mirror of
https://github.com/gitpod-io/gitpod.git
synced 2025-12-08 17:36:30 +00:00
215 lines
5.9 KiB
Go
215 lines
5.9 KiB
Go
// Copyright (c) 2021 Gitpod GmbH. All rights reserved.
|
|
// Licensed under the GNU Affero General Public License (AGPL).
|
|
// See License.AGPL.txt in the project root for license information.
|
|
|
|
package cluster
|
|
|
|
import (
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/gitpod-io/gitpod/installer/pkg/common"
|
|
"github.com/gitpod-io/gitpod/installer/pkg/config/v1/experimental"
|
|
|
|
trust "github.com/cert-manager/trust-manager/pkg/apis/trust/v1alpha1"
|
|
v1 "github.com/jetstack/cert-manager/pkg/apis/certmanager/v1"
|
|
cmmeta "github.com/jetstack/cert-manager/pkg/apis/meta/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/utils/pointer"
|
|
)
|
|
|
|
func certmanager(ctx *common.RenderContext) ([]runtime.Object, error) {
|
|
issuerName := "gitpod-self-signed-issuer"
|
|
secretCAName := "gitpod-identity-trust-root"
|
|
|
|
gitpodCaBundleSources := []trust.BundleSource{
|
|
{
|
|
UseDefaultCAs: pointer.Bool(true),
|
|
},
|
|
{
|
|
Secret: &trust.SourceObjectKeySelector{
|
|
Name: secretCAName,
|
|
KeySelector: trust.KeySelector{Key: "ca.crt"},
|
|
},
|
|
},
|
|
}
|
|
|
|
gitpodCustomCertificateBundleSource := []trust.BundleSource{}
|
|
|
|
if ctx.Config.CustomCACert != nil {
|
|
gitpodCaBundleSources = append(gitpodCaBundleSources, trust.BundleSource{
|
|
Secret: &trust.SourceObjectKeySelector{
|
|
Name: ctx.Config.CustomCACert.Name,
|
|
KeySelector: trust.KeySelector{Key: "ca.crt"},
|
|
},
|
|
})
|
|
|
|
gitpodCustomCertificateBundleSource = append(gitpodCustomCertificateBundleSource, trust.BundleSource{
|
|
Secret: &trust.SourceObjectKeySelector{
|
|
Name: ctx.Config.CustomCACert.Name,
|
|
KeySelector: trust.KeySelector{Key: "ca.crt"},
|
|
},
|
|
})
|
|
}
|
|
|
|
// TODO (gpl): This is a workaround to untangle the refactoring of existing infrastructure from
|
|
// moving forward with this change
|
|
caCertificateNamespace := "cert-manager" // this is the default we want to converge on, eventually
|
|
_ = ctx.WithExperimental(func(cfg *experimental.Config) error {
|
|
if cfg.WebApp != nil && cfg.WebApp.CertmanagerNamespaceOverride != "" {
|
|
caCertificateNamespace = cfg.WebApp.CertmanagerNamespaceOverride
|
|
}
|
|
return nil
|
|
})
|
|
|
|
objects := []runtime.Object{
|
|
// Define a self-signed issuer so we can generate a CA
|
|
&v1.ClusterIssuer{
|
|
TypeMeta: common.TypeMetaCertificateClusterIssuer,
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: issuerName,
|
|
Labels: common.DefaultLabels(Component),
|
|
},
|
|
Spec: v1.IssuerSpec{IssuerConfig: v1.IssuerConfig{
|
|
SelfSigned: &v1.SelfSignedIssuer{},
|
|
}},
|
|
},
|
|
// Generate that CA
|
|
&v1.Certificate{
|
|
TypeMeta: common.TypeMetaCertificate,
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "gitpod-trust-anchor",
|
|
Namespace: caCertificateNamespace,
|
|
Labels: common.DefaultLabels(Component),
|
|
},
|
|
Spec: v1.CertificateSpec{
|
|
IsCA: true,
|
|
Duration: &metav1.Duration{Duration: time.Duration(8760 * time.Hour)}, // 365 days
|
|
CommonName: "root.gitpod.cluster.local",
|
|
SecretName: secretCAName,
|
|
PrivateKey: &v1.CertificatePrivateKey{
|
|
Algorithm: v1.ECDSAKeyAlgorithm,
|
|
Size: 256,
|
|
},
|
|
IssuerRef: cmmeta.ObjectReference{
|
|
Name: issuerName,
|
|
Kind: v1.ClusterIssuerKind,
|
|
Group: "cert-manager.io",
|
|
},
|
|
SecretTemplate: &v1.CertificateSecretTemplate{
|
|
Labels: common.DefaultLabels(Component),
|
|
},
|
|
Usages: []v1.KeyUsage{
|
|
v1.UsageCertSign,
|
|
v1.UsageCRLSign,
|
|
},
|
|
},
|
|
},
|
|
// Set the CA to our issuer
|
|
&v1.ClusterIssuer{
|
|
TypeMeta: common.TypeMetaCertificateClusterIssuer,
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: common.CertManagerCAIssuer,
|
|
Labels: common.DefaultLabels(Component),
|
|
},
|
|
Spec: v1.IssuerSpec{
|
|
IssuerConfig: v1.IssuerConfig{
|
|
CA: &v1.CAIssuer{SecretName: secretCAName},
|
|
},
|
|
},
|
|
},
|
|
// Generate that CA
|
|
&v1.Certificate{
|
|
TypeMeta: common.TypeMetaCertificate,
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: common.CertManagerCAIssuer,
|
|
Namespace: ctx.Namespace,
|
|
Labels: common.DefaultLabels(Component),
|
|
},
|
|
Spec: v1.CertificateSpec{
|
|
IsCA: true,
|
|
Duration: &metav1.Duration{Duration: time.Duration(2190 * time.Hour)}, // 90 days
|
|
CommonName: "ca.gitpod.cluster.local",
|
|
SecretName: fmt.Sprintf("%v-intermediate", secretCAName),
|
|
PrivateKey: &v1.CertificatePrivateKey{
|
|
Algorithm: v1.ECDSAKeyAlgorithm,
|
|
Size: 256,
|
|
},
|
|
IssuerRef: cmmeta.ObjectReference{
|
|
Name: common.CertManagerCAIssuer,
|
|
Kind: v1.ClusterIssuerKind,
|
|
Group: "cert-manager.io",
|
|
},
|
|
SecretTemplate: &v1.CertificateSecretTemplate{
|
|
Labels: common.DefaultLabels(Component),
|
|
},
|
|
Usages: []v1.KeyUsage{
|
|
v1.UsageCertSign,
|
|
v1.UsageCRLSign,
|
|
v1.UsageServerAuth,
|
|
v1.UsageClientAuth,
|
|
},
|
|
},
|
|
},
|
|
// trust Bundle
|
|
&trust.Bundle{
|
|
TypeMeta: common.TypeMetaBundle,
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "gitpod-ca-bundle",
|
|
},
|
|
Spec: trust.BundleSpec{
|
|
Sources: gitpodCaBundleSources,
|
|
Target: trust.BundleTarget{
|
|
ConfigMap: &trust.KeySelector{
|
|
Key: "ca-certificates.crt",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
// single gitpod Bundle (used by registry-facade)
|
|
&trust.Bundle{
|
|
TypeMeta: common.TypeMetaBundle,
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "gitpod-ca",
|
|
},
|
|
Spec: trust.BundleSpec{
|
|
Sources: []trust.BundleSource{
|
|
{
|
|
Secret: &trust.SourceObjectKeySelector{
|
|
Name: secretCAName,
|
|
KeySelector: trust.KeySelector{Key: "ca.crt"},
|
|
},
|
|
},
|
|
},
|
|
Target: trust.BundleTarget{
|
|
ConfigMap: &trust.KeySelector{
|
|
Key: "gitpod-ca.crt",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
if ctx.Config.CustomCACert != nil {
|
|
objects = append(objects,
|
|
// trust Bundle for custom SSL certificates
|
|
&trust.Bundle{
|
|
TypeMeta: common.TypeMetaBundle,
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "gitpod-customer-certificate-bundle",
|
|
},
|
|
Spec: trust.BundleSpec{
|
|
Sources: gitpodCustomCertificateBundleSource,
|
|
Target: trust.BundleTarget{
|
|
ConfigMap: &trust.KeySelector{
|
|
Key: "ca-certificates.crt",
|
|
},
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
return objects, nil
|
|
}
|