Created by Federico Gimenez and last modified
Get this branch:
bzr branch lp:~fgimenez/charms/trusty/kubernetes-master/allow-privileged
Only Federico Gimenez can upload to this branch. If you are Federico Gimenez please log in for upload directions.

Branch merges

Related bugs

Related blueprints

Branch information

Federico Gimenez

Recent revisions

15. By Federico Gimenez

Pass allow-privileged=true option to apiserver startup command

14. By Charles Butler

[r=lazypower] Matthew Bruzek 2015-10-09 Changing the flake8 rules to avoid conflict with verify-boilerplate k8s tool.
Matthew Bruzek 2015-10-08 Added .cache to clean make target, fixed failing tests.
Matthew Bruzek 2015-10-07 Fixing multiple test failures found in testing.
Matthew Bruzek 2015-10-07 Fixing import and indent issues found in testing.
Matthew Bruzek 2015-10-06 Fixing lint errors with merged code.
Matthew Bruzek 2015-10-05 Changes from the github version of kubernetes-master charm.

13. By Charles Butler

Refactor the update_rc_files method and supporting test to actually point to a non-existant path for testing purposes. The expected raise was not being reached in CI due to bundletester being run with sudo, and the code execution always checking for only ubuntu and root.

12. By Charles Butler

Refactors based on lint results, and updates unit_tests for new mock syntax

11. By Charles Butler

Added docker to installation dependency list for CWR

10. By Matt Bruzek

[lazypower] The upstream Kubernetes repository has changed from GoogleCloudPlatform to kubernetes.

9. By Matt Bruzek

Code review found double shebang in install.py removing it.

8. By Matt Bruzek

Vendoring the kubernetes-master charm to v1.0.0 release.

7. By Matt Bruzek

Removing binary bloat, and the install file should be a symlink.

6. By Matt Bruzek

Readme was out of date, updated with latest information.

Branch metadata

Branch format:
Branch format 7
Repository format:
Bazaar repository format 2a (needs bzr 1.16 or later)
This branch contains Public information 
Everyone can see this information.