Commit Graph

2519 Commits (abb8d7d44e4370f2a4ed2378debbc37907090295)

Author SHA1 Message Date
Manuel Buil a108c76e9d
Merge pull request #6191 from manuelbuil/flannel-external-ip1.23
[Release 1.23] Add flannel-external-ip when there is a k3s node-external-ip
2022-09-29 18:39:25 +02:00
Manuel Buil be9c26a086 Add flannel-external-ip when there is a k3s node-external-ip
Signed-off-by: Manuel Buil <mbuil@suse.com>
2022-09-29 10:05:59 +02:00
Matt Trachier 66309a8ee5
Update to v1.23.12 (#6166)
Signed-off-by: matttrach <matttrach@gmail.com>
2022-09-22 00:12:57 -05:00
Matt Trachier b3f1e2341c
Update to v1.23.11 (#6144)
Signed-off-by: matttrach <matttrach@gmail.com>
2022-09-16 13:38:19 -05:00
Brad Davidson 48fa8a6564 Bump golang to correct version
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-09-09 16:11:13 -07:00
Brad Davidson b3984e3924 Add validation check to confirm correct golang version for Kubernetes
Also reorder validations to perform the short checks first so that
things fail faster if there's a problem.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 8f41fe1a3f)
2022-09-09 16:11:13 -07:00
Derek Nola d251b63e0c
Merge pull request #6086 from dereknola/test_bulk_123
[Release-1.23] Bulk Backport of Testing Changes
2022-09-06 09:05:06 -07:00
Brad Davidson b3990766e4 Bump runc to v1.1.4
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-09-02 12:18:51 -07:00
Roberto Bonafiglia 821141f839 Update Flannel to v0.19.2 to fix older iptables issue
Signed-off-by: Roberto Bonafiglia <roberto.bonafiglia@suse.com>
2022-09-02 17:19:02 +02:00
Derek Nola bc658e0275 Change nightly install to v1.23 channel
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-09-01 15:11:26 -07:00
Derek Nola ca8f99df85 Expand startup integration test (#6030)
* add new data-dir subtest
* Added node flag subtest
* Fix to E2E tests
* Convert existing test to new server logging

Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-09-01 15:08:49 -07:00
ShylajaDevadiga 5366a314f7 Fix e2e tests (#6018)
Signed-off-by: Shylaja Devadiga <shylaja@rancher.com>
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-09-01 15:08:49 -07:00
Akihiro Suda 1cbaf417f6 CI: update Fedora 34 -> 35 (#5996)
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-09-01 15:08:49 -07:00
Derek Nola a2d51abf59 Convert install tests to run PR build of k3s (#6003)
* Convert install tests to run PR version of k3s

Signed-off-by: Derek Nola <derek.nola@suse.com>

Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-09-01 15:08:49 -07:00
Derek Nola 57d8e6f805 E2E: Add support for CentOS 7 and Rocky 8 (#6015)
* Add e2e support for centos7 and rocky8

Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-09-01 15:08:49 -07:00
Max 3f017c98c5 Add nightly install github action (#5998)
Signed-off-by: rancher-max <max.ross@suse.com>
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-09-01 15:08:49 -07:00
Derek Nola 9167cc0ce3 E2E: Local cluster testing (#5977)
* Cleanup validatecluster printout
* remove deprecated kubectl exec format
* Implement CreateLocalCluster function
* Update testing documentation

Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-09-01 15:08:49 -07:00
ShylajaDevadiga f810de8654 Update run scripts (#5979)
Signed-off-by: Shylaja Devadiga <shylaja@rancher.com>
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-09-01 15:08:49 -07:00
ShylajaDevadiga eca4c12705 Add scripts to run e2e test using ansible (#5134)
Signed-off-by: Shylaja Devadiga <shylaja.devadiga@suse.com>
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-09-01 15:08:49 -07:00
Abirdcfly 7a50e7803d fix checkError in terraform/testutils (#5893)
Signed-off-by: Abirdcfly <fp544037857@gmail.com>
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-09-01 15:08:49 -07:00
Derek Nola 5787c65810 Convert vagrant tests to yaml based config (#5992)
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-09-01 15:08:49 -07:00
Brooks Newberry 826b9498df
Update to v1.23.10 (#6013)
Signed-off-by: Brooks Newberry <brooks@newberry.com>
2022-08-18 19:09:59 -07:00
Brooks Newberry 5b2d652a46
Merge pull request #6011 from brooksn/codespell-fix-release-1.23 2022-08-18 14:26:15 -07:00
Derek Nola 5c5201f724 Remove codespell from Drone, add to GH Actions (#6004)
Signed-off-by: Derek Nola <derek.nola@suse.com>
(cherry picked from commit 035c03cfaa)
2022-08-18 13:28:21 -07:00
Roberto Bonafiglia d04af60aad Updated flannel to v0.19.1
Signed-off-by: Roberto Bonafiglia <roberto.bonafiglia@suse.com>
2022-08-08 09:58:17 +02:00
Roberto Bonafiglia c366ee06de Fix comments and add check in case of IPv6 only node
Signed-off-by: Roberto Bonafiglia <roberto.bonafiglia@suse.com>
2022-08-04 18:47:13 +02:00
Roberto Bonafiglia b5f2344283 Added NodeIP autodect in case of dualstack connection
Signed-off-by: Roberto Bonafiglia <roberto.bonafiglia@suse.com>
2022-08-04 18:47:13 +02:00
Brad Davidson a079a653d5 Bump minio to v7.0.33
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 43508341c1)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-04 09:39:34 -07:00
Vladimir Kochnev c94dd33012 Save agent token to /var/lib/rancher/k3s/server/agent-token
Having separate tokens for server and agent nodes is a nice feature.

However, passing server's plain `K3S_AGENT_TOKEN` value
to `k3s agent --token` without CA hash is insecure when CA is
self-signed, and k3s warns about it in the logs:

```
Cluster CA certificate is not trusted by the host CA bundle, but the token does not include a CA hash.
Use the full token from the server's node-token file to enable Cluster CA validation.
```

Okay so I need CA hash but where should I get it?

This commit attempts to fix this issue by saving agent token value to
`agent-token` file with CA hash appended.

Signed-off-by: Vladimir Kochnev <hashtable@yandex.ru>
(cherry picked from commit 13af0b1d88)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-04 09:39:34 -07:00
Brad Davidson fab4d06ef5 Bump dynamiclistener to fix issue with cert expiration
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 049004455a)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-04 09:39:34 -07:00
Brad Davidson 4afe65bff5 Replace getLocalhostIP with Loopback helper method
Requires tweaking existing method signature to allow specifying whether or not IPv6 addresses should be return URL-safe.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 5eaa0a9422)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-04 09:39:34 -07:00
Brad Davidson 15100b5081 Add service-cluster-ip-range to controller-manager args
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 84fb8787f2)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-04 09:39:34 -07:00
Brad Davidson 89f4bce6d7 Fix server systemd detection
* Use INVOCATION_ID to detect execution under systemd, since as of a9b5a1933f NOTIFY_SOCKET is now cleared by the server code.
* Set the unit type to notify by default for both server and agent, which is what Rancher-managed installs have done for a while.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit bd5fdfce33)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-04 09:39:34 -07:00
Brad Davidson 74d017cda2 Raise etcd connection test timeout to 30 seconds
Addressess issue where the compact may take more than 10 seconds on slower disks. These disks probably aren't really suitable for etcd, but apparently run fine otherwise.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 1674b9d640)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-04 09:39:34 -07:00
Dirk Müller 8f76c3630b update rootlesskit to 1.0.1
This avoids an issue with u-root 7.0.0 which has been retracted by the
author:

  $ go list -u -m all
  $ go list -m: github.com/u-root/u-root@v7.0.0+incompatible: retracted by module author: Published v7 too early (before migrating to go modules)

Signed-off-by: Dirk Müller <dirk@dmllr.de>
(cherry picked from commit 93ca992cdb)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-04 09:39:34 -07:00
Derek Nola 3bcd7cee81
[Release-1.23] Update etcd error to match correct url (#5949)
* Update etcd error to match correct url 
* Bump macos version used in GH actions.

Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-08-03 20:10:07 -07:00
Derek Nola 313dd6e597
Fix secrets reencryption for 8K+ secrets (#5939)
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-08-03 09:10:04 -07:00
Nikolai Shields f45cf32673
Update to v1.23.9 (#5871)
Signed-off-by: Nikolai Shields <nikolai@nikolaishields.com>
2022-07-15 02:16:51 -05:00
Brad Davidson ea29d624ad Address issues with etcd snapshots
* Increase the default snapshot timeout. The timeout is not currently
  configurable from Rancher, and larger clusters are frequently seeing
  uploads fail at 30 seconds.
* Enable compression for scheduled snapshots if enabled on the
  command-line. The CLI flag was not being passed into the etcd config.
* Only set the S3 content-type to application/zip if the file is zipped.
* Don't run more than one snapshot at once, to prevent misconfigured
  etcd snapshot cron schedules from stacking up.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-12 14:42:10 -07:00
Brad Davidson 4c0de2183e Bump runc version to v1.1.3
Includes fix for ENOSYS/EPERM issue on s390x.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-12 12:29:04 -07:00
Brad Davidson 118f9a9f53 Bump remotedialer
Includes fix for recently identified memory leak.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-12 12:29:04 -07:00
Brad Davidson beb6e4c8da Fix deletion of svclb DaemonSet when Service is deleted
87e1806697 removed the OwnerReferences
field from the DaemonSet, which makes sense since the Service may now be
in a different namespace than the DaemonSet and cross-namespace owner
references are not supported.  Unfortunately, we were relying on
garbage collection to delete the DameonSet, so this started leaving
orphaned DaemonSets when Services were deleted.

We don't want to add an a Service OnRemove handler, since this will add
finalizers to all Services, not just LoadBalancers services, causing
conformance tests to fail. Instead, manage our own finalizers, and
restore the DaemonSet removal Event that was removed by the same commit.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-12 12:28:20 -07:00
Brad Davidson 81c8f89c4b Remove legacy bidirectional datastore sync code
Since #4438 removed 2-way sync and treats any changed+newer files on disk as an error, we no longer need to determine if files are newer on disk/db or if there is a conflicting mix of both. Any changed+newer file is an error, unless we're doing a cluster reset in which case everything is unconditionally replaced.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-12 12:10:42 -07:00
Brad Davidson b146f27bc9 Fix fatal error when reconciling bootstrap data
Properly skip restoring bootstrap data for files that don't have a path
set because the feature that would set it isn't enabled.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-12 12:10:42 -07:00
Brad Davidson fe3cecc219 Bump kine to v0.9.3
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-01 11:16:59 -07:00
Brad Davidson 9cee7bd5dd Don't crash when service IPFamiliyPolicy is not set
Service.Spec.IPFamilyPolicy may be a nil pointer on freshly upgraded clusters.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-01 11:16:59 -07:00
Brad Davidson 15ad163208 Fix egress selector proxy/bind-address support
Use same kubelet-preferred-address-types setting as RKE2 to improve reliability of the egress selector when using a HTTP proxy. Also, use BindAddressOrLoopback to ensure that the correct supervisor address is used when --bind-address is set.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-01 11:16:59 -07:00
Brad Davidson fc9ffe6c17 Add tests for down-level etcd join
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-06-30 15:11:04 -07:00
Brad Davidson 7287947726 Handle egress-selector-mode change during upgrade
Properly handle unset egress-selector-mode from existing servers during cluster upgrade.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-06-30 15:11:04 -07:00
Derek Nola 243c741849
Remove go-powershell dependency (#5778)
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-06-30 10:15:12 -07:00