mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-30 15:05:27 +00:00
Configure the Kubelet to listen on HTTPS. If no certificates are
provided on the command line, generate self-signed certs.
This commit is contained in:
parent
fb1a8219d4
commit
d0f48b68d8
@ -18,6 +18,7 @@ limitations under the License.
|
|||||||
package app
|
package app
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/tls"
|
||||||
"fmt"
|
"fmt"
|
||||||
"math/rand"
|
"math/rand"
|
||||||
"net"
|
"net"
|
||||||
@ -88,6 +89,8 @@ type KubeletServer struct {
|
|||||||
NetworkPluginName string
|
NetworkPluginName string
|
||||||
CloudProvider string
|
CloudProvider string
|
||||||
CloudConfigFile string
|
CloudConfigFile string
|
||||||
|
TLSCertFile string
|
||||||
|
TLSPrivateKeyFile string
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewKubeletServer will create a new KubeletServer with default values.
|
// NewKubeletServer will create a new KubeletServer with default values.
|
||||||
@ -128,6 +131,11 @@ func (s *KubeletServer) AddFlags(fs *pflag.FlagSet) {
|
|||||||
fs.BoolVar(&s.EnableServer, "enable_server", s.EnableServer, "Enable the info server")
|
fs.BoolVar(&s.EnableServer, "enable_server", s.EnableServer, "Enable the info server")
|
||||||
fs.Var(&s.Address, "address", "The IP address for the info server to serve on (set to 0.0.0.0 for all interfaces)")
|
fs.Var(&s.Address, "address", "The IP address for the info server to serve on (set to 0.0.0.0 for all interfaces)")
|
||||||
fs.UintVar(&s.Port, "port", s.Port, "The port for the info server to serve on")
|
fs.UintVar(&s.Port, "port", s.Port, "The port for the info server to serve on")
|
||||||
|
fs.StringVar(&s.TLSCertFile, "tls_cert_file", s.TLSCertFile, ""+
|
||||||
|
"File containing x509 Certificate for HTTPS. (CA cert, if any, concatenated after server cert). "+
|
||||||
|
"If --tls_cert_file and --tls_private_key_file are not provided, a self-signed certificate and key "+
|
||||||
|
"are generated for the public address and saved to /var/run/kubernetes.")
|
||||||
|
fs.StringVar(&s.TLSPrivateKeyFile, "tls_private_key_file", s.TLSPrivateKeyFile, "File containing x509 private key matching --tls_cert_file.")
|
||||||
fs.StringVar(&s.HostnameOverride, "hostname_override", s.HostnameOverride, "If non-empty, will use this string as identification instead of the actual hostname.")
|
fs.StringVar(&s.HostnameOverride, "hostname_override", s.HostnameOverride, "If non-empty, will use this string as identification instead of the actual hostname.")
|
||||||
fs.StringVar(&s.PodInfraContainerImage, "pod_infra_container_image", s.PodInfraContainerImage, "The image whose network/ipc namespaces containers in each pod will use.")
|
fs.StringVar(&s.PodInfraContainerImage, "pod_infra_container_image", s.PodInfraContainerImage, "The image whose network/ipc namespaces containers in each pod will use.")
|
||||||
fs.StringVar(&s.DockerEndpoint, "docker_endpoint", s.DockerEndpoint, "If non-empty, use this for the docker endpoint to communicate with")
|
fs.StringVar(&s.DockerEndpoint, "docker_endpoint", s.DockerEndpoint, "If non-empty, use this for the docker endpoint to communicate with")
|
||||||
@ -194,6 +202,26 @@ func (s *KubeletServer) Run(_ []string) error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if s.TLSCertFile == "" && s.TLSPrivateKeyFile == "" {
|
||||||
|
s.TLSCertFile = "/var/run/kubernetes/kubelet.crt"
|
||||||
|
s.TLSPrivateKeyFile = "/var/run/kubernetes/kubelet.key"
|
||||||
|
if err := util.GenerateSelfSignedCert(util.GetHostname(s.HostnameOverride), s.TLSCertFile, s.TLSPrivateKeyFile); err != nil {
|
||||||
|
glog.Fatalf("Unable to generate self signed cert: %v", err)
|
||||||
|
}
|
||||||
|
glog.Infof("Using self-signed cert (%s, %s)", s.TLSCertFile, s.TLSPrivateKeyFile)
|
||||||
|
}
|
||||||
|
tlsOptions := &kubelet.TLSOptions{
|
||||||
|
Config: &tls.Config{
|
||||||
|
// Change default from SSLv3 to TLSv1.0 (because of POODLE vulnerability).
|
||||||
|
MinVersion: tls.VersionTLS10,
|
||||||
|
// Populate PeerCertificates in requests, but don't yet reject connections without certificates.
|
||||||
|
ClientAuth: tls.RequestClientCert,
|
||||||
|
},
|
||||||
|
CertFile: s.TLSCertFile,
|
||||||
|
KeyFile: s.TLSPrivateKeyFile,
|
||||||
|
}
|
||||||
|
|
||||||
kcfg := KubeletConfig{
|
kcfg := KubeletConfig{
|
||||||
Address: s.Address,
|
Address: s.Address,
|
||||||
AllowPrivileged: s.AllowPrivileged,
|
AllowPrivileged: s.AllowPrivileged,
|
||||||
@ -225,6 +253,7 @@ func (s *KubeletServer) Run(_ []string) error {
|
|||||||
NetworkPlugins: ProbeNetworkPlugins(),
|
NetworkPlugins: ProbeNetworkPlugins(),
|
||||||
NetworkPluginName: s.NetworkPluginName,
|
NetworkPluginName: s.NetworkPluginName,
|
||||||
StreamingConnectionIdleTimeout: s.StreamingConnectionIdleTimeout,
|
StreamingConnectionIdleTimeout: s.StreamingConnectionIdleTimeout,
|
||||||
|
TLSOptions: tlsOptions,
|
||||||
ImageGCPolicy: imageGCPolicy,
|
ImageGCPolicy: imageGCPolicy,
|
||||||
Cloud: cloud,
|
Cloud: cloud,
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user