Skip to content

Commit 954372f

Browse files
committed
Merge remote-tracking branch 'downstream/release-4.20' into 4.19-merge_5-30-25
2 parents bfd593c + 80ebd7a commit 954372f

File tree

211 files changed

+18829
-6889
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

211 files changed

+18829
-6889
lines changed

.github/workflows/test.yml

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -282,6 +282,8 @@ jobs:
282282
env:
283283
JOB_NAME: "Upgrade-Tests-${{ matrix.gateway-mode }}"
284284
OVN_HA: "false"
285+
PLATFORM_IPV4_SUPPORT: "true"
286+
PLATFORM_IPV6_SUPPORT: "false"
285287
KIND_IPV4_SUPPORT: "true"
286288
KIND_IPV6_SUPPORT: "false"
287289
OVN_HYBRID_OVERLAY_ENABLE: "false"
@@ -453,7 +455,7 @@ jobs:
453455
- {"target": "external-gateway", "ha": "noHA", "gateway-mode": "shared", "ipfamily": "ipv6", "disable-snat-multiple-gws": "noSnatGW", "second-bridge": "2br", "ic": "ic-single-node-zones"}
454456
- {"target": "external-gateway", "ha": "noHA", "gateway-mode": "local", "ipfamily": "ipv6", "disable-snat-multiple-gws": "noSnatGW", "second-bridge": "1br", "ic": "ic-single-node-zones"}
455457
- {"target": "kv-live-migration", "ha": "noHA", "gateway-mode": "local", "ipfamily": "ipv4", "disable-snat-multiple-gws": "SnatGW", "second-bridge": "1br", "ic": "ic-disabled", "num-workers": "3", "network-segmentation": "enable-network-segmentation"}
456-
- {"target": "kv-live-migration", "ha": "noHA", "gateway-mode": "shared", "ipfamily": "dualstack", "disable-snat-multiple-gws": "noSnatGW", "second-bridge": "1br", "ic": "ic-single-node-zones", "num-workers": "3", "network-segmentation": "enable-network-segmentation"}
458+
- {"target": "kv-live-migration", "ha": "noHA", "gateway-mode": "shared", "ipfamily": "dualstack", "disable-snat-multiple-gws": "noSnatGW", "second-bridge": "1br", "ic": "ic-single-node-zones", "num-workers": "3", "network-segmentation": "enable-network-segmentation", "routeadvertisements": "true"}
457459
- {"target": "control-plane", "ha": "noHA", "gateway-mode": "shared", "ipfamily": "ipv4", "disable-snat-multiple-gws": "SnatGW", "second-bridge": "1br", "ic": "ic-single-node-zones", "forwarding": "disable-forwarding"}
458460
- {"target": "network-segmentation", "ha": "noHA", "gateway-mode": "shared", "ipfamily": "dualstack", "disable-snat-multiple-gws": "noSnatGW", "second-bridge": "1br", "ic": "ic-single-node-zones", "forwarding": "disable-forwarding"}
459461
- {"target": "network-segmentation", "ha": "noHA", "gateway-mode": "local", "ipfamily": "dualstack", "disable-snat-multiple-gws": "noSnatGW", "second-bridge": "1br", "ic": "ic-single-node-zones"}
@@ -475,11 +477,11 @@ jobs:
475477
KIND_INSTALL_METALLB: "${{ matrix.target == 'control-plane' || matrix.target == 'control-plane-helm' || matrix.target == 'network-segmentation' }}"
476478
OVN_GATEWAY_MODE: "${{ matrix.gateway-mode }}"
477479
OVN_SECOND_BRIDGE: "${{ matrix.second-bridge == '2br' }}"
478-
KIND_IPV4_SUPPORT: "${{ matrix.ipfamily == 'IPv4' || matrix.ipfamily == 'dualstack' }}"
479-
KIND_IPV6_SUPPORT: "${{ matrix.ipfamily == 'IPv6' || matrix.ipfamily == 'dualstack' }}"
