Skip to content

Instantly share code, notes, and snippets.

View ncdc's full-sized avatar

Andy Goldstein ncdc

View GitHub Profile
@ncdc
ncdc / gist:863c7b00abfa305574713e08f66bcd80
Created July 23, 2020 17:56
Packer stuck trying to connect to Photon VM after reboot
vmware-iso: TASK [setup : Reboot after distro sync] ****************************************
2020/07/23 13:52:26 packer-provisioner-ansible plugin: SSH proxy: accepted connection
2020/07/23 13:52:26 packer-provisioner-ansible plugin: authentication attempt from 127.0.0.1:51529 to 127.0.0.1:51337 as goldsteina using none
2020/07/23 13:52:26 packer-provisioner-ansible plugin: authentication attempt from 127.0.0.1:51529 to 127.0.0.1:51337 as goldsteina using publickey
2020/07/23 13:52:26 packer-provisioner-ansible plugin: authentication attempt from 127.0.0.1:51529 to 127.0.0.1:51337 as goldsteina using publickey
2020/07/23 13:52:26 packer-provisioner-ansible plugin: rejecting auth-agent-req@openssh.com request
2020/07/23 13:52:26 packer-provisioner-ansible plugin: new env request: LANG=en_US.UTF-8
2020/07/23 13:52:26 packer-provisioner-ansible plugin: new env request: LC_TERMINAL=iTerm2
2020/07/23 13:52:26 packer-provisioner-ansible plugin: new env request: LC_TERMINAL_VERSION=3.3.12
2020/07/23 13:52:26 pac
/*
Copyright 2020 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
@ncdc
ncdc / test1.yaml
Created January 31, 2020 21:43
cluster api v1alpha3 capa test
apiVersion: cluster.x-k8s.io/v1alpha3
kind: Cluster
metadata:
name: test1
spec:
clusterNetwork:
pods:
cidrBlocks: ["192.168.0.0/16"]
infrastructureRef:
apiVersion: infrastructure.cluster.x-k8s.io/v1alpha3
diff --git a/config/webhook/kustomization.yaml b/config/webhook/kustomization.yaml
index 9cf2613..1dcdbda 100644
--- a/config/webhook/kustomization.yaml
+++ b/config/webhook/kustomization.yaml
@@ -4,3 +4,6 @@ resources:
configurations:
- kustomizeconfig.yaml
+
+patchesStrategicMerge:
diff --git a/controlplane/kubeadm/controllers/kubeadm_control_plane_controller.go b/controlplane/kubeadm/controllers/kubeadm_control_plane_controller.go
index 8961c49e9..186eb87b7 100644
--- a/controlplane/kubeadm/controllers/kubeadm_control_plane_controller.go
+++ b/controlplane/kubeadm/controllers/kubeadm_control_plane_controller.go
@@ -29,6 +29,7 @@ import (
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"k8s.io/apimachinery/pkg/types"
utilerrors "k8s.io/apimachinery/pkg/util/errors"
+ "k8s.io/apiserver/pkg/storage/names"
"k8s.io/client-go/tools/record"
diff --git a/pkg/envtest/crd.go b/pkg/envtest/crd.go
index 39b24452..2fd1e4e3 100644
--- a/pkg/envtest/crd.go
+++ b/pkg/envtest/crd.go
@@ -25,7 +25,7 @@ import (
"path/filepath"
"time"
- apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
+ apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
@ncdc
ncdc / foo.diff
Last active December 19, 2019 16:03
diff --git a/config/crd/patches/cainjection_in_clusters.yaml b/config/crd/patches/cainjection_in_clusters.yaml
index 81bb1e1bf..98bc35743 100644
--- a/config/crd/patches/cainjection_in_clusters.yaml
+++ b/config/crd/patches/cainjection_in_clusters.yaml
@@ -1,6 +1,6 @@
# The following patch adds a directive for certmanager to inject CA into the CRD
# CRD conversion requires k8s 1.13 or later.
-apiVersion: apiextensions.k8s.io/v1beta1
+apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
@ncdc
ncdc / Tiltfile
Created December 11, 2019 17:47
Cluster API Tiltfile WIP
# -*- mode: Python -*-
settings = read_json('tilt-settings.json', default={})
allow_k8s_contexts(settings.get('allowed_contexts'))
default_registry(settings.get('default_registry'))
providers = {
'core': {
diff --git a/Tiltfile b/Tiltfile
index 47ebab4..5aeee6e 100644
--- a/Tiltfile
+++ b/Tiltfile
@@ -1,6 +1,6 @@
# -*- mode: Python -*-
-allow_k8s_contexts('kubernetes-admin@kubernetes')
+allow_k8s_contexts(['kubernetes-admin@kubernetes', 'kind-kind'])
=== RUN TestReconcile
I0705 12:35:38.277264 20917 reflector.go:123] Starting reflector *v1alpha2.MachineSet (10h0m0s) from sigs.k8s.io/controller-runtime/pkg/cache/internal/informers_map.go:126
I0705 12:35:38.277441 20917 reflector.go:161] Listing and watching *v1alpha2.MachineSet from sigs.k8s.io/controller-runtime/pkg/cache/internal/informers_map.go:126
I0705 12:35:38.277264 20917 reflector.go:123] Starting reflector *v1alpha2.MachineDeployment (10h0m0s) from sigs.k8s.io/controller-runtime/pkg/cache/internal/informers_map.go:126
I0705 12:35:38.277628 20917 reflector.go:161] Listing and watching *v1alpha2.MachineDeployment from sigs.k8s.io/controller-runtime/pkg/cache/internal/informers_map.go:126
I0705 12:35:38.379758 20917 shared_informer.go:123] caches populated
I0705 12:35:38.484166 20917 shared_informer.go:123] caches populated
I0705 12:35:38.484419 20917 machinedeployment_controller.go:231] Deployment "foo" in namespace "default" doesn't specify "cluster.sigs.k8s.io/cluster-name" label,