Commit Graph

159 Commits

Author SHA1 Message Date
Stephen Schlie 991fc5bc7c Integrating Canal (Flannel + Calico) for CNI (#1459)
* Integrating Canal (Flannel + Calico) for CNI

Initial steps to integrate Canal as a CNI provider for kops

Removed CNI in help as per chrislovecnm

* Integration tests, getting closer to working

- Added some integration tests for Canal
- Finding more places Canal needed to be added
- Sneaking in update to Calico Policy Controller

* Add updated conversion file

* turned back on canal integration tests

* fixed some rebase issues

* Fixed tests and flannel version

* Fixed canal yaml, and some rebasing errors

- Added some env vars to the install-cni container to get the proper
  node name handed off

* Added resource limits

- set resource limits on containers for Canal
- Ran through basic calico tutorials to verify functionality

* Updating Calico parts to Calico 2.0.2
2017-02-11 11:03:23 -05:00
Manuel de Brito Fontes 6168606712 Map kubelet flag volume-plugin-dir 2017-02-10 11:20:15 -03:00
Eric Hole 768508f00f Add a warning that egress is not appropriate for public subnets 2017-02-07 15:33:16 -05:00
Justin Santa Barbara 5a4ddb2f8d create cluster: take correct k8s version
We were not overriding the cluster version, even when a kubernetes
version could be determined from the direct specifications.
2017-02-07 01:18:13 -05:00
Justin Santa Barbara a909f38b9c Merge pull request #1790 from justinsb/k8s_version_per_kops_version
Recommend a k8s version based on each kops version
2017-02-06 20:13:57 -05:00
Justin Santa Barbara c6d3675788 fix conversion for v1alpha1 adminAccess
The empty slice was interpreted as "0.0.0.0/0"
2017-02-06 01:30:06 -05:00
Justin Santa Barbara 2d37ab1ca5 Recommend a k8s version based on each kops version
So the flow is that we recommend (or strongly recommend) a new kops
version when one is required for a new version, and then the new kops
version will recommend (or strongly recommend) a new k8s version.

We don't have a notion of multiple recommended k8s versions per kops
version - that is what channels are for.

Users are always free to disregard updates, even "required" ones by
setting a flag.
2017-02-06 01:06:03 -05:00
Kamil Hristov a29b5f640a Edit EtcdClusterSpec: replace Config -> PodManifestPath 2017-02-02 23:33:20 +02:00
Justin Santa Barbara e875c27ab8 Workaround for time.Duration zero value
Go 1.6 has the zero value of time.Duration render to a string as `0`,
but 1.7 and on renders as `0s`.

Force to `0s` for consistency across versions.
2017-02-01 00:30:02 -05:00
Justin Santa Barbara 493a336f35 Add apimachinery codegen 2017-01-31 23:12:41 -05:00
Justin Santa Barbara 1172fb2b95 Add Eviction flags
Otherwise we were not evicting based on low inodes

Also add the notion of a flag-default, so we can pass fewer spurious
flags, and gget closer to the component model
2017-01-31 23:12:35 -05:00
Justin Santa Barbara 44d9a30f68 Map NvidiaGPUs / --experimental-nvidia-gpus
Issue #518
2017-01-31 10:40:23 -05:00
Justin Santa Barbara 37bfe29406 Merge pull request #1444 from tsupertramp/allow-adding-existing-security-groups
Allow adding existing security groups
2017-01-31 00:27:40 -05:00
Michael Taufen bc615ae923 Config is deprecated, use PodManifestPath 2017-01-30 16:01:43 -08:00
Thomas Peitz 640d28dce4 Rename json:additionalSecurityGroupIDs to additionalSecurityGroups 2017-01-30 18:58:49 +01:00
Thomas Peitz d09a13ce4b Add generated conversion 2017-01-30 18:58:48 +01:00
Thomas Peitz 96f71b8fab Allow additional NodeSecurityGroupIDs, MasterSecurityGroupIDs 2017-01-30 18:58:48 +01:00
Justin Santa Barbara 7e232f14d8 Allow specification of multiple CIDRs to create cluster
Fix #1641
2017-01-28 15:58:50 -05:00
Justin Santa Barbara 379e0ca098 Channel manifest should be version aware
* We can target AMIs to kubernetes versions
* We can recommend / force a kops upgrade
* We can recommend / force a kubernetes upgrade
2017-01-25 23:13:48 -05:00
Justin Santa Barbara c89f58d260 Better validate CIDRs - provide some hints on failure
With this:

`kops create cluster ... --admin-access 12.34.56.78`

gives

spec.sshAccess[0]: Invalid value: "12.34.56.78": Could not be parsed as
a CIDR (did you mean "12.34.56.78/32")

Fix #1595
2017-01-25 02:18:35 -05:00
Justin Santa Barbara 5afbc00b76 Add test for isSubnet 2017-01-25 00:25:22 -05:00
Justin Santa Barbara 9e015285f8 validation: Validate we specify ids for all subnets
Move our validation to the apimachinery style.  And then add a
validation that we specify IDs either for all subnets or no subnets.
2017-01-24 12:38:52 -05:00
Kris Nova 084758917b Merge pull request #1503 from justinsb/mixed_networking
Turn off validation that master & nodes have same topology
2017-01-21 11:37:39 -07:00
Kris Nova 97afdf9f97 Merge pull request #1357 from justinsb/authn_flags
Add authz flags
2017-01-21 11:36:46 -07:00
Kris Nova 1b50cab930 Merge pull request #1574 from justinsb/lots_of_flags
Map a bunch of flags
2017-01-21 10:50:20 -07:00
Justin Santa Barbara d885074723 Merge pull request #1560 from justinsb/kops_get_should_include_cluster_label
Include `cluster` label in `kops get ig -oyaml`
2017-01-21 09:50:58 -05:00
Justin Santa Barbara 01cd64d800 apimachinery for the flags added 2017-01-20 12:32:13 -05:00
Justin Santa Barbara de884f4fb7 Map docker --bip flag
Fix #710
Fix #42
2017-01-20 12:31:41 -05:00
Justin Santa Barbara 5c177fb5e4 Map terminated-pod-gc-threshold flag
Fix #998
2017-01-20 11:55:23 -05:00
Justin Santa Barbara 98603bf6f0 Map image-gc-high/low-threshold kubelet flags
Fix #1243
2017-01-20 11:52:11 -05:00
Justin Santa Barbara 5a7ef0711b Max kubelet max-pods flag
Fix #1445
2017-01-20 11:49:48 -05:00
Justin Santa Barbara db54ecf23d Map enable-custom-metrics kubelet flag
Fix #1467
2017-01-20 11:46:07 -05:00
Justin Santa Barbara 33884d232c Add authz flags
We aren't wiring them up now, but this unblocks people that want to have
a go.
2017-01-20 11:43:21 -05:00
Justin Santa Barbara 686e4efa3b Egress follow up
* Round trip to v1alpha1
* Enable test
2017-01-20 00:40:41 -05:00
Justin Santa Barbara bb46c3ca32 Turn off validation that master & nodes have same topology
First step towards supporting mixed-modes.
2017-01-19 23:00:24 -05:00
Justin Santa Barbara 2b277c6789 Include `cluster` label in `kops get ig -oyaml`
Fix #1559
2017-01-19 22:59:55 -05:00
Justin Santa Barbara a60e10eacd Merge pull request #1366 from reactiveops/kris-and-eric-1282
Specify Existing NAT Gateways to Use in Cluster Creation
2017-01-19 21:06:12 -05:00
Eric Hole 1e3d94392c Major redo/squash of the work to get egress added to the API and hooked up.
One commit from the always incredible @kris-nova was incorporated here, it was to
check for tags in `kutil/delete_cluster.go`. She was a major driver and instrumental in getting
this to where we aere now!
2017-01-19 16:57:42 -05:00
Justin Santa Barbara 165ead4fac Merge pull request #1170 from yissacharcw/extensible-iam-roles
Add support for extensible IAM permissions
2017-01-19 12:45:55 -05:00
Justin Santa Barbara 2af86f4c37 Merge pull request #1438 from blakebarnett/bdb/add_odic_flags
Add OIDC flags
2017-01-19 00:32:30 -05:00
Justin Santa Barbara a77c1ed50c Merge pull request #1465 from DualSpark/k-c-m-attachedetachflag
Updates for new k-c-m flag
2017-01-18 21:44:55 -05:00
Chris Love bc5d01962a Merge pull request #1504 from justinsb/fix_1198
Validate that bastion IdleTimeout < 1 hour
2017-01-18 12:35:05 -08:00
chrislovecnm 3cabfb25d0 Updates to add new flag used by Kubernetes Controller manager: attach-detach-reconcile-sync-period 2017-01-18 12:29:29 -08:00
Kris Nova d41c655d9f Adding notes from call 2017-01-17 09:35:38 -07:00
Kris Nova 2d76602a3b Merge branch 'kris-and-eric-1282' of github.com:reactiveops/kops into eric-kris 2017-01-17 08:28:27 -07:00
Justin Santa Barbara 3c7e19ecae Validate that bastion IdleTimeout < 1 hour
Fix #1198
2017-01-17 01:33:03 -05:00
Kris Nova edded7ad6c Merge pull request #1483 from justinsb/int_to_int32
Change int to int32 in API
2017-01-16 20:04:28 -07:00
Blake 754f0e98a9 Change JSON var format, add some comments. 2017-01-15 15:55:35 -08:00
Blake 6d0a1f5a2a Run go fmt - oops 2017-01-15 15:55:35 -08:00
Blake 0b00ce6fd3 Add OIDC flags 2017-01-15 15:55:35 -08:00