)]}'
{"doc/source/user/index.rst":[{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"21f30b7ae679191137afb57a6e1c7550373d5a74","unresolved":false,"context_lines":[{"line_number":2598,"context_line":"  Tag of the calico containers used to provision the calico node."},{"line_number":2599,"context_line":"  Ussuri default: v1.13.1"},{"line_number":2600,"context_line":""},{"line_number":2601,"context_line":"_`calico_kube_controllers_tag`"},{"line_number":2602,"context_line":"  Tag of the kube_controllers used to provision the calico node"},{"line_number":2603,"context_line":""},{"line_number":2604,"context_line":"Besides, the Calico network driver needs kube_tag with v1.9.3 or later, because"}],"source_content_type":"text/x-rst","patch_set":15,"id":"df33271e_24e50fdd","line":2601,"range":{"start_line":2601,"start_character":2,"end_line":2601,"end_character":29},"updated":"2020-03-30 11:34:10.000000000","message":"btw this is not used anywhere, we should remove this.","commit_id":"a4153af02fc3c4a98abf535a71d4b621143720b6"},{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"c41b038b1d14f1dc458f200def649e4e004d304a","unresolved":false,"context_lines":[{"line_number":2590,"context_line":"_`calico_ipv4pool`"},{"line_number":2591,"context_line":"  IPv4 network in CIDR format which is the IP pool, from which Pod IPs will"},{"line_number":2592,"context_line":"  be chosen. If not specified, the default is 10.100.0.0/16."},{"line_number":2593,"context_line":"  Default: 10.100.0.0/16"},{"line_number":2594,"context_line":""},{"line_number":2595,"context_line":"_`calico_ipv4pool_ipip`"},{"line_number":2596,"context_line":"  IPIP Mode to use for the IPv4 POOL created at start up."}],"source_content_type":"text/x-rst","patch_set":17,"id":"df33271e_c4c999ac","line":2593,"range":{"start_line":2593,"start_character":2,"end_line":2593,"end_character":24},"updated":"2020-03-31 20:40:23.000000000","message":"This is Ussuri default, Train default was 192.168....","commit_id":"0a1f7dda1964bed6774ed5b9ced1cd38bd1afc88"},{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"c41b038b1d14f1dc458f200def649e4e004d304a","unresolved":false,"context_lines":[{"line_number":2598,"context_line":""},{"line_number":2599,"context_line":"_`calico_tag`"},{"line_number":2600,"context_line":"  Tag of the calico containers used to provision the calico node"},{"line_number":2601,"context_line":"  Ussuri default: v1.13.1"},{"line_number":2602,"context_line":""},{"line_number":2603,"context_line":""},{"line_number":2604,"context_line":"Besides, the Calico network driver needs kube_tag with v1.9.3 or later, because"}],"source_content_type":"text/x-rst","patch_set":17,"id":"df33271e_64d88d7a","line":2601,"range":{"start_line":2601,"start_character":2,"end_line":2601,"end_character":25},"updated":"2020-03-31 20:40:23.000000000","message":"We should also add the Stein/Train defaults here.","commit_id":"0a1f7dda1964bed6774ed5b9ced1cd38bd1afc88"},{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"b2b69bd81862581db64d668bf0630d6e97c33167","unresolved":false,"context_lines":[{"line_number":2600,"context_line":""},{"line_number":2601,"context_line":"_`calico_tag`"},{"line_number":2602,"context_line":"  Tag of the calico containers used to provision the calico node"},{"line_number":2603,"context_line":"  Stien default: v2.6.7"},{"line_number":2604,"context_line":"  Train default: v3.3.6"},{"line_number":2605,"context_line":"  Ussuri default: v3.13.1"},{"line_number":2606,"context_line":""}],"source_content_type":"text/x-rst","patch_set":18,"id":"df33271e_07238357","line":2603,"range":{"start_line":2603,"start_character":2,"end_line":2603,"end_character":7},"updated":"2020-03-31 21:29:16.000000000","message":"Typo","commit_id":"8e8b13ba85386cc752956bd09e021d72a510e0c8"}],"magnum/drivers/common/templates/kubernetes/fragments/calico-service.sh":[{"author":{"_account_id":20498,"name":"Spyros Trigazis","email":"spyridon.trigazis@cern.ch","username":"strigazi"},"change_message_id":"8c708773a99bd1483da56af84166c697880a4bda","unresolved":false,"context_lines":[{"line_number":17,"context_line":"apiVersion: rbac.authorization.k8s.io/v1"},{"line_number":18,"context_line":"kind: RoleBinding"},{"line_number":19,"context_line":"metadata:"},{"line_number":20,"context_line":"  name: magnum:podsecuritypolicy:calico"},{"line_number":21,"context_line":"  namespace: kube-system"},{"line_number":22,"context_line":"  labels:"},{"line_number":23,"context_line":"    addonmanager.kubernetes.io/mode: Reconcile"}],"source_content_type":"text/x-sh","patch_set":6,"id":"3fa7e38b_73f9231a","side":"PARENT","line":20,"updated":"2020-02-11 08:13:27.000000000","message":"why is this deleted?","commit_id":"16ea8b6397f2bafc01e6d4ec474c1ae97f15a484"},{"author":{"_account_id":6484,"name":"Feilong Wang","email":"hustemb@gmail.com","username":"flwang"},"change_message_id":"111816566ded1048c656d763126151a93c92c3aa","unresolved":false,"context_lines":[{"line_number":17,"context_line":"apiVersion: rbac.authorization.k8s.io/v1"},{"line_number":18,"context_line":"kind: RoleBinding"},{"line_number":19,"context_line":"metadata:"},{"line_number":20,"context_line":"  name: magnum:podsecuritypolicy:calico"},{"line_number":21,"context_line":"  namespace: kube-system"},{"line_number":22,"context_line":"  labels:"},{"line_number":23,"context_line":"    addonmanager.kubernetes.io/mode: Reconcile"}],"source_content_type":"text/x-sh","patch_set":6,"id":"3fa7e38b_27459b16","side":"PARENT","line":20,"in_reply_to":"3fa7e38b_73f9231a","updated":"2020-03-19 02:12:06.000000000","message":"I tested with v1.16.3 without this rolebinding and it works fine.","commit_id":"16ea8b6397f2bafc01e6d4ec474c1ae97f15a484"},{"author":{"_account_id":30262,"name":"Thomas Hartland","email":"thomas.george.hartland@cern.ch","username":"tghartland"},"change_message_id":"4ee5a0911a40cb7905c6db0a173f2513357e7098","unresolved":false,"context_lines":[{"line_number":535,"context_line":"        # It can be deleted if this is a fresh installation, or if you have already"},{"line_number":536,"context_line":"        # upgraded to use calico-ipam."},{"line_number":537,"context_line":"        - name: upgrade-ipam"},{"line_number":538,"context_line":"          image:\"${CONTAINER_INFRA_PREFIX:-docker.io/calico/}cni:${CALICO_TAG}\""},{"line_number":539,"context_line":"          command: [\"/opt/cni/bin/calico-ipam\", \"-upgrade\"]"},{"line_number":540,"context_line":"          env:"},{"line_number":541,"context_line":"            - name: KUBERNETES_NODE_NAME"}],"source_content_type":"text/x-sh","patch_set":6,"id":"1fa4df85_aaaa4b82","line":538,"range":{"start_line":538,"start_character":0,"end_line":538,"end_character":79},"updated":"2020-02-25 12:48:14.000000000","message":"There is a space missing between the key and the value, after the \u0027:\u0027.\nIt causes a syntax error without the space.","commit_id":"15d8478cd8d5cea8bb398498d0cee8432bfa2796"},{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"29b703cd3e41924b93288f4c2b234dd5553568a5","unresolved":false,"context_lines":[{"line_number":593,"context_line":"        # Adds a Flex Volume Driver that creates a per-pod Unix Domain Socket to allow Dikastes"},{"line_number":594,"context_line":"        # to communicate with Felix over the Policy Sync API."},{"line_number":595,"context_line":"        - name: flexvol-driver"},{"line_number":596,"context_line":"          image: \"${CONTAINER_INFRA_PREFIX:-docker.io/calico/}pod2daemon-flexvol:${CALICO_TAG}\""},{"line_number":597,"context_line":"          volumeMounts:"},{"line_number":598,"context_line":"          - name: flexvol-driver-host"},{"line_number":599,"context_line":"            mountPath: /host/driver"}],"source_content_type":"text/x-sh","patch_set":6,"id":"1fa4df85_8d0f692d","line":596,"range":{"start_line":596,"start_character":17,"end_line":596,"end_character":95},"updated":"2020-02-25 13:26:58.000000000","message":"all these new images need to be documented.","commit_id":"15d8478cd8d5cea8bb398498d0cee8432bfa2796"},{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"29b703cd3e41924b93288f4c2b234dd5553568a5","unresolved":false,"context_lines":[{"line_number":779,"context_line":"      priorityClassName: system-cluster-critical"},{"line_number":780,"context_line":"      containers:"},{"line_number":781,"context_line":"        - name: calico-kube-controllers"},{"line_number":782,"context_line":"          image: \"${CONTAINER_INFRA_PREFIX:-docker.io/calico/}kube-controllers:${CALICO_TAG}\""},{"line_number":783,"context_line":"          env:"},{"line_number":784,"context_line":"            # Choose which controllers to run."},{"line_number":785,"context_line":"            - name: ENABLED_CONTROLLERS"}],"source_content_type":"text/x-sh","patch_set":6,"id":"1fa4df85_4d197177","line":782,"range":{"start_line":782,"start_character":17,"end_line":782,"end_character":93},"updated":"2020-02-25 13:26:58.000000000","message":"needs to be documented in user doc","commit_id":"15d8478cd8d5cea8bb398498d0cee8432bfa2796"},{"author":{"_account_id":20498,"name":"Spyros Trigazis","email":"spyridon.trigazis@cern.ch","username":"strigazi"},"change_message_id":"7a4f110e3b5846717d1c77a959fa39f21ab3dd09","unresolved":false,"context_lines":[{"line_number":3,"context_line":"step\u003d\"calico-service\""},{"line_number":4,"context_line":"printf \"Starting to run ${step}\\n\""},{"line_number":5,"context_line":""},{"line_number":6,"context_line":". /etc/sysconfig/heat-params"},{"line_number":7,"context_line":""},{"line_number":8,"context_line":"if [ \"$NETWORK_DRIVER\" \u003d \"calico\" ]; then"},{"line_number":9,"context_line":"    _prefix\u003d${CONTAINER_INFRA_PREFIX:-quay.io/calico/}"}],"source_content_type":"text/x-sh","patch_set":8,"id":"1fa4df85_9af967c9","line":6,"range":{"start_line":6,"start_character":0,"end_line":6,"end_character":28},"updated":"2020-03-20 11:10:10.000000000","message":"set -e\nset +x\n. /etc/sysconfig/heat-params\nset -x\n\nabsolutely need set -e to exit on error.","commit_id":"a9a1261a9528b372216638680c8ed47d732f5e65"},{"author":{"_account_id":20498,"name":"Spyros Trigazis","email":"spyridon.trigazis@cern.ch","username":"strigazi"},"change_message_id":"7a4f110e3b5846717d1c77a959fa39f21ab3dd09","unresolved":false,"context_lines":[{"line_number":11,"context_line":"    CALICO_DEPLOY\u003d/srv/magnum/kubernetes/manifests/calico-deploy.yaml"},{"line_number":12,"context_line":"    [ -f ${CALICO_DEPLOY} ] || {"},{"line_number":13,"context_line":"    echo \"Writing File: $CALICO_DEPLOY\""},{"line_number":14,"context_line":"    mkdir -p $(dirname ${CALICO_DEPLOY})"},{"line_number":15,"context_line":"    cat \u003c\u003c EOF \u003e ${CALICO_DEPLOY}"},{"line_number":16,"context_line":"---"},{"line_number":17,"context_line":"apiVersion: rbac.authorization.k8s.io/v1"}],"source_content_type":"text/x-sh","patch_set":8,"id":"1fa4df85_da24bf62","line":14,"updated":"2020-03-20 11:10:10.000000000","message":"set +x","commit_id":"a9a1261a9528b372216638680c8ed47d732f5e65"},{"author":{"_account_id":20498,"name":"Spyros Trigazis","email":"spyridon.trigazis@cern.ch","username":"strigazi"},"change_message_id":"7a4f110e3b5846717d1c77a959fa39f21ab3dd09","unresolved":false,"context_lines":[{"line_number":700,"context_line":"    plural: ipamblocks"},{"line_number":701,"context_line":"    singular: ipamblock"},{"line_number":702,"context_line":""},{"line_number":703,"context_line":"EOF"},{"line_number":704,"context_line":"    }"},{"line_number":705,"context_line":""},{"line_number":706,"context_line":"    until  [ \"ok\" \u003d \"$(curl --silent http://127.0.0.1:8080/healthz)\" ]"}],"source_content_type":"text/x-sh","patch_set":8,"id":"1fa4df85_fa297b36","line":703,"updated":"2020-03-20 11:10:10.000000000","message":"set -x","commit_id":"a9a1261a9528b372216638680c8ed47d732f5e65"},{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"711bd3d41e849f038b202363c364d042faf8bb68","unresolved":false,"context_lines":[{"line_number":6,"context_line":". /etc/sysconfig/heat-params"},{"line_number":7,"context_line":""},{"line_number":8,"context_line":"if [ \"$NETWORK_DRIVER\" \u003d \"calico\" ]; then"},{"line_number":9,"context_line":"    _prefix\u003d${CONTAINER_INFRA_PREFIX:-quay.io/calico/}"},{"line_number":10,"context_line":""},{"line_number":11,"context_line":"    CALICO_DEPLOY\u003d/srv/magnum/kubernetes/manifests/calico-deploy.yaml"},{"line_number":12,"context_line":"    [ -f ${CALICO_DEPLOY} ] || {"}],"source_content_type":"text/x-sh","patch_set":11,"id":"df33271e_ebd514bb","side":"PARENT","line":9,"range":{"start_line":9,"start_character":4,"end_line":9,"end_character":54},"updated":"2020-03-24 16:24:39.000000000","message":"we should reuse the _prefix variable defined here. also personally i prefer quay.io to docker.io as it is easier to follow the url and lookup alternative image tags.","commit_id":"69f5892a4ff7c5056da03924d098c19b743cc36b"},{"author":{"_account_id":20498,"name":"Spyros Trigazis","email":"spyridon.trigazis@cern.ch","username":"strigazi"},"change_message_id":"157f4cb8f4e1ef8f1a8f46f42d5b93dfa7485a85","unresolved":false,"context_lines":[{"line_number":122,"context_line":"      - list"},{"line_number":123,"context_line":"      # Used to discover Typhas."},{"line_number":124,"context_line":"      - get"},{"line_number":125,"context_line":"  - apiGroups: [\"\"]"},{"line_number":126,"context_line":"    resources:"},{"line_number":127,"context_line":"      - nodes/status"},{"line_number":128,"context_line":"    verbs:"}],"source_content_type":"text/x-sh","patch_set":11,"id":"df33271e_8b1ba819","line":125,"updated":"2020-03-24 16:04:07.000000000","message":"Add this too:\n   # Pod CIDR auto-detection on kubeadm needs access to config maps.\n   - apiGroups: [\"\"]\n     resources:\n       - configmaps\n     verbs:\n       - get","commit_id":"2ec4b742f8fc8c99d9a25973efc7f9d057d2e674"},{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"ac6a9b7d63def66822adaaa540322dab7631732c","unresolved":false,"context_lines":[{"line_number":827,"context_line":"    singular: networkset"},{"line_number":828,"context_line":""},{"line_number":829,"context_line":""},{"line_number":830,"context_line":"EOF"},{"line_number":831,"context_line":"    }"},{"line_number":832,"context_line":""},{"line_number":833,"context_line":"    until  [ \"ok\" \u003d \"$(curl --silent http://127.0.0.1:8080/healthz)\" ]"}],"source_content_type":"text/x-sh","patch_set":11,"id":"df33271e_a667cb25","line":830,"range":{"start_line":830,"start_character":0,"end_line":830,"end_character":3},"updated":"2020-03-24 10:18:45.000000000","message":"missing set -x","commit_id":"2ec4b742f8fc8c99d9a25973efc7f9d057d2e674"}],"magnum/drivers/k8s_fedora_coreos_v1/templates/kubecluster.yaml":[{"author":{"_account_id":20498,"name":"Spyros Trigazis","email":"spyridon.trigazis@cern.ch","username":"strigazi"},"change_message_id":"9f13e91d8cfb1c172df318482c92f853142804b1","unresolved":false,"context_lines":[{"line_number":556,"context_line":"  calico_tag:"},{"line_number":557,"context_line":"    type: string"},{"line_number":558,"context_line":"    description: tag of the calico containers used to provision the calico node"},{"line_number":559,"context_line":"    default: v3.12.0"},{"line_number":560,"context_line":""},{"line_number":561,"context_line":"  calico_kube_controllers_tag:"},{"line_number":562,"context_line":"    type: string"}],"source_content_type":"text/x-yaml","patch_set":11,"id":"df33271e_ff0e76e3","line":559,"range":{"start_line":559,"start_character":16,"end_line":559,"end_character":18},"updated":"2020-03-24 12:54:51.000000000","message":"we can do 1.13","commit_id":"2ec4b742f8fc8c99d9a25973efc7f9d057d2e674"},{"author":{"_account_id":20498,"name":"Spyros Trigazis","email":"spyridon.trigazis@cern.ch","username":"strigazi"},"change_message_id":"491869464b4226947c3ee66c87ecfd231569f750","unresolved":false,"context_lines":[{"line_number":556,"context_line":"  calico_tag:"},{"line_number":557,"context_line":"    type: string"},{"line_number":558,"context_line":"    description: tag of the calico containers used to provision the calico node"},{"line_number":559,"context_line":"    default: v3.12.0"},{"line_number":560,"context_line":""},{"line_number":561,"context_line":"  calico_kube_controllers_tag:"},{"line_number":562,"context_line":"    type: string"}],"source_content_type":"text/x-yaml","patch_set":11,"id":"df33271e_75b56731","line":559,"range":{"start_line":559,"start_character":16,"end_line":559,"end_character":18},"in_reply_to":"df33271e_dac62017","updated":"2020-03-24 14:28:33.000000000","message":"Yes, this is what I mean.","commit_id":"2ec4b742f8fc8c99d9a25973efc7f9d057d2e674"},{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"0a9a0aa309f47f745185a17a96da00c07a94855f","unresolved":false,"context_lines":[{"line_number":556,"context_line":"  calico_tag:"},{"line_number":557,"context_line":"    type: string"},{"line_number":558,"context_line":"    description: tag of the calico containers used to provision the calico node"},{"line_number":559,"context_line":"    default: v3.12.0"},{"line_number":560,"context_line":""},{"line_number":561,"context_line":"  calico_kube_controllers_tag:"},{"line_number":562,"context_line":"    type: string"}],"source_content_type":"text/x-yaml","patch_set":11,"id":"df33271e_dac62017","line":559,"range":{"start_line":559,"start_character":16,"end_line":559,"end_character":18},"in_reply_to":"df33271e_ff0e76e3","updated":"2020-03-24 14:10:06.000000000","message":"you mean v3.13.1? https://docs.projectcalico.org/release-notes/","commit_id":"2ec4b742f8fc8c99d9a25973efc7f9d057d2e674"},{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"19356b6fb298e7fad5ae2aa88bbd29872d9bbb4e","unresolved":false,"context_lines":[{"line_number":1017,"context_line":"      port_range_max: 65535"},{"line_number":1018,"context_line":"      security_group: {get_resource: secgroup_kube_minion}"},{"line_number":1019,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1020,"context_line":"  # allow any traffic from worker to master nodes"},{"line_number":1021,"context_line":"  secgroup_rule_tcp_kube_minion_to_master:"},{"line_number":1022,"context_line":"    condition: create_cluster_resources"},{"line_number":1023,"context_line":"    type: OS::Neutron::SecurityGroupRule"},{"line_number":1024,"context_line":"    properties:"},{"line_number":1025,"context_line":"      protocol: tcp"},{"line_number":1026,"context_line":"      port_range_min: 1"},{"line_number":1027,"context_line":"      port_range_max: 65535"},{"line_number":1028,"context_line":"      security_group: {get_resource: secgroup_kube_master}"},{"line_number":1029,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1030,"context_line":"  secgroup_rule_udp_kube_minion_to_master:"},{"line_number":1031,"context_line":"    condition: create_cluster_resources"},{"line_number":1032,"context_line":"    type: OS::Neutron::SecurityGroupRule"},{"line_number":1033,"context_line":"    properties:"},{"line_number":1034,"context_line":"      protocol: udp"},{"line_number":1035,"context_line":"      port_range_min: 1"},{"line_number":1036,"context_line":"      port_range_max: 65535"},{"line_number":1037,"context_line":"      security_group: {get_resource: secgroup_kube_master}"},{"line_number":1038,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1039,"context_line":""},{"line_number":1040,"context_line":"  ######################################################################"},{"line_number":1041,"context_line":"  #"}],"source_content_type":"text/x-yaml","patch_set":15,"id":"df33271e_2426af69","line":1038,"range":{"start_line":1020,"start_character":0,"end_line":1038,"end_character":56},"updated":"2020-03-30 11:23:38.000000000","message":"adding this allows workers to reach the httpd server on the master (I slightly modified strigazi\u0027s debugging daemonset here: https://gist.github.com/brtknr/5fecfe07e978cedec30e37cf69102c1b)","commit_id":"a4153af02fc3c4a98abf535a71d4b621143720b6"},{"author":{"_account_id":20498,"name":"Spyros Trigazis","email":"spyridon.trigazis@cern.ch","username":"strigazi"},"change_message_id":"a2aa4aaa13b4b1fcf7dc82c6592ce1201750c514","unresolved":false,"context_lines":[{"line_number":1017,"context_line":"      port_range_max: 65535"},{"line_number":1018,"context_line":"      security_group: {get_resource: secgroup_kube_minion}"},{"line_number":1019,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1020,"context_line":"  # allow any traffic from worker to master nodes"},{"line_number":1021,"context_line":"  secgroup_rule_tcp_kube_minion_to_master:"},{"line_number":1022,"context_line":"    condition: create_cluster_resources"},{"line_number":1023,"context_line":"    type: OS::Neutron::SecurityGroupRule"},{"line_number":1024,"context_line":"    properties:"},{"line_number":1025,"context_line":"      protocol: tcp"},{"line_number":1026,"context_line":"      port_range_min: 1"},{"line_number":1027,"context_line":"      port_range_max: 65535"},{"line_number":1028,"context_line":"      security_group: {get_resource: secgroup_kube_master}"},{"line_number":1029,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1030,"context_line":"  secgroup_rule_udp_kube_minion_to_master:"},{"line_number":1031,"context_line":"    condition: create_cluster_resources"},{"line_number":1032,"context_line":"    type: OS::Neutron::SecurityGroupRule"},{"line_number":1033,"context_line":"    properties:"},{"line_number":1034,"context_line":"      protocol: udp"},{"line_number":1035,"context_line":"      port_range_min: 1"},{"line_number":1036,"context_line":"      port_range_max: 65535"},{"line_number":1037,"context_line":"      security_group: {get_resource: secgroup_kube_master}"},{"line_number":1038,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1039,"context_line":""},{"line_number":1040,"context_line":"  ######################################################################"},{"line_number":1041,"context_line":"  #"}],"source_content_type":"text/x-yaml","patch_set":15,"id":"df33271e_e4b967cc","line":1038,"range":{"start_line":1020,"start_character":0,"end_line":1038,"end_character":56},"in_reply_to":"df33271e_04e0cbf9","updated":"2020-03-30 12:51:06.000000000","message":"I think i mentioned this already that opening the firewall from minions to master makes it work.","commit_id":"a4153af02fc3c4a98abf535a71d4b621143720b6"},{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"9e727d3590d2e711c012be6890478480c6a98de9","unresolved":false,"context_lines":[{"line_number":1017,"context_line":"      port_range_max: 65535"},{"line_number":1018,"context_line":"      security_group: {get_resource: secgroup_kube_minion}"},{"line_number":1019,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1020,"context_line":"  # allow any traffic from worker to master nodes"},{"line_number":1021,"context_line":"  secgroup_rule_tcp_kube_minion_to_master:"},{"line_number":1022,"context_line":"    condition: create_cluster_resources"},{"line_number":1023,"context_line":"    type: OS::Neutron::SecurityGroupRule"},{"line_number":1024,"context_line":"    properties:"},{"line_number":1025,"context_line":"      protocol: tcp"},{"line_number":1026,"context_line":"      port_range_min: 1"},{"line_number":1027,"context_line":"      port_range_max: 65535"},{"line_number":1028,"context_line":"      security_group: {get_resource: secgroup_kube_master}"},{"line_number":1029,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1030,"context_line":"  secgroup_rule_udp_kube_minion_to_master:"},{"line_number":1031,"context_line":"    condition: create_cluster_resources"},{"line_number":1032,"context_line":"    type: OS::Neutron::SecurityGroupRule"},{"line_number":1033,"context_line":"    properties:"},{"line_number":1034,"context_line":"      protocol: udp"},{"line_number":1035,"context_line":"      port_range_min: 1"},{"line_number":1036,"context_line":"      port_range_max: 65535"},{"line_number":1037,"context_line":"      security_group: {get_resource: secgroup_kube_master}"},{"line_number":1038,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1039,"context_line":""},{"line_number":1040,"context_line":"  ######################################################################"},{"line_number":1041,"context_line":"  #"}],"source_content_type":"text/x-yaml","patch_set":15,"id":"df33271e_04e0cbf9","line":1038,"range":{"start_line":1020,"start_character":0,"end_line":1038,"end_character":56},"in_reply_to":"df33271e_2426af69","updated":"2020-03-30 11:25:08.000000000","message":"to work with removal of the taint: https://review.opendev.org/#/c/715739/","commit_id":"a4153af02fc3c4a98abf535a71d4b621143720b6"},{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"32dbefe0e2b2b1e9532ff6bf3cc499eac1e6c28e","unresolved":false,"context_lines":[{"line_number":1017,"context_line":"      port_range_max: 65535"},{"line_number":1018,"context_line":"      security_group: {get_resource: secgroup_kube_minion}"},{"line_number":1019,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1020,"context_line":"  # allow any traffic from worker to master nodes"},{"line_number":1021,"context_line":"  secgroup_rule_tcp_kube_minion_to_master:"},{"line_number":1022,"context_line":"    condition: create_cluster_resources"},{"line_number":1023,"context_line":"    type: OS::Neutron::SecurityGroupRule"},{"line_number":1024,"context_line":"    properties:"},{"line_number":1025,"context_line":"      protocol: tcp"},{"line_number":1026,"context_line":"      port_range_min: 1"},{"line_number":1027,"context_line":"      port_range_max: 65535"},{"line_number":1028,"context_line":"      security_group: {get_resource: secgroup_kube_master}"},{"line_number":1029,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1030,"context_line":"  secgroup_rule_udp_kube_minion_to_master:"},{"line_number":1031,"context_line":"    condition: create_cluster_resources"},{"line_number":1032,"context_line":"    type: OS::Neutron::SecurityGroupRule"},{"line_number":1033,"context_line":"    properties:"},{"line_number":1034,"context_line":"      protocol: udp"},{"line_number":1035,"context_line":"      port_range_min: 1"},{"line_number":1036,"context_line":"      port_range_max: 65535"},{"line_number":1037,"context_line":"      security_group: {get_resource: secgroup_kube_master}"},{"line_number":1038,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1039,"context_line":""},{"line_number":1040,"context_line":"  ######################################################################"},{"line_number":1041,"context_line":"  #"}],"source_content_type":"text/x-yaml","patch_set":15,"id":"df33271e_be548222","line":1038,"range":{"start_line":1020,"start_character":0,"end_line":1038,"end_character":56},"in_reply_to":"df33271e_3e12320a","updated":"2020-03-30 20:57:40.000000000","message":"This is not necessary for the conformance test to pass as @Spyros used PS 14 and it passed for him too. This is to allow workers to reach port 80 on the httpd service running on the master as with the daemonset example, which seemed to allow traffic in the previous version of calico.","commit_id":"a4153af02fc3c4a98abf535a71d4b621143720b6"},{"author":{"_account_id":6484,"name":"Feilong Wang","email":"hustemb@gmail.com","username":"flwang"},"change_message_id":"32b9beeec582014e7461cea9dc8b8946195e114a","unresolved":false,"context_lines":[{"line_number":1017,"context_line":"      port_range_max: 65535"},{"line_number":1018,"context_line":"      security_group: {get_resource: secgroup_kube_minion}"},{"line_number":1019,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1020,"context_line":"  # allow any traffic from worker to master nodes"},{"line_number":1021,"context_line":"  secgroup_rule_tcp_kube_minion_to_master:"},{"line_number":1022,"context_line":"    condition: create_cluster_resources"},{"line_number":1023,"context_line":"    type: OS::Neutron::SecurityGroupRule"},{"line_number":1024,"context_line":"    properties:"},{"line_number":1025,"context_line":"      protocol: tcp"},{"line_number":1026,"context_line":"      port_range_min: 1"},{"line_number":1027,"context_line":"      port_range_max: 65535"},{"line_number":1028,"context_line":"      security_group: {get_resource: secgroup_kube_master}"},{"line_number":1029,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1030,"context_line":"  secgroup_rule_udp_kube_minion_to_master:"},{"line_number":1031,"context_line":"    condition: create_cluster_resources"},{"line_number":1032,"context_line":"    type: OS::Neutron::SecurityGroupRule"},{"line_number":1033,"context_line":"    properties:"},{"line_number":1034,"context_line":"      protocol: udp"},{"line_number":1035,"context_line":"      port_range_min: 1"},{"line_number":1036,"context_line":"      port_range_max: 65535"},{"line_number":1037,"context_line":"      security_group: {get_resource: secgroup_kube_master}"},{"line_number":1038,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1039,"context_line":""},{"line_number":1040,"context_line":"  ######################################################################"},{"line_number":1041,"context_line":"  #"}],"source_content_type":"text/x-yaml","patch_set":15,"id":"df33271e_3e12320a","line":1038,"range":{"start_line":1020,"start_character":0,"end_line":1038,"end_character":56},"in_reply_to":"df33271e_3fb079dd","updated":"2020-03-30 20:28:33.000000000","message":"Spyros, is this really necessary for the conformance test? Without this one, which test case will fail? and did you use \"Always\" for IPIP? or keep it as \"Off\"?\n\nI\u0027m going to run conformance test again.","commit_id":"a4153af02fc3c4a98abf535a71d4b621143720b6"},{"author":{"_account_id":28022,"name":"Bharat Kunwar","email":"brtknr@bath.edu","username":"brtknr"},"change_message_id":"9006ec6c1aabf119e4ecd949afc0326fe263aa4d","unresolved":false,"context_lines":[{"line_number":1017,"context_line":"      port_range_max: 65535"},{"line_number":1018,"context_line":"      security_group: {get_resource: secgroup_kube_minion}"},{"line_number":1019,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1020,"context_line":"  # allow any traffic from worker to master nodes"},{"line_number":1021,"context_line":"  secgroup_rule_tcp_kube_minion_to_master:"},{"line_number":1022,"context_line":"    condition: create_cluster_resources"},{"line_number":1023,"context_line":"    type: OS::Neutron::SecurityGroupRule"},{"line_number":1024,"context_line":"    properties:"},{"line_number":1025,"context_line":"      protocol: tcp"},{"line_number":1026,"context_line":"      port_range_min: 1"},{"line_number":1027,"context_line":"      port_range_max: 65535"},{"line_number":1028,"context_line":"      security_group: {get_resource: secgroup_kube_master}"},{"line_number":1029,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1030,"context_line":"  secgroup_rule_udp_kube_minion_to_master:"},{"line_number":1031,"context_line":"    condition: create_cluster_resources"},{"line_number":1032,"context_line":"    type: OS::Neutron::SecurityGroupRule"},{"line_number":1033,"context_line":"    properties:"},{"line_number":1034,"context_line":"      protocol: udp"},{"line_number":1035,"context_line":"      port_range_min: 1"},{"line_number":1036,"context_line":"      port_range_max: 65535"},{"line_number":1037,"context_line":"      security_group: {get_resource: secgroup_kube_master}"},{"line_number":1038,"context_line":"      remote_group: {get_resource: secgroup_kube_minion}"},{"line_number":1039,"context_line":""},{"line_number":1040,"context_line":"  ######################################################################"},{"line_number":1041,"context_line":"  #"}],"source_content_type":"text/x-yaml","patch_set":15,"id":"df33271e_3fb079dd","line":1038,"range":{"start_line":1020,"start_character":0,"end_line":1038,"end_character":56},"in_reply_to":"df33271e_e4b967cc","updated":"2020-03-30 12:59:04.000000000","message":"Yes, I took a hint from what you wrote and added this... question is whether we want this here on a permanent basis... the thing is, with flannel, this is the default behaviour. We are only bringing the calico cluster to behave the same way as an equivalent flannel cluster.","commit_id":"a4153af02fc3c4a98abf535a71d4b621143720b6"}]}
