Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Initial encrypted network support #719

Merged
merged 9 commits into from
Sep 28, 2019

Conversation

erikwilson
Copy link
Contributor

No description provided.

@erikwilson erikwilson force-pushed the encrypted-network-support branch from 89d19e3 to 9474b30 Compare August 9, 2019 22:27
@erikwilson erikwilson force-pushed the encrypted-network-support branch from e26c5d9 to a4039ea Compare September 3, 2019 23:42
@cjellick
Copy link
Contributor

cjellick commented Sep 4, 2019

#50

@erikwilson erikwilson force-pushed the encrypted-network-support branch 9 times, most recently from 79c089d to 52a64ab Compare September 6, 2019 23:56
@erikwilson erikwilson changed the title WIP - Encrypted network support Initial encrypted network support Sep 7, 2019
@erikwilson erikwilson marked this pull request as ready for review September 7, 2019 00:27
@yamt
Copy link
Contributor

yamt commented Sep 9, 2019

why did you enable hairpin mode in this change?

@erikwilson
Copy link
Contributor Author

Hairpin mode was enabled because it is a feature that people have asked for, and it is tested as part of the networking kubernetes-perf-test suite. If there is a good reason to disable it please let me know, as far as I could tell there was not much of a downside for turning it on.

I have also been working on updating the networking tests (https://github.com/erikwilson/kubernetes-perf-tests/tree/master/network/benchmarks/netperf) to use the newest versions of the test utilities (iperf & netperf) and large MTUs. I will probably put in a separate PR with ansible scripts for network benchmarking based off https://github.com/erikwilson/rancher-k3s/tree/encrypted-network-testing/contrib/ansible.

@yamt
Copy link
Contributor

yamt commented Sep 10, 2019

no, i don't have any reason to disable (or enable) it.
i was just curious how it's related to the rest of the changes.

@yamt
Copy link
Contributor

yamt commented Sep 12, 2019

lgtm

@@ -421,20 +431,43 @@ func WritePasswords(passwdFile string, records [][]string) error {
return os.Rename(passwdFile+".tmp", passwdFile)
}

func genEncryptedNetworkInfo(controlConfig *config.Control, runtime *config.ControlRuntime) error {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How can this be handled in HA mode? as far as I understand this function will result in creating a IPSECPSK for each master node

Copy link
Contributor

@galal-hussein galal-hussein left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@erikwilson erikwilson force-pushed the encrypted-network-support branch 2 times, most recently from 7ebec56 to a6bb3c8 Compare September 27, 2019 20:36
@erikwilson erikwilson force-pushed the encrypted-network-support branch from 1748f95 to 6f7a1a7 Compare September 28, 2019 01:33
@erikwilson erikwilson merged commit 2ea7a71 into k3s-io:master Sep 28, 2019
brandond added a commit to brandond/k3s that referenced this pull request Jul 29, 2024
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: k3s-io#719

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
brandond added a commit to brandond/k3s that referenced this pull request Jul 29, 2024
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: k3s-io#719

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
brandond added a commit to brandond/k3s that referenced this pull request Jul 29, 2024
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: k3s-io#719

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
brandond added a commit to brandond/k3s that referenced this pull request Jul 29, 2024
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: k3s-io#719

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
brandond added a commit to brandond/k3s that referenced this pull request Jul 29, 2024
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: k3s-io#719

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
brandond added a commit that referenced this pull request Jul 29, 2024
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: #719

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
brandond added a commit that referenced this pull request Jul 29, 2024
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: #719

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
brandond added a commit that referenced this pull request Jul 30, 2024
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: #719

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
brandond added a commit that referenced this pull request Jul 30, 2024
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: #719

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
brandond added a commit that referenced this pull request Jul 30, 2024
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: #719

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
ludost pushed a commit to asimovo-platform/k3s that referenced this pull request Oct 2, 2024
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: k3s-io#719

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants