New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use CNI v0.6.x in Kubernetes v1.9.0 #49480
Comments
cc @bboreham |
CNI v0.6 should be out this week There are a bunch of small fixes; also this is the first version that includes the portmap plugin. |
@bboreham So you're advocating for using v0.6? I just want to be sure we track all the action items correctly and make sure we test everything properly in time. What we (at least) need to do:
More action items? |
/cc |
Is there a changelog we should be following? |
No changelog file but releases are visible in https://github.com/containernetworking/cni/releases and https://github.com/containernetworking/plugins/releases and announced on the CNI mailing list and Kubernetes sig-network mailing list. |
CNI v0.6.0 is out https://github.com/containernetworking/cni/releases/tag/v0.6.0 🎉, but it's too late in the cycle for us to update. @dixudx is this something you'd want to work on? |
@luxas I would like to work on this. Thanks. Will send out a PR later. |
Shouldn't we ask @kubernetes/sig-network-misc which CNI version we should be supporting with 1.8? And try to make the CNI version consistent across all of the install tools? |
@roberthbailey +1. Waiting for the reply. |
@dixudx: Reiterating the mentions to trigger a notification: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@roberthbailey I'm not dictating, here I'm asking what version is targeted 😄. |
Agreed, time too late now. v1.9 is preferred. |
/area ipv6 |
@feiskyer I am part of a team adding IPv6 support to k8s. CNI 0.6.0 is needed for assigning IPv6 addresses to pods. Several users are interested in k8s IPv6 support. It would be very helpful to get the cni bump into 1.8. However, I respect your decision if you choose to wait until 1.9. |
@danehans Is IPv6 feature a blocker of 1.8? /cc @kubernetes/sig-network-misc |
@feiskyer I'm a relatively new contributor. Can you help me understand or point me to documentation that explains what qualifies a feature as a blocker for a release? IPv6 is a feature several users are waiting for us to release. |
/assign @thockin |
@enisoc Sounds fine to me - who is making that decision? |
@caseydavenport which decision? |
@chrislovecnm this one ^ |
@luxas @caseydavenport now that a 1.9 branch has been cut, can CNI get bumped? |
@danehans Already bumped in #51250 (merged). Only get kubernetes/release#446 left, should be shipped ASAP, since v1.9 is coming out. |
@dixudx I have added IPv6 support details to the 1.9 release notes. |
@dixudx what needs to be done to close this issue? The 1.9 burndown kubernetes/sig-release#38 (comment) is highlighting this issue:
|
[MILESTONENOTIFIER] Milestone Issue Current Note: This issue is marked as Example update:
Issue Labels
|
@danehans Can be closed when kubernetes/release#486 get merged. PTAL. |
I think all CRI runtimes has been upgraded, ref: kubernetes-retired/frakti#270 |
@dixudx kubernetes/release#486 has ben merged. Can we close this issue? |
I think so - @enisoc do you agree? |
Can we close this now with kubernetes/release#486 merged? I think so |
@pipejakob is still working on back-filling packages for old k8s versions to prevent them from picking up kubernetes-cni 0.6.0. I think we can close this once that's done. |
@pipejakob reported last night that the back-fill is done and staged in |
Thanks for remembering to update here, @enisoc. All of the backfill builds are now promoted to stable (with easy rollback instructions in case anything goes wrong). Should be good to go today with the 1.9 debs/rpms after the release is cut. |
Thanks @pipejakob for helping with this! |
Is this a BUG REPORT or FEATURE REQUEST?:
/kind feature
It's time to decide which CNI version to use for v1.8.
We should do early in the cycle to catch regressions in the CNI <-> k8s integration.
We don't want the thing that happened in v1.6 to occur again, so we need to be very careful.
Currently, we're using v0.5.1 and consuming tarballs via a sha pushed by this
Makefile
: https://github.com/kubernetes/kubernetes/blob/master/build/cni/MakefileWe did this earlier because CNI didn't provide binary artifacts for all platform that kubernetes supports.
Since v0.5.2, they do, so we can get rid of
build/cni/Makefile
🎉Also, we don't want to consume a strange SHA as the version indicator, instead we want to use a version number and possibly a SHA for verification.
I guess it would make sense to bump CNI to v0.5.2 for the v1.8 cycle.
Agree/disagree? It's not clear to me when v0.6.0 will be released, but the rc has been out for some time already...
cc @kubernetes/sig-network-feature-requests @ixdy @freehan @kubernetes/sig-cluster-lifecycle-feature-requests @dcbw
The text was updated successfully, but these errors were encountered: