Open dlamotte opened 8 years ago
are you able to try with coreos alpha 1153.0.0? locksmith has been updated to 0.4.0 there, and uses the newer etcd client library.
@mischief sure, will do and get back to you
@mischief wasn't able to boot up alpha with my cloud config. From looking at the code though, it appears to fail here on master: https://github.com/coreos/locksmith/blob/master/locksmithctl/locksmithctl.go#L195
I'm not very familiar with the standard go build system so I couldn't figure out how to get it building. But the logic seems to assume that if any of those are set, it builds the client auth whereas it should probably do another check. This is on master.
If you can give me a pointer on how to build it, I'll write a pull request and test the change.
@dlamotte you should just be able to run the ./build
script (Go doesn't have a build system yet).
Issue Report
Bug
locksmithd requires etcd_certfile and etcd_keyfile to be set when setting endpoint.
From cloud-config user-data:
Notice how I have etcd2 setup to serve over TLS however I don't require client key auth for clients (I do for peers).
CoreOS Version
On channel: Stable
Environment
What hardware/cloud provider/hypervisor is being used to run CoreOS? AWS
Expected Behavior
I expect that I can tell locksmith where to find the etcd endpoint without requiring use of client auth when etcd doesn't require it.
Actual Behavior
Client auth certs are required to be specified or you get: