WIP - Use encrypted certs on join #1407
Labels
area/HA
area/UX
help wanted
Denotes an issue that needs help from a contributor. Must meet "help wanted" guidelines.
kind/feature
Categorizes issue or PR as related to a new feature.
lifecycle/active
Indicates that an issue or PR is actively being worked on by a contributor.
priority/important-soon
Must be staffed and worked on either currently, or very soon, ideally in time for the next release.
Milestone
This issue defines implementation details for "Upload encrypted certs on init" activity defined in #1373
--certificate-key
; this flag could be used in conjuction with the--config
flag--control-plane
flag is set and the new--certificate-key
is set, it will trigger a newcerts-download
subphase (to be added to thecontrol-plane-prepare
phase as first subphase, before thecerts
subphase)kubeadm-certs
secret, decript the values using the certificate-key and store secrets on the diskSome more details to be considered while implementing:
kubeadm-certs
secret does not exists it should be returned a message explaining the user how to create it (usekubeadm init phase upload-certs
on one control-plane node)kubeadm-certs
secret depends on the cluster variant in use (external etcd vs local etcd)kubeadm-certs
secret can contain empty entries In case of External CA mode; empty entry should not generate corresponding fileThe text was updated successfully, but these errors were encountered: