Commit Graph

21148 Commits

Author SHA1 Message Date
Aldo Culquicondor
77d9243623 Retry Job update on conflict
Once JobReadyPods is enabled, the Job status might be updated at a later stage after the pods are running.

Change-Id: I4c13c9e55ab7e11b1f9428d6cf0a560a41be1c6a
2022-04-07 09:38:20 -04:00
Jordan Liggitt
e570744ca9 Revert "add test to dry-run for unwanted generated values"
This reverts commit 48994c1518.
2022-04-06 12:34:49 -04:00
Jordan Liggitt
adb7621919 Revert "remove unwanted values returned from dry-run"
This reverts commit 60c1d58d02.
2022-04-06 12:34:42 -04:00
James Sturtevant
3d09201dbd Disable node->pod tests for Windows 2022-04-05 16:17:13 -07:00
Kubernetes Prow Robot
8cd689e40d Merge pull request #109283 from s-urbaniak/ratchet-e2e
test/e2e/framework: use restricted policy by default, default existing tests to privileged
2022-04-05 14:37:25 -07:00
Kubernetes Prow Robot
25fa92cd7d Merge pull request #109314 from SergeyKanzhelev/properRetryInSSH
fix the retry logic in ssh in test framework
2022-04-05 13:34:01 -07:00
Kubernetes Prow Robot
66369f47ec Merge pull request #109294 from Riaankl/NetworkPolicyStatus_endpoints
Add NetworkPolicyStatus to ineligible_endpoints.yaml
2022-04-05 13:33:49 -07:00
Kubernetes Prow Robot
a1a9dc066c Merge pull request #109256 from chendave/nullpointer
Fix the nil pointer dereference for comformance spec validation
2022-04-05 13:33:37 -07:00
Kubernetes Prow Robot
5163909f64 Merge pull request #108867 from pohly/storage-capacity-conformance
storage capacity conformance
2022-04-05 13:33:24 -07:00
Sergey Kanzhelev
ee80dd19db fix the retry logic in ssh in test framework 2022-04-05 17:14:58 +00:00
Kubernetes Prow Robot
c13d3369d5 Merge pull request #109267 from ii/promote-job-status-test
Promote Read, Replace, Patch BatchV1NamespacedJobStatus test - +3 endpoints
2022-04-05 08:23:49 -07:00
Sergiusz Urbaniak
1495c9f2cd test/e2e/*: default existing tests to privileged pod security policy
This is to ensure that all existing tests don't break when defaulting
the pod security policy to restricted in the e2e test framework.
2022-04-05 08:41:12 +02:00
Kubernetes Prow Robot
71cf2ea2da Merge pull request #108664 from mkimuram/e2e-anyvolumedatasource
Add initial E2E tests for `AnyVolumeDatasource` feature
2022-04-04 14:35:36 -07:00
Riaan Kleinhans
a4a6d70168 Add NetworkPolicyStatus to ineligible list 2022-04-05 07:36:38 +12:00
Jordan Liggitt
f12d001b20 Revert "Adjust testing for server-side validation as default"
This reverts commit f234cb142a.
2022-04-04 12:26:51 -04:00
Masaki Kimura
cd634b59ac Implement initial E2E test for AnyVolumeDataSource 2022-04-04 16:10:39 +00:00
Kubernetes Prow Robot
a315ec3388 Merge pull request #108590 from claudiubelu/tests/enable-windows-tests
tests: Enables a few Conformance tests for Windows (part 1)
2022-04-04 08:56:11 -07:00
Sergiusz Urbaniak
f578b9a40d test/e2e/framework: use restricted policy by default 2022-04-04 13:58:59 +02:00
Patrick Ohly
556794d469 storage capacity: promote CRUD test to conformance 2022-04-04 07:53:05 +02:00
Stephen Heywood
c709baa9a0 Promote e2e job status test to Conformance 2022-04-04 13:22:57 +12:00
Dave Chen
1b5d8b0b9b Fix the nil pointer dereference for comformance spec validation
`verify-conformance-yaml.sh` is used to verify the test spec of
conformance e2e test are valid.

Bascically, it calls `e2e.test` binary to dump the test spec and
then walk the source to generate the `conformance.yaml`.

If the `e2e.test` binary is outdated, it's possible that `testInfo`
is nil.

Access the field from nil will result to `nil pointer dereference`

Signed-off-by: Dave Chen <dave.chen@arm.com>
2022-04-02 16:53:39 +08:00
Kubernetes Prow Robot
8e0ac5b6a1 Merge pull request #109222 from pacoxu/flake-nfs
use privileged enforce level for nfs test
2022-04-01 21:22:22 -07:00
Paco Xu
fc186d5616 use privileged enforce level for nfs test 2022-04-01 15:22:34 +08:00
Maciej Wyrzuc
1108bed763 Revert "Field status.hostIPs added for Pod (#101566)"
This reverts commit 61b3c028ba.
2022-03-31 12:39:45 +00:00
Sarvesh Rangnekar
b9792a9dae Introduce APIs to support multiple ClusterCIDRs (#108290)
* Introduce networking/v1alpha1 api, ClusterCIDRConfig type

Introduce networking/v1alpha1 api group.

Add `ClusterCIDRConfig` type to networking/v1alpha1 api group, this type
will enable the NodeIPAM controller to support multiple ClusterCIDRs.

* Change ClusterCIDRConfig.NodeSelector type in api

* Fix review comments for API

* Update ClusterCIDRConfig API Spec

Introduce PerNodeHostBits field, remove PerNodeMaskSize
2022-03-30 19:39:00 -07:00
Kubernetes Prow Robot
8b158fa730 Merge pull request #108953 from nckturner/remove-insecure-serving
Remove the deprecated insecure serving from the cloud controller manager
2022-03-30 18:03:00 -07:00
Kubernetes Prow Robot
e4690b0fbc Merge pull request #109123 from dims/switch-to-pause-3.7
Switch to pause 3.7 for Kubernetes 1.24
2022-03-29 20:37:39 -07:00
Kubernetes Prow Robot
9e65ee3908 Merge pull request #109097 from pacoxu/fix-sig-node-failures
remove baseline pod security in host pid sharing testing
2022-03-29 20:36:37 -07:00
Kubernetes Prow Robot
904c30562a Merge pull request #109031 from Jefftree/openapiv3beta
OpenAPI V3 Enable Beta
2022-03-29 20:36:25 -07:00
Kubernetes Prow Robot
0c5574c2a3 Merge pull request #108745 from aramase/aes-gcm
feat: prepare KMS data encryption for migration to AES-GCM
2022-03-29 19:28:25 -07:00
Jefftree
67d3dbfaae Separate OpenAPI V2 and V3 Config 2022-03-29 17:49:56 -07:00
Anish Ramasekar
90b42f91fd feat: prepare KMS data encryption for migration to AES-GCM
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
Co-authored-by: Monis Khan <mok@vmware.com>
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
2022-03-30 00:37:42 +00:00
Kubernetes Prow Robot
5b8dbfbbcf Merge pull request #108995 from pohly/log-contextual
contextual logging
2022-03-29 17:35:59 -07:00
Kubernetes Prow Robot
4b3ddcf793 Merge pull request #108909 from saschagrunert/wip-crio
Inject SSH public key into CRI-O serial prow jobs
2022-03-29 17:35:42 -07:00
Kubernetes Prow Robot
b0254c8a0b Merge pull request #108758 from fengzixu/improvement-volume-health
re-push "add volume kubelet_volume_stats_health_abnormal to kubelet #105585"
2022-03-29 17:35:34 -07:00
Kubernetes Prow Robot
9fe98d8bab Merge pull request #108736 from NetApp/any-volume-data-source-beta
Update AnyVolumeDataSource feature gate to beta
2022-03-29 17:35:25 -07:00
Kubernetes Prow Robot
57a739bdf2 Merge pull request #108691 from andrewsykim/proxy-terminating-endpoints
Apply ProxyTerminatingEndpoints to all traffic policies
2022-03-29 17:34:57 -07:00
Kubernetes Prow Robot
dd1e43332a Merge pull request #107476 from alculquicondor/job-ready
Graduate JobReadyPods to beta
2022-03-29 16:08:06 -07:00
Davanum Srinivas
f7ad09c447 Switch to pause 3.7
Signed-off-by: Davanum Srinivas <davanum@gmail.com>
2022-03-29 15:36:38 -04:00
Shiming Zhang
61b3c028ba Field status.hostIPs added for Pod (#101566)
* Add FeatureGate PodHostIPs

* Add HostIPs field and update PodIPs field

* Types conversion

* Add dropDisabledStatusFields

* Add HostIPs for kubelet

* Add fuzzer for PodStatus

* Add status.hostIPs in ConvertDownwardAPIFieldLabel

* Add status.hostIPs in validEnvDownwardAPIFieldPathExpressions

* Downward API support for status.hostIPs

* Add DownwardAPI validation for status.hostIPs

* Add e2e to check that hostIPs works

* Add e2e to check that Downward API works

* Regenerate
2022-03-29 11:46:07 -07:00
Ben Swartzlander
08948ca779 Update AnyVolumeDataSource feature gate to beta
Default to enabled
Fix validation of null-updates/patches when the "old" PVC was persisted by
an older version. Add upgrade integration tests written by liggitt.
2022-03-29 13:39:48 -04:00
Andrew Sy Kim
50d93f7cec test/utils/image: use agnhost image agnhost:2.36 to include --delay-shutdown flag
Signed-off-by: Andrew Sy Kim <andrewsy@google.com>
2022-03-29 11:37:43 -04:00
Andrew Sy Kim
01c178c9de test/e2e/network: add e2e tests for ProxyTerminatingEndpoints
Signed-off-by: Andrew Sy Kim <andrewsy@google.com>
2022-03-29 11:37:43 -04:00
Aldo Culquicondor
8c00f510ef Graduate JobReadyPods to beta
Set podUpdateBatchPeriod to 1s

Change-Id: I8a10fd8f8559adad9df179b664b8c82851607855
2022-03-29 10:07:41 -04:00
Patrick Ohly
b390d018c7 logs: pass verbosity to loggers
When a Logger gets called directly via contextual logging, it has to do its own
verbosity check and therefore needs to know what the intended verbosity level
is.

This used to work previously because all verbosity checks were done in klog
before invoking the Logger.
2022-03-29 12:06:40 +02:00
Ricardo Katz
42a1201082 Implementation on Network Policy Status (#107963)
* Implement status subresource in NetworkPolicy

* add NetworkPolicyStatus generated files

* Fix comments in netpol status review
2022-03-29 01:52:48 -07:00
Paco Xu
4e96009c15 use privileged enforce level in host pid sharing testing 2022-03-29 15:51:33 +08:00
Kubernetes Prow Robot
fe8a663860 Merge pull request #109029 from ehashman/runc-1.1.0
Dep bump to runc 1.1.0, cadvisor 0.44.0
2022-03-28 22:45:10 -07:00
Kubernetes Prow Robot
874d4bff43 Merge pull request #108990 from jpbetz/per-crd
CRD CEL Validation: per-CRD estimated cost limit enforcement
2022-03-28 16:53:11 -07:00
Kir Kolyshkin
37761a329e pkg/kubelet: changes to update runc to 1.1.0
The changes (mostly in pkg/kubelet/cm) are there to adopt changed
runc 1.1 API, and simplify things a bit. In particular:

1. simplify cgroup manager instantiation, using a new, easier way of
   libcontainers/cgroups/manager.New;

2. replace libcontainerAdapter with a boolean variable (all it did
   was passing on whether systemd manager should be used);

3. trivial change due to removed cgroupfs.HugePageSizes and added
    cgroups.HugePageSizes();

4. do not calculate cgroup paths in update / destroy, since libcontainer
   cgroup managers now calculate the paths upon creation (previously,
   they were doing that only in Apply, so using e.g. Set or Destroy right
   after creation was impossible without specifying paths).

We currently still calculate cgroup paths in Exists -- this is to be
addressed separately.

Co-Authored-By: Elana Hashman <ehashman@redhat.com>
2022-03-28 16:23:20 -07:00