Hi!
I’d like to initiate a discussion about this bug: [1].
To resolve this issue we need to generate a secret cert and pass it to master 
nodes. We also need to store it somewhere to support scaling.
This issue is specific for kubernetes drivers. Currently in magnum we have a 
general cert manager which is the same for all the drivers.

What do you think about moving cert_manager logic into a driver-specific area?
Having this common cert_manager logic forces us to generate client cert with 
“admin” and “system:masters” subject & organisation names [2], 
which is really something that we need only for kubernetes drivers.

[1] https://bugs.launchpad.net/magnum/+bug/1766546 
<https://bugs.launchpad.net/magnum/+bug/1766546>
[2] 
https://github.com/openstack/magnum/blob/2329cb7fb4d197e49d6c07d37b2f7ec14a11c880/magnum/conductor/handlers/common/cert_manager.py#L59-L64
 
<https://github.com/openstack/magnum/blob/2329cb7fb4d197e49d6c07d37b2f7ec14a11c880/magnum/conductor/handlers/common/cert_manager.py#L59-L64>


..Sergey Filatov



> On 20 Apr 2018, at 20:57, Sergey Filatov <s.s.filato...@gmail.com> wrote:
> 
> Hello,
> 
> I looked into k8s drivers for magnum I see that each api-server on master 
> node generates it’s own service-account-key-file. This causes issues with 
> service-accounts authenticating on api-server. (In case api-server endpoint 
> moves).
> As far as I understand we should have either all api-server keys synced on 
> api-servesr or pre-generate single api-server key.
> 
> What is the way for magnum to get over this issue?

__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to