2014-09-19 23:55:00 +00:00
|
|
|
#!/bin/bash
|
|
|
|
|
|
|
|
# Copyright 2014 Google Inc. All rights reserved.
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
set -o errexit
|
|
|
|
set -o nounset
|
|
|
|
set -o pipefail
|
|
|
|
|
|
|
|
cert_ip=$1
|
2014-11-13 02:14:24 +00:00
|
|
|
cert_dir=/srv/kubernetes
|
2014-11-13 21:02:48 +00:00
|
|
|
cert_file_owner=apiserver.apiserver
|
2014-11-13 02:14:24 +00:00
|
|
|
|
|
|
|
mkdir -p "$cert_dir"
|
2014-09-19 23:55:00 +00:00
|
|
|
|
|
|
|
# TODO: Add support for discovery on other providers?
|
|
|
|
if [ "$cert_ip" == "_use_gce_external_ip_" ]; then
|
|
|
|
cert_ip=$(curl -s -H Metadata-Flavor:Google http://metadata.google.internal./computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip)
|
2014-11-06 22:27:15 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
if [ "$cert_ip" == "_use_aws_external_ip_" ]; then
|
|
|
|
cert_ip=$(curl -s http://169.254.169.254/latest/meta-data/public-ipv4)
|
|
|
|
fi
|
2014-09-19 23:55:00 +00:00
|
|
|
|
|
|
|
tmpdir=$(mktemp -d --tmpdir kubernetes_cacert.XXXXXX)
|
|
|
|
trap 'rm -rf "${tmpdir}"' EXIT
|
|
|
|
cd "${tmpdir}"
|
|
|
|
|
2014-11-13 02:14:24 +00:00
|
|
|
# TODO: For now, this is a patched tool that makes subject-alt-name work, when
|
|
|
|
# the fix is upstream move back to the upstream easyrsa. This is cached in GCS
|
|
|
|
# but is originally taken from:
|
|
|
|
# https://github.com/brendandburns/easy-rsa/archive/master.tar.gz
|
|
|
|
#
|
|
|
|
# To update, do the following:
|
|
|
|
# curl -o easy-rsa.tar.gz https://github.com/brendandburns/easy-rsa/archive/master.tar.gz
|
|
|
|
# gsutil cp easy-rsa.tar.gz gs://kubernetes-release/easy-rsa/easy-rsa.tar.gz
|
|
|
|
# gsutil acl ch -R -g all:R gs://kubernetes-release/easy-rsa/easy-rsa.tar.gz
|
|
|
|
#
|
|
|
|
# Due to GCS caching of public objects, it may take time for this to be widely
|
|
|
|
# distributed.
|
|
|
|
curl -L -O https://storage.googleapis.com/kubernetes-release/easy-rsa/easy-rsa.tar.gz > /dev/null 2>&1
|
|
|
|
tar xzf easy-rsa.tar.gz > /dev/null 2>&1
|
2014-09-19 23:55:00 +00:00
|
|
|
|
|
|
|
cd easy-rsa-master/easyrsa3
|
|
|
|
./easyrsa init-pki > /dev/null 2>&1
|
|
|
|
./easyrsa --batch build-ca nopass > /dev/null 2>&1
|
|
|
|
./easyrsa --subject-alt-name=IP:$cert_ip build-server-full kubernetes-master nopass > /dev/null 2>&1
|
|
|
|
./easyrsa build-client-full kubecfg nopass > /dev/null 2>&1
|
2014-11-13 02:14:24 +00:00
|
|
|
cp -p pki/issued/kubernetes-master.crt "${cert_dir}/server.cert" > /dev/null 2>&1
|
|
|
|
cp -p pki/private/kubernetes-master.key "${cert_dir}/server.key" > /dev/null 2>&1
|
|
|
|
cp -p pki/ca.crt "${cert_dir}/ca.crt"
|
|
|
|
cp -p pki/issued/kubecfg.crt "${cert_dir}/kubecfg.crt"
|
|
|
|
cp -p pki/private/kubecfg.key "${cert_dir}/kubecfg.key"
|
2014-11-13 21:02:48 +00:00
|
|
|
# Make server certs accessible to apiserver.
|
|
|
|
chown $cert_file_owner "${cert_dir}/server.key" "${cert_dir}/server.cert" "${cert_dir}/ca.cert"
|