remove insecureSkipTLSVerify in karmadactl
Signed-off-by: chaosi-zju <chaosi@zju.edu.cn>
This commit is contained in:
parent
0135ebfae1
commit
eabb38b876
|
@ -102,7 +102,7 @@ spec:
|
||||||
namespace: {{ .Namespace }}
|
namespace: {{ .Namespace }}
|
||||||
group: {{ .Group }}
|
group: {{ .Group }}
|
||||||
version: {{ .Version }}
|
version: {{ .Version }}
|
||||||
insecureSkipTLSVerify: true
|
caBundle: {{ .CABundle }}
|
||||||
groupPriorityMinimum: 100
|
groupPriorityMinimum: 100
|
||||||
versionPriority: 200
|
versionPriority: 200
|
||||||
`
|
`
|
||||||
|
@ -140,6 +140,7 @@ type AAApiServiceReplace struct {
|
||||||
Namespace string
|
Namespace string
|
||||||
Group string
|
Group string
|
||||||
Version string
|
Version string
|
||||||
|
CABundle string
|
||||||
}
|
}
|
||||||
|
|
||||||
// AAServiceReplace is a struct to help to concrete
|
// AAServiceReplace is a struct to help to concrete
|
||||||
|
|
|
@ -2,6 +2,7 @@ package metricsadapter
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"encoding/base64"
|
||||||
"fmt"
|
"fmt"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
@ -19,6 +20,7 @@ import (
|
||||||
addoninit "github.com/karmada-io/karmada/pkg/karmadactl/addons/init"
|
addoninit "github.com/karmada-io/karmada/pkg/karmadactl/addons/init"
|
||||||
addonutils "github.com/karmada-io/karmada/pkg/karmadactl/addons/utils"
|
addonutils "github.com/karmada-io/karmada/pkg/karmadactl/addons/utils"
|
||||||
initkarmada "github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/karmada"
|
initkarmada "github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/karmada"
|
||||||
|
"github.com/karmada-io/karmada/pkg/karmadactl/options"
|
||||||
cmdutil "github.com/karmada-io/karmada/pkg/karmadactl/util"
|
cmdutil "github.com/karmada-io/karmada/pkg/karmadactl/util"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -169,6 +171,12 @@ func installComponentsOnKarmadaControlPlane(opts *addoninit.CommandAddonsEnableO
|
||||||
return fmt.Errorf("error when parsing karmada metrics adapter AA service template :%v", err)
|
return fmt.Errorf("error when parsing karmada metrics adapter AA service template :%v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
caCertName := fmt.Sprintf("%s.crt", options.CaCertAndKeyName)
|
||||||
|
karmadaCerts, err := opts.KubeClientSet.CoreV1().Secrets(opts.Namespace).Get(context.TODO(), options.KarmadaCertsName, metav1.GetOptions{})
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error when getting Secret %s/%s, which is used to fetch CaCert for building APISevice: %+v", opts.Namespace, options.KarmadaCertsName, err)
|
||||||
|
}
|
||||||
|
|
||||||
aaService := &corev1.Service{}
|
aaService := &corev1.Service{}
|
||||||
if err := kuberuntime.DecodeInto(clientsetscheme.Codecs.UniversalDecoder(), aaServiceBytes, aaService); err != nil {
|
if err := kuberuntime.DecodeInto(clientsetscheme.Codecs.UniversalDecoder(), aaServiceBytes, aaService); err != nil {
|
||||||
return fmt.Errorf("decode karmada metrics adapter AA service error: %v", err)
|
return fmt.Errorf("decode karmada metrics adapter AA service error: %v", err)
|
||||||
|
@ -184,6 +192,7 @@ func installComponentsOnKarmadaControlPlane(opts *addoninit.CommandAddonsEnableO
|
||||||
Namespace: opts.Namespace,
|
Namespace: opts.Namespace,
|
||||||
Group: gv[1],
|
Group: gv[1],
|
||||||
Version: gv[0],
|
Version: gv[0],
|
||||||
|
CABundle: base64.StdEncoding.EncodeToString(karmadaCerts.Data[caCertName]),
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("error when parsing karmada metrics adapter AA apiservice template :%v", err)
|
return fmt.Errorf("error when parsing karmada metrics adapter AA apiservice template :%v", err)
|
||||||
|
|
|
@ -98,7 +98,7 @@ metadata:
|
||||||
app: karmada-search
|
app: karmada-search
|
||||||
apiserver: "true"
|
apiserver: "true"
|
||||||
spec:
|
spec:
|
||||||
insecureSkipTLSVerify: true
|
caBundle: {{ .CABundle }}
|
||||||
group: search.karmada.io
|
group: search.karmada.io
|
||||||
groupPriorityMinimum: 2000
|
groupPriorityMinimum: 2000
|
||||||
service:
|
service:
|
||||||
|
@ -141,6 +141,7 @@ type ServiceReplace struct {
|
||||||
type AAApiServiceReplace struct {
|
type AAApiServiceReplace struct {
|
||||||
Name string
|
Name string
|
||||||
Namespace string
|
Namespace string
|
||||||
|
CABundle string
|
||||||
}
|
}
|
||||||
|
|
||||||
// AAServiceReplace is a struct to help to concrete
|
// AAServiceReplace is a struct to help to concrete
|
||||||
|
|
|
@ -2,6 +2,7 @@ package search
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"encoding/base64"
|
||||||
"fmt"
|
"fmt"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
@ -20,6 +21,7 @@ import (
|
||||||
addoninit "github.com/karmada-io/karmada/pkg/karmadactl/addons/init"
|
addoninit "github.com/karmada-io/karmada/pkg/karmadactl/addons/init"
|
||||||
addonutils "github.com/karmada-io/karmada/pkg/karmadactl/addons/utils"
|
addonutils "github.com/karmada-io/karmada/pkg/karmadactl/addons/utils"
|
||||||
initkarmada "github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/karmada"
|
initkarmada "github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/karmada"
|
||||||
|
"github.com/karmada-io/karmada/pkg/karmadactl/options"
|
||||||
cmdutil "github.com/karmada-io/karmada/pkg/karmadactl/util"
|
cmdutil "github.com/karmada-io/karmada/pkg/karmadactl/util"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -182,6 +184,12 @@ func installComponentsOnKarmadaControlPlane(opts *addoninit.CommandAddonsEnableO
|
||||||
return fmt.Errorf("error when parsing karmada search AA service template :%v", err)
|
return fmt.Errorf("error when parsing karmada search AA service template :%v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
caCertName := fmt.Sprintf("%s.crt", options.CaCertAndKeyName)
|
||||||
|
karmadaCerts, err := opts.KubeClientSet.CoreV1().Secrets(opts.Namespace).Get(context.TODO(), options.KarmadaCertsName, metav1.GetOptions{})
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error when getting Secret %s/%s, which is used to fetch CaCert for building APISevice: %+v", opts.Namespace, options.KarmadaCertsName, err)
|
||||||
|
}
|
||||||
|
|
||||||
aaService := &corev1.Service{}
|
aaService := &corev1.Service{}
|
||||||
if err := kuberuntime.DecodeInto(clientsetscheme.Codecs.UniversalDecoder(), aaServiceBytes, aaService); err != nil {
|
if err := kuberuntime.DecodeInto(clientsetscheme.Codecs.UniversalDecoder(), aaServiceBytes, aaService); err != nil {
|
||||||
return fmt.Errorf("decode karmada search AA service error: %v", err)
|
return fmt.Errorf("decode karmada search AA service error: %v", err)
|
||||||
|
@ -194,6 +202,7 @@ func installComponentsOnKarmadaControlPlane(opts *addoninit.CommandAddonsEnableO
|
||||||
aaAPIServiceBytes, err := addonutils.ParseTemplate(karmadaSearchAAAPIService, AAApiServiceReplace{
|
aaAPIServiceBytes, err := addonutils.ParseTemplate(karmadaSearchAAAPIService, AAApiServiceReplace{
|
||||||
Name: aaAPIServiceName,
|
Name: aaAPIServiceName,
|
||||||
Namespace: opts.Namespace,
|
Namespace: opts.Namespace,
|
||||||
|
CABundle: base64.StdEncoding.EncodeToString(karmadaCerts.Data[caCertName]),
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("error when parsing karmada search AA apiservice template :%v", err)
|
return fmt.Errorf("error when parsing karmada search AA apiservice template :%v", err)
|
||||||
|
|
|
@ -23,6 +23,7 @@ import (
|
||||||
"k8s.io/kube-openapi/pkg/util/sets"
|
"k8s.io/kube-openapi/pkg/util/sets"
|
||||||
|
|
||||||
"github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/options"
|
"github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/options"
|
||||||
|
globaloptions "github.com/karmada-io/karmada/pkg/karmadactl/options"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -249,7 +250,7 @@ func GenCerts(pkiPath string, etcdServerCertCfg, etcdClientCertCfg, karmadaCertC
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if err = WriteCertAndKey(pkiPath, options.CaCertAndKeyName, caCert, caKey); err != nil {
|
if err = WriteCertAndKey(pkiPath, globaloptions.CaCertAndKeyName, caCert, caKey); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -2,6 +2,7 @@ package karmada
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"encoding/base64"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
|
@ -100,7 +101,7 @@ func InitKarmadaResources(dir, caBase64, systemNamespace string) error {
|
||||||
|
|
||||||
// karmada-aggregated-apiserver
|
// karmada-aggregated-apiserver
|
||||||
klog.Info("Create Service 'karmada-aggregated-apiserver' and APIService 'v1alpha1.cluster.karmada.io'.")
|
klog.Info("Create Service 'karmada-aggregated-apiserver' and APIService 'v1alpha1.cluster.karmada.io'.")
|
||||||
if err = initAggregatedAPIService(clientSet, restConfig, systemNamespace); err != nil {
|
if err = initAggregatedAPIService(clientSet, restConfig, systemNamespace, caBase64); err != nil {
|
||||||
klog.Exitln(err)
|
klog.Exitln(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -260,8 +261,12 @@ func getName(str, start, end string) string {
|
||||||
return str
|
return str
|
||||||
}
|
}
|
||||||
|
|
||||||
func initAggregatedAPIService(clientSet *kubernetes.Clientset, restConfig *rest.Config, systemNamespace string) error {
|
func initAggregatedAPIService(clientSet *kubernetes.Clientset, restConfig *rest.Config, systemNamespace, caBase64 string) error {
|
||||||
// https://github.com/karmada-io/karmada/blob/master/artifacts/deploy/karmada-aggregated-apiserver-apiservice.yaml
|
// https://github.com/karmada-io/karmada/blob/master/artifacts/deploy/karmada-aggregated-apiserver-apiservice.yaml
|
||||||
|
caBytes, err := base64.StdEncoding.DecodeString(caBase64)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to decode caBase64: %+v", err)
|
||||||
|
}
|
||||||
aaService := &corev1.Service{
|
aaService := &corev1.Service{
|
||||||
TypeMeta: metav1.TypeMeta{
|
TypeMeta: metav1.TypeMeta{
|
||||||
APIVersion: "v1",
|
APIVersion: "v1",
|
||||||
|
@ -297,9 +302,9 @@ func initAggregatedAPIService(clientSet *kubernetes.Clientset, restConfig *rest.
|
||||||
Labels: map[string]string{"app": "karmada-aggregated-apiserver", "apiserver": "true"},
|
Labels: map[string]string{"app": "karmada-aggregated-apiserver", "apiserver": "true"},
|
||||||
},
|
},
|
||||||
Spec: apiregistrationv1.APIServiceSpec{
|
Spec: apiregistrationv1.APIServiceSpec{
|
||||||
InsecureSkipTLSVerify: true,
|
CABundle: caBytes,
|
||||||
Group: clusterv1alpha1.GroupName,
|
Group: clusterv1alpha1.GroupName,
|
||||||
GroupPriorityMinimum: 2000,
|
GroupPriorityMinimum: 2000,
|
||||||
Service: &apiregistrationv1.ServiceReference{
|
Service: &apiregistrationv1.ServiceReference{
|
||||||
Name: aaService.Name,
|
Name: aaService.Name,
|
||||||
Namespace: aaService.Namespace,
|
Namespace: aaService.Namespace,
|
||||||
|
|
|
@ -23,6 +23,7 @@ import (
|
||||||
"github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/karmada"
|
"github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/karmada"
|
||||||
"github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/options"
|
"github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/options"
|
||||||
"github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/utils"
|
"github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/utils"
|
||||||
|
globaloptions "github.com/karmada-io/karmada/pkg/karmadactl/options"
|
||||||
"github.com/karmada-io/karmada/pkg/karmadactl/util"
|
"github.com/karmada-io/karmada/pkg/karmadactl/util"
|
||||||
"github.com/karmada-io/karmada/pkg/karmadactl/util/apiclient"
|
"github.com/karmada-io/karmada/pkg/karmadactl/util/apiclient"
|
||||||
"github.com/karmada-io/karmada/pkg/version"
|
"github.com/karmada-io/karmada/pkg/version"
|
||||||
|
@ -35,7 +36,7 @@ var (
|
||||||
}
|
}
|
||||||
|
|
||||||
certList = []string{
|
certList = []string{
|
||||||
options.CaCertAndKeyName,
|
globaloptions.CaCertAndKeyName,
|
||||||
options.EtcdCaCertAndKeyName,
|
options.EtcdCaCertAndKeyName,
|
||||||
options.EtcdServerCertAndKeyName,
|
options.EtcdServerCertAndKeyName,
|
||||||
options.EtcdClientCertAndKeyName,
|
options.EtcdClientCertAndKeyName,
|
||||||
|
@ -358,7 +359,7 @@ func (i *CommandInitOption) prepareCRD() error {
|
||||||
func (i *CommandInitOption) createCertsSecrets() error {
|
func (i *CommandInitOption) createCertsSecrets() error {
|
||||||
// Create kubeconfig Secret
|
// Create kubeconfig Secret
|
||||||
karmadaServerURL := fmt.Sprintf("https://%s.%s.svc.%s:%v", karmadaAPIServerDeploymentAndServiceName, i.Namespace, i.HostClusterDomain, karmadaAPIServerContainerPort)
|
karmadaServerURL := fmt.Sprintf("https://%s.%s.svc.%s:%v", karmadaAPIServerDeploymentAndServiceName, i.Namespace, i.HostClusterDomain, karmadaAPIServerContainerPort)
|
||||||
config := utils.CreateWithCerts(karmadaServerURL, options.UserName, options.UserName, i.CertAndKeyFileData[fmt.Sprintf("%s.crt", options.CaCertAndKeyName)],
|
config := utils.CreateWithCerts(karmadaServerURL, options.UserName, options.UserName, i.CertAndKeyFileData[fmt.Sprintf("%s.crt", globaloptions.CaCertAndKeyName)],
|
||||||
i.CertAndKeyFileData[fmt.Sprintf("%s.key", options.KarmadaCertAndKeyName)], i.CertAndKeyFileData[fmt.Sprintf("%s.crt", options.KarmadaCertAndKeyName)])
|
i.CertAndKeyFileData[fmt.Sprintf("%s.key", options.KarmadaCertAndKeyName)], i.CertAndKeyFileData[fmt.Sprintf("%s.crt", options.KarmadaCertAndKeyName)])
|
||||||
configBytes, err := clientcmd.Write(*config)
|
configBytes, err := clientcmd.Write(*config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -386,7 +387,7 @@ func (i *CommandInitOption) createCertsSecrets() error {
|
||||||
karmadaCert[fmt.Sprintf("%s.crt", v)] = string(i.CertAndKeyFileData[fmt.Sprintf("%s.crt", v)])
|
karmadaCert[fmt.Sprintf("%s.crt", v)] = string(i.CertAndKeyFileData[fmt.Sprintf("%s.crt", v)])
|
||||||
karmadaCert[fmt.Sprintf("%s.key", v)] = string(i.CertAndKeyFileData[fmt.Sprintf("%s.key", v)])
|
karmadaCert[fmt.Sprintf("%s.key", v)] = string(i.CertAndKeyFileData[fmt.Sprintf("%s.key", v)])
|
||||||
}
|
}
|
||||||
karmadaSecret := i.SecretFromSpec(karmadaCertsName, corev1.SecretTypeOpaque, karmadaCert)
|
karmadaSecret := i.SecretFromSpec(globaloptions.KarmadaCertsName, corev1.SecretTypeOpaque, karmadaCert)
|
||||||
if err := util.CreateOrUpdateSecret(i.KubeClientSet, karmadaSecret); err != nil {
|
if err := util.CreateOrUpdateSecret(i.KubeClientSet, karmadaSecret); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
@ -571,7 +572,7 @@ func (i *CommandInitOption) RunInit(parentCommand string) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create CRDs in karmada
|
// Create CRDs in karmada
|
||||||
caBase64 := base64.StdEncoding.EncodeToString(i.CertAndKeyFileData[fmt.Sprintf("%s.crt", options.CaCertAndKeyName)])
|
caBase64 := base64.StdEncoding.EncodeToString(i.CertAndKeyFileData[fmt.Sprintf("%s.crt", globaloptions.CaCertAndKeyName)])
|
||||||
if err := karmada.InitKarmadaResources(i.KarmadaDataPath, caBase64, i.Namespace); err != nil {
|
if err := karmada.InitKarmadaResources(i.KarmadaDataPath, caBase64, i.Namespace); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
@ -598,7 +599,7 @@ func (i *CommandInitOption) createKarmadaConfig() error {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if err := utils.WriteKubeConfigFromSpec(serverURL, options.UserName, options.ClusterName, i.KarmadaDataPath, options.KarmadaKubeConfigName,
|
if err := utils.WriteKubeConfigFromSpec(serverURL, options.UserName, options.ClusterName, i.KarmadaDataPath, options.KarmadaKubeConfigName,
|
||||||
i.CertAndKeyFileData[fmt.Sprintf("%s.crt", options.CaCertAndKeyName)], i.CertAndKeyFileData[fmt.Sprintf("%s.key", options.KarmadaCertAndKeyName)],
|
i.CertAndKeyFileData[fmt.Sprintf("%s.crt", globaloptions.CaCertAndKeyName)], i.CertAndKeyFileData[fmt.Sprintf("%s.key", options.KarmadaCertAndKeyName)],
|
||||||
i.CertAndKeyFileData[fmt.Sprintf("%s.crt", options.KarmadaCertAndKeyName)]); err != nil {
|
i.CertAndKeyFileData[fmt.Sprintf("%s.crt", options.KarmadaCertAndKeyName)]); err != nil {
|
||||||
return fmt.Errorf("failed to create karmada kubeconfig file. %v", err)
|
return fmt.Errorf("failed to create karmada kubeconfig file. %v", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -12,6 +12,7 @@ import (
|
||||||
"k8s.io/utils/pointer"
|
"k8s.io/utils/pointer"
|
||||||
|
|
||||||
"github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/options"
|
"github.com/karmada-io/karmada/pkg/karmadactl/cmdinit/options"
|
||||||
|
globaloptions "github.com/karmada-io/karmada/pkg/karmadactl/options"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -21,7 +22,6 @@ const (
|
||||||
|
|
||||||
// KubeConfigSecretAndMountName is the secret and volume mount name of karmada kubeconfig
|
// KubeConfigSecretAndMountName is the secret and volume mount name of karmada kubeconfig
|
||||||
KubeConfigSecretAndMountName = "kubeconfig"
|
KubeConfigSecretAndMountName = "kubeconfig"
|
||||||
karmadaCertsName = "karmada-cert"
|
|
||||||
karmadaCertsVolumeMountPath = "/etc/karmada/pki"
|
karmadaCertsVolumeMountPath = "/etc/karmada/pki"
|
||||||
kubeConfigContainerMountPath = "/etc/kubeconfig"
|
kubeConfigContainerMountPath = "/etc/kubeconfig"
|
||||||
karmadaAPIServerDeploymentAndServiceName = "karmada-apiserver"
|
karmadaAPIServerDeploymentAndServiceName = "karmada-apiserver"
|
||||||
|
@ -67,7 +67,7 @@ func (i *CommandInitOption) karmadaAPIServerContainerCommand() []string {
|
||||||
"kube-apiserver",
|
"kube-apiserver",
|
||||||
"--allow-privileged=true",
|
"--allow-privileged=true",
|
||||||
"--authorization-mode=Node,RBAC",
|
"--authorization-mode=Node,RBAC",
|
||||||
fmt.Sprintf("--client-ca-file=%s/%s.crt", karmadaCertsVolumeMountPath, options.CaCertAndKeyName),
|
fmt.Sprintf("--client-ca-file=%s/%s.crt", karmadaCertsVolumeMountPath, globaloptions.CaCertAndKeyName),
|
||||||
"--enable-bootstrap-token-auth=true",
|
"--enable-bootstrap-token-auth=true",
|
||||||
fmt.Sprintf("--etcd-cafile=%s/%s.crt", karmadaCertsVolumeMountPath, options.EtcdCaCertAndKeyName),
|
fmt.Sprintf("--etcd-cafile=%s/%s.crt", karmadaCertsVolumeMountPath, options.EtcdCaCertAndKeyName),
|
||||||
fmt.Sprintf("--etcd-certfile=%s/%s.crt", karmadaCertsVolumeMountPath, options.EtcdClientCertAndKeyName),
|
fmt.Sprintf("--etcd-certfile=%s/%s.crt", karmadaCertsVolumeMountPath, options.EtcdClientCertAndKeyName),
|
||||||
|
@ -180,7 +180,7 @@ func (i *CommandInitOption) makeKarmadaAPIServerDeployment() *appsv1.Deployment
|
||||||
},
|
},
|
||||||
VolumeMounts: []corev1.VolumeMount{
|
VolumeMounts: []corev1.VolumeMount{
|
||||||
{
|
{
|
||||||
Name: karmadaCertsName,
|
Name: globaloptions.KarmadaCertsName,
|
||||||
ReadOnly: true,
|
ReadOnly: true,
|
||||||
MountPath: karmadaCertsVolumeMountPath,
|
MountPath: karmadaCertsVolumeMountPath,
|
||||||
},
|
},
|
||||||
|
@ -191,10 +191,10 @@ func (i *CommandInitOption) makeKarmadaAPIServerDeployment() *appsv1.Deployment
|
||||||
},
|
},
|
||||||
Volumes: []corev1.Volume{
|
Volumes: []corev1.Volume{
|
||||||
{
|
{
|
||||||
Name: karmadaCertsName,
|
Name: globaloptions.KarmadaCertsName,
|
||||||
VolumeSource: corev1.VolumeSource{
|
VolumeSource: corev1.VolumeSource{
|
||||||
Secret: &corev1.SecretVolumeSource{
|
Secret: &corev1.SecretVolumeSource{
|
||||||
SecretName: karmadaCertsName,
|
SecretName: globaloptions.KarmadaCertsName,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
@ -290,17 +290,17 @@ func (i *CommandInitOption) makeKarmadaKubeControllerManagerDeployment() *appsv1
|
||||||
"--authentication-kubeconfig=/etc/kubeconfig",
|
"--authentication-kubeconfig=/etc/kubeconfig",
|
||||||
"--authorization-kubeconfig=/etc/kubeconfig",
|
"--authorization-kubeconfig=/etc/kubeconfig",
|
||||||
"--bind-address=0.0.0.0",
|
"--bind-address=0.0.0.0",
|
||||||
fmt.Sprintf("--client-ca-file=%s/%s.crt", karmadaCertsVolumeMountPath, options.CaCertAndKeyName),
|
fmt.Sprintf("--client-ca-file=%s/%s.crt", karmadaCertsVolumeMountPath, globaloptions.CaCertAndKeyName),
|
||||||
"--cluster-cidr=10.244.0.0/16",
|
"--cluster-cidr=10.244.0.0/16",
|
||||||
fmt.Sprintf("--cluster-name=%s", options.ClusterName),
|
fmt.Sprintf("--cluster-name=%s", options.ClusterName),
|
||||||
fmt.Sprintf("--cluster-signing-cert-file=%s/%s.crt", karmadaCertsVolumeMountPath, options.CaCertAndKeyName),
|
fmt.Sprintf("--cluster-signing-cert-file=%s/%s.crt", karmadaCertsVolumeMountPath, globaloptions.CaCertAndKeyName),
|
||||||
fmt.Sprintf("--cluster-signing-key-file=%s/%s.key", karmadaCertsVolumeMountPath, options.CaCertAndKeyName),
|
fmt.Sprintf("--cluster-signing-key-file=%s/%s.key", karmadaCertsVolumeMountPath, globaloptions.CaCertAndKeyName),
|
||||||
"--controllers=namespace,garbagecollector,serviceaccount-token,ttl-after-finished,bootstrapsigner,tokencleaner,csrapproving,csrcleaner,csrsigning,clusterrole-aggregation",
|
"--controllers=namespace,garbagecollector,serviceaccount-token,ttl-after-finished,bootstrapsigner,tokencleaner,csrapproving,csrcleaner,csrsigning,clusterrole-aggregation",
|
||||||
"--kubeconfig=/etc/kubeconfig",
|
"--kubeconfig=/etc/kubeconfig",
|
||||||
"--leader-elect=true",
|
"--leader-elect=true",
|
||||||
fmt.Sprintf("--leader-elect-resource-namespace=%s", i.Namespace),
|
fmt.Sprintf("--leader-elect-resource-namespace=%s", i.Namespace),
|
||||||
"--node-cidr-mask-size=24",
|
"--node-cidr-mask-size=24",
|
||||||
fmt.Sprintf("--root-ca-file=%s/%s.crt", karmadaCertsVolumeMountPath, options.CaCertAndKeyName),
|
fmt.Sprintf("--root-ca-file=%s/%s.crt", karmadaCertsVolumeMountPath, globaloptions.CaCertAndKeyName),
|
||||||
fmt.Sprintf("--service-account-private-key-file=%s/%s.key", karmadaCertsVolumeMountPath, options.KarmadaCertAndKeyName),
|
fmt.Sprintf("--service-account-private-key-file=%s/%s.key", karmadaCertsVolumeMountPath, options.KarmadaCertAndKeyName),
|
||||||
fmt.Sprintf("--service-cluster-ip-range=%s", serviceClusterIP),
|
fmt.Sprintf("--service-cluster-ip-range=%s", serviceClusterIP),
|
||||||
"--use-service-account-credentials=true",
|
"--use-service-account-credentials=true",
|
||||||
|
@ -322,7 +322,7 @@ func (i *CommandInitOption) makeKarmadaKubeControllerManagerDeployment() *appsv1
|
||||||
SubPath: KubeConfigSecretAndMountName,
|
SubPath: KubeConfigSecretAndMountName,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Name: karmadaCertsName,
|
Name: globaloptions.KarmadaCertsName,
|
||||||
ReadOnly: true,
|
ReadOnly: true,
|
||||||
MountPath: karmadaCertsVolumeMountPath,
|
MountPath: karmadaCertsVolumeMountPath,
|
||||||
},
|
},
|
||||||
|
@ -339,10 +339,10 @@ func (i *CommandInitOption) makeKarmadaKubeControllerManagerDeployment() *appsv1
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Name: karmadaCertsName,
|
Name: globaloptions.KarmadaCertsName,
|
||||||
VolumeSource: corev1.VolumeSource{
|
VolumeSource: corev1.VolumeSource{
|
||||||
Secret: &corev1.SecretVolumeSource{
|
Secret: &corev1.SecretVolumeSource{
|
||||||
SecretName: karmadaCertsName,
|
SecretName: globaloptions.KarmadaCertsName,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
@ -840,7 +840,7 @@ func (i *CommandInitOption) makeKarmadaAggregatedAPIServerDeployment() *appsv1.D
|
||||||
SubPath: KubeConfigSecretAndMountName,
|
SubPath: KubeConfigSecretAndMountName,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Name: karmadaCertsName,
|
Name: globaloptions.KarmadaCertsName,
|
||||||
ReadOnly: true,
|
ReadOnly: true,
|
||||||
MountPath: karmadaCertsVolumeMountPath,
|
MountPath: karmadaCertsVolumeMountPath,
|
||||||
},
|
},
|
||||||
|
@ -864,10 +864,10 @@ func (i *CommandInitOption) makeKarmadaAggregatedAPIServerDeployment() *appsv1.D
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Name: karmadaCertsName,
|
Name: globaloptions.KarmadaCertsName,
|
||||||
VolumeSource: corev1.VolumeSource{
|
VolumeSource: corev1.VolumeSource{
|
||||||
Secret: &corev1.SecretVolumeSource{
|
Secret: &corev1.SecretVolumeSource{
|
||||||
SecretName: karmadaCertsName,
|
SecretName: globaloptions.KarmadaCertsName,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
|
@ -1,8 +1,6 @@
|
||||||
package options
|
package options
|
||||||
|
|
||||||
const (
|
const (
|
||||||
// CaCertAndKeyName ca certificate key name
|
|
||||||
CaCertAndKeyName = "ca"
|
|
||||||
// EtcdCaCertAndKeyName etcd ca certificate key name
|
// EtcdCaCertAndKeyName etcd ca certificate key name
|
||||||
EtcdCaCertAndKeyName = "etcd-ca"
|
EtcdCaCertAndKeyName = "etcd-ca"
|
||||||
// EtcdServerCertAndKeyName etcd server certificate key name
|
// EtcdServerCertAndKeyName etcd server certificate key name
|
||||||
|
|
|
@ -16,6 +16,13 @@ const DefaultHostClusterDomain = "cluster.local"
|
||||||
// DefaultKarmadactlCommandDuration defines the default timeout for karmadactl execute
|
// DefaultKarmadactlCommandDuration defines the default timeout for karmadactl execute
|
||||||
const DefaultKarmadactlCommandDuration = 60 * time.Second
|
const DefaultKarmadactlCommandDuration = 60 * time.Second
|
||||||
|
|
||||||
|
const (
|
||||||
|
// KarmadaCertsName the secret name of karmada certs
|
||||||
|
KarmadaCertsName = "karmada-cert"
|
||||||
|
// CaCertAndKeyName ca certificate cert/key name in karmada certs secret
|
||||||
|
CaCertAndKeyName = "ca"
|
||||||
|
)
|
||||||
|
|
||||||
// DefaultConfigFlags It composes the set of values necessary for obtaining a REST client config with default values set.
|
// DefaultConfigFlags It composes the set of values necessary for obtaining a REST client config with default values set.
|
||||||
var DefaultConfigFlags = genericclioptions.NewConfigFlags(true).WithDeprecatedPasswordFlag().WithDiscoveryBurst(300).WithDiscoveryQPS(50.0)
|
var DefaultConfigFlags = genericclioptions.NewConfigFlags(true).WithDeprecatedPasswordFlag().WithDiscoveryBurst(300).WithDiscoveryQPS(50.0)
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue