- 22 Jun, 2022 1 commit
-
-
Nikolai Shields authored
Update to v1.21.14-k3s1
-
- 21 Jun, 2022 1 commit
-
-
galal-hussein authored
Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com>
-
- 15 Jun, 2022 3 commits
-
-
Derek Nola authored
* Move startup hooks wg into a runtime pointer, check before notifying systemd * Switch default systemd notification to server * Add 1 sec delay to allow etcd to write to disk Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Brad Davidson authored
If the user points S3 backups at a bucket containing other files, those file names may not be valid configmap keys. For example, RKE1 generates backup files with names like `s3-c-zrjnb-rs-6hxpk_2022-05-05T12:05:15Z.zip`; the semicolons in the timestamp portion of the name are not allowed for use in configmap keys. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Fedora 33 artifacts have been moved to the archive and can no longer be used. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 25 May, 2022 1 commit
-
-
Hussein Galal authored
* Update to v1.21.13 Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com> * Update tags to k3s-io for v1.21.13 Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com>
-
- 22 Apr, 2022 1 commit
-
-
Derek Nola authored
* Add RetryOnConflict around updating nodes Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 21 Apr, 2022 1 commit
-
-
Brad Davidson authored
Use ListWatch helpers to retry when the watch channel is closed. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 20 Apr, 2022 1 commit
-
-
Derek Nola authored
* Update to v1.21.12 Signed-off-by:
Derek Nola <derek.nola@suse.com> * Update tags to k3s-io for v1.21.12 Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 15 Apr, 2022 14 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com> (cherry picked from commit 2069cdf4)
-
Michal Rostecki authored
This change allows to define two cluster CIDRs for compatibility with Kubernetes dual-stuck, with an assumption that two CIDRs are usually IPv4 and IPv6. It does that by levearaging changes in out kube-router fork, with the following downstream release: https://github.com/k3s-io/kube-router/releases/tag/v1.3.2%2Bk3sSigned-off-by:
Michal Rostecki <vadorovsky@gmail.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 7e447692)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 5b2c14b1)
-
Brad Davidson authored
Also update cert gen to ensure leaf certs are regenerated if other key fields change. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 99851b0f)
-
Brad Davidson authored
Avoids divide-by-zero when the password file is empty Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 0bf7c095)
-
Brad Davidson authored
This controller only needs to run when using managed etcd, so move it in with the rest of the etcd stuff. This change also modifies the controller to only watch the Kubernetes service endpoint, instead of watching all endpoints in the entire cluster. Fixes an error message revealed by use of a newer grpc client in Kubernetes 1.24, which logs an error when the Put to etcd failed because kine doesn't support the etcd Put operation. The controller shouldn't have been running without etcd in the first place. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit f37e7565)
-
Brad Davidson authored
Don't attempt to retrieve snapshot metadata configmap if the apiserver isn't available. This could be triggered if the cron expression caused a snapshot to be triggered before the apiserver is up. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 2a429aac)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 49544e0d)
-
Brad Davidson authored
This is required to make the websocket tunnel server functional on etcd-only nodes, and will save some code on the RKE2 side once pulled through. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit af0b496e)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit e7437d4a)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 5ab3590d)
-
Brad Davidson authored
Sync DisableKubeProxy from cfg into control before sending control to clients, as it may have been modified by a startup hook. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 869b98bc)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 90445bd5)
-
- 14 Apr, 2022 2 commits
-
-
Roberto Bonafiglia authored
[Release 1.21] Wireguard native flannel support
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
- 13 Apr, 2022 1 commit
-
-
Michal Rostecki authored
Signed-off-by:
Dirk Müller <dirk@dmllr.de> Signed-off-by:
Michal Rostecki <vadorovsky@gmail.com>
-
- 11 Apr, 2022 3 commits
-
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
Euan Kemp authored
Ideally we'd have fully fleshed out support for it (i.e. #5011), but that's a potentially breaking change and taking a little while to merge. This is a much simpler change which won't break anything, but will allow a "Type": "wireguard" reference in the "--flannel-conf" custom config file to work. Signed-off-by:
Euan Kemp <euank@euank.com>
-
- 30 Mar, 2022 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 28 Mar, 2022 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 25 Mar, 2022 1 commit
-
-
Brad Davidson authored
Improve feedback when running secrets-encrypt commands on etcd-only nodes, and allow etcd-only nodes to properly restart when effecting rotation. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit e811689d)
-
- 23 Mar, 2022 1 commit
-
-
Brad Davidson authored
Closing idle connections isn't guaranteed to close out a pooled connection to a loadbalancer endpoint that has been removed. Instead, ensure that requests used to wait for the apiserver to become ready aren't reused. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 19 Mar, 2022 2 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 18 Mar, 2022 2 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
This allows secondary etcd nodes to bootstrap the kubelet before an apiserver joins the cluster. Rancher waits for all the etcd nodes to come up before adding the control-plane nodes, so this needs to be handled properly. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 38706eee)
-
- 16 Mar, 2022 3 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit f090bf2d)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit a7878db1)
-