mirror of
https://github.com/siderolabs/talos.git
synced 2025-10-11 07:31:18 +02:00
ECDSA keys are smaller which decreases Talos config size, they are more efficient in terms of key generation, signing, etc., so it makes boot performance better (and config generation as well). Signed-off-by: Andrey Smirnov <smirnov.andrey@gmail.com>
79 lines
2.1 KiB
Go
79 lines
2.1 KiB
Go
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
package kubeconfig
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"fmt"
|
|
"io"
|
|
"text/template"
|
|
"time"
|
|
|
|
"github.com/talos-systems/crypto/x509"
|
|
|
|
"github.com/talos-systems/talos/pkg/machinery/config"
|
|
"github.com/talos-systems/talos/pkg/machinery/constants"
|
|
)
|
|
|
|
const adminKubeConfigTemplate = `apiVersion: v1
|
|
kind: Config
|
|
clusters:
|
|
- name: {{ .Cluster }}
|
|
cluster:
|
|
server: {{ .Server }}
|
|
certificate-authority-data: {{ .CACert }}
|
|
users:
|
|
- name: admin@{{ .Cluster }}
|
|
user:
|
|
client-certificate-data: {{ .AdminCert }}
|
|
client-key-data: {{ .AdminKey }}
|
|
contexts:
|
|
- context:
|
|
cluster: {{ .Cluster }}
|
|
namespace: default
|
|
user: admin@{{ .Cluster }}
|
|
name: admin@{{ .Cluster }}
|
|
current-context: admin@{{ .Cluster }}
|
|
`
|
|
|
|
// GenerateAdmin generates admin kubeconfig for the cluster.
|
|
func GenerateAdmin(config config.ClusterConfig, out io.Writer) error {
|
|
tpl, err := template.New("kubeconfig").Parse(adminKubeConfigTemplate)
|
|
if err != nil {
|
|
return fmt.Errorf("error parsing kubeconfig template: %w", err)
|
|
}
|
|
|
|
k8sCA, err := x509.NewCertificateAuthorityFromCertificateAndKey(config.CA())
|
|
if err != nil {
|
|
return fmt.Errorf("error getting Kubernetes CA: %w", err)
|
|
}
|
|
|
|
adminCert, err := x509.NewKeyPair(k8sCA,
|
|
x509.CommonName(constants.KubernetesAdminCertCommonName),
|
|
x509.Organization(constants.KubernetesAdminCertOrganization),
|
|
x509.NotAfter(time.Now().Add(config.AdminKubeconfig().CertLifetime())))
|
|
if err != nil {
|
|
return fmt.Errorf("error generating admin certificate: %w", err)
|
|
}
|
|
|
|
adminCertPEM := x509.NewCertificateAndKeyFromKeyPair(adminCert)
|
|
|
|
input := struct {
|
|
Cluster string
|
|
CACert string
|
|
AdminCert string
|
|
AdminKey string
|
|
Server string
|
|
}{
|
|
Cluster: config.Name(),
|
|
CACert: base64.StdEncoding.EncodeToString(config.CA().Crt),
|
|
AdminCert: base64.StdEncoding.EncodeToString(adminCertPEM.Crt),
|
|
AdminKey: base64.StdEncoding.EncodeToString(adminCertPEM.Key),
|
|
Server: config.Endpoint().String(),
|
|
}
|
|
|
|
return tpl.Execute(out, input)
|
|
}
|