Commit Graph

2243 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
1d1385af91 Merge pull request #83474 from msau42/topology-ga
CSI Topology ga
2019-11-04 15:28:27 -08:00
Ziheng Liu
8a6fdfd648 Fix a data race in registrytest
Signed-off-by: Ziheng Liu <lzhfromustc@gmail.com>
2019-10-28 19:22:06 -04:00
Michelle Au
603a2aa8a9 Add CSINode to storage/v1 2019-10-28 13:41:13 -07:00
Kubernetes Prow Robot
c2513c8ae3 Merge pull request #82603 from robscott/endpointslice-kubectl-fix
Fixing EndpointSlice kubectl output
2019-10-25 13:03:39 -07:00
Kubernetes Prow Robot
2152e1f0d5 Merge pull request #83864 from mrbobbytables/update-misc-api-machinery-owners
Prune inactive owners from pkg/* misc api-machinery related OWNERS files
2019-10-24 16:55:38 -07:00
Kubernetes Prow Robot
5238e1c80f Merge pull request #76362 from yue9944882/chore/follow-up-prune-internal-client-scheduling-v1-api
Follow-up of #71136: Switch system priority class usage to versioned (v1) api
2019-10-23 22:03:06 -07:00
Kubernetes Prow Robot
748a866d56 Merge pull request #84122 from smarterclayton/delete_success
storage: Deleting a namespace while spec.finalizers pending should not error
2019-10-23 12:51:10 -07:00
yue9944882
09cf42d67c switch system priority class to versioned (v1) api
move all the helpers to scheduling v1 helpers

less explicit conversion
2019-10-24 00:51:57 +08:00
Kubernetes Prow Robot
9fa1bc8003 Merge pull request #83422 from yastij/remove-ipallocator
remove ipallocator in favor of k/utils net package
2019-10-22 12:52:13 -07:00
Yassine TIJANI
f984b4c7a2 remove ipallocator in favor of k/utils net package
Signed-off-by: Yassine TIJANI <ytijani@vmware.com>
2019-10-22 18:37:13 +02:00
Clayton Coleman
2ddeb94b56 storage: Deleting a namespace while spec.finalizers pending should not error
All objects with graceful deletion allow multiple DELETE calls in the pending
state. Namespace is the one outlier, and the error here predates graceful
deletion and finalizers. We should make this behavior consistent with other
calls and merely indicate success and return the state of the object, the
same as if there were pending metadata finalizers.

Clients that previously checked for a conflict error during delete to know
that the server is already deleting will now no longer receive an error
(as if the object were rapidly deleted). There is a small chance that some
clients have error checking for this state, but a much larger chance that
clients that want to trigger a delete of the namespace do not handle this
error case.

Discovered in an e2e test that used the framework namespace and triggered
deletion of that ns itself, and then the AfterEach step in e2e failed
because the namespace was already pending deletion.
2019-10-19 23:08:17 -04:00
Kubernetes Prow Robot
cb19b56831 Merge pull request #83419 from deads2k/insecure-backend-proxy
Insecure backend proxy
2019-10-16 13:58:38 -07:00
David Eads
867ee1d5ff add insecurebackendproxy 2019-10-16 11:43:17 -04:00
Ted Yu
0779296bf3 Check error return from snapshot Restore 2019-10-13 10:08:20 -07:00
Bob Killen
75f76d15bd Prune inactive owners from pkg/* misc api-machinery related OWNERS files. 2019-10-13 08:46:12 -04:00
tanjunchen
de3cf23414 remove the repeat word in documents 2019-10-06 23:32:01 +08:00
Rob Scott
57757b65c7 Fixing EndpointSlice kubectl output 2019-09-24 13:12:23 -07:00
Jordan Liggitt
92eb072989 Propagate context to Authorize() calls 2019-09-24 11:14:54 -04:00
Jan Janik
80cb726110 Match label and fields selectors in ComponentStatus List API 2019-09-07 21:56:58 +12:00
Kubernetes Prow Robot
7e906ae145 Merge pull request #82047 from roberthbailey/owners
Remove myself from reviewers across the repo
2019-09-04 04:35:00 -07:00
Kubernetes Prow Robot
550fb1bfc3 Merge pull request #79386 from khenidak/phase2-dualstack
Phase 2 dualstack
2019-08-28 20:39:56 -07:00
Kubernetes Prow Robot
6c9f26ca3a Merge pull request #80766 from robscott/discovery-api
Adding Discovery API for EndpointSlice
2019-08-28 14:44:09 -07:00
Khaled Henidak(Kal)
c27e0b029d phase 2: generated items 2019-08-28 16:11:46 +00:00
Khaled Henidak(Kal)
93c06821e6 Phase 2: service and endpoint processing 2019-08-28 15:59:43 +00:00
Khaled Henidak(Kal)
5e8ccda71c phase 2: api types + defaulting + validation + disabled fields handling 2019-08-28 15:59:43 +00:00
Robert Bailey
9d211ab352 Remove myself from reviewers across the repo so that PRs are no
longer assigned to me by blunderbuss.

Move myself to be an emeritus approver for the cluster directory.
2019-08-27 16:10:16 -07:00
Rob Scott
f80cee9280 Adding discovery/v1alpha1 API for EndpointSlices 2019-08-26 14:50:00 -07:00
Kubernetes Prow Robot
087aafc18d Merge pull request #80568 from pohly/ephemeral-mode-check
ephemeral mode check
2019-08-26 11:53:40 -07:00
Tim Hockin
ec60426793 Add dropDisbledFields() to service 2019-08-22 21:36:39 -07:00
Di Xu
d4d696d0f2 add legacyBinding for non-Named Binding Creater 2019-08-22 11:46:12 +08:00
Di Xu
b28f62c8ad check pod name with that in pod eviction object 2019-08-22 11:46:12 +08:00
Di Xu
5ed1b8fa29 check pod name with that in binding object 2019-08-22 11:46:12 +08:00
Jordan Liggitt
61774cd717 Plumb context to admission Admit/Validate 2019-08-20 11:11:00 -04:00
Kubernetes Prow Robot
b581f97009 Merge pull request #81325 from tedyu/etcd-ret-err
Propagate error from NewEtcd
2019-08-16 10:26:09 -07:00
Ted Yu
2374f9ad7c Propagate error from NewEtcd 2019-08-14 16:46:23 -07:00
Patrick Ohly
b60f08e24b storage: validate CSIDriver.Spec.VolumeLifecycleModes
This ensures that users get a good error message early on when trying
to do something that isn't okay:

  $ kubectl create -f csi-hostpath-driverinfo.yaml
  The CSIDriver "hostpath.csi.k8s.io" is invalid: spec.volumeLifecycleModes: Unsupported value: "foobar": supported values: "persistent", "ephemeral"
2019-08-13 23:12:48 +02:00
Patrick Ohly
f7742fd31a storage: generated files for CSIDriver.Spec.VolumeLifecycleModes 2019-08-13 23:11:42 +02:00
Patrick Ohly
029fd47757 storage: introduce CSIDriver.Spec.VolumeLifecycleModes
Using a "normal" CSI driver for an inline ephemeral volume may have
unexpected and potentially harmful effects when the driver gets a
NodePublishVolume call that it isn't expecting. To prevent that mistake,
driver deployments for a driver that supports such volumes must:
- deploy a CSIDriver object for the driver
- list "ephemeral" as one of the supported modes

The default is "persistent", so existing deployments continue to work
and are automatically protected against incorrect usage.

This commit contains the API change. Generated code and manual code
which uses the new API follow.
2019-08-13 23:11:36 +02:00
Kubernetes Prow Robot
890b50f98b Merge pull request #80952 from tedyu/storage-ret-err
Propagate error from NewREST
2019-08-12 18:21:52 -07:00
Ted Yu
87b2a3129b Propagate error from NewREST 2019-08-12 13:55:35 -07:00
Mark Janssen
231d2a9617 Fix golint failures of pkg/registry/core/event 2019-08-06 21:13:55 +02:00
wojtekt
467f5e96ee Fix some golint failures 2019-07-25 20:38:28 +02:00
wojtekt
117a0e525d Unify secret and configmap triggers 2019-07-25 20:35:20 +02:00
Lee Verberne
4a753c7a44 Generated code for ephemeral containers API 2019-07-22 11:19:22 +00:00
Lee Verberne
013f049ce0 Add Ephemeral Containers to the Kubernetes core API 2019-07-22 11:19:22 +00:00
Ted Yu
6e98aab26e Rename TriggerPublisherFunc as IndexerFunc 2019-07-18 06:45:51 -07:00
Kubernetes Prow Robot
cb9c6f43a5 Merge pull request #80260 from khenidak/fix-panic-in-pod-strategy
fix panic in ResourceLocation in case of empty pod ip list
2019-07-17 21:28:23 -07:00
Khaled Henidak(Kal)
41f313570e fix panic in ResourceLocation in case of empty pod ip list 2019-07-17 18:30:08 +00:00
wojtekt
68fd329e00 Simplify trigger functions in cacher 2019-07-16 08:55:34 +02:00
wojtekt
ee13be2884 Propagate error from creating cacher and storage decorators up 2019-07-15 20:48:30 +02:00