Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for using hostPort when using kube-router #9689

Merged
merged 3 commits into from
Aug 14, 2020

Conversation

andsens
Copy link
Contributor

@andsens andsens commented Aug 5, 2020

Enable portmap plugin in the kube-router cni config to support hostPort.
Similar to #7295 (flannel), #4063 (canal), and #3206 (calico).

@k8s-ci-robot
Copy link
Contributor

Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA.

It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.


Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. label Aug 5, 2020
@k8s-ci-robot
Copy link
Contributor

Welcome @andsens!

It looks like this is your first PR to kubernetes/kops 🎉. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.

You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.

You can also check if kubernetes/kops has its own contribution guidelines.

You may want to refer to our testing guide if you run into trouble with your tests not passing.

If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!

Thank you, and welcome to Kubernetes. 😃

@k8s-ci-robot
Copy link
Contributor

Hi @andsens. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Aug 5, 2020
@k8s-ci-robot k8s-ci-robot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Aug 5, 2020
@andsens
Copy link
Contributor Author

andsens commented Aug 5, 2020

/check-cla

@andsens
Copy link
Contributor Author

andsens commented Aug 5, 2020

/assign @johngmyers

@johngmyers
Copy link
Member

@andsens Please fix the CLA problem. You might need to ensure your email address is associated with your GitHub account.

@andsens
Copy link
Contributor Author

andsens commented Aug 7, 2020

@johngmyers I am signed up, somethings buggy somewhere. We signed up as an org and my google account is connected as an employee account. It doesn't seem that my github account will connect though.
When I hit "Sign up as an employee" I get this screen:
Annotation 2020-08-07 083019
which leads me to this screen
Annotation 2020-08-07 083018

And the org is definitely signed up:
Annotation 2020-08-07 083017

Any pointers?

@rifelpet
Copy link
Member

rifelpet commented Aug 7, 2020

@andsens is your github email and the author email used in the git commits associated with the org? You may need to use the helpdesk mentioned in the first bot comment above

  • If you have done the above and are still having issues with the CLA being reported as unsigned, please log a ticket with the Linux Foundation Helpdesk: https://support.linuxfoundation.org/

@andsens
Copy link
Contributor Author

andsens commented Aug 10, 2020

/check-cla

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. and removed cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. labels Aug 10, 2020
@johngmyers
Copy link
Member

/ok-to-test

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Aug 10, 2020
@andsens
Copy link
Contributor Author

andsens commented Aug 10, 2020

@rifelpet @johngmyers, fixed. My account at LF was just an administrator and not a contributor.

@rifelpet
Copy link
Member

The GitHub Actions and Travis failures are because you need to run make kops-gobindata. The e2e failure is just a flake.

@k8s-ci-robot k8s-ci-robot added size/S Denotes a PR that changes 10-29 lines, ignoring generated files. and removed size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Aug 11, 2020
@andsens
Copy link
Contributor Author

andsens commented Aug 11, 2020

@rifelpet fixed

@hakman
Copy link
Member

hakman commented Aug 11, 2020

@andsens a few more things:

  1. Bump the version here also:
    key := "networking.kuberouter"
    versions := map[string]string{
    "k8s-1.6": "0.3.1-kops.4",
    "k8s-1.12": "1.0.0-kops.2",
    }
  2. Add --bgp-graceful-restart=true to the list of args, same as in here.

Thanks!

@andsens
Copy link
Contributor Author

andsens commented Aug 11, 2020

@hakman I don't understand what that has to do with enabling an unrelated plugin? I'd rather not take ownership of code I don't understand by showing up in git-blame.

@hakman
Copy link
Member

hakman commented Aug 11, 2020

The parameter is part of the hostport example. In any case, will add it with the next upgrade to 1.0.1 someday.
Can you do the version bump?

@hakman
Copy link
Member

hakman commented Aug 13, 2020

Hey @andsens. Just wanted to check if you are ok with the suggested change to bump the manifest version. It is required for the updates to work properly. Thanks.

key := "networking.kuberouter"
versions := map[string]string{
"k8s-1.6": "0.3.1-kops.4",
"k8s-1.12": "1.0.0-kops.2",
}

@andsens
Copy link
Contributor Author

andsens commented Aug 13, 2020

@hakman argh, apologies. I saw your mail this morning and planned to do the bump and then immediately forgot all about it.
I will add the change tomorrow and update the PR.

@hakman
Copy link
Member

hakman commented Aug 13, 2020

Sound good. Thanks @andsens!

@andsens
Copy link
Contributor Author

andsens commented Aug 14, 2020

@hakman done. I enabled BGP graceful restart as well. Had to read up on it to figure out what it does first though, pretty neat :-)

@hakman
Copy link
Member

hakman commented Aug 14, 2020

Hehe. Really nice @andsens.
Feel free to open another PR for upgrading kube-router to v1.0.1, if you think that's a good idea.
/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Aug 14, 2020
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: andsens, hakman

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 14, 2020
@k8s-ci-robot k8s-ci-robot merged commit e2e5b00 into kubernetes:master Aug 14, 2020
@k8s-ci-robot k8s-ci-robot added this to the v1.19 milestone Aug 14, 2020
k8s-ci-robot added a commit that referenced this pull request Aug 26, 2020
…9818-upstream-release-1.18

Automated cherry pick of #9689: Support for using hostPort when using kube-router #9818: Update kube-router to v1.0.1
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/addons cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants