Commit Graph

95330 Commits

Author SHA1 Message Date
Jefftree
4d979f6f12 Remove behaviors 2020-10-29 12:05:54 -07:00
Khaled (Kal) Henidak
7bdc244f4a add tests that update services while gate is off 2020-10-29 18:59:48 +00:00
Marek Siarkowicz
4b29b03573 Add datapolicy tags to staging/src/k8s.io/kubectl 2020-10-29 19:48:42 +01:00
Marek Siarkowicz
6c7132b284 Add datapolicy tags to staging/src/k8s.io/legacy-cloud-providers 2020-10-29 19:47:32 +01:00
Rahul Joshi
f32f46829c Mark SecondaryRangeName as deprecated. 2020-10-29 11:47:18 -07:00
Kubernetes Prow Robot
1968e96165
Merge pull request #95856 from knight42/refactor/disable-apiserver-insecure-port
refactor(apiserver): disable insecure port
2020-10-29 10:47:58 -07:00
Mike Dame
b7ba77c25b Move MatchNodeSelectorTerms to k8s.io/component-helpers 2020-10-29 13:39:13 -04:00
Andrew Keesler
875a46bd7c
exec credential provider: k8s.io/client-go/tools/auth/exec helper
Exec plugin implementations should be able to call
LoadExecCredentialFromEnv() in order to get everything they need to
operate (i.e., cluster information (as long as it is passed in) and
optionally per-cluster configuration).

Signed-off-by: Andrew Keesler <akeesler@vmware.com>
2020-10-29 13:38:50 -04:00
Andrew Keesler
c4299d15d5
exec credential provider: ProvideClusterInfo and kubeconfig shadow
- The main idea here is that we want to 1) prevent potentially large CA
  bundles from being set in an exec plugin's environment and 2) ensure
  that the exec plugin is getting everything it needs in order to talk to
  a cluster.
- Avoid breaking existing manual declarations of rest.Config instances by
  moving exec Cluster to kubeconfig internal type.
- Use client.authentication.k8s.io/exec to qualify exec cluster extension.
- Deep copy the exec Cluster.Config when we copy a rest.Config.

Signed-off-by: Andrew Keesler <akeesler@vmware.com>
2020-10-29 13:38:42 -04:00
wojtekt
a19f528351 Remove FieldMatchingFlags 2020-10-29 18:25:51 +01:00
wojtekt
7d5b96d5fc Adjust conversion generator to new converter changes 2020-10-29 18:25:51 +01:00
Marek Siarkowicz
d5f857be6e Add datapolicy tags to staging/src/k8s.io/kube-aggregator/ 2020-10-29 18:13:55 +01:00
Kubernetes Prow Robot
917dcbabe1
Merge pull request #95985 from saschagrunert/psp-seccomp-annotation-fix
Fix seccomp PSP docker/default annotation handling
2020-10-29 09:10:59 -07:00
Maciej Szulik
7c8e4c83fb
kubeconfig: add explicit path, if specified to loading precedence 2020-10-29 16:45:10 +01:00
Maciej Szulik
9a4dfec2be
Introduce api-extensions category in k8s apiserver
This category includes:
1. mutating admission configs
2. validating admission configs
3. CRDs
4. APIServices
2020-10-29 16:44:26 +01:00
knight42
cfc2b330a7
refactor(apiserver): ignore the insecure flags
Leave the insecure flags intact but stop serving on insecure port.
2020-10-29 23:20:17 +08:00
wojtekt
eb63da77ea Allow for configuring etcd progress notify interval on GCE 2020-10-29 15:43:51 +01:00
Sascha Grunert
5588f025e2
Fix seccomp PSP docker/default annotation handling
With the graduation of seccomp to GA we automatically convert the
deprecated seccomp profile annotation `docker/default` to
`runtime/default`. This means that we now have to automatically allow
`runtime/default` if a user specifies `docker/default` and vice versa in
an allowed PSP seccomp profile.

Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2020-10-29 14:08:14 +01:00
Kubernetes Prow Robot
2729b8e375
Merge pull request #95871 from damemi/move-unchanged-scheduler-helpers
Change function signature for MatchNodeSelectorTerms
2020-10-29 04:18:59 -07:00
Masashi Honma
8e84f3d78d local-up-cluster.sh: Pass SERVICE_CLUSTER_IP_RANGE to controller manager
Previously, SERVICE_CLUSTER_IP_RANGE was passed only to kube-apiserver.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
2020-10-29 17:47:19 +09:00
10177505
a0a79f4fe0 fix kubectl debug link error 2020-10-29 15:50:30 +08:00
Harsh Singh
1763688d71 Added config parameter for CPU threads 2020-10-29 12:16:10 +05:30
Kubernetes Prow Robot
518b826b1d
Merge pull request #95962 from xing-yang/manifests_owners
Update testing-manifests/storage-csi owners file
2020-10-28 23:36:59 -07:00
Rob Scott
2c7d186669
Updating EndpointSliceMirroring e2e test to accept multiple slices
Due to informer caching, this caused some flaky test failures.
2020-10-28 22:49:17 -07:00
Kubernetes Prow Robot
7a20fcf6ef
Merge pull request #95890 from barney-s/winlog_add_fluentd
If image has stack driver agent installed, use it.
2020-10-28 22:42:59 -07:00
Kubernetes Prow Robot
5937e7eef7
Merge pull request #92343 from knight42/fix/flags-before-plugin
fix(kubectl): print error if users place flags before plugin name
2020-10-28 20:30:58 -07:00
Pat Christopher
a30d2f6908
pin to latest k8s version 2020-10-28 19:49:57 -07:00
Pat Christopher
94ee60acc6
more versions 2020-10-28 19:49:57 -07:00
Pat Christopher
bf9e72eadd
rev versions 2020-10-28 19:49:57 -07:00
Pat Christopher
e5c20ca50a
use current method signatures 2020-10-28 19:49:57 -07:00
Kubernetes Prow Robot
ab02182419
Merge pull request #95965 from Huang-Wei/pc-conformance-deleteCollection
Update PriorityClass conformance test to cover DeleteCollection
2020-10-28 18:37:12 -07:00
Kubernetes Prow Robot
f3c957c349
Merge pull request #95947 from wojtek-t/bump_gce_master_sizes
Update function setting master node size for GCE
2020-10-28 18:36:58 -07:00
卢振兴10069964
9470f64a4f add audit-log-compress to apiserver 2020-10-29 09:33:05 +08:00
Kubernetes Prow Robot
1a37266208
Merge pull request #95411 from MHBauer/log-containerd
always collect containerd logs during e2e-node tests
2020-10-28 16:16:59 -07:00
Wei Huang
6ccbd3c9a9
Update PriorityClass conformance test to cover DeleteCollection 2020-10-28 15:35:46 -07:00
Nick Maliwacki
5712e33abc SetCondtion updates generation 2020-10-28 14:25:03 -07:00
xing-yang
b55bf4c49b Update testing-manifests/storage-csi owners file 2020-10-28 21:21:02 +00:00
Kubernetes Prow Robot
8bc8b11bcf
Merge pull request #95939 from dprotaso/leaderelection-release
Address scenario where releasing a resource lock fails if a prior update fails or gets cancelled
2020-10-28 13:54:06 -07:00
Kubernetes Prow Robot
d4771b9519
Merge pull request #95907 from aojea/testdualslices
dualstack endpoints integration tests
2020-10-28 13:53:53 -07:00
Kubernetes Prow Robot
2e18975d2b
Merge pull request #92956 from zhouya0/remove_dependency_between_create_rolebinding
Remove dependency of generators from  create rolebinding
2020-10-28 13:53:39 -07:00
Kubernetes Prow Robot
ec0ef23599
Merge pull request #95923 from deads2k/remove-deprecated
remove the deprecated client that we stopped generating
2020-10-28 12:50:11 -07:00
Kubernetes Prow Robot
9391b6d844
Merge pull request #95577 from knabben/remove-flake-pre-stop
Removing flaky tag from preStop test
2020-10-28 12:49:57 -07:00
Anago GCB
3166067036 CHANGELOG: Update directory for v1.20.0-beta.0 release 2020-10-28 18:57:29 +00:00
Kubernetes Prow Robot
23f5fcce57
Merge pull request #95870 from claudiubelu/images/pause-regex-fix
pause image: Stricter registry prefix regex
2020-10-28 11:33:57 -07:00
Dave Protasowski
5e7ed7b86d Re-add the event recorder in the release test
Prior having a mock recorder would cause panics since the lock
would be set to nil on update failures. Now the recorder will
use the cached lock
2020-10-28 14:08:36 -04:00
Dave Protasowski
8160ecfd90 Don't clear the cached resourcelock when errors occurs on updates
This allows the lock to be release normally - even with a
potentially stale lock. This flow should only occur when we're
the lease holders.
2020-10-28 14:08:36 -04:00
Dave Protasowski
23ce312b9f Add failing test showing release is not working properly 2020-10-28 14:08:36 -04:00
Tim Hockin
4f8fb1d3ca Wipe some fields on service "type" updates
Service has had a problem since forever:

- User creates a service type=LoadBalancer
- We silently allocate them a NodePort
- User changes type to ClusterIP
- We fail the operation because they did not clear NodePort

They never asked for or used the NodePort!

Dual-stack introduced some dependent fields that get auto-wiped on
updates.  This carries it further.

If you squint, you can see Service as a big, messy discriminated union,
with type as the discriminator. Ignoring fields for non-selected
union-modes seems right.

This introduces the potential for an apply loop. Specifically, we will
accept YAML that we did not previously accept. Apply could see the
field in local YAML and not in the server and repeatedly try to patch it
in. But since that YAML is currently an error, it seems like a very low
risk. Almost nobody actually specifies their own NodePort values.

To mitigate this somewhat, we only auto-wipe on updates. The same YAML
would fail to create. This is a little inconsistent. We could
auto-wipe on create, too, at the risk of more potential impact.

To do this properly, we need to know the old and new values, which means
we can not do it in defaulting or conversion. So we do it in strategy.

This change also adds unit tests and updates e2e tests to rely on and
verify this behavior.
2020-10-28 10:41:26 -07:00
Tim Hockin
c5f3e560e4 Make some methods into non-methods 2020-10-28 10:41:26 -07:00
Barni S
73916e5a9b If image has stackdriver agent installed, use it.
Check if stackdriver agent is preinstalled in the image. If so configure and use it.
Else check for fluentbit agent
2020-10-28 13:34:44 -04:00