- Feb 07, 2018
-
-
woopstar authored
Rename from aggregator-proxy-client to front-proxy-client to match kubeadm design. Added kubeadm support too. Changed to use variables set and not hardcode paths. Still missing cert generation for Vault
-
- Feb 05, 2018
- Oct 27, 2017
-
-
Matthew Mosesohn authored
All nodes get converted to lowercase, so certs should set CN with lowercase as well.
-
- Oct 16, 2017
-
-
neith00 authored
* Revert "Debian jessie docs (#1806)" This reverts commit d78577c8. * Revert "[contrib/network-storage/glusterfs] adds service for glusterfs endpoint (#1800)" This reverts commit 5fb6b2ea. * Revert "[contrib/network-storage/glusterfs] bootstrap for glusterfs nodes (#1799)" This reverts commit 404caa11. * Revert "Fixed kubelet standard log environment (#1780)" This reverts commit b8384685. * Revert "Add support for fedora atomic host (#1779)" This reverts commit f2235be1. * Revert "Update network-plugins to use portmap plugin (#1763)" This reverts commit 6ec45b10. * Revert "Update roadmap (#1795)" This reverts commit d9879d80.
-
Matthew Mosesohn authored
-
- Oct 05, 2017
-
-
Matthew Mosesohn authored
* Upgrade to kubernetes v1.8.0 hyperkube no longer contains rsync, so now use cp * Enable node authorization mode * change kube-proxy cert group name
-
- Aug 30, 2017
-
-
Matthew Mosesohn authored
Fixes #1573
-
- Aug 18, 2017
-
-
Matthew Mosesohn authored
* Bump tag for upgrade CI, fix netchecker upgrade netchecker-server was changed from pod to deployment, so we need an upgrade hook for it. CI now uses v2.1.1 as a basis for upgrade. * Fix upgrades for certs from non-rbac to rbac
-
- Jul 17, 2017
-
-
jwfang authored
-
- Mar 08, 2017
-
-
Cesarini, Daniele authored
Issue #1125. Make RBAC authorization plugin work out of the box. "When bootstrapping, superuser credentials should include the system:masters group, for example by creating a client cert with /O=system:masters. This gives those credentials full access to the API and allows an admin to then set up bindings for other users."
-
- Feb 24, 2017
-
-
Sergii Golovatiuk authored
In real scenarios 365 days is short period of time. 3650 days is good enough for long running k8s environments
-
- Feb 06, 2017
-
-
Matthew Mosesohn authored
-
- Jan 20, 2017
-
-
Bogdan Dobrelya authored
* Drop linux capabilities for unprivileged containerized worlkoads Kargo configures for deployments. * Configure required securityContext/user/group/groups for kube components' static manifests, etcd, calico-rr and k8s apps, like dnsmasq daemonset. * Rework cloud-init (etcd) users creation for CoreOS. * Fix nologin paths, adjust defaults for addusers role and ensure supplementary groups membership added for users. * Add netplug user for network plugins (yet unused by privileged networking containers though). * Grant the kube and netplug users read access for etcd certs via the etcd certs group. * Grant group read access to kube certs via the kube cert group. * Remove priveleged mode for calico-rr and run it under its uid/gid and supplementary etcd_cert group. * Adjust docs. * Align cpu/memory limits and dropped caps with added rkt support for control plane. Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Jan 13, 2017
-
-
Greg Althaus authored
the openssl tools will fail to create signing requests because the CN is too long. This is mainly a problem when FQDNs are used in the inventory file. THis will truncate the hostname for the CN field only at the first dot. This should handle the issue for most cases.
-
- Jan 11, 2017
-
-
Matthew Mosesohn authored
-
- Oct 05, 2016
-
-
Matthew Mosesohn authored
Also adds all masters by hostname and localhost/127.0.0.1 to apiserver SSL certificate. Includes documentation update on how localhost loadbalancer works.
-
- May 07, 2016
-
-
Smana authored
-
- Feb 19, 2016
-
-
Spencer Smith authored
-
- Feb 13, 2016
-
-
Smana authored
test travis with sudo=true instead of required
-
- Dec 12, 2015
-
-
Smaine Kahlouch authored
Master and nodes will run the 'node' role, kube-proxy is run under a container, new script for ssl certs
-