- 14 May, 2021 3 commits
-
-
Erik Wilson authored
Update Kubernetes to v1.21.1-k3s1
-
Erik Wilson authored
-
Erik Wilson authored
-
- 13 May, 2021 2 commits
-
-
Brian Downs authored
* add prune subcommand to force rentention policy enforcement
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 12 May, 2021 4 commits
-
-
Menna Elmasry authored
change --disable-api-server flag to --disable-apiserver
-
MonzElmasry authored
Signed-off-by:
MonzElmasry <menna.elmasry@rancher.com>
-
Jacob Blain Christen authored
- bump the runc version to v1.0.0-rc94 - build runc from its own source tree instead of from ./vendor/ - side-steps incompatibility with upstream kubelet container manager Signed-off-by:
Jacob Blain Christen <dweomer5@gmail.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 11 May, 2021 1 commit
-
-
Brian Downs authored
* add ability to list local and s3 etcd snapshots
-
- 10 May, 2021 3 commits
-
-
Brad Davidson authored
* Move registries.yaml handling out to rancher/wharfie * Add system-default-registry support * Add CLI support for kubelet image credential providers Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Hussein Galal authored
Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 07 May, 2021 1 commit
-
-
Brian Downs authored
* Add the ability to delete a given set of etcd snapshots from the CLI for locally stored and S3 store snapshots.
-
- 05 May, 2021 6 commits
-
-
Siegfried Weber authored
Problem: Only the client CA is passed to the kube-controller-manager and therefore CSRs with the signer name "kubernetes.io/kubelet-serving" are signed with the client CA. Serving certificates must be signed with the server CA otherwise e.g. "kubectl logs" fails with the error message "x509: certificate signed by unknown authority". Solution: Instead of providing only one CA via the kube-controller-manager parameter "--cluster-signing-cert-file", the corresponding CA for every signer is set with the parameters "--cluster-signing-kube-apiserver-client-cert-file", "--cluster-signing-kubelet-client-cert-file", "--cluster-signing-kubelet-serving-cert-file", and "--cluster-signing-legacy-unknown-cert-file". Signed-off-by:
Siegfried Weber <mail@siegfriedweber.net>
-
Akihiro Suda authored
Add `.github/workflows/cgroup2.yaml` for running Fedora on Vagrant on GitHub Actions to test cgroup2 environment. Only very basic smoke tests are executed, as Vagrant is too slow to run the entire sonobuoy. Relevant: - kubernetes-sigs/kind PR 2017 - https://github.com/rootless-containers/usernetes/blob/v20210201.0/.github/workflows/main.yamlSigned-off-by:
Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
-
Menna Elmasry authored
Add ci step to validate incorrect replacement fork
-
Menna Elmasry authored
Co-authored-by:
Brian Downs <brian.downs@gmail.com>
-
Hussein Galal authored
Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com>
-
MonzElmasry authored
Signed-off-by:
MonzElmasry <menna.elmasry@rancher.com>
-
- 04 May, 2021 3 commits
-
-
Brian Downs authored
Reference node name when needed
-
Brian Downs authored
Signed-off-by:
Brian Downs <brian.downs@gmail.com>
-
Vegetto authored
Signed-off-by:
angelnu <git@angelnucom>
-
- 01 May, 2021 3 commits
-
-
Brian Downs authored
remove accidentially commited dapper files
-
Brian Downs authored
Signed-off-by:
Brian Downs <brian.downs@gmail.com>
-
Brian Downs authored
* Add the ability to store local etcd snapshots and etcd snapshots stored in an S3 compatible object store in a ConfigMap.
-
- 30 Apr, 2021 1 commit
-
-
Loren Lisk authored
Just a small typo fix Signed-off-by:
Loren Lisk <loren.lisk@liskl.com>
-
- 29 Apr, 2021 1 commit
-
-
Hussein Galal authored
Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com>
-
- 28 Apr, 2021 1 commit
-
-
Brad Davidson authored
The kube-apiserver cert should have the same SANs in the same order, excluding the extra user-configured SANs since this will only be used in-cluster. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 27 Apr, 2021 2 commits
-
-
Darren Shepherd authored
If key ends in "+" the value of the key is appended to previous values found. If values are string instead of a slice they are automatically converted to a slice of one string. Signed-off-by:
Darren Shepherd <darren@rancher.com>
-
Chris Kim authored
Signed-off-by:
Chris Kim <oats87g@gmail.com>
-
- 21 Apr, 2021 1 commit
-
-
Brad Davidson authored
* Add support for dual-stack cluster/service CIDRs and node addresses Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 19 Apr, 2021 2 commits
-
-
David Nuzik authored
Mark v1.20.6+k3s1 as stable
-
David Nuzik authored
Signed-off-by:
David Nuzik <david.nuzik@rancher.com>
-
- 16 Apr, 2021 2 commits
-
-
David Nuzik authored
-
David Nuzik authored
Add html comments so that helper text is not shown when posting the feature request.
-
- 15 Apr, 2021 1 commit
-
-
Darren Shepherd authored
Configuration will be loaded from config.yaml and then config.yaml.d/*.(yaml|yml) in alphanumeric order. The merging is done by just taking the last value of a key found, so LIFO for keys. Slices are not merged but replaced. Signed-off-by:
Darren Shepherd <darren@rancher.com>
-
- 14 Apr, 2021 3 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Some of the new node compat tests take a while before failing as expected. We don't seem to need the additional time any longer to avoid flakes, so turn it down a bit. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-