Commit Graph

508 Commits

Author SHA1 Message Date
georgebuckerfield da36425dfb Enable support for encryption-at-rest
- add a new kops secret command to store encryption config
- add the experimential-encryption-provider-config flag to the kube-apiserver
- add functionality to nodeup to create the stored encryption config in the correct path
2017-09-22 17:14:51 +01:00
Rohith b64795673d DNS Controller Limitation
The current implementation does not place any limitation on the dns annontation which the dns-controller can consume. In a multi-tenented environment was have to ensure certain safe guards are met, so users can't byt accident or intentionally alter our internal dns. Note; the current behaviour has not been changed;

- added the --watch-namespace option to the dns controller and WatchNamespace to the spec
- cleaned up area of the code where possible or related
- fixed an vetting issues that i came across on the journey
- renamed the dns-controller watcher files
2017-09-22 11:37:00 +01:00
wlan0 0d91badd8f Add apimachinery changes to enable cloud controller manager
This is part I of multi part Pull Request to enable the
cloud-controller-manager through kops. This specific PR introduces the
cloud-controller-manager api, and puts it behind a feature flag.

Please feel free to merge this.
2017-09-21 10:01:09 -07:00
Kubernetes Submit Queue 0756ece56f Merge pull request #3421 from KashifSaadat/canal-config-options
Automatic merge from submit-queue. .

Support additional config options for Canal Networking

Add support for additional global and iptables configuration options within the Canal Networking Spec: https://docs.projectcalico.org/v2.4/reference/felix/configuration

- **ChainInsertMode:** Controls whether Felix inserts rules to the top of iptables chains, or appends to the bottom. Leaving the default option is safest to prevent accidentally breaking connectivity. Default: 'insert' (other options: 'append')
- **PrometheusMetricsEnabled:** Set to enable the experimental Prometheus metrics server (default: false)
- **PrometheusMetricsPort:** TCP port that the experimental Prometheus metrics server should bind to (default: 9091)
- **PrometheusGoMetricsEnabled:** Enable Prometheus Go runtime metrics collection
- **PrometheusProcessMetricsEnabled:** Enable Prometheus process metrics collection
2017-09-21 08:20:49 -07:00
Kubernetes Submit Queue 66b9838a8c Merge pull request #3215 from johnzeringue/specify-ssh-key-name
Automatic merge from submit-queue. .

Allow specifying a SSH key name for AWS

Related to #2309, this allows naming an existing key pair using the
cluster spec field `sshKeyName`.

In our use case, kops can now be used without providing the ability to
create EC2 key pairs.
2017-09-20 21:15:43 -07:00
Kashif Saadat f1109dbf29 Support additional config options for Canal Networking 2017-09-20 15:44:02 +01:00
Andrey Chernih b3acc4b5f8 Merge branch 'master' into enable-critical-feature-gate 2017-09-18 20:05:22 -07:00
Andrey Chernih 56553c5971 Add ability to override feature gates and check version 2017-09-18 20:04:54 -07:00
Kubernetes Submit Queue 5cb443d4a9 Merge pull request #3290 from romana/romana-networking-option
Automatic merge from submit-queue

Add romana to built-in CNI options

This PR adds `romana` as a networking option for kops.

It installs the latest "preview" release of Romana v2.0, which provides the expected features in terms of IP allocations and route configuration. Network policy features are being ported to 2.0 and will be in the final release. (We intend to submit a followup PR for kops as part of that rolling out that release.)

Note: in this setup, we're using the etcd cluster that kops deploys for k8s. This isn't ideal, but some possibilities (eg: StatefulSets) aren't practical for the CNI itself, and creating a parallel etcd cluster via manifests seemed to be a more-intrusive approach than using the existing one.
If this is a concern or problem, then I'm very open to discussing and implementing it based on your suggestions.

Also, some functionality is exclusive to AWS environments. Other cloud platforms are on Romana's roadmap but not developed yet. Let me know that restriction needs to be enforced in code or directly documented.
2017-09-14 20:43:05 -07:00
Kubernetes Submit Queue 893217fea0 Merge pull request #3333 from robinpercy/node-port-range
Automatic merge from submit-queue

Added ability to set --service-node-port-range

Addresses: #3052 and #3326 

From what I can tell, `--service-node-port-range` has been a valid option forever, so I haven't worried about k8s versions.

@justinsb @chrislovecnm let me know if any changes are required.
2017-09-14 17:11:15 -07:00
Caleb Gilmour 79d331e590 Add support for Romana as a networking option 2017-09-13 22:48:18 +00:00
Kubernetes Submit Queue 26e1cb06bf Merge pull request #3190 from justinsb/flannel_vlxan
Automatic merge from submit-queue

Flannel: change default backend type

We support udp, which has to the default for backwards-compatibility,
but also new clusters will now use vxlan.
2017-09-12 19:03:17 -07:00
Justin Santa Barbara f463a8e30e Add docs for flannel-vxlan option 2017-09-12 20:53:00 -04:00
Kubernetes Submit Queue ae51cfef95 Merge pull request #3336 from justinsb/nodeportaccess
Automatic merge from submit-queue

nodePortAccess, experimental spec override flag
2017-09-08 15:40:01 -07:00
Robin Percy e1b20c0217 Added ability to set --service-node-port-range on kube-apiserver 2017-09-07 17:01:15 -07:00
John Zeringue 13d22fdd1a Allow specifying a SSH key name for AWS
Related to #2309, this allows naming an existing key pair using the
cluster spec field `sshKeyName`.

In our use case, kops can now be used without providing the ability to
create EC2 key pairs.
2017-09-07 08:24:13 -04:00
Kubernetes Submit Queue 31e7fbf082 Merge pull request #3286 from justinsb/keyset_object
Automatic merge from submit-queue

Create Keyset API type

A Keyset holds a set of keypairs or other secret cluster material.

It is a set to support rotation of keys.

This will allow us to store secrets on kops-server (and also is a step towards
separating where we manage secrets from how we communicate them to running
clusters, which will allow bare-metal or KMS)

Starting with just the API objects.
2017-09-06 11:36:14 -07:00
Justin Santa Barbara 9d31ed1b08 nodePortAccess, experimental spec override flag
This will allow us to set CIDRs for nodeport access, which in turn will
allow e2e tests that require nodeport access to pass.

Then add a feature-flagged flag to `kops create cluster` to allow
arbitrary setting of spec values; currently the only value supported is
cluster.spec.nodePortAccess
2017-09-04 14:27:31 -04:00
Justin Santa Barbara 15d6834113 Flannel: support choosing a backend type
We support udp, which has to the default for backwards-compatibility,
but also new clusters will now use vxlan.
2017-08-30 21:16:21 -04:00
Kubernetes Submit Queue 155650eb82 Merge pull request #2504 from reactiveops/flag-watch-ingress
Automatic merge from submit-queue

Adds DNSControllerSpec and WatchIngress flag

This PR is in reference to #2496, #2468 and the issues referenced in there relating to use of the watch-ingress flag. 

This PR attempts to rectify this situation and gives users who want it, the option to turn on watch-ingress without forcing it on them. Also spits out a warning to the logs about potential side effects.

Includes notes in `docs/cluster_spec.md` to explain.
2017-08-29 23:31:57 -07:00
Kubernetes Submit Queue 47ed9e43ee Merge pull request #3307 from justinsb/misc_warnings
Automatic merge from submit-queue

Misc go vet fixes
2017-08-29 22:59:40 -07:00
Kubernetes Submit Queue 0e48620975 Merge pull request #3302 from gambol99/kubelet_options
Automatic merge from submit-queue

Additional Kubelet Options

This PR add additional options to the kubelet spec allowing users to set the --runtime-request-timeout and -volume-stats-agg-period

In related to issue https://github.com/kubernetes/kops/issues/3265
2017-08-29 14:32:55 -07:00
Kubernetes Submit Queue 6610153df9 Merge pull request #3303 from gambol99/kubelet_readonly
Automatic merge from submit-queue

Kubelet Readonly Port

The current implementation does not permit the user to specify the kubelet read-only port (which unset defaults to 10255). For security reasons we need this port switched off i.e. 0. This PR retains the default behavior but adds the readOnlyPort as an option for those whom need to override.

```shell
   podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
   podManifestPath: /etc/kubernetes/manifests
+  readOnlyPort: 0
   registerSchedulable: false
   requireKubeconfig: true
```
And tested on the box
```shell
core@ip-10-250-34-23 ~ $ egrep -o 'read-only-port=[0-9]+' /etc/sysconfig/kubelet 
read-only-port=0
```
2017-08-29 13:59:04 -07:00
Justin Santa Barbara 69e3d760f4 Misc go vet fixes 2017-08-29 09:55:40 -04:00
Rohith bf5e154225 Additional Kubelet Options
In related to issue https://github.com/kubernetes/kops/issues/3265
2017-08-29 08:44:25 +01:00
Eric Hole 673cdf6b5f Fixes merge conflicts 2017-08-28 19:10:21 -07:00
Rohith 9bbe569f3c Kubelet Readonly Port
The current implementaton does not permit the user to specify the kubelet read-only port (which unset defaults to 10255). Note security reasons we need this port switched off i.e. 0. This PR retains the default behaviour but adds the readOnlyPort as an options for those whom need to override.

   podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
   podManifestPath: /etc/kubernetes/manifests
+  readOnlyPort: 0
   registerSchedulable: false
   requireKubeconfig: true
2017-08-28 20:53:36 +01:00
Justin Santa Barbara df8bbb2ff6 baremetal: relax validation on subnets & networking
For baremetal, we don't require that subnets or the network CIDR is
specified.
2017-08-28 11:31:52 -04:00
Kubernetes Submit Queue 1aef760d86 Merge pull request #3272 from KashifSaadat/canal-custom-endpoint-to-host-action
Automatic merge from submit-queue

Allow user defined endpoint to host action for Canal

Adds ability to define `Networking.Canal.DefaultEndpointToHostAction` in the Cluster Spec. This allows you to customise the behaviour of traffic routing from a pod to the host (after calico iptables chains have been processed). `ACCEPT` is the default value and is left as-is.

`If you want to allow some or all traffic from endpoint to host, set this parameter to “RETURN” or “ACCEPT”. Use “RETURN” if you have your own rules in the iptables “INPUT” chain; Calico will insert its rules at the top of that chain, then “RETURN” packets to the “INPUT” chain once it has completed processing workload endpoint egress policy.`
2017-08-28 02:31:00 -07:00
Justin Santa Barbara 4d52a7c9e6 Add Initializers admission controller
Also sync up Admission controllers with current default sets for 1.7 &
1.8
2017-08-27 20:53:57 -04:00
Justin Santa Barbara 456a863416 codegen: apimachinery 2017-08-26 09:55:58 -04:00
Justin Santa Barbara 8792323fa0 Add Keyset API type
This will allow management of cluster secrets in kops-server
2017-08-26 08:55:23 -04:00
Kashif Saadat 2ffc790c66 Added validation to Networking Canal spec. 2017-08-26 12:53:44 +01:00
Kashif Saadat d9e4a62994 Allow user defined endpoint to host action for Canal 2017-08-26 12:53:44 +01:00
Kubernetes Submit Queue d661e27a99 Merge pull request #3240 from justinsb/create_and_update_functions
Automatic merge from submit-queue

Explicit CreateCluster & UpdateCluster functions
2017-08-25 06:37:34 -07:00
Kubernetes Submit Queue 1e3eef37bf Merge pull request #3245 from mad01/sshsecret
Automatic merge from submit-queue

Adding support for adding ssh public key from file

MVP implementation of adding secret from file related to #2195 

```bash
cat > secret.yaml <<EOF
apiVersion: kops/v1alpha2
kind: SSHSecret
metadata:
  labels:
    kops.k8s.io/cluster: dev.k8s.example.com
spec:
  username: "admin"
  sshPublicKey: "ssh-rsa AAAAB3NzaC1yc2EEEAADA dev@devbox"
EOF
```

`kops create -f secret.yaml`
2017-08-24 20:18:48 -07:00
Kubernetes Submit Queue 0aaafb8328 Merge pull request #3183 from justinsb/offline_channel
Automatic merge from submit-queue

Read the channel from the local filesystem during tests
2017-08-24 17:39:25 -07:00
Kubernetes Submit Queue 63480a79f3 Merge pull request #3259 from gambol99/docker_ulimits
Automatic merge from submit-queue

Docker Default Ulimits

The current implementation does not permit us to set the default ulimit on docker daemon (currently a requirement for our elasticsearch). This PR add the DefaultUlimit option to the DockerConfig
2017-08-24 14:30:48 -07:00
Rohith 9b9e4bb123 Docker Default Ulimits
The current implementation does not permit us to set the default ulimit on docker daemon (currently a requirement for our logstash). This PR add the DefaultUlimit option to the DockerConfig
2017-08-24 21:24:41 +01:00
Justin Santa Barbara c6e31a94c7 Explicit CreateCluster & UpdateCluster functions
This enables better validation (in the etcd status PR)
2017-08-24 14:03:37 -04:00
Alexander Brandstedt 66d4c4ed67 change PulicKey to lower p as in publicKey in json 2017-08-23 12:38:27 +02:00
Alexander Brandstedt f9867302b0 update api machinery 2017-08-23 12:22:55 +02:00
Alexander Brandstedt 5705885d02 rename sshsecret to sshcredential and update files to reflect change. 2017-08-23 12:18:10 +02:00
Kashif Saadat c9c70695ad Validate AWS machine type on cluster ig update 2017-08-23 10:00:07 +01:00
Kubernetes Submit Queue 34473e8602 Merge pull request #3210 from KashifSaadat/feature-gate-strict-iam-policies
Automatic merge from submit-queue

Allow the strict IAM policies to be optional

The stricter IAM policies could potentially cause regression for some edge-cases, or may rely on nodeup image changes that haven't yet been deployed / tagged officially (currently the case on master branch since PR https://github.com/kubernetes/kops/pull/3158 was merged in).

This PR just wraps the new IAM policy rules around a cluster spec flag, `EnableStrictIAM`, so will default to the original behaviour (where the S3 policies were completely open). Could also be used to wrap PR https://github.com/kubernetes/kops/pull/3186 if it progresses any further.

- Or we could reject this and have the policies always strict! :)
2017-08-22 20:27:54 -07:00
Kubernetes Submit Queue 4edc267fb8 Merge pull request #3090 from gambol99/file_assets
Automatic merge from submit-queue

Cluster / InstanceGroup File Assets

@chrislovecnm @justinsb ... 

The current implementation does not make it ease to fully customize nodes before kube install. This PR adds the ability to include file assets in the cluster and instaneGroup spec which can be consumed by nodeup. Allowing those whom need (i.e. me :-)) greater flexibilty around their nodes. @Note, nothing is enforced, so unless you've specified anything everything is as the same

- updated the cluster_spec.md to reflect the changes
- permit users to place inline files into the cluster and instance group specs
- added the ability to template the files, the Cluster and InstanceGroup specs are passed into context
- cleaned up and missed comment, unordered imports etc along the journey

notes: In addition to this; need to look at the detecting the changes in the cluster and instance group spec. Think out loud perhaps using a last_known_configuration annotation, similar to kubernetes
2017-08-22 19:49:48 -07:00
Kubernetes Submit Queue 7a2ff89d77 Merge pull request #3248 from andrewsykim/do
Automatic merge from submit-queue

Create cluster requirements for DigitalOcean

Initial changes required to create a cluster state. Running `kops update cluster --yes` does not work yet. 

Note that DO has already adopted cloud controller managers (https://github.com/digitalocean/digitalocean-cloud-controller-manager) so we set `--cloud-provider=external`. This will end up being the case for aws, gce and vsphere over the next couple of releases. 

https://github.com/kubernetes/kops/issues/2150

```bash
$ kops create cluster --cloud=digitalocean --name=dev.asykim.com --zones=tor1
I0821 18:47:06.302218   28623 create_cluster.go:845] Using SSH public key: /Users/AndrewSyKim/.ssh/id_rsa.pub
I0821 18:47:06.302293   28623 subnets.go:183] Assigned CIDR 172.20.32.0/19 to subnet tor1
Previewing changes that will be made:

I0821 18:47:11.457696   28623 executor.go:91] Tasks: 0 done / 27 total; 27 can run
I0821 18:47:12.113133   28623 executor.go:91] Tasks: 27 done / 27 total; 0 can run
Will create resources:
  Keypair/kops
  	Subject             	o=system:masters,cn=kops
  	Type                	client

  Keypair/kube-controller-manager
  	Subject             	cn=system:kube-controller-manager
  	Type                	client

  Keypair/kube-proxy
  	Subject             	cn=system:kube-proxy
  	Type                	client

  Keypair/kube-scheduler
  	Subject             	cn=system:kube-scheduler
  	Type                	client

  Keypair/kubecfg
  	Subject             	o=system:masters,cn=kubecfg
  	Type                	client

  Keypair/kubelet
  	Subject             	o=system:nodes,cn=kubelet
  	Type                	client

  Keypair/kubelet-api
  	Subject             	cn=kubelet-api
  	Type                	client

  Keypair/master
  	Subject             	cn=kubernetes-master
  	Type                	server
  	AlternateNames      	[100.64.0.1, 127.0.0.1, api.dev.asykim.com, api.internal.dev.asykim.com, kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local]

  ManagedFile/dev.asykim.com-addons-bootstrap
  	Location            	addons/bootstrap-channel.yaml

  ManagedFile/dev.asykim.com-addons-core.addons.k8s.io
  	Location            	addons/core.addons.k8s.io/v1.4.0.yaml

  ManagedFile/dev.asykim.com-addons-dns-controller.addons.k8s.io-k8s-1.6
  	Location            	addons/dns-controller.addons.k8s.io/k8s-1.6.yaml

  ManagedFile/dev.asykim.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6
  	Location            	addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml

  ManagedFile/dev.asykim.com-addons-kube-dns.addons.k8s.io-k8s-1.6
  	Location            	addons/kube-dns.addons.k8s.io/k8s-1.6.yaml

  ManagedFile/dev.asykim.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6
  	Location            	addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml

  ManagedFile/dev.asykim.com-addons-limit-range.addons.k8s.io
  	Location            	addons/limit-range.addons.k8s.io/v1.5.0.yaml

  ManagedFile/dev.asykim.com-addons-storage-aws.addons.k8s.io
  	Location            	addons/storage-aws.addons.k8s.io/v1.6.0.yaml

  Secret/admin

  Secret/kube

  Secret/kube-proxy

  Secret/kubelet

  Secret/system:controller_manager

  Secret/system:dns

  Secret/system:logging

  Secret/system:monitoring

  Secret/system:scheduler

Must specify --yes to apply changes

Cluster configuration has been created.

Suggestions:
 * list clusters with: kops get cluster
 * edit this cluster with: kops edit cluster dev.asykim.com
 * edit your node instance group: kops edit ig --name=dev.asykim.com nodes
 * edit your master instance group: kops edit ig --name=dev.asykim.com master-tor1

Finally configure your cluster with: kops update cluster dev.asykim.com --yes
```
2017-08-22 18:41:10 -07:00
Torin Sandall 7cf6e1036c Add support for proxy client certs
This enables external admission controller webhooks, api aggregation,
and anything else that relies on the
--proxy-client-cert-file/--proxy-client-key-file apiserver args.
2017-08-22 08:03:36 -07:00
andrewsykim 0411ba270e Create cluster requirements for DigitalOcean 2017-08-22 09:01:19 -04:00
Kashif Saadat 0e5c393f10 Rename IAM switch to legacy, default to false for new cluster creations. 2017-08-22 13:27:55 +01:00
Kashif Saadat 0aac9b7f8d Allow the strict IAM policies to be optional, default to original behaviour (not-strict) 2017-08-22 13:27:54 +01:00
Alexander Brandstedt 7bfb7c25ab adding generated core 2017-08-21 17:18:14 +02:00
Alexander Brandstedt 1eceb788e6 implementation of adding ssh public key using sshsecret spec 2017-08-21 17:18:00 +02:00
Rohith 494671eaaf Request Changes - File Assets
- removed the Mode field from the FileAsset spec
- removed the ability to template the content
- removed the need to specify the Path and instead default to /srv/kubernetes/assets/<name>
- change the FileAssets from []*FileAssets to []FileAssets
2017-08-18 18:06:45 +01:00
Rohith c15221c872 - adding a Roles filter to the file assets to choose who gets the asset 2017-08-18 18:06:44 +01:00
Rohith 2c9b27370e - using the nodetask rather than the direct MkdirAll 2017-08-18 18:06:44 +01:00
Rohith aa1a92c60e Cluster / InstanceGroup File Assets
The current implementation does not make it ease to fully customize nodes before kube install. This PR adds the ability to include file assets in the cluster and instaneGroup spec which can be consumed by nodeup. Allowing those whom need (i.e. me :-)) greater flexibilty around their nodes. @Note, nothing is enforced, so unless you've specified anything everything is as the same

