-
Notifications
You must be signed in to change notification settings - Fork 198
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fetch Kubeconfig From Master via SSH #95
Comments
duplicate of https://github.com/kubernetes-sigs/cluster-api/issues/122 ? |
I don't know of a reliable way of dealing with man in the middle attacks on the ssh host key fingerprint without being vendor specific. Even then, its rather sketchy. |
@dims - #122 suggests getting rid of ssh. This issue proposes having a provider independent way to do the ssh. They aren't duplicates, they are mutually exclusive; we need to implement one or the other (but not both). Maybe we can chat during the meeting tomorrow which approach we'd like to pursue. /cc @karan |
Using something similar to:
It should be possible to make this provider independent. |
@ashish-amarnath - the question is about how to get the credentials to be consistent between the client and the server. The current implementation allows the server to generate the credentials (deferring to |
@roberthbailey thanks for that explanation :) Disclaimer: I may be changing the scope with which this issue was created and I also may not, at the moment, fully understand other scenarios that we are designing for. |
Right now the client is bootstrapping the cluster. We have some basic upgrade support for the control plane, but it needs to be better flushed out (for nodes we can do updates via MachineDeployments). One thing that you may have run across in the meeting notes is how we will transition to a highly available control plane. At that point, we will need to have multiple instances of the control plane using a consistent set of credentials. So our solution, while not necessarily needing to solve that problem today, should move us towards making that easier to solve rather than harder. |
Has there been any consideration of environments that disable SSH on the machines? There are a few environments I have worked in that do this to avoid complexities for regulatory reasons, which would prevent us from leveraging this retrieval method. |
@chaosaffe - see https://github.com/kubernetes-sigs/cluster-api/issues/122. This issue and that one are mutually exclusive, as I mentioned above. If you have ideas about how to get rid of ssh, please add them to #122 and I'd be more than happy to close this issue in favor of fixing that one. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Currently fetching kubeconfig for master is a per-provider implementation in the deployer. However, we could have a generic default implementation if we do the following:
Having a provider-specific way to get kubeconfig should be an option and not a requirement.
The text was updated successfully, but these errors were encountered: