Commit Graph

199 Commits (af16d336daab4fc2c77d3b4ee7f34b4cc5de54ca)

Author SHA1 Message Date
Priya Wadhwa cdbb2dd572 Updated gvisor test 2019-08-05 15:21:09 -07:00
Priya Wadhwa 24a2748af8 rebased, fixed merge conflicts 2019-08-05 13:53:23 -07:00
Zoltán Reegn d1436b40fe Remove ingress-nginx default backend
It's not needed since nginx 0.20.0.

See the following pull-requests for context:
* https://github.com/kubernetes/ingress-nginx/pull/3126
* https://github.com/kubernetes/ingress-nginx/pull/3156
2019-07-30 09:32:02 +02:00
Medya Ghazizadeh 396a65a101
Merge pull request #4785 from reegnz/upgrade-nginx
Upgrade nginx ingress to 0.25.0
2019-07-28 14:29:03 -07:00
Zoltán Reegn 5d74821d7d Upgrade nginx ingress to 0.25.0 2019-07-22 10:52:45 +02:00
Om Kumar d76d874067 Fix regression caused by registry-proxy
This PR addresses #4604 by adding a new selector to concerned svc/rc only.
This also reverts `kubernetes.io/minikube-addons` to `registy` for registry-proxy
so that addon manager can deploy registry-proxy when registry addon is enabled.
2019-07-18 18:28:07 +05:30
Priya Wadhwa d68e054dfd Attempt to copy gvisor tar and load with ctr 2019-07-11 11:58:57 -07:00
Priya Wadhwa 3ffe2af1e4 Point docker daemon to minikube and rebuild docker image 2019-07-10 16:14:46 -07:00
Priya Wadhwa e6653b78eb Build and push the gvisor image, setting an environment variable
which can be picked up during integration testing.

I opted to do it this way because the locally built gvisor image wasn't
being picked up by minikube, because the docker daemon wasn't
configured, since minikube isn't up and running yet. Even if the docker daemon was configured to point to
minikube, we wouldn't be able to build the gvisor-image from the test
itself.
2019-07-10 14:13:17 -07:00
Priya Wadhwa d2e5a4b052 build gvisor image locally in integration tests; add temporary error to make sure that image is used 2019-07-09 12:46:57 -07:00
Priya Wadhwa a8f1ed7a26 Rebuild gvisor image for integration tests
We should rebuild the gvisor image for integration tests, so that if
changes are made to the gvisor image they are tested. I added an
environment variable that, when set, will change the expected gvisor
image repo.
2019-07-08 15:54:30 -07:00
Jose Donizetti ad97983d9e # This is a combination of 8 commits.
# This is the 1st commit message:

Fix doc comment version.gitCommitID doc


# This is the commit message #2:

Add hyperkit doc


# This is the commit message #3:

Add commit id to docker-machine-driver-kvm2 version


# This is the commit message #4:

removed label selector for registry-proxy daemonset

# This is the commit message #5:

Add support to custom qemu uri on kvm2 driver


# This is the commit message #6:

Improve hyperkit vm stop


# This is the commit message #7:

Make virtualbox DNS settings configurable 


# This is the commit message #8:

added integration tests for registry addon
2019-06-29 18:27:47 +10:00
Ben Ebsworth 3917db4962 removed label selector for registry-proxy daemonset 2019-06-28 18:33:24 +10:00
Francis a85eac1de4 Update ingress-nginx version to 0.24.1 2019-06-25 10:06:29 -07:00
fenglixa 8e650c0c61 Dashboard: add --disable-settings-authorizer to avoid settings 403 forbidden 2019-06-02 22:22:12 +08:00
Om Kumar ec3e7b5896 Enable registry-proxy
As per [this blog](https://blog.hasura.io/sharing-a-local-registry-for-minikube-37c7240d0615) and [this gist](https://gist.github.com/coco98/b750b3debc6d517308596c248daf3bb1), we need to deploy a registry-proxy
which will expose docker registry on the minikube host.

Once this daemon set is deployed on minikube, one can access registry on `$(minikube ip):5000`.
This has been tested with minikube v1.0.1 with none driver. With this, one will not have to use
`kubectl port-forward`. I was able to push a container image to registry using
```
docker push $(minikube ip):5000/test-img
```
And then ran it in minikube using
```
kubectl run -i -t test-img --image=$(minikube ip):5000/test-img --restart=Never
```
2019-05-24 10:37:14 +05:30
Zoran Regvart 40da5023d0
Fix registry addon ReplicationController template
Running the `minikube addons enable registry` yields `registry was successfully enabled` but no `registry` Pod ends up being run.

I've narrowed it down to this `env` entry not being quoted.

Logs from `kube-addon-manager-minikube` Pod show this error:

```
Error from server (BadRequest): error when creating "/etc/kubernetes/addons/registry-rc.yaml": ReplicationController in version "v1" cannot be handled as a ReplicationController: v1.ReplicationController.Spec: v1.ReplicationControllerSpec.Template: v1.PodTemplateSpec.Spec: v1.PodSpec.Containers: []v1.Container: v1.Container.Env: []v1.EnvVar: v1.EnvVar.Value: ReadString: expects " or n, but found t, error found in #10 byte of ...|,"value":true}],"ima|..., bigger context ...|"name":"REGISTRY_STORAGE_DELETE_ENABLED","value":true}],"image":"registry.hub.docker.com/library/reg|...
```
2019-05-07 22:35:15 +02:00
Medya Gh 5fa67141e6 Added Exotic Arch for legacy docker images 2019-05-06 17:07:05 -07:00
Medya Gh d688240b75 Rename all template files to be consistent format .ext.tmpl 2019-05-06 15:12:46 -07:00
Medya Gh c997c72667 Update gitignore 2019-05-06 14:44:59 -07:00
Medya Gh e6c4ee5b50 Rename the .template files to .yaml 2019-05-06 14:43:10 -07:00
Medya Gh 1790589f70 Replace ARCH sed macros with Go templates 2019-05-06 14:38:38 -07:00
Thomas Strömberg fce157865d
Merge pull request #4153 from keramiozsoy/storageclass-its-no-longer-beta
storageclass no longer beta #4148
2019-04-30 15:46:05 -07:00
kerami d7892ec104
storageclass no longer beta
https://github.com/kubernetes/kubernetes/blob/master/cluster/addons/storage-class/local/default.yaml
2019-04-25 22:17:58 +03:00
salamani 9b419d66dc adding multi-arch support 2019-04-17 08:43:37 -04:00
Himanshu Pandey ce40cdc960 Added REGISTRY_STORAGE_DELETE_ENABLED environment variable for Registry addon 2019-04-11 16:14:36 -07:00
Thomas Stromberg c91da2a65f Upgrade addon-manager to v9.0 for compatibility with Kubernetes v1.14 2019-03-26 11:33:42 -07:00
Zhongcheng Lao daeb238766 Merge remote-tracking branch 'origin/master' into custom-image-repository 2019-03-21 13:23:11 +08:00
Zhongcheng Lao 40caf8317c Merge remote-tracking branch 'upstream/master' into custom-image-repository 2019-03-15 18:01:48 +08:00
Dmitry Budaev fcd5d996b3 Update Ingress-NGINX to 0.23 Release
Updates Ingress-Nginx to use 0.23 release.
2019-03-14 15:11:55 +01:00
Cristian Măgherușan-Stanciu @magheru_san a3e652a360
Fix `minikube addons open heapster`
In the default installation I get the same error:
```
$ minikube addons open heapster
💣  This addon does not have an endpoint defined for the 'addons open' command.
You can add one by annotating a service with the label kubernetes.io/minikube-addons-endpoint:heapster
```
This PR is simply implementing the suggested fix by adding the aforementioned label to the heapster service.
2019-03-07 21:48:39 +01:00
Zhongcheng Lao 7a59d376cf Turn addon resource with images into template
When the user overrides image repository the images will be pulled
from the overrided one instead of the official repositories.
2019-02-18 01:00:18 +08:00
Zhongcheng Lao 7cbe253ef6 Allow specifying image repository for docker images
Some users (especially for those in mainland China) may have issue
accessing the default image repository. This patchset allows users
to override the default image repository gcr.io to a different
repository by specifying --image-repository option in the command
line as a simple workaround. Images will be pulled from the
specified image repository instead of the default ones.

Example (using mirror by Aliyun):
minikube start ...
   --image-repository
   registry.cn-hangzhou.aliyuncs.com/google_containers
2019-02-18 01:00:12 +08:00
Anders F Björklund 6ff11e44a5 Remove default cni flags from the documentation 2019-02-05 20:05:05 +01:00
Thomas Strömberg b61207c233
Merge pull request #3391 from ivans3/logviewer-addon-pr7
Initial commit of logviewer addon
2019-01-24 16:00:29 -08:00
Thomas Strömberg 3aa83674a9
Merge pull request #3441 from brb/2907-no-cni-conf-by-default
Do not include the default CNI config by default
2019-01-15 17:14:20 -08:00
Niels de Vos b85b6d5eeb addons: mark the last enabled storage provider as default
When a storage provider is enabled (storage-provisioner-glusterfile),
mark it "is-default" and set "is-default" to "false" in all other
StorageClasses.
2019-01-09 20:04:21 +01:00
Niels de Vos b0c7341373 addons: when enabling storage-provisioner-gluster, mark other SCs non-default
There can only be one StorageClass be marked as default. When the
storage-provisioner-gluster addon is enabled, users expect it to be the
default StorageClass.

Instead of removing the "is-default" annotation from the other
StorageClasses, set it to "false". This leaves only the "glusterfile"
StorageClass as "is-default".
2019-01-09 20:04:21 +01:00
Niels de Vos 3c3b7368f0 Add storage-provisioner-gluster addon
With this addon dynamic provisioning based on Gluster can be enabled:

    $ minikube addons enable storage-provisioner-gluster

This will deploy several pods in a new 'storage-gluster' namespace:

 - glusterfs, storage service with a 10GB sparse /srv/fake-disk.img
 - heketi, a smart Gluster volume manager
 - glusterfile-provisioner, external-storage provisioner

In addition, the StorageClass 'glusterfile' will be created. It is
currently not configured as default StorageClass, so PVCs need to refer
to the new StorageClass.
2019-01-09 20:04:21 +01:00
Martynas Pumputis d982c4bf74 Do not include the default CNI config by default
Previously, minikube has been shipped with the default CNI config
(/etc/cni/net.d/k8s.conf) in its rootfs. This complicated a lot
when using a custom CNI plugin, as the default config was picked
by kubelet before the custom CNI plugin has installed its own CNI
config. So, the end result was that some Pods were attached to a
network defined in the default config, and some got managed by
the custom plugin.

This commit introduces the flag "--enable-default-cni" to
"minikube start" to trigger the provisioning of the default CNI
config.

Signed-off-by: Martynas Pumputis <m@lambda.lt>
2019-01-03 09:23:29 +01:00
Jason Cwik 9dd74f7cf0 Fix for Minikube #3495
Change the policy for the minikube-hostpath storage class addon from
Reconcile to EnsureExists. When it's set to reconcile, it's impossible
to change the default storage class in Minikube because it will keep
setting the minikube-hostpath storageclass to default.

Ported from kubernetes/kubernetes#66235
2018-12-28 20:36:24 -06:00
Balint Pato ed7031cbb3
Merge branch 'master' into logviewer-addon-pr7 2018-12-19 17:14:09 -08:00
Jeffrey Sica 8f1b4d2882 bump dashboard version to v1.10.1 (#3466) 2018-12-19 16:38:52 -08:00
priyawadhwa 1514511b7a Change restart policy on gvisor pod (#3445)
* Change restart policy on gvisor pod

Change the restart policy on the gvisor pod to Always. This way, if a
user runs

minikube addons enable gvisor
minikube stop
minikube start

when the addon manager tries to restart the gvisor pod, it will be
restarted and gvisor will start running automatically. This PR also adds an
integration test for this functionality.

* Test stop and start

* Revert test to delete

Revert test to delete for now, for some reason "stop" and then "start"
is failing both locally and in Jenkins for VirtualBox with a "panic test
timed out after 30 min" error
2018-12-11 18:39:57 -08:00
priyawadhwa 8f128a7d10 Enable gvisor addon in minikube (#3399)
This PR adds the code for enabling gvisor in minikube. It adds the pod
that will run when the addon is enabled, and the code for the image
which will run when this happens.

When gvisor is enabled, the pod will download runsc and the
gvisor-containerd-shim. It will replace the containerd config.toml and
restart containerd.

When gvisor is disabled, the pod will be deleted by the addon manager.
This will trigger a pre-stop hook which will revert the config.toml to
it's original state and restart containerd.
2018-12-07 15:27:22 -08:00
Thomas Strömberg bc67a32a7b
Merge pull request #3332 from dlorenc/rmaddons
Remove both the CoreDNS and KubeDNS addons. Let Kubeadm install the c…
2018-12-03 17:15:06 -08:00
ivans3 b43b8ccd9d Initial commit of logviewer addon 2018-12-02 12:58:06 -08:00
Fernando Diaz 49f038a902 Update Ingress-Nginx to 0.21 (#3365)
Updates the Ingress-Nginx Addon to version 0.21.
2018-11-26 14:59:53 -08:00
dlorenc 2091f8c27a
Remove both the CoreDNS and KubeDNS addons. Let Kubeadm install the correct DNS addon. 2018-11-16 14:54:44 -08:00
Thomas Stromberg dc6d1bab8d Merge branch 'master' into dashboard_on_demand 2018-10-04 13:38:49 -07:00