@@ -1612,24 +1612,24 @@ function create-certs {
1612
1612
1613
1613
# By default, linux wraps base64 output every 76 cols, so we use 'tr -d' to remove whitespaces.
1614
1614
# Note 'base64 -w0' doesn't work on Mac OS X, which has different flags.
1615
- CA_KEY_BASE64=$( cat " ${CERT_DIR} /pki/private/ca.key" | base64 | tr -d ' \r\n' )
1616
- CA_CERT_BASE64=$( cat " ${CERT_DIR} /pki/ca.crt" | base64 | tr -d ' \r\n' )
1617
- MASTER_CERT_BASE64=$( cat " ${CERT_DIR} /pki/issued/${MASTER_NAME} .crt" | base64 | tr -d ' \r\n' )
1618
- MASTER_KEY_BASE64=$( cat " ${CERT_DIR} /pki/private/${MASTER_NAME} .key" | base64 | tr -d ' \r\n' )
1619
- KUBELET_CERT_BASE64=$( cat " ${CERT_DIR} /pki/issued/kubelet.crt" | base64 | tr -d ' \r\n' )
1620
- KUBELET_KEY_BASE64=$( cat " ${CERT_DIR} /pki/private/kubelet.key" | base64 | tr -d ' \r\n' )
1621
- KUBECFG_CERT_BASE64=$( cat " ${CERT_DIR} /pki/issued/kubecfg.crt" | base64 | tr -d ' \r\n' )
1622
- KUBECFG_KEY_BASE64=$( cat " ${CERT_DIR} /pki/private/kubecfg.key" | base64 | tr -d ' \r\n' )
1623
- KUBEAPISERVER_CERT_BASE64=$( cat " ${CERT_DIR} /pki/issued/kube-apiserver.crt" | base64 | tr -d ' \r\n' )
1624
- KUBEAPISERVER_KEY_BASE64=$( cat " ${CERT_DIR} /pki/private/kube-apiserver.key" | base64 | tr -d ' \r\n' )
1615
+ CA_KEY_BASE64=$( base64 " ${CERT_DIR} /pki/private/ca.key" | tr -d ' \r\n' )
1616
+ CA_CERT_BASE64=$( base64 " ${CERT_DIR} /pki/ca.crt" | tr -d ' \r\n' )
1617
+ MASTER_CERT_BASE64=$( base64 " ${CERT_DIR} /pki/issued/${MASTER_NAME} .crt" | tr -d ' \r\n' )
1618
+ MASTER_KEY_BASE64=$( base64 " ${CERT_DIR} /pki/private/${MASTER_NAME} .key" | tr -d ' \r\n' )
1619
+ KUBELET_CERT_BASE64=$( base64 " ${CERT_DIR} /pki/issued/kubelet.crt" | tr -d ' \r\n' )
1620
+ KUBELET_KEY_BASE64=$( base64 " ${CERT_DIR} /pki/private/kubelet.key" | tr -d ' \r\n' )
1621
+ KUBECFG_CERT_BASE64=$( base64 " ${CERT_DIR} /pki/issued/kubecfg.crt" | tr -d ' \r\n' )
1622
+ KUBECFG_KEY_BASE64=$( base64 " ${CERT_DIR} /pki/private/kubecfg.key" | tr -d ' \r\n' )
1623
+ KUBEAPISERVER_CERT_BASE64=$( base64 " ${CERT_DIR} /pki/issued/kube-apiserver.crt" | tr -d ' \r\n' )
1624
+ KUBEAPISERVER_KEY_BASE64=$( base64 " ${CERT_DIR} /pki/private/kube-apiserver.key" | tr -d ' \r\n' )
1625
1625
1626
1626
# Setting up an addition directory (beyond pki) as it is the simplest way to
1627
1627
# ensure we get a different CA pair to sign the proxy-client certs and which
1628
1628
# we can send CA public key to the user-apiserver to validate communication.
1629
- AGGREGATOR_CA_KEY_BASE64=$( cat " ${AGGREGATOR_CERT_DIR} /pki/private/ca.key" | base64 | tr -d ' \r\n' )
1630
- REQUESTHEADER_CA_CERT_BASE64=$( cat " ${AGGREGATOR_CERT_DIR} /pki/ca.crt" | base64 | tr -d ' \r\n' )
1631
- PROXY_CLIENT_CERT_BASE64=$( cat " ${AGGREGATOR_CERT_DIR} /pki/issued/proxy-client.crt" | base64 | tr -d ' \r\n' )
1632
- PROXY_CLIENT_KEY_BASE64=$( cat " ${AGGREGATOR_CERT_DIR} /pki/private/proxy-client.key" | base64 | tr -d ' \r\n' )
1629
+ AGGREGATOR_CA_KEY_BASE64=$( base64 " ${AGGREGATOR_CERT_DIR} /pki/private/ca.key" | tr -d ' \r\n' )
1630
+ REQUESTHEADER_CA_CERT_BASE64=$( base64 " ${AGGREGATOR_CERT_DIR} /pki/ca.crt" | tr -d ' \r\n' )
1631
+ PROXY_CLIENT_CERT_BASE64=$( base64 " ${AGGREGATOR_CERT_DIR} /pki/issued/proxy-client.crt" | tr -d ' \r\n' )
1632
+ PROXY_CLIENT_KEY_BASE64=$( base64 " ${AGGREGATOR_CERT_DIR} /pki/private/proxy-client.key" | tr -d ' \r\n' )
1633
1633
}
1634
1634
1635
1635
# Set up easy-rsa directory structure.
@@ -2512,10 +2512,10 @@ function create-etcd-certs {
2512
2512
generate-etcd-cert " ${KUBE_TEMP} /cfssl" " ${host} " " peer" " peer"
2513
2513
2514
2514
pushd " ${KUBE_TEMP} /cfssl"
2515
- ETCD_CA_KEY_BASE64=$( cat " ca-key.pem" | base64 | tr -d ' \r\n' )
2516
- ETCD_CA_CERT_BASE64=$( cat " ca.pem" | gzip | base64 | tr -d ' \r\n' )
2517
- ETCD_PEER_KEY_BASE64=$( cat " peer-key.pem" | base64 | tr -d ' \r\n' )
2518
- ETCD_PEER_CERT_BASE64=$( cat " peer.pem" | gzip | base64 | tr -d ' \r\n' )
2515
+ ETCD_CA_KEY_BASE64=$( base64 " ca-key.pem" | tr -d ' \r\n' )
2516
+ ETCD_CA_CERT_BASE64=$( gzip -c " ca.pem" | base64 | tr -d ' \r\n' )
2517
+ ETCD_PEER_KEY_BASE64=$( base64 " peer-key.pem" | tr -d ' \r\n' )
2518
+ ETCD_PEER_CERT_BASE64=$( gzip -c " peer.pem" | base64 | tr -d ' \r\n' )
2519
2519
popd
2520
2520
}
2521
2521
@@ -2551,12 +2551,12 @@ function create-etcd-apiserver-certs {
2551
2551
generate-etcd-cert " ${KUBE_TEMP} /cfssl" " ${hostClient} " " client" " etcd-apiserver-client"
2552
2552
2553
2553
pushd " ${KUBE_TEMP} /cfssl"
2554
- ETCD_APISERVER_CA_KEY_BASE64=$( cat " ca-key.pem" | base64 | tr -d ' \r\n' )
2555
- ETCD_APISERVER_CA_CERT_BASE64=$( cat " ca.pem" | gzip | base64 | tr -d ' \r\n' )
2556
- ETCD_APISERVER_SERVER_KEY_BASE64=$( cat " etcd-apiserver-server-key.pem" | base64 | tr -d ' \r\n' )
2557
- ETCD_APISERVER_SERVER_CERT_BASE64=$( cat " etcd-apiserver-server.pem" | gzip | base64 | tr -d ' \r\n' )
2558
- ETCD_APISERVER_CLIENT_KEY_BASE64=$( cat " etcd-apiserver-client-key.pem" | base64 | tr -d ' \r\n' )
2559
- ETCD_APISERVER_CLIENT_CERT_BASE64=$( cat " etcd-apiserver-client.pem" | gzip | base64 | tr -d ' \r\n' )
2554
+ ETCD_APISERVER_CA_KEY_BASE64=$( base64 " ca-key.pem" | tr -d ' \r\n' )
2555
+ ETCD_APISERVER_CA_CERT_BASE64=$( gzip -c " ca.pem" | base64 | tr -d ' \r\n' )
2556
+ ETCD_APISERVER_SERVER_KEY_BASE64=$( base64 " etcd-apiserver-server-key.pem" | tr -d ' \r\n' )
2557
+ ETCD_APISERVER_SERVER_CERT_BASE64=$( gzip -c " etcd-apiserver-server.pem" | base64 | tr -d ' \r\n' )
2558
+ ETCD_APISERVER_CLIENT_KEY_BASE64=$( base64 " etcd-apiserver-client-key.pem" | tr -d ' \r\n' )
2559
+ ETCD_APISERVER_CLIENT_CERT_BASE64=$( gzip -c " etcd-apiserver-client.pem" | base64 | tr -d ' \r\n' )
2560
2560
popd
2561
2561
}
2562
2562
0 commit comments