-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Ability to set SANs to the API server certificate #3756
Conversation
The committers listed above are authorized under a signed CLA. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: maksym-iv The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Welcome @maksym-iv! |
Hi @maksym-iv. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Hi, our process is to discuss the approach to features first and agree to the feature and an approach before reviewing code that we will have to maintain. This is covered in our contributor guide: https://kind.sigs.k8s.io/docs/contributing/getting-started/ |
Sure, my bad. I've created the issue before PR and opened a PR just to demonstrate the potential approach, can close the PR.
|
So, you can already do this with kubeadm patches https://kind.sigs.k8s.io/docs/user/configuration/#kubeadm-config-patches
this is just exposing this through the kind API, but for the end user is just 1 line of yaml vs 8 lines of yaml, and will conflict with existing solution of using patches |
Sure, makes sense, closing than. Thanks for clarification |
Thank you! |
In some cases, if
apiServerAddress
is modified (which is highly not recommended for sure, and should be done if implications are clear) it may be needed to se custom SANs. Example use-case:apiServerAddress
is set to the internal EC2 IPUnable to connect to the server: tls: failed to verify certificate: x509: certificate is valid for 10.96.0.1, 172.18.0.2, 0.0.0.0, not 18.118.189.168
Fixes #3755