Commit Graph

35 Commits

Author SHA1 Message Date
Kubernetes Prow Robot 4ef6bbe229
Merge pull request #9175 from mtl-wgtwo/calico-ip-detection-method
Enable configuration of the calico IP_AUTODETECTION_METHOD  and IP6_AUTODETECTION_METHOD
2020-06-03 06:24:18 -07:00
John Gardiner Myers c1562291d7 Update adding_a_feature.md with more modern example 2020-05-28 23:19:14 -07:00
Matt Long b983af231e Update validation per code review comments 2020-05-28 11:13:56 +02:00
Matt Long 1fea54bc3c Update regex in test 2020-05-27 15:44:57 +02:00
Matt Long 79275f9ea8 Add additional tighter validation 2020-05-27 15:43:08 +02:00
Matt Long c00464f11d Update crds, apis, models. Add limited field validation 2020-05-27 15:24:01 +02:00
John Gardiner Myers 7e934440e5 Remove support for the legacy etcd provider as of k8s 1.18 2020-04-25 11:47:50 -07:00
Justin Santa Barbara f3a40cf87c Change NodeLocalDNS Enabled to *bool
As discussed in #8780 so we differentiate between false and not-set.
Also tweak the comment.
2020-04-17 00:09:35 -04:00
Salvatore Mazzarino d18c88a546 Add unit tests
Signed-off-by: Salvatore Mazzarino <dev@mazzarino.cz>
2020-04-10 10:44:53 +02:00
Ciprian Hacman a2c2affb5c Remove support for Docker 1.11, 1.12 and 1.13 2020-04-06 17:24:56 +03:00
John Gardiner Myers ed73726195 Address review comments 2020-02-28 21:05:43 -08:00
John Gardiner Myers 9f9b98e9f4 Merge branch 'master' into surge 2020-02-17 09:17:26 -08:00
John Gardiner Myers 53c362da25 Fix field name for api validation 2020-02-17 09:17:19 -08:00
John Gardiner Myers eb58874aea Fix inappropriate use of field.Invalid() 2020-02-16 20:59:33 -08:00
John Gardiner Myers 8844b97fe3 Fix field names in api validation 2020-02-15 14:52:27 -08:00
John Gardiner Myers 10f06c5c51 Add MaxSurge setting to cluster and instancegroup 2020-01-27 20:44:34 -08:00
Kubernetes Prow Robot e56c507c7f
Merge pull request #8271 from johngmyers/max-unavailable
Option to increase concurrency of rolling update within instancegroup
2020-01-27 20:11:39 -08:00
John Gardiner Myers dcdf08c853 Add validation of RollingUpdate field 2020-01-26 14:18:55 -08:00
John Gardiner Myers bbf85d0a15 Improve CIDR validation 2020-01-06 22:27:34 -08:00
Kubernetes Prow Robot a7eb9a202d
Merge pull request #7528 from mikesplain/calico_update_and_typha
Calico update and typha
2019-09-09 21:32:54 -07:00
mikesplain 9e55b8230a Update copyright notices
Also cleans some white spaces
2019-09-09 14:47:51 -04:00
GuyTempleton d0f8dc5760 Add ability to configure number of Typha Replicas
Adds the ability to configure the number of Typha replicas when using Calico CNI in 1.12+
to limit the impact of Calico on the APIServer and increase the scalability of the cluster.

Also adds the ability to configure Typha's Prometheus config.

Add Passing TyphaReplicas Validation Test
2019-09-09 10:00:50 -04:00
Anders Eknert bc967536ca Add mappings for Webhook authorization mode. 2019-07-30 16:02:13 +02:00
Justin SB 62f7c26f98
Support "gce" networking mode, which uses ip aliases 2019-07-19 07:54:13 -04:00
Erik Stidham 3da3b415e0 Adding Calico V3
- Add Calico configuration field to specify MajorVersion
- Add Calico V3 manifest
- Default new installations to Calico V3
  - Set etcd to V3 when calico is specified for networking
- Validate that etcd is V3 when Calico MajorVersion is v3
- Using Calico v3.2.1
2018-11-07 14:00:54 -06:00
Thanabodee Charoenpiriyakij 49b203e126 Fixes go vet complains
When try `make govet` on `go1.11beta1`. It complains many things
related to invalid string formatting:

```
pkg/kubemanifest/visitor.go:35: Verbose.Infof format %s has arg v of wrong type bool
pkg/kubemanifest/visitor.go:40: Verbose.Infof format %s has arg v of wrong type float64
upup/pkg/fi/cloudup/alitasks/disk.go:76: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/cloudup/alitasks/disk.go:91: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/cloudup/alitasks/launchconfiguration.go:89: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/cloudup/alitasks/loadbalancer.go:71: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/cloudup/alitasks/loadbalancer.go:125: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/cloudup/alitasks/scalinggroup.go:71: Verbose.Info call has possible formatting directive %q
dns-controller/pkg/dns/dnscontroller.go:603: Verbose.Infof format %s has arg records of wrong type []dns.Record
dns-controller/cmd/dns-controller/main.go:184: Verbose.Info call has possible formatting directive %q
pkg/acls/s3/storage.go:62: Verbose.Infof format %q arg u.String is a func value, not called
pkg/apis/kops/validation/validation_test.go:199: T.Fatalf format %q has arg config of wrong type *k8s.io/kops/pkg/apis/kops.DockerConfig
pkg/resources/aws/aws.go:1306: Warning call has possible formatting directive %q
pkg/resources/aws/aws.go:1313: Warning call has possible formatting directive %v
upup/pkg/fi/cloudup/aliup/ali_cloud.go:218: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/cloudup/aliup/ali_cloud.go:290: Verbose.Info call has possible formatting directive %q
upup/pkg/fi/fitasks/keypair.go:266: Errorf format %q has arg e.Name of wrong type *string
upup/pkg/fi/files_owner.go:56: Infof format %s has arg group of wrong type *fi.Group
upup/pkg/fi/users.go:57: Warning call has possible formatting directive %q
upup/pkg/fi/users.go:63: Warning call has possible formatting directive %q
upup/pkg/fi/users.go:68: Warning call has possible formatting directive %q
upup/pkg/fi/users.go:129: Warning call has possible formatting directive %q
upup/pkg/fi/users.go:135: Warning call has possible formatting directive %q
upup/pkg/fi/nodeup/nodetasks/file.go:313: Errorf format %q has arg e.Mode of wrong type *string
upup/pkg/fi/cloudup/awsup/aws_cloud.go:1021: Warningf format %q reads arg #2, but call has 1 arg
upup/pkg/fi/cloudup/awsup/aws_cloud.go:1025: Warningf format %q reads arg #2, but call has 1 arg
```
2018-08-22 22:48:22 +07:00
Justin Santa Barbara 8f15a58e8c Validate IAM additionalPolicies
We now validate them with the cluster, so we should give early and
clear feedback if the IAM policy is not valid.
2018-07-27 15:22:24 -04:00
Kubernetes Submit Queue 893217fea0 Merge pull request #3333 from robinpercy/node-port-range
Automatic merge from submit-queue

Added ability to set --service-node-port-range

Addresses: #3052 and #3326 

From what I can tell, `--service-node-port-range` has been a valid option forever, so I haven't worried about k8s versions.

@justinsb @chrislovecnm let me know if any changes are required.
2017-09-14 17:11:15 -07:00
Robin Percy e1b20c0217 Added ability to set --service-node-port-range on kube-apiserver 2017-09-07 17:01:15 -07:00
Justin Santa Barbara 15d6834113 Flannel: support choosing a backend type
We support udp, which has to the default for backwards-compatibility,
but also new clusters will now use vxlan.
2017-08-30 21:16:21 -04:00
Torin Sandall 7cf6e1036c Add support for proxy client certs
This enables external admission controller webhooks, api aggregation,
and anything else that relies on the
--proxy-client-cert-file/--proxy-client-key-file apiserver args.
2017-08-22 08:03:36 -07:00
Justin Santa Barbara 79b19bcd14 Perform validation of the security group names
Fix #2110
2017-04-07 22:43:18 -04:00
Justin Santa Barbara cb4641fea3 Code updates 2017-03-16 02:40:50 -04:00
Justin Santa Barbara c89f58d260 Better validate CIDRs - provide some hints on failure
With this:

`kops create cluster ... --admin-access 12.34.56.78`

gives

spec.sshAccess[0]: Invalid value: "12.34.56.78": Could not be parsed as
a CIDR (did you mean "12.34.56.78/32")

Fix #1595
2017-01-25 02:18:35 -05:00
Justin Santa Barbara 9e015285f8 validation: Validate we specify ids for all subnets
Move our validation to the apimachinery style.  And then add a
validation that we specify IDs either for all subnets or no subnets.
2017-01-24 12:38:52 -05:00