2021-07-22 16:32:26 +02:00

134 lines
3.4 KiB
Go

// Copyright (c) 2021 Gitpod GmbH. All rights reserved.
// Licensed under the GNU Affero General Public License (AGPL).
// See License-AGPL.txt in the project root for license information.
package cmd
import (
"crypto/tls"
"crypto/x509"
"encoding/json"
"fmt"
"io/ioutil"
"os"
"github.com/gitpod-io/gitpod/common-go/log"
"github.com/gitpod-io/gitpod/common-go/tracing"
"github.com/gitpod-io/gitpod/image-builder/pkg/orchestrator"
"github.com/mattn/go-isatty"
"github.com/spf13/cobra"
"golang.org/x/xerrors"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials"
)
var (
// ServiceName is the name we use for tracing/logging
ServiceName = "image-builder"
// Version of this service - set during build
Version = ""
)
var verbose bool
var configFile string
var rootCmd = &cobra.Command{
Use: "image-builder",
Short: "Workspace image-builder service",
PersistentPreRun: func(cmd *cobra.Command, args []string) {
log.Init(ServiceName, Version, verbose && !isatty.IsTerminal(os.Stdout.Fd()), verbose)
},
}
// Execute runs this main command
func Execute() {
closer := tracing.Init("image-builder")
if closer != nil {
defer closer.Close()
}
if err := rootCmd.Execute(); err != nil {
fmt.Println(err)
os.Exit(1)
}
}
func getConfig() *config {
ctnt, err := ioutil.ReadFile(configFile)
if err != nil {
log.WithError(xerrors.Errorf("cannot read config: %w", err)).Error("cannot read configuration. Maybe missing --config?")
os.Exit(1)
}
var cfg config
err = json.Unmarshal(ctnt, &cfg)
if err != nil {
log.WithError(err).Error("cannot read configuration. Maybe missing --config?")
os.Exit(1)
}
return &cfg
}
func init() {
rootCmd.PersistentFlags().BoolVarP(&verbose, "verbose", "v", false, "Enable verbose JSON logging")
rootCmd.PersistentFlags().StringVar(&configFile, "config", "", "config file")
}
type config struct {
Orchestrator *orchestrator.Configuration `json:"orchestrator"`
RefCache refcacheConfig `json:"refCache,omitempty"`
Service struct {
Addr string `json:"address"`
TLS tlsConfig `json:"tls"`
} `json:"service"`
Prometheus struct {
Addr string `json:"address"`
} `json:"prometheus"`
PProf struct {
Addr string `json:"address"`
} `json:"pprof"`
}
type refcacheConfig struct {
Interval string `json:"interval"`
Refs []string `json:"refs"`
}
type tlsConfig struct {
Authority string `json:"ca"`
Certificate string `json:"crt"`
PrivateKey string `json:"key"`
}
// ServerOption produces the GRPC option that configures a server to use this TLS configuration
func (c *tlsConfig) ServerOption() (grpc.ServerOption, error) {
if c.Authority == "" || c.Certificate == "" || c.PrivateKey == "" {
return nil, nil
}
// Load certs
certificate, err := tls.LoadX509KeyPair(c.Certificate, c.PrivateKey)
if err != nil {
return nil, xerrors.Errorf("cannot load TLS certificate: %w", err)
}
// Create a certificate pool from the certificate authority
certPool := x509.NewCertPool()
ca, err := ioutil.ReadFile(c.Authority)
if err != nil {
return nil, xerrors.Errorf("cannot not read ca certificate: %w", err)
}
if ok := certPool.AppendCertsFromPEM(ca); !ok {
return nil, xerrors.Errorf("failed to append ca certs")
}
creds := credentials.NewTLS(&tls.Config{
ClientAuth: tls.RequireAndVerifyClientCert,
Certificates: []tls.Certificate{certificate},
ClientCAs: certPool,
})
return grpc.Creds(creds), nil
}