Commit Graph

82901 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
d7ec9f76e6
Merge pull request #81633 from andyzhangx/azuredisk-migration
fix: add kind parameter in azure disk CSI migration
2019-08-29 05:30:38 -07:00
Kubernetes Prow Robot
7d241f0ec1
Merge pull request #81626 from logicalhan/proxy-migration
migrate kube-proxy metrics to stability framework
2019-08-29 05:30:23 -07:00
Kubernetes Prow Robot
d6bc4eb853
Merge pull request #81624 from logicalhan/cm-migration
migrate controller-manager metrics to stability framework
2019-08-29 05:30:09 -07:00
Kubernetes Prow Robot
de4590e949
Merge pull request #81168 from anthonyrisinger/patch-1
Add gen_openapi target to top-level Makefile.
2019-08-29 05:29:55 -07:00
Jan Wozniak
b0459feb7d Update generated files
make generated_files UPDATE_API_KNOWN_VIOLATIONS=true
./hack/update-generated-protobuf.sh
./hack/update-openapi-spec.sh
./hack/update-bazel.sh
./hack/update-generated-swagger-docs.sh
./hack/update-generated-api-compatibility-data.sh
2019-08-29 13:26:13 +02:00
Haowei Cai
2a10b0dc31 generated 2019-08-29 04:24:47 -07:00
Haowei Cai
81e00f0b7b apiextensions: merge openapi spec ignore path conflict 2019-08-29 04:24:47 -07:00
Haowei Cai
b2c9b1f729 add a test to make sure the CRD OpenAPI path and defintion are protected
from user-defined CRDs
2019-08-29 04:24:47 -07:00
Jan Wozniak
035e648fd7 Add tests for namespace status conditions 2019-08-29 13:21:15 +02:00
Jan Wozniak
94a5e8c3dc Add status conditions to namespaces 2019-08-29 13:21:15 +02:00
Ashutosh Gangwar
535e6c084d
fix(kubectl): all-namespaces flag being ignored by ToBuilder() in builder_flags.go 2019-08-29 16:48:06 +05:30
Yassine TIJANI
3fe7a57000 use directly DeletionHandlingMetaNamespaceKeyFunc from client-go
Signed-off-by: Yassine TIJANI <ytijani@vmware.com>
2019-08-29 11:51:14 +01:00
Maciej Szulik
05c45b5cfc
Adds visitor test for traversal errors 2019-08-29 12:21:01 +02:00
Kubernetes Prow Robot
acf5411774
Merge pull request #81108 from oomichi/issue/81103
Make nodeList schedulable
2019-08-29 02:55:57 -07:00
Kubernetes Prow Robot
7da9bdc4f6
Merge pull request #81048 from robscott/endpointslice-controller
EndpointSlice Controller
2019-08-29 01:19:57 -07:00
Rob Scott
9665c590c7
Adding EndpointSlice support for kube-proxy ipvs and iptables proxiers 2019-08-29 01:06:52 -07:00
Humble Chirammal
daa19ef44c Migrate the e2e provisioner container image to a different location.
Signed-off-by: Humble Chirammal <hchiramm@redhat.com>
2019-08-29 13:10:22 +05:30
Maciej Szulik
ab1c56ae87
Move kubectl cp back to k/k 2019-08-29 09:00:47 +02:00
Kubernetes Prow Robot
454e8e6e92
Merge pull request #80514 from liuxu623/master
don't delete KUBE-MARK-MASQ chain in iptables/ipvs proxier
2019-08-28 23:49:56 -07:00
Kubernetes Prow Robot
37016c3364
Merge pull request #80182 from wongma7/windows-hostpath-test-master
Create C:\tmp if DNE
2019-08-28 22:11:55 -07:00
Khaled Henidak(Kal)
bd9108ba84 azure support for ipv6 and dual stack services(excluding ILB) 2019-08-29 05:07:01 +00:00
Rob Scott
75f6c24923
Adding EndpointSlice controller 2019-08-28 21:13:27 -07:00
Kubernetes Prow Robot
550fb1bfc3
Merge pull request #79386 from khenidak/phase2-dualstack
Phase 2 dualstack
2019-08-28 20:39:56 -07:00
Jean Rouge
4607b4ba28 Graduating Windows GMSA support to beta
Concerns from alpha-phase reviews have been addressed in
https://github.com/kubernetes/kubernetes/pull/80320
and
https://github.com/kubernetes/kubernetes/pull/82109
and early adopters have given positive feedback; so it seems there are
no blockers to graduate GMSA support to beta.

This patch also enables GMSA support by default, mainly for the sake of
making it easier for cluster admins to use, as well as for e2e tests in
nightly builds.

