mirror of
https://github.com/kubernetes-sigs/prometheus-adapter.git
synced 2026-04-06 17:57:51 +00:00
Add vendor folder to git
This commit is contained in:
parent
66cf5eaafb
commit
183585f56f
6916 changed files with 2629581 additions and 1 deletions
1
vendor/github.com/coreos/etcd/hack/README.md
generated
vendored
Normal file
1
vendor/github.com/coreos/etcd/hack/README.md
generated
vendored
Normal file
|
|
@ -0,0 +1 @@
|
|||
Various hacks that are used by developers.
|
||||
14
vendor/github.com/coreos/etcd/hack/benchmark/README.md
generated
vendored
Normal file
14
vendor/github.com/coreos/etcd/hack/benchmark/README.md
generated
vendored
Normal file
|
|
@ -0,0 +1,14 @@
|
|||
## Usage
|
||||
|
||||
Benchmark 3-member etcd cluster to get its read and write performance.
|
||||
|
||||
## Instructions
|
||||
|
||||
1. Start 3-member etcd cluster on 3 machines
|
||||
2. Update `$leader` and `$servers` in the script
|
||||
3. Run the script in a separate machine
|
||||
|
||||
## Caveat
|
||||
|
||||
1. Set environment variable `GOMAXPROCS` as the number of available cores to maximize CPU resources for both etcd member and bench process.
|
||||
2. Set the number of open files per process as 10000 for amounts of client connections for both etcd member and benchmark process.
|
||||
65
vendor/github.com/coreos/etcd/hack/benchmark/bench.sh
generated
vendored
Normal file
65
vendor/github.com/coreos/etcd/hack/benchmark/bench.sh
generated
vendored
Normal file
|
|
@ -0,0 +1,65 @@
|
|||
#!/bin/bash -e
|
||||
|
||||
leader=http://10.240.201.15:2379
|
||||
# assume three servers
|
||||
servers=( http://10.240.201.15:2379 http://10.240.212.209:2379 http://10.240.95.3:2379 )
|
||||
|
||||
keyarray=( 64 256 )
|
||||
|
||||
for keysize in ${keyarray[@]}; do
|
||||
|
||||
echo write, 1 client, $keysize key size, to leader
|
||||
./hey -m PUT -n 10 -d value=`head -c $keysize < /dev/zero | tr '\0' '\141'` -c 1 -T application/x-www-form-urlencoded $leader/v2/keys/foo | grep -e "Requests/sec" -e "Latency" -e "90%" | tr "\n" "\t" | xargs echo
|
||||
|
||||
echo write, 64 client, $keysize key size, to leader
|
||||
./hey -m PUT -n 640 -d value=`head -c $keysize < /dev/zero | tr '\0' '\141'` -c 64 -T application/x-www-form-urlencoded $leader/v2/keys/foo | grep -e "Requests/sec" -e "Latency" -e "90%" | tr "\n" "\t" | xargs echo
|
||||
|
||||
echo write, 256 client, $keysize key size, to leader
|
||||
./hey -m PUT -n 2560 -d value=`head -c $keysize < /dev/zero | tr '\0' '\141'` -c 256 -T application/x-www-form-urlencoded $leader/v2/keys/foo | grep -e "Requests/sec" -e "Latency" -e "90%" | tr "\n" "\t" | xargs echo
|
||||
|
||||
echo write, 64 client, $keysize key size, to all servers
|
||||
for i in ${servers[@]}; do
|
||||
./hey -m PUT -n 210 -d value=`head -c $keysize < /dev/zero | tr '\0' '\141'` -c 21 -T application/x-www-form-urlencoded $i/v2/keys/foo | grep -e "Requests/sec" -e "Latency" -e "90%" | tr "\n" "\t" | xargs echo &
|
||||
done
|
||||
# wait for all heys to start running
|
||||
sleep 3
|
||||
# wait for all heys to finish
|
||||
for pid in $(pgrep 'hey'); do
|
||||
while kill -0 "$pid" 2> /dev/null; do
|
||||
sleep 3
|
||||
done
|
||||
done
|
||||
|
||||
echo write, 256 client, $keysize key size, to all servers
|
||||
for i in ${servers[@]}; do
|
||||
./hey -m PUT -n 850 -d value=`head -c $keysize < /dev/zero | tr '\0' '\141'` -c 85 -T application/x-www-form-urlencoded $i/v2/keys/foo | grep -e "Requests/sec" -e "Latency" -e "90%" | tr "\n" "\t" | xargs echo &
|
||||
done
|
||||
sleep 3
|
||||
for pid in $(pgrep 'hey'); do
|
||||
while kill -0 "$pid" 2> /dev/null; do
|
||||
sleep 3
|
||||
done
|
||||
done
|
||||
|
||||
echo read, 1 client, $keysize key size, to leader
|
||||
./hey -n 100 -c 1 $leader/v2/keys/foo | grep -e "Requests/sec" -e "Latency" -e "90%" | tr "\n" "\t" | xargs echo
|
||||
|
||||
echo read, 64 client, $keysize key size, to leader
|
||||
./hey -n 6400 -c 64 $leader/v2/keys/foo | grep -e "Requests/sec" -e "Latency" -e "90%" | tr "\n" "\t" | xargs echo
|
||||
|
||||
echo read, 256 client, $keysize key size, to leader
|
||||
./hey -n 25600 -c 256 $leader/v2/keys/foo | grep -e "Requests/sec" -e "Latency" -e "90%" | tr "\n" "\t" | xargs echo
|
||||
|
||||
echo read, 64 client, $keysize key size, to all servers
|
||||
# bench servers one by one, so it doesn't overload this benchmark machine
|
||||
# It doesn't impact correctness because read request doesn't involve peer interaction.
|
||||
for i in ${servers[@]}; do
|
||||
./hey -n 21000 -c 21 $i/v2/keys/foo | grep -e "Requests/sec" -e "Latency" -e "90%" | tr "\n" "\t" | xargs echo
|
||||
done
|
||||
|
||||
echo read, 256 client, $keysize key size, to all servers
|
||||
for i in ${servers[@]}; do
|
||||
./hey -n 85000 -c 85 $i/v2/keys/foo | grep -e "Requests/sec" -e "Latency" -e "90%" | tr "\n" "\t" | xargs echo
|
||||
done
|
||||
|
||||
done
|
||||
6
vendor/github.com/coreos/etcd/hack/insta-discovery/Procfile
generated
vendored
Normal file
6
vendor/github.com/coreos/etcd/hack/insta-discovery/Procfile
generated
vendored
Normal file
|
|
@ -0,0 +1,6 @@
|
|||
# Use goreman to run `go get github.com/mattn/goreman`
|
||||
# One of the four etcd members falls back to a proxy
|
||||
etcd1: ../../bin/etcd --name infra1 --listen-client-urls http://127.0.0.1:2379 --advertise-client-urls http://127.0.0.1:2379 --listen-peer-urls http://127.0.0.1:2380 --initial-advertise-peer-urls http://127.0.0.1:2380
|
||||
etcd2: ../../bin/etcd --name infra2 --listen-client-urls http://127.0.0.1:12379 --advertise-client-urls http://127.0.0.1:12379 --listen-peer-urls http://127.0.0.1:12380 --initial-advertise-peer-urls http://127.0.0.1:12380
|
||||
etcd3: ../../bin/etcd --name infra3 --listen-client-urls http://127.0.0.1:22379 --advertise-client-urls http://127.0.0.1:22379 --listen-peer-urls http://127.0.0.1:22380 --initial-advertise-peer-urls http://127.0.0.1:22380
|
||||
etcd4: ../../bin/etcd --name infra4 --listen-client-urls http://127.0.0.1:32379 --advertise-client-urls http://127.0.0.1:32379 --listen-peer-urls http://127.0.0.1:32380 --initial-advertise-peer-urls http://127.0.0.1:32380
|
||||
1
vendor/github.com/coreos/etcd/hack/insta-discovery/README.md
generated
vendored
Normal file
1
vendor/github.com/coreos/etcd/hack/insta-discovery/README.md
generated
vendored
Normal file
|
|
@ -0,0 +1 @@
|
|||
Starts a cluster via the discovery service on your local machine. Useful for testing.
|
||||
8
vendor/github.com/coreos/etcd/hack/insta-discovery/discovery
generated
vendored
Normal file
8
vendor/github.com/coreos/etcd/hack/insta-discovery/discovery
generated
vendored
Normal file
|
|
@ -0,0 +1,8 @@
|
|||
#!/bin/sh
|
||||
|
||||
rm -rf infra*.etcd
|
||||
disc=$(curl -s https://discovery.etcd.io/new?size=3)
|
||||
echo ETCD_DISCOVERY=${disc} > .env
|
||||
echo "setup discovery start your cluster"
|
||||
cat .env
|
||||
goreman start
|
||||
21
vendor/github.com/coreos/etcd/hack/kubernetes-deploy/README.md
generated
vendored
Normal file
21
vendor/github.com/coreos/etcd/hack/kubernetes-deploy/README.md
generated
vendored
Normal file
|
|
@ -0,0 +1,21 @@
|
|||
# etcd on Kubernetes
|
||||
|
||||
This is an example setting up etcd as a set of pods and services running on top of kubernetes. Using:
|
||||
|
||||
```
|
||||
$ kubectl create -f etcd.yml
|
||||
services/etcd-client
|
||||
pods/etcd0
|
||||
services/etcd0
|
||||
pods/etcd1
|
||||
services/etcd1
|
||||
pods/etcd2
|
||||
services/etcd2
|
||||
$ # now deploy a service that consumes etcd, such as vulcand
|
||||
$ kubectl create -f vulcand.yml
|
||||
```
|
||||
|
||||
TODO:
|
||||
|
||||
- create a replication controller like service that knows how to add and remove nodes from the cluster correctly
|
||||
- use kubernetes secrets API to configure TLS for etcd clients and peers
|
||||
189
vendor/github.com/coreos/etcd/hack/kubernetes-deploy/etcd.yml
generated
vendored
Normal file
189
vendor/github.com/coreos/etcd/hack/kubernetes-deploy/etcd.yml
generated
vendored
Normal file
|
|
@ -0,0 +1,189 @@
|
|||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: etcd-client
|
||||
spec:
|
||||
ports:
|
||||
- name: etcd-client-port
|
||||
port: 2379
|
||||
protocol: TCP
|
||||
targetPort: 2379
|
||||
selector:
|
||||
app: etcd
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
labels:
|
||||
app: etcd
|
||||
etcd_node: etcd0
|
||||
name: etcd0
|
||||
spec:
|
||||
containers:
|
||||
- command:
|
||||
- /usr/local/bin/etcd
|
||||
- --name
|
||||
- etcd0
|
||||
- --initial-advertise-peer-urls
|
||||
- http://etcd0:2380
|
||||
- --listen-peer-urls
|
||||
- http://0.0.0.0:2380
|
||||
- --listen-client-urls
|
||||
- http://0.0.0.0:2379
|
||||
- --advertise-client-urls
|
||||
- http://etcd0:2379
|
||||
- --initial-cluster
|
||||
- etcd0=http://etcd0:2380,etcd1=http://etcd1:2380,etcd2=http://etcd2:2380
|
||||
- --initial-cluster-state
|
||||
- new
|
||||
image: quay.io/coreos/etcd:latest
|
||||
name: etcd0
|
||||
ports:
|
||||
- containerPort: 2379
|
||||
name: client
|
||||
protocol: TCP
|
||||
- containerPort: 2380
|
||||
name: server
|
||||
protocol: TCP
|
||||
restartPolicy: Never
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
labels:
|
||||
etcd_node: etcd0
|
||||
name: etcd0
|
||||
spec:
|
||||
ports:
|
||||
- name: client
|
||||
port: 2379
|
||||
protocol: TCP
|
||||
targetPort: 2379
|
||||
- name: server
|
||||
port: 2380
|
||||
protocol: TCP
|
||||
targetPort: 2380
|
||||
selector:
|
||||
etcd_node: etcd0
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
labels:
|
||||
app: etcd
|
||||
etcd_node: etcd1
|
||||
name: etcd1
|
||||
spec:
|
||||
containers:
|
||||
- command:
|
||||
- /usr/local/bin/etcd
|
||||
- --name
|
||||
- etcd1
|
||||
- --initial-advertise-peer-urls
|
||||
- http://etcd1:2380
|
||||
- --listen-peer-urls
|
||||
- http://0.0.0.0:2380
|
||||
- --listen-client-urls
|
||||
- http://0.0.0.0:2379
|
||||
- --advertise-client-urls
|
||||
- http://etcd1:2379
|
||||
- --initial-cluster
|
||||
- etcd0=http://etcd0:2380,etcd1=http://etcd1:2380,etcd2=http://etcd2:2380
|
||||
- --initial-cluster-state
|
||||
- new
|
||||
image: quay.io/coreos/etcd:latest
|
||||
name: etcd1
|
||||
ports:
|
||||
- containerPort: 2379
|
||||
name: client
|
||||
protocol: TCP
|
||||
- containerPort: 2380
|
||||
name: server
|
||||
protocol: TCP
|
||||
restartPolicy: Never
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
labels:
|
||||
etcd_node: etcd1
|
||||
name: etcd1
|
||||
spec:
|
||||
ports:
|
||||
- name: client
|
||||
port: 2379
|
||||
protocol: TCP
|
||||
targetPort: 2379
|
||||
- name: server
|
||||
port: 2380
|
||||
protocol: TCP
|
||||
targetPort: 2380
|
||||
selector:
|
||||
etcd_node: etcd1
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
labels:
|
||||
app: etcd
|
||||
etcd_node: etcd2
|
||||
name: etcd2
|
||||
spec:
|
||||
containers:
|
||||
- command:
|
||||
- /usr/local/bin/etcd
|
||||
- --name
|
||||
- etcd2
|
||||
- --initial-advertise-peer-urls
|
||||
- http://etcd2:2380
|
||||
- --listen-peer-urls
|
||||
- http://0.0.0.0:2380
|
||||
- --listen-client-urls
|
||||
- http://0.0.0.0:2379
|
||||
- --advertise-client-urls
|
||||
- http://etcd2:2379
|
||||
- --initial-cluster
|
||||
- etcd0=http://etcd0:2380,etcd1=http://etcd1:2380,etcd2=http://etcd2:2380
|
||||
- --initial-cluster-state
|
||||
- new
|
||||
image: quay.io/coreos/etcd:latest
|
||||
name: etcd2
|
||||
ports:
|
||||
- containerPort: 2379
|
||||
name: client
|
||||
protocol: TCP
|
||||
- containerPort: 2380
|
||||
name: server
|
||||
protocol: TCP
|
||||
restartPolicy: Never
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
labels:
|
||||
etcd_node: etcd2
|
||||
name: etcd2
|
||||
spec:
|
||||
ports:
|
||||
- name: client
|
||||
port: 2379
|
||||
protocol: TCP
|
||||
targetPort: 2379
|
||||
- name: server
|
||||
port: 2380
|
||||
protocol: TCP
|
||||
targetPort: 2380
|
||||
selector:
|
||||
etcd_node: etcd2
|
||||
22
vendor/github.com/coreos/etcd/hack/kubernetes-deploy/vulcand.yml
generated
vendored
Normal file
22
vendor/github.com/coreos/etcd/hack/kubernetes-deploy/vulcand.yml
generated
vendored
Normal file
|
|
@ -0,0 +1,22 @@
|
|||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
labels:
|
||||
app: vulcand
|
||||
name: vulcand
|
||||
spec:
|
||||
containers:
|
||||
- command:
|
||||
- /go/bin/vulcand
|
||||
- -apiInterface=0.0.0.0
|
||||
- --etcd=http://etcd-client:2379
|
||||
image: mailgun/vulcand:v0.8.0-beta.2
|
||||
name: vulcand
|
||||
ports:
|
||||
- containerPort: 8081
|
||||
name: api
|
||||
protocol: TCP
|
||||
- containerPort: 8082
|
||||
name: server
|
||||
protocol: TCP
|
||||
restartPolicy: Always
|
||||
41
vendor/github.com/coreos/etcd/hack/tls-setup/Makefile
generated
vendored
Normal file
41
vendor/github.com/coreos/etcd/hack/tls-setup/Makefile
generated
vendored
Normal file
|
|
@ -0,0 +1,41 @@
|
|||
.PHONY: cfssl ca req clean
|
||||
|
||||
CFSSL = @env PATH=$(GOPATH)/bin:$(PATH) cfssl
|
||||
JSON = env PATH=$(GOPATH)/bin:$(PATH) cfssljson
|
||||
|
||||
all: cfssl ca req
|
||||
|
||||
cfssl:
|
||||
go get -u -tags nopkcs11 github.com/cloudflare/cfssl/cmd/cfssl
|
||||
go get -u github.com/cloudflare/cfssl/cmd/cfssljson
|
||||
go get -u github.com/mattn/goreman
|
||||
|
||||
ca:
|
||||
mkdir -p certs
|
||||
$(CFSSL) gencert -initca config/ca-csr.json | $(JSON) -bare certs/ca
|
||||
|
||||
req:
|
||||
$(CFSSL) gencert \
|
||||
-ca certs/ca.pem \
|
||||
-ca-key certs/ca-key.pem \
|
||||
-config config/ca-config.json \
|
||||
config/req-csr.json | $(JSON) -bare certs/etcd1
|
||||
$(CFSSL) gencert \
|
||||
-ca certs/ca.pem \
|
||||
-ca-key certs/ca-key.pem \
|
||||
-config config/ca-config.json \
|
||||
config/req-csr.json | $(JSON) -bare certs/etcd2
|
||||
$(CFSSL) gencert \
|
||||
-ca certs/ca.pem \
|
||||
-ca-key certs/ca-key.pem \
|
||||
-config config/ca-config.json \
|
||||
config/req-csr.json | $(JSON) -bare certs/etcd3
|
||||
$(CFSSL) gencert \
|
||||
-ca certs/ca.pem \
|
||||
-ca-key certs/ca-key.pem \
|
||||
-config config/ca-config.json \
|
||||
config/req-csr.json | $(JSON) -bare certs/proxy1
|
||||
|
||||
clean:
|
||||
rm -rf certs
|
||||
|
||||
9
vendor/github.com/coreos/etcd/hack/tls-setup/Procfile
generated
vendored
Normal file
9
vendor/github.com/coreos/etcd/hack/tls-setup/Procfile
generated
vendored
Normal file
|
|
@ -0,0 +1,9 @@
|
|||
# Use goreman to run `go get github.com/mattn/goreman`
|
||||
etcd1: ../../bin/etcd --name infra1 --listen-client-urls https://localhost:2379 --advertise-client-urls https://localhost:2379 --listen-peer-urls https://localhost:2380 --initial-advertise-peer-urls https://localhost:2380 --initial-cluster-token etcd-cluster-1 --initial-cluster 'infra1=https://localhost:2380,infra2=https://localhost:12380,infra3=https://localhost:22380' --initial-cluster-state new --cert-file=certs/etcd1.pem --key-file=certs/etcd1-key.pem --peer-cert-file=certs/etcd1.pem --peer-key-file=certs/etcd1-key.pem --peer-client-cert-auth --peer-trusted-ca-file=certs/ca.pem
|
||||
|
||||
etcd2: ../../bin/etcd --name infra2 --listen-client-urls https://localhost:12379 --advertise-client-urls https://localhost:12379 --listen-peer-urls https://localhost:12380 --initial-advertise-peer-urls https://localhost:12380 --initial-cluster-token etcd-cluster-1 --initial-cluster 'infra1=https://localhost:2380,infra2=https://localhost:12380,infra3=https://localhost:22380' --initial-cluster-state new --cert-file=certs/etcd2.pem --key-file=certs/etcd2-key.pem --peer-cert-file=certs/etcd2.pem --peer-key-file=certs/etcd2-key.pem --peer-client-cert-auth --peer-trusted-ca-file=certs/ca.pem
|
||||
|
||||
etcd3: ../../bin/etcd --name infra3 --listen-client-urls https://localhost:22379 --advertise-client-urls https://localhost:22379 --listen-peer-urls https://localhost:22380 --initial-advertise-peer-urls https://localhost:22380 --initial-cluster-token etcd-cluster-1 --initial-cluster 'infra1=https://localhost:2380,infra2=https://localhost:12380,infra3=https://localhost:22380' --initial-cluster-state new --cert-file=certs/etcd3.pem --key-file=certs/etcd3-key.pem --peer-cert-file=certs/etcd3.pem --peer-key-file=certs/etcd3-key.pem --peer-client-cert-auth --peer-trusted-ca-file=certs/ca.pem
|
||||
|
||||
proxy: ../../bin/etcd --name proxy1 --proxy=on --listen-client-urls https://localhost:8080 --initial-cluster 'infra1=https://localhost:2380,infra2=https://localhost:12380,infra3=https://localhost:22380' --cert-file=certs/proxy1.pem --key-file=certs/proxy1-key.pem --trusted-ca-file=certs/ca.pem --peer-cert-file=certs/proxy1.pem --peer-key-file=certs/proxy1-key.pem --peer-client-cert-auth --peer-trusted-ca-file=certs/ca.pem
|
||||
|
||||
31
vendor/github.com/coreos/etcd/hack/tls-setup/README.md
generated
vendored
Normal file
31
vendor/github.com/coreos/etcd/hack/tls-setup/README.md
generated
vendored
Normal file
|
|
@ -0,0 +1,31 @@
|
|||
This demonstrates using Cloudflare's [cfssl](https://github.com/cloudflare/cfssl) to easily generate certificates for an etcd cluster.
|
||||
|
||||
Defaults generate an ECDSA-384 root and leaf certificates for `localhost`. etcd nodes will use the same certificates for both sides of mutual authentication, but won't require client certs for non-peer clients.
|
||||
|
||||
**Instructions**
|
||||
|
||||
1. Install git, go, and make
|
||||
2. Amend https://github.com/coreos/etcd/blob/master/hack/tls-setup/config/req-csr.json - IP's currently in the config should be replaced/added to with IP addresses of each node in your cluster, please note 127.0.0.1 is always required for loopback purposes:
|
||||
```json
|
||||
Example:
|
||||
{
|
||||
"CN": "etcd",
|
||||
"hosts": [
|
||||
"3.8.121.201",
|
||||
"46.4.19.20",
|
||||
"127.0.0.1"
|
||||
],
|
||||
"key": {
|
||||
"algo": "ecdsa",
|
||||
"size": 384
|
||||
},
|
||||
"names": [
|
||||
{
|
||||
"O": "autogenerated",
|
||||
"OU": "etcd cluster",
|
||||
"L": "the internet"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
3. Run `make` to generate the certs
|
||||
13
vendor/github.com/coreos/etcd/hack/tls-setup/config/ca-config.json
generated
vendored
Normal file
13
vendor/github.com/coreos/etcd/hack/tls-setup/config/ca-config.json
generated
vendored
Normal file
|
|
@ -0,0 +1,13 @@
|
|||
{
|
||||
"signing": {
|
||||
"default": {
|
||||
"usages": [
|
||||
"signing",
|
||||
"key encipherment",
|
||||
"server auth",
|
||||
"client auth"
|
||||
],
|
||||
"expiry": "8760h"
|
||||
}
|
||||
}
|
||||
}
|
||||
16
vendor/github.com/coreos/etcd/hack/tls-setup/config/ca-csr.json
generated
vendored
Normal file
16
vendor/github.com/coreos/etcd/hack/tls-setup/config/ca-csr.json
generated
vendored
Normal file
|
|
@ -0,0 +1,16 @@
|
|||
{
|
||||
"CN": "Autogenerated CA",
|
||||
"key": {
|
||||
"algo": "ecdsa",
|
||||
"size": 384
|
||||
},
|
||||
"names": [
|
||||
{
|
||||
"O": "Honest Achmed's Used Certificates",
|
||||
"OU": "Hastily-Generated Values Divison",
|
||||
"L": "San Francisco",
|
||||
"ST": "California",
|
||||
"C": "US"
|
||||
}
|
||||
]
|
||||
}
|
||||
17
vendor/github.com/coreos/etcd/hack/tls-setup/config/req-csr.json
generated
vendored
Normal file
17
vendor/github.com/coreos/etcd/hack/tls-setup/config/req-csr.json
generated
vendored
Normal file
|
|
@ -0,0 +1,17 @@
|
|||
{
|
||||
"CN": "etcd",
|
||||
"hosts": [
|
||||
"localhost"
|
||||
],
|
||||
"key": {
|
||||
"algo": "ecdsa",
|
||||
"size": 384
|
||||
},
|
||||
"names": [
|
||||
{
|
||||
"O": "autogenerated",
|
||||
"OU": "etcd cluster",
|
||||
"L": "the internet"
|
||||
}
|
||||
]
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue