. The helm chart consists of 2 parts: the certificate generator and the webhook configuration itself.
@@ -21,22 +25,38 @@ The main part is the deployment and the web hook configuration. The flow is as f
Of note is also a fact that the chart runs a lookup to the connected cluster to fetch the CA bundle for the MutatingWebhook. This means `helm template` won't work. Of note is also a fact that the chart runs a lookup to the connected cluster to fetch the CA bundle for the MutatingWebhook. This means `helm template` won't work.
## Running locally ## Running locally
```bash 1. Create the prerequisite resources:
kubectl create ns imagepullsecret-injector ```bash
kubectl create ns imagepullsecret-injector
kubectl create secret -n imagepullsecret-injector \ kubectl create secret -n imagepullsecret-injector \
generic my-cool-secret-source \ generic acr-dockerconfigjson-source \
--from-literal=.dockerconfigjson='<your .dockerconfigjson configuration file>' --type=kubernetes.io/dockerconfigjson \
--from-literal=.dockerconfigjson='<your .dockerconfigjson configuration file>'
```
make build-image 1. Build the images and run the chart
helm upgrade -i imagepullsecret-injector \ ``` bash
--create-namespace -n imagepullsecret-injector \ make build-image
helm/imagepullsecret-injector helm upgrade -i imagepullsecret-injector \
``` -n imagepullsecret-injector \
charts/imagepullsecret-injector
```
Alternatively, you can use the pre-built, publicly available helm chart and docker images:
```bash
helm repo add imagepullsecret-injector https://ysoftdevs.github.io/imagepullsecret-injector
helm repo update
helm upgrade -i imagepullsecret-injector \
-n imagepullsecret-injector \
magepullsecret-injector/imagepullsecret-injector
```
To test whether everything works, you can run 1. To test whether everything works, you can run
```bash ```bash
kubectl create ns yolo kubectl create ns yolo
kubectl get sa -n yolo default -ojsonpath='{.imagePullSecrets}' kubectl get sa -n yolo default -ojsonpath='{.imagePullSecrets}'
``` ```
The get command should display _some_ non-empty result. The `get` command should display _some_ non-empty result.
## Releasing locally
To authenticate to the docker registry to push the images manually, you will need your own Github Personal Access Token. For more information follow this guide https://docs.github.com/en/packages/guides/migrating-to-github-container-registry-for-docker-images#authenticating-with-the-container-registry

View File

@@ -1 +1 @@
v0.0.1 0.0.12

View File

@@ -1,4 +1,4 @@
FROM golang:1.14 AS builder FROM golang:1.15 AS builder
WORKDIR /go/src/github.com/ysoftdevs/imagepullsecret-injector WORKDIR /go/src/github.com/ysoftdevs/imagepullsecret-injector
COPY . . COPY . .
@@ -7,4 +7,7 @@ RUN make build
FROM alpine:3.13.4 as base FROM alpine:3.13.4 as base
COPY --from=builder /go/src/github.com/ysoftdevs/imagepullsecret-injector/build/_output/bin/imagepullsecret-injector /usr/local/bin/imagepullsecret-injector COPY --from=builder /go/src/github.com/ysoftdevs/imagepullsecret-injector/build/_output/bin/imagepullsecret-injector /usr/local/bin/imagepullsecret-injector
RUN addgroup -S imagepullsecret-injector-group && adduser -S imagepullsecret-injector-user -G imagepullsecret-injector-group
USER imagepullsecret-injector-user
ENTRYPOINT ["imagepullsecret-injector"] ENTRYPOINT ["imagepullsecret-injector"]

View File

@@ -1,6 +1,9 @@
FROM alpine:3.13.4 FROM alpine:3.13.4
RUN apk add bash curl openssl \ RUN addgroup -S imagepullsecret-injector-group && adduser -S imagepullsecret-injector-user -G imagepullsecret-injector-group \
&& apk add bash curl openssl jq \
&& curl -LO "https://dl.k8s.io/release/$(curl -L -s https://dl.k8s.io/release/stable.txt)/bin/linux/amd64/kubectl" \ && curl -LO "https://dl.k8s.io/release/$(curl -L -s https://dl.k8s.io/release/stable.txt)/bin/linux/amd64/kubectl" \
&& chmod 755 ./kubectl \ && chmod 755 ./kubectl \
&& mv ./kubectl /usr/bin/kubectl && mv ./kubectl /usr/bin/kubectl
USER imagepullsecret-injector-user

View File

@@ -15,9 +15,9 @@ type: application
# This is the chart version. This version number should be incremented each time you make changes # This is the chart version. This version number should be incremented each time you make changes
# to the chart and its templates, including the app version. # to the chart and its templates, including the app version.
# Versions are expected to follow Semantic Versioning (https://semver.org/) # Versions are expected to follow Semantic Versioning (https://semver.org/)
version: 0.0.4 version: 0.0.21
# This is the version number of the application being deployed. This version number should be # This is the version number of the application being deployed. This version number should be
# incremented each time you make changes to the application. Versions are not expected to # incremented each time you make changes to the application. Versions are not expected to
# follow Semantic Versioning. They should reflect the version the application is using. # follow Semantic Versioning. They should reflect the version the application is using.
appVersion: v0.0.1 appVersion: 0.0.12

