Skip to content
This repository has been archived by the owner on Jul 30, 2021. It is now read-only.

Allow talking to secure etcd (authentication through client certs) #245

Closed
wants to merge 8 commits into from

Conversation

dhawal55
Copy link
Contributor

Fixes issue #244
We will need more work to support secure etcd for self-hosted etcd

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Dec 21, 2016
@peebs
Copy link

peebs commented Dec 21, 2016

ok to test

@dhawal55
Copy link
Contributor Author

dhawal55 commented Dec 29, 2016

Can someone look at my pull requests? Really simple ones

@aaronlevy
Copy link
Contributor

Hi @dhawal55, sorry for the delay.

We are planning on migrating to self-hosted etcd cluster as the default very soon (#31) -- so the way each etcd node is launched (and where it sources TLS assets) will change almost completely. This is definitely something we need, but if we try to implement this functionality now, it will pretty much have to be thrown out / re-done differently very soon.

@dhawal55
Copy link
Contributor Author

dhawal55 commented Jan 3, 2017

@aaronlevy The experimental-self-hosted-etcd currently doesn't support TLS, nor does the etcd-operator. I'm okay closing this PR if issue #31 includes TLS support for etcd.

@aaronlevy
Copy link
Contributor

#31 doesn't explicitly cover handling TLS support (and the initial implementation likely won't). I think we should keep #244 open to track this need.

@ghost
Copy link

ghost commented Apr 10, 2017

Can one of the admins verify this patch?

1 similar comment
@ghost
Copy link

ghost commented Apr 10, 2017

Can one of the admins verify this patch?

@aaronlevy
Copy link
Contributor

This has been added in #433

@aaronlevy aaronlevy closed this Apr 18, 2017
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants