mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-28 14:07:14 +00:00
kubeadm: flag token discovery pieces to be refactored.
This commit is contained in:
parent
a519335303
commit
c272bc56b1
@ -22,6 +22,7 @@ import (
|
|||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
|
kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
|
||||||
|
|
||||||
"k8s.io/kubernetes/pkg/client/unversioned/clientcmd"
|
"k8s.io/kubernetes/pkg/client/unversioned/clientcmd"
|
||||||
clientcmdapi "k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api"
|
clientcmdapi "k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api"
|
||||||
)
|
)
|
||||||
@ -33,6 +34,9 @@ func For(d kubeadmapi.Discovery) (*clientcmdapi.Config, error) {
|
|||||||
return runFileDiscovery(d.File)
|
return runFileDiscovery(d.File)
|
||||||
case d.HTTPS != nil:
|
case d.HTTPS != nil:
|
||||||
return runHTTPSDiscovery(d.HTTPS)
|
return runHTTPSDiscovery(d.HTTPS)
|
||||||
|
case d.Token != nil:
|
||||||
|
// TODO move token discovery here
|
||||||
|
return runTokenDiscovery(d.Token)
|
||||||
default:
|
default:
|
||||||
return nil, fmt.Errorf("Couldn't find a valid discovery configuration. Please provide one.")
|
return nil, fmt.Errorf("Couldn't find a valid discovery configuration. Please provide one.")
|
||||||
}
|
}
|
||||||
@ -58,4 +62,9 @@ func runHTTPSDiscovery(hd *kubeadmapi.HTTPSDiscovery) (*clientcmdapi.Config, err
|
|||||||
|
|
||||||
return clientcmd.Load(kubeconfig)
|
return clientcmd.Load(kubeconfig)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TODO implement
|
||||||
|
// runTokenDiscovery executes token-based discovery.
|
||||||
|
func runTokenDiscovery(td *kubeadmapi.TokenDiscovery) (*clientcmdapi.Config, error) {
|
||||||
|
return nil, fmt.Errorf("Couldn't find a valid discovery configuration. Please provide one.")
|
||||||
}
|
}
|
||||||
|
@ -29,12 +29,13 @@ import (
|
|||||||
certutil "k8s.io/kubernetes/pkg/util/cert"
|
certutil "k8s.io/kubernetes/pkg/util/cert"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// TODO @mikedanese move this to PerformTLSBootstrap
|
||||||
func PerformTLSBootstrapDeprecated(connection *ConnectionDetails) (*clientcmdapi.Config, error) {
|
func PerformTLSBootstrapDeprecated(connection *ConnectionDetails) (*clientcmdapi.Config, error) {
|
||||||
fmt.Println("[csr] Created API client to obtain unique certificate for this node, generating keys and certificate signing request")
|
fmt.Println("[csr] Created API client to obtain unique certificate for this node, generating keys and certificate signing request")
|
||||||
|
|
||||||
key, err := certutil.MakeEllipticPrivateKeyPEM()
|
key, err := certutil.MakeEllipticPrivateKeyPEM()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to generating private key [%v]", err)
|
return nil, fmt.Errorf("failed to generate private key [%v]", err)
|
||||||
}
|
}
|
||||||
cert, err := csr.RequestNodeCertificate(connection.CertClient.CertificateSigningRequests(), key, connection.NodeName)
|
cert, err := csr.RequestNodeCertificate(connection.CertClient.CertificateSigningRequests(), key, connection.NodeName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -80,7 +81,7 @@ func PerformTLSBootstrap(cfg *clientcmdapi.Config) error {
|
|||||||
|
|
||||||
key, err := certutil.MakeEllipticPrivateKeyPEM()
|
key, err := certutil.MakeEllipticPrivateKeyPEM()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to generating private key [%v]", err)
|
return fmt.Errorf("failed to generate private key [%v]", err)
|
||||||
}
|
}
|
||||||
cert, err := csr.RequestNodeCertificate(c.Certificates().CertificateSigningRequests(), key, name)
|
cert, err := csr.RequestNodeCertificate(c.Certificates().CertificateSigningRequests(), key, name)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
Loading…
Reference in New Issue
Block a user