-
Notifications
You must be signed in to change notification settings - Fork 294
Allow option to disable certificates management #243
Allow option to disable certificates management #243
Conversation
d8db46b
to
217e95c
Compare
Current coverage is 68.54% (diff: 75.00%)@@ master #243 diff @@
==========================================
Files 4 4
Lines 1100 1103 +3
Methods 0 0
Messages 0 0
Branches 0 0
==========================================
+ Hits 753 756 +3
Misses 261 261
Partials 86 86
|
@@ -46,6 +46,11 @@ availabilityZone: {{.AvailabilityZone}} | |||
# ARN of the KMS key used to encrypt TLS assets. | |||
kmsKeyArn: "{{.KMSKeyARN}}" | |||
|
|||
# If you do not want kube-aws to manage certificaes, set it to false. If you do that | |||
# you are responsible for making sure that nodes have correct certificates by the time | |||
# daemons start up. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
An example (or a link to a doc explaining it) of how to feed certificates to nodes before daemons start up would be helpful. I'm not really sure how myself and so are others!
Also, a brief explanation of when this feature is intended to be used (a.k.a why "you do not want kube-aws to manage certificates" in the first place) would be good to add, too.
return nil, err | ||
} | ||
stackConfig.Config.TLSConfig = compactAssets | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you add a test for this?
I believe TestReadOrCreateCompactTLSAssets
would be an useful reference.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Would you like to me add the tests instead?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please adopt / modify any of my PRs if it can speedup merging them to master
@redbaron Thanks as always! I'm impressed to the amount of contribution you're doing these days 👍 |
* coreos/master: (132 commits) fix: Spot Fleet doesn't support the t2 instance family Fix node pools on master Allow option to disable certificates management (kubernetes-retired#243) Bump to k8s 1.5.2 Update README.md Update ROADMAP.md Update ROADMAP.md Update ROADMAP.md Update the inline documentation in cluster.yaml typo Don't fail sed if some files are missing Workaround systemd issues with oneshot autorestarts etcd static IP addressing overhaul Calico self hosted integration (kubernetes-retired#124) Fix lint. bugfix for a typo in install-kube-system scripts Update README.md fix(e2e): Correctly wait for a node pool stack for deletion Don't require key-name param during cluster init Propagate SSHAuthorizedKeys to nodepools ...
* coreos/master: (49 commits) fix: Spot Fleet doesn't support the t2 instance family Fix node pools on master Allow option to disable certificates management (kubernetes-retired#243) Bump to k8s 1.5.2 Update README.md Update ROADMAP.md Update ROADMAP.md Update ROADMAP.md Update the inline documentation in cluster.yaml typo Don't fail sed if some files are missing Workaround systemd issues with oneshot autorestarts etcd static IP addressing overhaul Calico self hosted integration (kubernetes-retired#124) Fix lint. bugfix for a typo in install-kube-system scripts Update README.md fix(e2e): Correctly wait for a node pool stack for deletion Don't require key-name param during cluster init Propagate SSHAuthorizedKeys to nodepools ...
* Allow option to disable certificates management * Don't create KMS policies if we don't use them
No description provided.