Commit Graph

8000 Commits (d125f3bddceff4cc394b1a4384658bd58711cc42)

Author SHA1 Message Date
Dmitry Rozhkov d125f3bddc kubeadm: add support for ECDSA keys
kubeadm still generates RSA keys when deploying a node, but also
accepts ECDSA keys if they already exist pregenerated in the
directory specified in --cert-dir.
2019-04-25 12:52:42 +03:00
Kubernetes Prow Robot ce3ddcd5f6
Merge pull request #76933 from xichengliudui/update-prots
Replace variables 10250 and 10255 with constants
2019-04-24 12:25:13 -07:00
Kubernetes Prow Robot 5d37d6b9bf
Merge pull request #77000 from xichengliudui/move-SchemeGroupVersion-variable
Move the SchemeGroupVersion variable into var()
2019-04-24 08:40:08 -07:00
Kubernetes Prow Robot 3ba70b9b5e
Merge pull request #76923 from SataQiu/fix-kubeadm-20190423
Fix validation message: apiServerEndpoints -> apiServerEndpoint
2019-04-24 04:04:00 -07:00
Kubernetes Prow Robot 36ccff1b27
Merge pull request #76821 from ereslibre/kubeadm-config-retry-on-conflict
kubeadm: improve resiliency when conflicts arise when updating the kubeadm-config configmap
2019-04-23 15:50:01 -07:00
Kubernetes Prow Robot 44f254d55e
Merge pull request #76922 from xichengliudui/small-bug
Fix two minor bugs in kubeadm
2019-04-23 07:53:35 -07:00
Kubernetes Prow Robot 0f617a3825
Merge pull request #76500 from rojkov/issue-1399
kubeadm: check all available CA certs against pinned certs
2019-04-23 07:52:21 -07:00
Rafael Fernández López bc8bafd825
kubeadm: improve resiliency when conflicts arise when updating the kubeadm-config ConfigMap
Add the functionality to support `CreateOrMutateConfigMap` and `MutateConfigMap`.

* `CreateOrMutateConfigMap` will try to create a given ConfigMap object; if this ConfigMap
  already exists, a new version of the resource will be retrieved from the server and a
  mutator callback will be called on it. Then, an `Update` of the mutated object will be
  performed. If there's a conflict during this `Update` operation, retry until no conflict
  happens. On every retry the object is refreshed from the server to the latest version.

* `MutateConfigMap` will try to get the latest version of the ConfigMap from the server,
  call the mutator callback and then try to `Update` the mutated object. If there's a
  conflict during this `Update` operation, retry until no conflict happens. On every retry
  the object is refreshed from the server to the latest version.

Add unit tests for `MutateConfigMap`

* One test checks that in case of no conflicts, the update of the
  given ConfigMap happens without any issues.

