Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rebase 1.19.0 beta.0 #145

Merged
merged 1,919 commits into from Jun 11, 2020
Merged

Rebase 1.19.0 beta.0 #145

merged 1,919 commits into from Jun 11, 2020

Conversation

marun
Copy link

@marun marun commented Jun 11, 2020

No description provided.

k8s-ci-robot and others added 30 commits May 12, 2020 15:50
improve error logging on e2e pod create function
…l-lowercase

Ensure the server FQIN is stored and searched in lowercase (vsphere)
Improves unittest codecoverage for azure_securitygroupclient
proxy: followup to last-queued-change metric
We should read and verify the data before actually closing the
connection to avoid connection based-races within the test.

Signed-off-by: Sascha Grunert <sgrunert@suse.com>
fix some fixture path calculations
base-images: Update to kube-cross:v1.13.9-5
…er-fixup

service controller: clean up unit tests
…eview

Indicate node authorizer does not support rule resolution
…d-member-add

kubeadm: fix flakes when performing etcd MemberAdd on slower setups
ginkgo has a weird bug that - AfterEach does not get called when
testsuite exits with certain kind of interrupt (Ctrl-C for example).
More info - onsi/ginkgo#222

We workaround this issue in Kubernetes by adding a special hook into
AfterSuite call, but AfterSuite can not be used to peforms certain
kind of cleanup because it can race with AfterEach hook and
framework.AfterEach hook will set framework.ClientSet to nil.

This presents a problem in cleaning up CSI driver and testpods. This
PR removes cleanup of driver manifest via CleanupAction because that
is not safe and racy (such as f.ClientSet may disappear!) and makes
AfterSuite hooks run in a ordered fashion
Signed-off-by: Aldo Culquicondor <acondor@google.com>
In case two or more controllers share the informers created through InitTestScheduler,
it's not safe to start the informers until all controllers set their informer
indexers. Otherwise, some controller might fail to register their indexers
in time. Thus, it's responsibility of each consumer to make sure all informers
are started after all controllers had time to get initiliazed.
Promote GlobalAccess for GCE Internal Loadbalancers to GA
…affic

ensure that when a pod servicing UDP traffic is deleted the conntrack entries
are cleaned up and another backend can pick up the traffic  with minimal
interruption

When using NodePort services and long running connections that on pod deletion
stale conntrack entries can halt the flow of traffic. Add a test case to check
that conntrack entries are cleaned up.
Deprecating Kubelet not used testing flags
deads2k and others added 21 commits June 10, 2020 18:53
Origin-commit: 131dbb4770bb3bed0c07d2a6ca0cbe4cba2556bb
This line makes the upgrade log output unreadable and provides
no value during the set of tests it's used in:

```
Jan 12 20:49:25.628: INFO: cluster upgrade is Progressing: Working towards registry.svc.ci.openshift.org/ci-op-jbtg7jjb/release@sha256:144e73d125cce620bdf099be9a85225ade489a95622a70075d264ea3ff79219c: downloading update
Jan 12 20:49:26.692: INFO: Poke("http://a74e3476115ce4d2d817a1e5ea608dad-802917831.us-east-1.elb.amazonaws.com:80/echo?msg=hello"): success
Jan 12 20:49:28.727: INFO: Poke("http://a74e3476115ce4d2d817a1e5ea608dad-802917831.us-east-1.elb.amazonaws.com:80/echo?msg=hello"): success
```

Origin-commit: 1cdf04c0e15b79fad3e3a6ba896ed2bb3df42b78
…o function

Origin-commit: 0d7fb2d769d631054ec9ac0721aee623c96c1001
Origin-commit: cb0b340d0e68c9524fa7fd6277f571b6aa68bf86
The following packages have tests that exceed the default 120s
timeout:

k8s.io/kubernetes/pkg/kubelet/volumemanager/reconciler

 - The tests in this package collectively take longer than 120s.

k8s.io/kubernetes/pkg/volume/csi

 - One of the unit tests has to wait 2 minutes for a timeout to
   validate its failure condition.
… secret

This patch brings back the downstream changes that were introduced
to allow reading openstack cloud provider config from a secret.
They are available in release-4.4, but were reverted in master with
openshift/origin#24719

This change includes:

- Ability to read metadata values for kubelet. Since the service
does not have access to the secret to read the configuration, but
it needs data to download (e.g. hostname or flavor), we are trying
to get it from the metadata server.

- Deprecation of kubeConfig parameter. Now we read the file that
was provided with --kubeconfig option.

Origin-commit: f95edc26155a29769b3c5b80c03755a01a87b5fc
…nodes

In 16443 a set of changes were made to enable service load balancers
for Kube 1.1 and GCP to exclude unschedulable nodes from load balancer
pools. However, Unschedulable has nothing to do with whether nodes
should host service load balancer pods - the act of preventing new
pods from landing on a node has no impact on existing workloads.

In general nodes are not special, and a user who wants to exclude
otherwise healthy nodes can use the beta service load balancer
label to exclude the node from the LB pool.

This commit removes the check for unschedulable nodes from the
LB pool.

Origin-commit: 0d1e1e134816f678234d884d0457e7ef1da510d2
…oken secrets

Previously the serving service CA was added to token secrets by
default. This commit changes the addition to be disabled by default
and optionally enabled by setting
ADD_SERVICE_SERVING_CA_TO_TOKEN_SECRETS=true in the environment.

Origin-commit: f24fbff3f692fe13ed7f229ddfa47dca6828e79d
…anage

Origin-commit: 59d4df02ece2eeeb7701c3b09c8e0a3f59198b56
…ndler chain

Origin-commit: 5772e7285acbe901762d8cd8cb1fc33d8b459d04
Origin-commit: ea5a6809e96cef1c6a9fe99caeda9db6e31f6962
@marun marun merged commit 62fcb7e into openshift:marun-testing6 Jun 11, 2020
@openshift-ci-robot openshift-ci-robot added area/dependency Issues or PRs related to dependency changes kind/api-change Categorizes issue or PR as related to adding, removing, or otherwise changing an API labels Jun 11, 2020
@openshift-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: marun
To complete the pull request process, please assign smarterclayton
You can assign the PR to them by writing /assign @smarterclayton in a comment when ready.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the do-not-merge/invalid-owners-file Indicates that a PR should not merge because it has an invalid OWNERS file in it. label Jun 11, 2020
@openshift-ci-robot
Copy link

The following users are mentioned in OWNERS file(s) but are untrusted for the following reasons. One way to make the user trusted is to add them as members of the openshift org. You can then trigger verification by writing /verify-owners in a comment.

  • brianpursley
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.
  • hasheddan
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.
  • jdumars
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.
  • pwittrock
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.
  • zhouya0
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.
  • cheftako
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.
    • cluster/OWNERS

@openshift-ci-robot
Copy link

@marun: The following tests failed, say /retest to rerun all failed tests:

Test name Commit Details Rerun command
ci/prow/verify 70be8d6 link /test verify
ci/prow/e2e-gcp-image-ecosystem 70be8d6 link /test e2e-gcp-image-ecosystem
ci/prow/e2e-gcp-builds 70be8d6 link /test e2e-gcp-builds
ci/prow/launch-vsphere 70be8d6 link /test launch-vsphere
ci/prow/e2e-vsphere 70be8d6 link /test e2e-vsphere
ci/prow/e2e-gcp-upgrade 70be8d6 link /test e2e-gcp-upgrade
ci/prow/e2e-cmd 70be8d6 link /test e2e-cmd
ci/prow/e2e-azure 70be8d6 link /test e2e-azure
ci/prow/e2e-conformance-k8s 70be8d6 link /test e2e-conformance-k8s
ci/prow/e2e-aws-serial 70be8d6 link /test e2e-aws-serial
ci/prow/images 70be8d6 link /test images
ci/prow/e2e-aws-jenkins 70be8d6 link /test e2e-aws-jenkins
ci/prow/e2e-gcp 70be8d6 link /test e2e-gcp
ci/prow/e2e-aws-ovn 70be8d6 link /test e2e-aws-ovn
ci/prow/unit 70be8d6 link /test unit

Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/dependency Issues or PRs related to dependency changes do-not-merge/invalid-owners-file Indicates that a PR should not merge because it has an invalid OWNERS file in it. kind/api-change Categorizes issue or PR as related to adding, removing, or otherwise changing an API
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet