-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update Calico and Canal to v3.12.0 #8618
Conversation
/assign @KashifSaadat |
c0c236c
to
56a71c2
Compare
/retest |
@KashifSaadat any chance you could take a look at this? I would like to cherry-pick it in 1.16 before the release. |
f6431a9
to
9d164b2
Compare
9d164b2
to
5b9f01c
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry for the delay in getting around to this! Can you also bring the typha deployment in-line with the v3.12.0 spec. Env vars, health probes, privileged securityContext etc.
No worries @KashifSaadat. I don't think there were any changes in the typha section. |
allErrs = append(allErrs, field.NotSupported(fldPath.Child("chainInsertMode"), chainInsertMode, []string{"insert", "append"})) | ||
if v.ChainInsertMode != "" { | ||
valid := []string{"insert", "append"} | ||
allErrs = append(allErrs, IsValidValue(fldPath, &v.ChainInsertMode, valid)...) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changing from fldPath.Child("chainInsertMode")
to fldPath
results in the validation message being less specific, i.e.:
# error populating cluster spec: spec.networking.canal: Unsupported value: "bad": supported values: "insert", "append"
Can you correct this for all cases here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for noticing this. I think it should be better now.
I misread my bad, it looks fine! 👍 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @hakman !
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: hakman, KashifSaadat The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Thanks for taking the time for this @KashifSaadat :) |
Cherry pick of #8618: Update Calico and Canal to v3.12.0
Calico 3.12 add support for autodetecting the iptables backend, quite useful for the people using Debian Buster, very soon the default base image in Kops.
https://docs.projectcalico.org/v3.12/release-notes/
This PR moves Calico and Canal to 3.12.0 and bumps the patch version for some of the previous releases.