- 19 Aug, 2022 1 commit
-
-
Brooks Newberry authored
Signed-off-by:
Brooks Newberry <brooks@newberry.com>
-
- 18 Aug, 2022 2 commits
-
-
Brooks Newberry authored
-
Derek Nola authored
Signed-off-by:
Derek Nola <derek.nola@suse.com> (cherry picked from commit 035c03cf)
-
- 08 Aug, 2022 1 commit
-
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
- 04 Aug, 2022 11 commits
-
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 43508341) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Vladimir Kochnev authored
Having separate tokens for server and agent nodes is a nice feature. However, passing server's plain `K3S_AGENT_TOKEN` value to `k3s agent --token` without CA hash is insecure when CA is self-signed, and k3s warns about it in the logs: ``` Cluster CA certificate is not trusted by the host CA bundle, but the token does not include a CA hash. Use the full token from the server's node-token file to enable Cluster CA validation. ``` Okay so I need CA hash but where should I get it? This commit attempts to fix this issue by saving agent token value to `agent-token` file with CA hash appended. Signed-off-by:
Vladimir Kochnev <hashtable@yandex.ru> (cherry picked from commit 13af0b1d) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 04900445) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Requires tweaking existing method signature to allow specifying whether or not IPv6 addresses should be return URL-safe. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 5eaa0a94) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 84fb8787) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
* Use INVOCATION_ID to detect execution under systemd, since as of a9b5a193 NOTIFY_SOCKET is now cleared by the server code. * Set the unit type to notify by default for both server and agent, which is what Rancher-managed installs have done for a while. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit bd5fdfce) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Addressess issue where the compact may take more than 10 seconds on slower disks. These disks probably aren't really suitable for etcd, but apparently run fine otherwise. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 1674b9d6) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Dirk Müller authored
This avoids an issue with u-root 7.0.0 which has been retracted by the author: $ go list -u -m all $ go list -m: github.com/u-root/u-root@v7.0.0+incompatible: retracted by module author: Published v7 too early (before migrating to go modules) Signed-off-by:
Dirk Müller <dirk@dmllr.de> (cherry picked from commit 93ca992c) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Derek Nola authored
* Update etcd error to match correct url * Bump macos version used in GH actions. Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 03 Aug, 2022 1 commit
-
-
Derek Nola authored
Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 15 Jul, 2022 1 commit
-
-
Nikolai Shields authored
Signed-off-by:
Nikolai Shields <nikolai@nikolaishields.com>
-
- 12 Jul, 2022 6 commits
-
-
Brad Davidson authored
* Increase the default snapshot timeout. The timeout is not currently configurable from Rancher, and larger clusters are frequently seeing uploads fail at 30 seconds. * Enable compression for scheduled snapshots if enabled on the command-line. The CLI flag was not being passed into the etcd config. * Only set the S3 content-type to application/zip if the file is zipped. * Don't run more than one snapshot at once, to prevent misconfigured etcd snapshot cron schedules from stacking up. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Includes fix for ENOSYS/EPERM issue on s390x. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Includes fix for recently identified memory leak. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
87e1806697cd7dfffb7cb0de73c85e889365780d removed the OwnerReferences field from the DaemonSet, which makes sense since the Service may now be in a different namespace than the DaemonSet and cross-namespace owner references are not supported. Unfortunately, we were relying on garbage collection to delete the DameonSet, so this started leaving orphaned DaemonSets when Services were deleted. We don't want to add an a Service OnRemove handler, since this will add finalizers to all Services, not just LoadBalancers services, causing conformance tests to fail. Instead, manage our own finalizers, and restore the DaemonSet removal Event that was removed by the same commit. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Since #4438 removed 2-way sync and treats any changed+newer files on disk as an error, we no longer need to determine if files are newer on disk/db or if there is a conflicting mix of both. Any changed+newer file is an error, unless we're doing a cluster reset in which case everything is unconditionally replaced. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Properly skip restoring bootstrap data for files that don't have a path set because the feature that would set it isn't enabled. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 01 Jul, 2022 3 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Service.Spec.IPFamilyPolicy may be a nil pointer on freshly upgraded clusters. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Use same kubelet-preferred-address-types setting as RKE2 to improve reliability of the egress selector when using a HTTP proxy. Also, use BindAddressOrLoopback to ensure that the correct supervisor address is used when --bind-address is set. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 30 Jun, 2022 3 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Properly handle unset egress-selector-mode from existing servers during cluster upgrade. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Derek Nola authored
Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 22 Jun, 2022 1 commit
-
-
Nikolai Shields authored
Update to v1.23.8-k3s1
-
- 21 Jun, 2022 1 commit
-
-
galal-hussein authored
Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com>
-
- 16 Jun, 2022 6 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Darren Shepherd authored
This parameter controls which namespace the klipper-lb pods will be create. It defaults to kube-system so that k3s does not by default create a new namespace. It can be changed if users wish to isolate the pods and apply some policy to them. Signed-off-by:
Darren Shepherd <darren@acorn.io> (cherry picked from commit e6009b1e) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Darren Shepherd authored
The baseline PodSecurity profile will reject klipper-lb pods from running. Since klipper-lb pods are put in the same namespace as the Service this means users can not use PodSecurity baseline profile in combination with the k3s servicelb. The solution is to move all klipper-lb pods to a klipper-lb-system where the security policy of the klipper-lb pods can be different an uniformly managed. Signed-off-by:
Darren Shepherd <darren@acorn.io> (cherry picked from commit f4cc1b87) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Roberto Bonafiglia authored
[Release 1.23] Flannel version update to 0.18.1 and added the ability to configure additional options for wireguard backend
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
Sjoerd Simons authored
Allow the flannel backend to be specified as backend=option=val,option2=val2 to select a given backend with extra options. In particular this adds the following options to wireguard-native backend: * Mode - flannel wireguard tunnel mode * PersistentKeepaliveInterval- wireguard persistent keepalive interval Signed-off-by:
Sjoerd Simons <sjoerd@collabora.com>
-
- 15 Jun, 2022 3 commits
-
-
Derek Nola authored
* Move startup hooks wg into a runtime pointer, check before notifying systemd * Switch default systemd notification to server * Add 1 sec delay to allow etcd to write to disk Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-