Skip to content
Snippets Groups Projects
  1. May 09, 2022
  2. Jul 12, 2021
    • Cristian Calin's avatar
      Move to Ansible 3.4.0 (#7672) · 7516fe14
      Cristian Calin authored
      * Ansible: move to Ansible 3.4.0 which uses ansible-base 2.10.10
      
      * Docs: add a note about ansible upgrade post 2.9.x
      
      * CI: ensure ansible is removed before ansible 3.x is installed to avoid pip failures
      
      * Ansible: use newer ansible-lint
      
      * Fix ansible-lint 5.0.11 found issues
      
      * syntax issues
      * risky-file-permissions
      * var-naming
      * role-name
      * molecule tests
      
      * Mitogen: use 0.3.0rc1 which adds support for ansible 2.10+
      
      * Pin ansible-base to 2.10.11 to get package fix on RHEL8
      Unverified
      7516fe14
  3. Mar 25, 2021
  4. Mar 24, 2021
  5. Jun 29, 2020
  6. May 28, 2020
  7. Apr 15, 2020
  8. Mar 30, 2020
  9. Jan 16, 2020
  10. Jul 16, 2019
  11. Jul 02, 2019
    • okamototk's avatar
      Use K8s 1.15 (#4905) · f2b8a361
      okamototk authored
      * Use K8s 1.15
      
      * Use Kubernetes 1.15 and use kubeadm.k8s.io/v1beta2 for
        InitConfiguration.
      * bump to v1.15.0
      
      * Remove k8s 1.13 checksums.
      
      * Update README kubernetes version 1.15.0.
      
      * Update metrics server 0.3.3 for k8s 1.15
      
      * Remove less than k8s 1.14 related code
      
      * Use kubeadm with --upload-certs instead of --experimental-upload-certs due to depricate
      
      * Update dnsautoscaler 1.6.0
      
      * Skip certificateKey if it's not defined
      
      * Add kubeadm-conftolplane.v2beta2 for k8s 1.15 or later
      
      * Support kubeadm control plane for k8s 1.15
      
      * Update sonobuoy version 0.15.0 for k8s 1.15
      f2b8a361
  12. Jun 10, 2019
  13. Jun 05, 2019
  14. May 03, 2019
  15. Apr 23, 2019
  16. Feb 25, 2019
  17. Feb 12, 2019
    • Jeff Bornemann's avatar
      OCI Cloud Provider Update (#4186) · c41c1e77
      Jeff Bornemann authored
      * OCI subnet AD 2 is not required for CCM >= 0.7.0
      
      Reorganize OCI provider to generate configuration, rather than pull
      
      Add pull secret option to OCI cloud provider
      
      * Updated oci example to document new parameters
      c41c1e77
  18. Dec 04, 2018
  19. Nov 26, 2018
  20. Nov 15, 2018
  21. Oct 17, 2018
  22. Sep 25, 2018
    • Kuldip Madnani's avatar
      Adding pod priority for all the components. (#3361) · 36898a2c
      Kuldip Madnani authored
      * Changes to assign pod priority to kube components.
      
      * Removed the boolean flag pod_priority_assignment
      
      * Created new priorityclass k8s-cluster-critical
      
      * Created new priorityclass k8s-cluster-critical
      
      * Fixed the trailing spaces
      
      * Fixed the trailing spaces
      
      * Added kube version check while creating Priority Class k8s-cluster-critical
      
      * Moved k8s-cluster-critical.yml
      
      * Moved k8s-cluster-critical.yml to kube_config_dir
      36898a2c
  23. Aug 22, 2018
  24. Apr 02, 2018
  25. Mar 30, 2018
  26. Mar 18, 2018
  27. Mar 14, 2018
  28. Mar 12, 2018
  29. Mar 09, 2018
    • chadswen's avatar
      Prefix system:node CRB · b0ab92c9
      chadswen authored
      Change the name of `system:node` CRB to `kubespray:system:node` to avoid
      conflicts with the auto-reconciled CRB also named `system:node`
      
      Fixes #2121
      b0ab92c9
  30. Mar 03, 2018
  31. Dec 05, 2017
    • Chad Swenson's avatar
      Support for disabling apiserver insecure port · b8788421
      Chad Swenson authored
      This allows `kube_apiserver_insecure_port` to be set to 0 (disabled).
      
      Rework of #1937 with kubeadm support
      
      Also, fixed an issue in `kubeadm-migrate-certs` where the old apiserver cert was copied as the kubeadm key
      b8788421
  32. Nov 14, 2017
  33. Nov 07, 2017
    • Chad Swenson's avatar
      Support for disabling apiserver insecure port · 0c7e1889
      Chad Swenson authored
      This allows `kube_apiserver_insecure_port` to be set to 0 (disabled). It's working, but so far I have had to:
      
      1. Make the `uri` module "Wait for apiserver up" checks use `kube_apiserver_port` (HTTPS)
      2. Add apiserver client cert/key to the "Wait for apiserver up" checks
      3. Update apiserver liveness probe to use HTTPS ports
      4. Set `kube_api_anonymous_auth` to true to allow liveness probe to hit apiserver's /healthz over HTTPS (livenessProbes can't use client cert/key unfortunately)
      5. RBAC has to be enabled. Anonymous requests are in the `system:unauthenticated` group which is granted access to /healthz by one of RBAC's default ClusterRoleBindings. An equivalent ABAC rule could allow this as well.
      
      Changes 1 and 2 should work for everyone, but 3, 4, and 5 require new coupling of currently independent configuration settings. So I also added a new settings check.
      
      Options:
      
      1. The problem goes away if you have both anonymous-auth and RBAC enabled. This is how kubeadm does it. This may be the best way to go since RBAC is already on by default but anonymous auth is not.
      2. Include conditional templates to set a different liveness probe for possible combinations of `kube_apiserver_insecure_port = 0`, RBAC, and `kube_api_anonymous_auth` (won't be possible to cover every case without a guaranteed authorizer for the secure port)
      3. Use basic auth headers for the liveness probe (I really don't like this, it adds a new dependency on basic auth which I'd also like to leave independently configurable, and it requires encoded passwords in the apiserver manifest)
      
      Option 1 seems like the clear winner to me, but is there a reason we wouldn't want anonymous-auth on by default? The apiserver binary defaults anonymous-auth to true, but kubespray's default was false.
      0c7e1889
  34. Oct 26, 2017
Loading