Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

basic RBAC support #1351

Closed
wants to merge 1,323 commits into from
Closed

basic RBAC support #1351

wants to merge 1,323 commits into from

Conversation

jwfang
Copy link
Contributor

@jwfang jwfang commented Jun 15, 2017

some of the works are from @rajiteh

changes summary:

  1. system components use their own certs, identified as user/group document here:
    https://kubernetes.io/docs/admin/authorization/rbac/#default-roles-and-role-bindings

    changed components: kubelet/kube-proxy/controller-manager/scheduler

  2. addon run as ServiceAccount and changed related ClusterRole/ClusterRoleBinding,
    patch existing Binding if necessary.

    changed addons: kube-dns/helm

  3. add an authorization_modes var to control authorization modes

mattymo and others added 30 commits March 20, 2017 13:16
By default we do not test reset.yml now.
1298.6.0 fixes some sporadic network issues. It also includes docker
1.12.6 which includes several stability fixes for kubernetes.

Signed-off-by: Sergii Golovatiuk <[email protected]>
etcd is crucial part of kubernetes cluster. Ansible restarts etcd on
reconfiguration. Backup helps operator to restore cluster manually in
case of any issues.

Signed-off-by: Sergii Golovatiuk <[email protected]>
Make reset check on idempotency check optional
Bump CoreOS stable to latest version
This adds time to deployment, so we should only test it sparingly during
daily master.
Also changed unnecessary delay to a max timeout (now defaulting to 1s sleep
between tries)

Also rename play_hosts to ansible_play_hosts
Optional Ansible playbook for preparing a host for running Kargo.
This includes creation of a user account, some basic packages,
and sysctl values required to allow CNI networking on a libvirt network.
The docker-network environment file masks the new values
put into /etc/systemd/system/docker.service.d/flannel-options.conf
to renumber the docker0 to work correctly with flannel.
Disable download_run_once and download_localhost for most CI scenarios
Add KVM hypervisor playbook to contrib
Allows config changes made by Ansible to restart dnsmasq deployment
Change wait for dnsmasq to skip if there are no kube-nodes in play
Use checksum of dnsmasq config to trigger updates of dnsmasq
Non-brekable space is 0xc2 0xa0 byte sequence in UTF-8.

To find one:

    $ git grep -I -P '\xc2\xa0'

To replace with regular space:

    $ git grep -l -I -P '\xc2\xa0' | xargs sed -i 's/\xc2\xa0/ /g'

This commit doesn't include changes that will overlap with commit f1c59a9.
Fixes for AWS Terraform Deployment
replace non-breakable space with regular space
Latest released version of kube-policy-controller
contains important bug fixes and should be used
by default.
- Run docker run from script rather than directly from systemd target
- Refactoring styling/templates

Signed-off-by: Sergii Golovatiuk <[email protected]>
Fix markdown of heading in README
@bradbeam
Copy link
Contributor

Can you rebase off current master to get the necessary CI fixes

jwfang and others added 22 commits June 26, 2017 16:35
* Add a flag "authorization_method", when set to "RBAC" enables role based access control.
* Add required cluster roles and bindings for kube-dns
* Patch tiller deployment to use a service account with proper credentials.
* Add a flag to regenerate kubernetes certs on the nodes.
* Consolidate variable definitions to `kargo-defaults`.
* Set `AlwaysAllow` as the default authorization mode.
* Ability to set multiple authorization modes.
* Various style fixes and typos
@k8s-ci-robot
Copy link
Contributor

Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please follow instructions at https://github.com/kubernetes/kubernetes/wiki/CLA-FAQ to sign the CLA.

It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.


  • If you've already signed a CLA, it's possible we don't have your GitHub username or you're using a different email address. Check your existing CLA data and verify that your email is set on your git commits.
  • If you signed the CLA as a corporation, please sign in with your organization's credentials at https://identity.linuxfoundation.org/projects/cncf to be authorized.
  • If you have done the above and are still having issues with the CLA being reported as unsigned, please email the CNCF helpdesk: [email protected]

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@k8s-ci-robot k8s-ci-robot added cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. and removed cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Jun 26, 2017
@jwfang jwfang closed this Jun 26, 2017
@bradbeam bradbeam mentioned this pull request Jun 26, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: no Indicates the PR's author has not signed the CNCF CLA.
Projects
None yet
Development

Successfully merging this pull request may close these issues.