Releases: projectcalico/cni-plugin
Rewrite plugin in Go - Third RC
Hopefully final RC before final release.
- Fixes IPv6
- Runs under Kubernetes without requiring API access
Full list of changes since last release v1.4.0-rc2...v1.4.0-rc3
Rewrite plugin in Go - Second RC
Release candidate - The following issues are still outstanding https://github.com/projectcalico/calico-cni/milestone/1
All known issues are fixed.
Full list of changes since last release v1.4.0-rc1...v1.4.0-rc2
Rewrite plugin in Go - First RC
Release candidate - The following issues are still outstanding https://github.com/projectcalico/calico-cni/milestone/1
This release marks a complete rewrite of the Calico plugin in Go. This means fast startup times for better performance.
It adds the following features:
- Support for k8s username/password explicit config
- Performance
Notes
- The network plugin (
calico
) should be upgraded at the same time as the IPAM plugin (calico-ipam
if used)- When using Calico for IPAM, the
calico-ipam
binary must be present. In the python version the functionality was also built into thecalico
plugin directly.
- When using Calico for IPAM, the
- Users shouldn't need to change network config and should be able to upgrade a running system.
- The format of the
-v
option to output the version has changed - There is a new default for the
k8s_api_root
- Support for the deprecated Kubernetes annotation based policy has been removed
For details of the configuration changes see the changes to configuration.md in the diff below.
Full list of changes since last release v1.3.1...v1.4.0-rc1
Add kubeconfig, podCIDR support
- Adds the ability to use kubeconfig to access/authenticate with the Kubernetes API using the following CNI network config snippet:
"kubernetes": {
"kubeconfig": "/path/to/kubeconfig"
}
- Also adds the ability to read podCIDR from the Kubernetes API to configure the subnet when using
host-local
IPAM.
"ipam": {
"type": "host-local",
"subnet": "usePodCidr"
}
Kubernetes Policy
Notably, this release introduces the k8s
policy driver which replaces the default-deny-inbound
driver when using Kubernetes alpha policy (requires the v0.1.4 Calico policy agent).
#93 Add support for client certificates (and documentation)
#88 Fix sed command in master-config-template.yaml
#86 Correctly set labels and profile when using DefaultDeny driver
libcalico -> v0.14.0
Support hostname and stderr logging config
v1.2.0
This release includes a number of fixes and improvements
#77 Turn on logging for libcalico
#78 Use yaml to read network config
#73 Add a way to easily created a k8s "cluster"
#75 Use latest build container
#71 Add support for etcd_endpoints key
#74 Build and store the binary on CireclCI
#60 No API lookup when namespace is kube-system
#65 Allow user to choose IP
#66 Don't check in version information
Calico Dependencies:
[email protected]
Changes for Kubernetes v1alpha1 NetworkPolicy API
This release includes changes to support the Kubernetes v1alpha1 NetworkPolicy API in conjunction with the Calico Kubernetes policy agent.
Notably, this release changes the Calico workload_id
and orchestrator
when running under Kubernetes. This means that deployments using the v1.1 CNI plugin should not downgrade to v1.0 CNI plugin versions (though upgrade from v1.0 to v1.1 is supported).
This release also introduces the --version
flag, which prints CNI plugin versioning information for both the calico
and calico-ipam
binaries.
Calico Dependencies:
[email protected]
Version v1.0.2
Version v1.0.2 of the calico-cni
plugin adds better support for IPv6. In particular, it's now compatible with ipam plugins (such as host-local
) which don't return IPv6 addresses.
Calico Dependencies:
[email protected]
v1.0.0 - Cleanups, fixes, test improvements and support for annotation based policy
Version v1.0.0 of the calico-cni
plugin now has experimental support for annotation based policy in Kubernetes.
This release also includes a number of code improvements and fixes.
Calico Dependencies:
[email protected]