- Sep 10, 2017
-
-
Matthew Mosesohn authored
-
- Sep 05, 2017
-
-
mkrasilnikov authored
* using separated vault roles for generate certs with different `O` (Organization) subject field; * configure vault roles for issuing certificates with different `CN` (Common name) subject field; * set `CN` and `O` to `kubernetes` and `etcd` certificates; * vault/defaults vars definition was simplified; * vault dirs variables defined in kubernetes-defaults foles for using shared tasks in etcd and kubernetes/secrets roles; * upgrade vault to 0.8.1; * generate random vault user password for each role by default; * fix `serial` file name for vault certs; * move vault auth request to issue_cert tasks; * enable `RBAC` in vault CI;
-
- Sep 01, 2017
-
-
Brad Beam authored
-
- Aug 30, 2017
-
-
Maxim Krasilnikov authored
* Added update CA trust step for etcd and kube/secrets roles * Added load_balancer_domain_name to certificate alt names if defined. Reset CA's in RedHat os. * Rename kube-cluster-ca.crt to vault-ca.crt, we need separated CA`s for vault, etcd and kube. * Vault role refactoring, remove optional cert vault auth because not not used and worked. Create separate CA`s fro vault and etcd. * Fixed different certificates set for vault cert_managment * Update doc/vault.md * Fixed condition create vault CA, wrong group * Fixed missing etcd_cert_path mount for rkt deployment type. Distribute vault roles for all vault hosts * Removed wrong when condition in create etcd role vault tasks.
-
- Aug 24, 2017
-
-
Brad Beam authored
* Adding yaml linter to ci check * Minor linting fixes from yamllint * Changing CI to install python pkgs from requirements.txt - adding in a secondary requirements.txt for tests - moving yamllint to tests requirements
-
- Aug 20, 2017
-
-
Maxim Krasilnikov authored
* Added custom ips to etcd vault distributed certificates * Added custom ips to kube-master vault distributed certificates * Added comment about issue_cert_copy_ca var in vault/issue_cert role file * Generate kube-proxy, controller-manager and scheduler certificates by vault * Revert "Disable vault from CI (#1546)" This reverts commit 781f31d2. * Fixed upgrade cluster with vault cert manager * Remove vault dir in reset playbook
-
- Aug 18, 2017
-
-
Matthew Mosesohn authored
This does not address per-node certs and scheduler/proxy/controller-manager component certs which are now required. This should be handled in a follow-up patch.
-
- Jul 28, 2017
-
-
Brad Beam authored
without this etcd ca certs dont exist on worker nodes causing calico to fail
-
- Jul 27, 2017
-
-
Anton authored
-
- Jun 29, 2017
-
-
Anton Nerozya authored
-
- Jun 09, 2017
-
-
Brad Beam authored
-
- Apr 13, 2017
-
-
Matthew Mosesohn authored
-
- Mar 31, 2017
-
-
Aleksandr Didenko authored
Folded style in multiline 'when' condition causes error with unexpected ident. Changing it to literal style should fix the issue. Closes #1190
-
- Mar 24, 2017
-
-
Sergii Golovatiuk authored
- Run docker run from script rather than directly from systemd target - Refactoring styling/templates Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Mar 15, 2017
-
-
Matthew Mosesohn authored
Fixed sync_tokens fact Fixed sync_certs for k8s tokens fact Disabled register docker images changability Fixed CNI dir permission Fix idempotency for etcd pre upgrade checks
-
- Mar 14, 2017
-
-
Matthew Mosesohn authored
-
- Mar 04, 2017
-
-
Matthew Mosesohn authored
Now etcd role can optionally disable etcd cluster setup for faster deployment when it is combined with etcd role.
-
- Mar 03, 2017
-
-
Matthew Mosesohn authored
Also generate certs only when absent on master (rather than when absent on target node)
-
- Feb 20, 2017
-
-
Matthew Mosesohn authored
-
- Feb 18, 2017
-
-
Matthew Mosesohn authored
This works around 4MB limit for gitlab CI runner.
-
Matthew Mosesohn authored
New deploy modes: scale, ha-scale, separate-scale Creates 200 fake hosts for deployment with fake hostvars. Useful for testing certificate generation and propagation to other master nodes. Updated test cases descriptions.
-
Andrew Greenwood authored
Migrate older inline= syntax to pure yml syntax for module args as to be consistant with most of the rest of the tasks Cleanup some spacing in various files Rename some files named yaml to yml for consistancy
-
- Feb 17, 2017
-
-
Sergii Golovatiuk authored
Ansible playbook fails when tags are limited to "facts,etcd" or to "facts". This patch allows to run ansible-playbook to gather facts only that don't require calico/flannel/weave components to be verified. This allows to run ansible with 'facts,bootstrap-os' or just 'facts' to gether facts that don't require specific components. Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Feb 16, 2017
-
-
Matthew Mosesohn authored
Fixes #967
-
- Feb 13, 2017
-
-
Vladimir Rutsky authored
"shell" step doesn't support check mode, which currently leads to failures, when Ansible is being run in check mode (because Ansible doesn't run command, assuming that command might have effect, and no "rc" or "output" is registered). Setting "check_mode: no" allows to run those "shell" commands in check mode (which is safe, because those shell commands doesn't have side effects).
-
- Feb 09, 2017
-
-
Josh Conant authored
-
- Feb 07, 2017
-
-
Matthew Mosesohn authored
Fixes upgrade from pre-individual node cert envs.
-
- Feb 06, 2017
-
-
Matthew Mosesohn authored
-
- Jan 20, 2017
-
-
Bogdan Dobrelya authored
* Drop linux capabilities for unprivileged containerized worlkoads Kargo configures for deployments. * Configure required securityContext/user/group/groups for kube components' static manifests, etcd, calico-rr and k8s apps, like dnsmasq daemonset. * Rework cloud-init (etcd) users creation for CoreOS. * Fix nologin paths, adjust defaults for addusers role and ensure supplementary groups membership added for users. * Add netplug user for network plugins (yet unused by privileged networking containers though). * Grant the kube and netplug users read access for etcd certs via the etcd certs group. * Grant group read access to kube certs via the kube cert group. * Remove priveleged mode for calico-rr and run it under its uid/gid and supplementary etcd_cert group. * Adjust docs. * Align cpu/memory limits and dropped caps with added rkt support for control plane. Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Jan 19, 2017
-
-
Greg Althaus authored
cert creation
-
- Jan 17, 2017
-
-
Sergii Golovatiuk authored
systemctl daemon-reload should be run before when task modifies/creates union for etcd. Otherwise etcd won't be able to start Closes #892 Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Jan 15, 2017
-
-
Greg Althaus authored
be run by limit on each node without regard for order. The changes make sure that all of the directories needed to do certificate management are on the master[0] or etcd[0] node regardless of when the playbook gets run on each node. This allows for separate ansible playbook runs in parallel that don't have to be synchronized.
-
- Jan 09, 2017
-
-
Aleksandr Didenko authored
"etcd_node_cert_data" variable is undefinded for "calico-rr" role. This patch adds "calico-rr" nodes to task where "etcd_node_cert_data" variable is registered.
-
- Jan 05, 2017
-
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Jan 03, 2017
-
-
Brad Beam authored
-
- Jan 02, 2017
-
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Dec 30, 2016
-
-
Matthew Mosesohn authored
Due to bash max args limits, we should pass all node filenames and base64-encoded tar data through stdin/stdout instead. Fixes #832
-
- Dec 28, 2016
-
-
Bogdan Dobrelya authored
* Add restart for weave service unit * Reuse docker_bin_dir everythere * Limit systemd managed docker containers by CPU/RAM. Do not configure native systemd limits due to the lack of consensus in the kernel community requires out-of-tree kernel patches. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
Matthew Mosesohn authored
Admin certs only go to etcd nodes Only generate cert-data for nodes that need sync
-