Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable weave network encryption for k8s 1.6 #5595

Merged
merged 2 commits into from
Aug 14, 2018

Conversation

Andrey9kin
Copy link
Contributor

No description provided.

Signed-off-by: Andrey Devyatkin <andrey.a.devyatkin@gmail.com>
@k8s-ci-robot
Copy link
Contributor

Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA.

It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.


Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@k8s-ci-robot k8s-ci-robot added cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels Aug 10, 2018
@Andrey9kin
Copy link
Contributor Author

Trying to get CLA singed. Waiting for verification email from Linux Foundation

@Andrey9kin
Copy link
Contributor Author

@kampka I followed your commit where you updated k8s-1.7 yaml. Could you please take a look

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. and removed cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. labels Aug 10, 2018
@Andrey9kin
Copy link
Contributor Author

/assign @gambol99

@Andrey9kin
Copy link
Contributor Author

/assign @kampka

@k8s-ci-robot
Copy link
Contributor

@Andrey9kin: GitHub didn't allow me to assign the following users: kampka.

Note that only kubernetes members and repo collaborators can be assigned.
For more information please see the contributor guide

In response to this:

/assign @kampka

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@kampka
Copy link
Contributor

kampka commented Aug 10, 2018

For what its worth:

/lgtm

:)

@k8s-ci-robot
Copy link
Contributor

@kampka: changing LGTM is restricted to assignees, and only kubernetes/kops repo collaborators may be assigned issues.

In response to this:

For what its worth:

/lgtm

:)

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@chrisz100
Copy link
Contributor

/ok-to-test
/lgtm

Thanks for the contribution!

@k8s-ci-robot k8s-ci-robot added lgtm "Looks good to me", indicates that a PR is ready to be merged. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Aug 14, 2018
@chrisz100
Copy link
Contributor

/area networking

@justinsb
Copy link
Member

This makes sense; if the user doesn't enable weave encryption it should be a no-op, so I'd argue it's just confusing that it doesn't do anything on k8s 1.6.

I would suggest upgrading to a newer version of k8s though @Andrey9kin - we are contemplating stopping support in kops for older versions of k8s, because technically k8s itself doesn't get security patches etc. I'm not sure if you're actually running an older version of k8s or if this is just for consistency?

In any case, thank you for the PR @Andrey9kin

/approve
/lgtm

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 14, 2018
@justinsb justinsb added cherrypick-candidate and removed approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Aug 14, 2018
@Andrey9kin
Copy link
Contributor Author

@justinsb we are still running 1.6.13 and planning to upgrade within in a couple of months (hopefully) but for a time being it would be great to avoid dealing with an in-house build of kops where this patch is included

@justinsb
Copy link
Member

Didn't mean to remove approved!

/approve

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Andrey9kin, chrisz100, justinsb, kampka

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 14, 2018
@k8s-ci-robot k8s-ci-robot merged commit 15dc672 into kubernetes:master Aug 14, 2018
justinsb added a commit to justinsb/kops that referenced this pull request Aug 14, 2018
k8s-ci-robot added a commit that referenced this pull request Aug 15, 2018
justinsb added a commit to justinsb/kops that referenced this pull request Aug 15, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/networking cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

6 participants