View File

@@ -83,22 +83,27 @@ echo "Deleting old CertificateSigningRequests"
kubectl delete csr ${csrName} 2>/dev/null || true kubectl delete csr ${csrName} 2>/dev/null || true
echo "Creating new CertificateSigningRequests" echo "Creating new CertificateSigningRequests"
# create server cert/key CSR and send to k8s API # create server cert/key CSR and send to k8s API
cat <<EOF | kubectl create -f - jq -n --arg request "$(< "${tmpdir}"/server.csr base64)" \
apiVersion: certificates.k8s.io/v1 --arg namespace "$namespace" \
kind: CertificateSigningRequest --arg csrName "$csrName" '{
metadata: apiVersion: "certificates.k8s.io/v1",
name: ${csrName} kind: "CertificateSigningRequest",
spec: metadata: {
signerName: kubernetes.io/kubelet-serving name: $csrName,
groups: namespace: $namespace
- system:authenticated },
request: $(< "${tmpdir}"/server.csr base64 | tr -d '\n') spec: {
usages: signerName: "kubernetes.io/kubelet-serving",
- digital signature groups: ["system:authenticated"],
- key encipherment request: $request,
- server auth usages: [
EOF "digital signature",
"key encipherment",
"server auth"
]
}
}' | kubectl create -f -
# verify CSR has been created # verify CSR has been created
while true; do while true; do

View File

@@ -1,17 +1,18 @@
apiVersion: batch/v1beta1 apiVersion: batch/v1beta1
kind: CronJob kind: CronJob
metadata: metadata:
name: "{{ .Release.Name }}" name: "{{ .Release.Name }}-cert-gen-cron-job"
labels: labels:
{{- include "imagepullsecret-injector.labels" . | nindent 4 }} {{- include "imagepullsecret-injector.labels" . | nindent 4 }}
spec: spec:
schedule: '* * * * *' schedule: '* * * * 0'
jobTemplate: jobTemplate:
metadata: metadata:
name: "{{ .Release.Name }}" name: "{{ .Release.Name }}"
labels: labels:
{{- include "imagepullsecret-injector.labels" . | nindent 8 }} {{- include "imagepullsecret-injector.labels" . | nindent 8 }}
spec: spec:
ttlSecondsAfterFinished: 30
template: template:
spec: spec:
serviceAccountName: imagepullsecret-injector-cert-gen serviceAccountName: imagepullsecret-injector-cert-gen
@@ -21,9 +22,12 @@ spec:
image: "{{ .Values.certificateGeneratorImage.registry }}/{{ .Values.certificateGeneratorImage.repository }}:{{ .Values.certificateGeneratorImage.tag | default .Chart.AppVersion }}" image: "{{ .Values.certificateGeneratorImage.registry }}/{{ .Values.certificateGeneratorImage.repository }}:{{ .Values.certificateGeneratorImage.tag | default .Chart.AppVersion }}"
command: ["/entrypoint/entrypoint.sh"] command: ["/entrypoint/entrypoint.sh"]
args: args:
- --service="{{ include "imagepullsecret-injector.serviceName" . }}" - --service
- --namespace="{{ .Release.Namespace }}" - "{{ include "imagepullsecret-injector.serviceName" . }}"
- --secret="{{ include "imagepullsecret-injector.certificateSecretName" . }}" - --namespace
- "{{ .Release.Namespace }}"
- --secret
- "{{ include "imagepullsecret-injector.certificateSecretName" . }}"
volumeMounts: volumeMounts:
- mountPath: "/entrypoint" - mountPath: "/entrypoint"
name: entrypoint name: entrypoint

View File

@@ -1,10 +1,11 @@
apiVersion: batch/v1 apiVersion: batch/v1
kind: Job kind: Job
metadata: metadata:
name: "{{ .Release.Name }}" name: "{{ .Release.Name }}-cert-gen-job"
labels: labels:
{{- include "imagepullsecret-injector.labels" . | nindent 4 }} {{- include "imagepullsecret-injector.labels" . | nindent 4 }}
spec: spec:
ttlSecondsAfterFinished: 30
template: template:
spec: spec:
serviceAccountName: imagepullsecret-injector-cert-gen serviceAccountName: imagepullsecret-injector-cert-gen
@@ -14,9 +15,12 @@ spec:
image: "{{ .Values.certificateGeneratorImage.registry }}/{{ .Values.certificateGeneratorImage.repository }}:{{ .Values.certificateGeneratorImage.tag | default .Chart.AppVersion }}" image: "{{ .Values.certificateGeneratorImage.registry }}/{{ .Values.certificateGeneratorImage.repository }}:{{ .Values.certificateGeneratorImage.tag | default .Chart.AppVersion }}"
command: ["/entrypoint/entrypoint.sh"] command: ["/entrypoint/entrypoint.sh"]
args: args:
- --service="{{ include "imagepullsecret-injector.serviceName" . }}" - --service
- --namespace="{{ .Release.Namespace }}" - "{{ include "imagepullsecret-injector.serviceName" . }}"
- --secret="{{ include "imagepullsecret-injector.certificateSecretName" . }}" - --namespace
- "{{ .Release.Namespace }}"
- --secret
- "{{ include "imagepullsecret-injector.certificateSecretName" . }}"
volumeMounts: volumeMounts:
- mountPath: "/entrypoint" - mountPath: "/entrypoint"
name: entrypoint name: entrypoint

View File

@@ -30,15 +30,16 @@ rules:
- list - list
- get - get
- apiGroups: - apiGroups:
- "certificates.k8s.io/v1" - certificates.k8s.io
resources: resources:
- certificatesigningrequests - certificatesigningrequests
verbs: verbs:
- create - create
- list - list
- get - get
- delete
- apiGroups: - apiGroups:
- "certificates.k8s.io/v1" - certificates.k8s.io
resources: resources:
- certificatesigningrequests/approval - certificatesigningrequests/approval
verbs: verbs:

View File

@@ -36,10 +36,14 @@ spec:
value: {{ join "," .Values.imagepullsecretInjector.excludeNamespaces | quote }} value: {{ join "," .Values.imagepullsecretInjector.excludeNamespaces | quote }}
- name: CONFIG_SERVICE_ACCOUNTS - name: CONFIG_SERVICE_ACCOUNTS
value: {{ join "," .Values.imagepullsecretInjector.saNames | quote }} value: {{ join "," .Values.imagepullsecretInjector.saNames | quote }}
- name: CONFIG_TARGET_IMAGE_PULL_SECRET_NAME
value: {{ .Values.imagepullsecretInjector.targetSecretName | quote }}
- name: CONFIG_SOURCE_IMAGE_PULL_SECRET_NAME - name: CONFIG_SOURCE_IMAGE_PULL_SECRET_NAME
value: {{ .Values.imagepullsecretInjector.dockerconfigjsonRef.secretName | quote }} value: {{ .Values.imagepullsecretInjector.dockerconfigjsonRef.secretName | quote }}
- name: CONFIG_SOURCE_IMAGE_PULL_SECRET_NAMESPACE - name: CONFIG_SOURCE_IMAGE_PULL_SECRET_NAMESPACE
value: {{ .Values.imagepullsecretInjector.dockerconfigjsonRef.secretNamespace | default .Release.Namespace | quote }} value: {{ .Values.imagepullsecretInjector.dockerconfigjsonRef.secretNamespace | default .Release.Namespace | quote }}
- name: CONFIG_IGNORE_SECRET_CREATION_ERROR
value: {{ .Values.imagepullsecretInjector.ignoreSecretCreationError | quote }}
- name: CONFIG_ALL_SERVICE_ACCOUNTS - name: CONFIG_ALL_SERVICE_ACCOUNTS
value: {{ .Values.imagepullsecretInjector.allSaNames | quote }} value: {{ .Values.imagepullsecretInjector.allSaNames | quote }}
volumeMounts: volumeMounts:

View File

@@ -21,3 +21,5 @@ webhooks:
resources: ["serviceaccounts"] resources: ["serviceaccounts"]
admissionReviewVersions: ["v1", "v1beta1"] admissionReviewVersions: ["v1", "v1beta1"]
sideEffects: None sideEffects: None
# The default "Fail" option prevents Gardener cluster to be hibernated
failurePolicy: Ignore

View File

@@ -25,6 +25,7 @@ rules:
- create - create
- get - get
- delete - delete
- update
- apiGroups: - apiGroups:
- "" - ""
resources: resources:

View File

@@ -1,20 +1,22 @@
image: image:
registry: marshallmarshall registry: ghcr.io/ysoftdevs/imagepullsecret-injector
repository: imagepullsecret-injector repository: imagepullsecret-injector
pullPolicy: Always pullPolicy: Always
# Overrides the image tag whose default is the chart appVersion. # Overrides the image tag whose default is the chart appVersion.
tag: "" tag: ""
certificateGeneratorImage: certificateGeneratorImage:
registry: marshallmarshall registry: ghcr.io/ysoftdevs/imagepullsecret-injector
repository: webhook-cert-generator repository: webhook-cert-generator
tag: "" tag: ""
imagepullsecretInjector: imagepullsecretInjector:
dockerconfigjsonRef: dockerconfigjsonRef:
secretName: my-cool-secret-source secretName: acr-dockerconfigjson-source
secretNamespace: "" secretNamespace: ""
targetSecretName: acr-dockerconfigjson
ignoreSecretCreationError: false
allSaNames: false allSaNames: false
saNames: saNames:
- default - default

View File

@@ -8,40 +8,11 @@ import (
"net/http" "net/http"
"os" "os"
"os/signal" "os/signal"
"strconv"
"syscall" "syscall"
"github.com/golang/glog" "github.com/golang/glog"
) )
func LookupStringEnv(envName string, defVal string) string {
if envVal, exists := os.LookupEnv(envName); exists {
return envVal
}
return defVal
}
func LookupBoolEnv(envName string, defVal bool) bool {
if envVal, exists := os.LookupEnv(envName); exists {
if boolVal, err := strconv.ParseBool(envVal); err == nil {
return boolVal
}
}
return defVal
}
func LookupIntEnv(envName string, defVal int) int {
if envVal, exists := os.LookupEnv(envName); exists {
if intVal, err := strconv.Atoi(envVal); err == nil {
return intVal
}
}
return defVal
}
func main() { func main() {
parameters := DefaultParametersObject() parameters := DefaultParametersObject()
@@ -51,16 +22,18 @@ func main() {
flag.StringVar(&parameters.keyFile, "tlsKeyFile", LookupStringEnv("CONFIG_KEY_PATH", parameters.keyFile), "File containing the x509 private key to --tlsCertFile.") flag.StringVar(&parameters.keyFile, "tlsKeyFile", LookupStringEnv("CONFIG_KEY_PATH", parameters.keyFile), "File containing the x509 private key to --tlsCertFile.")
flag.StringVar(&parameters.excludeNamespaces, "excludeNamespaces", LookupStringEnv("CONFIG_EXCLUDE_NAMESPACES", parameters.excludeNamespaces), "Comma-separated namespace names to ignore.") flag.StringVar(&parameters.excludeNamespaces, "excludeNamespaces", LookupStringEnv("CONFIG_EXCLUDE_NAMESPACES", parameters.excludeNamespaces), "Comma-separated namespace names to ignore.")
flag.StringVar(&parameters.serviceAccounts, "serviceAccounts", LookupStringEnv("CONFIG_SERVICE_ACCOUNTS", parameters.serviceAccounts), "Comma-separated service account names to watch.") flag.StringVar(&parameters.serviceAccounts, "serviceAccounts", LookupStringEnv("CONFIG_SERVICE_ACCOUNTS", parameters.serviceAccounts), "Comma-separated service account names to watch.")
flag.StringVar(&parameters.targetImagePullSecretName, "targetImagePullSecretName", LookupStringEnv("CONFIG_TARGET_IMAGE_PULL_SECRET_NAME", parameters.targetImagePullSecretName), "Name of the imagePullSecret secret we will create in the namespace of the mutated service account")
flag.StringVar(&parameters.sourceImagePullSecretName, "sourceImagePullSecretName", LookupStringEnv("CONFIG_SOURCE_IMAGE_PULL_SECRET_NAME", parameters.sourceImagePullSecretName), "Name of the imagePullSecret secret we use as source.") flag.StringVar(&parameters.sourceImagePullSecretName, "sourceImagePullSecretName", LookupStringEnv("CONFIG_SOURCE_IMAGE_PULL_SECRET_NAME", parameters.sourceImagePullSecretName), "Name of the imagePullSecret secret we use as source.")
flag.StringVar(&parameters.sourceImagePullSecretNamespace, "sourceImagePullSecretNamespace", LookupStringEnv("CONFIG_SOURCE_IMAGE_PULL_SECRET_NAMESPACE", parameters.sourceImagePullSecretNamespace), "Namespace of the imagePullSecret secret we use as source.") flag.StringVar(&parameters.sourceImagePullSecretNamespace, "sourceImagePullSecretNamespace", LookupStringEnv("CONFIG_SOURCE_IMAGE_PULL_SECRET_NAMESPACE", parameters.sourceImagePullSecretNamespace), "Namespace of the imagePullSecret secret we use as source.")
flag.BoolVar(&parameters.allServiceAccounts, "allServiceAccounts", LookupBoolEnv("CONFIG_ALL_SERVICE_ACCOUNTS", parameters.allServiceAccounts), "Switch for watching all service accounts. If true, serviceAccounts parameter is ignored") flag.BoolVar(&parameters.allServiceAccounts, "allServiceAccounts", LookupBoolEnv("CONFIG_ALL_SERVICE_ACCOUNTS", parameters.allServiceAccounts), "Switch for watching all service accounts. If true, serviceAccounts parameter is ignored")
flag.BoolVar(&parameters.ignoreSecretCreationError, "ignoreSecretCreationError", LookupBoolEnv("CONFIG_IGNORE_SECRET_CREATION_ERROR", parameters.ignoreSecretCreationError), "If true, failed creation/update of secrets in the target namespace will not cause the webhook to fail")
flag.Parse() flag.Parse()
glog.Infof("Running with config: %+v", parameters) glog.Infof("Running with config: %+v", parameters)
whsvr := &WebhookServer{ whsvr, err := NewWebhookServer(
config: &parameters, &parameters,
server: &http.Server{ &http.Server{
Addr: fmt.Sprintf(":%v", parameters.port), Addr: fmt.Sprintf(":%v", parameters.port),
// This is quite inefficient as it loads file contents on every TLS ClientHello, but ¯\_(ツ)_/¯ // This is quite inefficient as it loads file contents on every TLS ClientHello, but ¯\_(ツ)_/¯
TLSConfig: &tls.Config{GetCertificate: func(info *tls.ClientHelloInfo) (*tls.Certificate, error) { TLSConfig: &tls.Config{GetCertificate: func(info *tls.ClientHelloInfo) (*tls.Certificate, error) {
@@ -69,6 +42,9 @@ func main() {
return &cert, err return &cert, err
}}, }},
}, },
)
if err != nil {
glog.Exitf("Could not create the Webhook server: %v", err)
} }
// define http server and server handler // define http server and server handler

55
cmd/utils.go Normal file
View File

@@ -0,0 +1,55 @@
package main
import (
"io/ioutil"
"os"
"strconv"
"strings"
)
// LookupStringEnv either returns the the value of the env variable, or the provided default value, if the env doesn't exist
func LookupStringEnv(envName string, defVal string) string {
if envVal, exists := os.LookupEnv(envName); exists {
return envVal
}
return defVal
}
// LookupBoolEnv either returns the the value of the env variable, or the provided default value, if the env doesn't exist
func LookupBoolEnv(envName string, defVal bool) bool {
if envVal, exists := os.LookupEnv(envName); exists {
if boolVal, err := strconv.ParseBool(envVal); err == nil {
return boolVal
}
}
return defVal
}
// LookupIntEnv either returns the the value of the env variable, or the provided default value, if the env doesn't exist
func LookupIntEnv(envName string, defVal int) int {
if envVal, exists := os.LookupEnv(envName); exists {
if intVal, err := strconv.Atoi(envVal); err == nil {
return intVal
}
}
return defVal
}
func getCurrentNamespace() string {
// Check whether we have overridden the namespace
if ns, ok := os.LookupEnv("POD_NAMESPACE"); ok {
return ns
}
// Fall back to the namespace associated with the service account token, if available (this should exist if running in a K8S pod)
if data, err := ioutil.ReadFile("/var/run/secrets/kubernetes.io/serviceaccount/namespace"); err == nil {
if ns := strings.TrimSpace(string(data)); len(ns) > 0 {
return ns
}
}
return "default"
}

View File

@@ -6,7 +6,6 @@ import (
"io/ioutil" "io/ioutil"
"k8s.io/apimachinery/pkg/api/errors" "k8s.io/apimachinery/pkg/api/errors"
"net/http" "net/http"
"os"
"strings" "strings"
"github.com/golang/glog" "github.com/golang/glog"
@@ -27,25 +26,24 @@ var (
deserializer = codecs.UniversalDeserializer() deserializer = codecs.UniversalDeserializer()
) )
const (
imagePullSecretName = "my-cool-secret"
)
type WebhookServer struct { type WebhookServer struct {
server *http.Server server *http.Server
config *WhSvrParameters config *WhSvrParameters
client *kubernetes.Clientset
} }
// Webhook Server parameters // WhSvrParameters represents all configuration options available though cmd parameters or env variables
type WhSvrParameters struct { type WhSvrParameters struct {
port int // webhook server port port int
certFile string // path to the x509 certificate for https certFile string
keyFile string // path to the x509 private key matching `CertFile` keyFile string
excludeNamespaces string excludeNamespaces string
serviceAccounts string serviceAccounts string
allServiceAccounts bool allServiceAccounts bool
targetImagePullSecretName string
sourceImagePullSecretName string sourceImagePullSecretName string
sourceImagePullSecretNamespace string sourceImagePullSecretNamespace string
ignoreSecretCreationError bool
} }
var ( var (
@@ -59,6 +57,28 @@ var (
} }
) )
// NewWebhookServer constructor for WebhookServer
func NewWebhookServer(parameters *WhSvrParameters, server *http.Server) (*WebhookServer, error) {
config, err := rest.InClusterConfig()
if err != nil {
glog.Errorf("Could not create k8s client: %v", err)
return nil, err
}
clientset, err := kubernetes.NewForConfig(config)
if err != nil {
glog.Errorf("Could not create k8s clientset: %v", err)
return nil, err
}
return &WebhookServer{
config: parameters,
server: server,
client: clientset,
}, nil
}
// DefaultParametersObject returns a parameters object with the default values
func DefaultParametersObject() WhSvrParameters { func DefaultParametersObject() WhSvrParameters {
return WhSvrParameters{ return WhSvrParameters{
port: 8443, port: 8443,
@@ -67,8 +87,10 @@ func DefaultParametersObject() WhSvrParameters {
excludeNamespaces: strings.Join(defaultIgnoredNamespaces, ","), excludeNamespaces: strings.Join(defaultIgnoredNamespaces, ","),
serviceAccounts: strings.Join(defaultServiceAccounts, ","), serviceAccounts: strings.Join(defaultServiceAccounts, ","),
allServiceAccounts: false, allServiceAccounts: false,
targetImagePullSecretName: "my-cool-secret",
sourceImagePullSecretName: "my-cool-secret-source", sourceImagePullSecretName: "my-cool-secret-source",
sourceImagePullSecretNamespace: "default", sourceImagePullSecretNamespace: "default",
ignoreSecretCreationError: false,
} }
} }
@@ -107,65 +129,44 @@ func addImagePullSecret(target, added []corev1.LocalObjectReference, basePath st
return patch return patch
} }
func getCurrentNamespace() string { // ensureSecrets looks up the source secret and makes sure the namespace the patched SA is in contains it too
// This way assumes you've set the POD_NAMESPACE environment variable using the downward API.
// This check has to be done first for backwards compatibility with the way InClusterConfig was originally set up
if ns, ok := os.LookupEnv("POD_NAMESPACE"); ok {
return ns
}
// Fall back to the namespace associated with the service account token, if available
if data, err := ioutil.ReadFile("/var/run/secrets/kubernetes.io/serviceaccount/namespace"); err == nil {
if ns := strings.TrimSpace(string(data)); len(ns) > 0 {
return ns
}
}
return "default"
}
func (whsvr *WebhookServer) ensureSecrets(ar *v1beta1.AdmissionReview) error { func (whsvr *WebhookServer) ensureSecrets(ar *v1beta1.AdmissionReview) error {
glog.Infof("Ensuring existing secrets") glog.Infof("Ensuring existing secrets")
namespace := ar.Request.Namespace targetNamespace := ar.Request.Namespace
config, err := rest.InClusterConfig()
if err != nil {
glog.Errorf("Could not create k8s client: %v", err)
return err
}
clientset, err := kubernetes.NewForConfig(config)
if err != nil {
glog.Errorf("Could not create k8s clientset: %v", err)
return err
}
currentNamespace := getCurrentNamespace() currentNamespace := getCurrentNamespace()
glog.Infof("Looking for the source secret") glog.Infof("Looking for the source secret")
sourceSecret, err := clientset.CoreV1().Secrets(whsvr.config.sourceImagePullSecretNamespace).Get(whsvr.config.sourceImagePullSecretName, metav1.GetOptions{}) sourceSecret, err := whsvr.client.CoreV1().Secrets(whsvr.config.sourceImagePullSecretNamespace).Get(whsvr.config.sourceImagePullSecretName, metav1.GetOptions{})
if err != nil { if err != nil {
glog.Errorf("Could not fetch source secret %s in namespace %s: %v", whsvr.config.sourceImagePullSecretName, currentNamespace, err) glog.Errorf("Could not fetch source secret %s in namespace %s: %v", whsvr.config.sourceImagePullSecretName, currentNamespace, err)
return err return err
} }
if sourceSecret.Type != corev1.SecretTypeDockerConfigJson {
err := fmt.Errorf("source secret %s in namespace %s exists, but has incorrect type (is %s, should be %s)", whsvr.config.sourceImagePullSecretName, currentNamespace, sourceSecret.Type, corev1.SecretTypeDockerConfigJson)
glog.Errorf("%v", err)
return err
}
glog.Infof("Source secret found") glog.Infof("Source secret found")
glog.Infof("Looking for the existing target secret") glog.Infof("Looking for the existing target secret")
secret, err := clientset.CoreV1().Secrets(namespace).Get(imagePullSecretName, metav1.GetOptions{}) secret, err := whsvr.client.CoreV1().Secrets(targetNamespace).Get(whsvr.config.targetImagePullSecretName, metav1.GetOptions{})
if err != nil && !errors.IsNotFound(err) { if err != nil && !errors.IsNotFound(err) {
glog.Errorf("Could not fetch secret %s in namespace %s: %v", imagePullSecretName, namespace, err) glog.Errorf("Could not fetch secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, targetNamespace, err)
return err return err
} }
if err != nil && errors.IsNotFound(err) { if err != nil && errors.IsNotFound(err) {
glog.Infof("Target secret not found, creating a new one") glog.Infof("Target secret not found, creating a new one")
if _, createErr := clientset.CoreV1().Secrets(namespace).Create(&corev1.Secret{ if _, createErr := whsvr.client.CoreV1().Secrets(targetNamespace).Create(&corev1.Secret{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: imagePullSecretName, Name: whsvr.config.targetImagePullSecretName,
Namespace: namespace, Namespace: targetNamespace,
}, },
Data: sourceSecret.Data, Data: sourceSecret.Data,
Type: sourceSecret.Type, Type: sourceSecret.Type,
}); createErr != nil { }); createErr != nil {
glog.Errorf("Could not create secret %s in namespace %s: %v", imagePullSecretName, namespace, err) glog.Errorf("Could not create secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, targetNamespace, err)
return err return err
} }
glog.Infof("Target secret created successfully") glog.Infof("Target secret created successfully")
@@ -174,8 +175,8 @@ func (whsvr *WebhookServer) ensureSecrets(ar *v1beta1.AdmissionReview) error {
glog.Infof("Target secret found, updating") glog.Infof("Target secret found, updating")
secret.Data = sourceSecret.Data secret.Data = sourceSecret.Data
if _, err := clientset.CoreV1().Secrets(namespace).Update(secret); err != nil { if _, err := whsvr.client.CoreV1().Secrets(targetNamespace).Update(secret); err != nil {
glog.Errorf("Could not update secret %s in namespace %s: %v", imagePullSecretName, namespace, err) glog.Errorf("Could not update secret %s in namespace %s: %v", whsvr.config.targetImagePullSecretName, targetNamespace, err)
return err return err
} }
glog.Infof("Target secret updated successfully") glog.Infof("Target secret updated successfully")
@@ -183,6 +184,7 @@ func (whsvr *WebhookServer) ensureSecrets(ar *v1beta1.AdmissionReview) error {
return nil return nil
} }
// shouldMutate goes through all filters and determines whether the incoming SA matches them
func (whsvr *WebhookServer) shouldMutate(sa corev1.ServiceAccount) bool { func (whsvr *WebhookServer) shouldMutate(sa corev1.ServiceAccount) bool {
for _, excludedNamespace := range strings.Split(whsvr.config.excludeNamespaces, ",") { for _, excludedNamespace := range strings.Split(whsvr.config.excludeNamespaces, ",") {
if sa.Namespace == excludedNamespace { if sa.Namespace == excludedNamespace {
@@ -203,6 +205,7 @@ func (whsvr *WebhookServer) shouldMutate(sa corev1.ServiceAccount) bool {
return false return false
} }
// mutateServiceAccount contains the whole mutation logic
func (whsvr *WebhookServer) mutateServiceAccount(ar *v1beta1.AdmissionReview) *v1beta1.AdmissionResponse { func (whsvr *WebhookServer) mutateServiceAccount(ar *v1beta1.AdmissionReview) *v1beta1.AdmissionResponse {
req := ar.Request req := ar.Request
glog.Infof("Unmarshalling the ServiceAccount object from request") glog.Infof("Unmarshalling the ServiceAccount object from request")
@@ -230,7 +233,7 @@ func (whsvr *WebhookServer) mutateServiceAccount(ar *v1beta1.AdmissionReview) *v
if sa.ImagePullSecrets != nil { if sa.ImagePullSecrets != nil {
glog.Infof("ServiceAccount is already in the correct state, skipping") glog.Infof("ServiceAccount is already in the correct state, skipping")
for _, lor := range sa.ImagePullSecrets { for _, lor := range sa.ImagePullSecrets {
if imagePullSecretName == lor.Name { if whsvr.config.targetImagePullSecretName == lor.Name {
return &v1beta1.AdmissionResponse{ return &v1beta1.AdmissionResponse{
Allowed: true, Allowed: true,
} }
@@ -241,7 +244,7 @@ func (whsvr *WebhookServer) mutateServiceAccount(ar *v1beta1.AdmissionReview) *v
glog.Infof("ServiceAccount is missing ImagePullSecrets configuration, creating a patch") glog.Infof("ServiceAccount is missing ImagePullSecrets configuration, creating a patch")
var patch []patchOperation var patch []patchOperation
patch = append(patch, addImagePullSecret(sa.ImagePullSecrets, []corev1.LocalObjectReference{{Name: imagePullSecretName}}, "/imagePullSecrets")...) patch = append(patch, addImagePullSecret(sa.ImagePullSecrets, []corev1.LocalObjectReference{{Name: whsvr.config.targetImagePullSecretName}}, "/imagePullSecrets")...)
patchBytes, err := json.Marshal(patch) patchBytes, err := json.Marshal(patch)
if err != nil { if err != nil {
glog.Errorf("Could not marshal patch object: %v", err) glog.Errorf("Could not marshal patch object: %v", err)
@@ -254,11 +257,15 @@ func (whsvr *WebhookServer) mutateServiceAccount(ar *v1beta1.AdmissionReview) *v
if err := whsvr.ensureSecrets(ar); err != nil { if err := whsvr.ensureSecrets(ar); err != nil {
glog.Errorf("Could not ensure existence of the imagePullSecret") glog.Errorf("Could not ensure existence of the imagePullSecret")
return &v1beta1.AdmissionResponse{ if !whsvr.config.ignoreSecretCreationError {
Result: &metav1.Status{ glog.Errorf("Failing the mutation process")
Message: err.Error(), return &v1beta1.AdmissionResponse{
}, Result: &metav1.Status{
Message: err.Error(),
},
}
} }
glog.Infof("ignoreSecretCreationError is true, ignoring")
} }
return &v1beta1.AdmissionResponse{ return &v1beta1.AdmissionResponse{
@@ -271,8 +278,8 @@ func (whsvr *WebhookServer) mutateServiceAccount(ar *v1beta1.AdmissionReview) *v
} }
} }
// Serve method for webhook server func parseIncomingRequest(r *http.Request) (v1beta1.AdmissionReview, *errors.StatusError) {
func (whsvr *WebhookServer) serve(w http.ResponseWriter, r *http.Request) { var ar v1beta1.AdmissionReview
var body []byte var body []byte
if r.Body != nil { if r.Body != nil {
if data, err := ioutil.ReadAll(r.Body); err == nil { if data, err := ioutil.ReadAll(r.Body); err == nil {
@@ -280,50 +287,69 @@ func (whsvr *WebhookServer) serve(w http.ResponseWriter, r *http.Request) {
} }
} }
if len(body) == 0 { if len(body) == 0 {
glog.Error("empty body") glog.Error("Empty body")
http.Error(w, "empty body", http.StatusBadRequest) return ar, errors.NewBadRequest("Empty body")
return
} }
// verify the content type is accurate // verify the content type is accurate
contentType := r.Header.Get("Content-Type") contentType := r.Header.Get("Content-Type")
if contentType != "application/json" { if contentType != "application/json" {
glog.Errorf("Content-Type=%s, expect application/json", contentType) glog.Errorf("Content-Type=%s, expect application/json", contentType)
http.Error(w, "invalid Content-Type, expect `application/json`", http.StatusUnsupportedMediaType) err := &errors.StatusError{ErrStatus: metav1.Status{
return Status: metav1.StatusFailure,
Message: fmt.Sprintf("Content-Type=%s, expect application/json", contentType),
Reason: metav1.StatusReasonUnsupportedMediaType,
Code: http.StatusUnsupportedMediaType,
}}
return ar, err
} }
var admissionResponse *v1beta1.AdmissionResponse
ar := v1beta1.AdmissionReview{}
if _, _, err := deserializer.Decode(body, nil, &ar); err != nil { if _, _, err := deserializer.Decode(body, nil, &ar); err != nil {
glog.Errorf("Can't decode body: %v", err) glog.Error("Could not parse the request body")
admissionResponse = &v1beta1.AdmissionResponse{ return ar, errors.NewBadRequest(fmt.Sprintf("Could not parse the request body: %+v", err))
Result: &metav1.Status{
Message: err.Error(),
},
}
} else {
admissionResponse = whsvr.mutateServiceAccount(&ar)
} }
admissionReview := v1beta1.AdmissionReview{ return ar, nil
TypeMeta: metav1.TypeMeta{Kind: "AdmissionReview", APIVersion: "admission.k8s.io/v1"}, }
}
if admissionResponse != nil {
admissionReview.Response = admissionResponse
if ar.Request != nil {
admissionReview.Response.UID = ar.Request.UID
}
}
func (whsvr *WebhookServer) sendResponse(w http.ResponseWriter, admissionReview v1beta1.AdmissionReview) error {
resp, err := json.Marshal(admissionReview) resp, err := json.Marshal(admissionReview)
if err != nil { if err != nil {
glog.Errorf("Can't encode response: %v", err) glog.Errorf("Can't encode response: %v", err)
http.Error(w, fmt.Sprintf("could not encode response: %v", err), http.StatusInternalServerError) http.Error(w, fmt.Sprintf("could not encode response: %v", err), http.StatusInternalServerError)
return err
} }
glog.Infof("Ready to write reponse ...") glog.Infof("Writing response")
if _, err := w.Write(resp); err != nil { if _, err := w.Write(resp); err != nil {
glog.Errorf("Can't write response: %v", err) glog.Errorf("Can't write response: %v", err)
http.Error(w, fmt.Sprintf("could not write response: %v", err), http.StatusInternalServerError) http.Error(w, fmt.Sprintf("could not write response: %v", err), http.StatusInternalServerError)
return err
}
return nil
}
// serve parses the raw incoming request, calls the mutation logic and sends the proper response
func (whsvr *WebhookServer) serve(w http.ResponseWriter, r *http.Request) {
admissionReviewIn, statusErr := parseIncomingRequest(r)
if statusErr != nil {
http.Error(w, statusErr.ErrStatus.Message, int(statusErr.ErrStatus.Code))
return
}
admissionResponse := whsvr.mutateServiceAccount(&admissionReviewIn)
admissionReviewOut := v1beta1.AdmissionReview{
TypeMeta: metav1.TypeMeta{Kind: "AdmissionReview", APIVersion: "admission.k8s.io/v1"},
}
if admissionResponse != nil {
admissionReviewOut.Response = admissionResponse
if admissionReviewIn.Request != nil {
admissionReviewOut.Response.UID = admissionReviewIn.Request.UID
}
}
if err := whsvr.sendResponse(w, admissionReviewOut); err != nil {
glog.Errorf("Could not send response %v", err)
} }
} }