mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-31 03:45:17 +00:00
flag to use FQDN as CommonName in CSR
This commit is contained in:
parent
622d007e18
commit
38dcb2e94f
3 changed files with 34 additions and 28 deletions
|
@ -27,12 +27,12 @@ import (
|
||||||
var (
|
var (
|
||||||
kubeconfig string
|
kubeconfig string
|
||||||
serverIP string
|
serverIP string
|
||||||
cpu bool
|
|
||||||
memory bool
|
|
||||||
webhookTimeout int
|
webhookTimeout int
|
||||||
//TODO: this has been added to backward support command line arguments
|
//TODO: this has been added to backward support command line arguments
|
||||||
// will be removed in future and the configuration will be set only via configmaps
|
// will be removed in future and the configuration will be set only via configmaps
|
||||||
filterK8Resources string
|
filterK8Resources string
|
||||||
|
// User FQDN as CSR CN
|
||||||
|
FQDNCN bool
|
||||||
)
|
)
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
|
@ -168,7 +168,7 @@ func main() {
|
||||||
policyMetaStore)
|
policyMetaStore)
|
||||||
|
|
||||||
// CONFIGURE CERTIFICATES
|
// CONFIGURE CERTIFICATES
|
||||||
tlsPair, err := client.InitTLSPemPair(clientConfig)
|
tlsPair, err := client.InitTLSPemPair(clientConfig, FQDNCN)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatalf("Failed to initialize TLS key/certificate pair: %v\n", err)
|
glog.Fatalf("Failed to initialize TLS key/certificate pair: %v\n", err)
|
||||||
}
|
}
|
||||||
|
@ -246,6 +246,8 @@ func init() {
|
||||||
flag.IntVar(&webhookTimeout, "webhooktimeout", 3, "timeout for webhook configurations")
|
flag.IntVar(&webhookTimeout, "webhooktimeout", 3, "timeout for webhook configurations")
|
||||||
flag.StringVar(&kubeconfig, "kubeconfig", "", "Path to a kubeconfig. Only required if out-of-cluster.")
|
flag.StringVar(&kubeconfig, "kubeconfig", "", "Path to a kubeconfig. Only required if out-of-cluster.")
|
||||||
flag.StringVar(&serverIP, "serverIP", "", "IP address where Kyverno controller runs. Only required if out-of-cluster.")
|
flag.StringVar(&serverIP, "serverIP", "", "IP address where Kyverno controller runs. Only required if out-of-cluster.")
|
||||||
|
// Generate CSR with CN as FQDN due to https://github.com/nirmata/kyverno/issues/542
|
||||||
|
flag.BoolVar(&FQDNCN, "FQDNAsCN", false, "use FQDN as Common Name in CSR")
|
||||||
config.LogDefaultFlags()
|
config.LogDefaultFlags()
|
||||||
flag.Parse()
|
flag.Parse()
|
||||||
}
|
}
|
||||||
|
|
|
@ -18,15 +18,15 @@ import (
|
||||||
// InitTLSPemPair Loads or creates PEM private key and TLS certificate for webhook server.
|
// InitTLSPemPair Loads or creates PEM private key and TLS certificate for webhook server.
|
||||||
// Created pair is stored in cluster's secret.
|
// Created pair is stored in cluster's secret.
|
||||||
// Returns struct with key/certificate pair.
|
// Returns struct with key/certificate pair.
|
||||||
func (c *Client) InitTLSPemPair(configuration *rest.Config) (*tls.TlsPemPair, error) {
|
func (c *Client) InitTLSPemPair(configuration *rest.Config, FQDNCN bool) (*tls.TlsPemPair, error) {
|
||||||
certProps, err := c.GetTLSCertProps(configuration)
|
certProps, err := c.GetTLSCertProps(configuration)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
tlsPair := c.ReadTlsPair(certProps)
|
tlsPair := c.ReadTlsPair(certProps)
|
||||||
if tls.IsTlsPairShouldBeUpdated(tlsPair) {
|
if tls.IsTLSPairShouldBeUpdated(tlsPair) {
|
||||||
glog.Info("Generating new key/certificate pair for TLS")
|
glog.Info("Generating new key/certificate pair for TLS")
|
||||||
tlsPair, err = c.GenerateTlsPemPair(certProps)
|
tlsPair, err = c.generateTLSPemPair(certProps, FQDNCN)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -40,15 +40,15 @@ func (c *Client) InitTLSPemPair(configuration *rest.Config) (*tls.TlsPemPair, er
|
||||||
return tlsPair, nil
|
return tlsPair, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
//GenerateTlsPemPair Issues TLS certificate for webhook server using given PEM private key
|
//generateTlsPemPair Issues TLS certificate for webhook server using given PEM private key
|
||||||
// Returns signed and approved TLS certificate in PEM format
|
// Returns signed and approved TLS certificate in PEM format
|
||||||
func (c *Client) GenerateTlsPemPair(props tls.TlsCertificateProps) (*tls.TlsPemPair, error) {
|
func (c *Client) generateTLSPemPair(props tls.TlsCertificateProps, FQDNCN bool) (*tls.TlsPemPair, error) {
|
||||||
privateKey, err := tls.TlsGeneratePrivateKey()
|
privateKey, err := tls.TLSGeneratePrivateKey()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
certRequest, err := tls.TlsCertificateGenerateRequest(privateKey, props)
|
certRequest, err := tls.CertificateGenerateRequest(privateKey, props, FQDNCN)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("Unable to create certificate request: %v", err)
|
return nil, fmt.Errorf("Unable to create certificate request: %v", err)
|
||||||
}
|
}
|
||||||
|
@ -65,7 +65,7 @@ func (c *Client) GenerateTlsPemPair(props tls.TlsCertificateProps) (*tls.TlsPemP
|
||||||
|
|
||||||
return &tls.TlsPemPair{
|
return &tls.TlsPemPair{
|
||||||
Certificate: tlsCert,
|
Certificate: tlsCert,
|
||||||
PrivateKey: tls.TlsPrivateKeyToPem(privateKey),
|
PrivateKey: tls.TLSPrivateKeyToPem(privateKey),
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -27,13 +27,13 @@ type TlsPemPair struct {
|
||||||
PrivateKey []byte
|
PrivateKey []byte
|
||||||
}
|
}
|
||||||
|
|
||||||
//TlsGeneratePrivateKey Generates RSA private key
|
//TLSGeneratePrivateKey Generates RSA private key
|
||||||
func TlsGeneratePrivateKey() (*rsa.PrivateKey, error) {
|
func TLSGeneratePrivateKey() (*rsa.PrivateKey, error) {
|
||||||
return rsa.GenerateKey(rand.Reader, 2048)
|
return rsa.GenerateKey(rand.Reader, 2048)
|
||||||
}
|
}
|
||||||
|
|
||||||
//TlsPrivateKeyToPem Creates PEM block from private key object
|
//TLSPrivateKeyToPem Creates PEM block from private key object
|
||||||
func TlsPrivateKeyToPem(rsaKey *rsa.PrivateKey) []byte {
|
func TLSPrivateKeyToPem(rsaKey *rsa.PrivateKey) []byte {
|
||||||
privateKey := &pem.Block{
|
privateKey := &pem.Block{
|
||||||
Type: "PRIVATE KEY",
|
Type: "PRIVATE KEY",
|
||||||
Bytes: x509.MarshalPKCS1PrivateKey(rsaKey),
|
Bytes: x509.MarshalPKCS1PrivateKey(rsaKey),
|
||||||
|
@ -43,7 +43,7 @@ func TlsPrivateKeyToPem(rsaKey *rsa.PrivateKey) []byte {
|
||||||
}
|
}
|
||||||
|
|
||||||
//TlsCertificateRequestToPem Creates PEM block from raw certificate request
|
//TlsCertificateRequestToPem Creates PEM block from raw certificate request
|
||||||
func TlsCertificateRequestToPem(csrRaw []byte) []byte {
|
func certificateRequestToPem(csrRaw []byte) []byte {
|
||||||
csrBlock := &pem.Block{
|
csrBlock := &pem.Block{
|
||||||
Type: "CERTIFICATE REQUEST",
|
Type: "CERTIFICATE REQUEST",
|
||||||
Bytes: csrRaw,
|
Bytes: csrRaw,
|
||||||
|
@ -52,26 +52,30 @@ func TlsCertificateRequestToPem(csrRaw []byte) []byte {
|
||||||
return pem.EncodeToMemory(csrBlock)
|
return pem.EncodeToMemory(csrBlock)
|
||||||
}
|
}
|
||||||
|
|
||||||
//TlsCertificateGenerateRequest Generates raw certificate signing request
|
//CertificateGenerateRequest Generates raw certificate signing request
|
||||||
func TlsCertificateGenerateRequest(privateKey *rsa.PrivateKey, props TlsCertificateProps) (*certificates.CertificateSigningRequest, error) {