480480
ENABLE_MULTI_NET: "${{ matrix.target == 'multi-homing' || matrix.target == 'kv-live-migration' || matrix.target == 'network-segmentation' || matrix.target == 'tools' || matrix.target == 'multi-homing-helm' || matrix.target == 'traffic-flow-test-only' || matrix.routeadvertisements != '' }}"
481481
ENABLE_NETWORK_SEGMENTATION: "${{ matrix.target == 'network-segmentation' || matrix.network-segmentation == 'enable-network-segmentation' }}"
482482
DISABLE_UDN_HOST_ISOLATION: "true"
483+
PLATFORM_IPV4_SUPPORT: "${{ matrix.ipfamily == 'IPv4' || matrix.ipfamily == 'dualstack' }}"
484+
PLATFORM_IPV6_SUPPORT: "${{ matrix.ipfamily == 'IPv6' || matrix.ipfamily == 'dualstack' }}"
483485
KIND_INSTALL_KUBEVIRT: "${{ matrix.target == 'kv-live-migration' }}"
484486
OVN_COMPACT_MODE: "${{ matrix.target == 'compact-mode' }}"
485487
OVN_DUMMY_GATEWAY_BRIDGE: "${{ matrix.target == 'compact-mode' }}"
@@ -489,6 +491,7 @@ jobs:
489491
OVN_DISABLE_FORWARDING: "${{ matrix.forwarding == 'disable-forwarding' }}"
490492
USE_HELM: "${{ matrix.target == 'control-plane-helm' || matrix.target == 'multi-homing-helm' }}"
491493
OVN_ENABLE_DNSNAMERESOLVER: "${{ matrix.dns-name-resolver == 'enable-dns-name-resolver' }}"
494+
OVN_NETWORK_QOS_ENABLE: "${{ matrix.target == 'control-plane' || matrix.target == 'control-plane-helm' }}"
492495
TRAFFIC_FLOW_TESTS: "${{ matrix.traffic-flow-tests }}"
493496
ENABLE_ROUTE_ADVERTISEMENTS: "${{ matrix.routeadvertisements != '' }}"
494497
ADVERTISE_DEFAULT_NETWORK: "${{ matrix.routeadvertisements == 'advertise-default' }}"
@@ -550,7 +553,8 @@ jobs:
550553
echo "GOPATH=$GOPATH" >> $GITHUB_ENV
551554
echo "$GOPATH/bin" >> $GITHUB_PATH
552555
if [ $OVN_SECOND_BRIDGE == "true" ]; then
553-
echo OVN_TEST_EX_GW_NETWORK=kindexgw >> $GITHUB_ENV
556+
# must be "greater" lexigraphically than network "kind", therefore external gateway is named xgw
557+
echo OVN_TEST_EX_GW_NETWORK=xgw >> $GITHUB_ENV
554558
echo OVN_ENABLE_EX_GW_NETWORK_BRIDGE=true >> $GITHUB_ENV
555559
fi
556560
if [[ "$JOB_NAME" == *"shard-conformance"* ]] && [ "$ADVERTISE_DEFAULT_NETWORK" == "true" ]; then
@@ -629,7 +633,9 @@ jobs:
629633
make -C test control-plane WHAT="Kubevirt Virtual Machines"
630634
elif [ "${{ matrix.target }}" == "control-plane-helm" ]; then
631635
make -C test control-plane
632-
make -C test conformance
636+
if [ "${{ matrix.ipfamily }}" != "ipv6" ]; then
637+
make -C test conformance
638+
fi
633639
elif [ "${{ matrix.target }}" == "network-segmentation" ]; then
634640
make -C test control-plane WHAT="Network Segmentation"
635641
elif [ "${{ matrix.target }}" == "bgp" ]; then
@@ -688,8 +694,8 @@ jobs:
688694
env:
689695
JOB_NAME: "DualStack-conversion-shared-${{ matrix.ha }}-${{ matrix.interconnect }}"
690696
OVN_HA: "${{ matrix.ha == 'HA' }}"
691-
KIND_IPV4_SUPPORT: "true"
692-
KIND_IPV6_SUPPORT: "false"
697+
PLATFORM_IPV4_SUPPORT: "true"
698+
PLATFORM_IPV6_SUPPORT: "false"
693699
OVN_HYBRID_OVERLAY_ENABLE: "false"
694700
OVN_GATEWAY_MODE: "shared"
695701
OVN_MULTICAST_ENABLE: "false"

