Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix race condition creating DigitalOcean firewall rules #709

Merged
merged 1 commit into from
Apr 20, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 9 additions & 2 deletions CHANGES.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,8 @@ Notable changes between versions.

## Latest

## v1.18.2

* Kubernetes [v1.18.2](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.18.md#v1182)
* Choose Fedora CoreOS or Flatcar Linux (**action required**)
* Use a `fedora-coreos` module for Fedora CoreOS
Expand All @@ -13,13 +15,17 @@ Notable changes between versions.

### Fedora CoreOS

* Fix race condition during bootstrap related to SELinux shared content label ([#708](https://github.com/poseidon/typhoon/pull/708))
* Fix bootstrap race condition from SELinux unshared content label ([#708](https://github.com/poseidon/typhoon/pull/708))

#### Azure

* Add support for Fedora CoreOS ([#704](https://github.com/poseidon/typhoon/pull/704))

### Container Linux
#### DigitalOcean

* Fix race condition creating firewall allow rules ([#709](https://github.com/poseidon/typhoon/pull/709))

### Flatcar Linux

#### AWS

Expand All @@ -42,6 +48,7 @@ Notable changes between versions.
#### DigitalOcean

* Change `os_image` to be required. Recommend uploading a Flatcar Linux image (**action required**) ([#702](https://github.com/poseidon/typhoon/pull/702))
* Fix race condition creating firewall allow rules ([#709](https://github.com/poseidon/typhoon/pull/709))

## v1.18.1

Expand Down
9 changes: 6 additions & 3 deletions digital-ocean/container-linux/kubernetes/network.tf
Original file line number Diff line number Diff line change
@@ -1,7 +1,10 @@
resource "digitalocean_firewall" "rules" {
name = var.cluster_name

tags = ["${var.cluster_name}-controller", "${var.cluster_name}-worker"]
tags = [
digitalocean_tag.controllers.name,
digitalocean_tag.workers.name
]

# allow ssh, internal flannel, internal node-exporter, internal kubelet
inbound_rule {
Expand Down Expand Up @@ -59,7 +62,7 @@ resource "digitalocean_firewall" "rules" {
resource "digitalocean_firewall" "controllers" {
name = "${var.cluster_name}-controllers"

tags = ["${var.cluster_name}-controller"]
tags = [digitalocean_tag.controllers.name]

# etcd
inbound_rule {
Expand Down Expand Up @@ -93,7 +96,7 @@ resource "digitalocean_firewall" "controllers" {
resource "digitalocean_firewall" "workers" {
name = "${var.cluster_name}-workers"

tags = ["${var.cluster_name}-worker"]
tags = [digitalocean_tag.workers.name]

# allow HTTP/HTTPS ingress
inbound_rule {
Expand Down
9 changes: 6 additions & 3 deletions digital-ocean/fedora-coreos/kubernetes/network.tf
Original file line number Diff line number Diff line change
@@ -1,7 +1,10 @@
resource "digitalocean_firewall" "rules" {
name = var.cluster_name

tags = ["${var.cluster_name}-controller", "${var.cluster_name}-worker"]
tags = [
digitalocean_tag.controllers.name,
digitalocean_tag.workers.name
]

# allow ssh, internal flannel, internal node-exporter, internal kubelet
inbound_rule {
Expand Down Expand Up @@ -59,7 +62,7 @@ resource "digitalocean_firewall" "rules" {
resource "digitalocean_firewall" "controllers" {
name = "${var.cluster_name}-controllers"

tags = ["${var.cluster_name}-controller"]
tags = [digitalocean_tag.controllers.name]

# etcd
inbound_rule {
Expand Down Expand Up @@ -93,7 +96,7 @@ resource "digitalocean_firewall" "controllers" {
resource "digitalocean_firewall" "workers" {
name = "${var.cluster_name}-workers"

tags = ["${var.cluster_name}-worker"]
tags = [digitalocean_tag.workers.name]

# allow HTTP/HTTPS ingress
inbound_rule {
Expand Down