-
Notifications
You must be signed in to change notification settings - Fork 6.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
basic RBAC support #1351
basic RBAC support #1351
Conversation
By default we do not test reset.yml now.
1298.6.0 fixes some sporadic network issues. It also includes docker 1.12.6 which includes several stability fixes for kubernetes. Signed-off-by: Sergii Golovatiuk <[email protected]>
etcd is crucial part of kubernetes cluster. Ansible restarts etcd on reconfiguration. Backup helps operator to restore cluster manually in case of any issues. Signed-off-by: Sergii Golovatiuk <[email protected]>
Add helm deployment
Make reset check on idempotency check optional
Bump CoreOS stable to latest version
This adds time to deployment, so we should only test it sparingly during daily master.
Also changed unnecessary delay to a max timeout (now defaulting to 1s sleep between tries) Also rename play_hosts to ansible_play_hosts
Optional Ansible playbook for preparing a host for running Kargo. This includes creation of a user account, some basic packages, and sysctl values required to allow CNI networking on a libvirt network.
The docker-network environment file masks the new values put into /etc/systemd/system/docker.service.d/flannel-options.conf to renumber the docker0 to work correctly with flannel.
Disable download_run_once and download_localhost for most CI scenarios
Add KVM hypervisor playbook to contrib
Allows config changes made by Ansible to restart dnsmasq deployment
Change wait for dnsmasq to skip if there are no kube-nodes in play
Use checksum of dnsmasq config to trigger updates of dnsmasq
Non-brekable space is 0xc2 0xa0 byte sequence in UTF-8. To find one: $ git grep -I -P '\xc2\xa0' To replace with regular space: $ git grep -l -I -P '\xc2\xa0' | xargs sed -i 's/\xc2\xa0/ /g' This commit doesn't include changes that will overlap with commit f1c59a9.
Fixes for AWS Terraform Deployment
Add missing defaults
replace non-breakable space with regular space
Update roadmap.md
Latest released version of kube-policy-controller contains important bug fixes and should be used by default.
- Run docker run from script rather than directly from systemd target - Refactoring styling/templates Signed-off-by: Sergii Golovatiuk <[email protected]>
Fix markdown of heading in README
Can you rebase off current master to get the necessary CI fixes |
* Add a flag "authorization_method", when set to "RBAC" enables role based access control. * Add required cluster roles and bindings for kube-dns * Patch tiller deployment to use a service account with proper credentials. * Add a flag to regenerate kubernetes certs on the nodes.
* Consolidate variable definitions to `kargo-defaults`. * Set `AlwaysAllow` as the default authorization mode. * Ability to set multiple authorization modes. * Various style fixes and typos
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://github.com/kubernetes/kubernetes/wiki/CLA-FAQ to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
some of the works are from @rajiteh
changes summary:
system components use their own certs, identified as user/group document here:
https://kubernetes.io/docs/admin/authorization/rbac/#default-roles-and-role-bindings
changed components: kubelet/kube-proxy/controller-manager/scheduler
addon run as ServiceAccount and changed related ClusterRole/ClusterRoleBinding,
patch existing Binding if necessary.
changed addons: kube-dns/helm
add an authorization_modes var to control authorization modes