chore(tests): fix them up

This commit is contained in:
Jared Allard 2018-11-24 17:03:50 -08:00
parent f4de628519
commit 19811d9759
No known key found for this signature in database
GPG Key ID: 0CA9135F5BB08943
26 changed files with 31 additions and 47 deletions

View File

@ -1064,17 +1064,19 @@ func RunCreateCluster(f *util.Factory, out io.Writer, c *CreateClusterOptions) e
kv, err := k8sversion.Parse(cluster.Spec.KubernetesVersion)
if err != nil {
return err
return fmt.Errorf("failed to parse kubernetes version: %s", err.Error())
}
// check if we should set anonymousAuth to false on k8s versions gte than 1.10
// we do 1.10 since this is a really critical issues and 1.10 has support
if cluster.Spec.Kubelet == nil {
cluster.Spec.Kubelet = &api.KubeletConfigSpec{}
}
if kv.IsGTE("1.10") {
if cluster.Spec.Kubelet == nil {
cluster.Spec.Kubelet = &api.KubeletConfigSpec{}
}
if kv.IsGTE("1.10") && cluster.Spec.Kubelet.AnonymousAuth == nil {
cluster.Spec.Kubelet.AnonymousAuth = fi.Bool(false)
if cluster.Spec.Kubelet.AnonymousAuth == nil {
cluster.Spec.Kubelet.AnonymousAuth = fi.Bool(false)
}
}
// Populate the API access, so that it can be discoverable

View File

@ -23,7 +23,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.7.1

View File

@ -33,7 +33,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesVersion: v1.6.0-alpha.3
masterPublicName: api.ha.example.com
networkCIDR: 172.20.0.0/16

View File

@ -31,7 +31,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.6.0-alpha.3

View File

@ -39,7 +39,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesVersion: v1.6.0-alpha.3
masterPublicName: api.ha.example.com
networkCIDR: 172.20.0.0/16

View File

@ -37,7 +37,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.6.0-alpha.3

View File

@ -31,7 +31,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.8.0-beta.1

View File

@ -39,7 +39,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.4.8

View File

@ -26,7 +26,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesVersion: v1.4.8
masterPublicName: api.private.example.com
networkCIDR: 172.20.0.0/16

View File

@ -24,7 +24,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.4.8

View File

@ -25,8 +25,7 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesVersion: v1.12.0
kubernetesVersion: v1.11.0
masterPublicName: api.minimal.example.com
networkCIDR: 172.20.0.0/16
networking:

View File

@ -23,10 +23,9 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.12.0
kubernetesVersion: v1.11.0
masterPublicName: api.minimal.example.com
networkCIDR: 172.20.0.0/16
networking:

View File

@ -2,4 +2,4 @@ ClusterName: minimal.example.com
Zones:
- us-test-1a
Cloud: aws
KubernetesVersion: v1.12.0
KubernetesVersion: v1.11.0

View File

@ -26,7 +26,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesVersion: v1.4.8
masterPublicName: api.private.example.com
networkCIDR: 172.20.0.0/16

View File

@ -24,7 +24,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.4.8

View File

@ -23,7 +23,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.7.5

View File

@ -30,7 +30,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesVersion: v1.4.8
masterPublicName: api.private.example.com
networkCIDR: 172.20.0.0/16

View File

@ -28,7 +28,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.4.8

View File

@ -24,7 +24,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.4.8

View File

@ -25,7 +25,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesVersion: v1.4.8
masterPublicName: api.subnet.example.com
networkCIDR: 10.0.0.0/12

View File

@ -23,7 +23,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.4.8

View File

@ -25,7 +25,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesVersion: v1.4.8
masterPublicName: api.subnet.example.com
networkCIDR: 10.0.0.0/12

View File

@ -23,7 +23,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.4.8

View File

@ -25,7 +25,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesVersion: v1.4.8
masterPublicName: api.vpc.example.com
networkCIDR: 10.0.0.0/12

View File

@ -23,7 +23,6 @@ spec:
iam:
allowContainerRegistry: true
legacy: false
kubelet: {}
kubernetesApiAccess:
- 0.0.0.0/0
kubernetesVersion: v1.4.8

View File

@ -280,7 +280,6 @@ func (c *ApplyClusterCmd) Run() error {
cluster.Spec.KubernetesVersion = versionWithoutV
}
// TODO: consider moving this somewhere, it's duplicated on create
kv, err := k8sversion.Parse(cluster.Spec.KubernetesVersion)
if err != nil {
return err
@ -288,21 +287,27 @@ func (c *ApplyClusterCmd) Run() error {
// check if we should recommend turning off anonymousAuth on k8s versions gte than 1.10
// we do 1.10 since this is a really critical issues and 1.10 has it
if cluster.Spec.Kubelet == nil {
cluster.Spec.Kubelet = &kops.KubeletConfigSpec{}
}
if kv.IsGTE("1.10") {
// we do a check here because setting modifying the kubelet object messes with the output
warn := false
if cluster.Spec.Kubelet == nil {
warn = true
} else if cluster.Spec.Kubelet.AnonymousAuth == nil {
warn = true
}
if kv.IsGTE("1.10") && cluster.Spec.Kubelet.AnonymousAuth == nil {
fmt.Println("")
fmt.Printf(starline)
fmt.Println("")
fmt.Println("Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilites.")
fmt.Println("It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster'")
fmt.Println("")
fmt.Println("See https://github.com/kubernetes/kops/blob/master/docs/security.md#kubelet-api")
fmt.Println("")
fmt.Printf(starline)
fmt.Println("")
if warn {
fmt.Println("")
fmt.Printf(starline)
fmt.Println("")
fmt.Println("Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilites.")
fmt.Println("It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster'")
fmt.Println("")
fmt.Println("See https://github.com/kubernetes/kops/blob/master/docs/security.md#kubelet-api")
fmt.Println("")
fmt.Printf(starline)
fmt.Println("")
}
}
if err := c.AddFileAssets(assetBuilder); err != nil {