New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KEP-1880 Multiple ServiceCIDR ( and IPAddress allocation) #116516
Conversation
6cb9a45
to
e32d378
Compare
Change-Id: Iff11c70f20bab3e55e4e569fb110ef25dd6dd97e
Change-Id: I2c53815136e0d985959420911339aacd62e01e78
Change-Id: I5b300373e21cc65f6ef171790ef81ee391f1c752 cidrallocator Change-Id: I13050a9d60360e555b75a13beaa9a923268ec4e8
Change-Id: I68a91815b3220a41e97667d8f8f4a3bdf5a91e8a
Change-Id: I7aaa978842fbe8d75383f8a3159ca4fce01ffdcb
Change-Id: I82075c4252d8734886f80dd68327fe73e2ed4ba5
Change-Id: I0eb8d39abe9b7b0ce6472ff426e9a62e7155aae1
Change-Id: I929e8fe0313ec2e0aef2b26a5138cd88bdfe8914
@aojea: The following tests failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
few more things to fix here @aojea |
I'm still LGTM and the tests are still not |
the jobs failing are unrelated to this PR, and not required |
/lgtm |
LGTM label has been added. Git tree hash: af57a22b8de921765055d485e79536dc5165487e
|
/milestone v1.29 Lgtm and approved before code freeze |
@@ -369,6 +369,16 @@ func buildControllerRoles() ([]rbacv1.ClusterRole, []rbacv1.ClusterRoleBinding) | |||
eventsRule(), | |||
}, | |||
}) | |||
addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this added an unconditional role / binding to default cluster policy
this should be wrapped in a feature gate check so we don't create these permissions until the feature is enabled
fixed in #121682
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks for fixing it
/kind feature
/kind api-change
After adding the new IPAddress object, this PR adds a new ServiceCIDR object that allows to dynamically configure the ranges used by Services in a cluster.
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:
Information for reviewers
The PR is split in independent commits
make update
Demo https://gist.github.com/aojea/c20eb117bf1c1214f8bba26c495be9c7
TODO
Dual stackness and IP families