53468 Commits

Author SHA1 Message Date
Abu Kashem
747a295cac fix flake in dra test 'TestPlugin'
TestPlugin/multi-claims-binding-conditions-all-success/PreEnqueue
flakes due to the assumed cache not been synced with the initial
store. The test waits until the registered handler used by the
assumed cache has synced before proceeding with the test
2025-08-18 15:54:03 -04:00
Abu Kashem
c8ab780edb dra plugin: assume claim after api call in bindClaim 2025-08-13 16:35:35 -04:00
yliao
2a026f6d65 1/ added retries to AssumeClaimAfterAPICall for the object which is not present in the cache (dynamicresources.go)
2/ modified the assume cache verification to not error out as long as
the expected claim is in the cache, no matter its latest and api object
are different or not. (dynamicresources_test.go).
3/ fixed nil panic as seen from https://prow.k8s.io/view/gs/kubernetes-ci-logs/pr-logs/pull/133321/pull-kubernetes-integration/1952472629470302208
2025-08-06 07:08:58 +00:00
Kubernetes Prow Robot
b37978f226 Merge pull request #133334 from macsko/fix_potential_race_in_patchpodstatus_api_call_implementation
Fix potential race in PodStatusPatchCall implementation
2025-08-01 02:47:45 -07:00
Kubernetes Prow Robot
ea81dd6d01 Merge pull request #133309 from macsko/fix_race_with_closing_api_dispatcher
Fix potential race in closing API dispatcher
2025-08-01 02:47:38 -07:00
Kubernetes Prow Robot
9e2a0c7453 Merge pull request #133293 from utam0k/kep-5278--fg-alpha
Demote KEP-5278 feature gates ClearingNominatedNodeNameAfterBinding and NominatedNodeNameForExpectation to Alpha
2025-07-31 02:37:16 -07:00
Maciej Skoczeń
9eda4789c0 Fix potential race in PodStatusPatchCall implementation 2025-07-31 09:27:40 +00:00
Kubernetes Prow Robot
032142c53e Merge pull request #133242 from ahmedtd/fix-podcerts
Pod Certificates: Fix kubelet volume host arg order; improve logging
2025-07-30 09:34:27 -07:00
Maciej Skoczeń
dbfeb9c351 Fix potential race in closing API dispatcher 2025-07-30 11:57:26 +00:00
Kensei Nakada
46b858aa13 fix: return false to apply the patch 2025-07-30 19:12:57 +09:00
Kubernetes Prow Robot
a59ad81135 Merge pull request #132522 from sunya-ch/KEP-5075-PR
DRA: Implementation of Consumable Capacity (KEP-5075)
2025-07-29 23:56:27 -07:00
utam0k
988c9b03fd Demote KEP-5278 feature gates ClearingNominatedNodeNameAfterBinding and NominatedNodeNameForExpectation to Alpha
Signed-off-by: utam0k <k0ma@utam0k.jp>
2025-07-30 15:48:26 +09:00
yliao
0a12f00e9d fix nil panic in hasBindingConditions, it cannot assume claim has allocations 2025-07-30 14:44:41 +09:00
Sunyanan Choochotkaew
7f052afaef KEP 5075: implement scheduler
Signed-off-by: Sunyanan Choochotkaew <sunyanan.choochotkaew1@ibm.com>
2025-07-30 09:52:49 +09:00
Kubernetes Prow Robot
91731d05e2 Merge pull request #133279 from ffromani/pod-level-resource-managers
[PodLevelResources] handle pod-level resource manager alignment
2025-07-29 17:28:33 -07:00
Dixita
3e3b2447ff Promote PodLevelResources to Beta (#132999)
Signed-off-by: ndixita <ndixita@google.com>
2025-07-29 17:28:26 -07:00
Sunyanan Choochotkaew
59bba92717 KEP-5075: generated codes from make update
Signed-off-by: Sunyanan Choochotkaew <sunyanan.choochotkaew1@ibm.com>
2025-07-30 09:26:52 +09:00
Sunyanan Choochotkaew
5ad969588d KEP-5075: API updates
Signed-off-by: Sunyanan Choochotkaew <sunyanan.choochotkaew1@ibm.com>
2025-07-30 09:26:40 +09:00
Kubernetes Prow Robot
1b273b385e Merge pull request #130653 from yliaog/master
kubelet and scheduler for extended resource backed by DRA
2025-07-29 13:04:27 -07:00
yliao
34a64db2c7 extended resource backed by DRA: implementation 2025-07-29 18:55:21 +00:00
Kubernetes Prow Robot
74f7a44966 Merge pull request #133276 from macsko/stop_clearing_nnn_in_all_cases
KEP-5278 Stop clearing NominatedNodeName in all cases
2025-07-29 11:24:40 -07:00
Francesco Romani
4ca47255a8 node: disable resource managers when pod-level resources are enabled
When pod-level resources are detected, the cpu and memory manages
cannot engage because the feature is not yet compatible,
one of the main reasons being the managers only work at container level.

So, the managers has to detect if pod level resources are in use,
and turn themselves to no-operation skipping resource allocation
should that be the case.

We add an intentional loud log to inform the user, because
pods with pod-level resources landing on a node which cannot
actuate the desired spec is likely to be undesirable.

Signed-off-by: Francesco Romani <fromani@redhat.com>
2025-07-29 20:19:40 +02:00
yliao
3068b60b83 extended resource backed by DRA: codegen 2025-07-29 17:17:20 +00:00
yliao
1f2fd18ac8 extended resource backed by DRA: API types.go 2025-07-29 17:17:19 +00:00
Kubernetes Prow Robot
656360f67c Merge pull request #133254 from HirazawaUi/fixinvalid-validation
Fix incorrect validation on the kubelet
2025-07-29 10:12:34 -07:00
Kubernetes Prow Robot
fd3c879a5b Merge pull request #132443 from utam0k/clearn-nnn-bind-api
Clear pod.Status.NominatedNodeName when pod is bound
2025-07-29 10:12:26 -07:00
Luiz Oliveira
7fbf63a23f HPA support for pod-level resource specifications (#132430)
* HPA support for pod-level resource specifications

* Add e2e tests for HPA support for pod-level resource specifications
2025-07-29 09:02:26 -07:00
utam0k
60fa65db88 Clear pod.Status.NominatedNodeName when pod is bound
Signed-off-by: utam0k <k0ma@utam0k.jp>
2025-07-29 23:48:11 +09:00
Francesco Romani
15b1a7fd31 Revert "CPU and Memory manager event when using pod level resources"
This reverts commit 7804b51f42.
2025-07-29 16:41:37 +02:00
Kubernetes Prow Robot
e2ab840708 Merge pull request #130160 from KobayashiD27/dra-device-binding-conditions
Implement DRA Device Binding Conditions (KEP-5007)
2025-07-29 07:34:26 -07:00
Maciej Skoczeń
aea0a3cca2 Run all relevant test cases with the feature gate enabled and disabled 2025-07-29 12:21:03 +00:00
utam0k
856e7d2383 scheduler: Stop clearing NominatedNodeName on all cases
Signed-off-by: utam0k <k0ma@utam0k.jp>
2025-07-29 12:21:03 +00:00
Kobayashi,Daisuke
e8c3af1f5c KEP-5007 DRA Device Binding Conditions: Implement scheduler logic 2025-07-29 11:34:30 +00:00
Kobayashi,Daisuke
ac81b829e4 KEP-5007 DRA Device Binding Conditions: Run make update 2025-07-29 11:34:03 +00:00
Kobayashi,Daisuke
987ad39516 KEP-5007 DRA Device Binding Conditions: API Related code Update 2025-07-29 11:32:47 +00:00
Kobayashi,Daisuke
34c3b09383 KEP-5007 DRA Device Binding Conditions: API Update 2025-07-29 11:31:48 +00:00
Kensei Nakada
ac9fad6030 feat: trigger PreFilterPreBind in the binding cycle 2025-07-29 19:01:02 +09:00
Taahir Ahmed
4874d41665 Pod Certs: Fix kubelet volume host arg order
Turned up during manual end-to-end testing of the Pod Certificates
feature.  This issue prevents podCertificate projected volumes from
successfully mounting.  Would have been caught by a feature e2e test.

After this fix, podCertificate volumes function correctly in a Kind
cluster.

Additionally, fix logging from podcertificatemanager.  In order for
projectionKey to have sensible logging output, its fields need to be
exported.
2025-07-28 21:42:42 -07:00
Kevin Torres
5672750e6a Unit tests for no hints nor aligment of CPU and Memory 2025-07-28 18:53:03 +00:00
Kevin Torres
7804b51f42 CPU and Memory manager event when using pod level resources 2025-07-28 18:53:03 +00:00
Kubernetes Prow Robot
924b324088 Merge pull request #133243 from yuanwang04/restart-rules
ContainerRestartRules feature gate should work with probes
2025-07-28 11:42:28 -07:00
Yuan Wang
fd206a0efb Add comments for restart rules not used for unknown container status and probes 2025-07-28 17:19:07 +00:00
Kubernetes Prow Robot
a2bf45b081 Merge pull request #133213 from sanposhiho/second-trial-conor
fix: handle corner cases in the async preemption
2025-07-28 10:06:36 -07:00
Kubernetes Prow Robot
2b2ea27250 Merge pull request #132868 from rata/userns-134-error-volume-devices
KEP-127 - validation: Return an error if user namespaces are used with volumeDevices
2025-07-28 10:06:30 -07:00
HirazawaUi
6997fbd1ed Fix incorrect validation on the kubelet 2025-07-29 00:02:20 +08:00
Rodrigo Campos
48f8458c41 validation: Fix user-namespaces test case name
hostPath is a supported volume since Kubernetes 1.28. Let's update it.

Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com>
2025-07-28 16:54:08 +02:00
Rodrigo Campos
50a7a8af4d validation: Align usage of hostUsers in error messages
Other validation errors, like using hostNetwork, don't put
pod.spec.HostNetwork in the error message.

Let's remove align with that.

Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com>
2025-07-28 16:54:08 +02:00
Rodrigo Campos
5f7e611f73 validation: Return error if hostUsers=false && volumeDevices
Now if a pod tries to use user namespaces (hostUsers: false) and a
volume device, it will see this error:
	$ kubectl apply -f pod.yaml
	...
	* spec.ephemeralContainers[0].volumeDevices: Forbidden: when `pod.Spec.HostUsers` is false
	* spec.initContainers[0].volumeDevices: Forbidden: when `pod.Spec.HostUsers` is false
	* spec.containers[0].volumeDevices: Forbidden: when `pod.Spec.HostUsers` is false

Note that if a pod is already created with volumeDevices and userns,
then we allow modifications to that object.

Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com>
2025-07-28 16:54:08 +02:00
Kensei Nakada
f3466f8adc fix: flake integration test 2025-07-28 23:12:58 +09:00
Kensei Nakada
ed74d4cd52 Revert "Revert "fix: handle corner cases in the async preemption""
This reverts commit 006d7620a8.
2025-07-28 20:22:27 +09:00