-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Communicating with Tiller that has TLS enabled #155
Comments
Hello; thanks for using microBean Helm. You may want to keep track of #42. In general, I try to stay out of the business of how the gRPC connection is established. I think you're asking two questions here (correct me if I'm wrong):
For the first question, you're probably interested in this godawful method. For the second question, you're probably going to want to override the |
Ah, I read your issue too quickly. You are not asking about how to install Tiller using microBean Helm, so you may safely disregard my advice there. You are asking about how to set up secure communication with an already-installed Tiller, and for that, yes, you'll want to override the |
You're right. I was interested only in creating a secure communication with an already-installed Tiller. Thanks! |
Does this give you what you need? If so, I'll close this issue. |
Yes. I will show an example after everything works. |
|
I was trying to figure out how can I use the library in order to communicate with a tiller that has TLS enabled. In order to initialize the Tiller I'm using a command similar to this:
helm init --tiller-tls --tiller-tls-verify --tls-ca-cert <path-to-ca-cert> --tiller-tls-cert <path-to-tls-cert> --tiller-tls-key <path-to-tls-key>
From what I see in the Tiller class, there is support only for plain text communication(there is a constructor that accepts a ManagedChannel #42, but I need to send also the Kubernetes configuration):
I was curious if I can be able to do something similar to this command in order to list the Helm releases:
helm --tls --tls-ca-cert <path-to-ca-cert> --tls-cert <path-to-tls-cert> --tls-key <path-to-tls-key> list
The text was updated successfully, but these errors were encountered: