Commit Graph

42861 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
1dcea5cb02 Merge pull request #104817 from smarterclayton/pod_status
kubelet: Rejected pods should be filtered from admission
2021-09-09 22:15:59 -07:00
Kubernetes Prow Robot
5724484bda Merge pull request #104069 from pacoxu/fix-data-race-104057
fix data race in kubelet volume test: add lock for ut
2021-09-09 21:09:59 -07:00
Kubernetes Prow Robot
c91287c7b9 Merge pull request #104747 from kinvolk/invidian/typos
Fix typos in files which are used for generating OpenAPI
2021-09-09 18:04:57 -07:00
Kubernetes Prow Robot
a402f1753c Merge pull request #104756 from tnqn/ipvs-sctp-masquerade
Fix client IP preservation for NodePort service with protocol SCTP
2021-09-09 15:34:56 -07:00
Kubernetes Prow Robot
669de4b957 Merge pull request #104666 from alculquicondor/tracking-beta
Fix Job tracking with finalizers for more than 500 pods
2021-09-09 09:26:11 -07:00
Kubernetes Prow Robot
c0c7039f3a Merge pull request #103751 from y-tag/approx-float64
fix AsApproximateFloat64() for BinarySI
2021-09-09 08:22:11 -07:00
Wei Huang
c2e9305173 Revert PR 103515 2021-09-08 13:23:30 -07:00
Kubernetes Prow Robot
5be7bb413d Merge pull request #104805 from chendave/typos
Fix couple of incorrect description
2021-09-08 07:43:21 -07:00
Clayton Coleman
17d32ed0b8 kubelet: Rejected pods should be filtered from admission
A pod that has been rejected by admission will have status manager
set the phase to Failed locally, which make take some time to
propagate to the apiserver. The rejected pod will be included in
admission until the apiserver propagates the change back, which
was an unintended regression when checking pod worker state as
authoritative.

A pod that is terminal in the API may still be consuming resources
on the system, so it should still be included in admission.
2021-09-08 10:23:45 -04:00
Kubernetes Prow Robot
9ced7b4a31 Merge pull request #104704 from Pingan2017/ttl-beta-0901
Change TTLAfterFinished state to beta in comment
2021-09-08 06:29:20 -07:00
Kubernetes Prow Robot
3282d6cfdb Merge pull request #103515 from muma378/feature/verbose-node-scores
Add verbose logs for node/plugin scores even ranged in low levels
2021-09-07 21:21:22 -07:00
Kubernetes Prow Robot
6ae42ec773 Merge pull request #104829 from mikedanese/rbac-doc
rbac: remove AttributeRestriction documentation
2021-09-07 19:29:27 -07:00
Dave Chen
6e1835b83b Fix couple of incorrect description
Signed-off-by: Dave Chen <dave.chen@arm.com>
2021-09-08 10:08:23 +08:00
Kubernetes Prow Robot
85b11ad24e Merge pull request #104699 from vincepri/generate-name-error
Object creation with generateName should return AlreadyExists instead of a Timeout
2021-09-07 17:41:20 -07:00
Mike Danese
acb85012ba rbac: remove AttributeRestriction documentation
This field never made it past the alpha API.
2021-09-07 16:45:49 -07:00
Kubernetes Prow Robot
f9488f314a Merge pull request #104741 from robscott/topology-logging
Adding more detailed logging for Topology Hints
2021-09-07 16:32:16 -07:00
qulifeng
054271445e fix Log attempts to output resp.Body 2021-09-06 23:01:03 +08:00
Quan Tian
9ee3ae748b Fix client IP preservation for NodePort service with protocol SCTP
The iptables rule that matches kubeNodePortLocalSetSCTP must be inserted
before the one matches kubeNodePortSetSCTP, otherwise all SCTP traffic
would be masqueraded regardless of whether its ExternalTrafficPolicy is
Local or not.

To cover the case in tests, the patch adds rule order validation to
checkIptables.
2021-09-06 18:54:35 +08:00
Kubernetes Prow Robot
eb729620c5 Merge pull request #99682 from chymy/fix-misspelling
Fix misspelling and misgrammar
2021-09-05 12:46:28 -07:00
Kubernetes Prow Robot
1dc7de0366 Merge pull request #100185 from drigz/extra-log
Remove EXTRA from log messages
2021-09-05 04:02:28 -07:00
Kubernetes Prow Robot
f61ed43988 Merge pull request #103631 from vikramcse/automate_code_generation
Automate code generated by using mockgen and go:generate
2021-09-04 07:51:19 -07:00
Vince Prignano
8a9d61278f Object creation with generateName should return a proper error
Signed-off-by: Vince Prignano <vincepri@vmware.com>
2021-09-04 07:34:32 -07:00
Mateusz Gozdek
d7768519ee Fix typo assigment -> assignment
Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com>
2021-09-04 11:55:26 +02:00
Mateusz Gozdek
3066f1550f Fix typo fileystem -> filesystem
Signed-off-by: Mateusz Gozdek <mgozdek@microsoft.com>
2021-09-04 11:55:18 +02:00
Kubernetes Prow Robot
b12379ef1c Merge pull request #104605 from pohly/ephemeral-volume-events
scheduler: more informative generic ephemeral volume events
2021-09-03 17:51:19 -07:00
Clayton Coleman
2d7a9160a6 Additional resource quantity testing
Fractional binary SI quantities that cannot be represented as decimal
internally were incorrectly calculated.
2021-09-04 09:45:38 +09:00
vikram Jadhav
c10c92bda9 changes made by introducing mockgen command 2021-09-03 17:40:11 +00:00
Vikram Jadhav
5f674101bb Added update and verify scripts for automated mock generation 2021-09-03 17:40:11 +00:00
Kubernetes Prow Robot
d3621ae008 Merge pull request #101303 from wangyx1992/capatial-log-proxy
cleanup: fix errors in wrapped format and log capitalization in proxy
2021-09-03 10:01:50 -07:00
Kubernetes Prow Robot
bcd2ffbdc1 Merge pull request #104590 from Jiawei0227/anno
Add GA AnnStorageProvisioner annotation to PVC
2021-09-03 06:09:49 -07:00
Kubernetes Prow Robot
571a3f6f2f Merge pull request #103896 from july2993/read
Remove wrong comment
2021-09-02 21:27:49 -07:00
Rob Scott
f24d917d3c Adding more detailed logging for Topology Hints 2021-09-02 15:46:14 -07:00
Kubernetes Prow Robot
295a8c1371 Merge pull request #104467 from khenidak/fix-104329
fix 104329: check for headless before trying to release the ClusterIPs
2021-09-02 10:55:39 -07:00
Kubernetes Prow Robot
0b4a793da2 Merge pull request #103941 from saschagrunert/seccomp-profile-root
Remove deprecated `--seccomp-profile-root`/`seccompProfileRoot` config
2021-09-02 08:52:57 -07:00
Kubernetes Prow Robot
2a88664ecc Merge pull request #104652 from MikeSpreitzer/add-resourcde-config
Introduce storagebackend.ConfigForResource
2021-09-02 04:00:10 -07:00
Kubernetes Prow Robot
a91cc9f040 Merge pull request #104715 from enj/enj/i/psa_before_psp
admission: run PodSecurity before PodSecurityPolicy
2021-09-01 16:56:08 -07:00
Mike Spreitzer
85bcd243aa Introduce storagebackend.ConfigForResource
This is a Config specialized for a GroupResource.
It will support generating new resource-specific metrics.
2021-09-01 16:54:26 -04:00
Aldo Culquicondor
23ea5d80d6 Fix Job tracking with finalizers for more than 500 pods
When doing partial updates for uncountedTerminatedPods, the controller might have removed UIDs for Pods which still had finalizers.

Also make more space by removing UIDs that don't have finalizers at the beginning of the sync.
2021-09-01 16:19:04 -04:00
Monis Khan
b5ef684d90 admission: run PodSecurity before PodSecurityPolicy
This change fixes the order in which the PodSecurity and
PodSecurityPolicy admission plugins are run.  The old code intended
for PSA to run before PSP, but attempted to enforce that via
registration order (which is irrelevant).  Now PSA is correctly
executed before PSP to allow for audit and warning modes to be
exercised even in the presence of a deny PSP policy.

Signed-off-by: Monis Khan <mok@vmware.com>
2021-09-01 11:39:58 -04:00
paco
ab055e9ba4 fix data race in kubelet volume test: add lock
Signed-off-by: Paco Xu <paco.xu@daocloud.io>
Co-authored-by: Jian Zeng <zengjian.zj@bytedance.com>
2021-09-01 16:13:55 +08:00
Pingan2017
618cabec14 Modify TTLAfterFinished state to beta in comment 2021-09-01 10:50:17 +08:00
Dave Chen
62b0579a40 Fix the key missing issue for structured log
Signed-off-by: Dave Chen <dave.chen@arm.com>
2021-09-01 10:43:10 +08:00
Kubernetes Prow Robot
eae38bbe9e Merge pull request #104668 from zc2638/fix/taint-toleration
modify non-uniform aliases
2021-08-31 13:16:32 -07:00
Sascha Grunert
46077e6be7 Remove deprecated --seccomp-profile-root/seccompProfileRoot configuration
The configuration is deprecated and targets removal for v1.23. Tests
cases have been changed as well.

Signed-off-by: Sascha Grunert <sgrunert@redhat.com>
2021-08-31 09:55:28 +02:00
Kubernetes Prow Robot
4615578137 Merge pull request #104633 from martinkennelly/update_sitp_feature_state
Update ServiceInternalTrafficPolicy feature state
2021-08-31 00:09:36 -07:00
zc
b33897f36d modify non-uniform aliases 2021-08-31 09:07:51 +08:00
Kubernetes Prow Robot
bb9e89d430 Merge pull request #104601 from thockin/patchAllocatedValues_port_reuse
Fix a small regression in Service updates
2021-08-30 15:31:13 -07:00
Kubernetes Prow Robot
bbbeceb6aa Merge pull request #104577 from smarterclayton/smaller_filter_master
kubelet: Admission must exclude completed pods and avoid races
2021-08-30 13:17:13 -07:00
Tim Hockin
73503a4936 Fix a small regression in Service updates
Prior to 1.22 a user could change NodePort values within a service
during an update, and the apiserver would allocate values for any that
were not specified.

Consider a YAML like:

```
apiVersion: v1
kind: Service
metadata:
  name: foo
spec:
  type: NodePort
  ports:
  - name: p
    port: 80
  - name: q
    port: 81
  selector:
    app: foo
```

When this is created, nodeport values will be allocated for each port.
Something like:

```
apiVersion: v1
kind: Service
metadata:
  name: foo
spec:
  clusterIP: 10.0.149.11
  type: NodePort
  ports:
  - name: p
    nodePort: 30872
    port: 80
    protocol: TCP
    targetPort: 9376
  - name: q
    nodePort: 31310
    port: 81
    protocol: TCP
    targetPort: 81
  selector:
    app: foo
```

If the user PUTs (kubectl replace) the original YAML, we would see that
`.nodePort = 0`, and allocate new ports.  This was ugly at best.

In 1.22 we fixed this to not allocate new values if we still had the old
values, but instead re-assign them.  Net new ports would still be seen
as `.nodePort = 0` and so new allocations would be made.

This broke a corner case as follows:

Prior to 1.22, the user could PUT this YAML:

```
apiVersion: v1
kind: Service
metadata:
  name: foo
spec:
  type: NodePort
  ports:
  - name: p
    nodePort: 31310 # note this is the `q` value
    port: 80
  - name: q
    # note this nodePort is not specified
    port: 81
  selector:
    app: foo
```

The `p` port would take the `q` port's value.  The `q` port would be
seen as `.nodePort = 0` and a new value allocated.  In 1.22 this results
in an error (duplicate value in `p` and `q`).

This is VERY minor but it is an API regression, which we try to avoid,
and the fix is not too horrible.

This commit adds more robust testing of this logic.
2021-08-30 12:42:17 -07:00
Kubernetes Prow Robot
d5cf549376 Merge pull request #104160 from pacoxu/AllowLongNodeID-true
set AllowLongNodeID to true by default since 1.23
2021-08-30 08:17:05 -07:00