Commit Graph

9473 Commits

Author SHA1 Message Date
Mike Spreitzer
8a1b603209 Fix queued request accounting, extended queueset test 2020-03-05 15:13:46 -05:00
Mike Spreitzer
f535a9c9ed Make some metrics finer-grained, add dispatch counts, note immediate reject
Also add testing of metrics for queuesets.
2020-03-03 01:36:18 -05:00
Kubernetes Prow Robot
eaceb7bf5c Merge pull request #88419 from Jefftree/netproxy-udstoken
Add support for token authentication with network proxy
2020-03-02 22:13:37 -08:00
Kubernetes Prow Robot
53d63e11a2 Merge pull request #88584 from willise/master
fix: remove conflict comment of taint "Value"
2020-03-02 20:03:37 -08:00
Kubernetes Prow Robot
79e1ad2f4b Merge pull request #88744 from jackkleeman/kubelet-handle-intermed
Support intermediate certificate in certificate store
2020-03-02 16:16:54 -08:00
Kubernetes Prow Robot
7dccfd6121 Merge pull request #87631 from immutableT/extract-auth-metrics
Factor-out metrics related logic from authentication logic.
2020-03-02 16:16:19 -08:00
Kubernetes Prow Robot
a019609d5d Merge pull request #87508 from jennybuckley/large-obj
Don't save managedFields if object is too large
2020-03-02 16:16:05 -08:00
Kubernetes Prow Robot
4b1ee392c1 Merge pull request #79083 from jackkleeman/client-cert-file-reload
Add ability to reload client certificates from disk
2020-03-02 16:15:53 -08:00
Kubernetes Prow Robot
d115206309 Merge pull request #88609 from yue9944882/chore/follow-up-metrics
Preserve legacy inflight metrics and fixes registration
2020-03-02 14:50:06 -08:00
Kubernetes Prow Robot
e1a69aee41 Merge pull request #86837 from inductor/feature/update_japaense_translation_for_kubectl
Update po file for kubectl Japanese translation
2020-03-02 14:49:39 -08:00
Jack Kleeman
83a223f5ee Support intermediate certificate in certificate store 2020-03-02 20:24:04 +00:00
Jefftree
0989770135 Update network proxy to v0.0.7 2020-03-02 10:09:00 -08:00
Jack Kleeman
929b1559a0 Add ReloadCertFromDisk flag to rest.Config and to kubeconfig which allows the provided client certificate files to be reloaded from disk (currently on every use)
Close outbound connections when using a cert callback and certificates rotate. This means that we won't get into a situation where we have open TLS connections using expires certs, which would get unauthorized errors at the apiserver

Attempt to retrieve a new certificate if open connections near expiry, to prevent the case where the cert expires but we haven't yet opened a new TLS connection and so GetClientCertificate hasn't been called.

Move certificate rotation logic to a separate function

Rely on generic transport approach to handle closing TLS client connections in exec plugin; no need to use a custom dialer as this is now the default behaviour of the transport when faced with a cert callback. As a result of handling this case, it is now safe to apply the transport approach even in cases where there is a custom Dialer (this will not affect kubelet connrotation behaviour, because that uses a custom transport, not just a dialer).

Check expiry of the full TLS certificate chain that will be presented, not only the leaf. Only do this check when the certificate actually rotates. Start the certificate as a zero value, not nil, so that we don't see a rotation when there is in fact no client certificate

Drain the timer when we first initialize it, to prevent immediate rotation. Additionally, calling Stop() on the timer isn't necessary.

Don't close connections on the first 'rotation'

Remove RotateCertFromDisk and RotateClientCertFromDisk flags.

Instead simply default to rotating certificates from disk whenever files are exclusively provided.

Add integration test for client certificate rotation

Simplify logic; rotate every 5 mins

Instead of trying to be clever and checking for rotation just before an
expiry, let's match the logic of the new apiserver cert rotation logic
as much as possible. We write a controller that checks for rotation
every 5 mins. We also check on every new connection.

Respond to review

Fix kubelet certificate rotation logic

The kubelet rotation logic seems to be broken because it expects its
cert files to end up as cert data whereas in fact they end up as a
callback. We should just call the tlsConfig GetCertificate callback
as this obtains a current cert even in cases where a static cert is
provided, and check that for validity.

Later on we can refactor all of the kubelet logic so that all it does is
write files to disk, and the cert rotation work does the rest.

Only read certificates once a second at most

Respond to review

1) Don't blat the cert file names
2) Make it more obvious where we have a neverstop
3) Naming
4) Verbosity

Avoid cache busting

Use filenames as cache keys when rotation is enabled, and add the
rotation later in the creation of the transport.

Caller should start the rotating dialer

Add continuous request rotation test

Rebase: use context in List/Watch

Swap goroutine around

Retry GETs on net.IsProbableEOF

Refactor certRotatingDialer

For simplicity, don't affect cert callbacks

To reduce change surface, lets not try to handle the case of a changing
GetCert callback in this PR. Reverting this commit should be sufficient
to handle that case in a later PR.

This PR will focus only on rotating certificate and key files.
Therefore, we don't need to modify the exec auth plugin.

Fix copyright year
2020-03-02 17:20:16 +00:00
Kubernetes Prow Robot
e9d502e4fc Merge pull request #88663 from deads2k/enable-profiling-by-default
update kube-controller-manager and kube-scheduler to match kube-apiserver defaults
2020-03-02 07:24:43 -08:00
yue9944882
1cb42445d7 hack/update-vendor.sh 2020-03-02 21:44:58 +08:00
Mike Spreitzer
dbe8436144 Replaced uber atomic with sync atomic, removed unneded "blank import" 2020-03-02 21:36:26 +08:00
Kubernetes Prow Robot
fdb2cb4c88 Merge pull request #88509 from robscott/ingress-v1beta1-class
Adding IngressClass to networking/v1beta1
2020-03-01 20:58:42 -08:00
Rob Scott
132d2afca0 Adding IngressClass to networking/v1beta1
Co-authored-by: Christopher M. Luciano <cmluciano@us.ibm.com>
2020-03-01 18:17:09 -08:00
Kubernetes Prow Robot
1d407216e7 Merge pull request #88699 from feiskyer/vmss-update-improvement
Improve performance for VMSS LoadBalancerBackendAddressPools updates
2020-03-01 17:40:42 -08:00
Pengfei Ni
7f270038d3 Remove unused function aggregateGoroutinesWithDelay 2020-03-01 11:11:51 +00:00
Pengfei Ni
0f4cfe58d8 Switch to UpdateVMs() for updating VMSS backend address pool 2020-03-01 04:46:51 +00:00
immutablet
c0bad80e5b Factor-out metrics related logic from authentication logic. 2020-02-29 16:39:09 -08:00
Jordan Liggitt
f205e3dd59 Use only v1 CRD resources in e2e tests 2020-02-29 17:34:26 -05:00
Pengfei Ni
2af26dca97 Add UpdateVMs() for VMSS client to allow update multiple VMSSVMs by
sequential sync requests and concurent async requests.
2020-02-29 12:52:00 +00:00
Kubernetes Prow Robot
665c6648eb Merge pull request #87485 from gavinfish/kubectl_pkg_config
Staticcheck: vendor/k8s.io/kubectl/pkg/cmd/exec|config|certificates
2020-02-29 02:26:39 -08:00
Kubernetes Prow Robot
03b7f272c8 Merge pull request #88246 from munnerz/csr-signername-controllers
Update CSR controllers & kubelet to respect signerName field
2020-02-28 23:38:39 -08:00
Kubernetes Prow Robot
5488fe547d Merge pull request #86431 from SamyCoenen/patch-1
Update README.md
2020-02-28 21:30:39 -08:00
Kubernetes Prow Robot
b378b17560 Merge pull request #88675 from julianvmodesto/hide-server-dry-run
Hide deprecated --server-dry-run for kubectl apply
2020-02-28 18:44:57 -08:00
Kubernetes Prow Robot
a84cbd0a42 Merge pull request #88674 from enj/enj/t/paging_with_filter
storage: confirm that paging and predicate filtering work together
2020-02-28 18:44:47 -08:00
Kubernetes Prow Robot
268d0a1d3a Merge pull request #85870 from Jefftree/authn-netproxy
Use Network Proxy with Authentication & Authorizer Webhooks
2020-02-28 18:44:39 -08:00
Kubernetes Prow Robot
a54e1a8a04 Merge pull request #88448 from aramase/ipv6
azure: add support for single stack IPv6
2020-02-28 17:12:38 -08:00
Kubernetes Prow Robot
86568a8773 Merge pull request #88661 from eloyekunle/feat/update-crd-map-keys-docs
update map keys api doc with validation requirements
2020-02-28 15:12:52 -08:00
Monis Khan
002c75442d storage: confirm that paging and predicate filtering work together
This change adds the TestListContinuationWithFilter test which
confirms that paging with a predicate that does not match everything
results in the correct amount of calls to TransformFromStorage and
KV.Get.  The partial result of each paging call is also asserted.

Signed-off-by: Monis Khan <mok@vmware.com>
2020-02-28 17:34:04 -05:00
Jefftree
61fa4e6c09 Address comment and remove if condition 2020-02-28 14:22:19 -08:00
Julian V. Modesto
7b214c96b0 Hide deprecated --server-dry-run for kubectl apply 2020-02-28 16:20:05 -05:00
Samy Coenen
7638aae77e Update README.md 2020-02-28 21:33:03 +01:00
Samy Coenen
10049500c1 Update README.md 2020-02-28 21:30:40 +01:00
David Eads
aa07992a44 update kube-controller-manager and kube-scheduler to match kube-apiserver defaults 2020-02-28 11:18:00 -05:00
Elijah Oyekunle
2f5468f1ae update map keys api doc with validation requirements 2020-02-28 16:31:06 +01:00
Elijah Oyekunle
2e187415fd extend CRD map and set validation 2020-02-28 16:00:59 +01:00
Kubernetes Prow Robot
7587ab3ef3 Merge pull request #88620 from andyzhangx/fix-remediation-issue
fix: azure disk remediation issue
2020-02-28 04:26:38 -08:00
willise
cb477d3cc1 fix: remove conflict comment of taint "Value" 2020-02-28 17:59:57 +08:00
Kubernetes Prow Robot
c7d7cf72e0 Merge pull request #86636 from zhouya0/fix_kubectl_create_deployment_image_name
fix kubectl create deployment image name
2020-02-27 22:10:37 -08:00
Kubernetes Prow Robot
e25ff53a6f Merge pull request #88540 from damemi/move-extender-api-to-staging
Move scheduler extender API V1 to staging k8s.io/kube-scheduler
2020-02-27 20:20:52 -08:00
Kubernetes Prow Robot
79377454e8 Merge pull request #88637 from jktomer/priority-fairness-flag
Rename --enable-inflight-quota-handler to --enable-priority-and-fairness
2020-02-27 18:00:38 -08:00
Jefftree
cd57b830c1 audit webhook use network proxy 2020-02-27 17:47:23 -08:00
Jefftree
1b38199ea8 pass Dialer instead of egressselector to webhooks 2020-02-27 17:47:23 -08:00
Jefftree
d318e52ffe authentication webhook via network proxy 2020-02-27 17:47:23 -08:00
Mike Dame
e398302dc7 Add OWNERS and testing to external extender/v1 api 2020-02-27 17:45:48 -05:00
Jonathan Tomer
711c1e1720 Rename --enable-inflight-quota-handler to --enable-priority-and-fairness.
The old flag name doesn't make sense with the renamed API Priority and
Fairness feature, and it's still safe to change the flag since it hasn't done
anything useful in a released k8s version yet.
2020-02-27 14:04:37 -08:00