mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-06 07:57:07 +00:00
87 lines
2.6 KiB
Go
87 lines
2.6 KiB
Go
package main
|
|
|
|
import (
|
|
"flag"
|
|
"log"
|
|
|
|
"github.com/nirmata/kube-policy/kubeclient"
|
|
policyclientset "github.com/nirmata/kube-policy/pkg/client/clientset/versioned"
|
|
informers "github.com/nirmata/kube-policy/pkg/client/informers/externalversions"
|
|
controller "github.com/nirmata/kube-policy/pkg/controller"
|
|
event "github.com/nirmata/kube-policy/pkg/event"
|
|
violation "github.com/nirmata/kube-policy/pkg/violation"
|
|
"github.com/nirmata/kube-policy/pkg/webhooks"
|
|
"k8s.io/sample-controller/pkg/signals"
|
|
)
|
|
|
|
var (
|
|
kubeconfig string
|
|
cert string
|
|
key string
|
|
)
|
|
|
|
func main() {
|
|
clientConfig, err := createClientConfig(kubeconfig)
|
|
if err != nil {
|
|
log.Fatalf("Error building kubeconfig: %v\n", err)
|
|
}
|
|
|
|
kubeclient, err := kubeclient.NewKubeClient(clientConfig, nil)
|
|
if err != nil {
|
|
log.Fatalf("Error creating kubeclient: %v\n", err)
|
|
}
|
|
|
|
policyClientset, err := policyclientset.NewForConfig(clientConfig)
|
|
if err != nil {
|
|
log.Fatalf("Error creating policyClient: %v\n", err)
|
|
}
|
|
|
|
//TODO wrap the policyInformer inside a factory
|
|
policyInformerFactory := informers.NewSharedInformerFactory(policyClientset, 0)
|
|
policyInformer := policyInformerFactory.Kubepolicy().V1alpha1().Policies()
|
|
|
|
eventController := event.NewEventController(kubeclient, policyInformer.Lister(), nil)
|
|
violationBuilder := violation.NewPolicyViolationBuilder(kubeclient, policyInformer.Lister(), policyClientset, eventController, nil)
|
|
|
|
policyController := controller.NewPolicyController(policyClientset,
|
|
policyInformer,
|
|
violationBuilder,
|
|
eventController,
|
|
nil,
|
|
kubeclient)
|
|
|
|
if err != nil {
|
|
log.Fatalf("Error creating mutation webhook: %v\n", err)
|
|
}
|
|
|
|
tlsPair, err := initTlsPemPair(cert, key, clientConfig, kubeclient)
|
|
if err != nil {
|
|
log.Fatalf("Failed to initialize TLS key/certificate pair: %v\n", err)
|
|
}
|
|
|
|
server, err := webhooks.NewWebhookServer(tlsPair, kubeclient, policyInformer.Lister(), nil)
|
|
if err != nil {
|
|
log.Fatalf("Unable to create webhook server: %v\n", err)
|
|
}
|
|
server.RunAsync()
|
|
|
|
stopCh := signals.SetupSignalHandler()
|
|
policyInformerFactory.Start(stopCh)
|
|
if err = eventController.Run(stopCh); err != nil {
|
|
log.Fatalf("Error running EventController: %v\n", err)
|
|
}
|
|
|
|
if err = policyController.Run(stopCh); err != nil {
|
|
log.Fatalf("Error running PolicyController: %v\n", err)
|
|
}
|
|
|
|
<-stopCh
|
|
server.Stop()
|
|
}
|
|
|
|
func init() {
|
|
flag.StringVar(&kubeconfig, "kubeconfig", "", "Path to a kubeconfig. Only required if out-of-cluster.")
|
|
flag.StringVar(&cert, "cert", "", "TLS certificate used in connection with cluster.")
|
|
flag.StringVar(&key, "key", "", "Key, used in TLS connection.")
|
|
flag.Parse()
|
|
}
|