Commit Graph

106614 Commits

Author SHA1 Message Date
Antonio Ojea
60502c9b32 endpointslice: don't try to update topology cache if node informer error 2022-02-11 12:14:01 +01:00
David Hotham
62eb74880c
Completions for kubectl config delete-user 2022-02-11 10:06:26 +00:00
Kubernetes Prow Robot
49dc226381
Merge pull request #108020 from tossmilestone/remove-tolerate-unready-ep-annotation
Remove tolerate-unready-endpoints annotation
2022-02-11 01:40:04 -08:00
Kubernetes Prow Robot
f06baf9f36
Merge pull request #108053 from eddiezane/ez/update-kubectl-stack-log
Change level for klog.Fatal in kubectl
2022-02-11 00:36:04 -08:00
Antonio Ojea
5a20c425f2 apiserver: use endpoint lease reconciler as default
The apiserver owns and manages the kubernetes.default service.

It has 3 different options to reconcile the endpoints that belong to
that service:

- None: endpoints are handled by an external party.
- MasterCount: legacy, it reconciles based on the endpoints generated
and a flag specifying the number of master on the cluster.
- Lease: default since 1.11, each apiserver writes a lease in etcd
and renews periodically, the endpoints are generated based on the
existing leases.

It seems that when the default was set for the lease reconciler, the
controlplane code wasn't updated and kept using the master count
reconciler.

This also starts the deprecation of the master count reconciler in
favor of the lease reconciler.
2022-02-11 09:00:54 +01:00
Arda Güçlü
9b5d9c70fc Discard null values in complex objects in strategic patch
In strategic patch, if key does not exist in original, value of this
new key is not distilled by discarding the null values.

That brings about in key creation step, null values are also patched. However,
during the update process of this key in subsequent patches, these null values
are deleted and this hurts the idempotency of strategic patch.

This PR adds discard mechanism for null values if key does not exist
in original. It traverses all nested objects.
2022-02-11 10:41:39 +03:00
Raghav Roy
e167d44a17 Updated k8s.io/utils dependency
Signed-off-by: Raghav Roy <raghavroy145@gmail.com>
2022-02-11 13:03:54 +05:30
Kubernetes Prow Robot
7cfe0ca828
Merge pull request #107774 from calvin0327/fix-data-race
fix: data race when hijack klog
2022-02-10 23:32:15 -08:00
Kubernetes Prow Robot
627465b3c1
Merge pull request #107650 from apelisse/update-managedfields-time-field-description
Update ManagedFields Time description to be more accurate
2022-02-10 23:32:03 -08:00
Kubernetes Prow Robot
bd6b5b1229
Merge pull request #108058 from verult/remove-owners
Remove verult from OWNERS files
2022-02-10 19:28:03 -08:00
Cheng Xing
b152fa9b6c Remove verult from OWNERS files 2022-02-10 18:25:38 -08:00
Mengjiao Liu
bc55118b5b Improve test coverage: add unit tests TestReadAtMost in pkg/util/tail 2022-02-11 10:20:42 +08:00
Kubernetes Prow Robot
438c3a51e6
Merge pull request #108055 from liggitt/api-compatibility
Catch unused API compatibility fixtures
2022-02-10 17:50:18 -08:00
David Porter
0ec1530e41 log grabbing: obtain timestamps on extra services
Previously if any test jobs added additional log dumps, such as
`containerd-installation` for example, the logs would grabbed with `sudo
journalctl --output=cat`. `--output=cat` excludes timestamps which
makes debugging difficult. Let's use `short-precise` output similar to
to the other log grabbing commands which includes timestamps.

Signed-off-by: David Porter <david@porter.me>
2022-02-10 16:44:31 -08:00
Kubernetes Prow Robot
5a765040da
Merge pull request #107210 from jonyhy96/feat-pod-name-quota
feat: add container name when violate quota constraints
2022-02-10 14:59:17 -08:00
Jordan Liggitt
384ab8d53c Remove unused API compatibility fixture files 2022-02-10 17:40:51 -05:00
Jordan Liggitt
bd405cd8b0 Add check for unused API compatibility fixture files 2022-02-10 17:40:25 -05:00
David Porter
3281504a50 cluster/ - Configure containerd only if necessary
PR #107663 changed the startup logic to always call `SetupContainerd`
which will generate a new containerd `/etc/containerd/config.toml` file.

This is not always desired since some jobs install containerd from
source and the containerd startup scripts
(https://github.com/containerd/containerd/blob/main/contrib/gce/configure.sh)
are responsible for generating the `/etc/containerd/config.toml` file.
By always calling `SetupContainerd`, the containerd configuration by
containerd's `configure.sh` will be overridden which breaks certain test
jobs, see https://github.com/kubernetes/kubernetes/issues/107830.

To fix this issue, only call `SetupContainerd` if
`/etc/profile.d/containerd_env.sh` does not exist. When containerd
`configure.sh` script will run, `/etc/profile.d/containerd_env.sh` will
be written, and as a result the k8s setup scripts should avoid
overriding the containerd configuration.

Signed-off-by: David Porter <david@porter.me>
2022-02-10 14:24:14 -08:00
Jordan Liggitt
05bfa26791 Add hpa v2 compatibility fixtures 2022-02-10 17:23:46 -05:00
Kevin Klues
155562dd2e Fix bug in TopologyManager with merging hints when NUM_NUMA > 2
Before this fix, hint permutations such as:

	permutation: [{11 true} {0101 true}]

Could result in merged hints of:

	mergedHint: {01 true}

This was possible because both hints in the permutation container a "preferred"
allocation (i.e. the full set of NUMA nodes set in the affinity bitmask are
*required* to satisfy the allocation). With this in place, the simplified logic
we had simply kept the merged hint as preferred as well.

However, what we really want is to ensure that the merged hint is only
preferred if *true* alignment of all resources is possible (i.e. if all hints
in the permutation are preferred AND their affinities are exactly equal).

The only exception to this is if *no* topology information is provided by a
given hint provider. In this case, we assume alignment doesn't matter and only
consider the resources that actually have hints provided for them.

This changes the semantics of permutations of the form:

	permutation: [{111 true} {011 true}]

To now result in the merged hint of:

	mergedHint: {011 false}

Instead of:

	mergedHint: {011 true}

This is arguably how it should always have been though (because a hint should
not be preferred if true alignment isn't possible), and two tests have had to
change to accomodate these new semantics.

This commit changes the merge function to implement the updated logic, adds a
test to verify it is functioning correctly, and updates the two tests mentioned
above to adjust to the new semantics.

Signed-off-by: Kevin Klues <kklues@nvidia.com>
2022-02-10 22:07:51 +00:00
Eddie Zaneski
cd71d3f788
Change level for klog.Fatal
Signed-off-by: Eddie Zaneski <eddiezane@gmail.com>
2022-02-10 14:43:19 -07:00
Antoine Pelisse
f19efa7391 Run hack/update-all.sh 2022-02-10 21:07:37 +00:00
Kubernetes Prow Robot
3866cb91f2
Merge pull request #107921 from mpuckett159/feature/show-ingress-class
Add Ingress Class to kubectl describe ingress output
2022-02-10 11:57:28 -08:00
Wojciech Tyczyński
7314286efd Fix validation of event updates 2022-02-10 20:01:45 +01:00
Kubernetes Prow Robot
542a979c03
Merge pull request #108029 from deads2k/just-runtimeconfig
update the --runtime-config handling to ensure that user preferences always take priority over hardcoded preferences
2022-02-10 10:15:57 -08:00
Kubernetes Prow Robot
973e77ceb1
Merge pull request #102330 from tnqn/replicaset-optimization
Add controllerUID index to improve ReplicaSetController performance
2022-02-10 10:15:46 -08:00
Kubernetes Prow Robot
56c5413dc6
Merge pull request #108039 from MadhavJivrajani/clusterscope-test-context
resttest: Modify TestContext to have namespace in context
2022-02-10 08:21:58 -08:00
Kubernetes Prow Robot
edd1f15c7c
Merge pull request #106279 from oomichi/add-note-vsphere
Add note for the deprecated vSphere 6.5
2022-02-10 08:21:47 -08:00
Lubomir I. Ivanov
f6fbf6c6e6 kubeadm: remove mentions of the x.yy versioned kubelet config CM
The legacy naming "kubelet-config-x.yy" is no longer the
default behavior. Rename instances in documentation and comments
of "kubelet-config-x.yy" to "kubelet-config".
2022-02-10 18:14:50 +02:00
Sascha Grunert
effbcd3a0a
Add support for CRI verbose fields
The remote runtime implementation now supports the `verbose` fields,
which are required for consumers like cri-tools to enable multi CRI
version support.

Signed-off-by: Sascha Grunert <sgrunert@redhat.com>
2022-02-10 17:12:26 +01:00
David Eads
41b2662bac update resourceconfig to have per-resource preferences take priority 2022-02-10 10:53:16 -05:00
Kubernetes Prow Robot
dd3a30fdbb
Merge pull request #106398 from shawnhanx/controller_utils
should omit comparison to bool constant in pkg/controller/controller_utils.go
2022-02-10 07:17:46 -08:00
Kubernetes Prow Robot
a3207872a3
Merge pull request #107481 from shu-mutou/deprecate-dashboard-addon
Remove dashboard cluster addon
2022-02-10 05:35:48 -08:00
Kubernetes Prow Robot
56273a6aa3
Merge pull request #108042 from MadhavJivrajani/cacher-cleanup
cacher: Minor cleanup and refactor of code and tests
2022-02-10 04:29:46 -08:00
Madhav Jivrajani
c3081b4875 cacher: Minor cleanup and refactor of code and tests
* Remove linter warnings.
* Cancel contexts to avoid leaks.
* Rename a few XXXThreadUnsafe to XXXLocked to
  maintain consistency.
  * A few are still called XXXThreadUnsafe mainly
    because those are safe to be called from the
    perspective that only one gorotuine will access
    them - not really called under a lock.

Signed-off-by: Madhav Jivrajani <madhav.jiv@gmail.com>
2022-02-10 16:57:39 +05:30
Ciprian Hacman
0819451ea6 Clean up logic for deprecated flag --container-runtime in kubelet
Signed-off-by: Ciprian Hacman <ciprian@hakman.dev>
2022-02-10 13:26:59 +02:00
Kubernetes Prow Robot
3b4a9cdfff
Merge pull request #108007 from endocrimes/dani/cm-remove-docker
cm: Remove legacy docker references
2022-02-10 03:23:47 -08:00
Kubernetes Prow Robot
518a3c2f70
Merge pull request #107108 from linxiulei/fix_pid
Read number of running processes from /proc/loadavg.
2022-02-10 01:15:47 -08:00
Madhav Jivrajani
412626f402 resttest: Modify TestContext to have namespace in context
Previously, if a request is clusterscoped, the context that
was returned has no namespace, ideally the context should
contain a metav1.NamespaceNone as the namespace even for
cluster scoped requests.

Signed-off-by: Madhav Jivrajani <madhav.jiv@gmail.com>
2022-02-10 12:54:15 +05:30
Mengjiao Liu
b3444cd7e8 Remove feature gate SetHostnameAsFQDN 2022-02-10 15:16:01 +08:00
Shu Muto
f9954d02c4 Delete test/e2e/ui/ 2022-02-10 14:48:02 +09:00
Kubernetes Prow Robot
40c2d04946
Merge pull request #107112 from linxiulei/fix_pidmax
Consider threads-max when deciding MaxPID.
2022-02-09 20:49:45 -08:00
Kubernetes Prow Robot
71977b6f07
Merge pull request #107691 from SubhasmitaSw/issue_31393
Removed references to Docker in Kubernetes API #31393
2022-02-09 18:33:46 -08:00
Kante
62eb70c1b3
reuse InformerFactory in scheduler tests (#107835)
* reuse informer in scheduler tests

Signed-off-by: kerthcet <kerthcet@gmail.com>

* reduce construct two informers

Signed-off-by: kerthcet <kerthcet@gmail.com>

* instantiate formerfacotry error

Signed-off-by: kerthcet <kerthcet@gmail.com>
2022-02-09 16:53:58 -08:00
Kubernetes Prow Robot
0dcd6eaa0d
Merge pull request #103934 from boenn/tainttoleration
De-duplicate predicate (known as filter now) logic shared in kubelet and scheduler
2022-02-09 16:53:46 -08:00
Marcus Puckett
e7e2bfde16 Specify empty IngresClassName as <none> to more clearly specify it is empty 2022-02-09 16:28:16 -08:00
Kubernetes Prow Robot
cfb2219ded
Merge pull request #107175 from roycaihw/doc/webhook-rule-validation
Fix examples of admission registration rules that contain wildcards
2022-02-09 15:35:44 -08:00
Kubernetes Prow Robot
e74c42aaf2
Merge pull request #107880 from liggitt/kubectl-auth-token
Add command to request a bound service account token
2022-02-09 14:10:01 -08:00
Kubernetes Prow Robot
6ab748eeec
Merge pull request #107698 from tallclair/psa-overrides
[PodSecurity] Deduplicate errors between baseline & restricted checks
2022-02-09 14:09:49 -08:00
David Eads
e378fd2bae update the --runtime-config handling to ensure that user preferences always take priority over hardcoded preferences 2022-02-09 16:00:09 -05:00