- 17 Mar, 2023 1 commit
-
-
Brooks Newberry authored
-
- 14 Mar, 2023 5 commits
-
-
Derek Nola authored
* Add a warning to the config.toml file Signed-off-by:
Derek Nola <derek.nola@suse.com> Co-authored-by:
Brad Davidson <brad@oatmail.org>
-
Brad Davidson authored
We need to send the full chain in order for cross-signing to work properly during switchover to a new root. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Daishan Peng authored
Signed-off-by:
Daishan Peng <daishan@acorn.io>
-
- 13 Mar, 2023 2 commits
-
-
Derek Nola authored
Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Derek Nola authored
* Match golang.org/x/net with flannel version * Match golang.org/x/sys with containerd version * Update wrangler to 1.1.1 * Update gax-go to v2.1.1 * Isolate E2E terraform dependencies * Bump containerd Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 11 Mar, 2023 1 commit
-
-
Roberto Bonafiglia authored
* Update kube-router version to fix iptables rules Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com> * Update Flannel to v0.21.3 Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com> --------- Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
- 01 Mar, 2023 1 commit
-
-
Matt Trachier authored
* Update to v1.24.11 * the go version will be updated to match upstream in dockerfiles and gh workflows --------- Signed-off-by:
matttrach <matttrach@gmail.com>
-
- 24 Feb, 2023 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 21 Feb, 2023 2 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 14 Feb, 2023 3 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Turns out etcd-only nodes were never running **any** of the controllers, so allowing multiple controllers didn't really fix things. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 10 Feb, 2023 20 commits
-
-
Brad Davidson authored
Addresses an issue where etcd controllers did not run on etcd-only nodes Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
Paul Donohue authored
Signed-off-by:
Paul Donohue <git@PaulSD.com> Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit b43dd774)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit c900089e)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 87f9c4ab)
-
Brad Davidson authored
Allow bootstrapping with kubeadm bootstrap token strings or existing Kubelet certs. This allows agents to join the cluster using kubeadm bootstrap tokens, as created with the `k3s token create` command. When the token expires or is deleted, agents can successfully restart by authenticating with their kubelet certificate via node authentication. If the token is gone and the node is deleted from the cluster, node auth will fail and they will be prevented from rejoining the cluster until provided with a valid token. Servers still must be bootstrapped with the static cluster token, as they will need to know it to decrypt the bootstrap data. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 992e6499)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 373df1c8)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit be7f7518)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 8a6404f9)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 9b6b7294)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit f13768c2)
-
Brad Davidson authored
This command must be run on a server while the service is running. After this command completes, all the servers in the cluster should be restarted to load the new CA files. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 215fb157)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 3c324335)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 58d40327)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 0919ec67)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 1ec242d8)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Prevents errors when starting with fail-closed webhooks Also, use panic instead of Fatalf so that the CloudControllerManager rescue can handle the error Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 09 Feb, 2023 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 08 Feb, 2023 2 commits
-
-
Brad Davidson authored
* Bump wrangler version for EndpointSlice support Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 94d1a875) * Honor Service ExternalTrafficPolicy Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 369b81b4) * go generate Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 1c6fde9a)
-
Derek Nola authored
* Ignore conflict secrets Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 07 Feb, 2023 1 commit
-
-
Derek Nola authored
* Consolidate E2E tests and GH Actions (#6772) * Consolidate cluster reset and snapshot E2E tests * Add more context to secrets-encryption test * Reuse build workflow * Convert updatecli to job level permissions * Remove dweomer microos from E2E and install testing Signed-off-by:
Derek Nola <derek.nola@suse.com> * E2E: Consoldiate docker and prefer bundled tests into new startup test (#6851) * Convert docker E2E to startup E2E * Move preferedbundled into the e2e startup test Signed-off-by:
Derek Nola <derek.nola@suse.com> --------- Signed-off-by:
Derek Nola <derek.nola@suse.com>
-