Versions in this module Expand all Collapse all v0 v0.3.0 Jan 19, 2021 Changes in this version + const APICallRetryInterval + const APIServerCertAndKeyBaseName + const APIServerCertCommonName + const APIServerCertName + const APIServerEtcdClientCertAndKeyBaseName + const APIServerEtcdClientCertCommonName + const APIServerEtcdClientCertName + const APIServerEtcdClientKeyName + const APIServerKeyName + const APIServerKubeletClientCertAndKeyBaseName + const APIServerKubeletClientCertCommonName + const APIServerKubeletClientCertName + const APIServerKubeletClientKeyName + const AdminKubeConfigFileName + const AnnotationKubeadmCRISocket + const AuditPolicyDir + const AuditPolicyFile + const CACertAndKeyBaseName + const CACertName + const CAKeyName + const CertificateBlockType + const CertificateKeySize + const CertificateValidity + const ClusterConfigurationConfigMapKey + const ClusterConfigurationKind + const ClusterStatusConfigMapKey + const ControlPlaneNumCPU + const ControlPlaneTier + const ControllerManagerKubeConfigFileName + const ControllerManagerUser + const CoreDNSConfigMap + const CoreDNSDeploymentName + const CoreDNSImageName + const CoreDNSVersion + const DefaultAPIServerBindAddress + const DefaultCIImageRepository + const DefaultCertTokenDuration + const DefaultControlPlaneTimeout + const DefaultEtcdVersion + const DefaultTokenDuration + const DiscoveryRetryInterval + const DynamicKubeletConfigurationDirectoryName + const Etcd + const EtcdAdvertiseClientUrlsAnnotationKey + const EtcdCACertAndKeyBaseName + const EtcdCACertName + const EtcdCAKeyName + const EtcdHealthcheckClientCertAndKeyBaseName + const EtcdHealthcheckClientCertCommonName + const EtcdHealthcheckClientCertName + const EtcdHealthcheckClientKeyName + const EtcdListenClientPort + const EtcdListenPeerPort + const EtcdMetricsPort + const EtcdPeerCertAndKeyBaseName + const EtcdPeerCertName + const EtcdPeerKeyName + const EtcdServerCertAndKeyBaseName + const EtcdServerCertName + const EtcdServerKeyName + const ExternalAdminKubeConfigFileName + const FrontProxyCACertAndKeyBaseName + const FrontProxyCACertName + const FrontProxyCAKeyName + const FrontProxyClientCertAndKeyBaseName + const FrontProxyClientCertCommonName + const FrontProxyClientCertName + const FrontProxyClientKeyName + const HyperKube + const InitConfigurationKind + const JoinConfigurationKind + const KubeAPIServer + const KubeAPIServerAdvertiseAddressEndpointAnnotationKey + const KubeCertificatesVolumeName + const KubeConfigVolumeName + const KubeControllerManager + const KubeControllerManagerPort + const KubeDNSConfigMap + const KubeDNSDeploymentName + const KubeDNSDnsMasqNannyImageName + const KubeDNSKubeDNSImageName + const KubeDNSSidecarImageName + const KubeDNSVersion + const KubeProxy + const KubeProxyConfigMap + const KubeProxyConfigMapKey + const KubeScheduler + const KubeSchedulerPort + const KubeadmCertsSecret + const KubeadmConfigConfigMap + const KubeletBaseConfigMapRolePrefix + const KubeletBaseConfigurationConfigMapKey + const KubeletBaseConfigurationConfigMapPrefix + const KubeletBootstrapKubeConfigFileName + const KubeletConfigurationFileName + const KubeletEnvFileName + const KubeletEnvFileVariableName + const KubeletHealthzPort + const KubeletKubeConfigFileName + const KubeletPort + const KubeletRunDirectory + const KubernetesDir + const LabelNodeRoleMaster + const LeaseEndpointReconcilerType + const ManifestsSubDirName + const MinExternalEtcdVersion + const MinimumAddressesInServiceSubnet + const ModeABAC + const ModeAlwaysAllow + const ModeAlwaysDeny + const ModeNode + const ModeRBAC + const ModeWebhook + const NodeBootstrapTokenAuthGroup + const NodesClusterRoleBinding + const NodesGroup + const NodesUserPrefix + const NotAfter + const PatchNodeTimeout + const PrepullImagesInParallelTimeout + const PrivateKeyBlockType + const PublicKeyBlockType + const PullImageRetry + const RSAPrivateKeyBlockType + const SchedulerKubeConfigFileName + const SchedulerUser + const SelfHostingPrefix + const ServiceAccountKeyBaseName + const ServiceAccountPrivateKeyName + const ServiceAccountPublicKeyName + const StaticPodAuditPolicyLogDir + const SystemPrivilegedGroup + const TLSBootstrapTimeout + const TempDirForKubeadm + const YAMLDocumentSeparator + var ControlPlaneComponents = []string + var ControlPlaneTaint = corev1.Taint + var ControlPlaneToleration = corev1.Toleration + var CurrentKubernetesVersion = version.MustParseSemantic("v1.18.0") + var DefaultTokenGroups = []string + var DefaultTokenUsages = bootstrapapi.KnownTokenUsages + var KubeadmCertsClusterRoleName = fmt.Sprintf("kubeadm:%s", KubeadmCertsSecret) + var MinimumControlPlaneVersion = version.MustParseSemantic("v1.17.0") + var MinimumKubeletVersion = version.MustParseSemantic("v1.17.0") + var StaticPodMirroringDefaultRetry = wait.Backoff + var SupportedEtcdVersion = map[uint8]string + func AddSelfHostedPrefix(componentName string) string + func BuildCertByte(pkiPath, name string, cert *x509.Certificate) (string, []byte, error) + func BuildKeyByte(pkiPath, name string, key crypto.Signer) (string, []byte, error) + func BuildPublicKeyByte(pkiPath, name string, key crypto.PublicKey) (string, []byte, error) + func CSROrKeyExist(csrDir, name string) bool + func CertOrKeyExist(pkiPath, name string) bool + func CertificateRequestFromFile(file string) (*x509.CertificateRequest, error) + func CreateTempDirForKubeadm(kubernetesDir, dirName string) (string, error) + func CreateTimestampDirForKubeadm(kubernetesDir, dirName string) (string, error) + func EncodeCSRPEM(csr *x509.CertificateRequest) []byte + func EncodeCertPEM(cert *x509.Certificate) []byte + func EncodePublicKeyPEM(key crypto.PublicKey) ([]byte, error) + func EtcdSupportedVersion(supportedEtcdVersion map[uint8]string, versionString string) (etcdVersion *version.Version, warning, err error) + func GetAPIServerAltNames(cfg *kubeadmv1beta2.WarpperConfiguration) (*certutil.AltNames, error) + func GetAPIServerVirtualIP(svcSubnetList string, isDualStack bool) (net.IP, error) + func GetAdminKubeConfigPath() string + func GetBootstrapKubeletKubeConfigPath() string + func GetControlPlaneEndpoint(controlPlaneEndpoint string, localEndpoint *kubeadmv1beta2.APIEndpoint) (string, error) + func GetDNSIP(svcSubnetList string, isDualStack bool) (net.IP, error) + func GetDNSVersion(dnsType kubeadmv1beta2.DNSAddOnType) string + func GetEtcdAltNames(cfg *kubeadmv1beta2.WarpperConfiguration) (*certutil.AltNames, error) + func GetEtcdPeerAltNames(cfg *kubeadmv1beta2.WarpperConfiguration) (*certutil.AltNames, error) + func GetKubeletConfigMapName(k8sVersion *version.Version) string + func GetKubeletKubeConfigPath() string + func GetKubernetesServiceCIDR(svcSubnetList string, isDualStack bool) (*net.IPNet, error) + func GetStaticPodAuditPolicyFile() string + func GetStaticPodDirectory() string + func GetStaticPodFilepath(componentName, manifestsDir string) string + func HasServerAuth(cert *x509.Certificate) bool + func NewCSR(cfg CertConfig, key crypto.Signer) (*x509.CertificateRequest, error) + func NewCSRAndKey(config *CertConfig) (*x509.CertificateRequest, crypto.Signer, error) + func NewCertAndKey(caCert *x509.Certificate, caKey crypto.Signer, config *CertConfig) (*x509.Certificate, crypto.Signer, error) + func NewCertificateAuthority(config *CertConfig) (*x509.Certificate, crypto.Signer, error) + func NewPrivateKey(keyType x509.PublicKeyAlgorithm) (crypto.Signer, error) + func NewSelfSignedCACert(cfg *CertConfig, key crypto.Signer) (*x509.Certificate, error) + func NewSignedCert(cfg *CertConfig, key crypto.Signer, caCert *x509.Certificate, ...) (*x509.Certificate, error) + func ParseHostPort(hostport string) (string, string, error) + func ParsePort(port string) (int, error) + func PathsForCertAndKey(pkiPath, name string) (string, string) + func TryLoadCSRAndKeyFromDisk(pkiPath, name string) (*x509.CertificateRequest, crypto.Signer, error) + func TryLoadCertAndKeyFromDisk(pkiPath, name string) (*x509.Certificate, crypto.Signer, error) + func TryLoadCertFromDisk(pkiPath, name string) (*x509.Certificate, error) + func TryLoadKeyFromDisk(pkiPath, name string) (crypto.Signer, error) + func TryLoadPrivatePublicKeyFromDisk(pkiPath, name string) (*rsa.PrivateKey, *rsa.PublicKey, error) + func WriteCSR(csrDir, name string, csr *x509.CertificateRequest) error + func WriteCert(pkiPath, name string, cert *x509.Certificate) error + func WriteCertAndKey(pkiPath string, name string, cert *x509.Certificate, key crypto.Signer) error + func WriteCertificateAuthorityFilesIfNotExist(pkiDir string, baseName string, caCert *x509.Certificate, caKey crypto.Signer) error + func WriteCertificateFilesIfNotExist(pkiDir string, baseName string, signingCert *x509.Certificate, ...) error + func WriteKey(pkiPath, name string, key crypto.Signer) error + func WritePublicKey(pkiPath, name string, key crypto.PublicKey) error + type CertConfig struct + PublicKeyAlgorithm x509.PublicKeyAlgorithm