Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pass the CA root cert into the apiserver #7326

Merged
merged 1 commit into from
Apr 27, 2015

Conversation

roberthbailey
Copy link
Contributor

So that the apiserver will perform client cert checks for authorization. Only enable on GCE where
the apiserver is terminating SSL connections from end users.

perform client cert checks for authorization. Only enable on GCE where
the apiserver is terminating SSL connections from end users.
@roberthbailey
Copy link
Contributor Author

/cc @lavalamp

@smarterclayton
Copy link
Contributor

@liggitt

@roberthbailey
Copy link
Contributor Author

FYI this only enables it for GCE and is based on #6190 which was submitted by @liggitt.

@roberthbailey
Copy link
Contributor Author

@zmerlynn I'd like for this to get in before the 0.16.0 release cut tomorrow if possible. Thanks!

@zmerlynn
Copy link
Member

Sorry, was completely offline. Looking now.

@zmerlynn
Copy link
Member

LGTM

zmerlynn added a commit that referenced this pull request Apr 27, 2015
Pass the CA root cert into the apiserver
@zmerlynn zmerlynn merged commit df1cfae into kubernetes:master Apr 27, 2015
@lavalamp
Copy link
Member

Thanks for finding!

@@ -43,10 +43,12 @@

{% set cert_file = "--tls_cert_file=/srv/kubernetes/server.cert" -%}
{% set key_file = "--tls_private_key_file=/srv/kubernetes/server.key" -%}
{% set client_ca_file = "--client_ca_file=/dev/null" -%}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This broke non-GCE providers I think. Right now, the kube-apiserver outputs errors like the following:

F0427 21:05:35.065323       1 server.go:247] Invalid Authentication Config: error reading /dev/null: could not read any certificates

Is there any reason why we could not default the value to the empty string?

{% set client_ca_file = "" -%}

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I will put a PR together that does what described above.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry @derekwaynecarr. I was following the example of the token auth file since I thought the implementation on the server was identical.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No problem ;-)

derekwaynecarr added a commit to derekwaynecarr/kubernetes that referenced this pull request Apr 27, 2015
a-robinson added a commit that referenced this pull request Apr 27, 2015
@roberthbailey roberthbailey deleted the client-cert-auth branch April 28, 2015 18:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

6 participants