New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Revert "kubeadm: fix a bug where the uploaded kubelet configuration in kube-system/kubelet-config ConfigMap does not respect user patch" #123093
Conversation
…n kube-system/kubelet-config ConfigMap does not respect user patch"
This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: SataQiu The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/hold
should we backport to 1.27, 1.28, 1.29?
users have a workaround to just always apply a patch on all nodes.
tentative +1 for backport
/cc @pacoxu
@@ -61,7 +61,7 @@ func PerformPostUpgradeTasks(client clientset.Interface, cfg *kubeadmapi.InitCon | |||
} | |||
|
|||
// Create the new, version-branched kubelet ComponentConfig ConfigMap | |||
if err := kubeletphase.CreateConfigMap(&cfg.ClusterConfiguration, patchesDir, client); err != nil { | |||
if err := kubeletphase.CreateConfigMap(&cfg.ClusterConfiguration, client); err != nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
with the original PR were we trying to fix a bug or a problem in e2e tests?
i'm trying to understand what implications does this have on upgrades too.
i guess on upgrade if the user passes --patches they would only apply on the local upgraded node, which is expected.
i.e. not apply the patch on the CM, from "upgrade node" from a CP node.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think yes, the upgrade also does not require applying these patches to the global ConfigMap.
/retest
LGTM label has been added. Git tree hash: 5c7659695740a45ec6c34ab1b2ce718f8caad034
|
+1 for backport |
please send backports for these releases if you can, once this merges. |
/hold cancel |
The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass. This bot retests PRs for certain kubernetes repos according to the following rules:
You can:
/retest |
…093-upstream-release-1.29 Automated cherry pick of #123093: Revert "kubeadm: fix a bug where the uploaded kubelet
…093-upstream-release-1.28 Automated cherry pick of #123093: Revert "kubeadm: fix a bug where the uploaded kubelet
…093-upstream-release-1.27 Automated cherry pick of #123093: Revert "kubeadm: fix a bug where the uploaded kubelet
What type of PR is this?
/kind bug
What this PR does / why we need it:
revert kubeadm: fix a bug where the uploaded kubelet configuration in
kube-system/kubelet-config
ConfigMap does not respect user patchWhich issue(s) this PR fixes:
Fixes kubernetes/kubeadm#3008
Special notes for your reviewer:
Does this PR introduce a user-facing change?
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.: