Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 1892376: Ignore if netns is already deleted while deleting ns #214

Merged
merged 1 commit into from Nov 3, 2020

Conversation

tssurya
Copy link
Contributor

@tssurya tssurya commented Nov 2, 2020

While deleting a namespace, we check and delete the netnamespace
and remove the corresponding netid from the masterVNIDMap cache.
However if the netns is deleted before the ns, we return an error
and do not remove it from the cache. Upon recreation of the same
ns/project in the future, a new netns does not get created because
according to the masterVNIDMap cache, that netns is already present.

In this patch we ignore, emit a warning and continue to remove the
netid from the masterVNIDMap cache if the netns is already deleted.
There is no point in returning an error if the objective in the end
is to have the netns deleted. The order of deletion between netns
and ns should not matter.

Signed-off-by: Surya Seetharaman suryaseetharaman.9@gmail.com

While deleting a namespace, we check and delete the netnamespace
and remove the corresponding netid from the masterVNIDMap cache.
However if the netns is deleted before the ns, we return an error
and do not remove it from the cache. Upon recreation of the same
ns/project in the future, a new netns does not get created because
according to the masterVNIDMap cache, that netns is already present.

In this patch we ignore, emit a warning and continue to remove the
netid from the masterVNIDMap cache if the netns is already deleted.
There is no point in returning an error if the objective in the end
is to have the netns deleted. The order of deletion between netns
and ns should not matter.

Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
@openshift-ci-robot openshift-ci-robot added bugzilla/severity-urgent Referenced Bugzilla bug's severity is urgent for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. labels Nov 2, 2020
@openshift-ci-robot
Copy link
Contributor

@tssurya: This pull request references Bugzilla bug 1892376, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.7.0) matches configured target release for branch (4.7.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

In response to this:

Bug 1892376: Ignore if netns is already deleted while deleting ns

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@tssurya
Copy link
Contributor Author

tssurya commented Nov 3, 2020

I don't know where/if I should add unit tests, there doesn't seem to be a mock for the networkClient portion of things, so the function I touched doesn't have tests.

@squeed
Copy link
Contributor

squeed commented Nov 3, 2020

These sorts of things are notoriously hard to mock out; that's OK.

/lgtm
/approve

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Nov 3, 2020
@openshift-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: squeed, tssurya

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Nov 3, 2020
@openshift-merge-robot openshift-merge-robot merged commit 0e16618 into openshift:master Nov 3, 2020
@openshift-ci-robot
Copy link
Contributor

@tssurya: All pull requests linked via external trackers have merged:

Bugzilla bug 1892376 has been moved to the MODIFIED state.

In response to this:

Bug 1892376: Ignore if netns is already deleted while deleting ns

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@tssurya
Copy link
Contributor Author

tssurya commented Nov 3, 2020

thanks casey!

/cherry-pick release-4.6

@openshift-cherrypick-robot

@tssurya: new pull request created: #216

In response to this:

thanks casey!

/cherry-pick release-4.6

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/severity-urgent Referenced Bugzilla bug's severity is urgent for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants