Releases: flannel-io/flannel
v0.8.0-rc1
This is an early release candidate for the upcoming flannel v0.8.0 release with the goal of getting community feedback from the new (and removed) features.
Please provide feedback through one of the following channels:
- Slack: #flannel on Calico Users Slack
- Mailing list: coreos-dev
- IRC: #coreos on freenode.org
The following PRs are in this release:
New features
#701 backend/extension: Introduce new extension backend
#717 aws-vpc: add support for multiple route tables
#571 Add ali cloud VPC network support
Removed features
#633 Remove the experimental support for multiple networks.
#606 remote: Remove experimental remote support
Bug fixes
#675 subnet/etcdv2: Fix panic from bad error contruction
#693 Keep route: [ 0.0.0.0/0 via ECS instance ] to work with alicloud DNAT…
Documentation improvements
#714 docs: adding CNI plugin note.
#715 docs: adding pointer to reservations.md.
#713 docs: adding MTU note.
#679 flannel-docs: Updating flannel Documents files.
#682 Flannel ReadMe: Added Tom's notes.
#700 Add templates for PRs/Issues
#707 Fixes typo
#702 bill-of-materials: initial commit
#656 Documentation: Split README into multiple files
#625 added production users and integrations pages
#622 Typo corrected in README.md
Multi platform support
#703 network order functionality changed based on endianess
#686 update the LIB_DIR for s390x
#650 Build tar.gz for ppc64le, arm and arm64 arch
#547 Modifying pkg/ip/ipnet.go to fix endian problem
Build changes and small code cleanups
#689 Add iptables binaries
#690 Update kube-flannel.yml to use 0.7.1 flannel image
#687 vendor: remove files not needed for building
#684 Makefile: add libpthread* to make clean
#669 Makefile: Fix the releases target
#662 Makefile: Use $(CURDIR)
#597 vendor: Revendor with more sensible pinnings
#645 functional-test: Add a simple bandwidth test
#658 Fix various little problems found by gometalinter
#629 Backends: Remove Run() from interface as it's not used
#697 main.go: Remove a reference to client/server mode
#631 subnet: Move etcd files into their own package.
#594 README: Update build instructions
#575 backend/vxlan: Make variables more verbose
Kubernetes integration changes
#665 Explicit operator: Exists to allow toleration on masters
#652 kube-flannel: Add namespace for compatibility with RBAC rules
#618 Tolerate flannel running on master nodes
#614 Simplify rbac creation process
#593 Documentation: Update releases to v0.7.0
#591 Add Kubernetes RBAC support
#600 [doc][kube-flannel] set explicit arch on daemonset images
v0.7.1
This is primarily a bug fix release which has the following key fixes and improvements.
Kube Subnet Manager
This release introduces a new experimental feature. The Kubernetes API server can now be used as a datastore instead of etcd. This makes deployment easier as flannel no longer directly relies on the presence of an etcd server. To use it, pass the -kube-subnet-mgr
option to the flannel daemon.
This release also contains a large number of merged PRs (thanks everyone for all your contributions, please keep them coming) and some other build, documentation and other minor improvements.
Key PRs merged
kubernetes API server as datastore
#483 add a subnet manager backed by the kubernetes apiserver
#564 Improve kube subnet lease handling
#518 Fix the kube-flannel.yaml in order to work
AWS backend
#540 AWS VPC backend fixes and cleanups
#523 aws-vpc: Fix crash when route has vpc-endpoints
#524 aws-vpc: remove "blackholes"
#507 Update aws-vpc-backend.md
Key Bug fixes
#522 Fixed #521: flanneld hang on at initialEvtsBatch := <-evts because of…
#495 The docker daemon syntax change addressed
#576: backend/vxlan: Set the netmask of the IP used for the vxlan device
Logging
#565 network manager: Improve logging
#555 vxlan logging verbosity
#574: backend/vxlan: Improve the comments and logging
Testing
#490 Add functional (end-to-end) testing
#503 Run e2e tests on travis
Fix logging issue
This is a small point release that fixes a logging issue.
For a complete list of changes v0.6.1...v0.6.2
Now with more pthread
This is a small point release that adds the pthread library to the busybox-based deploy images.
For a complete list of changes v0.6.0...v0.6.1
Bug fix and refactoring release
This is the first release in a while so it's rolling up a large number of small improvements and bug fixes.
- small docs changes
- overhaul of the build system
- experimental support for arm and PPC. The images on quay.io are tagged with the version and architecture. This may change in future so the architecture becomes part of the image name.
- image tags have a
v
prefix so they match the reported version and git tag name.
- improvements to stability and UX tweaks
- refactoring mainly driven by reservation support
- some new features
For a complete list of changes v0.5.5...v0.6.0
NOTE: The deploy images for this version are broken - use version 0.6.1 instead
Bug fix release
- Bug fix: out of memory crash when vxlan used with bonded interfaces.
Maintenance release
While we're waiting for 0.6.0, this release picks few bug fixes and small improvements from master.
- Use official AWS api libs. Makes flannel work with eu-central-1. Thanks, @kdomanski
- In server mode, notify systemd of readiness once the server is listening. Thanks, @ingvagabund
- Masquerade host to flannel traffic
- Bug fix: close http connection during watch in client mode. Thanks, @jonboulle
Maintenance release
This release brings bug fixes, a missing feature needed for CNI integration and internal improvements.
New features:
FLANNEL_NETWORK
will be printed to subnet.env with the CIDR value of the whole network. Makes CNI integration possible.- Add logos to docs
Bug fixes:
- Don't propagate own lease notifications to backends.
- Eliminate race in http request cancellations in the tests.
- Fix for kernels that report "special" ARP entries with nil IP that caused VXLAN to not work
- mk-docker-opts.sh --
-m
options was not processed
Internal improvements:
- Switch to new etcd client lib
- Switch to using go-iptables lib
- Switch to using flagutils lib
NAT support and client/server TLS
New features:
- --public-ip allows specifying IP to publish in etcd. This helps with NAT traversal. Note that there's still no encryption so going across the WAN is risky without application level encryption. Thank you, @cusspvz
- Communication between client and server (for client/server mode) can optionally be encrypted by TLS. Also supports auth via client side certs.
- Docs for aws-vpc and gce. Thanks @robszumski and @MohdAhmad
Bug fixes:
- Ignore route to local ext IP in hostgw mode. Thank you, @lvlv
- Fix seg fault when aws subnet linked to main route table