Dockerfile.base

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,25 +12,28 @@ RUN dnf --setopt=retries=2 --setopt=timeout=2 install -y --nodocs \
1212
selinux-policy procps-ng && \
1313
dnf clean all
1414

15-
ARG ovsver=3.5.0-0.9.el9fdp
16-
ARG ovnver=24.09.2-41.el9fdp
15+
# NOTE: OVS is not pinned to a particular patch version in order to stay in
16+
# sync with the OVS running on the host (it is not strictly necessary, but
17+
# reduces the number of variables in the system) and receive all the CVE and
18+
# bug fixes automatically.
19+
ARG ovsver=3.5
20+
ARG ovnver=24.09.2-69.el9fdp
1721
# NOTE: Ensure that the versions of OVS and OVN are overriden for OKD in each of the subsequent layers.
1822
# Centos and RHEL releases for ovn are built out of sync, so please make sure to bump for OKD with
1923
# the corresponding Centos version when updating the OCP version.
20-
ARG ovsver_okd=3.5.0-10.el9s
24+
ARG ovsver_okd=3.5
2125
# We are not bumping the OVN version for OKD since the FDP release is not done yet.
2226
ARG ovnver_okd=24.09.1-10.el9s
2327

2428
RUN INSTALL_PKGS="iptables nftables" && \
2529
source /etc/os-release && \
2630
[ "${ID}" == "centos" ] && ovsver=$ovsver_okd && ovnver=$ovnver_okd; \
27-
ovsver_short=$(echo "$ovsver" | cut -d'.' -f1,2) && \
2831
ovnver_short=$(echo "$ovnver" | cut -d'.' -f1,2) && \
2932
dnf --setopt=retries=2 --setopt=timeout=2 install -y --nodocs $INSTALL_PKGS && \
30-
dnf --setopt=retries=2 --setopt=timeout=2 install -y --nodocs "openvswitch$ovsver_short = $ovsver" "python3-openvswitch$ovsver_short = $ovsver" && \
33+
dnf --setopt=retries=2 --setopt=timeout=2 install -y --nodocs "openvswitch$ovsver" "python3-openvswitch$ovsver" && \
3134
dnf --setopt=retries=2 --setopt=timeout=2 install -y --nodocs "ovn$ovnver_short = $ovnver" "ovn$ovnver_short-central = $ovnver" "ovn$ovnver_short-host = $ovnver" && \
3235
dnf clean all && rm -rf /var/cache/* && \
33-
sed 's/%/"/g' <<<"%openvswitch$ovsver_short-devel = $ovsver% %openvswitch$ovsver_short-ipsec = $ovsver% %ovn$ovnver_short-vtep = $ovnver%" > /more-pkgs
36+
sed 's/%/"/g' <<<"%openvswitch$ovsver-devel% %openvswitch$ovsver-ipsec% %ovn$ovnver_short-vtep = $ovnver%" > /more-pkgs
3437

3538
RUN mkdir -p /var/run/openvswitch && \
3639
mkdir -p /var/run/ovn && \

MAINTAINERS.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,17 @@ The current Maintainers Group for the ovn-kubernetes Project consists of:
22

33
| Name | Employer | Responsibilities |
44
| ---- | -------- | ---------------- |
5-
| [Dan Williams](https://github.com/dcbw) | Red Hat | All things ovnkube |
65
| [Girish Moodalbail](https://github.com/girishmg) | NVIDIA | All things ovnkube |
76
| [Jaime Caamaño Ruiz](https://github.com/jcaamano) | Red Hat | All things ovnkube |
7+
| [Nadia Pinaeva](https://github.com/npinaeva) | Red Hat | All things ovnkube |
88
| [Surya Seetharaman](https://github.com/tssurya) | Red Hat | All things ovnkube |
99
| [Tim Rozet](https://github.com/trozet) | Red Hat | All things ovnkube |
1010

1111
See [CONTRIBUTING.md](./CONTRIBUTING.md) for general contribution guidelines.
1212
See [GOVERNANCE.md](./GOVERNANCE.md) for governance guidelines and maintainer responsibilities.
13+
14+
Emeritus Maintainers
15+
16+
| Name | Employer | Responsibilities |
17+
| ---- | -------- | ---------------- |
18+
| [Dan Williams](https://github.com/dcbw) | Independent | All things ovnkube |

contrib/kind-common

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -161,10 +161,10 @@ EOF
161161
pip install -r dev-env/requirements.txt
162162

163163
local ip_family ipv6_network
164-
if [ "$KIND_IPV4_SUPPORT" == true ] && [ "$KIND_IPV6_SUPPORT" == true ]; then
164+
if [ "$PLATFORM_IPV4_SUPPORT" == true ] && [ "$PLATFORM_IPV6_SUPPORT" == true ]; then
165165
ip_family="dual"
166166
ipv6_network="--ipv6 --subnet=${METALLB_CLIENT_NET_SUBNET_IPV6}"
167-
elif [ "$KIND_IPV6_SUPPORT" == true ]; then
167+
elif [ "$PLATFORM_IPV6_SUPPORT" == true ]; then
168168
ip_family="ipv6"
169169
ipv6_network="--ipv6 --subnet=${METALLB_CLIENT_NET_SUBNET_IPV6}"
170170
else
@@ -177,7 +177,7 @@ EOF
177177
docker network rm -f clientnet
178178
docker network create --subnet="${METALLB_CLIENT_NET_SUBNET_IPV4}" ${ipv6_network} --driver bridge clientnet
179179
docker network connect clientnet frr
180-
if [ "$KIND_IPV6_SUPPORT" == true ]; then
180+
if [ "$PLATFORM_IPV6_SUPPORT" == true ]; then
181181
# Enable IPv6 forwarding in FRR
182182
docker exec frr sysctl -w net.ipv6.conf.all.forwarding=1
183183
fi
@@ -218,21 +218,21 @@ EOF
218218

219219
KIND_NODES=$(kind_get_nodes)
220220
for n in ${KIND_NODES}; do
221-
if [ "$KIND_IPV4_SUPPORT" == true ]; then
221+
if [ "$PLATFORM_IPV4_SUPPORT" == true ]; then
222222
docker exec "${n}" ip route add "${client_subnets_v4}" via "${kind_network_v4}"
223223
fi
224-
if [ "$KIND_IPV6_SUPPORT" == true ]; then
224+
if [ "$PLATFORM_IPV6_SUPPORT" == true ]; then
225225
docker exec "${n}" ip -6 route add "${client_subnets_v6}" via "${kind_network_v6}"
226226
fi
227227
done
228228

229229
# for now, we only run one test with metalLB load balancer for which this
230230
# one svcVIP (192.168.10.0/fc00:f853:ccd:e799::) is more than enough since at a time we will only
231231
# have one load balancer service
232-
if [ "$KIND_IPV4_SUPPORT" == true ]; then
232+
if [ "$PLATFORM_IPV4_SUPPORT" == true ]; then
233233
docker exec lbclient ip route add 192.168.10.0 via "${client_network_v4}" dev eth0
234234
fi
235-
if [ "$KIND_IPV6_SUPPORT" == true ]; then
235+
if [ "$PLATFORM_IPV6_SUPPORT" == true ]; then
236236
docker exec lbclient ip -6 route add fc00:f853:ccd:e799:: via "${client_network_v6}" dev eth0
237237
fi
238238
sleep 30
@@ -284,7 +284,7 @@ delete_metallb_dir() {
284284
kubectl_wait_pods() {
285285
# IPv6 cluster seems to take a little longer to come up, so extend the wait time.
286286
OVN_TIMEOUT=300
287-
if [ "$KIND_IPV6_SUPPORT" == true ]; then
287+
if [ "$PLATFORM_IPV6_SUPPORT" == true ]; then
288288
OVN_TIMEOUT=480
289289
fi
290290

@@ -450,7 +450,7 @@ install_ipamclaim_crd() {
450450

451451
docker_create_second_disconnected_interface() {
452452
echo "adding second interfaces to nodes"
453-
local bridge_name="${1:-kindexgw}"
453+
local bridge_name="${1:-xgw}"
454454
echo "bridge: $bridge_name"
455455

456456
if [ "${OCI_BIN}" = "podman" ]; then
@@ -688,7 +688,7 @@ deploy_frr_external_container() {
688688
# Add route reflector client config
689689
sed -i '/remote-as 64512/a \ neighbor {{ . }} route-reflector-client' frr/frr.conf.tmpl
690690

691-
if [ "$KIND_IPV6_SUPPORT" == true ]; then
691+
if [ "$PLATFORM_IPV6_SUPPORT" == true ]; then
692692
# Check if IPv6 address-family section exists
693693
if ! grep -q 'address-family ipv6 unicast' frr/frr.conf.tmpl; then
694694
# Add IPv6 address-family section if it doesn't exist
@@ -706,7 +706,7 @@ deploy_frr_external_container() {
706706
fi
707707
./demo.sh
708708
popd || exit 1
709-
if [ "$KIND_IPV6_SUPPORT" == true ]; then
709+
if [ "$PLATFORM_IPV6_SUPPORT" == true ]; then
710710
# Enable IPv6 forwarding in FRR
711711
docker exec frr sysctl -w net.ipv6.conf.all.forwarding=1
712712
fi
@@ -725,10 +725,10 @@ deploy_bgp_external_server() {
725725
# | ovn-worker2 | from default pod network)
726726
# ---------------------
727727
local ip_family ipv6_network
728-
if [ "$KIND_IPV4_SUPPORT" == true ] && [ "$KIND_IPV6_SUPPORT" == true ]; then
728+
if [ "$PLATFORM_IPV4_SUPPORT" == true ] && [ "$PLATFORM_IPV6_SUPPORT" == true ]; then
729729
ip_family="dual"
730730
ipv6_network="--ipv6 --subnet=${BGP_SERVER_NET_SUBNET_IPV6}"
731-
elif [ "$KIND_IPV6_SUPPORT" == true ]; then
731+
elif [ "$PLATFORM_IPV6_SUPPORT" == true ]; then
732732
ip_family="ipv6"
733733
ipv6_network="--ipv6 --subnet=${BGP_SERVER_NET_SUBNET_IPV6}"
734734
else
@@ -746,7 +746,7 @@ deploy_bgp_external_server() {
746746
bgp_network_frr_v4=$($OCI_BIN inspect -f '{{index .NetworkSettings.Networks "bgpnet" "IPAddress"}}' frr)
747747
echo "FRR kind network IPv4: ${bgp_network_frr_v4}"
748748
$OCI_BIN exec bgpserver ip route replace default via "$bgp_network_frr_v4"
749-
if [ "$KIND_IPV6_SUPPORT" == true ] ; then
749+
if [ "$PLATFORM_IPV6_SUPPORT" == true ] ; then
750750
bgp_network_frr_v6=$($OCI_BIN inspect -f '{{index .NetworkSettings.Networks "bgpnet" "GlobalIPv6Address"}}' frr)
751751
echo "FRR kind network IPv6: ${bgp_network_frr_v6}"
752752
$OCI_BIN exec bgpserver ip -6 route replace default via "$bgp_network_frr_v6"
@@ -781,7 +781,7 @@ install_ffr_k8s() {
781781
# Allow receiving the bgp external server's prefix
782782
sed -i '/mode: filtered/a\ prefixes:\n - prefix: '"${BGP_SERVER_NET_SUBNET_IPV4}"'' receive_filtered.yaml
783783
# If IPv6 is enabled, add the IPv6 prefix as well
784-
if [ "$KIND_IPV6_SUPPORT" == true ]; then
784+
if [ "$PLATFORM_IPV6_SUPPORT" == true ]; then
785785
# Find all line numbers where the IPv4 prefix is defined
786786
IPv6_LINE=" - prefix: ${BGP_SERVER_NET_SUBNET_IPV6}"
787787
# Process each occurrence of the IPv4 prefix
@@ -827,7 +827,7 @@ EOF
827827
# Get subnet information
828828
subnet_json=$(kubectl get node $node -o jsonpath='{.metadata.annotations.k8s\.ovn\.org/node-subnets}')
829829

830-
if [ "$KIND_IPV4_SUPPORT" == true ]; then
830+
if [ "$PLATFORM_IPV4_SUPPORT" == true ]; then
831831
# Extract IPv4 address (first address)
832832
node_ipv4=$(echo "$node_ips" | awk '{print $1}')
833833
ipv4_subnet=$(echo "$subnet_json" | jq -r '.default[0]')
@@ -840,7 +840,7 @@ EOF
840840
fi
841841

842842
# Add IPv6 route if enabled
843-
if [ "$KIND_IPV6_SUPPORT" == true ]; then
843+
if [ "$PLATFORM_IPV6_SUPPORT" == true ]; then
844844
# Extract IPv6 address (second address, if present)
845845
node_ipv6=$(echo "$node_ips" | awk '{print $2}')
846846
ipv6_subnet=$(echo "$subnet_json" | jq -r '.default[1] // empty')

contrib/kind-helm.sh

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ set_default_params() {
2727
export KIND_REMOVE_TAINT=${KIND_REMOVE_TAINT:-true}
2828
export ENABLE_MULTI_NET=${ENABLE_MULTI_NET:-false}
2929
export ENABLE_NETWORK_SEGMENTATION=${ENABLE_NETWORK_SEGMENTATION:-false}
30+
export OVN_NETWORK_QOS_ENABLE=${OVN_NETWORK_QOS_ENABLE:-false}
3031
export KIND_NUM_WORKER=${KIND_NUM_WORKER:-2}
3132
export KIND_CLUSTER_NAME=${KIND_CLUSTER_NAME:-ovn}
3233
export OVN_IMAGE=${OVN_IMAGE:-'ghcr.io/ovn-kubernetes/ovn-kubernetes/ovn-kube-ubuntu:helm'}
@@ -79,7 +80,7 @@ set_default_params() {
7980
fi
8081

8182
# Hard code ipv4 support until IPv6 is implemented
82-
export KIND_IPV4_SUPPORT=true
83+
export PLATFORM_IPV4_SUPPORT=true
8384

8485
export OVN_ENABLE_DNSNAMERESOLVER=${OVN_ENABLE_DNSNAMERESOLVER:-false}
8586
}
@@ -98,6 +99,7 @@ usage() {
9899
echo " [ -ikv | --install-kubevirt ]"
99100
echo " [ -mne | --multi-network-enable ]"
100101
echo " [ -nse | --network-segmentation-enable ]"
102+
echo " [ -nqe | --network-qos-enable ]"
101103
echo " [ -wk | --num-workers <num> ]"
102104
echo " [ -ic | --enable-interconnect]"
103105
echo " [ -npz | --node-per-zone ]"
@@ -119,6 +121,7 @@ usage() {
119121
echo "-ikv | --install-kubevirt Install kubevirt"
120122
echo "-mne | --multi-network-enable Enable multi networks. DEFAULT: Disabled"
121123
echo "-nse | --network-segmentation-enable Enable network segmentation. DEFAULT: Disabled"
124+
echo "-nqe | --network-qos-enable Enable network QoS. DEFAULT: Disabled"
122125
echo "-ha | --ha-enabled Enable high availability. DEFAULT: HA Disabled"
123126
echo "-wk | --num-workers Number of worker nodes. DEFAULT: 2 workers"
124127
echo "-cn | --cluster-name Configure the kind cluster's name"
@@ -165,6 +168,8 @@ parse_args() {
165168
;;
166169
-nse | --network-segmentation-enable) ENABLE_NETWORK_SEGMENTATION=true
167170
;;
171+
-nqe | --network-qos-enable ) OVN_NETWORK_QOS_ENABLE=true
172+
;;
168173
-ha | --ha-enabled ) OVN_HA=true
169174
KIND_NUM_MASTER=3
170175
;;
@@ -218,6 +223,7 @@ print_params() {
218223
echo "KIND_REMOVE_TAINT = $KIND_REMOVE_TAINT"
219224
echo "ENABLE_MULTI_NET = $ENABLE_MULTI_NET"
220225
echo "ENABLE_NETWORK_SEGMENTATION = $ENABLE_NETWORK_SEGMENTATION"
226+
echo "OVN_NETWORK_QOS_ENABLE = $OVN_NETWORK_QOS_ENABLE"
221227
echo "OVN_IMAGE = $OVN_IMAGE"
222228
echo "KIND_NUM_MASTER = $KIND_NUM_MASTER"
223229
echo "KIND_NUM_WORKER = $KIND_NUM_WORKER"
@@ -242,7 +248,7 @@ check_dependencies() {
242248
done
243249

244250
# check for currently unsupported features
245-
[ "${KIND_IPV6_SUPPORT}" == "true" ] && { &>1 echo "Fatal: KIND_IPV6_SUPPORT support not implemented yet"; exit 1; } ||:
251+
[ "${PLATFORM_IPV6_SUPPORT}" == "true" ] && { &>1 echo "Fatal: PLATFORM_IPV6_SUPPORT support not implemented yet"; exit 1; } ||:
246252
}
247253

248254
helm_prereqs() {
@@ -414,6 +420,7 @@ helm install ovn-kubernetes . -f "${value_file}" \
414420
--set global.enableObservability=$(if [ "${OVN_OBSERV_ENABLE}" == "true" ]; then echo "true"; else echo "false"; fi) \
415421
--set global.emptyLbEvents=$(if [ "${OVN_EMPTY_LB_EVENTS}" == "true" ]; then echo "true"; else echo "false"; fi) \
416422
--set global.enableDNSNameResolver=$(if [ "${OVN_ENABLE_DNSNAMERESOLVER}" == "true" ]; then echo "true"; else echo "false"; fi) \
423+
--set global.enableNetworkQos=$(if [ "${OVN_NETWORK_QOS_ENABLE}" == "true" ]; then echo "true"; else echo "false"; fi) \
417424
${ovnkube_db_options}
418425
EOF
419426
)

0 commit comments

Comments
 (0)