Commit Graph

21512 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
18b5efceda Merge pull request #110410 from Jiawei0227/master
CSIMigration feature gate to GA
2022-06-22 04:05:48 -07:00
Kubernetes Prow Robot
23144130a8 Merge pull request #109396 from SergeyKanzhelev/testDurationCheck
check for the test duraiton to make NodeProblemDetector test reliable
2022-06-22 01:43:43 -07:00
wongearl
44404d309c fix "k8s.io/client-go/rest" is being imported more than once,optimize code 2022-06-22 10:31:24 +08:00
Kubernetes Prow Robot
3beb8dc596 Merge pull request #110612 from mattcary/ss-integration
Add TestAutodeleteOwnerRefs statefulset integration test
2022-06-21 15:29:42 -07:00
Joachim Bartosik
a936e21538 Revert "Add e2e test for HPA behavior: scale up delay"
The test is failing since its first run: #110662

This reverts commit a724818ad0.
2022-06-20 14:50:46 +02:00
Kubernetes Prow Robot
3724273d38 Merge pull request #110640 from aspsk/aspsk/pr/fix-test-e2e-network-hostport
test/e2e/network: fix a bug in the hostport e2e test
2022-06-19 06:54:03 -07:00
Anton Protopopov
4026d355bc test/e2e/network: add a check to the hostport e2e test
As described in 8c76845b03 ("test/e2e/network: fix a bug in the hostport e2e
test") if we have two pods with the same hostPort, hostIP, but different
protocols, a CNI may be buggy and decide to forward all traffic only to one of
these pods. Add a check that we receiving requests from different pods.

Co-authored-by: Antonio Ojea <antonio.ojea.garcia@gmail.com>
2022-06-17 21:08:35 +00:00
Patrick Ohly
1aceac797d logs: make LoggingConfiguration an unversioned API
Making the LoggingConfiguration part of the versioned component-base/config API
had the theoretic advantage that components could have offered different
configuration APIs with experimental features limited to alpha versions (for
example, sanitization offered only in a v1alpha1.KubeletConfiguration). Some
components could have decided to only use stable logging options.

In practice, this wasn't done. Furthermore, we don't want different components
to make different choices regarding which logging features they offer to
users. It should always be the same everywhere, for the sake of consistency.

This can be achieved with a saner Go API by dropping the distinction between
internal and external LoggingConfiguration types. Different stability levels of
indidividual fields have to be covered by documentation (done) and potentially
feature gates (not currently done).

Advantages:

- everything related to logging is under component-base/logs;
  previously this was scattered across different packages and
  different files under "logs" (why some code was in logs/config.go
  vs. logs/options.go vs. logs/logs.go always confused me again
  and again when coming back to the code):

  - long-term config and command line API are clearly separated
    into the "api" package underneath that

  - logs/logs.go itself only deals with legacy global flags and
    logging configuration

- removal of separate Go APIs like logs.BindLoggingFlags and
  logs.Options

- LogRegistry becomes an implementation detail, with less code
  and less exported functionality (only registration needs to
  be exported, querying is internal)
2022-06-17 20:22:13 +02:00
Anton Protopopov
fd94ff6487 agnhost/netexec: fix an error message
The error message inside the UDP server used a SCTP port instead of a UDP port
2022-06-17 16:03:33 +00:00
Anton Protopopov
8c76845b03 test/e2e/network: fix a bug in the hostport e2e test
The hostport e2e test (sonobuoy run --e2e-focus 'validates that there is no
conflict between pods with same hostPort but different hostIP and protocol')
checks, in particular, that two pods with the same hostPort, the same hostIP,
but different L4 protocols can coexist on one node.

In order to do this, the test creates two pods with the same hostIP:hostPort,
one TCP-based, another UDP-based. However, both pods listen on both protocols:

    netexec --http-port=8080 --udp-port=8080

This can happen that a CNI which doesn't distinguish between TCP and UDP
hostPorts forwards all traffic, TCP or UDP, to the same pod. As this pod
listens on both protocols it will reply to both requests, and the test
will think that everything works properly while the second pod is indeed
disconnected. Fix this by executing different commands in different pods:

    TCP: netexec --http-port=8080 --udp-port=-1
    UDP: netexec --http-port=8008 --udp-port=8080

The TCP pod now doesn't listen on UDP, and the UDP pod doesn't listen on TCP on
the target hostPort. The UDP pod still needs to listen on TCP on another port
so that a pod readiness check can be made.
2022-06-17 13:06:41 +00:00
Kubernetes Prow Robot
7992398725 Merge pull request #110451 from lzhecheng/fix-spread-pods
[e2e] Should spread Pods to schedulable cluster zones
2022-06-16 14:37:05 -07:00
Kubernetes Prow Robot
92c5f3f01c Merge pull request #110583 from Riaankl/node_status_ineligible
Update ineligible_endpoints.yaml
2022-06-16 12:33:04 -07:00
Riaan Kleinhans
39d3d9439f Update ineligible_endpoints.yaml 2022-06-17 06:24:35 +12:00
Kubernetes Prow Robot
80c19baa11 Merge pull request #110557 from ldsdsy/modify
Fixing grammar in e2e Windows test logging
2022-06-16 10:14:48 -07:00
ldsdsy
2a2d33b2b1 Modify annotation syntax errors 2022-06-16 16:46:51 +08:00
Kubernetes Prow Robot
4b024fc4ee Merge pull request #110459 from wangyysde/promote-pod-security-to-ga
PodSecurity: promote config and feature gate to GA
2022-06-15 14:41:22 -07:00
Matthew Cary
3af09ab04a add TestAutodeleteOwnerRefs statefulset integration test
Change-Id: I3aa3220df59c33fc40f1d8e08e055caa1f6fb4a3
2022-06-15 13:33:02 -07:00
Kubernetes Prow Robot
2b51b2595a Merge pull request #110604 from wojtek-t/fix_leaking_goroutines_9
Fix leaking goroutines in multiple integration tests
2022-06-15 09:01:18 -07:00
Wojciech Tyczyński
6b59525746 Clean shutdown of flowcontrol integration tests 2022-06-15 16:53:42 +02:00
Wojciech Tyczyński
57242e3cbb Clean shutdown of openapi integration tests 2022-06-15 16:40:54 +02:00
Kubernetes Prow Robot
700fea3d42 Merge pull request #110558 from wespanther/update-debian
Update Debian base images to latest
2022-06-15 07:23:17 -07:00
apeltop
e530336b18 fix typos 2022-06-15 13:38:48 +09:00
wangyysde
ab66a38194 PodSecurity: promote config and feature gate to GA
Signed-off-by: wangyysde <net_use@bzhy.com>
2022-06-15 09:29:47 +08:00
Riaan Kleinhans
6d19ddc7bf Update ineligible_endpoints.yaml 2022-06-15 10:27:33 +12:00
Kubernetes Prow Robot
8e541911b8 Merge pull request #110574 from SataQiu/test-speed-20220614
Using t.Run() in integration test TestApplyAlsoCreates
2022-06-14 12:07:45 -07:00
Kubernetes Prow Robot
5503bb0570 Merge pull request #110529 from wojtek-t/fix_leaking_goroutines_7
Fix leaking goroutines in multiple integration tests
2022-06-14 09:09:54 -07:00
SataQiu
20f8a06e50 using t.Run() in integration test TestApplyAlsoCreates 2022-06-15 00:01:10 +08:00
Wojciech Tyczyński
ed442cc3dd Clean(er) shutdown of auth integration tests 2022-06-14 13:55:31 +02:00
Wojciech Tyczyński
3930362ad4 Clean(er) shutdown of apiserver integration tests 2022-06-14 13:55:31 +02:00
Wojciech Tyczyński
41d7ddee1a Clean shutdown of apimachinery integration tests 2022-06-14 13:55:31 +02:00
Wojciech Tyczyński
8a87681a39 Clean shutdown of resourcequota integration tests 2022-06-14 13:55:31 +02:00
Kubernetes Prow Robot
27cf82d785 Merge pull request #110385 from piotrnosek/hpa-beh-tests
Add e2e test for HPA behavior: scale up delay
2022-06-14 00:25:32 -07:00
Wes Panther
6ac853fe60 Update Debian base images to latest
- debian-base:bullseye-v1.3.0
- debian-iptables:bullseye-v1.4.0
- setcap:bullseye-v1.3.0
2022-06-13 21:36:46 -07:00
Kubernetes Prow Robot
c0cc911667 Merge pull request #110509 from kevindelgado/e2e-namespace-bug
Use namespace created by framework
2022-06-13 13:28:26 -07:00
Kubernetes Prow Robot
c0642b749e Merge pull request #110179 from Jefftree/fix_openapi_v2
Prune defaults for CRDs for OpenAPI V2
2022-06-13 13:28:12 -07:00
Kubernetes Prow Robot
2b14fd9fb1 Merge pull request #110515 from MikeSpreitzer/unpairvec
Remove the PairVec types
2022-06-13 08:04:24 -07:00
Kubernetes Prow Robot
661cbe6823 Merge pull request #109850 from ardaguclu/validate-nooptdefval
Define NoOptDefVal for validate flag
2022-06-13 08:04:11 -07:00
Kubernetes Prow Robot
61a0ee5588 Merge pull request #110465 from bertinatto/e2e-populator-fix
e2e: ensure single image for populator containers
2022-06-13 06:44:11 -07:00
Kevin Delgado
1bfaccb434 Use namespace created by framework 2022-06-13 07:08:58 +00:00
Mike Spreitzer
1f1cfba2a3 Remove the PairVec types 2022-06-12 23:37:15 -04:00
Kubernetes Prow Robot
c8a2db31ac Merge pull request #110505 from wojtek-t/fix_leaking_goroutines_6
Clean shutdown of some auth integration tests
2022-06-12 07:18:09 -07:00
Wojciech Tyczyński
8ef7dd49ee Clean shutdown of auth integration tests 2022-06-10 19:46:50 +02:00
Kubernetes Prow Robot
5b5fc07a29 Merge pull request #110272 from brianpursley/k-110270
Fix e2e test failure
2022-06-10 09:41:45 -07:00
Kubernetes Prow Robot
6e0e9f382e Merge pull request #109194 from pohly/log-tests
log tests
2022-06-10 03:07:46 -07:00
Zhecheng Li
b8b18a0a05 [e2e] Should spread Pods to schedulable cluster zones
Some Nodes like control plane ones should not be considered
to spread Pods.

Signed-off-by: Zhecheng Li <zhechengli@microsoft.com>
2022-06-10 16:40:56 +08:00
Kubernetes Prow Robot
226323178e Merge pull request #110256 from bobbypage/terminal-ready-condition
kubelet: Mark ready condition as false explicitly for terminal pods
2022-06-08 20:07:42 -07:00
David Porter
b4b338d4eb test: update graceful node shutdown e2e with watch
Use a watch to detect invalid pod status updates in graceful node
shutdown node e2e test. By using a watch, all pod updates will be
captured while the previous logic required polling the api-server which
could miss some intermediate updates.

Signed-off-by: David Porter <david@porter.me>
2022-06-08 16:19:16 -07:00
Jefftree
e2cbf9759b Add test to check for _v2 2022-06-08 21:33:07 +00:00
Fabio Bertinatto
9ef5c4e03a e2e: ensure single image for populator containers
This is useful in environments where the Deployment image is replaced
by another image from an internal registry (via fixture). In that case,
the populator running in populate mode should use the same image as the
populator running in controller mode.
2022-06-08 15:08:42 -03:00
Kubernetes Prow Robot
198dd7668a Merge pull request #110395 from tnqn/fix-sctp-test
Fix SCTP default-deny test
2022-06-07 08:45:07 -07:00