* Another test mimics 5 consecutive CONFLICT responses when updating
  the given ConfigMap, whereas the sixth try it will work.
2019-04-23 15:40:37 +02:00
Kubernetes Prow Robot 888b81b638
Merge pull request #76238 from Dieken/30s-ttl-for-coredns
change default 5s ttl to 30s for coredns to be same with kube-dns/dnsmasq
2019-04-23 06:20:09 -07:00
Kubernetes Prow Robot ccf9556ddc
Merge pull request #76848 from Huang-Wei/fix-kubemark-proxy
Fixed a kubemark panic when hollow-node is morphed as proxy
2019-04-23 00:46:09 -07:00
SataQiu cd8fae5370 fix validation message: apiServerEndpoints -> apiServerEndpoint 2019-04-23 11:47:57 +08:00
Kubernetes Prow Robot f9a3a22e35
Merge pull request #76769 from rojkov/kubeadm-drop-NewCACertAndKey
kubeadm: drop duplicate function NewCACertAndKey
2019-04-22 03:21:43 -07:00
aaa 2dd0ff8c61 Move the SchemeGroupVersion variable into var()
update pull request
2019-04-21 14:01:52 -04:00
aaa 220b07f2c8 Replace variables 10250 and 10255 with constants
update pull request
2019-04-21 13:01:09 -04:00
Kubernetes Prow Robot c0c1e148e3
Merge pull request #76859 from SataQiu/fix-kubeadm-20190420
kubeadm: use 'errors.Errorf' instead of 'fmt.Errorf'
2019-04-20 14:21:44 -07:00
Kubernetes Prow Robot c262f9c7d9
Merge pull request #76865 from fabriziopandini/fix-certs-renewal
kubeadm: fix kubeadm alpha cert renew error in case of external CA
2019-04-20 11:45:45 -07:00
fabriziopandini dc8331e385 fix-certs-renewal 2019-04-20 17:08:10 +02:00
aaa a5b88f69e9 Fix two minor bugs in kubeadm 2019-04-20 06:42:36 -04:00
aaa 81c30cbeb0 kubeadm cleanup: master -> control-plane
update pul request
2019-04-20 06:15:19 -04:00
SataQiu 62dbd0fa0d use 'errors.Errorf' instead of 'fmt.Errorf' 2019-04-20 17:10:18 +08:00
Wei Huang 51149dad31
Fixed a kubemark panic when hollow-node is morphed as proxy 2019-04-19 14:40:53 -07:00
fabriziopandini d94c5bac47 kubeadm-cleanup-unused-func 2019-04-19 22:30:44 +02:00
Kubernetes Prow Robot 29163600fe
Merge pull request #76796 from dims/remove-unused-methods
Remove unused code
2019-04-19 11:09:55 -07:00
Dmitry Rozhkov 580513ed66 kubeadm: drop duplicate function NewCACertAndKey
The function certs.NewCACertAndKey() is just a wrapper around
pkiutil.NewCertificateAuthority() which doesn't add any
additional functionality.

Instead use pkiutil.NewCertificateAuthority() directly.
2019-04-19 19:17:34 +03:00
Davanum Srinivas 7b8c9acc09
remove unused code
Change-Id: If821920ec8872e326b7d85437ad8d2620807799d
2019-04-19 08:36:31 -04:00
Vince Prignano 3f552264ca Update klog to 0.3.0
Signed-off-by: Vince Prignano <vincepri@vmware.com>
2019-04-18 08:33:06 -07:00
Kubernetes Prow Robot cee320a809
Merge pull request #76534 from ping035627/k8s-190413
Expect directory permissions to be 0700
2019-04-18 06:22:09 -07:00
PingWang e3dcd3c0a9 Expect directory permissions to be 0700 or less
Signed-off-by: PingWang <wang.ping5@zte.com.cn>

update the permissions to 0660

Signed-off-by: PingWang <wang.ping5@zte.com.cn>

revert to 0750

Signed-off-by: PingWang <wang.ping5@zte.com.cn>

update 0750 to 0700

Signed-off-by: PingWang <wang.ping5@zte.com.cn>
2019-04-18 17:31:31 +08:00
Kubernetes Prow Robot 2490e035d7
Merge pull request #71735 from dcbw/userspace-proxy-ratelimiting
proxy/userspace: respect minSyncInterval
2019-04-16 19:14:03 -07:00
Kubernetes Prow Robot a404238d1c
Merge pull request #76638 from SataQiu/clean-command-kubeadm-20190416
[kubeadm] clean up command description information for consistency and readability
2019-04-16 16:20:45 -07:00
Matthew L Daniel b0814869b0
Output missing cert or key name in DownloadCerts
Otherwise the user does not know what key `kubeadm` is expecting, which makes troubleshooting harder
2019-04-16 08:53:48 -07:00
SataQiu 3949ee0f79 clean up command description information for consistency and readability 2019-04-16 22:58:10 +08:00
Kubernetes Prow Robot 82e15dad1c
Merge pull request #76068 from yagonobre/simplify-version-bump
Simplify kubeadm bump version on TestEtcdSupportedVersion
2019-04-16 00:51:08 -07:00
Kubernetes Prow Robot f294037a47
Merge pull request #76430 from mrkm4ntr/redundant-cache-sync-wait
Remove redundant wait for cache sync
2019-04-15 22:19:20 -07:00
Kubernetes Prow Robot 631bf8cbc8
Merge pull request #76497 from SataQiu/fix-golint-20190413
Fix golint failures of cmd/kube-proxy/app
2019-04-15 10:26:53 -07:00
Kubernetes Prow Robot a73730147c
Merge pull request #76564 from tedyu/adm-clean-all
Cleanup as many dirs as possible in CleanupDirs
2019-04-15 08:14:05 -07:00
Ted Yu 185f02dd1a Cleanup as many dirs as possible in CleanupDirs
Signed-off-by: Ted Yu <yute@vmware.com>
2019-04-15 06:10:33 -07:00
Kubernetes Prow Robot f2659bcad8
Merge pull request #76572 from mkumatag/fix_flakey
loop through next entry in stubDomainData if proxyIP == 0
2019-04-15 05:14:05 -07:00
Dmitry Rozhkov 7f8fc5d189 kubeadm: check all available CA certs against pinned certs
Currently kubeadm produces an error upon parsing multiple
certificates stored in the cluster-info configmap. Yet it
should check all available certificates in a scenario like
CA key rotation.

Check all available CA certs against pinned certificate hashes.

Fixes https://github.com/kubernetes/kubeadm/issues/1399
2019-04-15 15:08:06 +03:00
Kubernetes Prow Robot c09cfb7178
Merge pull request #76566 from tedyu/adm-rollback-err
Return aggregate error from rollbackOldManifests
2019-04-15 03:54:23 -07:00
Kubernetes Prow Robot 18533fe84f
Merge pull request #76545 from xichengliudui/update-DNSType-comments
Update DNSType comments on compute.go
2019-04-15 00:20:01 -07:00
Manjunath A Kumatagi 23153e3f04 loop through next entry in stubDomainData if proxyIP == 0 2019-04-14 20:14:01 -05:00
Kubernetes Prow Robot 299aa5d7a6
Merge pull request #76505 from rosti/fix-join-cri-detection
kubeadm: Don't error out on join with --cri-socket override
2019-04-14 14:30:00 -07:00
Ted Yu 3e0423926a Return aggregate error from rollbackOldManifests 2019-04-14 10:06:07 -07:00
SataQiu 8b7b2349c7 capitalize the first letter of the prompt for consistency 2019-04-14 19:10:51 +08:00
Kubernetes Prow Robot 0a59758c58
Merge pull request #76549 from xichengliudui/ends-with-newline
Use fmt.printf() to end with a newline
2019-04-13 15:26:00 -07:00
Shintaro Murakami 28b3cff13c Remove redundant wait for cache sync 2019-04-13 08:12:33 +09:00
SataQiu cc199c74fc fix golint failures of cmd/kube-proxy/app 2019-04-13 06:20:52 +08:00
Rostislav M. Georgiev 2d4307db9f kubeadm: Don't error out on join with --cri-socket override
In the case where newControlPlane is true we don't go through
getNodeRegistration() and initcfg.NodeRegistration.CRISocket is empty.
This forces DetectCRISocket() to be called later on, and if there is more than
one CRI installed on the system, it will error out, while asking for the user
to provide an override for the CRI socket. Even if the user provides an
override, the call to DetectCRISocket() can happen too early and thus ignore it
(while still erroring out).
However, if newControlPlane == true, initcfg.NodeRegistration is not used at
all and it's overwritten later on.
Thus it's necessary to supply some default value, that will avoid the call to
DetectCRISocket() and as initcfg.NodeRegistration is discarded, setting
whatever value here is harmless.

Signed-off-by: Rostislav M. Georgiev <rostislavg@vmware.com>
2019-04-12 17:25:11 +03:00
Davanum Srinivas a6a89421c5
Remove genyaml binary
Change-Id: I7a1ed6a475f8daedc79fcc86a0ad0ac2056065bd
2019-04-12 08:31:29 -04:00