@@ -679,6 +679,10 @@ func TestGetControllerManagerCommand(t *testing.T) {
679
679
"--cluster-signing-key-file=" + testCertsDir + "/ca.key" ,
680
680
"--use-service-account-credentials=true" ,
681
681
"--controllers=*,bootstrapsigner,tokencleaner" ,
682
+ "--authentication-kubeconfig=" + kubeadmconstants .KubernetesDir + "/controller-manager.conf" ,
683
+ "--authorization-kubeconfig=" + kubeadmconstants .KubernetesDir + "/controller-manager.conf" ,
684
+ "--client-ca-file=" + testCertsDir + "/ca.crt" ,
685
+ "--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt" ,
682
686
},
683
687
},
684
688
{
@@ -699,6 +703,10 @@ func TestGetControllerManagerCommand(t *testing.T) {
699
703
"--cluster-signing-key-file=" + testCertsDir + "/ca.key" ,
700
704
"--use-service-account-credentials=true" ,
701
705
"--controllers=*,bootstrapsigner,tokencleaner" ,
706
+ "--authentication-kubeconfig=" + kubeadmconstants .KubernetesDir + "/controller-manager.conf" ,
707
+ "--authorization-kubeconfig=" + kubeadmconstants .KubernetesDir + "/controller-manager.conf" ,
708
+ "--client-ca-file=" + testCertsDir + "/ca.crt" ,
709
+ "--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt" ,
702
710
"--allocate-node-cidrs=true" ,
703
711
"--cluster-cidr=10.0.1.15/16" ,
704
712
"--node-cidr-mask-size=24" ,
@@ -723,6 +731,10 @@ func TestGetControllerManagerCommand(t *testing.T) {
723
731
"--cluster-signing-key-file=" + testCertsDir + "/ca.key" ,
724
732
"--use-service-account-credentials=true" ,
725
733
"--controllers=*,bootstrapsigner,tokencleaner" ,
734
+ "--authentication-kubeconfig=" + kubeadmconstants .KubernetesDir + "/controller-manager.conf" ,
735
+ "--authorization-kubeconfig=" + kubeadmconstants .KubernetesDir + "/controller-manager.conf" ,
736
+ "--client-ca-file=" + testCertsDir + "/ca.crt" ,
737
+ "--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt" ,
726
738
"--allocate-node-cidrs=true" ,
727
739
"--cluster-cidr=10.0.1.15/16" ,
728
740
"--node-cidr-mask-size=20" ,
@@ -746,6 +758,10 @@ func TestGetControllerManagerCommand(t *testing.T) {
746
758
"--cluster-signing-key-file=" + testCertsDir + "/ca.key" ,
747
759
"--use-service-account-credentials=true" ,
748
760
"--controllers=*,bootstrapsigner,tokencleaner" ,
761
+ "--authentication-kubeconfig=" + kubeadmconstants .KubernetesDir + "/controller-manager.conf" ,
762
+ "--authorization-kubeconfig=" + kubeadmconstants .KubernetesDir + "/controller-manager.conf" ,
763
+ "--client-ca-file=" + testCertsDir + "/ca.crt" ,
764
+ "--requestheader-client-ca-file=" + testCertsDir + "/front-proxy-ca.crt" ,
749
765
"--allocate-node-cidrs=true" ,
750
766
"--cluster-cidr=2001:db8::/64" ,
751
767
"--node-cidr-mask-size=80" ,
@@ -873,6 +889,10 @@ func TestGetControllerManagerCommandExternalCA(t *testing.T) {
873
889
"--cluster-signing-key-file=" ,
874
890
"--use-service-account-credentials=true" ,
875
891
"--controllers=*,bootstrapsigner,tokencleaner" ,
892
+ "--authentication-kubeconfig=" + kubeadmconstants .KubernetesDir + "/controller-manager.conf" ,
893
+ "--authorization-kubeconfig=" + kubeadmconstants .KubernetesDir + "/controller-manager.conf" ,
894
+ "--client-ca-file=" + tmpdir + "/ca.crt" ,
895
+ "--requestheader-client-ca-file=" + tmpdir + "/front-proxy-ca.crt" ,
876
896
}
877
897
},
878
898
},
@@ -898,6 +918,10 @@ func TestGetControllerManagerCommandExternalCA(t *testing.T) {
898
918
"--cluster-signing-key-file=" + tmpdir + "/ca.key" ,
899
919
"--use-service-account-credentials=true" ,
900
920
"--controllers=*,bootstrapsigner,tokencleaner" ,
921
+ "--authentication-kubeconfig=" + kubeadmconstants .KubernetesDir + "/controller-manager.conf" ,
922
+ "--authorization-kubeconfig=" + kubeadmconstants .KubernetesDir + "/controller-manager.conf" ,
923
+ "--client-ca-file=" + tmpdir + "/ca.crt" ,
924
+ "--requestheader-client-ca-file=" + tmpdir + "/front-proxy-ca.crt" ,
901
925
}
902
926
},
903
927
},
0 commit comments