|
|
|
@@ -205,31 +205,31 @@ func TestGetAPIServerCommand(t *testing.T) {
|
|
|
|
|
"kube-apiserver",
|
|
|
|
|
"--enable-admission-plugins=NodeRestriction",
|
|
|
|
|
"--service-cluster-ip-range=bar",
|
|
|
|
|
"--service-account-key-file=" + testCertsDir + "/sa.pub",
|
|
|
|
|
"--service-account-signing-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--service-account-key-file=" + filepath.Join(testCertsDir, "sa.pub"),
|
|
|
|
|
"--service-account-signing-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--service-account-issuer=https://kubernetes.default.svc.cluster.local",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--tls-cert-file=" + testCertsDir + "/apiserver.crt",
|
|
|
|
|
"--tls-private-key-file=" + testCertsDir + "/apiserver.key",
|
|
|
|
|
"--kubelet-client-certificate=" + testCertsDir + "/apiserver-kubelet-client.crt",
|
|
|
|
|
"--kubelet-client-key=" + testCertsDir + "/apiserver-kubelet-client.key",
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--tls-cert-file=" + filepath.Join(testCertsDir, "apiserver.crt"),
|
|
|
|
|
"--tls-private-key-file=" + filepath.Join(testCertsDir, "apiserver.key"),
|
|
|
|
|
"--kubelet-client-certificate=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.crt"),
|
|
|
|
|
"--kubelet-client-key=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.key"),
|
|
|
|
|
"--enable-bootstrap-token-auth=true",
|
|
|
|
|
"--secure-port=123",
|
|
|
|
|
"--allow-privileged=true",
|
|
|
|
|
"--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname",
|
|
|
|
|
"--proxy-client-cert-file=/var/lib/certs/front-proxy-client.crt",
|
|
|
|
|
"--proxy-client-key-file=/var/lib/certs/front-proxy-client.key",
|
|
|
|
|
"--proxy-client-cert-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.crt"),
|
|
|
|
|
"--proxy-client-key-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.key"),
|
|
|
|
|
"--requestheader-username-headers=X-Remote-User",
|
|
|
|
|
"--requestheader-group-headers=X-Remote-Group",
|
|
|
|
|
"--requestheader-extra-headers-prefix=X-Remote-Extra-",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--requestheader-allowed-names=front-proxy-client",
|
|
|
|
|
"--authorization-mode=Node,RBAC",
|
|
|
|
|
"--advertise-address=1.2.3.4",
|
|
|
|
|
fmt.Sprintf("--etcd-servers=https://127.0.0.1:%d", kubeadmconstants.EtcdListenClientPort),
|
|
|
|
|
"--etcd-cafile=" + testCertsDir + "/etcd/ca.crt",
|
|
|
|
|
"--etcd-certfile=" + testCertsDir + "/apiserver-etcd-client.crt",
|
|
|
|
|
"--etcd-keyfile=" + testCertsDir + "/apiserver-etcd-client.key",
|
|
|
|
|
"--etcd-cafile=" + filepath.Join(testCertsDir, "etcd/ca.crt"),
|
|
|
|
|
"--etcd-certfile=" + filepath.Join(testCertsDir, "apiserver-etcd-client.crt"),
|
|
|
|
|
"--etcd-keyfile=" + filepath.Join(testCertsDir, "apiserver-etcd-client.key"),
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
@@ -243,31 +243,31 @@ func TestGetAPIServerCommand(t *testing.T) {
|
|
|
|
|
"kube-apiserver",
|
|
|
|
|
"--enable-admission-plugins=NodeRestriction",
|
|
|
|
|
"--service-cluster-ip-range=bar",
|
|
|
|
|
"--service-account-key-file=" + testCertsDir + "/sa.pub",
|
|
|
|
|
"--service-account-signing-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--service-account-key-file=" + filepath.Join(testCertsDir, "sa.pub"),
|
|
|
|
|
"--service-account-signing-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--service-account-issuer=https://kubernetes.default.svc.cluster.local",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--tls-cert-file=" + testCertsDir + "/apiserver.crt",
|
|
|
|
|
"--tls-private-key-file=" + testCertsDir + "/apiserver.key",
|
|
|
|
|
"--kubelet-client-certificate=" + testCertsDir + "/apiserver-kubelet-client.crt",
|
|
|
|
|
"--kubelet-client-key=" + testCertsDir + "/apiserver-kubelet-client.key",
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--tls-cert-file=" + filepath.Join(testCertsDir, "apiserver.crt"),
|
|
|
|
|
"--tls-private-key-file=" + filepath.Join(testCertsDir, "apiserver.key"),
|
|
|
|
|
"--kubelet-client-certificate=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.crt"),
|
|
|
|
|
"--kubelet-client-key=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.key"),
|
|
|
|
|
"--enable-bootstrap-token-auth=true",
|
|
|
|
|
fmt.Sprintf("--secure-port=%d", 123),
|
|
|
|
|
"--allow-privileged=true",
|
|
|
|
|
"--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname",
|
|
|
|
|
"--proxy-client-cert-file=/var/lib/certs/front-proxy-client.crt",
|
|
|
|
|
"--proxy-client-key-file=/var/lib/certs/front-proxy-client.key",
|
|
|
|
|
"--proxy-client-cert-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.crt"),
|
|
|
|
|
"--proxy-client-key-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.key"),
|
|
|
|
|
"--requestheader-username-headers=X-Remote-User",
|
|
|
|
|
"--requestheader-group-headers=X-Remote-Group",
|
|
|
|
|
"--requestheader-extra-headers-prefix=X-Remote-Extra-",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--requestheader-allowed-names=front-proxy-client",
|
|
|
|
|
"--authorization-mode=Node,RBAC",
|
|
|
|
|
"--advertise-address=2001:db8::1",
|
|
|
|
|
fmt.Sprintf("--etcd-servers=https://[::1]:%d", kubeadmconstants.EtcdListenClientPort),
|
|
|
|
|
"--etcd-cafile=" + testCertsDir + "/etcd/ca.crt",
|
|
|
|
|
"--etcd-certfile=" + testCertsDir + "/apiserver-etcd-client.crt",
|
|
|
|
|
"--etcd-keyfile=" + testCertsDir + "/apiserver-etcd-client.key",
|
|
|
|
|
"--etcd-cafile=" + filepath.Join(testCertsDir, "etcd/ca.crt"),
|
|
|
|
|
"--etcd-certfile=" + filepath.Join(testCertsDir, "apiserver-etcd-client.crt"),
|
|
|
|
|
"--etcd-keyfile=" + filepath.Join(testCertsDir, "apiserver-etcd-client.key"),
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
@@ -289,24 +289,24 @@ func TestGetAPIServerCommand(t *testing.T) {
|
|
|
|
|
"kube-apiserver",
|
|
|
|
|
"--enable-admission-plugins=NodeRestriction",
|
|
|
|
|
"--service-cluster-ip-range=bar",
|
|
|
|
|
"--service-account-key-file=" + testCertsDir + "/sa.pub",
|
|
|
|
|
"--service-account-signing-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--service-account-key-file=" + filepath.Join(testCertsDir, "sa.pub"),
|
|
|
|
|
"--service-account-signing-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--service-account-issuer=https://kubernetes.default.svc.cluster.local",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--tls-cert-file=" + testCertsDir + "/apiserver.crt",
|
|
|
|
|
"--tls-private-key-file=" + testCertsDir + "/apiserver.key",
|
|
|
|
|
"--kubelet-client-certificate=" + testCertsDir + "/apiserver-kubelet-client.crt",
|
|
|
|
|
"--kubelet-client-key=" + testCertsDir + "/apiserver-kubelet-client.key",
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--tls-cert-file=" + filepath.Join(testCertsDir, "apiserver.crt"),
|
|
|
|
|
"--tls-private-key-file=" + filepath.Join(testCertsDir, "apiserver.key"),
|
|
|
|
|
"--kubelet-client-certificate=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.crt"),
|
|
|
|
|
"--kubelet-client-key=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.key"),
|
|
|
|
|
fmt.Sprintf("--secure-port=%d", 123),
|
|
|
|
|
"--allow-privileged=true",
|
|
|
|
|
"--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname",
|
|
|
|
|
"--enable-bootstrap-token-auth=true",
|
|
|
|
|
"--proxy-client-cert-file=/var/lib/certs/front-proxy-client.crt",
|
|
|
|
|
"--proxy-client-key-file=/var/lib/certs/front-proxy-client.key",
|
|
|
|
|
"--proxy-client-cert-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.crt"),
|
|
|
|
|
"--proxy-client-key-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.key"),
|
|
|
|
|
"--requestheader-username-headers=X-Remote-User",
|
|
|
|
|
"--requestheader-group-headers=X-Remote-Group",
|
|
|
|
|
"--requestheader-extra-headers-prefix=X-Remote-Extra-",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--requestheader-allowed-names=front-proxy-client",
|
|
|
|
|
"--authorization-mode=Node,RBAC",
|
|
|
|
|
"--advertise-address=2001:db8::1",
|
|
|
|
@@ -332,24 +332,24 @@ func TestGetAPIServerCommand(t *testing.T) {
|
|
|
|
|
"kube-apiserver",
|
|
|
|
|
"--enable-admission-plugins=NodeRestriction",
|
|
|
|
|
"--service-cluster-ip-range=bar",
|
|
|
|
|
"--service-account-key-file=" + testCertsDir + "/sa.pub",
|
|
|
|
|
"--service-account-signing-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--service-account-key-file=" + filepath.Join(testCertsDir, "sa.pub"),
|
|
|
|
|
"--service-account-signing-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--service-account-issuer=https://kubernetes.default.svc.cluster.local",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--tls-cert-file=" + testCertsDir + "/apiserver.crt",
|
|
|
|
|
"--tls-private-key-file=" + testCertsDir + "/apiserver.key",
|
|
|
|
|
"--kubelet-client-certificate=" + testCertsDir + "/apiserver-kubelet-client.crt",
|
|
|
|
|
"--kubelet-client-key=" + testCertsDir + "/apiserver-kubelet-client.key",
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--tls-cert-file=" + filepath.Join(testCertsDir, "apiserver.crt"),
|
|
|
|
|
"--tls-private-key-file=" + filepath.Join(testCertsDir, "apiserver.key"),
|
|
|
|
|
"--kubelet-client-certificate=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.crt"),
|
|
|
|
|
"--kubelet-client-key=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.key"),
|
|
|
|
|
fmt.Sprintf("--secure-port=%d", 123),
|
|
|
|
|
"--allow-privileged=true",
|
|
|
|
|
"--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname",
|
|
|
|
|
"--enable-bootstrap-token-auth=true",
|
|
|
|
|
"--proxy-client-cert-file=/var/lib/certs/front-proxy-client.crt",
|
|
|
|
|
"--proxy-client-key-file=/var/lib/certs/front-proxy-client.key",
|
|
|
|
|
"--proxy-client-cert-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.crt"),
|
|
|
|
|
"--proxy-client-key-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.key"),
|
|
|
|
|
"--requestheader-username-headers=X-Remote-User",
|
|
|
|
|
"--requestheader-group-headers=X-Remote-Group",
|
|
|
|
|
"--requestheader-extra-headers-prefix=X-Remote-Extra-",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--requestheader-allowed-names=front-proxy-client",
|
|
|
|
|
"--authorization-mode=Node,RBAC",
|
|
|
|
|
"--advertise-address=2001:db8::1",
|
|
|
|
@@ -377,31 +377,31 @@ func TestGetAPIServerCommand(t *testing.T) {
|
|
|
|
|
"kube-apiserver",
|
|
|
|
|
"--enable-admission-plugins=NodeRestriction",
|
|
|
|
|
"--service-cluster-ip-range=baz",
|
|
|
|
|
"--service-account-key-file=" + testCertsDir + "/sa.pub",
|
|
|
|
|
"--service-account-signing-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--service-account-key-file=" + filepath.Join(testCertsDir, "sa.pub"),
|
|
|
|
|
"--service-account-signing-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--service-account-issuer=https://kubernetes.default.svc.cluster.local",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--tls-cert-file=" + testCertsDir + "/apiserver.crt",
|
|
|
|
|
"--tls-private-key-file=" + testCertsDir + "/apiserver.key",
|
|
|
|
|
"--kubelet-client-certificate=" + testCertsDir + "/apiserver-kubelet-client.crt",
|
|
|
|
|
"--kubelet-client-key=" + testCertsDir + "/apiserver-kubelet-client.key",
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--tls-cert-file=" + filepath.Join(testCertsDir, "apiserver.crt"),
|
|
|
|
|
"--tls-private-key-file=" + filepath.Join(testCertsDir, "apiserver.key"),
|
|
|
|
|
"--kubelet-client-certificate=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.crt"),
|
|
|
|
|
"--kubelet-client-key=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.key"),
|
|
|
|
|
"--enable-bootstrap-token-auth=true",
|
|
|
|
|
"--secure-port=123",
|
|
|
|
|
"--allow-privileged=true",
|
|
|
|
|
"--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname",
|
|
|
|
|
"--proxy-client-cert-file=/var/lib/certs/front-proxy-client.crt",
|
|
|
|
|
"--proxy-client-key-file=/var/lib/certs/front-proxy-client.key",
|
|
|
|
|
"--proxy-client-cert-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.crt"),
|
|
|
|
|
"--proxy-client-key-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.key"),
|
|
|
|
|
"--requestheader-username-headers=X-Remote-User",
|
|
|
|
|
"--requestheader-group-headers=X-Remote-Group",
|
|
|
|
|
"--requestheader-extra-headers-prefix=X-Remote-Extra-",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--requestheader-allowed-names=front-proxy-client",
|
|
|
|
|
"--authorization-mode=Node,RBAC",
|
|
|
|
|
"--advertise-address=9.9.9.9",
|
|
|
|
|
fmt.Sprintf("--etcd-servers=https://127.0.0.1:%d", kubeadmconstants.EtcdListenClientPort),
|
|
|
|
|
"--etcd-cafile=" + testCertsDir + "/etcd/ca.crt",
|
|
|
|
|
"--etcd-certfile=" + testCertsDir + "/apiserver-etcd-client.crt",
|
|
|
|
|
"--etcd-keyfile=" + testCertsDir + "/apiserver-etcd-client.key",
|
|
|
|
|
"--etcd-cafile=" + filepath.Join(testCertsDir, "etcd/ca.crt"),
|
|
|
|
|
"--etcd-certfile=" + filepath.Join(testCertsDir, "apiserver-etcd-client.crt"),
|
|
|
|
|
"--etcd-keyfile=" + filepath.Join(testCertsDir, "apiserver-etcd-client.key"),
|
|
|
|
|
"--audit-policy-file=/etc/config/audit.yaml",
|
|
|
|
|
"--audit-log-path=/var/log/kubernetes",
|
|
|
|
|
},
|
|
|
|
@@ -424,31 +424,31 @@ func TestGetAPIServerCommand(t *testing.T) {
|
|
|
|
|
"kube-apiserver",
|
|
|
|
|
"--enable-admission-plugins=NodeRestriction",
|
|
|
|
|
"--service-cluster-ip-range=bar",
|
|
|
|
|
"--service-account-key-file=" + testCertsDir + "/sa.pub",
|
|
|
|
|
"--service-account-signing-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--service-account-key-file=" + filepath.Join(testCertsDir, "sa.pub"),
|
|
|
|
|
"--service-account-signing-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--service-account-issuer=https://kubernetes.default.svc.cluster.local",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--tls-cert-file=" + testCertsDir + "/apiserver.crt",
|
|
|
|
|
"--tls-private-key-file=" + testCertsDir + "/apiserver.key",
|
|
|
|
|
"--kubelet-client-certificate=" + testCertsDir + "/apiserver-kubelet-client.crt",
|
|
|
|
|
"--kubelet-client-key=" + testCertsDir + "/apiserver-kubelet-client.key",
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--tls-cert-file=" + filepath.Join(testCertsDir, "apiserver.crt"),
|
|
|
|
|
"--tls-private-key-file=" + filepath.Join(testCertsDir, "apiserver.key"),
|
|
|
|
|
"--kubelet-client-certificate=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.crt"),
|
|
|
|
|
"--kubelet-client-key=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.key"),
|
|
|
|
|
"--enable-bootstrap-token-auth=true",
|
|
|
|
|
"--secure-port=123",
|
|
|
|
|
"--allow-privileged=true",
|
|
|
|
|
"--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname",
|
|
|
|
|
"--proxy-client-cert-file=/var/lib/certs/front-proxy-client.crt",
|
|
|
|
|
"--proxy-client-key-file=/var/lib/certs/front-proxy-client.key",
|
|
|
|
|
"--proxy-client-cert-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.crt"),
|
|
|
|
|
"--proxy-client-key-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.key"),
|
|
|
|
|
"--requestheader-username-headers=X-Remote-User",
|
|
|
|
|
"--requestheader-group-headers=X-Remote-Group",
|
|
|
|
|
"--requestheader-extra-headers-prefix=X-Remote-Extra-",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--requestheader-allowed-names=front-proxy-client",
|
|
|
|
|
"--authorization-mode=ABAC",
|
|
|
|
|
"--advertise-address=1.2.3.4",
|
|
|
|
|
fmt.Sprintf("--etcd-servers=https://127.0.0.1:%d", kubeadmconstants.EtcdListenClientPort),
|
|
|
|
|
"--etcd-cafile=" + testCertsDir + "/etcd/ca.crt",
|
|
|
|
|
"--etcd-certfile=" + testCertsDir + "/apiserver-etcd-client.crt",
|
|
|
|
|
"--etcd-keyfile=" + testCertsDir + "/apiserver-etcd-client.key",
|
|
|
|
|
"--etcd-cafile=" + filepath.Join(testCertsDir, "etcd/ca.crt"),
|
|
|
|
|
"--etcd-certfile=" + filepath.Join(testCertsDir, "apiserver-etcd-client.crt"),
|
|
|
|
|
"--etcd-keyfile=" + filepath.Join(testCertsDir, "apiserver-etcd-client.key"),
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
@@ -473,31 +473,31 @@ func TestGetAPIServerCommand(t *testing.T) {
|
|
|
|
|
"kube-apiserver",
|
|
|
|
|
"--enable-admission-plugins=NodeRestriction",
|
|
|
|
|
"--service-cluster-ip-range=bar",
|
|
|
|
|
"--service-account-key-file=" + testCertsDir + "/sa.pub",
|
|
|
|
|
"--service-account-signing-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--service-account-key-file=" + filepath.Join(testCertsDir, "sa.pub"),
|
|
|
|
|
"--service-account-signing-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--service-account-issuer=https://kubernetes.default.svc.cluster.local",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--tls-cert-file=" + testCertsDir + "/apiserver.crt",
|
|
|
|
|
"--tls-private-key-file=" + testCertsDir + "/apiserver.key",
|
|
|
|
|
"--kubelet-client-certificate=" + testCertsDir + "/apiserver-kubelet-client.crt",
|
|
|
|
|
"--kubelet-client-key=" + testCertsDir + "/apiserver-kubelet-client.key",
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--tls-cert-file=" + filepath.Join(testCertsDir, "apiserver.crt"),
|
|
|
|
|
"--tls-private-key-file=" + filepath.Join(testCertsDir, "apiserver.key"),
|
|
|
|
|
"--kubelet-client-certificate=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.crt"),
|
|
|
|
|
"--kubelet-client-key=" + filepath.Join(testCertsDir, "apiserver-kubelet-client.key"),
|
|
|
|
|
"--enable-bootstrap-token-auth=true",
|
|
|
|
|
"--secure-port=123",
|
|
|
|
|
"--allow-privileged=true",
|
|
|
|
|
"--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname",
|
|
|
|
|
"--proxy-client-cert-file=/var/lib/certs/front-proxy-client.crt",
|
|
|
|
|
"--proxy-client-key-file=/var/lib/certs/front-proxy-client.key",
|
|
|
|
|
"--proxy-client-cert-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.crt"),
|
|
|
|
|
"--proxy-client-key-file=" + filepath.FromSlash("/var/lib/certs/front-proxy-client.key"),
|
|
|
|
|
"--requestheader-username-headers=X-Remote-User",
|
|
|
|
|
"--requestheader-group-headers=X-Remote-Group",
|
|
|
|
|
"--requestheader-extra-headers-prefix=X-Remote-Extra-",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--requestheader-allowed-names=front-proxy-client",
|
|
|
|
|
"--authorization-mode=Node,RBAC,Webhook",
|
|
|
|
|
"--advertise-address=1.2.3.4",
|
|
|
|
|
fmt.Sprintf("--etcd-servers=https://127.0.0.1:%d", kubeadmconstants.EtcdListenClientPort),
|
|
|
|
|
"--etcd-cafile=" + testCertsDir + "/etcd/ca.crt",
|
|
|
|
|
"--etcd-certfile=" + testCertsDir + "/apiserver-etcd-client.crt",
|
|
|
|
|
"--etcd-keyfile=" + testCertsDir + "/apiserver-etcd-client.key",
|
|
|
|
|
"--etcd-cafile=" + filepath.Join(testCertsDir, "etcd/ca.crt"),
|
|
|
|
|
"--etcd-certfile=" + filepath.Join(testCertsDir, "apiserver-etcd-client.crt"),
|
|
|
|
|
"--etcd-keyfile=" + filepath.Join(testCertsDir, "apiserver-etcd-client.key"),
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
@@ -549,17 +549,17 @@ func TestGetControllerManagerCommand(t *testing.T) {
|
|
|
|
|
"kube-controller-manager",
|
|
|
|
|
"--bind-address=127.0.0.1",
|
|
|
|
|
"--leader-elect=true",
|
|
|
|
|
"--kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--root-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--service-account-private-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--cluster-signing-cert-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--cluster-signing-key-file=" + testCertsDir + "/ca.key",
|
|
|
|
|
"--kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--root-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--service-account-private-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--cluster-signing-cert-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--cluster-signing-key-file=" + filepath.Join(testCertsDir, "ca.key"),
|
|
|
|
|
"--use-service-account-credentials=true",
|
|
|
|
|
"--controllers=*,bootstrapsigner,tokencleaner",
|
|
|
|
|
"--authentication-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--authentication-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--authorization-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--cluster-name=some-other-cluster-name",
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
@@ -573,17 +573,17 @@ func TestGetControllerManagerCommand(t *testing.T) {
|
|
|
|
|
"kube-controller-manager",
|
|
|
|
|
"--bind-address=127.0.0.1",
|
|
|
|
|
"--leader-elect=true",
|
|
|
|
|
"--kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--root-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--service-account-private-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--cluster-signing-cert-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--cluster-signing-key-file=" + testCertsDir + "/ca.key",
|
|
|
|
|
"--kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--root-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--service-account-private-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--cluster-signing-cert-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--cluster-signing-key-file=" + filepath.Join(testCertsDir, "ca.key"),
|
|
|
|
|
"--use-service-account-credentials=true",
|
|
|
|
|
"--controllers=*,bootstrapsigner,tokencleaner",
|
|
|
|
|
"--authentication-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--authentication-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--authorization-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
@@ -597,17 +597,17 @@ func TestGetControllerManagerCommand(t *testing.T) {
|
|
|
|
|
"kube-controller-manager",
|
|
|
|
|
"--bind-address=127.0.0.1",
|
|
|
|
|
"--leader-elect=true",
|
|
|
|
|
"--kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--root-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--service-account-private-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--cluster-signing-cert-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--cluster-signing-key-file=" + testCertsDir + "/ca.key",
|
|
|
|
|
"--kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--root-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--service-account-private-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--cluster-signing-cert-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--cluster-signing-key-file=" + filepath.Join(testCertsDir, "ca.key"),
|
|
|
|
|
"--use-service-account-credentials=true",
|
|
|
|
|
"--controllers=*,bootstrapsigner,tokencleaner",
|
|
|
|
|
"--authentication-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--authentication-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--authorization-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--allocate-node-cidrs=true",
|
|
|
|
|
"--cluster-cidr=10.0.1.15/16",
|
|
|
|
|
},
|
|
|
|
@@ -627,17 +627,17 @@ func TestGetControllerManagerCommand(t *testing.T) {
|
|
|
|
|
"kube-controller-manager",
|
|
|
|
|
"--bind-address=127.0.0.1",
|
|
|
|
|
"--leader-elect=true",
|
|
|
|
|
"--kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--root-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--service-account-private-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--cluster-signing-cert-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--cluster-signing-key-file=" + testCertsDir + "/ca.key",
|
|
|
|
|
"--kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--root-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--service-account-private-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--cluster-signing-cert-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--cluster-signing-key-file=" + filepath.Join(testCertsDir, "ca.key"),
|
|
|
|
|
"--use-service-account-credentials=true",
|
|
|
|
|
"--controllers=*,bootstrapsigner,tokencleaner",
|
|
|
|
|
"--authentication-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--authentication-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--authorization-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--allocate-node-cidrs=true",
|
|
|
|
|
"--cluster-cidr=10.0.1.15/16",
|
|
|
|
|
"--service-cluster-ip-range=172.20.0.0/24",
|
|
|
|
@@ -657,17 +657,17 @@ func TestGetControllerManagerCommand(t *testing.T) {
|
|
|
|
|
"kube-controller-manager",
|
|
|
|
|
"--bind-address=127.0.0.1",
|
|
|
|
|
"--leader-elect=true",
|
|
|
|
|
"--kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--root-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--service-account-private-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--cluster-signing-cert-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--cluster-signing-key-file=" + testCertsDir + "/ca.key",
|
|
|
|
|
"--kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--root-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--service-account-private-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--cluster-signing-cert-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--cluster-signing-key-file=" + filepath.Join(testCertsDir, "ca.key"),
|
|
|
|
|
"--use-service-account-credentials=true",
|
|
|
|
|
"--controllers=*,bootstrapsigner,tokencleaner",
|
|
|
|
|
"--authentication-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--authentication-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--authorization-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--allocate-node-cidrs=true",
|
|
|
|
|
"--cluster-cidr=10.0.1.15/16",
|
|
|
|
|
"--node-cidr-mask-size=20",
|
|
|
|
@@ -689,17 +689,17 @@ func TestGetControllerManagerCommand(t *testing.T) {
|
|
|
|
|
"kube-controller-manager",
|
|
|
|
|
"--bind-address=127.0.0.1",
|
|
|
|
|
"--leader-elect=true",
|
|
|
|
|
"--kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--root-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--service-account-private-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--cluster-signing-cert-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--cluster-signing-key-file=" + testCertsDir + "/ca.key",
|
|
|
|
|
"--kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--root-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--service-account-private-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--cluster-signing-cert-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--cluster-signing-key-file=" + filepath.Join(testCertsDir, "ca.key"),
|
|
|
|
|
"--use-service-account-credentials=true",
|
|
|
|
|
"--controllers=*,bootstrapsigner,tokencleaner",
|
|
|
|
|
"--authentication-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--authentication-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--authorization-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--allocate-node-cidrs=true",
|
|
|
|
|
"--cluster-cidr=2001:db8::/64",
|
|
|
|
|
"--service-cluster-ip-range=fd03::/112",
|
|
|
|
@@ -723,17 +723,17 @@ func TestGetControllerManagerCommand(t *testing.T) {
|
|
|
|
|
"kube-controller-manager",
|
|
|
|
|
"--bind-address=127.0.0.1",
|
|
|
|
|
"--leader-elect=true",
|
|
|
|
|
"--kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--root-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--service-account-private-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--cluster-signing-cert-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--cluster-signing-key-file=" + testCertsDir + "/ca.key",
|
|
|
|
|
"--kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--root-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--service-account-private-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--cluster-signing-cert-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--cluster-signing-key-file=" + filepath.Join(testCertsDir, "ca.key"),
|
|
|
|
|
"--use-service-account-credentials=true",
|
|
|
|
|
"--controllers=*,bootstrapsigner,tokencleaner",
|
|
|
|
|
"--authentication-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--authentication-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--authorization-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--allocate-node-cidrs=false",
|
|
|
|
|
"--cluster-cidr=2001:db8::/64",
|
|
|
|
|
"--service-cluster-ip-range=fd03::/112",
|
|
|
|
@@ -754,17 +754,17 @@ func TestGetControllerManagerCommand(t *testing.T) {
|
|
|
|
|
"kube-controller-manager",
|
|
|
|
|
"--bind-address=127.0.0.1",
|
|
|
|
|
"--leader-elect=true",
|
|
|
|
|
"--kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--root-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--service-account-private-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--cluster-signing-cert-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--cluster-signing-key-file=" + testCertsDir + "/ca.key",
|
|
|
|
|
"--kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--root-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--service-account-private-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--cluster-signing-cert-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--cluster-signing-key-file=" + filepath.Join(testCertsDir, "ca.key"),
|
|
|
|
|
"--use-service-account-credentials=true",
|
|
|
|
|
"--controllers=*,bootstrapsigner,tokencleaner",
|
|
|
|
|
"--authentication-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--authentication-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--authorization-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--allocate-node-cidrs=true",
|
|
|
|
|
"--cluster-cidr=2001:db8::/64,10.1.0.0/16",
|
|
|
|
|
"--service-cluster-ip-range=fd03::/112,192.168.0.0/16",
|
|
|
|
@@ -787,17 +787,17 @@ func TestGetControllerManagerCommand(t *testing.T) {
|
|
|
|
|
"kube-controller-manager",
|
|
|
|
|
"--bind-address=127.0.0.1",
|
|
|
|
|
"--leader-elect=true",
|
|
|
|
|
"--kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--root-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--service-account-private-key-file=" + testCertsDir + "/sa.key",
|
|
|
|
|
"--cluster-signing-cert-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--cluster-signing-key-file=" + testCertsDir + "/ca.key",
|
|
|
|
|
"--kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--root-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--service-account-private-key-file=" + filepath.Join(testCertsDir, "sa.key"),
|
|
|
|
|
"--cluster-signing-cert-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--cluster-signing-key-file=" + filepath.Join(testCertsDir, "ca.key"),
|
|
|
|
|
"--use-service-account-credentials=true",
|
|
|
|
|
"--controllers=*,bootstrapsigner,tokencleaner",
|
|
|
|
|
"--authentication-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--client-ca-file=" + testCertsDir + "/ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt",
|
|
|
|
|
"--authentication-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--authorization-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--client-ca-file=" + filepath.Join(testCertsDir, "ca.crt"),
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(testCertsDir, "front-proxy-ca.crt"),
|
|
|
|
|
"--allocate-node-cidrs=true",
|
|
|
|
|
"--cluster-cidr=10.0.1.15/16,2001:db8::/64",
|
|
|
|
|
"--node-cidr-mask-size-ipv4=20",
|
|
|
|
@@ -840,17 +840,17 @@ func TestGetControllerManagerCommandExternalCA(t *testing.T) {
|
|
|
|
|
"kube-controller-manager",
|
|
|
|
|
"--bind-address=127.0.0.1",
|
|
|
|
|
"--leader-elect=true",
|
|
|
|
|
"--kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--root-ca-file=" + tmpdir + "/ca.crt",
|
|
|
|
|
"--service-account-private-key-file=" + tmpdir + "/sa.key",
|
|
|
|
|
"--kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--root-ca-file=" + filepath.Join(tmpdir, "ca.crt"),
|
|
|
|
|
"--service-account-private-key-file=" + filepath.Join(tmpdir, "sa.key"),
|
|
|
|
|
"--cluster-signing-cert-file=",
|
|
|
|
|
"--cluster-signing-key-file=",
|
|
|
|
|
"--use-service-account-credentials=true",
|
|
|
|
|
"--controllers=*,bootstrapsigner,tokencleaner",
|
|
|
|
|
"--authentication-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--client-ca-file=" + tmpdir + "/ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + tmpdir + "/front-proxy-ca.crt",
|
|
|
|
|
"--authentication-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--authorization-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--client-ca-file=" + filepath.Join(tmpdir, "ca.crt"),
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(tmpdir, "front-proxy-ca.crt"),
|
|
|
|
|
}
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
@@ -869,17 +869,17 @@ func TestGetControllerManagerCommandExternalCA(t *testing.T) {
|
|
|
|
|
"kube-controller-manager",
|
|
|
|
|
"--bind-address=127.0.0.1",
|
|
|
|
|
"--leader-elect=true",
|
|
|
|
|
"--kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--root-ca-file=" + tmpdir + "/ca.crt",
|
|
|
|
|
"--service-account-private-key-file=" + tmpdir + "/sa.key",
|
|
|
|
|
"--cluster-signing-cert-file=" + tmpdir + "/ca.crt",
|
|
|
|
|
"--cluster-signing-key-file=" + tmpdir + "/ca.key",
|
|
|
|
|
"--kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--root-ca-file=" + filepath.Join(tmpdir, "ca.crt"),
|
|
|
|
|
"--service-account-private-key-file=" + filepath.Join(tmpdir, "sa.key"),
|
|
|
|
|
"--cluster-signing-cert-file=" + filepath.Join(tmpdir, "ca.crt"),
|
|
|
|
|
"--cluster-signing-key-file=" + filepath.Join(tmpdir, "ca.key"),
|
|
|
|
|
"--use-service-account-credentials=true",
|
|
|
|
|
"--controllers=*,bootstrapsigner,tokencleaner",
|
|
|
|
|
"--authentication-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/controller-manager.conf",
|
|
|
|
|
"--client-ca-file=" + tmpdir + "/ca.crt",
|
|
|
|
|
"--requestheader-client-ca-file=" + tmpdir + "/front-proxy-ca.crt",
|
|
|
|
|
"--authentication-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--authorization-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "controller-manager.conf"),
|
|
|
|
|
"--client-ca-file=" + filepath.Join(tmpdir, "ca.crt"),
|
|
|
|
|
"--requestheader-client-ca-file=" + filepath.Join(tmpdir, "front-proxy-ca.crt"),
|
|
|
|
|
}
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
@@ -932,9 +932,9 @@ func TestGetSchedulerCommand(t *testing.T) {
|
|
|
|
|
"kube-scheduler",
|
|
|
|
|
"--bind-address=127.0.0.1",
|
|
|
|
|
"--leader-elect=true",
|
|
|
|
|
"--kubeconfig=" + kubeadmconstants.KubernetesDir + "/scheduler.conf",
|
|
|
|
|
"--authentication-kubeconfig=" + kubeadmconstants.KubernetesDir + "/scheduler.conf",
|
|
|
|
|
"--authorization-kubeconfig=" + kubeadmconstants.KubernetesDir + "/scheduler.conf",
|
|
|
|
|
"--kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "scheduler.conf"),
|
|
|
|
|
"--authentication-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "scheduler.conf"),
|
|
|
|
|
"--authorization-kubeconfig=" + filepath.Join(kubeadmconstants.KubernetesDir, "scheduler.conf"),
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|