- 01 Jun, 2022 1 commit
-
-
Brad Davidson authored
The cloud-provider arg is deprecated and cannot be set to anything other than external, but must still be used or node addresses are not set properly. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 26 May, 2022 1 commit
-
-
Hussein Galal authored
Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com>
-
- 20 May, 2022 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 19 May, 2022 1 commit
-
-
Jacob Blain Christen authored
resigning from rancher
-
- 18 May, 2022 4 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Manuel Buil authored
* Give kubelet all node-ips Signed-off-by:
Manuel Buil <mbuil@suse.com> Co-authored-by:
Brad Davidson <brad.davidson@rancher.com>
-
Euan Kemp authored
This entry wasn't of a correct format, which meant it resulted in errors for some operations, such as: ``` $ go mod download go mod download: github.com/k3s-io/etcd@v3.4.18-k3s1+incompatible: invalid version: module contains a go.mod file, so module path must match major version ("github.com/k3s-io/etcd/v3") ``` `go build` did not complain, so the release still worked, but some build processes desire to fetch dependencies and then compile offline or such. The extra etcd entry appears to not be actually used, so it seems safe to delete it. A few other diffs in the go.sum file are from a `go mod tidy`. Signed-off-by:
Euan Kemp <euank@euank.com>
-
Donnie Adams authored
* Remove objects when removed from manifests If a user puts a file in /var/lib/rancher/k3s/server/manifests/ then the objects contained therein are deployed to the cluster. If the objects are removed from that file, they are not removed from the cluster. This change tracks the GVKs in the files and will remove objects when there are removed from the cluster. Signed-off-by:
Donnie Adams <donnie.adams@suse.com>
-
- 11 May, 2022 12 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Also update all use of 'go get' => 'go install', update CI tooling for 1.18 compatibility, and gofmt everything so lint passes. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 04 May, 2022 4 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Manuel Buil authored
Add "ipFamilyPolicy: PreferDualStack" to have dual-stack ingress support
-
Manuel Buil authored
Signed-off-by:
Manuel Buil <mbuil@suse.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 03 May, 2022 2 commits
-
-
Manuel Buil authored
Check if user has a correct cluster-cidr and service-cidr config
-
Manuel Buil authored
Signed-off-by:
Manuel Buil <mbuil@suse.com>
-
- 30 Apr, 2022 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 29 Apr, 2022 11 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Derek Nola authored
* Add shell completion CLI Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Brad Davidson authored
Reduces code complexity a bit and ensures we don't have to handle closed watch channels on our own Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Michal Rostecki authored
After previous changes, network policies are working on IPv6-only installations. Signed-off-by:
Michal Rostecki <vadorovsky@gmail.com>
-
Michal Rostecki authored
Before this change, kube-router was always assuming that IPv4 is enabled, which is not the case in IPv6-only clusters. To enable network policies in IPv6-only, we need to explicitly let kube-router know when to disable IPv4. Signed-off-by:
Michal Rostecki <vadorovsky@gmail.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
This gives nicer errors from Kubernetes components during startup, and reduces LOC a bit by using the upstream responsewriters module instead of writing the headers and body by hand. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 27 Apr, 2022 1 commit
-
-
Brad Davidson authored
* Bump etcd to v3.5.4-k3s1 * Fix issue with datastore corruption on cluster-reset * Disable unnecessary components during cluster reset Disable control-plane components and the tunnel setup during cluster-reset, even when not doing a restore. This reduces the amount of log clutter during cluster reset/restore, making any errors encountered more obvious. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 25 Apr, 2022 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-