mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-31 18:28:13 +00:00 
			
		
		
		
	allow the kubelet to request certificates
This allows the rotation process to use the kubelet's credentials.
This commit is contained in:
		| @@ -217,6 +217,9 @@ func ClusterRoles() []rbac.ClusterRole { | ||||
| 				// TODO: change glusterfs to use DNS lookup so this isn't needed? | ||||
| 				// Needed for glusterfs volumes | ||||
| 				rbac.NewRule("get").Groups(legacyGroup).Resources("endpoints").RuleOrDie(), | ||||
| 				// Used to create a certificatesigningrequest for a node-specific client certificate, and watch | ||||
| 				// for it to be signed. This allows the kubelet to rotate it's own certificate. | ||||
| 				rbac.NewRule("create", "get", "list", "watch").Groups(certificatesGroup).Resources("certificatesigningrequests").RuleOrDie(), | ||||
| 			}, | ||||
| 		}, | ||||
| 		{ | ||||
|   | ||||
| @@ -569,6 +569,15 @@ items: | ||||
|     - endpoints | ||||
|     verbs: | ||||
|     - get | ||||
|   - apiGroups: | ||||
|     - certificates.k8s.io | ||||
|     resources: | ||||
|     - certificatesigningrequests | ||||
|     verbs: | ||||
|     - create | ||||
|     - get | ||||
|     - list | ||||
|     - watch | ||||
| - apiVersion: rbac.authorization.k8s.io/v1beta1 | ||||
|   kind: ClusterRole | ||||
|   metadata: | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Mike Danese
					Mike Danese