问题
我使用 secp256k1 通过 OpenSSL 生成了密钥和证书,rke
从 Rancher Kubernetes Engine (RKE) 运行版本 v1.2.8,并收到以下错误:
FATA[0000] Failed to read certificates from dir [/home/max/cluster_certs]: failed to read certificate [kube-apiserver-requestheader-ca.pem]: x509: unsupported elliptic curve
kubectl version
:
Client Version: version.Info{Major:"1", Minor:"21", GitVersion:"v1.21.1", GitCommit:"5e58841cce77d4bc13713ad2b91fa0d961e69192", GitTreeState:"clean", BuildDate:"2021-05-12T14:18:45Z", GoVersion:"go1.16.4", Compiler:"gc", Platform:"linux/amd64"}
我通过以下方式生成了根 CA 密钥和证书:
openssl ecparam -name secp256k1 -genkey -noout -out ca-pvt.pem -rand random.bin -writerand random.bin
openssl req -config .\openssl.cnf -x509 -sha256 -new -nodes -key ca-pvt.pem -days 10227 -out ca-cert.cer -rand random.bin -writerand random.bin
然后我用它来签署rke cert generate-csr
从我的 Kubernetes Rancher生成的 CSR cluster.yml
。
批准 CSR 的命令行如下:
openssl ca -config openssl.cnf -batch -in %1 -out %2 -create_serial -notext -rand random.bin -writerand random.bin
问题
secp256k1
如果产生x509: unsupported elliptic curve
错误消息,Kubernetes 今天支持哪些曲线用于证书?
附言
我也试过了prime256v1
,也叫secp256r1
. 与 相比,它进一步发展secp256k1
,但仍然出现错误。
有了 prime256v1
,RKE没有抱怨x509: unsupported elliptic curve
。
相反,它给出了一个错误panic: interface conversion: interface {} is *ecdsa.PrivateKey, not *rsa.PrivateKey
。这是完整的错误消息:
这是完整的错误消息:
DEBU[0000] Certificate file [./cluster_certs/kube-apiserver-requestheader-ca.pem] content is greater than 0
panic: interface conversion: interface {} is *ecdsa.PrivateKey, not *rsa.PrivateKey
goroutine 1 [running]: github.com/rancher/rke/pki.getKeyFromFile(0x7ffe6294c74e, 0xf, 0xc00105cb10, 0x27, 0x8, 0xc00105cb10, 0x27)
/go/src/github.com/rancher/rke/pki/util.go:656 +0x212