func newServerKeyAndCert(s *kubeadmapi.KubeadmConfig, caCert *x509.Certificate, caKey *rsa.PrivateKey, altNames certutil.AltNames) (*rsa.PrivateKey, *x509.Certificate, error) { key, err := certutil.NewPrivateKey() if err != nil { return nil, nil, fmt.Errorf("unabel to create private key [%v]", err) } internalAPIServerFQDN := []string{ "kubernetes", "kubernetes.default", "kubernetes.default.svc", fmt.Sprintf("kubernetes.default.svc.%s", s.InitFlags.Services.DNSDomain), } internalAPIServerVirtualIP, err := ipallocator.GetIndexedIP(&s.InitFlags.Services.CIDR, 1) if err != nil { return nil, nil, fmt.Errorf("unable to allocate IP address for the API server from the given CIDR (%q) [%v]", &s.InitFlags.Services.CIDR, err) } altNames.IPs = append(altNames.IPs, internalAPIServerVirtualIP) altNames.DNSNames = append(altNames.DNSNames, internalAPIServerFQDN...) config := certutil.Config{ CommonName: "kube-apiserver", AltNames: altNames, } cert, err := certutil.NewSignedCert(config, key, caCert, caKey) if err != nil { return nil, nil, fmt.Errorf("unable to sign certificate [%v]", err) } return key, cert, nil }
func newServiceAccountKey() (*rsa.PrivateKey, error) { key, err := certutil.NewPrivateKey() if err != nil { return nil, err } return key, nil }
func NewClientKeyAndCert(config *certutil.Config, caCert *x509.Certificate, caKey *rsa.PrivateKey) (*rsa.PrivateKey, *x509.Certificate, error) { key, err := certutil.NewPrivateKey() if err != nil { return nil, nil, fmt.Errorf("unable to create private key [%v]", err) } cert, err := certutil.NewSignedCert(*config, key, caCert, caKey) if err != nil { return nil, nil, fmt.Errorf("unable to sign certificate [%v]", err) } return key, cert, nil }
func newClientKeyAndCert(caCert *x509.Certificate, caKey *rsa.PrivateKey) (*rsa.PrivateKey, *x509.Certificate, error) { key, err := certutil.NewPrivateKey() if err != nil { return nil, nil, fmt.Errorf("unable to create private key [%v]", err) } config := certutil.Config{ CommonName: "kubernetes-admin", } cert, err := certutil.NewSignedCert(config, key, caCert, caKey) if err != nil { return nil, nil, fmt.Errorf("unable to sign certificate [%v]", err) } return key, cert, nil }
func newCertificateAuthority() (*rsa.PrivateKey, *x509.Certificate, error) { key, err := certutil.NewPrivateKey() if err != nil { return nil, nil, fmt.Errorf("unable to create private key [%v]", err) } config := certutil.Config{ CommonName: "kubernetes", } cert, err := certutil.NewSelfSignedCACert(config, key) if err != nil { return nil, nil, fmt.Errorf("unable to create self-signed certificate [%v]", err) } return key, cert, nil }
func newServerKeyAndCert(caCert *x509.Certificate, caKey *rsa.PrivateKey, altNames certutil.AltNames) (*rsa.PrivateKey, *x509.Certificate, error) { key, err := certutil.NewPrivateKey() if err != nil { return nil, nil, fmt.Errorf("unable to create private key [%v]", err) } config := certutil.Config{ CommonName: "kube-apiserver", AltNames: altNames, } cert, err := certutil.NewSignedCert(config, key, caCert, caKey) if err != nil { return nil, nil, fmt.Errorf("unable to sign certificate [%v]", err) } return key, cert, nil }
func NewClientKeyPair(ca *KeyPair, commonName string) (*KeyPair, error) { key, err := certutil.NewPrivateKey() if err != nil { return nil, fmt.Errorf("unable to create a client private key: %v", err) } config := certutil.Config{ CommonName: commonName, } cert, err := certutil.NewSignedCert(config, key, ca.Cert, ca.Key) if err != nil { return nil, fmt.Errorf("unable to sign the client certificate: %v", err) } return &KeyPair{ Key: key, Cert: cert, }, nil }
func NewCA(name string) (*KeyPair, error) { key, err := certutil.NewPrivateKey() if err != nil { return nil, fmt.Errorf("unable to create a private key for a new CA: %v", err) } config := certutil.Config{ CommonName: name, } cert, err := certutil.NewSelfSignedCACert(config, key) if err != nil { return nil, fmt.Errorf("unable to create a self-signed certificate for a new CA: %v", err) } return &KeyPair{ Key: key, Cert: cert, }, nil }
func NewServerKeyPair(ca *KeyPair, commonName, svcName, svcNamespace, dnsDomain string, ips, hostnames []string) (*KeyPair, error) { key, err := certutil.NewPrivateKey() if err != nil { return nil, fmt.Errorf("unable to create a server private key: %v", err) } namespacedName := fmt.Sprintf("%s.%s", svcName, svcNamespace) internalAPIServerFQDN := []string{ svcName, namespacedName, fmt.Sprintf("%s.svc", namespacedName), fmt.Sprintf("%s.svc.%s", namespacedName, dnsDomain), } altNames := certutil.AltNames{} for _, ipStr := range ips { ip := net.ParseIP(ipStr) if ip != nil { altNames.IPs = append(altNames.IPs, ip) } } altNames.DNSNames = append(altNames.DNSNames, hostnames...) altNames.DNSNames = append(altNames.DNSNames, internalAPIServerFQDN...) config := certutil.Config{ CommonName: commonName, AltNames: altNames, } cert, err := certutil.NewSignedCert(config, key, ca.Cert, ca.Key) if err != nil { return nil, fmt.Errorf("unable to sign the server certificate: %v", err) } return &KeyPair{ Key: key, Cert: cert, }, nil }
func newServerKeyAndCert(cfg *kubeadmapi.MasterConfiguration, caCert *x509.Certificate, caKey *rsa.PrivateKey, altNames certutil.AltNames) (*rsa.PrivateKey, *x509.Certificate, error) { key, err := certutil.NewPrivateKey() if err != nil { return nil, nil, fmt.Errorf("unabel to create private key [%v]", err) } internalAPIServerFQDN := []string{ "kubernetes", "kubernetes.default", "kubernetes.default.svc", fmt.Sprintf("kubernetes.default.svc.%s", cfg.Networking.DNSDomain), } _, n, err := net.ParseCIDR(cfg.Networking.ServiceSubnet) if err != nil { return nil, nil, fmt.Errorf("error parsing CIDR %q: %v", cfg.Networking.ServiceSubnet, err) } internalAPIServerVirtualIP, err := ipallocator.GetIndexedIP(n, 1) if err != nil { return nil, nil, fmt.Errorf("unable to allocate IP address for the API server from the given CIDR (%q) [%v]", &cfg.Networking.ServiceSubnet, err) } altNames.IPs = append(altNames.IPs, internalAPIServerVirtualIP) altNames.DNSNames = append(altNames.DNSNames, internalAPIServerFQDN...) config := certutil.Config{ CommonName: "kube-apiserver", AltNames: altNames, } cert, err := certutil.NewSignedCert(config, key, caCert, caKey) if err != nil { return nil, nil, fmt.Errorf("unable to sign certificate [%v]", err) } return key, cert, nil }
// CreatePKIAssets will create and write to disk all PKI assets necessary to establish the control plane. // It first generates a self-signed CA certificate, a server certificate (signed by the CA) and a key for // signing service account tokens. It returns CA key and certificate, which is convenient for use with // client config funcs. func CreatePKIAssets(cfg *kubeadmapi.MasterConfiguration, pkiPath string) (*x509.Certificate, error) { altNames := certutil.AltNames{} // First, define all domains this cert should be signed for internalAPIServerFQDN := []string{ "kubernetes", "kubernetes.default", "kubernetes.default.svc", fmt.Sprintf("kubernetes.default.svc.%s", cfg.Networking.DNSDomain), } hostname, err := os.Hostname() if err != nil { return nil, fmt.Errorf("couldn't get the hostname: %v", err) } altNames.DNSNames = append(cfg.API.ExternalDNSNames, hostname) altNames.DNSNames = append(altNames.DNSNames, internalAPIServerFQDN...) // then, add all IP addresses we're bound to for _, a := range cfg.API.AdvertiseAddresses { if ip := net.ParseIP(a); ip != nil { altNames.IPs = append(altNames.IPs, ip) } else { return nil, fmt.Errorf("could not parse ip %q", a) } } // and lastly, extract the internal IP address for the API server _, n, err := net.ParseCIDR(cfg.Networking.ServiceSubnet) if err != nil { return nil, fmt.Errorf("error parsing CIDR %q: %v", cfg.Networking.ServiceSubnet, err) } internalAPIServerVirtualIP, err := ipallocator.GetIndexedIP(n, 1) if err != nil { return nil, fmt.Errorf("unable to allocate IP address for the API server from the given CIDR (%q) [%v]", &cfg.Networking.ServiceSubnet, err) } altNames.IPs = append(altNames.IPs, internalAPIServerVirtualIP) caKey, caCert, err := newCertificateAuthority() if err != nil { return nil, fmt.Errorf("failure while creating CA keys and certificate [%v]", err) } if err := writeKeysAndCert(pkiPath, "ca", caKey, caCert); err != nil { return nil, fmt.Errorf("failure while saving CA keys and certificate [%v]", err) } fmt.Println("[certificates] Generated Certificate Authority key and certificate.") apiKey, apiCert, err := newServerKeyAndCert(caCert, caKey, altNames) if err != nil { return nil, fmt.Errorf("failure while creating API server keys and certificate [%v]", err) } if err := writeKeysAndCert(pkiPath, "apiserver", apiKey, apiCert); err != nil { return nil, fmt.Errorf("failure while saving API server keys and certificate [%v]", err) } fmt.Println("[certificates] Generated API Server key and certificate") // Generate a private key for service accounts saKey, err := certutil.NewPrivateKey() if err != nil { return nil, fmt.Errorf("failure while creating service account signing keys [%v]", err) } if err := writeKeysAndCert(pkiPath, "sa", saKey, nil); err != nil { return nil, fmt.Errorf("failure while saving service account signing keys [%v]", err) } fmt.Println("[certificates] Generated Service Account signing keys") fmt.Printf("[certificates] Created keys and certificates in %q\n", pkiPath) return caCert, nil }