2019-02-06 14:52:09 +02:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2019-03-04 20:40:02 +02:00
|
|
|
"flag"
|
|
|
|
"log"
|
2019-02-21 20:31:18 +02:00
|
|
|
|
2019-05-21 11:00:09 -07:00
|
|
|
client "github.com/nirmata/kyverno/client"
|
|
|
|
controller "github.com/nirmata/kyverno/pkg/controller"
|
|
|
|
event "github.com/nirmata/kyverno/pkg/event"
|
|
|
|
"github.com/nirmata/kyverno/pkg/sharedinformer"
|
|
|
|
"github.com/nirmata/kyverno/pkg/violation"
|
|
|
|
"github.com/nirmata/kyverno/pkg/webhooks"
|
2019-05-10 00:05:21 -07:00
|
|
|
"k8s.io/sample-controller/pkg/signals"
|
2019-02-11 19:49:27 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2019-03-04 20:40:02 +02:00
|
|
|
kubeconfig string
|
|
|
|
cert string
|
|
|
|
key string
|
2019-02-06 14:52:09 +02:00
|
|
|
)
|
|
|
|
|
2019-03-15 19:03:55 +02:00
|
|
|
func main() {
|
|
|
|
clientConfig, err := createClientConfig(kubeconfig)
|
2019-03-04 20:40:02 +02:00
|
|
|
if err != nil {
|
2019-05-20 10:56:12 -07:00
|
|
|
|
2019-03-04 20:40:02 +02:00
|
|
|
log.Fatalf("Error building kubeconfig: %v\n", err)
|
|
|
|
}
|
|
|
|
|
2019-05-21 09:27:04 -07:00
|
|
|
client, err := client.NewClient(clientConfig, nil)
|
2019-03-04 20:40:02 +02:00
|
|
|
if err != nil {
|
2019-05-15 07:30:22 -07:00
|
|
|
log.Fatalf("Error creating client: %v\n", err)
|
2019-03-04 20:40:02 +02:00
|
|
|
}
|
|
|
|
|
2019-05-15 12:29:09 -07:00
|
|
|
policyInformerFactory, err := sharedinformer.NewSharedInformerFactory(clientConfig)
|
2019-03-04 20:40:02 +02:00
|
|
|
if err != nil {
|
2019-05-15 12:29:09 -07:00
|
|
|
log.Fatalf("Error creating policy sharedinformer: %v\n", err)
|
2019-03-04 20:40:02 +02:00
|
|
|
}
|
2019-05-15 12:29:09 -07:00
|
|
|
eventController := event.NewEventController(client, policyInformerFactory, nil)
|
|
|
|
violationBuilder := violation.NewPolicyViolationBuilder(client, policyInformerFactory, eventController, nil)
|
2019-05-10 00:05:21 -07:00
|
|
|
|
2019-05-15 11:24:27 -07:00
|
|
|
policyController := controller.NewPolicyController(
|
2019-05-15 07:30:22 -07:00
|
|
|
client,
|
2019-05-15 12:29:09 -07:00
|
|
|
policyInformerFactory,
|
2019-05-10 00:05:21 -07:00
|
|
|
violationBuilder,
|
2019-05-10 10:38:38 -07:00
|
|
|
eventController,
|
2019-05-15 07:30:22 -07:00
|
|
|
nil)
|
2019-03-15 19:03:55 +02:00
|
|
|
|
2019-05-15 07:30:22 -07:00
|
|
|
tlsPair, err := initTlsPemPair(cert, key, clientConfig, client)
|
2019-03-22 22:11:55 +02:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Failed to initialize TLS key/certificate pair: %v\n", err)
|
2019-03-04 20:40:02 +02:00
|
|
|
}
|
2019-03-22 22:11:55 +02:00
|
|
|
|
2019-05-20 10:56:12 -07:00
|
|
|
server, err := webhooks.NewWebhookServer(client, tlsPair, policyInformerFactory, nil)
|
2019-03-15 19:03:55 +02:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Unable to create webhook server: %v\n", err)
|
|
|
|
}
|
2019-05-14 18:10:25 +03:00
|
|
|
|
2019-05-15 11:24:27 -07:00
|
|
|
webhookRegistrationClient, err := webhooks.NewWebhookRegistrationClient(clientConfig, client)
|
2019-05-14 18:10:25 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Unable to register admission webhooks on cluster: %v\n", err)
|
|
|
|
}
|
2019-03-04 20:40:02 +02:00
|
|
|
|
|
|
|
stopCh := signals.SetupSignalHandler()
|
2019-05-14 18:10:25 +03:00
|
|
|
|
2019-05-15 12:29:09 -07:00
|
|
|
policyInformerFactory.Run(stopCh)
|
2019-05-14 18:10:25 +03:00
|
|
|
eventController.Run(stopCh)
|
2019-03-04 20:40:02 +02:00
|
|
|
|
2019-05-10 00:05:21 -07:00
|
|
|
if err = policyController.Run(stopCh); err != nil {
|
|
|
|
log.Fatalf("Error running PolicyController: %v\n", err)
|
2019-03-04 20:40:02 +02:00
|
|
|
}
|
2019-03-22 22:11:55 +02:00
|
|
|
|
2019-05-14 18:10:25 +03:00
|
|
|
if err = webhookRegistrationClient.Register(); err != nil {
|
|
|
|
log.Fatalf("Failed registering Admission Webhooks: %v\n", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
server.RunAsync()
|
2019-03-04 20:40:02 +02:00
|
|
|
<-stopCh
|
2019-03-25 15:44:53 +02:00
|
|
|
server.Stop()
|
2019-05-15 07:30:22 -07:00
|
|
|
policyController.Stop()
|
2019-02-11 19:49:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func init() {
|
2019-03-04 20:40:02 +02:00
|
|
|
flag.StringVar(&kubeconfig, "kubeconfig", "", "Path to a kubeconfig. Only required if out-of-cluster.")
|
|
|
|
flag.StringVar(&cert, "cert", "", "TLS certificate used in connection with cluster.")
|
|
|
|
flag.StringVar(&key, "key", "", "Key, used in TLS connection.")
|
2019-03-15 19:03:55 +02:00
|
|
|
flag.Parse()
|
2019-02-21 20:31:18 +02:00
|
|
|
}
|