Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kubernetes Dashboard v1.7.1 Refactor #1953

Merged
merged 2 commits into from
Dec 5, 2017

Conversation

chadswen
Copy link
Member

@chadswen chadswen commented Nov 9, 2017

This version required changing the previous access model for dashboard completely but it's a change for the better. Docs were updated.

Closes #1851 Closes #1896

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Nov 9, 2017
@chadswen
Copy link
Member Author

chadswen commented Nov 9, 2017

ci check this

@chadswen
Copy link
Member Author

Looks like CI is malfunctioning :/

This job is stuck, because you don't have any active runners online with any of these tags assigned to them: kubernetes  docker  
Go to Runners page

@chadswen
Copy link
Member Author

CI is unstuck now, and it passed.

kubectl: "{{bin_dir}}/kubectl"
resource: "{{ item }}"
state: absent
with_items: ['ClusterRoleBinding']
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this is not critical, but can you please write all lists more readable like:
with_items:
- ClusterRoleBinding
this way it's more readable when overlooking code, and more easy to add/remove more items if needed anywhere.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree that's better, it's usually my preferred syntax. I was just sticking with the convention I saw used elsewhere in this role for dns cleanup.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we are trying to change this in long term

@chadswen
Copy link
Member Author

Added ability to use custom cert secret and addressed with_items style usage
ci check this

This version required changing the previous access model for dashboard completely but it's a change for the better. Docs were updated.

* New login/auth options that use apiserver auth proxying by default
* Requires RBAC in `authorization_modes`
* Only serves over https
* No longer available at https://first_master:6443/ui until apiserver is updated with the https proxy URL:
* Can access from https://first_master:6443/api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/#!/login you will be prompted for credentials
* Or you can run 'kubectl proxy' from your local machine to access dashboard in your browser from: http://localhost:8001/api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/
* It is recommended to access dashboard from behind a gateway that enforces an authentication token, details and other access options here: https://github.com/kubernetes/dashboard/wiki/Accessing-Dashboard---1.7.X-and-above
@chadswen
Copy link
Member Author

Rebased

@chadswen
Copy link
Member Author

chadswen commented Dec 2, 2017

@rsmitty @mattymo Any chance to look at this?

@bradbeam bradbeam merged commit c2347db into kubernetes-sigs:master Dec 5, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants