Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature] Avoid fetching resource from external resources on internet during bootstrap #39

Closed
jia-jerry opened this issue Apr 14, 2020 · 2 comments · Fixed by #40
Closed
Labels
kind/enhancement Enhancement, improvement, extension

Comments

@jia-jerry
Copy link
Contributor

jia-jerry commented Apr 14, 2020

Feature (What you would like to be added):
In Alicloud China regions, sometimes it is not possible to run apk get. We need to avoid such statement.
Motivation (Why is this needed?):
Shoot cluster can't be created in China regions sometimes.
Approach/Hint to the implement solution (optional):

@jia-jerry jia-jerry added the kind/enhancement Enhancement, improvement, extension label Apr 14, 2020
@jia-jerry jia-jerry changed the title [Feature] Avoid fetching resource from external resources on internet during update [Feature] Avoid fetching resource from external resources on internet during bootstrap Apr 14, 2020
@swapnilgm
Copy link

/assign @swapnilgm

@swapnilgm
Copy link

Copying the offline discussion and findings summary here:
Default etcd container image or to be precise alpine base image doesn't come with wget version supporting SSL flags. So, we injected bootstrap script with apk add wget call to get coorrect wget version. Hence etcd bootstrap has this dependency on internel.

**Finding: **
We can inject the provider self-signed CA bundle to root ca directories. Usually this could be done by update-ca-certificates utility but again this doesn't come preinstalled image of etcd. What it does is append the provided ca-etcd.crt to /etc/ssl/certs/ca-certificats.crt and also, copies/symlinks it under /etc/ssl/certs/ca-cert-ca-etcd.crtfile. This is sufficient for GNUTls SSL backend. update-ca-certificates also copeis/sysmlinks it under /etc/ssl/certs/<cert-x509-hash>.<index> which is used by openssl backend lib for server certificate verification.

For vanilla etcd container image, certificates are bundled under: /etc/ssl/cert.pem

Solution: cat <path-to-ca-etcd.crt> /etc/ssl/cert.pem. And remove wget udpates script.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/enhancement Enhancement, improvement, extension
Projects
None yet
2 participants