|
func CertificateGenerateRequest(privateKey *rsa.PrivateKey, props TlsCertificateProps, FQDNCN bool) (*certificates.CertificateSigningRequest, error) {
|
||||||
dnsNames := make([]string, 3)
|
dnsNames := make([]string, 3)
|
||||||
dnsNames[0] = props.Service
|
dnsNames[0] = props.Service
|
||||||
dnsNames[1] = props.Service + "." + props.Namespace
|
dnsNames[1] = props.Service + "." + props.Namespace
|
||||||
// The full service name is the CommonName for the certificate
|
// The full service name is the CommonName for the certificate
|
||||||
commonName := GenerateInClusterServiceName(props)
|
commonName := GenerateInClusterServiceName(props)
|
||||||
dnsNames[2] = commonName
|
dnsNames[2] = commonName
|
||||||
|
csCommonName := props.Service
|
||||||
|
if FQDNCN {
|
||||||
|
// use FQDN as CommonName as a workaournd for https://github.com/nirmata/kyverno/issues/542
|
||||||
|
csCommonName = commonName
|
||||||
|
}
|
||||||
var ips []net.IP
|
var ips []net.IP
|
||||||
apiServerIp := net.ParseIP(props.ApiServerHost)
|
apiServerIP := net.ParseIP(props.ApiServerHost)
|
||||||
if apiServerIp != nil {
|
if apiServerIP != nil {
|
||||||
ips = append(ips, apiServerIp)
|
ips = append(ips, apiServerIP)
|
||||||
} else {
|
} else {
|
||||||
dnsNames = append(dnsNames, props.ApiServerHost)
|
dnsNames = append(dnsNames, props.ApiServerHost)
|
||||||
}
|
}
|
||||||
|
|
||||||
csrTemplate := x509.CertificateRequest{
|
csrTemplate := x509.CertificateRequest{
|
||||||
Subject: pkix.Name{
|
Subject: pkix.Name{
|
||||||
CommonName: props.Service, //commonName,
|
CommonName: csCommonName,
|
||||||
},
|
},
|
||||||
SignatureAlgorithm: x509.SHA256WithRSA,
|
SignatureAlgorithm: x509.SHA256WithRSA,
|
||||||
DNSNames: dnsNames,
|
DNSNames: dnsNames,
|
||||||
|
@ -92,7 +96,7 @@ func TlsCertificateGenerateRequest(privateKey *rsa.PrivateKey, props TlsCertific
|
||||||
Name: props.Service + "." + props.Namespace + ".cert-request",
|
Name: props.Service + "." + props.Namespace + ".cert-request",
|
||||||
},
|
},
|
||||||
Spec: certificates.CertificateSigningRequestSpec{
|
Spec: certificates.CertificateSigningRequestSpec{
|
||||||
Request: TlsCertificateRequestToPem(csrBytes),
|
Request: certificateRequestToPem(csrBytes),
|
||||||
Groups: []string{"system:masters", "system:authenticated"},
|
Groups: []string{"system:masters", "system:authenticated"},
|
||||||
Usages: []certificates.KeyUsage{
|
Usages: []certificates.KeyUsage{
|
||||||
certificates.UsageDigitalSignature,
|
certificates.UsageDigitalSignature,
|
||||||
|
@ -110,7 +114,7 @@ func GenerateInClusterServiceName(props TlsCertificateProps) string {
|
||||||
}
|
}
|
||||||
|
|
||||||
//TlsCertificateGetExpirationDate Gets NotAfter property from raw certificate
|
//TlsCertificateGetExpirationDate Gets NotAfter property from raw certificate
|
||||||
func TlsCertificateGetExpirationDate(certData []byte) (*time.Time, error) {
|
func tlsCertificateGetExpirationDate(certData []byte) (*time.Time, error) {
|
||||||
block, _ := pem.Decode(certData)
|
block, _ := pem.Decode(certData)
|
||||||
if block == nil {
|
if block == nil {
|
||||||
return nil, errors.New("Failed to decode PEM")
|
return nil, errors.New("Failed to decode PEM")
|
||||||
|
@ -127,13 +131,13 @@ func TlsCertificateGetExpirationDate(certData []byte) (*time.Time, error) {
|
||||||
// an expired certificate in a controller that has been running for a long time
|
// an expired certificate in a controller that has been running for a long time
|
||||||
const timeReserveBeforeCertificateExpiration time.Duration = time.Hour * 24 * 30 * 6 // About half a year
|
const timeReserveBeforeCertificateExpiration time.Duration = time.Hour * 24 * 30 * 6 // About half a year
|
||||||
|
|
||||||
//IsTlsPairShouldBeUpdated checks if TLS pair has expited and needs to be updated
|
//IsTLSPairShouldBeUpdated checks if TLS pair has expited and needs to be updated
|
||||||
func IsTlsPairShouldBeUpdated(tlsPair *TlsPemPair) bool {
|
func IsTLSPairShouldBeUpdated(tlsPair *TlsPemPair) bool {
|
||||||
if tlsPair == nil {
|
if tlsPair == nil {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
expirationDate, err := TlsCertificateGetExpirationDate(tlsPair.Certificate)
|
expirationDate, err := tlsCertificateGetExpirationDate(tlsPair.Certificate)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue