Merge pull request #91630 from liggitt/kube-apiserver-kubelet-https

Mark --kubelet-https deprecated, unconditionally use https for apiserver->kubelet connections
This commit is contained in:
Kubernetes Prow Robot 2020-06-02 02:02:14 -07:00 committed by GitHub
commit 7bd4c53b27
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 11 additions and 24 deletions

View File

@ -120,7 +120,6 @@ func NewServerRunOptions() *ServerRunOptions {
string(api.NodeExternalDNS),
string(api.NodeExternalIP),
},
EnableHTTPS: true,
HTTPTimeout: time.Duration(5) * time.Second,
},
ServiceNodePortRange: kubeoptions.DefaultServiceNodePortRange,
@ -200,8 +199,9 @@ func (s *ServerRunOptions) Flags() (fss cliflag.NamedFlagSets) {
"Example: '30000-32767'. Inclusive at both ends of the range.")
// Kubelet related flags:
fs.BoolVar(&s.KubeletConfig.EnableHTTPS, "kubelet-https", s.KubeletConfig.EnableHTTPS,
"Use https for kubelet connections.")
kubeletHTTPS := true
fs.BoolVar(&kubeletHTTPS, "kubelet-https", kubeletHTTPS, "Use https for kubelet connections.")
fs.MarkDeprecated("kubelet-https", "API Server connections to kubelets always use https. This flag will be removed in 1.22.")
fs.StringSliceVar(&s.KubeletConfig.PreferredAddressTypes, "kubelet-preferred-address-types", s.KubeletConfig.PreferredAddressTypes,
"List of the preferred NodeAddressTypes to use for kubelet connections.")

View File

@ -105,7 +105,6 @@ func TestAddFlags(t *testing.T) {
"--etcd-certfile=/var/run/kubernetes/etcdce.crt",
"--etcd-cafile=/var/run/kubernetes/etcdca.crt",
"--http2-max-streams-per-connection=42",
"--kubelet-https=true",
"--kubelet-read-only-port=10255",
"--kubelet-timeout=5s",
"--kubelet-client-certificate=/var/run/kubernetes/ceserver.crt",
@ -192,7 +191,6 @@ func TestAddFlags(t *testing.T) {
string(kapi.NodeExternalDNS),
string(kapi.NodeExternalIP),
},
EnableHTTPS: true,
HTTPTimeout: time.Duration(5) * time.Second,
TLSClientConfig: restclient.TLSClientConfig{
CertFile: "/var/run/kubernetes/ceserver.crt",

View File

@ -41,9 +41,6 @@ type KubeletClientConfig struct {
// ReadOnlyPort specifies the Port for ReadOnly communications.
ReadOnlyPort uint
// EnableHTTPs specifies if traffic should be encrypted.
EnableHTTPS bool
// PreferredAddressTypes - used to select an address from Node.NodeStatus.Addresses
PreferredAddressTypes []string
@ -139,7 +136,7 @@ func (c *KubeletClientConfig) transportConfig() *transport.Config {
},
BearerToken: c.BearerToken,
}
if c.EnableHTTPS && !cfg.HasCA() {
if !cfg.HasCA() {
cfg.TLS.Insecure = true
}
return cfg
@ -176,11 +173,6 @@ type NodeConnectionInfoGetter struct {
// NewNodeConnectionInfoGetter creates a new NodeConnectionInfoGetter.
func NewNodeConnectionInfoGetter(nodes NodeGetter, config KubeletClientConfig) (ConnectionInfoGetter, error) {
scheme := "http"
if config.EnableHTTPS {
scheme = "https"
}
transport, err := MakeTransport(&config)
if err != nil {
return nil, err
@ -197,7 +189,7 @@ func NewNodeConnectionInfoGetter(nodes NodeGetter, config KubeletClientConfig) (
return &NodeConnectionInfoGetter{
nodes: nodes,
scheme: scheme,
scheme: "https",
defaultPort: int(config.Port),
transport: transport,
insecureSkipTLSVerifyTransport: insecureSkipTLSVerifyTransport,

View File

@ -30,7 +30,6 @@ import (
func TestMakeTransportInvalid(t *testing.T) {
config := &KubeletClientConfig{
EnableHTTPS: true,
//Invalid certificate and key path
TLSClientConfig: restclient.TLSClientConfig{
CertFile: "../../client/testdata/mycertinvalid.cer",
@ -50,13 +49,12 @@ func TestMakeTransportInvalid(t *testing.T) {
func TestMakeTransportValid(t *testing.T) {
config := &KubeletClientConfig{
Port: 1234,
EnableHTTPS: true,
Port: 1234,
TLSClientConfig: restclient.TLSClientConfig{
CertFile: "../../client/testdata/mycertvalid.cer",
// TLS Configuration, only applies if EnableHTTPS is true.
// TLS Configuration
KeyFile: "../../client/testdata/mycertvalid.key",
// TLS Configuration, only applies if EnableHTTPS is true.
// TLS Configuration
CAFile: "../../client/testdata/myCA.cer",
},
}
@ -90,13 +88,12 @@ func TestMakeInsecureTransport(t *testing.T) {
}
config := &KubeletClientConfig{
Port: uint(port),
EnableHTTPS: true,
Port: uint(port),
TLSClientConfig: restclient.TLSClientConfig{
CertFile: "../../client/testdata/mycertvalid.cer",
// TLS Configuration, only applies if EnableHTTPS is true.
// TLS Configuration
KeyFile: "../../client/testdata/mycertvalid.key",
// TLS Configuration, only applies if EnableHTTPS is true.
// TLS Configuration
CAFile: "../../client/testdata/myCA.cer",
},
}