-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ipv6 dual stack (Phase 1 - ALPHA) #73977
Conversation
/test pull-kubernetes-local-e2e |
Thanks! /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED Approval requirements bypassed by manually added approval. This pull-request has been approved by: dcbw, feiskyer, khenidak, thockin The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
1 similar comment
[APPROVALNOTIFIER] This PR is APPROVED Approval requirements bypassed by manually added approval. This pull-request has been approved by: dcbw, feiskyer, khenidak, thockin The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
return nil, false, fmt.Errorf("len of ClusterCIDRs==%v and they are not configured as dual stack (at least one from each IPFamily", len(clusterCIDRs)) | ||
} | ||
|
||
// failure: more than cidrs is not allowed even with dual stack |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
more than cidrs is -> more than two cidrs are
return nil, false, err | ||
} | ||
|
||
// failure: more than one cidr and dual stack is not enabled |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It seems the following code is almost the same as the check in core.go
Consider consolidating the code into a helper.
@khenidak Do you think that we can change the release notes for this PR? It would be awesome if we could state all user-facing changes within the |
@saschagrunert sure. Do you have a template i can follow? |
Thanks, the only template we have is in the pull request template:https://raw.githubusercontent.com/kubernetes/kubernetes/master/.github/PULL_REQUEST_TEMPLATE.md So it would be nice if we can add the documentation (KEP) as well. |
@khenidak Hi! I'm following up for sig-release re: @saschagrunert 's above request: Where do we stand on getting a release note with user-facing changes? |
ipv6 dual stack (Phase 1 - ALPHA) Kubernetes-commit: a33840e
What type of PR is this?
/kind api-change
/kind feature
Implements: kubernetes/enhancements#808
Included:
CC @lachie83 @thockin
What is in the box? (alpha status)
per node's cidr
.Route() interface
implementation for dualstack.PodSandBox
.Known Issues
24
will fail/24
(Future: add controls over v6 cidr size)v4,v6
reporting of IPs, users who mustv6,v4
as--cluster-cidr
ip-masq-agent
to perform masquerading correctly for ipv6. A standing PR has been created to support this feature Support for IPv6 kubernetes-sigs/ip-masq-agent#45