- 22 Sep, 2022 1 commit
-
-
Matt Trachier authored
Signed-off-by:
matttrach <matttrach@gmail.com>
-
- 16 Sep, 2022 1 commit
-
-
Matt Trachier authored
Signed-off-by:
matttrach <matttrach@gmail.com>
-
- 09 Sep, 2022 2 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Also reorder validations to perform the short checks first so that things fail faster if there's a problem. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 8f41fe1a)
-
- 06 Sep, 2022 1 commit
-
-
Derek Nola authored
[Release-1.23] Bulk Backport of Testing Changes
-
- 02 Sep, 2022 2 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
- 01 Sep, 2022 12 commits
-
-
Derek Nola authored
Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Derek Nola authored
* add new data-dir subtest * Added node flag subtest * Fix to E2E tests * Convert existing test to new server logging Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
ShylajaDevadiga authored
Signed-off-by:
Shylaja Devadiga <shylaja@rancher.com> Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Akihiro Suda authored
Signed-off-by:
Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Derek Nola authored
* Convert install tests to run PR version of k3s Signed-off-by:
Derek Nola <derek.nola@suse.com> Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Derek Nola authored
* Add e2e support for centos7 and rocky8 Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Max authored
Signed-off-by:
rancher-max <max.ross@suse.com> Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Derek Nola authored
* Cleanup validatecluster printout * remove deprecated kubectl exec format * Implement CreateLocalCluster function * Update testing documentation Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
ShylajaDevadiga authored
Signed-off-by:
Shylaja Devadiga <shylaja@rancher.com> Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
ShylajaDevadiga authored
Signed-off-by:
Shylaja Devadiga <shylaja.devadiga@suse.com> Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Abirdcfly authored
Signed-off-by:
Abirdcfly <fp544037857@gmail.com> Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Derek Nola authored
Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 19 Aug, 2022 1 commit
-
-
Brooks Newberry authored
Signed-off-by:
Brooks Newberry <brooks@newberry.com>
-
- 18 Aug, 2022 2 commits
-
-
Brooks Newberry authored
-
Derek Nola authored
Signed-off-by:
Derek Nola <derek.nola@suse.com> (cherry picked from commit 035c03cf)
-
- 08 Aug, 2022 1 commit
-
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
- 04 Aug, 2022 11 commits
-
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 43508341) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Vladimir Kochnev authored
Having separate tokens for server and agent nodes is a nice feature. However, passing server's plain `K3S_AGENT_TOKEN` value to `k3s agent --token` without CA hash is insecure when CA is self-signed, and k3s warns about it in the logs: ``` Cluster CA certificate is not trusted by the host CA bundle, but the token does not include a CA hash. Use the full token from the server's node-token file to enable Cluster CA validation. ``` Okay so I need CA hash but where should I get it? This commit attempts to fix this issue by saving agent token value to `agent-token` file with CA hash appended. Signed-off-by:
Vladimir Kochnev <hashtable@yandex.ru> (cherry picked from commit 13af0b1d) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 04900445) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Requires tweaking existing method signature to allow specifying whether or not IPv6 addresses should be return URL-safe. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 5eaa0a94) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 84fb8787) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
* Use INVOCATION_ID to detect execution under systemd, since as of a9b5a193 NOTIFY_SOCKET is now cleared by the server code. * Set the unit type to notify by default for both server and agent, which is what Rancher-managed installs have done for a while. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit bd5fdfce) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Addressess issue where the compact may take more than 10 seconds on slower disks. These disks probably aren't really suitable for etcd, but apparently run fine otherwise. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 1674b9d6) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Dirk Müller authored
This avoids an issue with u-root 7.0.0 which has been retracted by the author: $ go list -u -m all $ go list -m: github.com/u-root/u-root@v7.0.0+incompatible: retracted by module author: Published v7 too early (before migrating to go modules) Signed-off-by:
Dirk Müller <dirk@dmllr.de> (cherry picked from commit 93ca992c) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Derek Nola authored
* Update etcd error to match correct url * Bump macos version used in GH actions. Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 03 Aug, 2022 1 commit
-
-
Derek Nola authored
Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 15 Jul, 2022 1 commit
-
-
Nikolai Shields authored
Signed-off-by:
Nikolai Shields <nikolai@nikolaishields.com>
-
- 12 Jul, 2022 4 commits
-
-
Brad Davidson authored
* Increase the default snapshot timeout. The timeout is not currently configurable from Rancher, and larger clusters are frequently seeing uploads fail at 30 seconds. * Enable compression for scheduled snapshots if enabled on the command-line. The CLI flag was not being passed into the etcd config. * Only set the S3 content-type to application/zip if the file is zipped. * Don't run more than one snapshot at once, to prevent misconfigured etcd snapshot cron schedules from stacking up. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Includes fix for ENOSYS/EPERM issue on s390x. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Includes fix for recently identified memory leak. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
87e1806697cd7dfffb7cb0de73c85e889365780d removed the OwnerReferences field from the DaemonSet, which makes sense since the Service may now be in a different namespace than the DaemonSet and cross-namespace owner references are not supported. Unfortunately, we were relying on garbage collection to delete the DameonSet, so this started leaving orphaned DaemonSets when Services were deleted. We don't want to add an a Service OnRemove handler, since this will add finalizers to all Services, not just LoadBalancers services, causing conformance tests to fail. Instead, manage our own finalizers, and restore the DaemonSet removal Event that was removed by the same commit. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-