Commit Graph

107239 Commits

Author SHA1 Message Date
Patrick Ohly
b1aefb9b90 storage capacity: generated files 2022-03-14 20:05:45 +01:00
Patrick Ohly
5122b6bb92 storage capacity: clarify relationship between capacity fields 2022-03-14 20:05:45 +01:00
Patrick Ohly
921edae2b4 storage capacity: v1 API 2022-03-14 20:05:45 +01:00
Patrick Ohly
3a7deaa141 storage capacity: GA, always enabled, remove feature check
The code and tests for scenarios where the feature is disabled are no longer
needed because the feature is graduating to GA.
2022-03-14 20:05:45 +01:00
xing-yang
aae1f2c476 Update sig-storage owners file 2022-03-14 18:57:52 +00:00
cici37
6b2907be8c Wire runtime cost into validation. 2022-03-14 11:54:52 -07:00
Kubernetes Prow Robot
faa027ca2b
Merge pull request #108214 from stevekuznetsov/skuznets/lease-manager-fix
storage: etcd: clarify lease manager configurations
2022-03-14 11:35:14 -07:00
sanposhiho
6141aa53f9 Implement MinDomains 2022-03-15 01:38:44 +09:00
Kubernetes Prow Robot
9642a1f84b
Merge pull request #108662 from dobsonj/issue89290
CSI inline volumes should support fsGroup
2022-03-14 09:34:10 -07:00
Kubernetes Prow Robot
5b52c4d127
Merge pull request #107674 from sanposhiho/api-min-domains
Add MinDomains API to TopologySpreadConstraints field
2022-03-14 09:33:57 -07:00
Kevin Klues
b815122f17 Add klueska to test/e2e/node/OWNERS file
Signed-off-by: Kevin Klues <kklues@nvidia.com>
2022-03-14 17:02:25 +01:00
Kubernetes Prow Robot
39a3586e67
Merge pull request #108676 from Riaankl/add-log-endpoint-to-ineligible_endpoints.yaml
Update ineligible_endpoints.yaml to include Log endpoints
2022-03-14 06:36:21 -07:00
Roman Bednar
f17f00363b csi_attacher: improve attach/detach timeout message
If we time out waiting for volume to be attached the message given
to user is not informative enough:

"Attach timeout for volume vol-123"

It would be better if we provide more information on what's going on
and even include name of the driver that's causing the problem, e.g.:

"timed out waiting for external-attacher of ebs.csi.aws.com CSI driver to attach volume vol-123"
2022-03-14 11:00:22 +01:00
cpanato
1ef8e9a0b4
Update publishing-bot rules for Go 1.17.8 / 1.16.15
Signed-off-by: cpanato <ctadeu@gmail.com>
2022-03-14 10:17:26 +01:00
chymy
5374f6fad8 Fix comment typo
Signed-off-by: chymy <chang.min1@zte.com.cn>
2022-03-14 16:53:29 +08:00
Jian Li
0eae1f3add make comments of updateIndices optimization code more accurate 2022-03-14 13:56:17 +08:00
Riaan Kleinhans
454571b1bc
add log endpoint to ineligible_endpoints.yaml 2022-03-14 09:59:21 +13:00
Yongkun Gui
78a507b256 Fix health check from Google's Load Balancer
This change adds 2 options for windows:
--forward-healthcheck-vip: If true forward service VIP for health check
port
--root-hnsendpoint-name: The name of the hns endpoint name for root
namespace attached to l2bridge, default is cbr0

When --forward-healthcheck-vip is set as true and winkernel is used,
kube-proxy will add an hns load balancer to forward health check request
that was sent to lb_vip:healthcheck_port to the node_ip:healthcheck_port.
Without this forwarding, the health check from google load balancer will
fail, and it will stop forwarding traffic to the windows node.

This change fixes the following 2 cases for service:
- `externalTrafficPolicy: Cluster` (default option): healthcheck_port is
10256 for all services. Without this fix, all traffic won't be directly
forwarded to windows node. It will always go through a linux node and
get forwarded to windows from there.
- `externalTrafficPolicy: Local`: different healthcheck_port for each
service that is configured as local. Without this fix, this feature
won't work on windows node at all. This feature preserves client ip
that tries to connect to their application running in windows pod.

Change-Id: If4513e72900101ef70d86b91155e56a1f8c79719
2022-03-11 22:34:59 -08:00
Kubernetes Prow Robot
45f2c63d6a
Merge pull request #108661 from thockin/makefile-pass-SHELL
Makefile: Pass SHELL to sub-make
2022-03-11 20:30:34 -08:00
Kubernetes Prow Robot
72e67a6b15
Merge pull request #108659 from thockin/makefile-whitespace
Makefile whitespace cleanup
2022-03-11 20:30:22 -08:00
Kubernetes Prow Robot
281b07d963
Merge pull request #108660 from thockin/makefile-dolla-dolla
Makefile: use $$ in `define` blocks
2022-03-11 18:10:23 -08:00
Kubernetes Prow Robot
b2c5bd2a27
Merge pull request #107056 from jsturtevant/remove-sac-from-pause
Remove unsupported Windows SAC images from pause image
2022-03-11 16:32:34 -08:00
Kubernetes Prow Robot
d2ce895e07
Merge pull request #107055 from jsturtevant/remove-unsupported-sac
Remove unsupported Windows SAC  test images
2022-03-11 16:32:23 -08:00
Jonathan Dobson
88a1962e56 CSI inline volumes should support fsGroup 2022-03-11 16:14:06 -07:00
Tim Hockin
ebbc4716a7 Makefile: Pass SHELL to sub-make
It turns out that:

a) SHELL does not automatically get passed down
b) we were resetiing SHELL in the sub-make anyway
2022-03-11 14:51:38 -08:00
Tim Hockin
04a1d20deb Makefile: use $$ in define blocks
Make's "define" feature (macros) is subtle and it took me a long time to
convince myself this all works. In particular, we (prior to this commit)
are terribly inconsistent about the use of `$` vs `$$`.  We mostly get
away with it because the "variables" are more like "constants", but the
inconsistency trips up some things.  For example, using `$(shell)`
inside a macro will run at macro expansion time rather than when the
resulting make code is executed.

For a contrived, but concrete example, derived from our Makefile:

```
define MACRO
ifeq ($(DBG),1)
  $(warning dbg is $(DBG))
endif
endef # macro

TGTS=a b c
$(foreach pfx, $(TGTS), $(eval $(MACRO)))

default:
	@echo $@
```

yields:

```
$ make
Makefile:8: dbg is
Makefile:8: dbg is
Makefile:8: dbg is
default

$ make DBG=1
Makefile:8: dbg is 1
Makefile:8: dbg is 1
Makefile:8: dbg is 1
default
```

This is because `$(warning)` is evaluated as the macro is expanded.
Replace that with `$(shell)` and you can see how you might end up
running a bunch of things you didn't need to run.  The fix is:

```
define MACRO
ifeq ($(DBG),1)
  $$(warning dbg is $$(DBG))
endif
endef # macro

TGTS=a b c
$(foreach pfx, $(TGTS), $(eval $(MACRO)))

default:
        @echo $@
```

which yields:

```
$ make
default

$ make DBG=1
Makefile:8: dbg is 1
Makefile:8: dbg is 1
Makefile:8: dbg is 1
default
```

We COULD have only changed `$(warning)` to `$$(warning)` and left
`$(DBG)` alone, because that's a cheap expansion.  I chose NOT to do
that here because it requires brainpower to think about this all, and it
seems easier to set a simple rule: inside a `define`/`endef` block, you
always use `$$` unless you KNOW that you NEED expansion-time evaluation
(as in the `$(prefix)` in this commit, which is effectively an argument
to the macros).
2022-03-11 14:49:47 -08:00
Tim Hockin
be7651f642 Makefile whitespace cleanup 2022-03-11 13:38:25 -08:00
Kubernetes Prow Robot
b4f7da1ec8
Merge pull request #108614 from gnufied/remove-support-for-volume-expansion-between-stage-publish
Remove support for previously deprecated nodeExpand call
2022-03-11 13:26:45 -08:00
Kubernetes Prow Robot
d0d9a69414
Merge pull request #108484 from Abirdcfly/fixctx
fix: some function should pass context parameter
2022-03-11 13:26:34 -08:00
Kubernetes Prow Robot
633313616f
Merge pull request #107132 from NikhilSharmaWe/netTest
made independent test cases ginkgo.It for checking connectivity
2022-03-11 13:26:22 -08:00
Kubernetes Prow Robot
86ad8fc586
Merge pull request #107477 from NikhilSharmaWe/memlim
Updated Sig-windows Memory Limits tests to not assume all nodes are the same
2022-03-11 11:52:22 -08:00
Divyen Patel
bd7f083000 topology translation for vSphere CSI 2022-03-11 10:30:11 -08:00
Jiahui Feng
f0d73cf650 unmark non-validated types as enums. 2022-03-11 10:00:00 -08:00
Kubernetes Prow Robot
cdee77a4a9
Merge pull request #108655 from mengjiao-liu/improve_netsh_test
Improve unit test coverage in `pkg/util/netsh/`
2022-03-11 07:03:07 -08:00
Kubernetes Prow Robot
370b7cc25c
Merge pull request #108400 from deepakkinni/in_tree_protect_v1
Support for in-tree PV Deletion protection finalizer
2022-03-11 03:39:06 -08:00
Tyler Lloyd
a7d866f036
chore: kube-proxy cluder-cidr arg accepts comma-separated list (#105832)
* kube-proxy cluder-cidr arg accepts comma-separated list

It is possible in dual-stack clusters to provide kube-proxy with
a comma-separated list with an IPv4 and IPv6 CIDR for pods.

update: signoff
update2: update email profile

Signed-off-by: Tyler Lloyd <Tyler.Lloyd@microsoft.com>
Signed-off-by: Tyler Lloyd <tylerlloyd928@gmail.com>

* Updating cluster-cidr comment description

Signed-off-by: Tyler Lloyd <tyler.lloyd@microsoft.com>
2022-03-11 02:03:07 -08:00
Shiming Zhang
a1fadab4b0 Atomic write status file 2022-03-11 17:50:33 +08:00
Shiming Zhang
1322dbba46 Add e2e 2022-03-11 17:31:25 +08:00
Shiming Zhang
4aed18935e Add test for storage 2022-03-11 17:31:10 +08:00
Shiming Zhang
5eb3e88f6b Support metrics for node shutdown 2022-03-11 17:31:10 +08:00
Mengjiao Liu
63f600eef4 Improve unit test coverage and readability in pkg/util/netsh/ 2022-03-11 17:04:39 +08:00
Deepak Kinni
d37f14d0ae Support for in-tree PV Deletion protection finalizer
Signed-off-by: Deepak Kinni <dkinni@vmware.com>
2022-03-10 21:37:43 -08:00
Nikhil Sharma
cf48674dbf Updated Sig-windows Memory Limits tests to not assume all nodes are the same 2022-03-11 10:48:36 +05:30
Kubernetes Prow Robot
897f2f78a5
Merge pull request #108458 from pohly/csi-test-image-mirroring
e2e: support CSI images in -list-images
2022-03-10 21:17:06 -08:00
Nikhil Sharma
edfd8cba54 made independent test cases ginkgo.It for checking connectivity 2022-03-11 09:02:17 +05:30
Kubernetes Prow Robot
9d512581b8
Merge pull request #108643 from liggitt/cobra
Update cobra to v1.4.0
2022-03-10 19:23:08 -08:00
Kubernetes Prow Robot
087b976a6b
Merge pull request #108647 from cici37/bumpCEL
Bump cel-go to v0.10.1
2022-03-10 18:13:07 -08:00
Kubernetes Prow Robot
3395ca1814
Merge pull request #108636 from neolit123/1.24-fix-go-doc-example-indent
kubeadm: fix bad indentation in the API go docs
2022-03-10 16:19:19 -08:00
Kubernetes Prow Robot
c5f7ceb26c
Merge pull request #108581 from pacoxu/image-docker-hub-fix
migrate nginx to k8s.gcr.io image
2022-03-10 16:19:07 -08:00
cici37
7572b26fba Bump cel-go to v0.10.1 2022-03-10 14:50:35 -08:00