Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[release-1.26] Backport version bumps and bugfixes #7717

Merged
merged 13 commits into from
Jun 12, 2023

Conversation

roffery and others added 13 commits June 8, 2023 23:10
Signed-off-by: Andrew Roffey <andrew@roffey.au>
(cherry picked from commit 0485a56)
Fixes issue with localhost access to ServiceLB when
ExternalTrafficPolicy=Local

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 93279d2)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit e9958cf)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 8748813)
Only actual admin actions should use the admin kubeconfig; everything done by the supervisor/deploy/helm controllers will now use a distinct account for audit purposes.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 64a5f58)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 7b61aac)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 6124737)
Made with ❤️️ by updatecli

(cherry picked from commit a5928ee)
It is no way we can configure the lb image because it is a const value.
It would be better that we make it variable value and we can override
the value like the `helm-controller` job image when compiling k3s/rke2

Signed-off-by: Yuxing Deng <jxfa0043379@hotmail.com>
(cherry picked from commit b64a226)
Allows nodes to join the cluster during a webhook outage. This also
enhances auditability by creating Kubernetes events for the deferred
verification.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 45d8c1a)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit 5170bc5)
These were unintentionally dropped when moving containerd back into the main multicall binary

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
(cherry picked from commit e5e1a67)
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
@brandond brandond requested a review from a team as a code owner June 8, 2023 23:33
@codecov
Copy link

codecov bot commented Jun 9, 2023

Codecov Report

Patch coverage: 16.93% and project coverage change: +0.02 🎉

Comparison is base (8988439) 10.10% compared to head (de0e5a3) 10.12%.

Additional details and impacted files
@@               Coverage Diff                @@
##           release-1.26    #7717      +/-   ##
================================================
+ Coverage         10.10%   10.12%   +0.02%     
================================================
  Files               148      148              
  Lines             10732    10776      +44     
================================================
+ Hits               1084     1091       +7     
- Misses             9424     9460      +36     
- Partials            224      225       +1     
Flag Coverage Δ
unittests 10.12% <16.93%> (+0.02%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

Impacted Files Coverage Δ
pkg/cli/cmds/server.go 0.00% <ø> (ø)
pkg/cli/etcdsnapshot/etcd_snapshot.go 0.00% <0.00%> (ø)
pkg/cloudprovider/servicelb.go 3.56% <ø> (ø)
pkg/daemons/config/types.go 67.21% <ø> (ø)
pkg/daemons/control/server.go 0.00% <0.00%> (ø)
pkg/deploy/zz_generated_bindata.go 0.00% <ø> (ø)
pkg/server/context.go 0.00% <0.00%> (ø)
pkg/server/router.go 0.00% <0.00%> (ø)
pkg/server/server.go 0.00% <0.00%> (ø)
pkg/util/client.go 16.66% <0.00%> (-8.34%) ⬇️
... and 2 more

☔ View full report in Codecov by Sentry.
📢 Do you have feedback about the report comment? Let us know in this issue.

@brandond brandond merged commit 3668584 into k3s-io:release-1.26 Jun 12, 2023
@brandond brandond deleted the 2023-06-backports_release-1.26 branch June 6, 2024 21:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants