--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-network" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-ne...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-network/CABhP%3Dta-22c7wajv5dwLtvorZBsJ%2BSxNDpYibfkTd5d4z0APSw%40mail.gmail.com.
thx antonio. yeah shane brought this up as well this wk at kpng so ... we figured wed start fixing our backlog of skiplists.what about for services ? (i.e. recent issue from dan https://github.com/kubernetes/kubernetes/issues/114210 )1) Im wondering if we should ad service conformance to the mix ? i feel like its tricky to think about the different semantics of services and when they work wrt other services, what mutations are possible , internalTrafficPolicy, externalTrafficPolicy, etc ?
2) As of now... are we missing some coverege for service mutation (i know we have some good tests for some of the conversions, in https://github.com/kubernetes/kubernetes/blob/master/test/e2e/network/service.go .... but do we have all of em) ? i always get confused with things like - can i convert nodeports to clusterips (if so what happens to the nodeport)/ and back ? ... actually sometimes i wonder wether in k8s 2.0 they should just say "ok, thats it... services are immutable from now on:)"
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-network/dcefa0c9-fbda-4175-abc2-7aa05fd1fd3an%40googlegroups.com.
"[sig-network] Services should be able to switch session affinity for service with type clusterIP [LinuxOnly] [Conformance]",
"[sig-network] Services should be able to change the type from ExternalName to ClusterIP [Conformance]",
"[sig-network] Services should be able to change the type from NodePort to ExternalName [Conformance]"
should function for client IP based session affinity: http [LinuxOnly]
should function for client IP based session affinity: udp [LinuxOnly]
should function for endpoint-Service: http
should function for endpoint-Service: udp
should function for node-Service: http
should function for node-Service: udp
should function for pod-Service: http
should function for pod-Service: udp
should implement service.kubernetes.io/headless
should implement service.kubernetes.io/service-proxy-name
should preserve source pod IP for traffic thru service cluster IP [LinuxOnly]
should prevent Ingress creation if more than 1 IngressClass marked as default [Serial]
should prevent NodePort collisions
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-network/e34a2ec5-7700-42be-ac11-5a209e72de35n%40googlegroups.com.
Candidates for promotion are:
ProxyTerminationEndpoints: GA in 1.28 https://github.com/kubernetes/kubernetes/pull/117718
Promote Services with multiple protocols: security issue https://github.com/kubernetes/kubernetes/pull/116333
Connectivity for terminating pods (without services): pod lifecycle issues https://github.com/kubernetes/kubernetes/pull/116232
ServiceInternalTrafficPolicy: GA in 1.27 https://github.com/kubernetes/kubernetes/pull/117864