mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	Enable default signer implementation
The Kubernetes controller manager provides a default implementation of a signer. We should enable it by passing the --cluster-signing-cert-file and --cluster-signing-key-file parameters to the controller manager with paths to your Certificate Authority’s keypair. Hoping this will help pass the "Certificates API [It] should support building a client with a CSR" e2e test when run against k8s started using local-up-cluster.sh
This commit is contained in:
		@@ -212,6 +212,7 @@ ENABLE_CONTROLLER_ATTACH_DETACH=${ENABLE_CONTROLLER_ATTACH_DETACH:-"true"} # cur
 | 
			
		||||
# which should be able to be used as the CA to verify itself
 | 
			
		||||
CERT_DIR=${CERT_DIR:-"/var/run/kubernetes"}
 | 
			
		||||
ROOT_CA_FILE=${CERT_DIR}/server-ca.crt
 | 
			
		||||
ROOT_CA_KEY=${CERT_DIR}/server-ca.key
 | 
			
		||||
 | 
			
		||||
# name of the cgroup driver, i.e. cgroupfs or systemd
 | 
			
		||||
if [[ ${CONTAINER_RUNTIME} == "docker" ]]; then
 | 
			
		||||
@@ -544,6 +545,8 @@ function start_controller_manager {
 | 
			
		||||
      --v=${LOG_LEVEL} \
 | 
			
		||||
      --service-account-private-key-file="${SERVICE_ACCOUNT_KEY}" \
 | 
			
		||||
      --root-ca-file="${ROOT_CA_FILE}" \
 | 
			
		||||
      --cluster-signing-cert-file="${ROOT_CA_FILE}" \
 | 
			
		||||
      --cluster-signing-key-file="${ROOT_CA_KEY}" \
 | 
			
		||||
      --enable-hostpath-provisioner="${ENABLE_HOSTPATH_PROVISIONER}" \
 | 
			
		||||
      ${node_cidr_args} \
 | 
			
		||||
      --pvclaimbinder-sync-period="${CLAIM_BINDER_SYNC_PERIOD}" \
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user