- updated the cluster_spec.md to reflect the changes
- permit users to place inline files into the cluster and instance group specs
- added the ability to template the files, the Cluster and InstanceGroup specs are passed into context
- cleaned up and missed comment, unordered imports etc along the journey
2017-08-18 18:06:44 +01:00
Justin Santa Barbara 9c5d4c2bdc Rework legacy validation to use field error helpers 2017-08-17 07:43:41 -04:00
Kubernetes Submit Queue 0620cce89e Merge pull request #3063 from gambol99/hook_order
Automatic merge from submit-queue

Cluster Hooks Enhancement

Cluster Hook Enhancement

The current implementation is presently limited to docker exec, without ordering or any bells and whistles. This PR extends the functionality of the hook spec by;

- adds ordering to the hooks, with users able to set the requires and before of the unit
- cleaned up the manifest code, added tests and permit setting a section raw
- added the ability to filter hooks via master and node roles
- updated the documentation to reflect the changes
- extending the hooks to permit adding hooks per instancegroup as well cluster
- @note, instanceGroup are permitted to override the cluster wide one for ease of testing
- on the journey tried to fix an go idioms such as import ordering, comments for global export etc
- @question: v1alpha1 doesn't appear to have Subnet fields, are these different version being used anywhere?
2017-08-14 04:24:46 -07:00
Rohith 7cd214266a Requested Changes - Etvd v3
- removing the StorageType on the etcd cluster spec (sticking with the Version field only)
- changed the protokube flag back to -etcd-image
- users have to explicitly set the etcd version now; the latest version in gcr.io is 3.0.17
- reverted the ordering on the populate spec
2017-08-11 21:08:09 +01:00
Rohith f3e98af217 Etcd V3 Support
The current implementation is running v2.2.1 which is two year old and end of life. This PR add the ability to use etcd and set the versions if required. Note at the moment the image is still using the gcr.io registry image. As note, much like TLS their presently is not 'automated' migration path from v2 to v3.

- the feature is gated behine the storageType of the etcd cluster, bot clusters events and main must use the same storage type
- the version for v2 is unchanged and pinned at v2.2.1 with v2 using v3.0.17
- @question: we shoudl consider allowing the use to override the images though I think this should be addresses more generically, than one offs here and then. I know chris is working on a asset registry??
2017-08-11 21:04:31 +01:00
Rohith 7f5c83e417 Requests Changes - Hooks Enhancement
- switched to using an array of roles rather than boolean flags for node selection
- fixed up the README to reflect the changes
- added the docker.service as a Requires to all docker exec hooks
2017-08-11 12:41:08 +01:00
Rohith 0bfc2f1b24 Hooks in InstanceGroups
- extending the hooks to permit adding hooks per instancegroup as well
- @note, instanceGroup are permitted to override the cluster wide one for ease of testing
- updated the documentation to reflect the changes
- on the journey tried to fix an go idioms such as import ordering, comments for global export etc
- @question: v1alpha1 doesn't appear to have Subnet fields, are these different version being used anywhere?
2017-08-11 12:40:10 +01:00
Rohith 153db84df1 Custom Manifests via Hooks
The present implementation of hooks only perform for docker exec, which isn't that flexible. This PR permits the user to greater customize systemd units on the instances

- cleaned up the manifest code, added tests and permit setting a section raw
- added the ability to filter hooks via master and node roles
- updated the documentation to reflect the changes
- cleaned up some of the vetting issues
2017-08-11 12:40:10 +01:00
Rohith fe3dd9815c Cluster Hook Ordering
The current implementation does not permit the user to order the hooks. This PR adds optional Requires, Before and Documentation to the HookSpec which is added the systemd unit if specified.
2017-08-11 12:40:10 +01:00
Justin Santa Barbara 4767ee9e31 Read the channel from the local filesystem during tests
Another step towards working totally offline (which may never be fully
achievable, because of the need to hash assets).  But should ensure that
when we update the stable channel, we are testing against that version
in the tests, otherwise it is easy to break master.
2017-08-09 21:26:21 -04:00
asifdxtreme 18f6edd850 Fix Typo to improve GoReportCard 2017-08-08 10:48:14 +08:00
Derek VerLee ffa95b8112 Add support for cluster using http forward proxy 2017-08-07 14:30:42 -04:00
Rohith f61e1ebe08 Etcd TLS Options
- changed the location of this variable to be in the etcd cluster spec rather the kops cluster spec
- reflected the changes against the models
2017-08-06 20:50:05 +01:00
Rohith 74f59612c7 Fixes
- added the master option back the protokube, updating the nodeup model and protokube code
- removed any comments no related to the PR as suggested
- reverted the ordering of the mutex in the AWSVolumes in protokube
2017-08-06 18:52:38 +01:00
Rohith a73d255b03 Etcd TLS Options
The current implementation does not put any transport security on the etcd cluster. The PR provides and optional flag to enable TLS the etcd cluster

- cleaned up and fixed any formatting issues on the journey
- added two new certificates (server/client) for etcd peers and a client certificate for kubeapi and others perhaps (perhaps calico?)
- disabled the protokube service for nodes completely is not required; note this was first raised in https://github.com/kubernetes/kops/pull/3091, but figured it would be easier to place in here given the relation
- updated protokube codebase to reflect the changes, removing the master option as its no longer required
- added additional integretion tests for the protokube manifests;
- note, still need to add documentation, but opening the PR to get feedback
- one outstanding issue is the migration from http -> https for preexisting clusters, i'm gonna hit the coreos board to ask for the best options
2017-08-06 17:06:46 +01:00
Rohith 2057f60def Kube Proxy Feature Gates
- fixing the kubeproxy feature gates, this should have been a map not array (https://github.com/kubernetes/kops/blob/master/pkg/apis/kops/v1alpha2/componentconfig.go#L134)
2017-08-03 20:34:36 +01:00
Kubernetes Submit Queue 26e0c781ea Merge pull request #3078 from gambol99/component_options
Automatic merge from submit-queue

Vetting / Formatting / Cleanup

- fixed any of the vettting / formatting issues that i'm came across on the update
- removed the commented out lines from the componentconfig as it make its increasingly difficult to find what is supported, what is not and the difference between them.
- added SerializeImagePulls, RegisterSchedulable to kubelet (by default they are ignored)
- added FeatureGates to the kube-proxy
- fixed the vetting issue with NodeUpConfig -> Config
- added the aws london regions for cloud provider lookup

Out of interest can someone point me to where these multi-versioned componentconfig are being used?
2017-08-03 08:03:06 -07:00
Ionut Craciunescu 4d27d5d93c small docs fixes 2017-08-01 00:28:38 +01:00
Ionut Craciunescu 847bf0c2e1 updates to support aws disks with provisioned iops 2017-08-01 00:28:21 +01:00
Rohith b5066c967b Vetting / Formating / Cleanup
- fixed any of the vettting / formatting issues that i'm came across on the update
- removed the commented out lines from the componentconfig as it make its increasingly difficult to find what is supported, what is not and the difference between them.
- added SerializeImagePulls, RegisterSchedulable to kubelet (by default they are ignored)
- added FeatureGates to the kube-proxy

Out of interest can someone point me to where these multi-versioned componentconfig are being used?
2017-07-28 17:16:11 +01:00
Kubernetes Submit Queue 6aedfd4695 Merge pull request #2964 from chrislovecnm/inventory-01-add-api
Automatic merge from submit-queue

New inventory assets API

First PR of many for the Assets functionality.

See https://github.com/kubernetes/kops/pull/2917 for details
2017-07-21 11:35:45 -07:00
Justin Santa Barbara 1ac7cae629 Map pod-infra-container-image flag 2017-07-21 12:59:06 -04:00
Phillip Wittrock 6a020bcd59 Check in generated openapi for the kops apiserver.
- Note the openapi will not be regenerated on each change.  This needs to done in a follow up.
2017-07-19 18:42:09 -07:00
Chris Love e75e0692c7 Merge pull request #2982 from itskingori/node_allocatable_resources
Add reserve compute resources kubelet flags
2017-07-18 10:10:00 -06:00
King'ori Maina 05834eeb2f
Add generated code 2017-07-17 23:36:52 +02:00
King'ori Maina 5946450b39
Add node resource allocation flags for kubelet 2017-07-17 23:36:42 +02:00
Justin Santa Barbara d21d81dc5b Initial experimental kops-apiserver 2017-07-17 00:51:20 -04:00
chrislovecnm 70424c5d27 New inventory assets API 2017-07-16 21:48:54 -06:00
Justin Santa Barbara 518b088a29 Update generated apimachinery
Looks like I forgot to run it previously
2017-07-16 22:22:10 -04:00
Justin Santa Barbara 20b44091f5 Merge pull request #2929 from andrewsykim/digitalocean-provider
digitalocean feature flag
2017-07-15 12:33:07 -04:00
Justin Santa Barbara c9cec3b3d2 kube-proxy: set hostname-override on AWS
So that it matches the Node.Name

Fix #2915
2017-07-14 10:31:07 -04:00
Eric Hole ff3ef87f51 Merge branch 'master' into flag-watch-ingress 2017-07-13 17:54:32 -06:00
andrewsykim 7b44f2b7f8 digitalocean feature flag 2017-07-13 18:48:58 -04:00
Eric Hole 66bf3b6de5 Fixes imports && Updates for review 2017-07-13 16:20:47 -06:00
Justin Santa Barbara d05813365a Merge pull request #2893 from qqshfox/registry_mirrors
add registryMirrors
2017-07-13 01:35:35 -04:00
Hanfei Shen fee673592c add registryMirrors 2017-07-13 10:26:32 +08:00
Austin Moore 124a152724 Add omitempty json tag to resolvConf fields 2017-07-12 13:22:04 -04:00
Chris Love f1f6507fa8 Merge pull request #2808 from alexandrst88/aws-sg-fix
Add SG parameter into AWS cloud-config
2017-07-06 14:20:14 -06:00
Chris Love 20535248b4 Merge pull request #2773 from justinsb/authn_integration
Initial support for authentication (kopeio)
2017-07-06 14:11:22 -06:00
Justin Santa Barbara b54689b5c0 Add comment for Subnets field 2017-07-06 11:49:17 -04:00
Eric Hole 4468c6b2db Adds ExternalDNS config to cluster_spec with watchIngress flag 2017-07-04 10:34:50 -07:00
alexandrst88 6b81385584 Add SG parameter into AWS cloud-config 2017-07-04 15:44:21 +03:00
Justin Santa Barbara 7c8dcc4a0d Code changes for 1.7 2017-07-02 13:10:28 -04:00
Justin Santa Barbara ad60e93538 apimachinery & clientset generation 2017-07-02 13:10:28 -04:00
Justin Santa Barbara 462e203c49 Merge pull request #2822 from austinmoore-/fix_1808
Add field to enable EBS Volume Optimization
2017-07-01 13:58:40 -04:00
Rohith 8302c52634 Kubelet / Master Authentication
- adding the options to permit adjusting the cluster to use auth on the kubelet
- for testing i've used kubelet-client-certificate and kubelet-client-key to /srv/kubernetes/server.{cert,key} and
   setting the --client-ca-file on the node kubelet to /srv/kubernetes/ca.crt (tested as working).
- note i'm not enforcing anything i.e. the user has to edit the cluster and apply the configuration on the kubelet and kubeAPIServer in the cluster spec
2017-06-29 13:29:44 +01:00
Austin Moore f4c7c61fae Add field to enable EBS Volume Optimization 2017-06-27 16:15:54 -04:00
chrislovecnm 333119681e removing comments that are not longer generated 2017-06-22 17:11:38 -06:00
Justin Santa Barbara e945322cab Support generated clientset as alternative to vfs clientset
We modelled our VFS clientset (for API objects backed by a VFS path)
after the "real" clientsets, so now it is relatively easy to add a
second implementation that will be backed by a real clientset.

