Merge pull request #141 from metalmatze/prom-ca-file

Support custom ca certificate to talk to Prometheus
This commit is contained in:
Frederic Branczyk 2018-12-03 20:50:35 +01:00 committed by GitHub
commit d3bbe8247a
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -17,8 +17,11 @@ limitations under the License.
package main package main
import ( import (
"crypto/tls"
"crypto/x509"
"flag" "flag"
"fmt" "fmt"
"io/ioutil"
"net/http" "net/http"
"net/url" "net/url"
"os" "os"
@ -49,6 +52,8 @@ type PrometheusAdapter struct {
PrometheusAuthInCluster bool PrometheusAuthInCluster bool
// PrometheusAuthConf is the kubeconfig file that contains auth details used to connect to Prometheus // PrometheusAuthConf is the kubeconfig file that contains auth details used to connect to Prometheus
PrometheusAuthConf string PrometheusAuthConf string
// PrometheusCAFile points to the file containing the ca-root for connecting with Prometheus
PrometheusCAFile string
// AdapterConfigFile points to the file containing the metrics discovery configuration. // AdapterConfigFile points to the file containing the metrics discovery configuration.
AdapterConfigFile string AdapterConfigFile string
// MetricsRelistInterval is the interval at which to relist the set of available metrics // MetricsRelistInterval is the interval at which to relist the set of available metrics
@ -62,11 +67,26 @@ func (cmd *PrometheusAdapter) makePromClient() (prom.Client, error) {
if err != nil { if err != nil {
return nil, fmt.Errorf("invalid Prometheus URL %q: %v", baseURL, err) return nil, fmt.Errorf("invalid Prometheus URL %q: %v", baseURL, err)
} }
promHTTPClient, err := makeHTTPClient(cmd.PrometheusAuthInCluster, cmd.PrometheusAuthConf)
if err != nil { var httpClient *http.Client
return nil, err
if cmd.PrometheusCAFile != "" {
prometheusCAClient, err := makePrometheusCAClient(cmd.PrometheusCAFile)
if err != nil {
return nil, err
}
httpClient = prometheusCAClient
glog.Info("successfully loaded ca from file")
} else {
kubeconfigHTTPClient, err := makeKubeconfigHTTPClient(cmd.PrometheusAuthInCluster, cmd.PrometheusAuthConf)
if err != nil {
return nil, err
}
httpClient = kubeconfigHTTPClient
glog.Info("successfully using in-cluster auth")
} }
genericPromClient := prom.NewGenericAPIClient(promHTTPClient, baseURL)
genericPromClient := prom.NewGenericAPIClient(httpClient, baseURL)
instrumentedGenericPromClient := mprom.InstrumentGenericAPIClient(genericPromClient, baseURL.String()) instrumentedGenericPromClient := mprom.InstrumentGenericAPIClient(genericPromClient, baseURL.String())
return prom.NewClientForAPI(instrumentedGenericPromClient), nil return prom.NewClientForAPI(instrumentedGenericPromClient), nil
} }
@ -78,6 +98,8 @@ func (cmd *PrometheusAdapter) addFlags() {
"use auth details from the in-cluster kubeconfig when connecting to prometheus.") "use auth details from the in-cluster kubeconfig when connecting to prometheus.")
cmd.Flags().StringVar(&cmd.PrometheusAuthConf, "prometheus-auth-config", cmd.PrometheusAuthConf, cmd.Flags().StringVar(&cmd.PrometheusAuthConf, "prometheus-auth-config", cmd.PrometheusAuthConf,
"kubeconfig file used to configure auth when connecting to Prometheus.") "kubeconfig file used to configure auth when connecting to Prometheus.")
cmd.Flags().StringVar(&cmd.PrometheusCAFile, "prometheus-ca-file", cmd.PrometheusCAFile,
"Optional CA file to use when connecting with Prometheus")
cmd.Flags().StringVar(&cmd.AdapterConfigFile, "config", cmd.AdapterConfigFile, cmd.Flags().StringVar(&cmd.AdapterConfigFile, "config", cmd.AdapterConfigFile,
"Configuration file containing details of how to transform between Prometheus metrics "+ "Configuration file containing details of how to transform between Prometheus metrics "+
"and custom metrics API resources") "and custom metrics API resources")
@ -177,7 +199,9 @@ func main() {
cmd.Name = "prometheus-metrics-adapter" cmd.Name = "prometheus-metrics-adapter"
cmd.addFlags() cmd.addFlags()
cmd.Flags().AddGoFlagSet(flag.CommandLine) // make sure we get the glog flags cmd.Flags().AddGoFlagSet(flag.CommandLine) // make sure we get the glog flags
cmd.Flags().Parse(os.Args) if err := cmd.Flags().Parse(os.Args); err != nil {
glog.Fatalf("unable to parse flags: %v", err)
}
// make the prometheus client // make the prometheus client
promClient, err := cmd.makePromClient() promClient, err := cmd.makePromClient()
@ -212,8 +236,8 @@ func main() {
} }
} }
// makeHTTPClient constructs an HTTP for connecting with the given auth options. // makeKubeconfigHTTPClient constructs an HTTP for connecting with the given auth options.
func makeHTTPClient(inClusterAuth bool, kubeConfigPath string) (*http.Client, error) { func makeKubeconfigHTTPClient(inClusterAuth bool, kubeConfigPath string) (*http.Client, error) {
// make sure we're not trying to use two different sources of auth // make sure we're not trying to use two different sources of auth
if inClusterAuth && kubeConfigPath != "" { if inClusterAuth && kubeConfigPath != "" {
return nil, fmt.Errorf("may not use both in-cluster auth and an explicit kubeconfig at the same time") return nil, fmt.Errorf("may not use both in-cluster auth and an explicit kubeconfig at the same time")
@ -246,3 +270,23 @@ func makeHTTPClient(inClusterAuth bool, kubeConfigPath string) (*http.Client, er
} }
return &http.Client{Transport: tr}, nil return &http.Client{Transport: tr}, nil
} }
func makePrometheusCAClient(caFilename string) (*http.Client, error) {
data, err := ioutil.ReadFile(caFilename)
if err != nil {
return nil, fmt.Errorf("failed to read prometheus-ca-file: %v", err)
}
pool := x509.NewCertPool()
if !pool.AppendCertsFromPEM(data) {
return nil, fmt.Errorf("no certs found in prometheus-ca-file")
}
return &http.Client{
Transport: &http.Transport{
TLSClientConfig: &tls.Config{
RootCAs: pool,
},
},
}, nil
}