Commit Graph

2607 Commits

Author SHA1 Message Date
Chris Wayne
78880a6944
Update README.md (#6048)
Fix incorrect release cadence information to better reflect reality
2022-08-29 14:46:00 -04:00
Hussein Galal
ba62c79f9b
Update to v1.25.0-k3s1 (#6040)
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
2022-08-27 03:33:13 +02:00
ShylajaDevadiga
79bb7bccd9
Fix e2e tests (#6018)
Signed-off-by: Shylaja Devadiga <shylaja@rancher.com>
2022-08-26 11:42:04 -07:00
Manuel Buil
4c9ad2546c
Fix dualStack test and change ipv6 network (#6023)
Signed-off-by: Manuel Buil <mbuil@suse.com>
2022-08-26 10:03:32 -07:00
Akihiro Suda
654d2b9567
CI: update Fedora 34 -> 35 (#5996)
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
2022-08-26 09:40:34 -07:00
Derek Nola
2b35f89664
Convert install tests to run PR build of k3s (#6003)
* Convert install tests to run PR version of k3s

Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-08-26 09:36:50 -07:00
Derek Nola
f81138402e
E2E: Add support for CentOS 7 and Rocky 8 (#6015)
* Add e2e support for centos7 and rocky8

Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-08-26 09:36:13 -07:00
Brooks Newberry
ab2638a247
mark v1.24.4+k3s1 as stable (#6036) 2022-08-25 14:18:22 -07:00
Brad Davidson
7d6982d1fa Export agent.NetworkName for Windows
Was made private in 4aca21a1f1 as there was no comment as to why it was exported.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-23 15:10:57 -07:00
Brad Davidson
3e394f8ec5 The Windows kubelet does not accept cadvisor flags
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-23 15:10:57 -07:00
Brooks Newberry
c3f830e9b9
Update to v1.24.4 (#6014)
Signed-off-by: Brooks Newberry <brooks@newberry.com>
2022-08-18 19:10:16 -07:00
Derek Nola
035c03cfaa
Remove codespell from Drone, add to GH Actions (#6004)
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-08-18 09:21:56 -07:00
Max
b14cabc107
Add nightly install github action (#5998)
Signed-off-by: rancher-max <max.ross@suse.com>
2022-08-16 17:58:00 -04:00
Derek Nola
75f8cfb6ea
E2E: Local cluster testing (#5977)
* Cleanup validatecluster printout
* remove deprecated kubectl exec format
* Implement CreateLocalCluster function
* Update testing documentation

Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-08-15 15:00:22 -07:00
Derek Nola
116c977fbf
Convert vagrant tests to yaml based config (#5992)
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-08-15 14:31:37 -07:00
ShylajaDevadiga
30fc909581
Update run scripts (#5979)
Signed-off-by: Shylaja Devadiga <shylaja@rancher.com>
2022-08-10 15:30:57 -07:00
Roberto Bonafiglia
a30971efaa Updated flannel to v0.19.1
Signed-off-by: Roberto Bonafiglia <roberto.bonafiglia@suse.com>
2022-08-08 09:57:56 +02:00
ShylajaDevadiga
6b7b9c5aa9
Add scripts to run e2e test using ansible (#5134)
Signed-off-by: Shylaja Devadiga <shylaja.devadiga@suse.com>
2022-08-05 09:16:10 -07:00
Abirdcfly
18cb7ef650
fix checkError in terraform/testutils (#5893)
Signed-off-by: Abirdcfly <fp544037857@gmail.com>
2022-08-05 08:05:00 -07:00
Chris Wayne
77fa7fb490
Removing checkbox indicating backports since the policy is to backport everything (#5947)
Signed-off-by: Chris Wayne <cwayne18@gmail.com>
2022-08-05 10:44:08 -04:00
Chris Wayne
b7f7379157
Update MAINTAINERS with new folks and departures (#5948)
Signed-off-by: Chris Wayne <cwayne18@gmail.com>
2022-08-05 10:43:33 -04:00
Brad Davidson
db3c569b7f Add docker e2e test
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-05 02:39:25 -07:00
Brad Davidson
aadab55145 Add ADR for inclusion of cri-dockerd
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-05 02:39:25 -07:00
Brad Davidson
4aca21a1f1 Add cri-dockerd support as backend for --docker flag
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-05 02:39:25 -07:00
Brad Davidson
b1fa63dfb7 Revert "Remove --docker/dockershim support"
This reverts commit 4a3d283bc1.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-05 02:39:25 -07:00
Brad Davidson
cf66559940 Print stack on panic
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-05 02:39:25 -07:00
Roberto Bonafiglia
abdf0c7319 Fix comments and add check in case of IPv6 only node
Signed-off-by: Roberto Bonafiglia <roberto.bonafiglia@suse.com>
2022-08-04 09:54:45 +02:00
Roberto Bonafiglia
d90ba30353 Added NodeIP autodect in case of dualstack connection
Signed-off-by: Roberto Bonafiglia <roberto.bonafiglia@suse.com>
2022-08-04 09:54:45 +02:00
Derek Nola
82e5da35a9
Upgrade macos-10.15 to macos-12 (#5953)
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-08-03 20:11:17 -07:00
Brad Davidson
43508341c1 Bump minio to v7.0.33
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-08-03 11:28:08 -07:00
Derek Nola
1c17f05b8e
Fix secrets reencryption for 8K+ secrets (#5936)
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-08-02 14:08:06 -07:00
Derek Nola
118a68c913
Updates to CLI flag grouping + deprecated flag warnings. (#5937)
* Consolidate data dir flag
* Group cluster flags together
* Reorder and group agent flags
* Add additional info around vmodule flag
* Hide deprecated flags, and add warning about their removal

Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-08-02 13:51:16 -07:00
Vladimir Kochnev
13af0b1d88 Save agent token to /var/lib/rancher/k3s/server/agent-token
Having separate tokens for server and agent nodes is a nice feature.

However, passing server's plain `K3S_AGENT_TOKEN` value
to `k3s agent --token` without CA hash is insecure when CA is
self-signed, and k3s warns about it in the logs:

```
Cluster CA certificate is not trusted by the host CA bundle, but the token does not include a CA hash.
Use the full token from the server's node-token file to enable Cluster CA validation.
```

Okay so I need CA hash but where should I get it?

This commit attempts to fix this issue by saving agent token value to
`agent-token` file with CA hash appended.

Signed-off-by: Vladimir Kochnev <hashtable@yandex.ru>
2022-08-01 14:11:50 -07:00
Derek Nola
4c0bc8c046
Update etcd error to match correct url (#5909)
Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-07-29 09:40:53 -07:00
Brad Davidson
db2ba7b61d Don't enable unprivileged ports and icmp on old kernels
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-28 14:33:20 -07:00
Derek Nola
90016c208d
ADR: Depreciating and Removing Old Flags (#5890)
* Update naming on old adrs
* New adr for removing deprecated flags

Signed-off-by: Derek Nola <derek.nola@suse.com>
2022-07-28 14:08:50 -07:00
Hussein Galal
24da6adfa9
Move v1.24.3+k3s1 to stable (#5889)
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
2022-07-22 21:20:31 +02:00
Brad Davidson
049004455a Bump dynamiclistener to fix issue with cert expiration
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-22 12:17:34 -07:00
Brad Davidson
5eaa0a9422 Replace getLocalhostIP with Loopback helper method
Requires tweaking existing method signature to allow specifying whether or not IPv6 addresses should be return URL-safe.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-21 16:51:57 -07:00
Brad Davidson
84fb8787f2 Add service-cluster-ip-range to controller-manager args
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-21 16:51:57 -07:00
Thomas Ferrandiz
0a232c72d5 Upgrade kube-router to v1.5.0
Use k3s-io fork of kube-router to keep the netpol dual-stack contrib

Signed-off-by: thomasferrandiz <thomas.ferrandiz@suse.com>
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-21 16:18:21 -07:00
Brad Davidson
bd5fdfce33 Fix server systemd detection
* Use INVOCATION_ID to detect execution under systemd, since as of a9b5a1933f NOTIFY_SOCKET is now cleared by the server code.
* Set the unit type to notify by default for both server and agent, which is what Rancher-managed installs have done for a while.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-21 13:42:20 -07:00
Brad Davidson
1674b9d640 Raise etcd connection test timeout to 30 seconds
Addressess issue where the compact may take more than 10 seconds on slower disks. These disks probably aren't really suitable for etcd, but apparently run fine otherwise.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-21 13:23:19 -07:00
Dirk Müller
93ca992cdb update rootlesskit to 1.0.1
This avoids an issue with u-root 7.0.0 which has been retracted by the
author:

  $ go list -u -m all
  $ go list -m: github.com/u-root/u-root@v7.0.0+incompatible: retracted by module author: Published v7 too early (before migrating to go modules)

Signed-off-by: Dirk Müller <dirk@dmllr.de>
2022-07-21 13:22:19 -07:00
rancher-max
ca15e0c5e5 Put terraform tests into packages and cleanup upgrade test
Signed-off-by: rancher-max <max.ross@suse.com>
2022-07-21 13:20:05 -07:00
rancher-max
989f3b34fe Update terraform package and make running locally easier
Signed-off-by: rancher-max <max.ross@suse.com>
2022-07-21 13:20:05 -07:00
Nikolai Shields
990ba0e88c
Update to v1.24.3 (#5870)
Signed-off-by: Nikolai Shields <nikolai@nikolaishields.com>
2022-07-15 02:16:41 -05:00
Brad Davidson
ffe72eecc4 Address issues with etcd snapshots
* Increase the default snapshot timeout. The timeout is not currently
  configurable from Rancher, and larger clusters are frequently seeing
  uploads fail at 30 seconds.
* Enable compression for scheduled snapshots if enabled on the
  command-line. The CLI flag was not being passed into the etcd config.
* Only set the S3 content-type to application/zip if the file is zipped.
* Don't run more than one snapshot at once, to prevent misconfigured
  etcd snapshot cron schedules from stacking up.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-12 14:41:38 -07:00
Brad Davidson
167ed19d22 Fix deletion of svclb DaemonSet when Service is deleted
87e1806697 removed the OwnerReferences
field from the DaemonSet, which makes sense since the Service may now be
in a different namespace than the DaemonSet and cross-namespace owner
references are not supported.  Unfortunately, we were relying on
garbage collection to delete the DameonSet, so this started leaving
orphaned DaemonSets when Services were deleted.

We don't want to add an a Service OnRemove handler, since this will add
finalizers to all Services, not just LoadBalancers services, causing
conformance tests to fail. Instead, manage our own finalizers, and
restore the DaemonSet removal Event that was removed by the same commit.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-12 12:27:55 -07:00
Brad Davidson
fc1c100ffd Remove legacy bidirectional datastore sync code
Since #4438 removed 2-way sync and treats any changed+newer files on disk as an error, we no longer need to determine if files are newer on disk/db or if there is a conflicting mix of both. Any changed+newer file is an error, unless we're doing a cluster reset in which case everything is unconditionally replaced.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2022-07-12 12:10:30 -07:00