Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[release-1.24] Bump k3s version #3899

Merged
merged 7 commits into from Feb 11, 2023

Conversation

brandond
Copy link
Contributor

Proposed Changes

Bump K3s version for v1.24

Types of Changes

  • version bump
  • new feature
  • bugfix

Verification

See linked issues

Linked Issues

User-Facing Change

Fixed an issue where leader-elected controllers for managed etcd did not run on etcd-only nodes
RKE2 now functions properly when the cluster CA certificates are signed by an existing root or intermediate CA. You can find a sample script for generating such certificates before RKE2 starts in the K3s repo at [contrib/util/certs.sh](https://github.com/k3s-io/k3s/blob/master/contrib/util/certs.sh).
RKE2 now supports `kubeadm` style join tokens. `rke2 token create` now creates join token secrets, optionally with a limited TTL.
RKE2 agents joined with an expired or deleted token stay in the cluster using existing client certificates via the NodeAuthorization admission plugin, unless their Node object is deleted from the cluster.
ServiceLB now honors the Service's ExternalTrafficPolicy. When set to Local, the LoadBalancer will only advertise addresses of Nodes with a Pod for the Service, and will not forward traffic to other cluster members. (ServiceLB is still disabled by default)

Updates k3s: k3s-io/k3s@739be58...77dbe64

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
@brandond brandond requested a review from a team as a code owner February 11, 2023 00:41
@brandond brandond changed the title [release-1.24] Bump k3s [release-1.24] Bump k3s version Feb 11, 2023
@codecov-commenter
Copy link

Codecov Report

Base: 18.53% // Head: 17.89% // Decreases project coverage by -0.64% ⚠️

Coverage data is based on head (3c2cfed) compared to base (d802eb0).
Patch coverage: 12.50% of modified lines in pull request are covered.

Additional details and impacted files
@@               Coverage Diff                @@
##           release-1.24    #3899      +/-   ##
================================================
- Coverage         18.53%   17.89%   -0.64%     
================================================
  Files                26       27       +1     
  Lines              2331     2397      +66     
================================================
- Hits                432      429       -3     
- Misses             1861     1932      +71     
+ Partials             38       36       -2     
Flag Coverage Δ
unittests 17.89% <12.50%> (-0.64%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

Impacted Files Coverage Δ
pkg/cli/cmds/agent.go 0.00% <ø> (ø)
pkg/cli/cmds/cert.go 0.00% <0.00%> (ø)
pkg/cli/cmds/etcd_snapshot.go 0.00% <ø> (ø)
pkg/cli/cmds/secrets_encrypt.go 0.00% <0.00%> (ø)
pkg/cli/cmds/server.go 0.00% <ø> (ø)
pkg/cli/cmds/token.go 0.00% <0.00%> (ø)
pkg/rke2/clusterrole_bootstrap.go 0.00% <0.00%> (ø)
pkg/rke2/rke2.go 1.25% <0.00%> (ø)
pkg/rke2/spw.go 0.00% <0.00%> (ø)
pkg/cli/cmds/k3sopts.go 40.77% <45.45%> (-11.55%) ⬇️
... and 1 more

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

☔ View full report at Codecov.
📢 Do you have feedback about the report comment? Let us know in this issue.

@brandond brandond merged commit 4459f0a into rancher:release-1.24 Feb 11, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants