- 18 Jun, 2021 1 commit
-
-
Derek Nola authored
* Update to v1.21.2 Signed-off-by:
dereknola <derek.nola@suse.com>
-
- 16 Jun, 2021 1 commit
-
-
Derek Nola authored
Signed-off-by:
dereknola <derek.nola@suse.com>
-
- 15 Jun, 2021 2 commits
-
-
Brian Downs authored
* update agent to sent systemd notify after everything starts
-
Derek Nola authored
Changed iptables version check for fail if version is between 1.8.0 and 1.8.3 and using nf_tables mode (#3454) Signed-off-by:
dereknola <derek.nola@suse.com>
-
- 08 Jun, 2021 2 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brian Downs authored
[ Backport 1.21 ] - etcd subcommands 1.21
-
- 07 Jun, 2021 2 commits
-
-
Derek Nola authored
* Changed cloud-controller-manager user name in ccm.yaml * Changed RBAC name in server.go and deps.go Signed-off-by:
dereknola <derek.nola@suse.com>
-
Manuel Buil authored
[Backport 1.21] Add a path for wireguard's privatekey
-
- 04 Jun, 2021 3 commits
-
-
Manuel Buil authored
[Backport 1.21] Update flannel version
-
Manuel Buil authored
Signed-off-by:
Manuel Buil <mbuil@suse.com>
-
Manuel Buil authored
Signed-off-by:
Manuel Buil <mbuil@suse.com>
-
- 20 May, 2021 3 commits
-
-
Erik Wilson authored
[backport 1.21] containerd: v1.4.4-k3s2
-
Jacob Blain Christen authored
Pull in backport of containerd/containerd#5017 Addresses #3296 Signed-off-by:
Jacob Blain Christen <dweomer5@gmail.com>
-
Jacob Blain Christen authored
- Addresses #3299 Signed-off-by:
Jacob Blain Christen <dweomer5@gmail.com>
-
- 19 May, 2021 4 commits
-
-
Brian Downs authored
Signed-off-by:
Brian Downs <brian.downs@gmail.com>
-
Brian Downs authored
Signed-off-by:
Brian Downs <brian.downs@gmail.com>
-
Brian Downs authored
Signed-off-by:
Brian Downs <brian.downs@gmail.com>
-
Brad Davidson authored
(cherry picked from commit 7e175e8a) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 14 May, 2021 3 commits
-
-
Erik Wilson authored
Update Kubernetes to v1.21.1-k3s1
-
Erik Wilson authored
-
Erik Wilson authored
-
- 13 May, 2021 2 commits
-
-
Brian Downs authored
* add prune subcommand to force rentention policy enforcement
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 12 May, 2021 4 commits
-
-
Menna Elmasry authored
change --disable-api-server flag to --disable-apiserver
-
MonzElmasry authored
Signed-off-by:
MonzElmasry <menna.elmasry@rancher.com>
-
Jacob Blain Christen authored
- bump the runc version to v1.0.0-rc94 - build runc from its own source tree instead of from ./vendor/ - side-steps incompatibility with upstream kubelet container manager Signed-off-by:
Jacob Blain Christen <dweomer5@gmail.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 11 May, 2021 1 commit
-
-
Brian Downs authored
* add ability to list local and s3 etcd snapshots
-
- 10 May, 2021 3 commits
-
-
Brad Davidson authored
* Move registries.yaml handling out to rancher/wharfie * Add system-default-registry support * Add CLI support for kubelet image credential providers Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Hussein Galal authored
Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 07 May, 2021 1 commit
-
-
Brian Downs authored
* Add the ability to delete a given set of etcd snapshots from the CLI for locally stored and S3 store snapshots.
-
- 05 May, 2021 6 commits
-
-
Siegfried Weber authored
Problem: Only the client CA is passed to the kube-controller-manager and therefore CSRs with the signer name "kubernetes.io/kubelet-serving" are signed with the client CA. Serving certificates must be signed with the server CA otherwise e.g. "kubectl logs" fails with the error message "x509: certificate signed by unknown authority". Solution: Instead of providing only one CA via the kube-controller-manager parameter "--cluster-signing-cert-file", the corresponding CA for every signer is set with the parameters "--cluster-signing-kube-apiserver-client-cert-file", "--cluster-signing-kubelet-client-cert-file", "--cluster-signing-kubelet-serving-cert-file", and "--cluster-signing-legacy-unknown-cert-file". Signed-off-by:
Siegfried Weber <mail@siegfriedweber.net>
-
Akihiro Suda authored
Add `.github/workflows/cgroup2.yaml` for running Fedora on Vagrant on GitHub Actions to test cgroup2 environment. Only very basic smoke tests are executed, as Vagrant is too slow to run the entire sonobuoy. Relevant: - kubernetes-sigs/kind PR 2017 - https://github.com/rootless-containers/usernetes/blob/v20210201.0/.github/workflows/main.yamlSigned-off-by:
Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
-
Menna Elmasry authored
Add ci step to validate incorrect replacement fork
-
Menna Elmasry authored
Co-authored-by:
Brian Downs <brian.downs@gmail.com>
-
Hussein Galal authored
Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com>
-
MonzElmasry authored
Signed-off-by:
MonzElmasry <menna.elmasry@rancher.com>
-
- 04 May, 2021 2 commits
-
-
Brian Downs authored
Reference node name when needed
-
Brian Downs authored
Signed-off-by:
Brian Downs <brian.downs@gmail.com>
-