-
Notifications
You must be signed in to change notification settings - Fork 332
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
subset of supported topology keys are not working for waitforfirstconsumer #421
Conversation
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Welcome @pawanpraka1! |
Hi @pawanpraka1. Thanks for your PR. I'm waiting for a kubernetes-csi member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
95441d4
to
28d2999
Compare
I signed it |
I signed it |
I signed it |
1 similar comment
I signed it |
/ok-to-test |
/assign @msau42 |
/assign @pohly |
@pawanpraka1: The label(s) In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
done @msau42 . |
/kind feature |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: msau42, pawanpraka1 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@msau42 travis has passed but status has not updated yet, Please check. |
Can you try force pushing your branch again? I'm not sure why travis reporting is stuck |
/retest |
@msau42 can you restart the travis build? |
I'm not able to restart it, I think it is triggered based on git pushes. Maybe try squashsing your commits and then force pushing? |
If waitforfirstconsumer is used and if the driver supports multiple keys, mentioning single key(or less than supported keys) in the storageclass is not working. The csi-provisioner gets list of all the topology keys from the csinode object and gets the values for those keys from the node object. Now this key-value term is matched against the topology mentioned in the storageclass and it should match entirely which is not correct as even if topology mentioned in the storageclass is subset of the key-value term supported by the driver, then the node is a valid condidate. Instead of strictly checking for the equality of the selected node's topology with the allowedTopologies mentioned in the storageclass, we should check if allowedTopologies
@msau42 done, forced push the changes. |
/lgtm |
@msau42 same issue, again. |
I will just force merge the PR, all the other checks have passed. Thanks! |
thanks @msau42 . |
…go_modules/k8s.io/csi-translation-lib-0.26.2 Bump k8s.io/csi-translation-lib from 0.26.1 to 0.26.2
What type of PR is this?
/kind feature
What this PR does / why we need it:
fixes:- #420
If waitforfirstconsumer is used and if the driver supports multiple topology keys,
mentioning single key(or less than supported keys) in the storageclass is not working.
The csi-provisioner gets list of all the topology keys from the csinode object
and gets the values for those keys from the node object. Now this key-value term
is matched against the topology mentioned in the storageclass and it should match
entirely which is not correct as even if topology mentioned in the storageclass
is subset of the key-value term supported by the driver, then the node is a valid condidate.
Instead of strictly checking for the equality of the selected node's topology with
the allowedTopologies mentioned in the storageclass, we should check if allowedTopologies
is subset of selected node's topology.
Does this PR introduce a user-facing change?: