deploy ssl certificates and service-account key in DCOS packages
compare docker-compose setup
xref #535, #555, #587
This is a blocker for MVP issues linked above. Moving to MVP.
we already run kube-dns without this on k8s/dcos.
On Mon, Nov 2, 2015 at 4:53 PM, Karl Isenberg [email protected] wrote:
This is a blocker for kube-dns, I believe, as well as other MVP issues linked above. Moving to MVP.
— Reply to this email directly or view it on GitHub https://github.com/mesosphere/kubernetes-mesos/issues/409#issuecomment-153168959 .
some options:
- parameterize certs in options.json (#729, https://github.com/mesosphere/multiverse/pull/62)
- auto-generate certs using mesosphere/kubernetes-keygen container
- possibly subclass this container for convenience w/ k8s/dcos integration
- currently has hard-coded stuff, not prod ready
keygen container sub-commands do this:
- root CA doesn't need an IP
- apiserver cert needs root CA --> generates private key, public (signed) cert
- service account private key (RSA)
IMPORTANT: dcos kubectl ... subcommand needs to work with new secure configuration
TODO: clarify the work that actually needs doing here
The subcommand works with TLS. What is missing is a way to tell it about a custom certificate.
@sttts the subcommand should only need the root-ca cert, yes? that's easy to send down..
In fact, the cert in the subcommand has nothing to do with the kubernetes certs. The apiserver is behind the admin router and that brings its own (snakeoil-) cert.
2016-01-20 23:18 GMT+01:00 James DeFelice [email protected]:
@sttts https://github.com/sttts the subcommand should only need the root-ca cert, yes? that's easy to send down..
— Reply to this email directly or view it on GitHub https://github.com/mesosphere/kubernetes-mesos/issues/409#issuecomment-173379872 .
OK, so then we'd need the rootCA of the cert that the admin router is using then. I wonder if dcos-CLI gives us access to that?
On Wed, Jan 20, 2016 at 5:21 PM, Dr. Stefan Schimanski < [email protected]> wrote:
In fact, the cert in the subcommand has nothing to do with the kubernetes certs. The apiserver is behind the admin router and that brings its own (snakeoil-) cert.
2016-01-20 23:18 GMT+01:00 James DeFelice [email protected]:
@sttts https://github.com/sttts the subcommand should only need the root-ca cert, yes? that's easy to send down..
— Reply to this email directly or view it on GitHub < https://github.com/mesosphere/kubernetes-mesos/issues/409#issuecomment-173379872
.
— Reply to this email directly or view it on GitHub https://github.com/mesosphere/kubernetes-mesos/issues/409#issuecomment-173380703 .
Look at my code to check certificates in the subcommand. It just reads the settings in the dcos.toml and applies them to kube/config.
Am Donnerstag, 21. Januar 2016 schrieb James DeFelice :
OK, so then we'd need the rootCA of the cert that the admin router is using then. I wonder if dcos-CLI gives us access to that?
On Wed, Jan 20, 2016 at 5:21 PM, Dr. Stefan Schimanski < [email protected] javascript:_e(%7B%7D,'cvml','[email protected]');> wrote:
In fact, the cert in the subcommand has nothing to do with the kubernetes certs. The apiserver is behind the admin router and that brings its own (snakeoil-) cert.
2016-01-20 23:18 GMT+01:00 James DeFelice <[email protected] javascript:_e(%7B%7D,'cvml','[email protected]');>:
@sttts https://github.com/sttts the subcommand should only need the root-ca cert, yes? that's easy to send down..
— Reply to this email directly or view it on GitHub <
https://github.com/mesosphere/kubernetes-mesos/issues/409#issuecomment-173379872
.
— Reply to this email directly or view it on GitHub < https://github.com/mesosphere/kubernetes-mesos/issues/409#issuecomment-173380703
.
— Reply to this email directly or view it on GitHub https://github.com/mesosphere/kubernetes-mesos/issues/409#issuecomment-173610002 .
got it - thanks!
On Thu, Jan 21, 2016 at 10:45 AM, Dr. Stefan Schimanski < [email protected]> wrote:
Look at my code to check certificates in the subcommand. It just reads the settings in the dcos.toml and applies them to kube/config.
Am Donnerstag, 21. Januar 2016 schrieb James DeFelice :
OK, so then we'd need the rootCA of the cert that the admin router is using then. I wonder if dcos-CLI gives us access to that?
On Wed, Jan 20, 2016 at 5:21 PM, Dr. Stefan Schimanski < [email protected] javascript:_e(%7B%7D,'cvml','[email protected]');> wrote:
In fact, the cert in the subcommand has nothing to do with the kubernetes certs. The apiserver is behind the admin router and that brings its own (snakeoil-) cert.
2016-01-20 23:18 GMT+01:00 James DeFelice <[email protected] javascript:_e(%7B%7D,'cvml','[email protected]');>:
@sttts https://github.com/sttts the subcommand should only need the root-ca cert, yes? that's easy to send down..
— Reply to this email directly or view it on GitHub <
https://github.com/mesosphere/kubernetes-mesos/issues/409#issuecomment-173379872
.
— Reply to this email directly or view it on GitHub <
https://github.com/mesosphere/kubernetes-mesos/issues/409#issuecomment-173380703
.
— Reply to this email directly or view it on GitHub < https://github.com/mesosphere/kubernetes-mesos/issues/409#issuecomment-173610002
.
— Reply to this email directly or view it on GitHub https://github.com/mesosphere/kubernetes-mesos/issues/409#issuecomment-173611766 .