Signed-off-by: Jean Rouge <rougej+github@gmail.com>
2019-08-28 20:03:52 -07:00
Haowei Cai
626c4770e6 crd-e2e: check watch observes CR modified events; use WatchUnsafe
creation method when the test doesn't exercise CR API
2019-08-28 18:42:29 -07:00
Kubernetes Prow Robot
ca5babc1da
Merge pull request #81534 from logicalhan/kubelet-migration
migrate kubelet's metrics/probes & metrics endpoint to metrics stability framework
2019-08-28 18:26:45 -07:00
Kubernetes Prow Robot
30f2545364
Merge pull request #81509 from RainbowMango/pr_add_authentication_metrics
Add authentication metrics: failure, error count
2019-08-28 18:26:32 -07:00
Kubernetes Prow Robot
4ba225a541
Merge pull request #81486 from wongma7/aws-testdriver
Re-implement AWS test driver interfaces
2019-08-28 18:26:23 -07:00
Kubernetes Prow Robot
bd8a8db515
Merge pull request #81477 from paulsubrata55/kube-proxy-sctp-ipset-fix
Fix in kube-proxy for sctp ipset entries
2019-08-28 18:26:09 -07:00
Kubernetes Prow Robot
c4ccb623e8
Merge pull request #80247 from jsafrane/e2e-volume-limits
Add e2e test for CSI volume limits
2019-08-28 18:25:56 -07:00
Haowei Cai
f3c793512b fix semantics of the rejected label in webhook metrics
when error calling webhook is ignored, do not log the request as
rejected
2019-08-28 17:54:11 -07:00
misakazhou
f0323a2030 Fix broken link to api-conventions doc.
Signed-off-by: misakazhou <misakazhou@tencent.com>
2019-08-29 08:35:16 +08:00
Lubomir I. Ivanov
c9b11980ff kubeadm: fix a bug where the kubelet cert rotation was turned off
A recent commit added warnings for KubeletConfiguration and
KubeProxyConfiguration fields that kubeadm cares about and
does not recommend the user modifying them. Kubelet's
"rotateCertificates" cannot be handled using this function
as there is not way to figure out if the user has set it explicitly to
"false". Hardcode the value to "true" and add a comment about that.

Also apply the following changes to warnDefaultComponentConfigValue()
calls:
- use a local "kind" variable that defines the Kind we are warning about.
- fix wrong paths to fields.
2019-08-29 02:43:44 +03:00
Antoine Pelisse
39697519f4 Regenerate openapi-spec
Adds apply-patch content-type to openapi
2019-08-28 16:09:52 -07:00
Kevin Klues
ddfd9ac0ca Fix bug in CPUManager with setting topology for policies
Also add a check in the unit tests to avoid regressions
2019-08-28 17:32:25 -05:00
Antoine Pelisse
66f24a7308 Make ServerSideApply beta, and enable by default (on the server) 2019-08-28 15:03:42 -07:00
Antoine Pelisse
a3f4e6e933 Rename --experimental-* flags to --* for server-side apply 2019-08-28 15:03:41 -07:00
Kubernetes Prow Robot
41049fdf4b
Merge pull request #81977 from abursavich/const
Add types to StatefulSetUpdateStrategyType constants
2019-08-28 14:45:08 -07:00
Kubernetes Prow Robot
f3828b776b
Merge pull request #81965 from roycaihw/crd-feature-gates-to-ga
Bump the CRD feature gates to GA
2019-08-28 14:44:44 -07:00
Kubernetes Prow Robot
af54eae69a
Merge pull request #81612 from rikatz/issue81060
Remove watching Endpoints of Headless Services
2019-08-28 14:44:25 -07:00
Kubernetes Prow Robot
6c9f26ca3a
Merge pull request #80766 from robscott/discovery-api
Adding Discovery API for EndpointSlice
2019-08-28 14:44:09 -07:00
Kubernetes Prow Robot
b9c6f559bd
Merge pull request #80726 from wangzhen127/npd-0.7
Bump NPD version to v0.7.1 for GCI
2019-08-28 14:43:55 -07:00
Taahir Ahmed
b4e99584ce serviceaccounts: Add JWT KeyIDs to tokens
This commit fills out the JWT "kid" (KeyID) field on most
serviceaccount tokens we create.  The KeyID value we use is derived
from the public key of keypair that backs the cluster's OIDC issuer.

OIDC verifiers use the KeyID to smoothly cope with key rotations:

  * During a rotation, the verifier will have multiple keys cached
    from the issuer, any of which could have signed the token being
    verified.  KeyIDs let the verifier pick the appropriate key
    without having to try each one.

  * Seeing a new KeyID is a trigger for the verifier to invalidate its
    cached keys and fetch the new set of valid keys from the identity
    provider.

The value we use for the KeyID is derived from the identity provider's
public key by serializing it in DER format, taking the SHA256 hash,
and then urlsafe base64-encoding it.  This gives a value that is
strongly bound to the key, but can't be reversed to obtain the public
key, which keeps people from being tempted to derive the key from the
key ID and using that for verification.

Tokens based on jose OpaqueSigners are omitted for now --- I don't see
any way to actually run the API server that results in an OpaqueSigner
being used.
2019-08-28 14:18:23 -07:00
Jordan Liggitt
ddc697866a Use http/1.1 in apiserver->webhook clients 2019-08-28 16:51:57 -04:00
Jordan Liggitt
aef05c8dca Plumb NextProtos to TLS client config, honor http/2 client preference 2019-08-28 16:51:56 -04:00
Tim Allclair
a4f8ee17ee Enable the RuntimeClass admission controller on GCE & CI 2019-08-28 13:23:55 -07:00
Claudiu Belu
cafbfbea9a api: Loosens RunAsUserName validation
Currently, the character limit for the usernames set in the RunAsUserName is 20,
which is too low, considering that "ContainerAdministrator" is a valid username and
it is longer than 20 characters. A user should be able to run containers as
Administrator, if needed.

According to [1], Logon names can be up to 104 characters. The previous limit
only applies to local user accounts for the local system.

[1] https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/bb726984(v=technet.10)
2019-08-28 13:03:44 -07:00
Sandeep Rajan
3b6b7f99b0 add checksum 2019-08-28 16:03:28 -04:00
Han Kang
e1bf0b4918 group imports properly 2019-08-28 12:49:54 -07:00
Han Kang
0895ac212d migrate kube-proxy metrics to stability framework 2019-08-28 12:49:54 -07:00