1399731096
This increases isolation of actions against the node API. With the previous combined CA approach, each node would have a valid key to talk to each other node. With this separated approach, only the API servers will have keys with access to the node APIs. Change-Id: I2705016eb963ca9d2cc2a344047677f4b2cc3025
34 lines
1.3 KiB
YAML
34 lines
1.3 KiB
YAML
{{/*
|
|
Copyright 2017 AT&T Intellectual Property. All other rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/}}
|
|
|
|
{{- if .Values.manifests.configmap_certs }}
|
|
{{- $envAll := . }}
|
|
|
|
---
|
|
apiVersion: v1
|
|
kind: ConfigMap
|
|
metadata:
|
|
name: {{ .Values.service.name }}-certs
|
|
data:
|
|
cluster-ca.pem: {{ .Values.secrets.tls.ca | quote }}
|
|
apiserver.pem: {{ .Values.secrets.tls.cert | quote }}
|
|
etcd-client-ca.pem: {{ .Values.secrets.etcd.tls.ca | quote }}
|
|
etcd-client.pem: {{ .Values.secrets.etcd.tls.cert | quote }}
|
|
service-account.pub: {{ .Values.secrets.service_account.public_key | quote }}
|
|
kubelet-client-ca.pem: {{ .Values.secrets.kubelet.tls.ca | default .Values.secrets.tls.ca | quote }}
|
|
kubelet-client.pem: {{ .Values.secrets.kubelet.tls.cert | default .Values.secrets.tls.cert | quote }}
|
|
{{- end }}
|