Commit Graph

19851 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
617064d732
Merge pull request #101432 from swatisehgal/smtaware
node: cpumanager: add options to reject non SMT-aligned workload
2021-07-08 21:04:53 -07:00
Kubernetes Prow Robot
83baa708df
Merge pull request #103429 from saschagrunert/metrics-test-fix
Fix resource metrics e2e test
2021-07-08 17:58:53 -07:00
Kubernetes Prow Robot
dab6f6a43d
Merge pull request #102344 from smarterclayton/keep_pod_worker
Prevent Kubelet from incorrectly interpreting "not yet started" pods as "ready to terminate pods" by unifying responsibility for pod lifecycle into pod worker
2021-07-08 16:48:53 -07:00
Francesco Romani
a2fb8b0039 smtalign: e2e: add tests
Add e2e tests to cover the basic flows for the `full-pcpus-only` option:
negative flow to ensure rejection with proper error message, and
positive flow to verify the actual cpu allocation.

Co-authored-by: Swati Sehgal <swsehgal@redhat.com>
Signed-off-by: Francesco Romani <fromani@redhat.com>
2021-07-08 23:15:37 +02:00
Kubernetes Prow Robot
1edf50192e
Merge pull request #103536 from mengjiao-liu/clean-master-term-test
Clean up the remaining master names in test/integration
2021-07-08 03:05:05 -07:00
Wei Huang
fb9cafc99b
sched: provide an option for plugin developers to move pods to activeQ 2021-07-07 12:50:12 -07:00
Kubernetes Prow Robot
ac6a1b1821
Merge pull request #103414 from ravisantoshgudimetla/fix-pdb-status
[disruptioncontroller] Don't error for unmanaged pods
2021-07-07 12:40:35 -07:00
Kubernetes Prow Robot
ac554af79b
Merge pull request #103142 from serathius/etcd-3.5.0
Upgrade etcd to 3.5.0
2021-07-07 12:40:22 -07:00
ravisantoshgudimetla
2c116055f7 [disruptioncontroller] Don't error for unmanaged pods
As of now, we allow PDBs to be applied to pods via
selectors, so there can be unmanaged pods(pods that
don't have backing controllers) but still have PDBs associated.
Such pods are to be logged instead of immediately throwing
a sync error. This ensures disruption controller is
not frequently updating the status subresource and thus
preventing excessive and expensive writes to etcd.
2021-07-07 10:42:24 -04:00
Kubernetes Prow Robot
b289fbb03d
Merge pull request #103409 from andrewsykim/service-internal-traffic-policy-e2e
test/e2e/network: add test for Service internalTrafficPolicy
2021-07-07 06:18:43 -07:00
Mengjiao Liu
96406b915d Clean up the remaining master names in test/integration 2021-07-07 15:39:59 +08:00
Kubernetes Prow Robot
e1acbbd8fd
Merge pull request #99961 from margocrawf/master
Introduce Impersonate-UID header
2021-07-06 18:46:43 -07:00
Clayton Coleman
3eadd1a9ea
Keep pod worker running until pod is truly complete
A number of race conditions exist when pods are terminated early in
their lifecycle because components in the kubelet need to know "no
running containers" or "containers can't be started from now on" but
were relying on outdated state.

Only the pod worker knows whether containers are being started for
a given pod, which is required to know when a pod is "terminated"
(no running containers, none coming). Move that responsibility and
podKiller function into the pod workers, and have everything that
was killing the pod go into the UpdatePod loop. Split syncPod into
three phases - setup, terminate containers, and cleanup pod - and
have transitions between those methods be visible to other
components. After this change, to kill a pod you tell the pod worker
to UpdatePod({UpdateType: SyncPodKill, Pod: pod}).

Several places in the kubelet were incorrect about whether they
were handling terminating (should stop running, might have
containers) or terminated (no running containers) pods. The pod worker
exposes methods that allow other loops to know when to set up or tear
down resources based on the state of the pod - these methods remove
the possibility of race conditions by ensuring a single component is
responsible for knowing each pod's allowed state and other components
simply delegate to checking whether they are in the window by UID.

Removing containers now no longer blocks final pod deletion in the
API server and are handled as background cleanup. Node shutdown
no longer marks pods as failed as they can be restarted in the
next step.

See https://docs.google.com/document/d/1Pic5TPntdJnYfIpBeZndDelM-AbS4FN9H2GTLFhoJ04/edit# for details
2021-07-06 15:55:22 -04:00
Kubernetes Prow Robot
cbba6e41cc
Merge pull request #103472 from andrewsykim/deflake-quota-service-test
test/integration/quota: deflake TestQuotaLimitService
2021-07-06 12:08:19 -07:00
Kubernetes Prow Robot
3392f16908
Merge pull request #102890 from ankeesler/exec-plugin-v1
exec credential provider: add v1 struct
2021-07-06 10:42:31 -07:00
Margo Crawford
74f5ed6b17 This introduces an Impersonate-Uid header to server side code.
UserInfo contains a uid field alongside groups, username and extra.
This change makes it possible to pass a UID through as an impersonation header like you
can with Impersonate-Group, Impersonate-User and Impersonate-Extra.

This PR contains:

* Changes to impersonation.go to parse the Impersonate-Uid header and authorize uid impersonation
* Unit tests for allowed and disallowed impersonation cases
* An integration test that creates a CertificateSigningRequest using impersonation,
  and ensures that the API server populates the correct impersonated spec.uid upon creation.
2021-07-06 10:13:16 -07:00
Kubernetes Prow Robot
dd8ba30877
Merge pull request #103509 from sanposhiho/test/integration/util/fix-typo
Fix(test/integration/util): fix typo on logging message
2021-07-06 09:34:55 -07:00
Kubernetes Prow Robot
907e2c4d46
Merge pull request #103294 from mengjiao-liu/rename-master-package
test/integration: rename package and files name from master to controlplane
2021-07-06 09:34:19 -07:00
Andrew Keesler
20e1c4d754
exec credential provider: update tests+metadata for v1
Signed-off-by: Andrew Keesler <akeesler@vmware.com>
2021-07-06 09:48:35 -04:00
Andrew Sy Kim
04d59ff2df test/e2e/network: add Service internalTrafficPolicy test for pod (w/ host network) -> pod (w/ host network)
Signed-off-by: Andrew Sy Kim <kim.andrewsy@gmail.com>
2021-07-06 09:22:07 -04:00
Andrew Sy Kim
9977ea371b test/e2e/network: add Service internalTrafficPolicy test for pod -> pod (w/ host network)
Signed-off-by: Andrew Sy Kim <kim.andrewsy@gmail.com>
2021-07-06 09:22:06 -04:00
Andrew Sy Kim
025c95a778 test/e2e/network: add Service internalTrafficPolicy test pod (w/ host network) -> pod
Signed-off-by: Andrew Sy Kim <kim.andrewsy@gmail.com>
2021-07-06 09:22:06 -04:00
Andrew Sy Kim
f6bc5d0140 test/e2e/network: add Service internalTrafficPolicy test pod to pod
Signed-off-by: Andrew Sy Kim <kim.andrewsy@gmail.com>
2021-07-06 09:22:06 -04:00
Andrew Sy Kim
edbaf9d5d3 test/integration/quota: poll for ResourceQuota used status in TestQuotaLimitService
Signed-off-by: Andrew Sy Kim <kim.andrewsy@gmail.com>
Co-authored-by: Antonio Ojea <aojea@redhat.com>
2021-07-06 07:10:20 -04:00
Andrew Sy Kim
caf42fde43 test/integration/quota: refactor Service forbidden check into helper function
Signed-off-by: Andrew Sy Kim <kim.andrewsy@gmail.com>
2021-07-06 06:39:26 -04:00
Andrew Sy Kim
54bc1babe1 test/integration/quota: update TestQuotaLimitService to explicitly check for Forbidden status when quota limit is exceeded
Signed-off-by: Andrew Sy Kim <kim.andrewsy@gmail.com>
2021-07-06 06:39:26 -04:00
Andrew Sy Kim
87cef2ca73 test/integration/quota: deflake TestQuotaLimitService by collapsing test
cases and adding a short delay for resource quota to propagate

Signed-off-by: Andrew Sy Kim <kim.andrewsy@gmail.com>
2021-07-06 06:39:26 -04:00
Kensei Nakada
a85f3e4cce
Fix(test/integration/util): fix typo on logging message 2021-07-06 17:08:11 +09:00
Sascha Grunert
2d0f99fba1
Fix resource metrics e2e test
Signed-off-by: Sascha Grunert <sgrunert@redhat.com>
2021-07-05 11:16:05 +02:00
Kubernetes Prow Robot
cbe3ef473e
Merge pull request #100412 from hanlins/lb-node-ports-beta
Lb node ports beta
2021-07-02 16:08:10 -07:00
Hanlin Shi
c96c809539 Add integration test for LB node port control
Signed-off-by: Hanlin Shi <shihanlin9@gmail.com>
2021-07-02 21:58:49 +00:00
Hanlin Shi
24592ca989 Update the related tests
1. add AllocateLoadBalancerNodePorts fields in specs for validation test cases
2. update fuzzer
3. in resource quota e2e, allocate node port for loadbalancer type service and
   exceed the node port quota

Signed-off-by: Hanlin Shi <shihanlin9@gmail.com>
2021-07-02 21:58:41 +00:00
Kubernetes Prow Robot
d1833880a7
Merge pull request #103083 from vivian-xu/use-native-errors
Update github.com/pkg/errors with go native errors pkg
2021-07-02 13:38:38 -07:00
Kubernetes Prow Robot
0bb6d1431c
Merge pull request #103371 from claudiubelu/tests/windows-flakyness
windows tests: Wait for the network connectivity first
2021-07-02 12:30:22 -07:00
Kubernetes Prow Robot
a331cf74b7
Merge pull request #102050 from pohly/fix/deflake-metrics-proxy
remove metrics proxy
2021-07-02 12:30:10 -07:00
Kubernetes Prow Robot
defcc916ed
Merge pull request #103382 from liggitt/podsecurity-hostprocess
[PodSecurity] hostProcess baseline check
2021-07-02 01:16:24 -07:00
Kubernetes Prow Robot
659c7e709f
Merge pull request #99494 from enj/enj/i/not_after_ttl_hint
csr: add expirationSeconds field to control cert lifetime
2021-07-01 23:02:12 -07:00
Monis Khan
8d49502fcd
csr: update e2e conformance test with expirationSeconds usage
Signed-off-by: Monis Khan <mok@vmware.com>
2021-07-01 23:38:16 -04:00
Monis Khan
cd91e59f7c
csr: add expirationSeconds field to control cert lifetime
This change updates the CSR API to add a new, optional field called
expirationSeconds.  This field is a request to the signer for the
maximum duration the client wishes the cert to have.  The signer is
free to ignore this request based on its own internal policy.  The
signers built-in to KCM will honor this field if it is not set to a
value greater than --cluster-signing-duration.  The minimum allowed
value for this field is 600 seconds (ten minutes).

This change will help enforce safer durations for certificates in
the Kube ecosystem and will help related projects such as
cert-manager with their migration to the Kube CSR API.

Future enhancements may update the Kubelet to take advantage of this
field when it is configured in a way that can tolerate shorter
certificate lifespans with regular rotation.

Signed-off-by: Monis Khan <mok@vmware.com>
2021-07-01 23:38:15 -04:00
Kubernetes Prow Robot
62503f254e
Merge pull request #103413 from mgutierrez98/refactor-whitelist-blacklist
Refactored files containing whitelist/blacklist to allowlist/denylist…
2021-07-01 18:12:25 -07:00
Kubernetes Prow Robot
9ca75c1f49
Merge pull request #103243 from ii/promote-statefulset-status-test
Promote to Conformance StatefulSet Patch, Read and Replace Status test +3
2021-07-01 14:28:02 -07:00
Kubernetes Prow Robot
062bc359ca
Merge pull request #102444 from sanwishe/resourceStartTime
Expose container start time in kubelet /metrics/resource endpoint
2021-07-01 14:27:51 -07:00
mgutierrez98
1cfbb0aa25 remove webhook.go to revert changes to conformance test 2021-07-01 20:24:46 +00:00
Kubernetes Prow Robot
3334703eb2
Merge pull request #103242 from ii/promote-deployment-status-test
Promote to Conformance Patch, Read and Replace DeploymentStatus test +1
2021-07-01 13:18:04 -07:00
Kubernetes Prow Robot
cd94e840cb
Merge pull request #103241 from ii/promote-statefulset-list-deletecollection
Promote to Conformance StatefulSet List, Patch & DeleteCollection Test +3
2021-07-01 13:17:52 -07:00
Jordan Liggitt
49d31c45b1 PodSecurity: baseline hostProcess check 2021-07-01 15:49:33 -04:00
Kubernetes Prow Robot
1861e4756d
Merge pull request #103396 from praveenghuge/master-to-main-cleanup
k8s.io master to main cleanup
2021-07-01 04:45:54 -07:00
Kubernetes Prow Robot
a0c83ba938
Merge pull request #103385 from ravisantoshgudimetla/fix-ubernetes-tests-2
[storage] [test] Ensure proper resource creation
2021-07-01 00:06:06 -07:00
Kubernetes Prow Robot
dbfea1e2aa
Merge pull request #103365 from liggitt/podsecurity-feature-test
PodSecurity: make failure integration tests feature-aware
2021-07-01 00:05:54 -07:00
Praveen Ghuge
db3534dd64 master too main cleanup 2021-06-30 21:56:29 -07:00