Commit Graph

82862 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
f3828b776b
Merge pull request #81965 from roycaihw/crd-feature-gates-to-ga
Bump the CRD feature gates to GA
2019-08-28 14:44:44 -07:00
Kubernetes Prow Robot
af54eae69a
Merge pull request #81612 from rikatz/issue81060
Remove watching Endpoints of Headless Services
2019-08-28 14:44:25 -07:00
Kubernetes Prow Robot
6c9f26ca3a
Merge pull request #80766 from robscott/discovery-api
Adding Discovery API for EndpointSlice
2019-08-28 14:44:09 -07:00
Kubernetes Prow Robot
b9c6f559bd
Merge pull request #80726 from wangzhen127/npd-0.7
Bump NPD version to v0.7.1 for GCI
2019-08-28 14:43:55 -07:00
Taahir Ahmed
b4e99584ce serviceaccounts: Add JWT KeyIDs to tokens
This commit fills out the JWT "kid" (KeyID) field on most
serviceaccount tokens we create.  The KeyID value we use is derived
from the public key of keypair that backs the cluster's OIDC issuer.

OIDC verifiers use the KeyID to smoothly cope with key rotations:

  * During a rotation, the verifier will have multiple keys cached
    from the issuer, any of which could have signed the token being
    verified.  KeyIDs let the verifier pick the appropriate key
    without having to try each one.

  * Seeing a new KeyID is a trigger for the verifier to invalidate its
    cached keys and fetch the new set of valid keys from the identity
    provider.

The value we use for the KeyID is derived from the identity provider's
public key by serializing it in DER format, taking the SHA256 hash,
and then urlsafe base64-encoding it.  This gives a value that is
strongly bound to the key, but can't be reversed to obtain the public
key, which keeps people from being tempted to derive the key from the
key ID and using that for verification.

Tokens based on jose OpaqueSigners are omitted for now --- I don't see
any way to actually run the API server that results in an OpaqueSigner
being used.
2019-08-28 14:18:23 -07:00
Jordan Liggitt
ddc697866a Use http/1.1 in apiserver->webhook clients 2019-08-28 16:51:57 -04:00
Jordan Liggitt
aef05c8dca Plumb NextProtos to TLS client config, honor http/2 client preference 2019-08-28 16:51:56 -04:00
Tim Allclair
a4f8ee17ee Enable the RuntimeClass admission controller on GCE & CI 2019-08-28 13:23:55 -07:00
Claudiu Belu
cafbfbea9a api: Loosens RunAsUserName validation
Currently, the character limit for the usernames set in the RunAsUserName is 20,
which is too low, considering that "ContainerAdministrator" is a valid username and
it is longer than 20 characters. A user should be able to run containers as
Administrator, if needed.

According to [1], Logon names can be up to 104 characters. The previous limit
only applies to local user accounts for the local system.

[1] https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/bb726984(v=technet.10)
2019-08-28 13:03:44 -07:00
Sandeep Rajan
3b6b7f99b0 add checksum 2019-08-28 16:03:28 -04:00
Han Kang
e1bf0b4918 group imports properly 2019-08-28 12:49:54 -07:00
Han Kang
0895ac212d migrate kube-proxy metrics to stability framework 2019-08-28 12:49:54 -07:00
Han Kang
59db3ac27e migrate controller-manager metrics to stability framework 2019-08-28 12:26:57 -07:00
Jordan Liggitt
601b7d33a9 Make webhook benchmarks parallel 2019-08-28 15:20:31 -04:00
Kubernetes Prow Robot
8b4fd4104d
Merge pull request #81960 from pohly/ephemeral-tests
ephemeral volume tests
2019-08-28 12:02:07 -07:00
Kubernetes Prow Robot
f0c600d15a
Merge pull request #81958 from apelisse/ssa-improve-conflict-error
Improve error message on server-side apply conflicts
2019-08-28 12:01:54 -07:00
Kubernetes Prow Robot
b3b4305be5
Merge pull request #81903 from jfbai/fix-kubeadm-kubelet-default
fix: make kubeadm set defaults to kubelet configuration only when no values are set.
2019-08-28 12:01:41 -07:00
Kubernetes Prow Robot
92a320aeb6
Merge pull request #80238 from smarterclayton/disable_node_role
Clarify use of node-role labels within Kubernetes
2019-08-28 12:01:27 -07:00
Kubernetes Prow Robot
c6a506bb8c
Merge pull request #78174 from gaorong/oom-event
enrich kubelet system oom event message info
2019-08-28 12:01:13 -07:00
Han Kang
6f70f781df add some documentation around the metrics stability migration changes for clarity 2019-08-28 11:17:33 -07:00
Han Kang
3a50917795 migrate kubelet's metrics/probes & metrics endpoint to metrics stability framework 2019-08-28 11:16:38 -07:00
RainbowMango
a7ac3b9bbe Add authentication metrics: overall failure and error count 2019-08-29 01:59:55 +08:00
Kenichi Omichi
9aae71fa4a Use log functions of core framework on sub [p-s]
This makes sub packages of e2e test framework to use log functions
of core framework instead for avoiding circular dependencies.

