Skip to content
This repository has been archived by the owner on Jul 30, 2021. It is now read-only.

bump to 1.10.0 #954

Merged
merged 1 commit into from
Apr 6, 2018
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions hack/jenkins/scripts/tqs-down.sh
Original file line number Diff line number Diff line change
Expand Up @@ -9,13 +9,15 @@ export ADDITIONAL_MASTERS=${ADDITIONAL_MASTER:-0}
export REGION="${REGION:-"us-west-2"}"
export CLUSTER_NAME="${CLUSTER_NAME:-"default"}"
export IDENT="${IDENT:-"${HOME}/.ssh/id_rsa"}"
export KUBERNETES_IDENT=${KUBERNETES_IDENT:-"${DIR}/.kubernetes-id"}

cd "${DIR}/../../terraform-quickstart"

set +x
export TF_VAR_access_key_id="${ACCESS_KEY_ID}"
export TF_VAR_access_key="${ACCESS_KEY_SECRET}"
set -x
export TF_VAR_kubernetes_id="$(cat ${KUBERNETES_IDENT})"
export TF_VAR_resource_owner="${CLUSTER_NAME}"
export TF_VAR_ssh_public_key="$(cat "${IDENT}.pub")"
export TF_VAR_additional_masters="${ADDITIONAL_MASTERS}"
Expand Down Expand Up @@ -46,3 +48,5 @@ if [[ ! -z "${destroyed_extra:-}" ]]; then
echo "Terraform required multiple 'destroy' runs to cleanup everything!"
exit -1
fi

rm -f ${KUBERNETES_IDENT}
8 changes: 8 additions & 0 deletions hack/jenkins/scripts/tqs-up.sh
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ export ADDITIONAL_MASTERS=${ADDITIONAL_MASTER:-0}
export REGION="${REGION:-"us-west-2"}"
export CLUSTER_NAME="${CLUSTER_NAME:-"default"}"
export IDENT="${IDENT:-"${HOME}/.ssh/id_rsa"}"
export KUBERNETES_IDENT=${KUBERNETES_IDENT:-"${DIR}/.kubernetes-id"}

cd "${DIR}/../../terraform-quickstart"

Expand All @@ -27,12 +28,19 @@ set +x
export TF_VAR_access_key_id="${ACCESS_KEY_ID}"
export TF_VAR_access_key="${ACCESS_KEY_SECRET}"
set -x
# terraform defaults cannot contain terraform interpolations (uuid()) so we
# generate the ID outside of terraform.
export TF_VAR_kubernetes_id="$(cat /proc/sys/kernel/random/uuid)"
export TF_VAR_resource_owner="${CLUSTER_NAME}"
export TF_VAR_ssh_public_key="$(cat "${IDENT}.pub")"
export TF_VAR_additional_masters="${ADDITIONAL_MASTERS}"
export TF_VAR_num_workers=${NUM_WORKERS}
export TF_VAR_region="${REGION}"

# write out kubernetes cluster ID so we can remove it in cleanup
rm -f ${KUBERNETES_IDENT}
echo ${TF_VAR_kubernetes_id} > ${KUBERNETES_IDENT}

# bring up compute
"${TERRAFORM}" init
"${TERRAFORM}" apply --auto-approve
Expand Down
2 changes: 1 addition & 1 deletion hack/multi-node/user-data.sample
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ coreos:
[Service]
EnvironmentFile=/etc/environment
Environment=KUBELET_IMAGE_URL=docker://gcr.io/google_containers/hyperkube
Environment=KUBELET_IMAGE_TAG=v1.9.6
Environment=KUBELET_IMAGE_TAG=v1.10.0
Environment="RKT_RUN_ARGS=--uuid-file-save=/var/cache/kubelet-pod.uuid \
--volume var-lib-cni,kind=host,source=/var/lib/cni \
--volume var-lib-kubelet,kind=host,source=/var/lib/kubelet \
Expand Down
2 changes: 1 addition & 1 deletion hack/quickstart/kubelet.master
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[Service]
Environment=KUBELET_IMAGE_URL=docker://gcr.io/google_containers/hyperkube
Environment=KUBELET_IMAGE_TAG=v1.9.6
Environment=KUBELET_IMAGE_TAG=v1.10.0
Environment=KUBELET_MINIMUM_CONTAINER_TTL_DURATION=3m0s
Environment=KUBELET_MAXIMUM_DEAD_CONTAINERS=-1
Environment=KUBELET_MAXIMUM_DEAD_CONTAINERS_PER_CONTAINER=1
Expand Down
2 changes: 1 addition & 1 deletion hack/quickstart/kubelet.worker
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[Service]
Environment=KUBELET_IMAGE_URL=docker://gcr.io/google_containers/hyperkube
Environment=KUBELET_IMAGE_TAG=v1.9.6
Environment=KUBELET_IMAGE_TAG=v1.10.0
Environment=KUBELET_MINIMUM_CONTAINER_TTL_DURATION=3m0s
Environment=KUBELET_MAXIMUM_DEAD_CONTAINERS=-1
Environment=KUBELET_MAXIMUM_DEAD_CONTAINERS_PER_CONTAINER=1
Expand Down
2 changes: 1 addition & 1 deletion hack/single-node/user-data.sample
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ coreos:
[Service]
EnvironmentFile=/etc/environment
Environment=KUBELET_IMAGE_URL=docker://gcr.io/google_containers/hyperkube
Environment=KUBELET_IMAGE_TAG=v1.9.6
Environment=KUBELET_IMAGE_TAG=v1.10.0
Environment="RKT_RUN_ARGS=--uuid-file-save=/var/cache/kubelet-pod.uuid \
--volume var-lib-cni,kind=host,source=/var/lib/cni \
--volume var-lib-kubelet,kind=host,source=/var/lib/kubelet \
Expand Down
18 changes: 9 additions & 9 deletions hack/terraform-quickstart/main.tf
Original file line number Diff line number Diff line change
@@ -1,3 +1,9 @@
locals {
default_keys = ["Name", "kubernetes.io/cluster/${var.kubernetes_id}"]
default_values = ["${var.resource_owner}", true]
default_tags = "${zipmap(local.default_keys, local.default_values)}"
}

provider "aws" {
access_key = "${var.access_key_id}"
secret_key = "${var.access_key}"
Expand All @@ -21,9 +27,7 @@ resource "aws_instance" "bootstrap_node" {
associate_public_ip_address = true
depends_on = ["aws_internet_gateway.main"]

tags {
Name = "${var.resource_owner}"
}
tags = "${local.default_tags}"

root_block_device {
volume_type = "gp2"
Expand Down Expand Up @@ -64,9 +68,7 @@ resource "aws_instance" "worker_node" {
associate_public_ip_address = true
depends_on = ["aws_internet_gateway.main"]

tags {
Name = "${var.resource_owner}"
}
tags = "${local.default_tags}"

root_block_device {
volume_type = "gp2"
Expand Down Expand Up @@ -107,9 +109,7 @@ resource "aws_instance" "master_node" {
associate_public_ip_address = true
depends_on = ["aws_internet_gateway.main"]

tags {
Name = "${var.resource_owner}"
}
tags = "${local.default_tags}"

root_block_device {
volume_type = "gp2"
Expand Down
5 changes: 5 additions & 0 deletions hack/terraform-quickstart/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,11 @@ variable "access_key" {
type = "string"
}

variable "kubernetes_id" {
description = "ID of the kubernetes cluster"
type = "string"
}

variable "ssh_public_key" {
description = "SSH Public Key"
type = "string"
Expand Down
2 changes: 1 addition & 1 deletion hack/tests/conformance-test.sh
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
set -euo pipefail

CONFORMANCE_REPO=${CONFORMANCE_REPO:-github.com/kubernetes/kubernetes}
CONFORMANCE_VERSION=${CONFORMANCE_VERSION:-v1.9.6}
CONFORMANCE_VERSION=${CONFORMANCE_VERSION:-v1.10.0}

usage() {
echo "USAGE:"
Expand Down
2 changes: 1 addition & 1 deletion pkg/asset/images.go
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ var DefaultImages = ImageVersions{
FlannelCNI: "quay.io/coreos/flannel-cni:v0.3.0",
Calico: "quay.io/calico/node:v3.0.3",
CalicoCNI: "quay.io/calico/cni:v2.0.0",
Hyperkube: "gcr.io/google_containers/hyperkube:v1.9.6",
Hyperkube: "gcr.io/google_containers/hyperkube:v1.10.0",
KubeDNS: "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.8",
KubeDNSMasq: "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.8",
KubeDNSSidecar: "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.8",
Expand Down
4 changes: 1 addition & 3 deletions pkg/asset/internal/templates.go
Original file line number Diff line number Diff line change
Expand Up @@ -219,28 +219,26 @@ spec:
command:
- /hyperkube
- apiserver
- --admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,ValidatingAdmissionWebhook,ResourceQuota,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook
- --advertise-address=$(POD_IP)
- --allow-privileged=true
- --authorization-mode=Node,RBAC
- --bind-address=0.0.0.0
- --client-ca-file=/etc/kubernetes/secrets/ca.crt
- --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultTolerationSeconds,DefaultStorageClass,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota
- --enable-bootstrap-token-auth=true
{{- if .EtcdUseTLS }}
- --etcd-cafile=/etc/kubernetes/secrets/etcd-client-ca.crt
- --etcd-certfile=/etc/kubernetes/secrets/etcd-client.crt
- --etcd-keyfile=/etc/kubernetes/secrets/etcd-client.key
{{- end }}
- --etcd-servers={{ range $i, $e := .EtcdServers }}{{ if $i }},{{end}}{{ $e }}{{end}}
- --insecure-port=0
- --kubelet-client-certificate=/etc/kubernetes/secrets/apiserver.crt
- --kubelet-client-key=/etc/kubernetes/secrets/apiserver.key
- --secure-port={{ (index .APIServers 0).Port }}
- --service-account-key-file=/etc/kubernetes/secrets/service-account.pub
- --service-cluster-ip-range={{ .ServiceCIDR }}
- --cloud-provider={{ .CloudProvider }}
- --storage-backend=etcd3
- --tls-ca-file=/etc/kubernetes/secrets/ca.crt
- --tls-cert-file=/etc/kubernetes/secrets/apiserver.crt
- --tls-private-key-file=/etc/kubernetes/secrets/apiserver.key
env:
Expand Down