- 10 Jun, 2022 2 commits
-
-
Brad Davidson authored
... until QA flakes can be addressed. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
The control-plane context handles requests outside the cluster and should not be sent to the proxy. In agent mode, we don't watch pods and just direct-dial any request for a non-node address, which is the original behavior. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 08 Jun, 2022 1 commit
-
-
Brad Davidson authored
Watching pods appears to be the most reliable way to ensure that the proxy routes and authorizes connections. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 07 Jun, 2022 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 26 May, 2022 1 commit
-
-
Hussein Galal authored
Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com>
-
- 23 May, 2022 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 9d723049)
-
- 21 May, 2022 2 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 1ef34728)
-
Donnie Adams authored
* Remove objects when removed from manifests If a user puts a file in /var/lib/rancher/k3s/server/manifests/ then the objects contained therein are deployed to the cluster. If the objects are removed from that file, they are not removed from the cluster. This change tracks the GVKs in the files and will remove objects when there are removed from the cluster. Signed-off-by:
Donnie Adams <donnie.adams@suse.com> (cherry picked from commit c38a8c3b) Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 11 May, 2022 2 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 04 May, 2022 4 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Manuel Buil authored
Add "ipFamilyPolicy: PreferDualStack" to have dual-stack ingress support
-
Manuel Buil authored
Signed-off-by:
Manuel Buil <mbuil@suse.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 03 May, 2022 2 commits
-
-
Manuel Buil authored
Check if user has a correct cluster-cidr and service-cidr config
-
Manuel Buil authored
Signed-off-by:
Manuel Buil <mbuil@suse.com>
-
- 30 Apr, 2022 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 29 Apr, 2022 11 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Derek Nola authored
* Add shell completion CLI Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Brad Davidson authored
Reduces code complexity a bit and ensures we don't have to handle closed watch channels on our own Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Michal Rostecki authored
After previous changes, network policies are working on IPv6-only installations. Signed-off-by:
Michal Rostecki <vadorovsky@gmail.com>
-
Michal Rostecki authored
Before this change, kube-router was always assuming that IPv4 is enabled, which is not the case in IPv6-only clusters. To enable network policies in IPv6-only, we need to explicitly let kube-router know when to disable IPv4. Signed-off-by:
Michal Rostecki <vadorovsky@gmail.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
This gives nicer errors from Kubernetes components during startup, and reduces LOC a bit by using the upstream responsewriters module instead of writing the headers and body by hand. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 27 Apr, 2022 1 commit
-
-
Brad Davidson authored
* Bump etcd to v3.5.4-k3s1 * Fix issue with datastore corruption on cluster-reset * Disable unnecessary components during cluster reset Disable control-plane components and the tunnel setup during cluster-reset, even when not doing a restore. This reduces the amount of log clutter during cluster reset/restore, making any errors encountered more obvious. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 25 Apr, 2022 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 22 Apr, 2022 1 commit
-
-
Derek Nola authored
* Add RetryOnConflict around updating nodes Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 21 Apr, 2022 2 commits
-
-
Brad Davidson authored
Use ListWatch helpers to retry when the watch channel is closed. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Derek Nola authored
* Go generate * Update tags to k3s-io for v1.23.6 Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 20 Apr, 2022 1 commit
-
-
Manuel Buil authored
Signed-off-by:
Manuel Buil <mbuil@suse.com>
-
- 18 Apr, 2022 1 commit
-
-
Derek Nola authored
* Add basic none option EXTERNAL_DB, uses internal sqlite * Move to Leap as default Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 15 Apr, 2022 5 commits
-
-
Sakala Venkata Krishna Rohit authored
* Update docs to include s390x arch Signed-off-by:
Venkata Krishna Rohit Sakala <rohitsakala@gmail.com> * Add s390x drone pipeline Signed-off-by:
Venkata Krishna Rohit Sakala <rohitsakala@gmail.com> * Install trivy linux arch only for amd64 This is done so that trivy is not installed for s390x arch Signed-off-by:
Venkata Krishna Rohit Sakala <rohitsakala@gmail.com> * Add s390x arch if condition for Dockerfile.test Signed-off-by:
Venkata Krishna Rohit Sakala <rohitsakala@gmail.com> * Add s390x arch in install script Signed-off-by:
Venkata Krishna Rohit Sakala <rohitsakala@gmail.com> * Add s390x GOARCH in build script Signed-off-by:
Venkata Krishna Rohit Sakala <rohitsakala@gmail.com> * Add SUFFIX s390x in scripts Signed-off-by:
Venkata Krishna Rohit Sakala <rohitsakala@gmail.com> * Skip image scan for s390x arch Signed-off-by:
Venkata Krishna Rohit Sakala <rohitsakala@gmail.com> * Update klipper-lb to version v0.3.5 Signed-off-by:
Venkata Krishna Rohit Sakala <rohitsakala@gmail.com> * Update traefik version to v2.6.2 Signed-off-by:
Venkata Krishna Rohit Sakala <rohitsakala@gmail.com> * Update registry to v2.8.1 in tests which supports s390x Signed-off-by:
Venkata Krishna Rohit Sakala <rohitsakala@gmail.com> * Skip compact tests for s390x arch This is done because compact test require a previous k3s version which supports s390x and it is not available Signed-off-by:
Venkata Krishna Rohit Sakala <rohitsakala@gmail.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-