Skip to content
This repository has been archived by the owner on Sep 30, 2020. It is now read-only.

Master <- v0.14.x branch #1592

Merged
merged 2 commits into from
May 16, 2019
Merged

Master <- v0.14.x branch #1592

merged 2 commits into from
May 16, 2019

Conversation

davidmccormick
Copy link
Contributor

Update master in line with the v014.x release

* Allow setting of kubernetes version through the build script not hidden away in the api package.

Update to k8s v1.13.5

Put the worker/kubelet and admin certs on the controllers.
Disabled apiserver insecure port 8080 - only https on 443 alllowed.

Configure controllers kubelet to do TLS bootstrapping same as workers (if >=1.14).

Update Networking Components (calico v3.6.1, flannel v0.11.0)

Enable PodPriority by default

Enable Metrics-server by default and remove heapster

Enable CoreDNS for Cluster DNS resolution

Refactor install-kube-system (group related manifests for clarity and deploy with single apply/delete for performance)

Update install-kube-system to clean up deprecated services and objects (.e.g. heapster)

Update Kiam to 3.2 - WARNING! Kiam Server Certificate now needs to be re-generated to include SAN "kiam-server" (previously was just kiam-server:443)

Remove Experminental Settings for TLSBootstrap, Pod Priority, NodeAuthorizer, PersistentVolumeClaimResize

Remove experimental Mutating and Validating Webhooks which are now enabled by default.

Update the node role label to node.kubernetes.io/role which is allowed by the NodeRestriction AdmissionController

* Update k8s version to v.1.14.1

* Reference the correct hyperkube image

* cherry pick kubelet configuration change

* Fix cluster dns setting

* Turn off serverTLSBootstrap by default because the csr's are not automatically signed

* Enable kubelet anonymous authentication but only allow Webhook authorization

Add RBAC objects to allow unauthenticated access to the kubelet's /healthz endpoint (so that cfn-signal can curl it without creds)

* Allow metrics-server to scrape kubelets with self-signed certificates

* update vendor

* Wrap apply-kube-aws-plugins into install-kube-system (so that we can do things after the plugin manifests and/or helm charts have been deployed)

* Update RBAC for Nodes to allow authenticated access to things like /logs to authenticated users

* Enable PodSecurityPolicies by default

Create core permissive policy for kube-system and optionally bind all SA's and Authenticated users to it if it is the only PSP present in the system

Remove deprecated DenyEscalatingExec admission controller in favour of using the PodSecurityPolicy controller

* Allow access to the kubelets for metrics scraping from worker nodes

* Add more calico crds that Typha wants to watch

* Add the old node labels back in

* Map Group system:nodes and User kube-worker to core permissive psp so that controller nodes can create mirror pods.

Remove writing kube-aws version to the motd - causing extended rolls just to update version number which is available on a tag anyway.

* Preserve multiple node roles in 0.14

* Correct broken default dashboard cpu resource

* Update kiam command line

* Fix for tiller not able to access kubelet

* Add localhost to kiam server cert

* Allow pass-through proxying to  all aws metadata values

* Correct regex

* Remove annoying request timeout
* Adding cluster-autoscaler plugin

* Empty commit to trigger build
@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. labels May 16, 2019
@k8s-ci-robot k8s-ci-robot requested review from cknowles and redbaron May 16, 2019 09:15
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
To fully approve this pull request, please assign additional approvers.
We suggest the following additional approver: c-knowles

If they are not already assigned, you can assign the PR to them by writing /assign @c-knowles in a comment when ready.

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@codecov-io
Copy link

codecov-io commented May 16, 2019

Codecov Report

Merging #1592 into master will decrease coverage by 0.2%.
The diff coverage is 2.22%.

Impacted file tree graph

@@            Coverage Diff             @@
##           master    #1592      +/-   ##
==========================================
- Coverage   25.87%   25.67%   -0.21%     
==========================================
  Files          98       98              
  Lines        5074     5052      -22     
==========================================
- Hits         1313     1297      -16     
+ Misses       3614     3610       -4     
+ Partials      147      145       -2
Impacted Files Coverage Δ
pkg/api/deployment.go 0% <ø> (ø) ⬆️
pkg/api/types.go 0% <ø> (ø) ⬆️
pkg/model/node_pool_compile.go 54.54% <ø> (-1.16%) ⬇️
pkg/model/node_pool_config.go 23.75% <ø> (-11.14%) ⬇️
pkg/api/feature_gates.go 0% <0%> (ø) ⬆️
pkg/api/cluster.go 0% <0%> (ø) ⬆️
credential/generator.go 0% <0%> (ø) ⬆️
pkg/model/credentials.go 60.6% <50%> (-1.16%) ⬇️
pkg/model/config.go 52.38% <0%> (-2.39%) ⬇️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 623ae83...b7c5e99. Read the comment docs.

@davidmccormick davidmccormick merged commit eb2ecb6 into master May 16, 2019
@zonzamas
Copy link
Contributor

Amazing, thanks!

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants