author int64 658 755k | date stringdate 2012-06-12 08:34:29 2024-07-22 14:51:21 | timezone int64 -46,800 43.2k | hash stringlengths 40 40 | message stringlengths 5 490 | mods listlengths 1 16 | language stringclasses 20
values | license stringclasses 3
values | repo stringlengths 5 68 | original_message stringlengths 12 491 |
|---|---|---|---|---|---|---|---|---|---|
596,240 | 06.09.2017 14:49:40 | -7,200 | 9ff68e0bd7adf3a463b8460d2fd31f028828bf84 | stuffs klusters into the queue | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/launch.go",
"new_path": "pkg/controller/launch.go",
"diff": "package controller\nimport (\n+ \"reflect\"\n\"sync\"\n\"time\"\n\"github.com/golang/glog\"\n+ \"github.com/sapcc/kubernikus/pkg/apis/kubernikus/v1\"\n\"k8s.io/apimachinery/pkg/util/wa... | Go | Apache License 2.0 | sapcc/kubernikus | stuffs klusters into the queue |
596,240 | 07.09.2017 16:10:12 | -7,200 | e75341f559bd8d1dbd7fb320e7304ade7b865f41 | fixes nodepool initialization | [
{
"change_type": "MODIFY",
"old_path": "pkg/api/handlers/create_cluster.go",
"new_path": "pkg/api/handlers/create_cluster.go",
"diff": "@@ -31,7 +31,7 @@ func (d *createCluster) Handle(params operations.CreateClusterParams, principal\n},\nSpec: v1.KlusterSpec{\nName: name,\n- NodePools: []v1.NodePoo... | Go | Apache License 2.0 | sapcc/kubernikus | fixes nodepool initialization |
596,240 | 07.09.2017 16:11:20 | -7,200 | 440620bf69956ba5a999a432e1624713fb83af3d | implement launch controller. openstack client cache for domain and project scopes | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/openstack/client.go",
"new_path": "pkg/client/openstack/client.go",
"diff": "@@ -2,9 +2,12 @@ package openstack\nimport (\n\"errors\"\n+ \"fmt\"\n+ \"github.com/golang/glog\"\n\"github.com/gophercloud/gophercloud\"\n\"github.com/gophercloud/gophercl... | Go | Apache License 2.0 | sapcc/kubernikus | implement launch controller. openstack client cache for domain and project scopes |
596,240 | 07.09.2017 16:32:35 | -7,200 | 4dd4f85e8679d8d10ce7c72d0188123f5b0acabe | fix helm client initialization | [
{
"change_type": "MODIFY",
"old_path": "pkg/cmd/helm/helm.go",
"new_path": "pkg/cmd/helm/helm.go",
"diff": "@@ -96,10 +96,7 @@ func (o *HelmOptions) Run(c *cobra.Command) error {\n}\nif o.AuthURL != \"\" {\ncluster.OpenStack.AuthURL = o.AuthURL\n- oclient, err := openstack.NewClient(o.AuthURL, o.Aut... | Go | Apache License 2.0 | sapcc/kubernikus | fix helm client initialization |
596,240 | 08.09.2017 13:41:30 | -7,200 | 2ced60794f47b2238d92a5ff9b0c0bb9c0a88299 | adds persistent auto-discovery for openstack parameters | [
{
"change_type": "MODIFY",
"old_path": "pkg/apis/kubernikus/v1/kluster.go",
"new_path": "pkg/apis/kubernikus/v1/kluster.go",
"diff": "@@ -15,8 +15,15 @@ type NodePool struct {\nConfig NodePoolConfig `json:\"config\"`\n}\n+type Openstack struct {\n+ ProjectID string `json:\"projectID\"`\n+ RouterID s... | Go | Apache License 2.0 | sapcc/kubernikus | adds persistent auto-discovery for openstack parameters |
596,240 | 08.09.2017 14:05:26 | -7,200 | 7ad985b41bed6657d26a87db099af37dc86fa15b | removes json tags. renames OpenstackSpec | [
{
"change_type": "MODIFY",
"old_path": "pkg/apis/kubernikus/v1/kluster.go",
"new_path": "pkg/apis/kubernikus/v1/kluster.go",
"diff": "@@ -3,28 +3,33 @@ package v1\nimport metav1 \"k8s.io/apimachinery/pkg/apis/meta/v1\"\ntype NodePoolConfig struct {\n- Upgrade bool `json:\"upgrade\"`\n- Repair bool `... | Go | Apache License 2.0 | sapcc/kubernikus | removes json tags. renames OpenstackSpec |
596,240 | 08.09.2017 14:51:04 | -7,200 | 64fd80460db4281b869cf891b70503f020a16bb6 | removes hardcoded kubernikus domain | [
{
"change_type": "MODIFY",
"old_path": "charts/kubernikus/templates/operator.yaml",
"new_path": "charts/kubernikus/templates/operator.yaml",
"diff": "@@ -28,4 +28,5 @@ spec:\n- --auth-domain={{ .Values.openstack.auth_domain }}\n- --auth-project={{ .Values.openstack.auth_project }}\n- --auth-project-... | Go | Apache License 2.0 | sapcc/kubernikus | removes hardcoded kubernikus domain |
596,240 | 08.09.2017 15:42:01 | -7,200 | 2f801d5330ea620dbe15535cfa6f78ff2fb3cf8d | only discover openstack parameters once and for all. persist on spec | [
{
"change_type": "MODIFY",
"old_path": "pkg/apis/kubernikus/v1/kluster.go",
"new_path": "pkg/apis/kubernikus/v1/kluster.go",
"diff": "@@ -19,6 +19,10 @@ type OpenstackInfo struct {\nProjectID string `json:\"projectID\"`\nRouterID string `json:\"routerID\"`\nNetworkID string `json:\"networkID\"`\n+ L... | Go | Apache License 2.0 | sapcc/kubernikus | only discover openstack parameters once and for all. persist on spec |
596,240 | 08.09.2017 16:26:34 | -7,200 | 36743b8b782a50856c143c640a53c61d008aa103 | adds and picks service user from spec | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/ground.go",
"new_path": "pkg/controller/ground.go",
"diff": "@@ -255,9 +255,9 @@ func (op *GroundControl) terminateKluster(tpr *v1.Kluster) error {\nif err != nil && !strings.Contains(grpc.ErrorDesc(err), fmt.Sprintf(`release: \"%s\" not found`,... | Go | Apache License 2.0 | sapcc/kubernikus | adds and picks service user from spec |
596,240 | 09.09.2017 09:19:32 | -7,200 | 74d24066b145ce249b5e526f9908faac805ea99b | fetch region via api. wtf openstack? wtf???!? | [
{
"change_type": "MODIFY",
"old_path": "pkg/apis/kubernikus/v1/kluster.go",
"new_path": "pkg/apis/kubernikus/v1/kluster.go",
"diff": "@@ -16,17 +16,20 @@ type NodePool struct {\n}\ntype OpenstackInfo struct {\n+ AuthURL string `json:\"authURL\"`\nProjectID string `json:\"projectID\"`\nRouterID strin... | Go | Apache License 2.0 | sapcc/kubernikus | fetch region via api. wtf openstack? wtf???!? |
596,240 | 09.09.2017 09:30:00 | -7,200 | 739ad7c3ee4729788a7cbef9d9f7b51469a5ed9f | fixes debug output | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/ground.go",
"new_path": "pkg/controller/ground.go",
"diff": "@@ -367,13 +367,13 @@ func (op *GroundControl) discoverOpenstackInfo(kluster *v1.Kluster) error {\n}\nif copy.Spec.OpenstackInfo.AuthURL == \"\" {\n- glog.V(5).Infof(\"[%v] Setting aut... | Go | Apache License 2.0 | sapcc/kubernikus | fixes debug output |
596,240 | 09.09.2017 21:59:57 | -7,200 | 9f463d8d642635e877fb30a2b95c3a454c636ffb | adds ignition userdata for spawning kubelets | [
{
"change_type": "MODIFY",
"old_path": "glide.lock",
"new_path": "glide.lock",
"diff": "-hash: 56cc165b7ea4bd90814a0ad72aab3be6c775f6d44a3ad9da8a14f7af14700643\n-updated: 2017-08-30T17:40:40.19949364+02:00\n+hash: 0a7c46d3f030e44a5ba4231dedd3cef50307a2f8ce1882acb2adeb6161c1f68f\n+updated: 2017-09-09... | Go | Apache License 2.0 | sapcc/kubernikus | adds ignition userdata for spawning kubelets |
596,240 | 10.09.2017 13:56:51 | -7,200 | f8cfbddbbd2f161587070cf072929f51997360be | adds gophercloud extension to make sense of openstack server states (wtf?) | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/openstack/client.go",
"new_path": "pkg/client/openstack/client.go",
"diff": "@@ -75,6 +75,62 @@ type Node struct {\nID string\nName string\nStatus string\n+ TaskState string\n+ VMState string\n+ PowerState int\n+}\n+\n+func (n *Node) Ready() bool {\... | Go | Apache License 2.0 | sapcc/kubernikus | adds gophercloud extension to make sense of openstack server states (wtf?) |
596,240 | 11.09.2017 12:59:11 | -7,200 | d5fe8c785c0cce6144c7976e6735de09c708b1ed | generates and adds a bootstrap token to apiserver/kubelets | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "charts/kube-master/templates/_token.csv.tpl",
"diff": "+{{/* vim: set filetype=gotexttmpl: */ -}}\n+{{ required \"missing kubernikus.boostrapToken\" .Values.kubernikus.bootstrapToken }},kubelet-bootstrap,10001,\"system:bootstrappers\"\n"
},
... | Go | Apache License 2.0 | sapcc/kubernikus | generates and adds a bootstrap token to apiserver/kubelets |
596,240 | 11.09.2017 14:39:57 | -7,200 | be74215d74edd26db9ef5572a306f51a6afa1823 | ensures kluster TPR is registered | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/kubernetes/client.go",
"new_path": "pkg/client/kubernetes/client.go",
"diff": "package kubernetes\nimport (\n+ \"time\"\n+\n\"github.com/golang/glog\"\n+ \"github.com/sapcc/kubernikus/pkg/apis/kubernikus/v1\"\n+ apierrors \"k8s.io/apimachinery/pkg/a... | Go | Apache License 2.0 | sapcc/kubernikus | ensures kluster TPR is registered |
596,240 | 11.09.2017 17:59:34 | -7,200 | 08ad2ee258faf3205a555192bfac0d7ce4098524 | adds scheduling nodes to be healthy also | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/openstack/client.go",
"new_path": "pkg/client/openstack/client.go",
"diff": "@@ -88,7 +88,7 @@ func (n *Node) Ready() bool {\n// 6: CRASHED\n// 7: SUSPENDED\nif n.PowerState != 1 {\n- if n.TaskState != \"spawning\" {\n+ if n.TaskState != \"spawning\... | Go | Apache License 2.0 | sapcc/kubernikus | adds scheduling nodes to be healthy also |
596,240 | 11.09.2017 18:00:36 | -7,200 | 84b02a349e9a0afdfdd2b31269b925984430effd | use bootstrap token for inital authentication | [
{
"change_type": "MODIFY",
"old_path": "pkg/templates/ignition.go",
"new_path": "pkg/templates/ignition.go",
"diff": "@@ -32,10 +32,12 @@ func (i *ignition) GenerateNode(kluster *v1.Kluster, client kubernetes.Interface\n}\ndata := struct {\n+ TLSCA string\nApiserverClientsCA string\nApiserverNodesCA... | Go | Apache License 2.0 | sapcc/kubernikus | use bootstrap token for inital authentication |
596,240 | 11.09.2017 19:44:37 | -7,200 | fe77c3def26fb9fea620e4f1f0827bcda0230c14 | add networking state as beign as well | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/openstack/client.go",
"new_path": "pkg/client/openstack/client.go",
"diff": "@@ -88,7 +88,7 @@ func (n *Node) Ready() bool {\n// 6: CRASHED\n// 7: SUSPENDED\nif n.PowerState != 1 {\n- if n.TaskState != \"spawning\" || n.TaskState != \"scheduling\" {... | Go | Apache License 2.0 | sapcc/kubernikus | add networking state as beign as well |
596,240 | 11.09.2017 19:54:03 | -7,200 | ebcbab7b13efa3aa2505658398161ae7757f125c | negate all logic for ready state detection | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/openstack/client.go",
"new_path": "pkg/client/openstack/client.go",
"diff": "@@ -87,10 +87,14 @@ func (n *Node) Ready() bool {\n// 4: SHUTDOWN\n// 6: CRASHED\n// 7: SUSPENDED\n- if n.PowerState != 1 {\n- if n.TaskState != \"spawning\" || n.TaskState... | Go | Apache License 2.0 | sapcc/kubernikus | negate all logic for ready state detection |
596,240 | 12.09.2017 14:59:59 | -7,200 | 2b09825f384d7005a2098fc70103b50e6d784296 | naturally we need the clients CA here | [
{
"change_type": "MODIFY",
"old_path": "pkg/templates/ignition.go",
"new_path": "pkg/templates/ignition.go",
"diff": "@@ -33,9 +33,7 @@ func (i *ignition) GenerateNode(kluster *v1.Kluster, client kubernetes.Interface\ndata := struct {\nTLSCA string\n- ApiserverClientsCA string\n- ApiserverNodesCA st... | Go | Apache License 2.0 | sapcc/kubernikus | naturally we need the clients CA here |
596,240 | 12.09.2017 15:00:39 | -7,200 | fe7ef38cb1f98e5bd377a8867cde1b1303933670 | this needs to be without the apiserver prefix. it is not included in the generated certs | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/service.yaml",
"new_path": "charts/kube-master/templates/service.yaml",
"diff": "apiVersion: v1\nkind: Service\nmetadata:\n- name: {{ include \"master.fullname\" . }}-apiserver\n+ name: {{ include \"master.fullname\" . }}\nlabels:\... | Go | Apache License 2.0 | sapcc/kubernikus | this needs to be without the apiserver prefix. it is not included in the generated certs |
596,240 | 12.09.2017 15:01:11 | -7,200 | 50e9e24e2cc057bf526219a0a8e98c951a6c7128 | matches service name without -apiserver | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/ingress.yaml",
"new_path": "charts/kube-master/templates/ingress.yaml",
"diff": "@@ -17,6 +17,6 @@ spec:\npaths:\n- path: /\nbackend:\n- serviceName: {{ include \"master.fullname\" . }}-apiserver\n+ serviceName: {{ include \"master... | Go | Apache License 2.0 | sapcc/kubernikus | matches service name without -apiserver |
596,240 | 12.09.2017 15:06:49 | -7,200 | 9a66400bd3ac183b1bc1985e5584c5a76ecf4531 | uses ingress fqdn. hack until we have this figured out correctly | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/configmap.yaml",
"new_path": "charts/kube-master/templates/configmap.yaml",
"diff": "@@ -14,7 +14,7 @@ data:\n- name: local\ncluster:\ncertificate-authority: /etc/kubernetes/certs/tls-ca.pem\n- server: https://{{ include \"master.f... | Go | Apache License 2.0 | sapcc/kubernikus | uses ingress fqdn. hack until we have this figured out correctly |
596,240 | 12.09.2017 15:28:49 | -7,200 | 2cd7478b72a6482c097eeff8868435fd6568373d | do not verify kubelets | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/api.yaml",
"new_path": "charts/kube-master/templates/api.yaml",
"diff": "@@ -38,8 +38,6 @@ spec:\npath: etcd-clients-apiserver.pem\n- key: etcd-clients-apiserver-key.pem\npath: etcd-clients-apiserver-key.pem\n- - key: kubelet-clien... | Go | Apache License 2.0 | sapcc/kubernikus | do not verify kubelets |
596,240 | 12.09.2017 16:14:10 | -7,200 | 18d53374d237c44ae3ba356370a119646934e1d7 | ok, this is it. this is the state sieve that works. maybe. hopefully | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/openstack/client.go",
"new_path": "pkg/client/openstack/client.go",
"diff": "@@ -81,16 +81,20 @@ type Node struct {\n}\nfunc (n *Node) Ready() bool {\n+ glog.V(6).Infof(\"[%v] PowerState: %v, VMState: %v, TaskState: %v\", n.Name, n.PowerState, n.VMS... | Go | Apache License 2.0 | sapcc/kubernikus | ok, this is it. this is the state sieve that works. maybe. hopefully |
596,240 | 12.09.2017 16:14:34 | -7,200 | e6fee5683c0a36e46bdcd86f78e1731d890872a7 | tunes logging down | [
{
"change_type": "MODIFY",
"old_path": "pkg/templates/ignition.go",
"new_path": "pkg/templates/ignition.go",
"diff": "@@ -63,8 +63,8 @@ func (i *ignition) GenerateNode(kluster *v1.Kluster, client kubernetes.Interface\nreturn nil, err\n}\n- glog.V(5).Infof(\"IgnitionData: %v\", data)\n- glog.V(5).Inf... | Go | Apache License 2.0 | sapcc/kubernikus | tunes logging down |
596,240 | 12.09.2017 17:03:35 | -7,200 | 7b0aa6afd7be7e9aff963874e825c676d86d18c8 | adds delete node function | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/openstack/client.go",
"new_path": "pkg/client/openstack/client.go",
"diff": "@@ -42,6 +42,7 @@ type client struct {\ntype Client interface {\nCreateNode(*kubernikus_v1.Kluster, *kubernikus_v1.NodePool, []byte) (string, error)\n+ DeleteNode(*kubernik... | Go | Apache License 2.0 | sapcc/kubernikus | adds delete node function |
596,240 | 12.09.2017 17:03:57 | -7,200 | 400a1845fcf135570fe049807128c5ca02af3c1e | delete clusters. make state aware | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/launch.go",
"new_path": "pkg/controller/launch.go",
"diff": "@@ -121,17 +121,16 @@ func (launchctl *LaunchControl) reconcile(key string) error {\nreturn fmt.Errorf(\"Failed to fetch key %s from cache: %s\", key, err)\n}\nif !exists {\n- glog.Inf... | Go | Apache License 2.0 | sapcc/kubernikus | delete clusters. make state aware |
596,240 | 12.09.2017 17:07:41 | -7,200 | 2f09d6758609f3628fb5f1ee350c1f55a955d3ca | exit early before more nodes are being spawned | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/launch.go",
"new_path": "pkg/controller/launch.go",
"diff": "@@ -148,7 +148,8 @@ func (launchctl *LaunchControl) syncPool(kluster *v1.Kluster, pool *v1.NodePool)\nreturn fmt.Errorf(\"[%v] Couldn't list nodes for pool %v: %v\", kluster.Name, pool... | Go | Apache License 2.0 | sapcc/kubernikus | exit early before more nodes are being spawned |
596,240 | 12.09.2017 18:40:27 | -7,200 | 90eedb68496a9972e6709a17b6fbe007de22112e | enables Node authorizers. this puts kubelets into the system:nodes group | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/api.yaml",
"new_path": "charts/kube-master/templates/api.yaml",
"diff": "@@ -70,7 +70,7 @@ spec:\n- --secure-port=6443\n- --admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,ResourceQuota\n- --allo... | Go | Apache License 2.0 | sapcc/kubernikus | enables Node authorizers. this puts kubelets into the system:nodes group |
596,240 | 12.09.2017 18:41:10 | -7,200 | 9771330a5d52c258f58b5a52a80688d9688660d9 | looks like this needs to be on after all | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/controller-manager.yaml",
"new_path": "charts/kube-master/templates/controller-manager.yaml",
"diff": "@@ -70,6 +70,7 @@ spec:\n- --cluster-signing-cert-file=/etc/kubernetes/certs/apiserver-nodes-ca.pem\n- --cluster-signing-key-fil... | Go | Apache License 2.0 | sapcc/kubernikus | looks like this needs to be on after all |
596,240 | 12.09.2017 18:42:18 | -7,200 | 16b35f1701b7413b93308f986e620586307bcf45 | gargrgl. with certain chars like `\` in the password we get authentication errors. something is interpreting this. helm i'm looking at you | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/ground.go",
"new_path": "pkg/controller/ground.go",
"diff": "@@ -414,7 +414,7 @@ func (op *GroundControl) discoverOpenstackInfo(kluster *v1.Kluster) error {\nif copy.Spec.OpenstackInfo.Password == \"\" {\nglog.V(5).Infof(\"[%v] Setting Password ... | Go | Apache License 2.0 | sapcc/kubernikus | gargrgl. with certain chars like `\` in the password we get authentication errors. something is interpreting this. helm i'm looking at you |
596,240 | 12.09.2017 21:56:32 | -7,200 | ff00a76e39784e522309b8914ea1ac744e1624c7 | seed cluster roles for kubelet bootstrap | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/ground.go",
"new_path": "pkg/controller/ground.go",
"diff": "@@ -423,6 +423,21 @@ func (op *GroundControl) discoverOpenstackInfo(kluster *v1.Kluster) error {\nreturn err\n}\n+func (op *GroundControl) seedClusterRoles(kluster *v1.Kluster) error {... | Go | Apache License 2.0 | sapcc/kubernikus | seed cluster roles for kubelet bootstrap |
596,240 | 13.09.2017 11:14:38 | -7,200 | 76643ff4ec90f8bbf7afb54da06442bec772d03d | use rest client to delete TPR. fixes | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/ground.go",
"new_path": "pkg/controller/ground.go",
"diff": "@@ -287,7 +287,12 @@ func (op *GroundControl) terminateKluster(tpr *v1.Kluster) error {\nreturn err\n}\n- return op.Clients.Kubernikus.Kubernikus().Klusters(tpr.Namespace).Delete(tpr.N... | Go | Apache License 2.0 | sapcc/kubernikus | use rest client to delete TPR. fixes #36 |
596,240 | 13.09.2017 17:26:44 | -7,200 | dab0d650c113096a772e492a9fdd89a8b5e3244c | crud operations for kluster/spec/nodepools. fixes | [
{
"change_type": "MODIFY",
"old_path": "pkg/api/handlers/create_cluster.go",
"new_path": "pkg/api/handlers/create_cluster.go",
"diff": "@@ -23,6 +23,17 @@ type createCluster struct {\nfunc (d *createCluster) Handle(params operations.CreateClusterParams, principal *models.Principal) middleware.Respon... | Go | Apache License 2.0 | sapcc/kubernikus | crud operations for kluster/spec/nodepools. fixes #31 |
596,240 | 14.09.2017 09:55:24 | -7,200 | bd7d607d8f1000db4df0674829fca90d412f738e | extends status object with nodepools status. breaking change for kluster state. sorry esther... | [
{
"change_type": "MODIFY",
"old_path": "pkg/api/handlers/util.go",
"new_path": "pkg/api/handlers/util.go",
"diff": "@@ -40,7 +40,7 @@ func editCluster(client kubernikusv1.KlusterInterface, principal *models.Princip\n}\n-func ClusterSpecNodePoolItems(k *v1.Kluster) []*models.ClusterSpecNodePoolsItems... | Go | Apache License 2.0 | sapcc/kubernikus | extends status object with nodepools status. breaking change for kluster state. sorry esther... |
596,240 | 17.09.2017 13:12:08 | -7,200 | dc732cc64983bcf73e018e6f38aa9ac0da14e24b | first stab at a base controller | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "pkg/controller/base.go",
"diff": "+package controller\n+\n+import (\n+ \"fmt\"\n+ \"reflect\"\n+ \"sync\"\n+ \"time\"\n+\n+ \"github.com/golang/glog\"\n+ \"k8s.io/apimachinery/pkg/util/wait\"\n+ \"k8s.io/client-go/tools/cache\"\n+ \"k8s.io/clien... | Go | Apache License 2.0 | sapcc/kubernikus | first stab at a base controller |
596,240 | 17.09.2017 22:02:59 | -7,200 | d65ec6e05cb2b2ed880783eb89d551204e90ea3c | adds fancy wormhole generator | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/openstack/client.go",
"new_path": "pkg/client/openstack/client.go",
"diff": "@@ -42,10 +42,12 @@ type client struct {\ntype Client interface {\nCreateNode(*kubernikus_v1.Kluster, *kubernikus_v1.NodePool, []byte) (string, error)\n+ CreateWormhole(*ku... | Go | Apache License 2.0 | sapcc/kubernikus | adds fancy wormhole generator |
596,240 | 18.09.2017 09:26:54 | -7,200 | e045e2020359fa3ef1828191e196fd471d48e802 | fix controller double runner | [
{
"change_type": "MODIFY",
"old_path": "pkg/cmd/operator/operator.go",
"new_path": "pkg/cmd/operator/operator.go",
"diff": "@@ -62,7 +62,7 @@ func NewOperatorOptions() *Options {\nAuthDomain: \"Default\",\nKubernikusDomain: \"kluster.staging.cloud.sap\",\nNamespace: \"kubernikus\",\n- Controllers: [... | Go | Apache License 2.0 | sapcc/kubernikus | fix controller double runner |
596,240 | 18.09.2017 09:43:51 | -7,200 | b2f7e83c72b62ccd5d92b9c290071babfc7187fd | move initialization into controllers. only starts informers for controllers that are actually started | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/ground.go",
"new_path": "pkg/controller/ground.go",
"diff": "@@ -13,7 +13,10 @@ import (\n\"google.golang.org/grpc\"\nyaml \"gopkg.in/yaml.v2\"\nmetav1 \"k8s.io/apimachinery/pkg/apis/meta/v1\"\n+ \"k8s.io/apimachinery/pkg/runtime\"\n\"k8s.io/api... | Go | Apache License 2.0 | sapcc/kubernikus | move initialization into controllers. only starts informers for controllers that are actually started |
596,240 | 18.09.2017 11:07:57 | -7,200 | 36fec0063acac2e3c5bf51f00c275f29ba28d677 | actually queue keys and not their index | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/base.go",
"new_path": "pkg/controller/base.go",
"diff": "@@ -74,7 +74,7 @@ func (base *Base) Run(threadiness int, stopCh <-chan struct{}, wg *sync.WaitGrou\nfor {\nselect {\ncase <-ticker.C:\n- for key := range base.informer.GetStore().ListKeys(... | Go | Apache License 2.0 | sapcc/kubernikus | actually queue keys and not their index |
596,240 | 18.09.2017 11:08:16 | -7,200 | afacd21c78046952dd31c0869992cd5fd04d209a | this state function | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/openstack/client.go",
"new_path": "pkg/client/openstack/client.go",
"diff": "@@ -79,23 +79,46 @@ type Node struct {\nStateExt\n}\n-func (n *Node) Ready() bool {\n- glog.V(6).Infof(\"[%v] PowerState: %v, VMState: %v, TaskState: %v\", n.Name, n.PowerS... | Go | Apache License 2.0 | sapcc/kubernikus | this state function |
596,240 | 18.09.2017 11:09:05 | -7,200 | b4e84cc02c5256500d4f09bd1a5d586ce75538f8 | adds smarter requeing and state detection | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/launch.go",
"new_path": "pkg/controller/launch.go",
"diff": "@@ -233,7 +233,7 @@ func (launchctl *LaunchControl) handleErr(err error, key interface{}) {\nfunc ready(nodes []openstack.Node) int {\nready := 0\nfor _, n := range nodes {\n- if n.Rea... | Go | Apache License 2.0 | sapcc/kubernikus | adds smarter requeing and state detection |
596,240 | 18.09.2017 11:09:27 | -7,200 | d8175b77bd0fa3facaf7b1adc55426b78d3e803c | move to initalize Kluster with namespace by coincidence :( | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/operator.go",
"new_path": "pkg/controller/operator.go",
"diff": "@@ -150,11 +150,6 @@ func NewKubernikusOperator(options *KubernikusOperatorOptions) *KubernikusOperat\noptions.AuthProjectDomain,\n)\n- o.Clients.Satellites = kube.NewSharedClientF... | Go | Apache License 2.0 | sapcc/kubernikus | move to initalize Kluster with namespace by coincidence :( |
596,240 | 19.09.2017 10:48:01 | -7,200 | fc63df3d095a81cb62afe560e2c05107a882774b | implements workholes | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/openstack/client.go",
"new_path": "pkg/client/openstack/client.go",
"diff": "@@ -44,14 +44,16 @@ type client struct {\ntype Client interface {\nCreateNode(*kubernikus_v1.Kluster, *kubernikus_v1.NodePool, []byte) (string, error)\n- CreateWormhole(*ku... | Go | Apache License 2.0 | sapcc/kubernikus | implements workholes |
596,240 | 19.09.2017 13:31:56 | -7,200 | 17155cfbf71fe0e823d47be14675868d9571c735 | adds hardness for wormhole tunnels | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "cmd/wormhole/main.go",
"diff": "+package main\n+\n+import (\n+ \"os\"\n+ \"path/filepath\"\n+\n+ \"github.com/golang/glog\"\n+\n+ \"github.com/sapcc/kubernikus/pkg/cmd\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd/wormhole\"\n+)\n+\n+func main() {\... | Go | Apache License 2.0 | sapcc/kubernikus | adds hardness for wormhole tunnels |
596,240 | 19.09.2017 13:32:42 | -7,200 | b5938841591962625ff0c1d14d7f83564b124d11 | add wormhole binary | [
{
"change_type": "MODIFY",
"old_path": "Makefile",
"new_path": "Makefile",
"diff": "@@ -3,7 +3,7 @@ DATE = $(shell date +%Y%m%d%H%M)\nIMAGE ?= sapcc/kubernikus\nVERSION ?= latest\nGOOS ?= $(shell go env | grep GOOS | cut -d'\"' -f2)\n-BINARIES := apiserver kubernikus tunnelclient\n+BINARIES := apise... | Go | Apache License 2.0 | sapcc/kubernikus | add wormhole binary |
596,240 | 19.09.2017 13:40:19 | -7,200 | 70e93e3c66dfb76af22ffc0d2aab84596bc3b4e1 | gieb tunnel.server | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "pkg/wormhole/wormhole.go",
"diff": "+package wormhole\n+\n+import (\n+ \"fmt\"\n+ \"sync\"\n+ \"time\"\n+\n+ \"github.com/golang/glog\"\n+ \"github.com/koding/tunnel\"\n+ \"k8s.io/client-go/informers\"\n+ \"k8s.io/client-go/kubernetes\"\n+\n+ ku... | Go | Apache License 2.0 | sapcc/kubernikus | gieb tunnel.server |
596,240 | 19.09.2017 17:44:19 | -7,200 | 9c3b80aeb241b759ae643567b058d595f78f806c | add missing iptables functionality | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "pkg/util/iptables/save_restore.go",
"diff": "+/*\n+Copyright 2014 The Kubernetes Authors.\n+\n+Licensed under the Apache License, Version 2.0 (the \"License\");\n+you may not use this file except in compliance with the License.\n+You may obtain ... | Go | Apache License 2.0 | sapcc/kubernikus | add missing iptables functionality |
596,240 | 19.09.2017 17:45:08 | -7,200 | 289aaf8a2515a59a22bc6a1f508affde46f76f15 | added iptables monkeying | [
{
"change_type": "MODIFY",
"old_path": "pkg/wormhole/server/controller.go",
"new_path": "pkg/wormhole/server/controller.go",
"diff": "package server\nimport (\n+ \"bytes\"\n+ \"fmt\"\n\"net\"\n+ \"strings\"\n\"sync\"\n\"time\"\n\"github.com/golang/glog\"\n\"github.com/koding/tunnel\"\n+ \"github.com... | Go | Apache License 2.0 | sapcc/kubernikus | added iptables monkeying |
596,240 | 19.09.2017 17:47:27 | -7,200 | 73ed8ffd5c9bc742c6b37a8dac8c89f3dbac6d85 | fix comment double quotes | [
{
"change_type": "MODIFY",
"old_path": "pkg/wormhole/server/controller.go",
"new_path": "pkg/wormhole/server/controller.go",
"diff": "@@ -251,7 +251,7 @@ func (c *Controller) writeTunnelRedirect(key string, filterRules *bytes.Buffer)\nwriteLine(filterRules,\n\"-A\", string(KUBERNIKUS_TUNNELS),\n- \"... | Go | Apache License 2.0 | sapcc/kubernikus | fix comment double quotes |
596,240 | 19.09.2017 17:58:20 | -7,200 | 330a6e9c44461dc698b9a6c78660b994645f3465 | add wormhole sidecar | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/api.yaml",
"new_path": "charts/kube-master/templates/api.yaml",
"diff": "@@ -42,6 +42,10 @@ spec:\npath: kubelet-clients-apiserver.pem\n- key: kubelet-clients-apiserver-key.pem\npath: kubelet-clients-apiserver-key.pem\n+ - key: api... | Go | Apache License 2.0 | sapcc/kubernikus | add wormhole sidecar |
596,240 | 19.09.2017 18:09:56 | -7,200 | 7be27d11009293aa551739f1d6b1220f41849be3 | needs to start after groundctl | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/operator.go",
"new_path": "pkg/controller/operator.go",
"diff": "@@ -159,11 +159,6 @@ func NewKubernikusOperator(options *KubernikusOperatorOptions) *KubernikusOperat\noptions.AuthProjectDomain,\n)\n- o.Clients.Satellites = kube.NewSharedClientF... | Go | Apache License 2.0 | sapcc/kubernikus | needs to start after groundctl |
596,240 | 19.09.2017 18:12:14 | -7,200 | 52d4d3489b422848942526b63ce7b76dfc4ca64f | do not start wormhole generator by default | [
{
"change_type": "MODIFY",
"old_path": "pkg/cmd/operator/operator.go",
"new_path": "pkg/cmd/operator/operator.go",
"diff": "@@ -65,7 +65,7 @@ func NewOperatorOptions() *Options {\nAuthDomain: \"Default\",\nKubernikusDomain: \"kluster.staging.cloud.sap\",\nNamespace: \"kubernikus\",\n- Controllers: [... | Go | Apache License 2.0 | sapcc/kubernikus | do not start wormhole generator by default |
596,240 | 19.09.2017 20:06:56 | -7,200 | b67435a641cf74f8ec9e49e2a29afebac003edf6 | adding iptables for wormhole redirects | [
{
"change_type": "MODIFY",
"old_path": "Dockerfile",
"new_path": "Dockerfile",
"diff": "@@ -7,7 +7,7 @@ RUN make all\nFROM alpine:3.6\nMAINTAINER \"Fabian Ruff <fabian.ruff@sap.com>\"\n-RUN apk add --no-cache curl\n+RUN apk add --no-cache curl iptables\nRUN curl -Lo /bin/dumb-init https://github.com... | Go | Apache License 2.0 | sapcc/kubernikus | adding iptables for wormhole redirects |
596,240 | 19.09.2017 20:16:23 | -7,200 | ee170c5aff82fe8f5beeaf218d9a9b933414e0e0 | generate wormhole user certs | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/api.yaml",
"new_path": "charts/kube-master/templates/api.yaml",
"diff": "@@ -42,9 +42,9 @@ spec:\npath: kubelet-clients-apiserver.pem\n- key: kubelet-clients-apiserver-key.pem\npath: kubelet-clients-apiserver-key.pem\n- - key: apis... | Go | Apache License 2.0 | sapcc/kubernikus | generate wormhole user certs |
596,240 | 19.09.2017 21:42:34 | -7,200 | 4445aedb4c57bc88e4b8a4acddbd17b7057b8b68 | update charts to expose wormhole via ingress | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/api.yaml",
"new_path": "charts/kube-master/templates/api.yaml",
"diff": "@@ -52,6 +52,10 @@ spec:\npath: tls-apiserver.pem\n- key: tls-apiserver-key.pem\npath: tls-apiserver-key.pem\n+ - key: tls-wormhole.pem\n+ path: tls-wormhole.... | Go | Apache License 2.0 | sapcc/kubernikus | update charts to expose wormhole via ingress |
596,240 | 19.09.2017 21:43:07 | -7,200 | 87b74c039ce0c4bc196746856f9ab4bb5a650a9a | populates wormholeURL | [
{
"change_type": "MODIFY",
"old_path": "pkg/apis/kubernikus/v1/kluster.go",
"new_path": "pkg/apis/kubernikus/v1/kluster.go",
"diff": "@@ -28,8 +28,8 @@ type OpenstackInfo struct {\n}\ntype KubernikusInfo struct {\n- Server string `json:\"server\"`\nServerURL string `json:\"serverURL\"`\n+ WormholeUR... | Go | Apache License 2.0 | sapcc/kubernikus | populates wormholeURL |
596,240 | 19.09.2017 21:44:22 | -7,200 | 2f864c9e41ea2e08b5d2f4cc7b686cb2f76b8157 | use less confusing port | [
{
"change_type": "MODIFY",
"old_path": "pkg/wormhole/server/tunnel.go",
"new_path": "pkg/wormhole/server/tunnel.go",
"diff": "@@ -53,7 +53,7 @@ func (t *Tunnel) Run(stopCh <-chan struct{}, wg *sync.WaitGroup) {\n}\nserver := http.Server{\n- Addr: \":443\",\n+ Addr: \":6553\",\nHandler: t,\nTLSConfig... | Go | Apache License 2.0 | sapcc/kubernikus | use less confusing port |
596,240 | 19.09.2017 21:45:09 | -7,200 | 798fe963c1c6491faabd953f226c5e9f825670e2 | generate wormhole certificates | [
{
"change_type": "MODIFY",
"old_path": "pkg/cmd/certificates/files.go",
"new_path": "pkg/cmd/certificates/files.go",
"diff": "@@ -6,6 +6,7 @@ import (\n\"github.com/sapcc/kubernikus/pkg/apis/kubernikus/v1\"\n\"github.com/sapcc/kubernikus/pkg/cmd\"\n+ \"github.com/sapcc/kubernikus/pkg/controller/conf... | Go | Apache License 2.0 | sapcc/kubernikus | generate wormhole certificates |
596,240 | 19.09.2017 22:06:35 | -7,200 | 614fe771e1ae567080842bfd0f2107cf3177b13d | bring fqKlusterNames back. Maybe... | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/ground/cluster.go",
"new_path": "pkg/controller/ground/cluster.go",
"diff": "@@ -39,8 +39,8 @@ func NewCluster(kluster *v1.Kluster, config config.Config) (*Cluster, error) {\ncluster := &Cluster{\nCertificates: &Certificates{},\nAPI: API{\n- Ing... | Go | Apache License 2.0 | sapcc/kubernikus | bring fqKlusterNames back. Maybe... |
596,240 | 19.09.2017 22:11:58 | -7,200 | 01c680eebd2bf7f02800fa1adf167d04dd54f914 | apparently multi-port services need names for each port. who would have known? | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/service.yaml",
"new_path": "charts/kube-master/templates/service.yaml",
"diff": "@@ -9,7 +9,9 @@ metadata:\nspec:\ntype: ClusterIP\nports:\n- - port: 6443\n- - port: 6553\n+ - name: apiserver\n+ port: 6443\n+ - name: wormhole\n+ po... | Go | Apache License 2.0 | sapcc/kubernikus | apparently multi-port services need names for each port. who would have known? |
596,240 | 19.09.2017 22:22:19 | -7,200 | a661807c05edbcf9e11e7ba90b12bf79a688c936 | garglblbl. again and again... | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/api.yaml",
"new_path": "charts/kube-master/templates/api.yaml",
"diff": "@@ -118,9 +118,9 @@ spec:\n- server\n- --kubeconfig=/etc/kubernetes/config/kubeconfig\n#- --client-ca-file=/etc/kubernetes/certs/apiserver-clients-and-nodes-c... | Go | Apache License 2.0 | sapcc/kubernikus | garglblbl. again and again... |
596,240 | 19.09.2017 22:40:07 | -7,200 | e8f46b1bae6dda12f919c98538be8ce397d1d957 | using cluster-admin until seeding rbac roles works | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/api.yaml",
"new_path": "charts/kube-master/templates/api.yaml",
"diff": "@@ -42,9 +42,9 @@ spec:\npath: kubelet-clients-apiserver.pem\n- key: kubelet-clients-apiserver-key.pem\npath: kubelet-clients-apiserver-key.pem\n- - key: apis... | Go | Apache License 2.0 | sapcc/kubernikus | using cluster-admin until seeding rbac roles works |
596,240 | 19.09.2017 22:42:31 | -7,200 | 44c9e64620b0251615c5bbfe15b86cda0ee67dbc | removes premature initialization | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/ground.go",
"new_path": "pkg/controller/ground.go",
"diff": "@@ -50,7 +50,6 @@ func NewGroundController(factories Factories, clients Clients, config config.Con\nFactories: factories,\nConfig: config,\nqueue: workqueue.NewRateLimitingQueue(workqu... | Go | Apache License 2.0 | sapcc/kubernikus | removes premature initialization |
596,240 | 20.09.2017 08:59:21 | -7,200 | e3b51aef918804e05dc11c800547e151aa8faf40 | initialize custom informers before anything else | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/ground.go",
"new_path": "pkg/controller/ground.go",
"diff": "@@ -13,10 +13,7 @@ import (\n\"google.golang.org/grpc\"\nyaml \"gopkg.in/yaml.v2\"\nmetav1 \"k8s.io/apimachinery/pkg/apis/meta/v1\"\n- \"k8s.io/apimachinery/pkg/runtime\"\n\"k8s.io/api... | Go | Apache License 2.0 | sapcc/kubernikus | initialize custom informers before anything else |
596,240 | 20.09.2017 09:30:07 | -7,200 | 33a7e9f8b7519dba65b4bc6a6856be007cf0d505 | do not create empty nodepools | [
{
"change_type": "MODIFY",
"old_path": "pkg/api/handlers/create_cluster.go",
"new_path": "pkg/api/handlers/create_cluster.go",
"diff": "@@ -25,7 +25,7 @@ func (d *createCluster) Handle(params operations.CreateClusterParams, principal\nname := *params.Body.Name\nvar nodePools []v1.NodePool\nif params... | Go | Apache License 2.0 | sapcc/kubernikus | do not create empty nodepools |
596,240 | 20.09.2017 09:55:31 | -7,200 | 31360910cfbed93fbc367d4fac68dfa9eeb5be77 | take starting nodes into account | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/launch.go",
"new_path": "pkg/controller/launch.go",
"diff": "@@ -233,7 +233,7 @@ func (launchctl *LaunchControl) handleErr(err error, key interface{}) {\nfunc ready(nodes []openstack.Node) int {\nready := 0\nfor _, n := range nodes {\n- if n.Run... | Go | Apache License 2.0 | sapcc/kubernikus | take starting nodes into account |
596,240 | 20.09.2017 10:04:59 | -7,200 | 378becdcdaa29344d29ccfa164efd1155fc453c2 | namespaces nodepools with kluster name | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/openstack/client.go",
"new_path": "pkg/client/openstack/client.go",
"diff": "@@ -413,7 +413,7 @@ func (c *client) GetNodes(kluster *kubernikus_v1.Kluster, pool *kubernikus_v1.No\n}\nglog.V(5).Infof(\"Listing nodes for %v/%v\", project_id, pool_id)\n... | Go | Apache License 2.0 | sapcc/kubernikus | namespaces nodepools with kluster name |
596,240 | 20.09.2017 14:56:18 | -7,200 | 92fc0ae872421fdc5e3362098cdc9058045ee4c2 | add second kubeconfig for sidecar pods that connect locally | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/api.yaml",
"new_path": "charts/kube-master/templates/api.yaml",
"diff": "@@ -64,9 +64,7 @@ spec:\npath: apiserver-nodes-ca.pem\n#Todo: Replace with wormhole client cert but that needs some RBAC seeding\n- key: apiserver-clients-clu... | Go | Apache License 2.0 | sapcc/kubernikus | add second kubeconfig for sidecar pods that connect locally |
596,240 | 20.09.2017 15:14:27 | -7,200 | 0b732250c1d9df1180782b9d17aa5a9e6b051af2 | move REDIRECT to nat table and a few other fixes | [
{
"change_type": "MODIFY",
"old_path": "pkg/wormhole/server/controller.go",
"new_path": "pkg/wormhole/server/controller.go",
"diff": "@@ -180,7 +180,7 @@ func (c *Controller) delNode(key string) error {\n}\nfunc (c *Controller) redoIPTablesSpratz() error {\n- table := iptables.TableFilter\n+ table :... | Go | Apache License 2.0 | sapcc/kubernikus | move REDIRECT to nat table and a few other fixes |
596,240 | 20.09.2017 17:53:28 | -7,200 | eef211887b93861755f6b9a11c6da426ed87788b | decouples TPR create/wait from each client creation. it's only needed when talking to the control plane from the operator | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/kubernetes/client.go",
"new_path": "pkg/client/kubernetes/client.go",
"diff": "@@ -116,14 +116,6 @@ func NewClient(kubeconfig string) (kubernetes.Interface, error) {\nglog.V(3).Infof(\"Using Kubernetes Api at %s\", config.Host)\n- if err := ensureTP... | Go | Apache License 2.0 | sapcc/kubernikus | decouples TPR create/wait from each client creation. it's only needed when talking to the control plane from the operator |
596,240 | 20.09.2017 17:54:18 | -7,200 | d5d96b2bc9937c657c09ec3f78dc82ae41dfc2c7 | fixes from certificate name. adds missing tls-ca | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/api.yaml",
"new_path": "charts/kube-master/templates/api.yaml",
"diff": "@@ -56,6 +56,8 @@ spec:\nsecret:\nsecretName: {{ include \"master.fullname\" . }}\nitems:\n+ - key: tls-ca.pem\n+ path: tls-ca.pem\n- key: tls-wormhole.pem\np... | Go | Apache License 2.0 | sapcc/kubernikus | fixes from certificate name. adds missing tls-ca |
596,240 | 20.09.2017 18:19:24 | -7,200 | baf0ead540d3912a66d0ad275311aac6867018b9 | wait for apiserver before crashing. useful for clients running as sidecar | [
{
"change_type": "MODIFY",
"old_path": "pkg/client/kubernetes/client.go",
"new_path": "pkg/client/kubernetes/client.go",
"diff": "@@ -2,6 +2,8 @@ package kubernetes\nimport (\n\"errors\"\n+ \"fmt\"\n+ \"net/http\"\n\"sync\"\n\"time\"\n@@ -184,3 +186,25 @@ func WaitForTPR(clientset kubernetes.Interfa... | Go | Apache License 2.0 | sapcc/kubernikus | wait for apiserver before crashing. useful for clients running as sidecar |
596,240 | 20.09.2017 21:20:17 | -7,200 | 358b6886207131c456be492e1534307ee310a9ee | required certificate to enable service account validation | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/controller-manager.yaml",
"new_path": "charts/kube-master/templates/controller-manager.yaml",
"diff": "@@ -76,6 +76,7 @@ spec:\n- --root-ca-file=/etc/kubernetes/certs/apiserver-clients-ca.pem\n- --service-account-private-key-file=/... | Go | Apache License 2.0 | sapcc/kubernikus | required certificate to enable service account validation |
596,240 | 20.09.2017 21:21:00 | -7,200 | 72a742b9e797ae88e10f1790abaf913d7dbbd9ad | now that service account tokens can be validated the indivual roles per controller work. seeding works. | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/api.yaml",
"new_path": "charts/kube-master/templates/api.yaml",
"diff": "@@ -32,6 +32,8 @@ spec:\nitems:\n- key: apiserver-clients-and-nodes-ca.pem\npath: apiserver-clients-and-nodes-ca.pem\n+ - key: apiserver-clients-ca-key.pem\n+... | Go | Apache License 2.0 | sapcc/kubernikus | now that service account tokens can be validated the indivual roles per controller work. seeding works. |
596,240 | 20.09.2017 21:21:23 | -7,200 | c7ddc06df5e1daaf91fae5ee3cf2144c7372d9d0 | actually bind the correct role | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/ground/bootstrap.go",
"new_path": "pkg/controller/ground/bootstrap.go",
"diff": "@@ -59,7 +59,7 @@ func SeedAutoApproveNodeBootstrapTokens(client clientset.Interface) error {\nRoleRef: rbac.RoleRef{\nAPIGroup: rbac.GroupName,\nKind: \"ClusterRol... | Go | Apache License 2.0 | sapcc/kubernikus | actually bind the correct role |
596,240 | 21.09.2017 10:53:49 | -7,200 | ff5f2abe719c50777aaa0f8f633a8329bb6ef9fa | provision wormhole tunnel client as rkt/systemd unit | [
{
"change_type": "MODIFY",
"old_path": "pkg/templates/node.go",
"new_path": "pkg/templates/node.go",
"diff": "@@ -70,6 +70,40 @@ systemd:\nRestart=always\nRestartSec=10\n+ [Install]\n+ WantedBy=multi-user.target\n+ - name: wormhole.service\n+ contents: |\n+ [Unit]\n+ Description=Kubernikus Wormhole\... | Go | Apache License 2.0 | sapcc/kubernikus | provision wormhole tunnel client as rkt/systemd unit |
596,240 | 21.09.2017 10:55:36 | -7,200 | 6edd954bf5e7cb20f7e4fa0a1bf610b26aae1ae7 | same suffix in client and server | [
{
"change_type": "MODIFY",
"old_path": "pkg/cmd/wormhole/client.go",
"new_path": "pkg/cmd/wormhole/client.go",
"diff": "@@ -129,7 +129,7 @@ func (o *ClientOptions) Run(c *cobra.Command) error {\n}\nc := strings.Split(url.Hostname(), \".\")\n//Add \"-t\" to first component of hostname\n- c[0] = fmt.S... | Go | Apache License 2.0 | sapcc/kubernikus | same suffix in client and server |
596,240 | 21.09.2017 10:59:29 | -7,200 | f74079b3c66b3ee08601f6069d8f64cf4ca6eec3 | use full nodename including group info as identifier | [
{
"change_type": "MODIFY",
"old_path": "pkg/wormhole/server/controller.go",
"new_path": "pkg/wormhole/server/controller.go",
"diff": "@@ -151,7 +151,7 @@ func (c *Controller) addNode(key string, node *v1.Node) error {\nglog.Infof(\"Listening to node %v on %v\", key, listener.Addr())\nc.store[key] = ... | Go | Apache License 2.0 | sapcc/kubernikus | use full nodename including group info as identifier |
596,240 | 21.09.2017 11:25:33 | -7,200 | ffe6baa4c59e63ea58251c603a01a6c153a88cca | sprint listening address correctly | [
{
"change_type": "MODIFY",
"old_path": "pkg/wormhole/server/tunnel.go",
"new_path": "pkg/wormhole/server/tunnel.go",
"diff": "@@ -61,7 +61,7 @@ func (t *Tunnel) Run(stopCh <-chan struct{}, wg *sync.WaitGroup) {\n},\n}\n- glog.Info(\"Starting tunnel server. Listening on %s \", server.Addr)\n+ glog.In... | Go | Apache License 2.0 | sapcc/kubernikus | sprint listening address correctly |
596,240 | 21.09.2017 12:29:57 | -7,200 | 06b5bcdbabe290ed1bbb1bbf9929a6ff3d2c4166 | url port is empty. hard-coded to ssl for now | [
{
"change_type": "MODIFY",
"old_path": "pkg/cmd/wormhole/client.go",
"new_path": "pkg/cmd/wormhole/client.go",
"diff": "@@ -130,7 +130,7 @@ func (o *ClientOptions) Run(c *cobra.Command) error {\nc := strings.Split(url.Hostname(), \".\")\n//Add \"-t\" to first component of hostname\nc[0] = fmt.Sprint... | Go | Apache License 2.0 | sapcc/kubernikus | url port is empty. hard-coded to ssl for now |
596,240 | 21.09.2017 12:30:14 | -7,200 | db12728145fe64cd1fadf42a8a3ae40bd399aa23 | stupid. actually use node name as identifier | [
{
"change_type": "MODIFY",
"old_path": "pkg/wormhole/server/controller.go",
"new_path": "pkg/wormhole/server/controller.go",
"diff": "@@ -148,10 +148,11 @@ func (c *Controller) addNode(key string, node *v1.Node) error {\nreturn err\n}\n- glog.Infof(\"Listening to node %v on %v\", key, listener.Addr(... | Go | Apache License 2.0 | sapcc/kubernikus | stupid. actually use node name as identifier |
596,240 | 21.09.2017 12:59:09 | -7,200 | 798c73e4fcd2b21959361d290814de3330b36b02 | we need some host | [
{
"change_type": "MODIFY",
"old_path": "pkg/wormhole/server/controller.go",
"new_path": "pkg/wormhole/server/controller.go",
"diff": "@@ -153,6 +153,7 @@ func (c *Controller) addNode(key string, node *v1.Node) error {\nc.store[key] = listener\nc.tunnel.AddAddr(listener, nil, identifier)\n+ c.tunnel.... | Go | Apache License 2.0 | sapcc/kubernikus | we need some host |
596,240 | 21.09.2017 14:36:29 | -7,200 | 7c86eeca699343785abcff8e544e9104e435a045 | prefer InternalIPs over node names | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/api.yaml",
"new_path": "charts/kube-master/templates/api.yaml",
"diff": "@@ -110,6 +110,7 @@ spec:\n- --token-auth-file=/etc/kubernetes/bootstrap/token.csv\n- --runtime-config=rbac.authorization.k8s.io/v1alpha1,extensions/v1beta1=t... | Go | Apache License 2.0 | sapcc/kubernikus | prefer InternalIPs over node names |
596,240 | 21.09.2017 16:28:17 | -7,200 | 320b5feea2fbf637239d84fdf47c4bb74c21905e | first throw os kube-proxy. Fixes | [
{
"change_type": "MODIFY",
"old_path": "charts/kube-master/templates/secrets.yaml",
"new_path": "charts/kube-master/templates/secrets.yaml",
"diff": "@@ -20,7 +20,7 @@ data:\ntoken.csv: {{ include (print $.Template.BasePath \"/_token.csv.tpl\") . | b64enc }}\n{{- if empty .Values.certsSecretName }}\... | Go | Apache License 2.0 | sapcc/kubernikus | first throw os kube-proxy. Fixes #38 |
596,240 | 21.09.2017 16:37:44 | -7,200 | 0dc962c27080eb8e66806b01a4b0a6ff1d07c2a0 | pass clusterCIDR | [
{
"change_type": "MODIFY",
"old_path": "pkg/templates/ignition.go",
"new_path": "pkg/templates/ignition.go",
"diff": "@@ -34,6 +34,9 @@ func (i *ignition) GenerateNode(kluster *v1.Kluster, client kubernetes.Interface\ndata := struct {\nTLSCA string\nKubeletClientsCA string\n+ ApiserverClientsSystemK... | Go | Apache License 2.0 | sapcc/kubernikus | pass clusterCIDR |
596,240 | 21.09.2017 17:44:18 | -7,200 | 1e5e9bf6cb9037d937881d9bdce758ad59a26ca5 | start proxy in stage1 | [
{
"change_type": "MODIFY",
"old_path": "pkg/templates/node.go",
"new_path": "pkg/templates/node.go",
"diff": "@@ -122,8 +122,10 @@ systemd:\n--dns=host \\\n--volume etc-kubernetes,kind=host,source=/etc/kubernetes,readOnly=true \\\n--mount volume=etc-kubernetes,target=/etc/kubernetes \\\n+ --stage1-f... | Go | Apache License 2.0 | sapcc/kubernikus | start proxy in stage1 |
596,240 | 21.09.2017 17:51:27 | -7,200 | 377d64f1d680fd6eea9108f9bb1e45b3205f82d3 | move parameter delimiter to right position | [
{
"change_type": "MODIFY",
"old_path": "pkg/templates/node.go",
"new_path": "pkg/templates/node.go",
"diff": "@@ -125,8 +125,8 @@ systemd:\n--stage1-from-dir=stage1-fly.aci \\\nquay.io/coreos/hyperkube:v1.7.5_coreos.0 \\\n--exec=hyperkube \\\n- proxy \\\n-- \\\n+ proxy \\\n--config=/etc/kubernetes/k... | Go | Apache License 2.0 | sapcc/kubernikus | move parameter delimiter to right position |
596,240 | 22.09.2017 14:30:12 | -7,200 | edf38d0d1e11141853dd398d2beda64a6b5f6005 | required fields for nodepools. validations for size | [
{
"change_type": "MODIFY",
"old_path": "pkg/api/handlers/create_cluster.go",
"new_path": "pkg/api/handlers/create_cluster.go",
"diff": "@@ -28,9 +28,9 @@ func (d *createCluster) Handle(params operations.CreateClusterParams, principal\nnodePools = []v1.NodePool{}\nfor _, pPool := range params.Body.Sp... | Go | Apache License 2.0 | sapcc/kubernikus | required fields for nodepools. validations for size |
596,240 | 22.09.2017 14:54:45 | -7,200 | d4904d1888b790f498b2b7b3714a33e409efa456 | enforce uniqueness for nodepool names | [
{
"change_type": "MODIFY",
"old_path": "pkg/api/handlers/create_cluster.go",
"new_path": "pkg/api/handlers/create_cluster.go",
"diff": "@@ -4,6 +4,7 @@ import (\n\"fmt\"\n\"github.com/go-openapi/runtime/middleware\"\n+ \"github.com/go-openapi/validate\"\n\"github.com/golang/glog\"\n\"github.com/sapc... | Go | Apache License 2.0 | sapcc/kubernikus | enforce uniqueness for nodepool names |
596,240 | 22.09.2017 17:04:52 | -7,200 | 1b9bd75220222f0091d587ca0d3756a85bc7a272 | sync cluster and kluster info and kluster state status state | [
{
"change_type": "MODIFY",
"old_path": "pkg/api/handlers/create_cluster.go",
"new_path": "pkg/api/handlers/create_cluster.go",
"diff": "@@ -53,8 +53,10 @@ func (d *createCluster) Handle(params operations.CreateClusterParams, principal\nNodePools: nodePools,\n},\nStatus: v1.KlusterStatus{\n+ Kluster:... | Go | Apache License 2.0 | sapcc/kubernikus | sync cluster and kluster info and kluster state status state |
596,240 | 22.09.2017 17:27:45 | -7,200 | c1a748825520e5cd7040e86b9f4df81cc2137fd2 | make it that nodepoolinfos are not null | [
{
"change_type": "MODIFY",
"old_path": "pkg/api/handlers/create_cluster.go",
"new_path": "pkg/api/handlers/create_cluster.go",
"diff": "@@ -30,8 +30,10 @@ func (d *createCluster) Handle(params operations.CreateClusterParams, principal\n}\nvar nodePools []v1.NodePool\n+ var nodePoolInfos []v1.NodePoo... | Go | Apache License 2.0 | sapcc/kubernikus | make it that nodepoolinfos are not null |
596,240 | 22.09.2017 17:37:40 | -7,200 | e30abeafd29556f270412214c20b1891e920e4c1 | actually stick nodepools into state :/ | [
{
"change_type": "MODIFY",
"old_path": "pkg/api/handlers/create_cluster.go",
"new_path": "pkg/api/handlers/create_cluster.go",
"diff": "@@ -66,6 +66,7 @@ func (d *createCluster) Handle(params operations.CreateClusterParams, principal\nKluster: v1.KlusterInfo{\nState: v1.KlusterPending,\n},\n+ NodePo... | Go | Apache License 2.0 | sapcc/kubernikus | actually stick nodepools into state :/ |
596,240 | 22.09.2017 18:23:50 | -7,200 | 003f03098bf9094d94676f99e6be84d10f6a948c | learning golang is hard. pointers and magic | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/launch.go",
"new_path": "pkg/controller/launch.go",
"diff": "@@ -222,15 +222,15 @@ func (launchctl *LaunchControl) terminateNode(kluster *v1.Kluster, id string) er\nreturn nil\n}\n-func (launchctl *LaunchControl) updateNodePoolStatus(kluster *v1... | Go | Apache License 2.0 | sapcc/kubernikus | learning golang is hard. pointers and magic |
596,240 | 22.09.2017 18:24:02 | -7,200 | ce4ea6137bad8f136d0f7e2cb5dcc026f4cb6867 | default to coreos image | [
{
"change_type": "MODIFY",
"old_path": "pkg/api/handlers/create_cluster.go",
"new_path": "pkg/api/handlers/create_cluster.go",
"diff": "@@ -39,7 +39,7 @@ func (d *createCluster) Handle(params operations.CreateClusterParams, principal\nName: *pPool.Name,\nSize: int(*pPool.Size),\nFlavor: *pPool.Flavo... | Go | Apache License 2.0 | sapcc/kubernikus | default to coreos image |
596,240 | 22.09.2017 19:35:10 | -7,200 | 677d798f359e35c87e43c023e187f0b231b207ad | updates nodepoolinfo while terminating the cluster | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/launch.go",
"new_path": "pkg/controller/launch.go",
"diff": "@@ -149,20 +149,6 @@ func (launchctl *LaunchControl) syncPool(kluster *v1.Kluster, pool *v1.NodePool)\nreturn fmt.Errorf(\"[%v] Couldn't list nodes for pool %v: %v\", kluster.Name, poo... | Go | Apache License 2.0 | sapcc/kubernikus | updates nodepoolinfo while terminating the cluster |
596,240 | 22.09.2017 20:17:59 | -7,200 | 537de8367d833544e1fe13b19607e9b0e06d08da | an integer that is 0 is ommited from the response. the hell? need to make them required so they turn into pointers. super cool, way to cast a in64 to *int64 by the way, golang | [
{
"change_type": "MODIFY",
"old_path": "pkg/api/handlers/util.go",
"new_path": "pkg/api/handlers/util.go",
"diff": "@@ -57,11 +57,11 @@ func clusterStatusNodePoolItemsFromTPR(k *v1.Kluster) []*models.ClusterStatusNod\nitems := make([]*models.ClusterStatusNodePoolsItems0, int64(len(k.Status.NodePools... | Go | Apache License 2.0 | sapcc/kubernikus | an integer that is 0 is ommited from the response. the hell? need to make them required so they turn into pointers. super cool, way to cast a in64 to *int64 by the way, golang |
596,240 | 22.09.2017 20:19:17 | -7,200 | b33b681b349d1a32bf5e90ed2f3881a247f12e46 | remove endless update loop. only update on actual change. remove double queuing. why does that even matter? | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/launch.go",
"new_path": "pkg/controller/launch.go",
"diff": "@@ -149,27 +149,11 @@ func (launchctl *LaunchControl) syncPool(kluster *v1.Kluster, pool *v1.NodePool)\nreturn fmt.Errorf(\"[%v] Couldn't list nodes for pool %v: %v\", kluster.Name, po... | Go | Apache License 2.0 | sapcc/kubernikus | remove endless update loop. only update on actual change. remove double queuing. why does that even matter? |
596,240 | 22.09.2017 20:47:02 | -7,200 | e893e770ad9993c932a7afa8ba2dd6d4ee8e43ed | need more updates but only if actually needed | [
{
"change_type": "MODIFY",
"old_path": "pkg/controller/launch.go",
"new_path": "pkg/controller/launch.go",
"diff": "@@ -178,6 +178,10 @@ func (launchctl *LaunchControl) syncPool(kluster *v1.Kluster, pool *v1.NodePool)\nglog.V(3).Infof(\"[%v] Pool %v: Starting/Running/Total: %v/%v/%v. All good. Doing... | Go | Apache License 2.0 | sapcc/kubernikus | need more updates but only if actually needed |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.