-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
promote sourceRange into service spec #25826
Conversation
4a46a69
to
6427407
Compare
SessionAffinity ServiceAffinity `json:"sessionAffinity,omitempty"` | ||
|
||
// Optional: Supports "LoadBalancer" type on GCE and AWS | ||
// Once specified, it will create corresponding firewall rules for the loadbalancer |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The comment should be less implementation-specific.
Maybe
If specified and supported by the platform, this will restrict traffic through the cloud-provider load-balancer will be restricted to the specified client IPs. This field will be ignored if the cloud-provider does not support the feature."
We found a Contributor License Agreement for you (the sender of this pull request) and all commit authors, but as best as we can tell these commits were authored by someone else. If that's the case, please add them to this pull request and have them confirm that they're okay with these commits being contributed to Google. If we're mistaken and you did author these commits, just reply here to confirm. |
CLAs look good, thanks! |
|
||
_, ok := obj.Annotations[service.AnnotationLoadBalancerSourceRangesKey] | ||
if ok && len(obj.Spec.LoadBalancerSourceRanges) > 0 { | ||
msg := fmt.Sprintf(`You have specified both LoadBalancerSourceRanges field and annotation [service.beta.kubernetes.io/load-balancer-source-ranges]. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if we're going to do this sort of message, why not just print for the annotation, regardless of whether they have both? You're using a deprecated annotation, please use the field instead.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed.
@k8s-bot test this: github issue #IGNORE I have no idea which flake it is - the logs are utterly useless |
@freehan test fail in |
@k8s-bot test this issue: #IGNORE It looks to me that all unit/integration tests passed. Not sure why it complains |
Needs rebase :( |
@k8s-bot test this [submit-queue is verifying that this PR is safe to merge] |
GCE e2e build/test passed for commit 466bc38. |
Automatic merge from submit-queue |
Automatic merge from submit-queue promote sourceRange into service spec @thockin one more for your pile I will add docs at `http://releases.k8s.io/HEAD/docs/user-guide/services-firewalls.md` cc: @justinsb Fixes: kubernetes#20392
@thockin one more for your pile
I will add docs at
http://releases.k8s.io/HEAD/docs/user-guide/services-firewalls.md
cc: @justinsb
Fixes: #20392