-
Notifications
You must be signed in to change notification settings - Fork 6.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kubernetes CAs managed externally #8620
Kubernetes CAs managed externally #8620
Conversation
|
Welcome @julienlefur! |
Hi @julienlefur. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/easycla |
@julienlefur I think you need to place your custom certs in the same locations advertised by kubespray instead of removing the certificate validation. You can make the certificate generation then optional or skip-able via ansible |
@cristicalin thanks for your response. Do you mean that, in your opinion, we should rather implement a new tag for ansible instead of the variable we are proposing "kube_external_ca_mode" and update the PR? because I don't see any existing tags that we could use in kubespray today. |
@julienlefur Ok, I see your point about the tags creating more overhead since this affects a rather minor part of a role so I agree on using a variable instead of the tags mechanism. However please don't remove sanity checks and instead try to condition the execution of commands or parameters based on the variable you propose. |
882c522
to
7ed9937
Compare
24387eb
to
8e9f2de
Compare
/check-cla |
9c4d549
to
66aff37
Compare
66aff37
to
c496e38
Compare
Thanks for this work @julienlefur ! /ok-to-test |
/lgtm |
/cc @liupeng0518 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@julienlefur Thank you for the feature.
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: floryut, julienlefur The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
* master: (21 commits) Add tz to kubespray image Add tag to AWS VPC subnets for automatic subnet discovery by load balancers or ingress controllers (kubernetes-sigs#8705) Enable external CA mode for control-plane deployment (kubernetes-sigs#8620) UpCloud integration (kubernetes-sigs#8653) Fixes for Hetzner terraform and Hetzner Cloud (kubernetes-sigs#8702) Add VAGRANT_ANSIBLE_TAGS for normal deployment (kubernetes-sigs#8697) Removed quotation of nerdctl_extra_flags. (kubernetes-sigs#8695) [calico] add calico apiserver (kubernetes-sigs#8690) Add support for kube-vip (kubernetes-sigs#8669) Ensure all Kubelet required kernel values are configured when enabling protectKernelDefaults (kubernetes-sigs#8692) [cert-manager] Upgrade to v1.8.0 (kubernetes-sigs#8688) fix: reset docker was not removing docker properly (kubernetes-sigs#8680) Single quotes are missing in jsonpath argument of kubectl get node (kubernetes-sigs#8683) split kube_feature_gates variable for different kubernetes components (kubernetes-sigs#8677) [crun] upgrade to 1.4.4 (kubernetes-sigs#8675) [validate-container-engine] check if kubelet is present was not working (kubernetes-sigs#8679) [containerd] upgrade versions to address CVE-2022-24769 (kubernetes-sigs#8671) [vsphere_csi] update to 2.5.1 and make external_vsphere_version 7.0u1 by default (kubernetes-sigs#8676) [runc] upgrade to 1.1.1 (kubernetes-sigs#8674) [nerdctl] upgrade to 0.18.0 (kubernetes-sigs#8672) ...
What type of PR is this?
/kind feature
What this PR does / why we need it:
Using kubespray to deploy a kubernetes cluster with custom CAs seems to be broken.
Some particular tasks must be disabled when running the playbook to allow a successful installation of a cluster using external CAs (kubernetes-ca, etcd-ca, kubernetes-front-proxy-ca)
To address this issue, this PR introduces a variable designed to disable some problematic tasks.
Special notes for your reviewer:
Does this PR introduce a user-facing change?:
3 initial commits in the PR: