mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	kubeadm: flag token discovery pieces to be refactored.
This commit is contained in:
		@@ -22,6 +22,7 @@ import (
 | 
			
		||||
	"net/http"
 | 
			
		||||
 | 
			
		||||
	kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
 | 
			
		||||
 | 
			
		||||
	"k8s.io/kubernetes/pkg/client/unversioned/clientcmd"
 | 
			
		||||
	clientcmdapi "k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api"
 | 
			
		||||
)
 | 
			
		||||
@@ -33,6 +34,9 @@ func For(d kubeadmapi.Discovery) (*clientcmdapi.Config, error) {
 | 
			
		||||
		return runFileDiscovery(d.File)
 | 
			
		||||
	case d.HTTPS != nil:
 | 
			
		||||
		return runHTTPSDiscovery(d.HTTPS)
 | 
			
		||||
	case d.Token != nil:
 | 
			
		||||
		// TODO move token discovery here
 | 
			
		||||
		return runTokenDiscovery(d.Token)
 | 
			
		||||
	default:
 | 
			
		||||
		return nil, fmt.Errorf("Couldn't find a valid discovery configuration. Please provide one.")
 | 
			
		||||
	}
 | 
			
		||||
@@ -58,4 +62,9 @@ func runHTTPSDiscovery(hd *kubeadmapi.HTTPSDiscovery) (*clientcmdapi.Config, err
 | 
			
		||||
 | 
			
		||||
	return clientcmd.Load(kubeconfig)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// TODO implement
 | 
			
		||||
// runTokenDiscovery executes token-based discovery.
 | 
			
		||||
func runTokenDiscovery(td *kubeadmapi.TokenDiscovery) (*clientcmdapi.Config, error) {
 | 
			
		||||
	return nil, fmt.Errorf("Couldn't find a valid discovery configuration. Please provide one.")
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -29,12 +29,13 @@ import (
 | 
			
		||||
	certutil "k8s.io/kubernetes/pkg/util/cert"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// TODO @mikedanese move this to PerformTLSBootstrap
 | 
			
		||||
func PerformTLSBootstrapDeprecated(connection *ConnectionDetails) (*clientcmdapi.Config, error) {
 | 
			
		||||
	fmt.Println("[csr] Created API client to obtain unique certificate for this node, generating keys and certificate signing request")
 | 
			
		||||
 | 
			
		||||
	key, err := certutil.MakeEllipticPrivateKeyPEM()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, fmt.Errorf("failed to generating private key [%v]", err)
 | 
			
		||||
		return nil, fmt.Errorf("failed to generate private key [%v]", err)
 | 
			
		||||
	}
 | 
			
		||||
	cert, err := csr.RequestNodeCertificate(connection.CertClient.CertificateSigningRequests(), key, connection.NodeName)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
@@ -80,7 +81,7 @@ func PerformTLSBootstrap(cfg *clientcmdapi.Config) error {
 | 
			
		||||
 | 
			
		||||
	key, err := certutil.MakeEllipticPrivateKeyPEM()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return fmt.Errorf("failed to generating private key [%v]", err)
 | 
			
		||||
		return fmt.Errorf("failed to generate private key [%v]", err)
 | 
			
		||||
	}
 | 
			
		||||
	cert, err := csr.RequestNodeCertificate(c.Certificates().CertificateSigningRequests(), key, name)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user