-
Notifications
You must be signed in to change notification settings - Fork 373
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create controller CA ConfigMap in the controller deployement Namespace #878
Conversation
Thanks for your PR. The following commands are available:
These commands can only be run by members of the vmware-tanzu organization. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Suggestion for commit message:
s/No more use the fixed "kube-system" Namespace for the CA ConfigMap./Stop using the fixed "kube-system" Namespace for the CA ConfigMap./
7f79d96
to
2ba4d41
Compare
ConfigMap named `antrea-ca` in the `kube-system` Namespace and inject it into | ||
the APIServices resources created by Antrea in order to allow its clients (i.e. | ||
antrea-agent, kube-apiserver) to perform authentication. | ||
ConfigMap named `antrea-ca` in the Antrea deployment Namespace and inject it |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
deployment -> Deployment?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Antonin suggested to cover both controller and agent, so I used Antrea deployment to refer to the whole deployment of Antrea components.
2552ac8
to
4c3df0e
Compare
// ca.crt: <CA certificate> | ||
// tls.crt: <TLS certificate> | ||
// tls.key: <TLS private key> | ||
// Defaults to true. | ||
// And the Secret must be mounted to directory "/var/run/antrea/antrea-controller-tls" of the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Insert it before Defaults to true.
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good catch. Fixed.
# ca.crt: <CA certificate> | ||
# tls.crt: <TLS certificate> | ||
# tls.key: <TLS private key> | ||
#selfSignedCert: true | ||
# And the Secret must be mounted to directory "/var/run/antrea/antrea-controller-tls" of the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Insert it before selfSignedCert: true
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed.
Stop using the fixed "kube-system" Namespace for the CA ConfigMap. Also update the deployment YAML and docs/securing-control-plane.md about the descriptions about CA ConfigMap and TLS Secret Namespace. Fixes: antrea-io#876
Not sure if secret is the only one bound with kube-system namespace. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
/test-all |
antrea-io#878) Stop using the fixed "kube-system" Namespace for the CA ConfigMap. Also update the deployment YAML and docs/securing-control-plane.md about the descriptions about CA ConfigMap and TLS Secret Namespace. Fixes: antrea-io#876
Stop using the fixed "kube-system" Namespace for the CA ConfigMap.
Also update the deployment YAML and docs/securing-control-plane.md
about the descriptions about CA ConfigMap and TLS Secret Namespace.
Fixes: #876