Commit Graph

27 Commits (cd25bbee468fe00c2bc6ea7eefc7de7e6846e526)

Author SHA1 Message Date
Jordan Liggitt 7e98e06e48
Include system:masters group in the bootstrap admin client certificate 2017-01-16 14:01:24 -05:00
Ritesh H Shukla 35a750ac21 Remove kube-up for vsphere 2016-12-22 20:15:37 +00:00
David McMahon ef0c9f0c5b Remove "All rights reserved" from all the headers. 2016-06-29 17:47:36 -07:00
Weixu Zhuang e35c1ccba2 Implement Azure cloud provider scripts
Implement basic cloud provider functionality to deploy Kubernetes on
Azure.  SaltStack is used to deploy Kubernetes on top of Ubuntu
virtual machines.  OpenVpn provides network connectivity.  For
kubelet authentication, we use basic authentication (username and
password).  The scripts use the legacy Azure Service Management APIs.

We have set up a nightly test job in our Jenkins server for federated
testing to run the e2e test suite on Azure.  With the cloud provider
scripts in this commit, 14 e2e test cases pass in this environment.
We plan to implement additional Azure functionality to support more
test cases.
2016-06-17 23:46:03 -07:00
Weixu Zhuang 4523429b20 Azure/ubuntu/saltstack support re-instated
This first reverts commit 8e8437dad8.
Also resolves conflicts with docs on f334fc41
And resolves conflicts with https://github.com/kubernetes/kubernetes/pull/22231/commits
to make people switching between two different methods of setting up by
setting env variables.

Conflicts:
	cluster/get-kube.sh
	cluster/saltbase/salt/README.md
	cluster/saltbase/salt/kube-proxy/default
	cluster/saltbase/salt/top.sls
2016-06-17 23:41:41 -07:00
Alain Roy fa9d79df75 Initial kube-up support for VMware's Photon Controller
This is for: https://github.com/kubernetes/kubernetes/issues/24121

Photon Controller is an open-source cloud management platform. More
information is available at:
http://vmware.github.io/photon-controller/

This commit provides initial support for Photon Controller. The
following features are tested and working:
- kube-up and kube-down
- Basic pod and service management
- Networking within the Kubernetes cluster
- UI and DNS addons

It has been tested with a Kubernetes cluster of up to 10
nodes. Further work on scaling is planned for the near future.

Internally we have implemented continuous integration testing and will
run it multiple times per day against the Kubernetes master branch
once this is integrated so we can quickly react to problems.

A few things have not yet been implemented, but are planned:
- Support for kube-push
- Support for test-build-release, test-setup, test-teardown

Assuming this is accepted for inclusion, we will write documentation
for the kubernetes.io site.

We have included a script to help users configure Photon Controller
for use with Kubernetes. While not required, it will help some
users get started more quickly. It will be documented.

We are aware of the kube-deploy efforts and will track them and
support them as appropriate.
2016-04-25 13:24:16 -07:00
k8s-merge-robot 5191cfc415 Merge pull request #20931 from gswallow/master
Auto commit by PR queue bot
2016-03-07 06:18:53 -08:00
weixu b3f3a80667 Set the default value for DEBUG in cluster/saltbase/salt/generate-cert/make-ca-cert.sh
In commit 07d7cfd3, people add ${DEBUG} == "true" in file
cluster/saltbase/salt/generate-cert/make-ca-cert.sh
But the default value for DEBUG is not set. In that commit, it set the value
of DEBUG in cluster/ubuntu/util.sh where it call this script. When using this
script in saltstack to bring up cluster in other cloud platforms, it will fail
to generate the cert since we set set -o nounset in make-ca-cert.sh and var DEBUG
does not set. Set a default value for DEBUG here will fix this problem.
2016-02-16 16:03:20 -08:00
k8s-merge-robot 396287aad9 Merge pull request #21110 from MikeSpreitzer/issue/21037
Auto commit by PR queue bot
2016-02-15 01:15:20 -08:00
Mike Spreitzer 07d7cfd346 Fetch hacked easyrsa in kube-up instead of command run on master
This is good because it removes an obstacle to using the
cluster/ubuntu scripting to install Kubernetes into a restricted
environment where the machines can not open connections to arbitrary
external locations.

Also add debuggability to make-ca-cert.sh

Resolves #21037
Resolves #21092
2016-02-12 14:11:53 -05:00
Greg Swallow 646c22e47c Use local_ipv4 when public_ipv4 is not present. 2016-02-09 16:35:38 -05:00
Michael Faille ce7d5fe6e7 fix : openssl don't exist by default on CentOS docker image
To fix it, I just add openssl depedency on "generate-cert" state. It
should work on Debian-like and RedHat-Like systems. (and, Archlinux,
Opensuse, etc)

Fixed error :
$ sudo salt 'kubernetes-master' state.apply
----------
          ID: kubernetes-cert
    Function: cmd.script
      Result: False
     Comment: Command 'kubernetes-cert' run
     Started: 06:57:06.634203
    Duration: 208.719 ms
     Changes:
              ----------
              pid:
                  793
              retcode:
                  1
              stderr:
                  /tmpm24T3R.sh: line 22: openssl: command not found
                  chgrp: cannot access '/srv/kubernetes/server.key': No such file or directory
                  chgrp: cannot access '/srv/kubernetes/server.cert': No such file or directory
                  chmod: cannot access '/srv/kubernetes/server.key': No such file or directory
                  chmod: cannot access '/srv/kubernetes/server.cert': No such file or directory
              stdout:

After applying my patch (success) :
----------
          ID: kubernetes-cert
    Function: cmd.script
      Result: True
     Comment: Command 'kubernetes-cert' run
     Started: 07:17:04.172384
    Duration: 1041.092 ms
     Changes:
              ----------
              pid:
                  1045
              retcode:
                  0
              stderr:
                  Generating a 4096 bit RSA private key
                  ......................................................................++
                  ...............................................................................++
                  writing new private key to '/srv/kubernetes/server.key'
                  -----
              stdout:
----------
2016-01-24 02:18:11 -05:00
Mike Danese 8e8437dad8 declare azure/ubuntu/saltstack bankruptcy 2015-10-16 18:21:21 -07:00
Fred Jean 1305f54645 Booting a Kubernetes cluster on Vagrant
* Using Fedora 21 as the base box
* Discover the active network interfaces in the box to avoid hardcoding
  them in configuration.
* Use the master IP for the certificate.
2015-08-27 21:43:36 -06:00
Eric Paris 0753acf2f8 Allow make-ca-cert.sh to run on OS X
Currently make-ca-cert.sh uses (equiv of)

mktemp -d --tmpdir kube.XXXXX

but --tmpdir is not a valid option on OS X. Switch to

mktemp -d -t kube.XXXXX

Which is valid, but subtly different between OS X and Linux. The
directory you get back will be different on each.

Linux:  ${tmpdir}/kube.y5Bsu/
OS X:   ${tmpdir}/kube.XXXXX.VQ81oOui/
2015-08-04 19:03:01 -04:00
Eric Paris 6b9ef5b2d8 generate-cert: allow for alternative paths
Instead of hard coding kube-cert and /srv/kubernetes allow these to be
overwritten by environment variables.  / is immutable on some systems
and so /srv is not a possible location to store data.
2015-08-04 19:01:16 -04:00
Justin Santa Barbara c676c11189 AWS: Configure SSL certificate alternate-names
GCE does this in its per-provider scripts; this does the same for AWS and lets
other providers do the same; I believe kube2sky requires 10.0.0.1 as a SAN.
2015-07-03 01:18:07 -04:00
Robert Bailey 6c42cb154b Stop copying certs into /usr/share/nginx/ since nothing relies
on that location any longer.
2015-05-11 11:44:19 -07:00
Eric Paris 6b3a6e6b98 Make copyright ownership statement generic
Instead of saying "Google Inc." (which is not always correct) say "The
Kubernetes Authors", which is generic.
2015-05-01 17:49:56 -04:00
Kenjiro Nakayama 2e702b0c61 Replace hostname -f with uname -n 2015-04-20 14:16:21 -07:00
Jordan Liggitt 2de478f16c Make cert CN unique to avoid certificate serial number clashes 2014-12-18 15:13:32 -05:00
Brendan Burns b07515c5ea Add some backward compatability for GKE. 2014-12-02 11:32:45 -08:00
Jeff Mendoza 9934a0ace4 Update cert generation for Azure. 2014-11-18 14:10:50 -08:00
Joe Beda 5a0159ea00 Get Vagrant to start using TLS client certs.
Also fix up cert generation. It was failing during the first salt highstate when trying to chown the certs as the apiserver user didn't exist yet.  Fix this by creating a 'kube-cert' group and chgrping the files to that.  Then make the apiserver a member of that group.

Fixes #2365
Fixes #2368
2014-11-13 22:16:45 -08:00
Richard Larocque 63d6e7cd9f make-cert.sh: Create directory before writing cert
Adds a "mkdir -p" to the make-cert.sh.  This fixes an issue where the
script could fail if /srv/kubernetes did not exist previously.
2014-11-13 16:39:09 -08:00
Eric Tune 19ec2234f9 Make server certs accessible to apiserver user. 2014-11-13 13:02:48 -08:00
Joe Beda ee2f030623 Give the API server access to TLS certs.
Moved the cert generation to a separate salt state and put it in a more appropriate sharable location (`/srv/kubernetes/`).
2014-11-12 18:14:24 -08:00