ipv6 dual stack (Phase 1 - ALPHA)#73977
Conversation
|
@khenidak: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
/test pull-kubernetes-local-e2e |
|
Thanks! /lgtm |
|
[APPROVALNOTIFIER] This PR is APPROVED Approval requirements bypassed by manually added approval. This pull-request has been approved by: dcbw, feiskyer, khenidak, thockin The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
1 similar comment
|
[APPROVALNOTIFIER] This PR is APPROVED Approval requirements bypassed by manually added approval. This pull-request has been approved by: dcbw, feiskyer, khenidak, thockin The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
| return nil, false, fmt.Errorf("len of ClusterCIDRs==%v and they are not configured as dual stack (at least one from each IPFamily", len(clusterCIDRs)) | ||
| } | ||
|
|
||
| // failure: more than cidrs is not allowed even with dual stack |
There was a problem hiding this comment.
more than cidrs is -> more than two cidrs are
| return nil, false, err | ||
| } | ||
|
|
||
| // failure: more than one cidr and dual stack is not enabled |
There was a problem hiding this comment.
It seems the following code is almost the same as the check in core.go
Consider consolidating the code into a helper.
|
@khenidak Do you think that we can change the release notes for this PR? It would be awesome if we could state all user-facing changes within the |
|
@saschagrunert sure. Do you have a template i can follow? |
Thanks, the only template we have is in the pull request template:https://raw.githubusercontent.com/kubernetes/kubernetes/master/.github/PULL_REQUEST_TEMPLATE.md So it would be nice if we can add the documentation (KEP) as well. |
|
@khenidak Hi! I'm following up for sig-release re: @saschagrunert 's above request: Where do we stand on getting a release note with user-facing changes? |
What type of PR is this?
/kind api-change
/kind feature
Implements: kubernetes/enhancements#808
Included:
CC @lachie83 @thockin
What is in the box? (alpha status)
per node's cidr.Route() interfaceimplementation for dualstack.PodSandBox.Known Issues
24will fail/24(Future: add controls over v6 cidr size)v4,v6reporting of IPs, users who mustv6,v4as--cluster-cidrip-masq-agentto perform masquerading correctly for ipv6. A standing PR has been created to support this feature Support for IPv6 kubernetes-sigs/ip-masq-agent#45