-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable weave network encryption for k8s 1.6 #5595
Conversation
Signed-off-by: Andrey Devyatkin <[email protected]>
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Trying to get CLA singed. Waiting for verification email from Linux Foundation |
@kampka I followed your commit where you updated k8s-1.7 yaml. Could you please take a look |
/assign @gambol99 |
/assign @kampka |
@Andrey9kin: GitHub didn't allow me to assign the following users: kampka. Note that only kubernetes members and repo collaborators can be assigned. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
For what its worth: /lgtm :) |
@kampka: changing LGTM is restricted to assignees, and only kubernetes/kops repo collaborators may be assigned issues. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/ok-to-test Thanks for the contribution! |
/area networking |
This makes sense; if the user doesn't enable weave encryption it should be a no-op, so I'd argue it's just confusing that it doesn't do anything on k8s 1.6. I would suggest upgrading to a newer version of k8s though @Andrey9kin - we are contemplating stopping support in kops for older versions of k8s, because technically k8s itself doesn't get security patches etc. I'm not sure if you're actually running an older version of k8s or if this is just for consistency? In any case, thank you for the PR @Andrey9kin /approve |
@justinsb we are still running 1.6.13 and planning to upgrade within in a couple of months (hopefully) but for a time being it would be great to avoid dealing with an in-house build of kops where this patch is included |
Didn't mean to remove approved! /approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Andrey9kin, chrisz100, justinsb, kampka The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
We forgot to do this in kubernetes#5595
Cherry pick of #5595 onto release-1.10
We forgot to do this in kubernetes#5595
No description provided.