The snafu here is that we weren't really using namespaces previously.
Namespaces do seem to be the primary RBAC scoping mechanism though, so
we start using them with the real clientset.

The namespace is currently inferred from the cluster name.  We map dots
to dashes, because of namespace limitations, which could yield
collisions, but we'll deal with this by simply preventing users from
creating conflicting cluster names - i.e. you simply won't be able to
create a.b.example.com and a-b.example.com
2017-06-20 22:29:37 -04:00
Justin Santa Barbara b1627f1c66 Update generated api 2017-06-20 00:15:39 -04:00
Justin Santa Barbara 752150ef22 Initial support for authentication (kopeio)
Still experimental, so not doing a flag yet.
2017-06-20 00:15:39 -04:00
Justin Santa Barbara d2df318ecc Move CloudProvider to kops API
This avoids a circular reference when breaking up the fi package
2017-06-17 16:27:07 -04:00
Justin Santa Barbara 8fb99a87e2 Merge pull request #2680 from murali-reddy/kube-router
add support for kube-router as CNI networking provider
2017-06-16 10:37:49 -04:00
Justin Santa Barbara 60a0dfc421 Merge pull request #2662 from austinmoore-/empty-resolv-conf
Support setting empty --resolv-conf
2017-06-16 10:11:19 -04:00
Austin Moore 119a0801c9 Add support for setting the kubelet's --resolv-conf flag to an empty string 2017-06-12 15:53:52 -04:00
Murali Reddy e872dbcb86 add support for kube-router as CNI networking provider
fixes #2606

Most part of the changes are similar to current supported CNI networking
provider. Kube-router also support IPVS bassed service proxy which can
be used as replacement for kube-proxy. So the manifest for kube-router
included with this patch enables kube-router to provide pod-to-pod
networking, IPVS based service proxy and ingress pod firewall.
2017-06-09 17:01:31 +05:30
Chris Love 96e490bef1 Merge pull request #2640 from ottoyiu/kops_srcdst
Add ability to set cross-subnet mode in Calico
2017-06-04 09:37:34 -07:00
Justin Santa Barbara f736e233c8 Recognize 1.8 and 1.9 in URLs
Fix https://github.com/kubernetes/kubernetes/issues/46853
2017-06-02 11:07:18 -04:00
Jordan Jennings 6213c519e1 Make Weave MTU configurable and set AWS default config for jumbo frames 2017-05-30 06:36:09 -04:00
Otto Yiu 2e1a024b9f Add ability to set cross-subnet mode in Calico
This gives the ability to a user to enable cross-subnet mode in Calico.
Also introduces a new addon that, full disclosure, I wrote.

[ottoyiu/k8s-ec2-srcdst](https://github.com/ottoyiu/k8s-ec2-srcdst)
2017-05-29 18:54:37 -07:00
Chris Love d135085e54 Merge pull request #2447 from justinsb/deprecate_babysit_daemons
Remove babysit-daemons flag from 1.7
2017-05-08 08:36:53 -06:00
Justin Santa Barbara 42ea0d4770 Remove babysit-daemons flag from 1.7 2017-04-27 01:47:39 -04:00
chrislovecnm 1aaf973607 missing DisableSecurityGroupIngress from api files 2017-04-26 11:16:25 -06:00
Justin Santa Barbara eddd73549c Use LB IP address for private dns 2017-04-25 01:32:27 -04:00
Abrar Shivani 5889814c90 Support for vSphere Cloud Provider 2017-04-20 23:33:21 -07:00
Miao Luo 4f98f5b47e Use CoreDNS for vSphere provider (#2)
* Add support of CoreDNS for vSphere provider.

* Add instructions about how to setup CoreDNS for vSphere provider.

* Address comments for CoreDNS support code.
2017-04-20 23:33:20 -07:00
Miao Luo 716349bf22 Fix the type of vSphere fields in CloudConfig and update auto-generated conversion files.
To make sure the vSphere fields in CloudConfiguration can be successfully serialized
and output into config file.
2017-04-20 23:33:18 -07:00
Miao Luo efdffd1c41 Address comments.
1. Check the emptiness of VSPHERE_USERNAME and VSPHERE_PASSWORD
2. Move vSphere specific fields from clusterSpec to clusterSpec.CloudConfig
2017-04-20 23:33:17 -07:00
Chris Love 233cee6ffa Merge pull request #2112 from justinsb/fix_2110
Perform validation of the security group names
2017-04-20 19:58:46 -06:00
Chris Love 6e81a8c1b5 Merge pull request #2260 from justinsb/hooks_poc
PoC of hooks
2017-04-19 16:00:24 -06:00
Justin Santa Barbara 76f7665ed1 Apply gofmt 2017-04-08 01:53:09 -04:00
Justin Santa Barbara 7ba283f5e3 Merge pull request #2172 from waldman/feature/issue-2171
Add AWS CloudConfig DisableSecurityGroupIngress Configuration Parameter
2017-04-08 01:52:38 -04:00
Justin Santa Barbara 79b19bcd14 Perform validation of the security group names
Fix #2110
2017-04-07 22:43:18 -04:00
chrislovecnm 131bc77abb Adding feature gates flag for kubelet, and unit tests 2017-04-03 11:13:21 -06:00
Justin Santa Barbara e04fdbd95d PoC of hooks 2017-03-31 22:33:25 -04:00
Justin Santa Barbara db5e435c55 Merge pull request #2233 from justinsb/authorization_flag
Add authorization flag to kops create
2017-03-29 19:31:52 -04:00
Justin Santa Barbara 4fcb6e31da API machinery for AlwaysAllow 2017-03-29 13:54:44 -04:00
Justin Santa Barbara c9f412f0c8 Add authorization flag
Also add AlwaysAllow to the schema
2017-03-29 13:53:06 -04:00
Chris Love f63c52c425 Merge pull request #2225 from justinsb/use_kcm_serviceaccounts
Set --use-service-account-credentials for 1.6
2017-03-29 10:50:42 -06:00
Justin Santa Barbara 19db8b37a0 Set --use-service-account-credentials for 1.6 2017-03-29 11:42:24 -04:00
Justin Santa Barbara 8b965a0ad9 Disable insecure port for apiserver
All components need a kubeconfig
2017-03-28 21:26:17 -04:00
Justin Santa Barbara eecf22d593 Merge pull request #2206 from justinsb/kubeproxy_to_code
Move kubeproxy configuration to code
2017-03-28 19:51:02 -04:00
Justin Santa Barbara 533efb7c51 Add Authorization / RBAC option to schema 2017-03-28 15:28:54 -04:00
Justin Santa Barbara e2a06a389a Move kubeproxy configuration to code
Also map kube-proxy ClusterCIDR arg.
2017-03-28 10:03:17 -04:00
Justin Santa Barbara a7a0b38123 Merge pull request #2205 from justinsb/fix_omitempty_tag
Fix omitEmpty tag: only omitempty is valid
2017-03-28 09:49:22 -04:00
Kris Nova 5fdee1ad1f Merge pull request #2204 from kris-nova/uas
API Server - rebased on 1.6 vendor changes, and compiling main.go
2017-03-28 15:48:36 +02:00
Justin Santa Barbara 984191ef94 Fix omitEmpty tag: only omitempty is valid
Although actually omitEmpty appears to be recognized, although it is not
"traditional".
2017-03-28 02:16:53 -04:00
Justin Santa Barbara fea4df5868 Merge pull request #2202 from justinsb/post_2095
More log options for k8s 1.6
2017-03-28 01:25:20 -04:00
Justin Santa Barbara cb8ea7e043 Use repeated flags for log-opt to docker
Also add tests for the expected format
2017-03-28 00:53:31 -04:00
Justin Santa Barbara 1e9c2cb2d8 Multiple log-opt, log-driver options for docker
Also only change for 1.6
2017-03-28 00:53:26 -04:00
Justin Santa Barbara e6fb0a3d67 Move kube-scheduler to code & RBAC 2017-03-28 00:26:59 -04:00
Justin Santa Barbara b541a3fe68 ObjectMeta now _cannot_ be a named field
Previously we had to make it a named field to work around an
apimachinery bug, but apiserver can't cope if it is a named field.
2017-03-28 06:10:22 +02:00
Justin Santa Barbara 4fdded6e4b Fixes for updated apiserver/apimachinery 2017-03-28 06:10:21 +02:00
Justin Santa Barbara 8b4ce49e9b Initial work on UAS 2017-03-28 06:10:21 +02:00
Justin Santa Barbara 4006741a5d Update for new taints / labels names 2017-03-27 23:13:39 -04:00
Justin Santa Barbara 86d544c2f3 Update protokube to make tainting optional
As of 1.6, kubelet can apply the taints, so we don't need to do it in
protokube.
2017-03-27 23:08:15 -04:00
Justin Santa Barbara 1a74d9d759 Merge pull request #2095 from faraazkhan/master
Use built in log rotation capabilities of the docker daemon
2017-03-27 21:49:41 -04:00
Justin Santa Barbara 9f3d7c3636 Fix merge problems from tenancy
I tried a manual conflict resolve in github; it went _ok_
2017-03-27 21:33:11 -04:00
Justin Santa Barbara 7e8ed66620 Merge branch 'master' into tenancy 2017-03-27 21:31:16 -04:00
Justin Santa Barbara bdf0d04b0a Merge pull request #2104 from justinsb/container_optimized_os
Initial Container-Optimized OS support
2017-03-27 10:21:39 -04:00
Robin Percy 5f4d0851e5 Regenerated apimachinery conversions 2017-03-25 18:38:33 -07:00
Robin Percy 3b814e109d Fixing up InstanceGroup versions
- Kubelet API hadn't yet been added to all versions, which was causing
  it to be deleted from apimachinery-generated conversions.
2017-03-25 18:36:24 -07:00
Robin Percy 4b030fed69 Added taints property to IG Spec.
- new property is only used when KubernetesVersion is 1.6 or greater
- taints are passed to kubelet via --register-with-taints flag
- Set a default NoSchedule taint on masters
- Set --register-schedule=true when --register-with-taints is used
- Changed the log message in taints.go to be less alarming if taints are
  found - since they are expected on 1.6.0+ clusters
- Added Taints section to the InstanceGroup docs
- Only default taints are allowed in the spec pre-1.6
- Custom taint validation happens as soon as IG specs are edited.
2017-03-25 18:36:00 -07:00
Leon Waldman 133153b9a2 Add AWS CloudConfig DisableSecurityGroupIngress Configuration Parameter 2017-03-22 21:49:38 -03:00
Daniel Cohen 6ed85e0ef7 Merge branch 'master' into tenancy 2017-03-22 14:47:15 -04:00
Justin Santa Barbara 8712a72e0b Merge pull request #1931 from mzsanford/instance_group_kubelet_options
Allow InstanceGroups to override Kubelet config
2017-03-22 10:32:58 -04:00
Daniel Cohen aa1205036d Specify instance tenancy on AWS
Allow tenancy to default to empty

Don't allow dedicated clusters to launch unsupported instances
2017-03-21 14:13:17 -04:00
Justin Santa Barbara b9204e9911 Initial Container-Optimized OS support
Add initial support for google's container-optimized OS (available on
GCE).
2017-03-20 23:47:37 -04:00
Chris Love 0a45503134 Merge pull request #2128 from justinsb/vendor16
Update dependencies for k8s 1.6
2017-03-16 14:33:46 -06:00
Faraaz Khan 256640d3d4 enable log rotation using built in docker option 2017-03-16 13:09:48 -05:00
Justin Santa Barbara 59d097b6be Merge pull request #2111 from dacohen/master
Remove requirement to define SSH and K8S API Access CIDRs
2017-03-16 11:07:32 -04:00
Justin Santa Barbara cb4641fea3 Code updates 2017-03-16 02:40:50 -04:00
Daniel Cohen 8945f16ead Remove requirement to define SSH and K8S API Access CIDRs 2017-03-14 09:50:22 -04:00
Seth Pollack 438483354e
add webhook authenticator flags 2017-03-09 19:47:49 -05:00
Justin Santa Barbara cdc8b034d1 Fix 1.6.0 validation
We were requiring API servers, but the apiserver flag is removed from
1.6.
2017-03-01 12:58:54 -05:00
Justin Santa Barbara 3d14d07616 Support cloud-config on GCE 2017-02-28 20:08:03 -05:00
Michael Taufen c24a017ed5 use --kubeconfig on kubelet instead of --api-servers in post 1.6 clusters 2017-02-27 15:49:11 -08:00
yissachar 8219e52c79 Merge pull request #1957 from justinsb/fix_1956
Cleanup nil handling in kubelet options
2017-02-24 00:26:33 -05:00
Robin Percy f9b3c5e584 Now applying the tags to IGs at render time.
- Previous method would have caused issues with the way tags are used
  for filtering resources.
- Updated docs and comments to only refer to instance groups, rather
  than all AWS resources
2017-02-23 06:10:15 -08:00
Robin Percy 7a1792e7cb go fmt fixes and apimachinery run 2017-02-22 09:51:18 -08:00
Robin Percy 6fa4acd49e Exposed cloud labels as a CLI option
- --cloud-labels will be applied to every kops-created resource
- Also ran apimachinery to regenerated the conversions for the new
  Cluster.ClusterLabels property.
2017-02-22 06:24:35 -08:00
Justin Santa Barbara 3ad94fc964 Merge pull request #1879 from sethpollack/fix_1872
Add audit flags to kube-apiserver
2017-02-21 00:50:30 -05:00
Justin Santa Barbara c70988f39d Move TerminatedPodGCThreshold to kcm
This is technically a breaking change, but given anyone that set it
would not have a working cluster I think we are OK to break compat.
2017-02-21 00:45:00 -05:00
Justin Santa Barbara ad12930f4f Tolerate missing ServiceClusterIPRange if not strict validation
We probably ought to get rid of non-strict validation, and just always
validate strictly after everything has been defaulted.

Issue #1956
2017-02-21 00:45:00 -05:00
Justin Santa Barbara fab539f978 Cleanup nil handling in kubelet options 2017-02-21 00:44:55 -05:00
jg Chen d489244652 fix misspell "unhealthy" in componentconfig.go 2017-02-20 14:05:09 +08:00
Seth Pollack 38b97e505c
change variable names 2017-02-17 14:55:35 -05:00
Seth Pollack f61d6c8010
change maxage, maxbackup, and maxsize to int32 2017-02-17 14:16:55 -05:00
Seth Pollack 89899b1a79
Add audit flags to kube-apiserver 2017-02-17 14:16:55 -05:00
Justin Santa Barbara 45cfd8a455 Merge pull request #1886 from zacblazic/optional-apiserver-elb-timeout
Add support for adjusting ELB idle timeout for apiserver
2017-02-17 11:25:20 -05:00
Matt Sanford b79dbd65d4 Allow InstanceGroups to override Kubelet config 2017-02-16 10:57:14 -08:00
fate-grand-order c0932d214b fix misspell "unhealthy" in componentconfig.go 2017-02-15 10:18:34 +08:00
Zac Blazic ce643d0df5
Add apimachinery generated code 2017-02-14 21:52:28 +02:00
Zac Blazic 74df54276b
Add api load balancer idle timeout field to cluster spec 2017-02-14 21:34:57 +02:00
Justin Santa Barbara 1c7818833a Merge pull request #1813 from aledbf/coreos
Initial (experimental) CoreOS support
2017-02-14 11:08:40 -05:00
chrislovecnm 0604dc107c fixing missed api file 2017-02-13 23:19:12 -07:00
Chris Love bceed6dfaf Merge pull request #1863 from mihok/cni-flannel
Adding basic flannel support
2017-02-13 22:32:10 -07:00
Chris Love 89a14c0641 Merge pull request #1797 from justinsb/conversion_v1alpha2
Add v1alpha2 conversion functions
2017-02-13 22:30:19 -07:00
Matthew Mihok bc235765d1 Adding basic flannel support 2017-02-11 16:26:18 -05:00
Justin Santa Barbara 313b08266d Add semver test that highlights the ordering problem
Everyone (mostly me) falls into the trap:

1.6.0-alpha.1 < 1.6.0

Which means you can't use >= 1.6.0 as meaning "1.6 series"
2017-02-11 14:36:19 -05:00
Manuel de Brito Fontes 6715bd53db Address comments 2017-02-11 13:57:30 -03:00
Justin Santa Barbara 1bacf8271e Initial (experimental) CoreOS support
* Detect CoreOS
* Move key manifests to code, to tolerate read-only mounts
* Misc refactorings so more code can be shared
* Change lots of ints to int32s in the models
* Run nodeup as a oneshot systemd service, rather than relying on
cloud-init behaviour which varies across distros
2017-02-11 13:57:30 -03:00
Stephen Schlie 991fc5bc7c Integrating Canal (Flannel + Calico) for CNI (#1459)
* Integrating Canal (Flannel + Calico) for CNI

Initial steps to integrate Canal as a CNI provider for kops

Removed CNI in help as per chrislovecnm

* Integration tests, getting closer to working

- Added some integration tests for Canal
- Finding more places Canal needed to be added
- Sneaking in update to Calico Policy Controller

* Add updated conversion file

* turned back on canal integration tests

* fixed some rebase issues

* Fixed tests and flannel version

* Fixed canal yaml, and some rebasing errors

- Added some env vars to the install-cni container to get the proper
  node name handed off

* Added resource limits

- set resource limits on containers for Canal
- Ran through basic calico tutorials to verify functionality

* Updating Calico parts to Calico 2.0.2
2017-02-11 11:03:23 -05:00
Manuel de Brito Fontes 6168606712 Map kubelet flag volume-plugin-dir 2017-02-10 11:20:15 -03:00