-
Notifications
You must be signed in to change notification settings - Fork 41.1k
Plumb dynamic SNI certificates #83627
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Hi @jackkleeman. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/assign @deads2k |
66ef1e0
to
4c2d97f
Compare
4c2d97f
to
01d0296
Compare
01d0296
to
c88f225
Compare
c88f225
to
ab95e3b
Compare
explicitNames []string // as --tls-sni-cert-key explicit names | ||
} | ||
|
||
func TestBuiltNamedCertificates(t *testing.T) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Simply moved from staging/src/k8s.io/apiserver/pkg/server/options/serving_test.go
and updated to build cert providers
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates.go
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates.go
Show resolved
Hide resolved
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/static_content.go
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/tlsconfig.go
Outdated
Show resolved
Hide resolved
/ok-to-test |
ab95e3b
to
78873d1
Compare
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates.go
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/static_content.go
Outdated
Show resolved
Hide resolved
We create and use a dynamic certificate provider for the SNI serving certificates. Currently we only use static serving certificate providers, so the files are not reloaded, but we should be able to move to a provider that is able to reload later on.
78873d1
to
84bc6b1
Compare
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: deads2k, jackkleeman The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest |
3 similar comments
/retest |
/retest |
/retest |
/retest |
1 similar comment
/retest |
/retest Review the full test history for this PR. Silence the bot with an |
What type of PR is this?
/kind feature
What this PR does / why we need it:
This PR is initial plumbing towards allowing apiserver SNI serving certificates to be reloaded from disk. We change the SNI map in the
SecureServingInfo
to be a list ofDynamicSNICertKeyContentProvider
, which can return explicit SNI names, and currently is implemented by a static provider that doesn't re-read off of disk, but this can change in a subsequent PR which will add a dynamic provider.Does this PR introduce a user-facing change?: