Merge pull request #1 from munnerz/deployment-updates
Build and deployment fixes
This commit is contained in:
		
						commit
						f06ad32f09
					
				
							
								
								
									
										20
									
								
								Makefile
									
									
									
									
									
								
							
							
						
						
									
										20
									
								
								Makefile
									
									
									
									
									
								
							| @ -0,0 +1,20 @@ | |||||||
|  | IMAGE_NAME := "webhook" | ||||||
|  | IMAGE_TAG := "latest" | ||||||
|  | 
 | ||||||
|  | OUT := $(shell pwd)/_out | ||||||
|  | 
 | ||||||
|  | $(shell mkdir -p "$(OUT)") | ||||||
|  | 
 | ||||||
|  | verify: | ||||||
|  | 	go test -v . | ||||||
|  | 
 | ||||||
|  | build: | ||||||
|  | 	docker build -t "$(IMAGE_NAME):$(IMAGE_TAG)" . | ||||||
|  | 
 | ||||||
|  | .PHONY: rendered-manifest.yaml | ||||||
|  | rendered-manifest.yaml: | ||||||
|  | 	helm template \
 | ||||||
|  | 	    --name example-webhook \
 | ||||||
|  |         --set image.repository=$(IMAGE_NAME) \
 | ||||||
|  |         --set image.tag=$(IMAGE_TAG) \
 | ||||||
|  |         deploy/example-webhook > "$(OUT)/rendered-manifest.yaml" | ||||||
| @ -1,19 +0,0 @@ | |||||||
| 1. Get the application URL by running these commands: |  | ||||||
| {{- if .Values.ingress.enabled }} |  | ||||||
| {{- range .Values.ingress.hosts }} |  | ||||||
|   http{{ if $.Values.ingress.tls }}s{{ end }}://{{ . }}{{ $.Values.ingress.path }} |  | ||||||
| {{- end }} |  | ||||||
| {{- else if contains "NodePort" .Values.service.type }} |  | ||||||
|   export NODE_PORT=$(kubectl get --namespace {{ .Release.Namespace }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ include "example-webhook.fullname" . }}) |  | ||||||
|   export NODE_IP=$(kubectl get nodes --namespace {{ .Release.Namespace }} -o jsonpath="{.items[0].status.addresses[0].address}") |  | ||||||
|   echo http://$NODE_IP:$NODE_PORT |  | ||||||
| {{- else if contains "LoadBalancer" .Values.service.type }} |  | ||||||
|      NOTE: It may take a few minutes for the LoadBalancer IP to be available. |  | ||||||
|            You can watch the status of by running 'kubectl get svc -w {{ include "example-webhook.fullname" . }}' |  | ||||||
|   export SERVICE_IP=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ include "example-webhook.fullname" . }} -o jsonpath='{.status.loadBalancer.ingress[0].ip}') |  | ||||||
|   echo http://$SERVICE_IP:{{ .Values.service.port }} |  | ||||||
| {{- else if contains "ClusterIP" .Values.service.type }} |  | ||||||
|   export POD_NAME=$(kubectl get pods --namespace {{ .Release.Namespace }} -l "app={{ include "example-webhook.name" . }},release={{ .Release.Name }}" -o jsonpath="{.items[0].metadata.name}") |  | ||||||
|   echo "Visit http://127.0.0.1:8080 to use your application" |  | ||||||
|   kubectl port-forward $POD_NAME 8080:80 |  | ||||||
| {{- end }} |  | ||||||
| @ -30,3 +30,19 @@ Create chart name and version as used by the chart label. | |||||||
| {{- define "example-webhook.chart" -}} | {{- define "example-webhook.chart" -}} | ||||||
| {{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} | {{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} | ||||||
| {{- end -}} | {{- end -}} | ||||||
|  | 
 | ||||||
|  | {{- define "example-webhook.selfSignedIssuer" -}} | ||||||
|  | {{ printf "%s-selfsign" (include "example-webhook.fullname" .) }} | ||||||
|  | {{- end -}} | ||||||
|  | 
 | ||||||
|  | {{- define "example-webhook.rootCAIssuer" -}} | ||||||
|  | {{ printf "%s-ca" (include "example-webhook.fullname" .) }} | ||||||
|  | {{- end -}} | ||||||
|  | 
 | ||||||
|  | {{- define "example-webhook.rootCACertificate" -}} | ||||||
|  | {{ printf "%s-ca" (include "example-webhook.fullname" .) }} | ||||||
|  | {{- end -}} | ||||||
|  | 
 | ||||||
|  | {{- define "example-webhook.servingCertificate" -}} | ||||||
|  | {{ printf "%s-webhook-tls" (include "example-webhook.fullname" .) }} | ||||||
|  | {{- end -}} | ||||||
|  | |||||||
| @ -7,11 +7,12 @@ metadata: | |||||||
|     chart: {{ include "example-webhook.chart" . }} |     chart: {{ include "example-webhook.chart" . }} | ||||||
|     release: {{ .Release.Name }} |     release: {{ .Release.Name }} | ||||||
|     heritage: {{ .Release.Service }} |     heritage: {{ .Release.Service }} | ||||||
|  |   annotations: | ||||||
|  |     certmanager.k8s.io/inject-ca-from: "{{ .Release.Namespace }}/{{ include "example-webhook.servingCertificate" . }}" | ||||||
| spec: | spec: | ||||||
|   group: {{ .Values.groupName }} |   group: {{ .Values.groupName }} | ||||||
|   groupPriorityMinimum: 1000 |   groupPriorityMinimum: 1000 | ||||||
|   versionPriority: 15 |   versionPriority: 15 | ||||||
|   insecureSkipTLSVerify: true |  | ||||||
|   service: |   service: | ||||||
|     name: {{ include "example-webhook.fullname" . }} |     name: {{ include "example-webhook.fullname" . }} | ||||||
|     namespace: {{ .Release.Namespace }} |     namespace: {{ .Release.Namespace }} | ||||||
|  | |||||||
| @ -24,6 +24,9 @@ spec: | |||||||
|         - name: {{ .Chart.Name }} |         - name: {{ .Chart.Name }} | ||||||
|           image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}" |           image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}" | ||||||
|           imagePullPolicy: {{ .Values.image.pullPolicy }} |           imagePullPolicy: {{ .Values.image.pullPolicy }} | ||||||
|  |           args: | ||||||
|  |             - --tls-cert-file=/tls/tls.crt | ||||||
|  |             - --tls-private-key-file=/tls/tls.key | ||||||
|           env: |           env: | ||||||
|             - name: GROUP_NAME |             - name: GROUP_NAME | ||||||
|               value: {{ .Values.groupName | quote }} |               value: {{ .Values.groupName | quote }} | ||||||
| @ -41,8 +44,16 @@ spec: | |||||||
|               scheme: HTTPS |               scheme: HTTPS | ||||||
|               path: /healthz |               path: /healthz | ||||||
|               port: https |               port: https | ||||||
|  |           volumeMounts: | ||||||
|  |             - name: certs | ||||||
|  |               mountPath: /tls | ||||||
|  |               readOnly: true | ||||||
|           resources: |           resources: | ||||||
| {{ toYaml .Values.resources | indent 12 }} | {{ toYaml .Values.resources | indent 12 }} | ||||||
|  |       volumes: | ||||||
|  |         - name: certs | ||||||
|  |           secret: | ||||||
|  |             secretName: {{ include "example-webhook.servingCertificate" . }} | ||||||
|     {{- with .Values.nodeSelector }} |     {{- with .Values.nodeSelector }} | ||||||
|       nodeSelector: |       nodeSelector: | ||||||
| {{ toYaml . | indent 8 }} | {{ toYaml . | indent 8 }} | ||||||
|  | |||||||
							
								
								
									
										76
									
								
								deploy/example-webhook/templates/pki.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										76
									
								
								deploy/example-webhook/templates/pki.yaml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,76 @@ | |||||||
|  | --- | ||||||
|  | # Create a selfsigned Issuer, in order to create a root CA certificate for | ||||||
|  | # signing webhook serving certificates | ||||||
|  | apiVersion: certmanager.k8s.io/v1alpha1 | ||||||
|  | kind: Issuer | ||||||
|  | metadata: | ||||||
|  |   name: {{ include "example-webhook.selfSignedIssuer" . }} | ||||||
|  |   namespace: {{ .Release.Namespace | quote }} | ||||||
|  |   labels: | ||||||
|  |     app: {{ include "example-webhook.name" . }} | ||||||
|  |     chart: {{ include "example-webhook.chart" . }} | ||||||
|  |     release: {{ .Release.Name }} | ||||||
|  |     heritage: {{ .Release.Service }} | ||||||
|  | spec: | ||||||
|  |   selfSigned: {} | ||||||
|  | 
 | ||||||
|  | --- | ||||||
|  | 
 | ||||||
|  | # Generate a CA Certificate used to sign certificates for the webhook | ||||||
|  | apiVersion: certmanager.k8s.io/v1alpha1 | ||||||
|  | kind: Certificate | ||||||
|  | metadata: | ||||||
|  |   name: {{ include "example-webhook.rootCACertificate" . }} | ||||||
|  |   namespace: {{ .Release.Namespace | quote }} | ||||||
|  |   labels: | ||||||
|  |     app: {{ include "example-webhook.name" . }} | ||||||
|  |     chart: {{ include "example-webhook.chart" . }} | ||||||
|  |     release: {{ .Release.Name }} | ||||||
|  |     heritage: {{ .Release.Service }} | ||||||
|  | spec: | ||||||
|  |   secretName: {{ include "example-webhook.rootCACertificate" . }} | ||||||
|  |   duration: 43800h # 5y | ||||||
|  |   issuerRef: | ||||||
|  |     name: {{ include "example-webhook.selfSignedIssuer" . }} | ||||||
|  |   commonName: "ca.example-webhook.cert-manager" | ||||||
|  |   isCA: true | ||||||
|  | 
 | ||||||
|  | --- | ||||||
|  | 
 | ||||||
|  | # Create an Issuer that uses the above generated CA certificate to issue certs | ||||||
|  | apiVersion: certmanager.k8s.io/v1alpha1 | ||||||
|  | kind: Issuer | ||||||
|  | metadata: | ||||||
|  |   name: {{ include "example-webhook.rootCAIssuer" . }} | ||||||
|  |   namespace: {{ .Release.Namespace | quote }} | ||||||
|  |   labels: | ||||||
|  |     app: {{ include "example-webhook.name" . }} | ||||||
|  |     chart: {{ include "example-webhook.chart" . }} | ||||||
|  |     release: {{ .Release.Name }} | ||||||
|  |     heritage: {{ .Release.Service }} | ||||||
|  | spec: | ||||||
|  |   ca: | ||||||
|  |     secretName: {{ include "example-webhook.rootCACertificate" . }} | ||||||
|  | 
 | ||||||
|  | --- | ||||||
|  | 
 | ||||||
|  | # Finally, generate a serving certificate for the webhook to use | ||||||
|  | apiVersion: certmanager.k8s.io/v1alpha1 | ||||||
|  | kind: Certificate | ||||||
|  | metadata: | ||||||
|  |   name: {{ include "example-webhook.servingCertificate" . }} | ||||||
|  |   namespace: {{ .Release.Namespace | quote }} | ||||||
|  |   labels: | ||||||
|  |     app: {{ include "example-webhook.name" . }} | ||||||
|  |     chart: {{ include "example-webhook.chart" . }} | ||||||
|  |     release: {{ .Release.Name }} | ||||||
|  |     heritage: {{ .Release.Service }} | ||||||
|  | spec: | ||||||
|  |   secretName: {{ include "example-webhook.servingCertificate" . }} | ||||||
|  |   duration: 8760h # 1y | ||||||
|  |   issuerRef: | ||||||
|  |     name: {{ include "example-webhook.rootCAIssuer" . }} | ||||||
|  |   dnsNames: | ||||||
|  |   - {{ include "example-webhook.fullname" . }} | ||||||
|  |   - {{ include "example-webhook.fullname" . }}.{{ .Release.Namespace }} | ||||||
|  |   - {{ include "example-webhook.fullname" . }}.{{ .Release.Namespace }}.svc | ||||||
| @ -14,7 +14,7 @@ certManager: | |||||||
| 
 | 
 | ||||||
| image: | image: | ||||||
|   repository: mycompany/webhook-image |   repository: mycompany/webhook-image | ||||||
|   tag: stable |   tag: latest | ||||||
|   pullPolicy: IfNotPresent |   pullPolicy: IfNotPresent | ||||||
| 
 | 
 | ||||||
| nameOverride: "" | nameOverride: "" | ||||||
| @ -24,19 +24,6 @@ service: | |||||||
|   type: ClusterIP |   type: ClusterIP | ||||||
|   port: 443 |   port: 443 | ||||||
| 
 | 
 | ||||||
| ingress: |  | ||||||
|   enabled: false |  | ||||||
|   annotations: {} |  | ||||||
|     # kubernetes.io/ingress.class: nginx |  | ||||||
|     # kubernetes.io/tls-acme: "true" |  | ||||||
|   path: / |  | ||||||
|   hosts: |  | ||||||
|     - chart-example.local |  | ||||||
|   tls: [] |  | ||||||
|   #  - secretName: chart-example-tls |  | ||||||
|   #    hosts: |  | ||||||
|   #      - chart-example.local |  | ||||||
| 
 |  | ||||||
| resources: {} | resources: {} | ||||||
|   # We usually recommend not to specify default resources and to leave this as a conscious |   # We usually recommend not to specify default resources and to leave this as a conscious | ||||||
|   # choice for the user. This also increases chances charts run on environments with little |   # choice for the user. This also increases chances charts run on environments with little | ||||||
|  | |||||||
							
								
								
									
										2
									
								
								go.mod
									
									
									
									
									
								
							
							
						
						
									
										2
									
								
								go.mod
									
									
									
									
									
								
							| @ -5,7 +5,7 @@ go 1.12 | |||||||
| require ( | require ( | ||||||
| 	github.com/dgrijalva/jwt-go v3.2.0+incompatible // indirect | 	github.com/dgrijalva/jwt-go v3.2.0+incompatible // indirect | ||||||
| 	github.com/imdario/mergo v0.3.7 // indirect | 	github.com/imdario/mergo v0.3.7 // indirect | ||||||
| 	github.com/jetstack/cert-manager v0.7.1-0.20190418141904-49f91f9fa4d4 | 	github.com/jetstack/cert-manager v0.7.1-0.20190429172244-546d3f1d7627 | ||||||
| 	golang.org/x/oauth2 v0.0.0-20190402181905-9f3314589c9a // indirect | 	golang.org/x/oauth2 v0.0.0-20190402181905-9f3314589c9a // indirect | ||||||
| 	golang.org/x/time v0.0.0-20190308202827-9d24e82272b4 // indirect | 	golang.org/x/time v0.0.0-20190308202827-9d24e82272b4 // indirect | ||||||
| 	k8s.io/apiextensions-apiserver v0.0.0-20190413053546-d0acb7a76918 | 	k8s.io/apiextensions-apiserver v0.0.0-20190413053546-d0acb7a76918 | ||||||
|  | |||||||
							
								
								
									
										4
									
								
								go.sum
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								go.sum
									
									
									
									
									
								
							| @ -184,8 +184,8 @@ github.com/imdario/mergo v0.3.7/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJ | |||||||
| github.com/inconshreveable/mousetrap v1.0.0 h1:Z8tu5sraLXCXIcARxBp/8cbvlwVa7Z1NHg9XEKhtSvM= | github.com/inconshreveable/mousetrap v1.0.0 h1:Z8tu5sraLXCXIcARxBp/8cbvlwVa7Z1NHg9XEKhtSvM= | ||||||
| github.com/inconshreveable/mousetrap v1.0.0/go.mod h1:PxqpIevigyE2G7u3NXJIT2ANytuPF1OarO4DADm73n8= | github.com/inconshreveable/mousetrap v1.0.0/go.mod h1:PxqpIevigyE2G7u3NXJIT2ANytuPF1OarO4DADm73n8= | ||||||
| github.com/jefferai/jsonx v1.0.0/go.mod h1:OGmqmi2tTeI/PS+qQfBDToLHHJIy/RMp24fPo8vFvoQ= | github.com/jefferai/jsonx v1.0.0/go.mod h1:OGmqmi2tTeI/PS+qQfBDToLHHJIy/RMp24fPo8vFvoQ= | ||||||
| github.com/jetstack/cert-manager v0.7.1-0.20190418141904-49f91f9fa4d4 h1:BkzDdMD/2CXv3BWr0uwndx+mXaNbJHamruJNQ/gQNKw= | github.com/jetstack/cert-manager v0.7.1-0.20190429172244-546d3f1d7627 h1:zHzxugtT5zh7jp/U1ZOWLvPMOb0L6Q39nTQzb849V+s= | ||||||
| github.com/jetstack/cert-manager v0.7.1-0.20190418141904-49f91f9fa4d4/go.mod h1:jCOiKjYkFd3eh/kJJK2ufc0hyNQ/yJIUV/V4iWxR1t8= | github.com/jetstack/cert-manager v0.7.1-0.20190429172244-546d3f1d7627/go.mod h1:GsWWdhRdDmHDL/GvVQt82/N/Hr4R6GQfNjZV2BwOPfY= | ||||||
| github.com/jmespath/go-jmespath v0.0.0-20180206201540-c2b33e8439af/go.mod h1:Nht3zPeWKUH0NzdCt2Blrr5ys8VGpn0CEB0cQHVjt7k= | github.com/jmespath/go-jmespath v0.0.0-20180206201540-c2b33e8439af/go.mod h1:Nht3zPeWKUH0NzdCt2Blrr5ys8VGpn0CEB0cQHVjt7k= | ||||||
| github.com/jonboulle/clockwork v0.0.0-20141017032234-72f9bd7c4e0c h1:XpRROA6ssPlTwJI8/pH+61uieOkcJhmAFz25cu0B94Y= | github.com/jonboulle/clockwork v0.0.0-20141017032234-72f9bd7c4e0c h1:XpRROA6ssPlTwJI8/pH+61uieOkcJhmAFz25cu0B94Y= | ||||||
| github.com/jonboulle/clockwork v0.0.0-20141017032234-72f9bd7c4e0c/go.mod h1:Ii8DK3G1RaLaWxj9trq07+26W01tbo22gdxWY5EU2bo= | github.com/jonboulle/clockwork v0.0.0-20141017032234-72f9bd7c4e0c/go.mod h1:Ii8DK3G1RaLaWxj9trq07+26W01tbo22gdxWY5EU2bo= | ||||||
|  | |||||||
							
								
								
									
										7
									
								
								main.go
									
									
									
									
									
								
							
							
						
						
									
										7
									
								
								main.go
									
									
									
									
									
								
							| @ -3,6 +3,7 @@ package main | |||||||
| import ( | import ( | ||||||
| 	"encoding/json" | 	"encoding/json" | ||||||
| 	"fmt" | 	"fmt" | ||||||
|  | 	"os" | ||||||
| 
 | 
 | ||||||
| 	extapi "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1" | 	extapi "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1" | ||||||
| 	//"k8s.io/client-go/kubernetes" | 	//"k8s.io/client-go/kubernetes" | ||||||
| @ -12,9 +13,13 @@ import ( | |||||||
| 	"github.com/jetstack/cert-manager/pkg/acme/webhook/cmd" | 	"github.com/jetstack/cert-manager/pkg/acme/webhook/cmd" | ||||||
| ) | ) | ||||||
| 
 | 
 | ||||||
| const GroupName = "acme.mycompany.com" | var GroupName = os.Getenv("GROUP_NAME") | ||||||
| 
 | 
 | ||||||
| func main() { | func main() { | ||||||
|  | 	if GroupName == "" { | ||||||
|  | 		panic("GROUP_NAME must be specified") | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
| 	// This will register our custom DNS provider with the webhook serving | 	// This will register our custom DNS provider with the webhook serving | ||||||
| 	// library, making it available as an API under the provided GroupName. | 	// library, making it available as an API under the provided GroupName. | ||||||
| 	// You can register multiple DNS provider implementations with a single | 	// You can register multiple DNS provider implementations with a single | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user