NOTE: test/e2e/framework/ssh will make circular dependencies if
      updating it. It is necessary to solve the issue in advance
      before this work.
2019-08-28 17:05:28 +00:00
Khaled Henidak(Kal)
c27e0b029d phase 2: generated items 2019-08-28 16:11:46 +00:00
Kevin Klues
df1b54fc09 Fail fast with TopologyManager on machines with more than 8 NUMA Nodes 2019-08-28 11:04:52 -05:00
Kevin Klues
5660cd3cfb Add NUMA Node awareness to the TopologyManager 2019-08-28 11:04:52 -05:00
Khaled Henidak(Kal)
313a5c5734 phase 2: ipam filter secondary service cidr 2019-08-28 15:59:43 +00:00
Khaled Henidak(Kal)
93c06821e6 Phase 2: service and endpoint processing 2019-08-28 15:59:43 +00:00
Khaled Henidak(Kal)
5e8ccda71c phase 2: api types + defaulting + validation + disabled fields handling 2019-08-28 15:59:43 +00:00
Kubernetes Prow Robot
d7ecc85239
Merge pull request #81955 from danwinship/add-hairpin-test
e2e/network: add service hairpin test
2019-08-28 08:56:16 -07:00
Kubernetes Prow Robot
6e684875ab
Merge pull request #81954 from SataQiu/fix-schedule-20190826
schedule code clean: using string prefix instead of MarkDeprecated
2019-08-28 08:55:59 -07:00
Kubernetes Prow Robot
35867b160a
Merge pull request #81951 from klueska/upstream-update-cpu-amanger-numa-mapping
Update the CPUManager to include NUMANodeID in its topology information
2019-08-28 08:55:40 -07:00
Kubernetes Prow Robot
20bd60cb9b
Merge pull request #81935 from k-toyoda-pi/use_log_e2e_apps
Use log functions of core framework on test/e2e/apps
2019-08-28 08:55:26 -07:00
Kubernetes Prow Robot
a927ed454c
Merge pull request #81576 from logicalhan/scheduler-migration
migrate scheduler metrics to stability framework
2019-08-28 08:55:12 -07:00
Antoine Pelisse
353b1ee084 Tombstone the former Fields field by commenting the old entry 2019-08-28 08:54:17 -07:00
Clayton Coleman
a49a554211
Move the IsMasterNode function to tests and mark it Deprecated
A future change will stop using this signal and instead use a
label selector passed on creation.
2019-08-28 11:17:27 -04:00
RainbowMango
c8c055b316 Cleanup staticcheck issues for package in client-go. 2019-08-28 23:08:17 +08:00
Clayton Coleman
2888e6e923
Node lifecycle controller should use a label for excluding nodes
The current mechanism for excluding "master" nodes based on node names
is fragile and should be fixed by using a label exclusion similar to
service load balancers. The legacy code path is preserved behind a
defaulted-on gate and will be removed in the future.
2019-08-28 10:29:08 -04:00
Clayton Coleman
0f49d892d5
Service controller should begin moving away from node-role labels
The service load balancer controller should honor the
LegacyNodeRoleBehavior feature gate for checks that use node-roles,
switch to using a non alpha annotation behind the gate, and prepare
to graduate to beta.
2019-08-28 10:29:08 -04:00
Clayton Coleman
901da441de
Add a feature gate for legacy node-role behavior
This gate will default to on in 1.16 to cover the behavior of the
existing system, and then in the future default to off and then be
removed once all consumers have migrated.
2019-08-28 10:17:48 -04:00
Aldo Culquicondor
3c1f8a8c4e [Framework] Add UnschedulableAndUnresolvable status code
The status can be used by (Pre)Filter plugins to indicate that
preemption wouldn't change the decision of the filter.

Signed-off-by: Aldo Culquicondor <acondor@google.com>
2019-08-28 10:10:47 -04:00
Jianfei Bai
ccc45880a7 fix: prevent overriding of certain kubelet security configuration parameters if the user wished to modify them. 2019-08-28 21:01:49 +08:00
Kubernetes Prow Robot
bdfc8f62b4
Merge pull request #81949 from yastij/remove-ftg-name-dep
remove dependency to pkg/features on service controller package
2019-08-28 05:12:15 -07:00
Kubernetes Prow Robot
af359c38e9
Merge pull request #81948 from beautytiger/ginkgo_fail
Cleanup ginkgo.Fail calls from the e2e test framework
2019-08-28 05:11:55 -07:00
Kubernetes Prow Robot
8af33f9733
Merge pull request #81946 from deads2k/cache
add cache-control headers to kube-apiserver
2019-08-28 05:11:39 -07:00
Kubernetes Prow Robot
8f17e46e5c
Merge pull request #81943 from dims/update-import-aliases-for-1.16-test-e2e
Use preferred import packages for test/e2e
2019-08-28 05:11:25 -07:00
Kubernetes Prow Robot
6c45b3c230
Merge pull request #79539 from bclau/tests/run-as-username
tests: Adds Windows RunAsUserName tests
2019-08-28 05:11:11 -07:00
Han Kang
8da448dbe3 migrate scheduler metrics endpoint to metrics stability framework 2019-08-28 03:40:43 -07:00
Patrick Ohly
5088b2ee2f e2e storage: read/write + read-only ephemeral inline volume test, data sharing
The assumption so far was that all drivers support read/write
volumes. That might not necessarily be true, so we have to let the
test driver specify it and then test accordingly.

Another aspect that is worth testing is whether the driver correctly
creates a new volume for each pod even if the volume attributes are
the same. However, drivers are not required to do that, so again we
have to let the test driver specify that.
2019-08-28 12:20:54 +02:00
Patrick Ohly
cead39cc97 e2e storage: wait for pod deletion
After deleting a pod, we need to be sure that it really is gone,
otherwise there is a race condition: if we remove the CSI driver that
is responsible for the volume used by the pod before the pod is
actually deleted, deleting the pod will fail.
2019-08-28 12:20:54 +02:00