Commit Graph

9 Commits

Author SHA1 Message Date
Michael Faille
ce7d5fe6e7 fix : openssl don't exist by default on CentOS docker image
To fix it, I just add openssl depedency on "generate-cert" state. It
should work on Debian-like and RedHat-Like systems. (and, Archlinux,
Opensuse, etc)

Fixed error :
$ sudo salt 'kubernetes-master' state.apply
----------
          ID: kubernetes-cert
    Function: cmd.script
      Result: False
     Comment: Command 'kubernetes-cert' run
     Started: 06:57:06.634203
    Duration: 208.719 ms
     Changes:
              ----------
              pid:
                  793
              retcode:
                  1
              stderr:
                  /tmpm24T3R.sh: line 22: openssl: command not found
                  chgrp: cannot access '/srv/kubernetes/server.key': No such file or directory
                  chgrp: cannot access '/srv/kubernetes/server.cert': No such file or directory
                  chmod: cannot access '/srv/kubernetes/server.key': No such file or directory
                  chmod: cannot access '/srv/kubernetes/server.cert': No such file or directory
              stdout:

After applying my patch (success) :
----------
          ID: kubernetes-cert
    Function: cmd.script
      Result: True
     Comment: Command 'kubernetes-cert' run
     Started: 07:17:04.172384
    Duration: 1041.092 ms
     Changes:
              ----------
              pid:
                  1045
              retcode:
                  0
              stderr:
                  Generating a 4096 bit RSA private key
                  ......................................................................++
                  ...............................................................................++
                  writing new private key to '/srv/kubernetes/server.key'
                  -----
              stdout:
----------
2016-01-24 02:18:11 -05:00
Mike Danese
8e8437dad8 declare azure/ubuntu/saltstack bankruptcy 2015-10-16 18:21:21 -07:00
Fred Jean
1305f54645 Booting a Kubernetes cluster on Vagrant
* Using Fedora 21 as the base box
* Discover the active network interfaces in the box to avoid hardcoding
  them in configuration.
* Use the master IP for the certificate.
2015-08-27 21:43:36 -06:00
Justin Santa Barbara
c676c11189 AWS: Configure SSL certificate alternate-names
GCE does this in its per-provider scripts; this does the same for AWS and lets
other providers do the same; I believe kube2sky requires 10.0.0.1 as a SAN.
2015-07-03 01:18:07 -04:00
Robert Bailey
6c42cb154b Stop copying certs into /usr/share/nginx/ since nothing relies
on that location any longer.
2015-05-11 11:44:19 -07:00
Brendan Burns
b07515c5ea Add some backward compatability for GKE. 2014-12-02 11:32:45 -08:00
Jeff Mendoza
9934a0ace4 Update cert generation for Azure. 2014-11-18 14:10:50 -08:00
Joe Beda
5a0159ea00 Get Vagrant to start using TLS client certs.
Also fix up cert generation. It was failing during the first salt highstate when trying to chown the certs as the apiserver user didn't exist yet.  Fix this by creating a 'kube-cert' group and chgrping the files to that.  Then make the apiserver a member of that group.

Fixes #2365
Fixes #2368
2014-11-13 22:16:45 -08:00
Joe Beda
ee2f030623 Give the API server access to TLS certs.
Moved the cert generation to a separate salt state and put it in a more appropriate sharable location (`/srv/kubernetes/`).
2014-11-12 18:14:24 -08:00