2023-01-13 19:07:42 +00:00
|
|
|
// Copyright 2021-2023 the Pinniped contributors. All Rights Reserved.
|
2021-07-26 16:18:43 +00:00
|
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
|
|
|
|
// Package main is the combined entrypoint for the Pinniped "kube-cert-agent" component.
|
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/base64"
|
|
|
|
"encoding/json"
|
|
|
|
"io"
|
|
|
|
"log"
|
|
|
|
"math"
|
|
|
|
"os"
|
|
|
|
"time"
|
2022-03-29 23:58:41 +00:00
|
|
|
|
2023-01-13 19:07:42 +00:00
|
|
|
// This side effect import ensures that we use fipsonly crypto during TLS in fips_strict mode.
|
|
|
|
//
|
|
|
|
// Commenting this out because it causes the runtime memory consumption of this binary to increase
|
|
|
|
// from ~1 MB to ~8 MB (as measured when running the sleep subcommand). This binary does not use TLS,
|
|
|
|
// so it should not be needed. If this binary is ever changed to make use of TLS client and/or server
|
|
|
|
// code, then we should bring this import back to support the use of the ptls library for client and
|
|
|
|
// server code, and we should also increase the memory limits on the kube cert agent deployment (as
|
|
|
|
// decided by the kube cert agent controller in the Concierge).
|
|
|
|
//
|
|
|
|
//nolint:godot // This is not sentence, it is a commented out line of import code.
|
|
|
|
// _ "go.pinniped.dev/internal/crypto/ptls"
|
|
|
|
|
|
|
|
// This side effect imports cgo so that runtime/cgo gets linked, when in fips_strict mode.
|
|
|
|
// Without this line, the binary will exit 133 upon startup in fips_strict mode.
|
|
|
|
// It also enables fipsonly tls mode, just to be absolutely sure that the fips code is enabled,
|
|
|
|
// even though it shouldn't be used currently by this binary.
|
|
|
|
_ "go.pinniped.dev/internal/crypto/fips"
|
2021-07-26 16:18:43 +00:00
|
|
|
)
|
|
|
|
|
2022-08-24 21:45:55 +00:00
|
|
|
//nolint:gochecknoglobals // these are swapped during unit tests.
|
2021-07-26 16:18:43 +00:00
|
|
|
var (
|
|
|
|
getenv = os.Getenv
|
|
|
|
fail = log.Fatalf
|
|
|
|
sleep = time.Sleep
|
|
|
|
out = io.Writer(os.Stdout)
|
|
|
|
)
|
|
|
|
|
|
|
|
func main() {
|
|
|
|
if len(os.Args) < 2 {
|
|
|
|
fail("missing subcommand")
|
|
|
|
}
|
|
|
|
|
|
|
|
switch os.Args[1] {
|
|
|
|
case "sleep":
|
|
|
|
sleep(math.MaxInt64)
|
|
|
|
case "print":
|
2022-08-24 21:45:55 +00:00
|
|
|
certBytes, err := os.ReadFile(getenv("CERT_PATH"))
|
2021-07-26 16:18:43 +00:00
|
|
|
if err != nil {
|
|
|
|
fail("could not read CERT_PATH: %v", err)
|
|
|
|
}
|
2022-08-24 21:45:55 +00:00
|
|
|
keyBytes, err := os.ReadFile(getenv("KEY_PATH"))
|
2021-07-26 16:18:43 +00:00
|
|
|
if err != nil {
|
|
|
|
fail("could not read KEY_PATH: %v", err)
|
|
|
|
}
|
|
|
|
if err := json.NewEncoder(out).Encode(&struct {
|
|
|
|
Cert string `json:"tls.crt"`
|
|
|
|
Key string `json:"tls.key"`
|
|
|
|
}{
|
|
|
|
Cert: base64.StdEncoding.EncodeToString(certBytes),
|
|
|
|
Key: base64.StdEncoding.EncodeToString(keyBytes),
|
|
|
|
}); err != nil {
|
|
|
|
fail("failed to write output: %v", err)
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
fail("invalid subcommand %q", os.Args[1])
|
|
|
|
}
|
|
|
|
}
|