Commit Graph

16 Commits

Author SHA1 Message Date
Joe Nathan Abellard 5a7f917bce Only genrate ETCD PKI for local ETCD setup
Signed-off-by: Joe Nathan Abellard <contact@jabellard.com>
2024-12-25 16:12:33 -05:00
Joe Nathan Abellard 3a09ac92b4 Address comments
Signed-off-by: Joe Nathan Abellard <contact@jabellard.com>
2024-11-20 07:58:29 -05:00
Joe Nathan Abellard 4ff99ebbd9 Address comments
Signed-off-by: Joe Nathan Abellard <contact@jabellard.com>
2024-11-20 07:41:31 -05:00
Joe Nathan Abellard 91322e2f5f Add support for custom API Server CA certificate
Signed-off-by: Joe Nathan Abellard <contact@jabellard.com>
2024-11-19 19:45:04 -05:00
karmada-bot 4294e60704
Merge pull request #5561 from mohamedawnallah/validateKeyAndHandleErrors
operator/pkg/certs: validate X509 Cert key types and improve error handling
2024-10-19 15:19:29 +08:00
Mohamed Awnallah ad7a70b008 operator/pkg/certs: validate key types and val err
In this commit, we enhance the `GeneratePrivateKey` and `ParsePrivateKeyPEM` functions:

- Added validation for unsupported key types and provided a more descriptive error message.
This function supports ECDSA (using P-256) and RSA (with a key size of 3072 bits) algorithms.
It returns an error for unsupported key types.
- Improved error handling to include the type of the unsupported key format in the error message.
This function now provides more informative feedback when the private key format is neither RSA nor ECDSA.

Signed-off-by: Mohamed Awnallah <mohamedmohey2352@gmail.com>
2024-10-18 15:48:34 +03:00
Mohamed Awnallah 89794f167b operator/pkg/certs: fix null ptr deref in altnames
In this commit, we fix th null pointer dereference issue
that happens in altnames mutators for both Karmada APIServer
and EtcdServer when accessing the `Components` field on
`AltNamesMutatorConfig` struct.

Signed-off-by: Mohamed Awnallah <mohamedmohey2352@gmail.com>
2024-09-16 11:39:55 +03:00
renxiangyu_yewu 11f8fe3161 Improve code reusability
Signed-off-by: renxiangyu_yewu <renxiangyu_yewu@cmss.chinamobile.com>
2024-07-03 17:59:29 +08:00
chaosi-zju dee30c821b upgrade rsa key size from 2048 to 3072
Signed-off-by: chaosi-zju <chaosi@zju.edu.cn>
2024-05-21 09:18:30 +08:00
zhzhuang-zju 23d69df695 add cfg.Namespace.svc to apiServerAltNames in operator installation mode
Signed-off-by: zhzhuang-zju <m17799853869@163.com>
2024-01-09 14:14:23 +08:00
zhzhuang-zju e49a27080f Correct DNSNames of karmada-apiserver certificate
Signed-off-by: zhzhuang-zju <m17799853869@163.com>
2023-11-27 11:57:03 +08:00
zhy76 adef1e5974 feat: add license and verify license for code file
Signed-off-by: zhy76 <958474674@qq.com>
2023-11-16 11:11:21 +08:00
Vacant2333 7bd2ced976 fix typos
Signed-off-by: Vacant2333 <rentian.zhou@daocloud.io>
2023-06-02 10:39:02 +08:00
calvin 1ca7548072 fixed adding altName to certification
Signed-off-by: calvin <wen.chen@daocloud.io>
2023-05-09 10:46:17 +08:00
calvin0327 428dd0a769 add nodeport service type for apiserver
Signed-off-by: calvin0327 <wen.chen@daocloud.io>
2023-04-28 09:58:13 +08:00
calvin ec53c2a5b1 add karmada operator init workflow
Signed-off-by: calvin <wen.chen@daocloud.io>
2023-03-01 10:06:20 +08:00