Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stopy proxying etcd (localhost:4001) on https:/$MASTER_IP/etcd. #666

Merged
merged 1 commit into from
Jul 28, 2014

Conversation

erictune
Copy link
Member

This is a small first step towards implementing the changes discussed in #443.
It removes the proxying of /etcd by the nginx proxy. This is necessary in order to cleanly remove Basic Auth from the system entirely, in order to replace it with token-based auth.

I ran e2e locally, and basic.sh failed while guestbook.sh passed.
The fact that the more complex test passed makes me think the failure was due to flakiness. So, I'm making the PR so travis can run e2e again.

@dchen1107
Copy link
Member

Issue #603 is filed for flakiness of basic in e2e.

@lavalamp
Copy link
Member

LGTM but @brendanburns should verify.

@erictune
Copy link
Member Author

Does it notify Brendan if you mention @brendanburns or do you have to mention @brendandburns (note the extra d in the middle). That second username is the one that has been commenting on stuff, I think.

@smarterclayton
Copy link
Contributor

He's got both :)

@brendandburns
Copy link
Contributor

yeah @brendanburns is my personal @brendandburns is my work.

This is fine. I exposed it for ease of debugging mostly, fine to turn it off for security.

--brendan

brendandburns added a commit that referenced this pull request Jul 28, 2014
Stopy proxying etcd (localhost:4001) on https:/$MASTER_IP/etcd.
@brendandburns brendandburns merged commit 3d03c85 into kubernetes:master Jul 28, 2014
@erictune erictune deleted the remove_etcd_proxying branch October 8, 2014 22:08
vishh pushed a commit to vishh/kubernetes that referenced this pull request Apr 6, 2016
The previous approach was brittle from within a container and was inconsistend.

Fixes kubernetes#666
mqliang pushed a commit to mqliang/kubernetes that referenced this pull request Dec 8, 2016
…aster (kubernetes#666)

* Fixed kubernetes#665 : update checking if control machine is one of master

* change default value of mapping_domain_to_ip to be true
mqliang pushed a commit to mqliang/kubernetes that referenced this pull request Mar 3, 2017
…aster (kubernetes#666)

* Fixed kubernetes#665 : update checking if control machine is one of master

* change default value of mapping_domain_to_ip to be true
seans3 pushed a commit to seans3/kubernetes that referenced this pull request Apr 10, 2019
Propse KEP for Group Managed Service Accounts in Windows
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants