-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable management of access to public/private API endpoints #1149
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Only a change to the site?
It's a WIP, so I just wanted to get the PR started and add commits as I
go. I'll let you know when it's ready to review.
…On Fri, Aug 16, 2019 at 8:11 AM Martina Iglesias ***@***.***> wrote:
***@***.**** commented on this pull request.
Only a change to the site?
—
You are receiving this because you were assigned.
Reply to this email directly, view it on GitHub
<#1149>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AFRGU36WWYPPKBQXQS6PHY3QE2YRXANCNFSM4IL7IEBQ>
.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
documentation is easy to understand 👍 i would want to know what the default is, though.
Edit: or is the default going to stay as is (Public=true, Private=false)?
b4d0eea
to
bb1aca5
Compare
I think we will need document considerations around using private-only. E.g. it should be doable if you are managing the VPC externally. The main challenge is that aside from AWS API calls we do need to make calls to Kubernetes API, e.g. to update |
I opened #1230. |
I'll remove that as an option until we can address the kubernetes API calls. |
I'll remove that as an option until we can address the kubernetes API calls.
As it stands currently, the vpc endpoint updates happen as a separate task after the other tasks have completed since it is an AWS API call and not a CloudFormation configuration item. That means that a cluster creation wouldn't be affected by this issue but it would then subsequently block access to the "writekubeconfig" functionality (as well as any other calls that rely on K8s API access to function properly). |
Just wanted to stop by and say awesome work @D3nn and others involved in making this happen! Been wanting this feature for a while and glad to see some awesome people are pushing it forward. |
3ae9ad2
to
d508d86
Compare
1. Removed True/False in favor of Enabled()/Disabled 1. Updated api.IsSet to take interfaces and expanded it's use
1. Added 'WithoutArg' to runner to allow removing region, which interfered with use of the configfile for creating clusters 1. Reset values of create/delete/updateCluster to make output more readable 1. Changed integration test EndpointAccessCases to EndpointAccessCase to reflect how it was being used. 1. Refactored tests to make deleteCluster a separate test case
1. No need to export EndpointAccessCase structs in tests (fixed) 1. Revert IsSet changes in favor of foo != nil 1. Rewording messages to not use Cluster API since it is possibly confusing 1. Renamed utils subcommand to update-cluster-endpoints 1. Refactoring in vpc_test.go 1. Renamed some functions to match how others are named 1. Changed the way `eksctl utils update-cluster-endpoints` shows what will be upated 1. Fixed issue that would cause tasks to not run in certain cases 1. Fixed example command in 06-vpc-networking.md
1. Using -test.v -ginkgo.v rather than printing test headers manually 1. Updated testcase descriptions to better reflect the test.
1. Change public/private message output to be consitent throughout all messages 1. Compare cluster endpoints using json.Marshal instead of json.MarshalIndent
- values not explicitly passed will get current values - moved validation checks further down to not cut off display of new values
- remove `--approve` from sample (to prevent accidental execution) - remove non-value example to prevent confusion
253e213
to
dc11d25
Compare
`update-cluster-endpoints` command changes API endpoint settings (eksctl-io#1149) But this command doesn't read config file. So when we use `-f` option, `eksctl` doesn't change settings.
`update-cluster-endpoints` command changes API endpoint settings (eksctl-io#1149) But this command doesn't read config file. So when we use `-f` option, `eksctl` doesn't change settings.
`update-cluster-endpoints` command changes API endpoint settings (eksctl-io#1149) But this command doesn't read config file. So when we use `-f` option, `eksctl` doesn't change settings.
`update-cluster-endpoints` command changes API endpoint settings (eksctl-io#1149) But this command doesn't read config file. So when we use `-f` option, `eksctl` doesn't change settings.
`update-cluster-endpoints` command changes API endpoint settings (eksctl-io#1149) But this command doesn't read config file. So when we use `-f` option, `eksctl` doesn't change settings.
Description
Enable the ability to allow/deny access to the API server endpoint publicly (from the Internet) or privately (from Worker nodes, Direct Connect networks, VPN networks, etc).
Resolve #649
Checklist
make build
)make test
)README.md
, andexamples
directory)