- 22 Mar, 2023 1 commit
-
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
- 17 Mar, 2023 1 commit
-
-
Brooks Newberry authored
-
- 14 Mar, 2023 2 commits
-
-
Brad Davidson authored
We need to send the full chain in order for cross-signing to work properly during switchover to a new root. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 13 Mar, 2023 5 commits
-
-
Derek Nola authored
* Add a warning to the config.toml file Signed-off-by:
Derek Nola <derek.nola@suse.com> Co-authored-by:
Brad Davidson <brad@oatmail.org>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Daishan Peng authored
Signed-off-by:
Daishan Peng <daishan@acorn.io>
-
Derek Nola authored
* Enable dependabot on 1.25 Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
Derek Nola authored
* Match flannel for x/net * Match containerd for x/sys * Update replace for go-gax * Isolate e2e terraform depedencies * Bump containerd * Bump wrangler to 1.1.1 Signed-off-by:
Derek Nola <derek.nola@suse.com>
-
- 11 Mar, 2023 1 commit
-
-
Roberto Bonafiglia authored
* Update kube-router version to fix iptables rules Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com> * Update Flannel to v0.21.3 Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com> --------- Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
- 01 Mar, 2023 1 commit
-
-
Matt Trachier authored
* Update to v1.25.7 * update gh workflows and docker files to proper go version --------- Signed-off-by:
matttrach <matttrach@gmail.com>
-
- 24 Feb, 2023 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 21 Feb, 2023 2 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 14 Feb, 2023 3 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Turns out etcd-only nodes were never running **any** of the controllers, so allowing multiple controllers didn't really fix things. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 10 Feb, 2023 21 commits
-
-
Brad Davidson authored
Addresses an issue where etcd controllers did not run on etcd-only nodes Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
Roberto Bonafiglia authored
Signed-off-by:
Roberto Bonafiglia <roberto.bonafiglia@suse.com>
-
Paul Donohue authored
Signed-off-by:
Paul Donohue <git@PaulSD.com> Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit b43dd774)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit c900089e)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 87f9c4ab)
-
Brad Davidson authored
Allow bootstrapping with kubeadm bootstrap token strings or existing Kubelet certs. This allows agents to join the cluster using kubeadm bootstrap tokens, as created with the `k3s token create` command. When the token expires or is deleted, agents can successfully restart by authenticating with their kubelet certificate via node authentication. If the token is gone and the node is deleted from the cluster, node auth will fail and they will be prevented from rejoining the cluster until provided with a valid token. Servers still must be bootstrapped with the static cluster token, as they will need to know it to decrypt the bootstrap data. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 992e6499)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 373df1c8)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit be7f7518)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 8a6404f9)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 9b6b7294)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit f13768c2)
-
Brad Davidson authored
This command must be run on a server while the service is running. After this command completes, all the servers in the cluster should be restarted to load the new CA files. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 215fb157)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 3c324335)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 58d40327)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 0919ec67)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 1ec242d8)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Prevents errors when starting with fail-closed webhooks Also, use panic instead of Fatalf so that the CloudControllerManager rescue can handle the error Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 09 Feb, 2023 2 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 1c6fde9a)
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 369b81b4)
-