Update to v1.5.1
parent
ab8e852e74
commit
720733470a
File diff suppressed because it is too large
Load Diff
|
@ -27,7 +27,7 @@ minikube start
|
||||||
--insecure-registry stringSlice Insecure Docker registries to pass to the Docker daemon
|
--insecure-registry stringSlice Insecure Docker registries to pass to the Docker daemon
|
||||||
--iso-url string Location of the minikube iso (default "https://storage.googleapis.com/minikube/minikube-0.7.iso")
|
--iso-url string Location of the minikube iso (default "https://storage.googleapis.com/minikube/minikube-0.7.iso")
|
||||||
--kubernetes-version string The kubernetes version that the minikube VM will use (ex: v1.2.3)
|
--kubernetes-version string The kubernetes version that the minikube VM will use (ex: v1.2.3)
|
||||||
OR a URI which contains a localkube binary (ex: https://storage.googleapis.com/minikube/k8sReleases/v1.3.0/localkube-linux-amd64) (default "v1.5.0")
|
OR a URI which contains a localkube binary (ex: https://storage.googleapis.com/minikube/k8sReleases/v1.3.0/localkube-linux-amd64) (default "v1.5.1")
|
||||||
--kvm-network string The KVM network name. (only supported with KVM driver) (default "default")
|
--kvm-network string The KVM network name. (only supported with KVM driver) (default "default")
|
||||||
--memory int Amount of RAM allocated to the minikube VM (default 2048)
|
--memory int Amount of RAM allocated to the minikube VM (default 2048)
|
||||||
--network-plugin string The name of the network plugin
|
--network-plugin string The name of the network plugin
|
||||||
|
|
|
@ -115,8 +115,13 @@ func WithAudit(handler http.Handler, attributeGetter RequestAttributeGetter, out
|
||||||
}
|
}
|
||||||
id := uuid.NewRandom().String()
|
id := uuid.NewRandom().String()
|
||||||
|
|
||||||
|
username := "<none>"
|
||||||
|
if attribs.GetUser() != nil {
|
||||||
|
username = attribs.GetUser().GetName()
|
||||||
|
}
|
||||||
|
|
||||||
line := fmt.Sprintf("%s AUDIT: id=%q ip=%q method=%q user=%q as=%q asgroups=%q namespace=%q uri=%q\n",
|
line := fmt.Sprintf("%s AUDIT: id=%q ip=%q method=%q user=%q as=%q asgroups=%q namespace=%q uri=%q\n",
|
||||||
time.Now().Format(time.RFC3339Nano), id, utilnet.GetClientIP(req), req.Method, attribs.GetUser().GetName(), asuser, asgroups, namespace, req.URL)
|
time.Now().Format(time.RFC3339Nano), id, utilnet.GetClientIP(req), req.Method, username, asuser, asgroups, namespace, req.URL)
|
||||||
if _, err := fmt.Fprint(out, line); err != nil {
|
if _, err := fmt.Fprint(out, line); err != nil {
|
||||||
glog.Errorf("Unable to write audit log: %s, the error is: %v", line, err)
|
glog.Errorf("Unable to write audit log: %s, the error is: %v", line, err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -129,7 +129,7 @@ type ServerRunOptions struct {
|
||||||
func NewServerRunOptions() *ServerRunOptions {
|
func NewServerRunOptions() *ServerRunOptions {
|
||||||
return &ServerRunOptions{
|
return &ServerRunOptions{
|
||||||
AdmissionControl: "AlwaysAdmit",
|
AdmissionControl: "AlwaysAdmit",
|
||||||
AnonymousAuth: true,
|
AnonymousAuth: false,
|
||||||
AuthorizationMode: "AlwaysAllow",
|
AuthorizationMode: "AlwaysAllow",
|
||||||
AuthorizationWebhookCacheAuthorizedTTL: 5 * time.Minute,
|
AuthorizationWebhookCacheAuthorizedTTL: 5 * time.Minute,
|
||||||
AuthorizationWebhookCacheUnauthorizedTTL: 30 * time.Second,
|
AuthorizationWebhookCacheUnauthorizedTTL: 30 * time.Second,
|
||||||
|
@ -293,7 +293,7 @@ func (s *ServerRunOptions) AddUniversalFlags(fs *pflag.FlagSet) {
|
||||||
fs.BoolVar(&s.AnonymousAuth, "anonymous-auth", s.AnonymousAuth, ""+
|
fs.BoolVar(&s.AnonymousAuth, "anonymous-auth", s.AnonymousAuth, ""+
|
||||||
"Enables anonymous requests to the secure port of the API server. "+
|
"Enables anonymous requests to the secure port of the API server. "+
|
||||||
"Requests that are not rejected by another authentication method are treated as anonymous requests. "+
|
"Requests that are not rejected by another authentication method are treated as anonymous requests. "+
|
||||||
"Anonymous requests have a username of system:anonymous, and a group name of system:unauthenticated.")
|
"Anonymous requests have a username of system:anonymous, and a group name of system:unauthenticated. ")
|
||||||
|
|
||||||
fs.StringVar(&s.BasicAuthFile, "basic-auth-file", s.BasicAuthFile, ""+
|
fs.StringVar(&s.BasicAuthFile, "basic-auth-file", s.BasicAuthFile, ""+
|
||||||
"If set, the file that will be used to admit requests to the secure port of the API server "+
|
"If set, the file that will be used to admit requests to the secure port of the API server "+
|
||||||
|
|
|
@ -51,7 +51,7 @@ var (
|
||||||
// semantic version is a git hash, but the version itself is no
|
// semantic version is a git hash, but the version itself is no
|
||||||
// longer the direct output of "git describe", but a slight
|
// longer the direct output of "git describe", but a slight
|
||||||
// translation to be semver compliant.
|
// translation to be semver compliant.
|
||||||
gitVersion string = "v1.5.0+$Format:%h$"
|
gitVersion string = "v1.5.1+$Format:%h$"
|
||||||
gitCommit string = "$Format:%H$" // sha1 from git, output of $(git rev-parse HEAD)
|
gitCommit string = "$Format:%H$" // sha1 from git, output of $(git rev-parse HEAD)
|
||||||
gitTreeState string = "not a git tree" // state of git tree, either "clean" or "dirty"
|
gitTreeState string = "not a git tree" // state of git tree, either "clean" or "dirty"
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue