mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-31 02:08:13 +00:00 
			
		
		
		
	grammar: replace all occurrences of "the the" with "the"
This commit is contained in:
		| @@ -1870,7 +1870,7 @@ The feature gate currently falls back to the default behavior in most cases. Ena | |||||||
| - CRIContainerLogRotation graduates to GA and unconditionally enabled. ([#99651](https://github.com/kubernetes/kubernetes/pull/99651), [@umohnani8](https://github.com/umohnani8)) | - CRIContainerLogRotation graduates to GA and unconditionally enabled. ([#99651](https://github.com/kubernetes/kubernetes/pull/99651), [@umohnani8](https://github.com/umohnani8)) | ||||||
| - Component owner can configure the allowlist of metric label with flag '--allow-metric-labels'. ([#99385](https://github.com/kubernetes/kubernetes/pull/99385), [@YoyinZyc](https://github.com/YoyinZyc)) [SIG API Machinery, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation and Release] | - Component owner can configure the allowlist of metric label with flag '--allow-metric-labels'. ([#99385](https://github.com/kubernetes/kubernetes/pull/99385), [@YoyinZyc](https://github.com/YoyinZyc)) [SIG API Machinery, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation and Release] | ||||||
| - Component owner can configure the allowlist of metric label with flag '--allow-metric-labels'. ([#99738](https://github.com/kubernetes/kubernetes/pull/99738), [@YoyinZyc](https://github.com/YoyinZyc)) [SIG API Machinery, Cluster Lifecycle and Instrumentation] | - Component owner can configure the allowlist of metric label with flag '--allow-metric-labels'. ([#99738](https://github.com/kubernetes/kubernetes/pull/99738), [@YoyinZyc](https://github.com/YoyinZyc)) [SIG API Machinery, Cluster Lifecycle and Instrumentation] | ||||||
| - EmptyDir memory backed volumes are sized as the the minimum of pod allocatable memory on a host and an optional explicit user provided value. ([#100319](https://github.com/kubernetes/kubernetes/pull/100319), [@derekwaynecarr](https://github.com/derekwaynecarr)) [SIG Node] | - EmptyDir memory backed volumes are sized as the minimum of pod allocatable memory on a host and an optional explicit user provided value. ([#100319](https://github.com/kubernetes/kubernetes/pull/100319), [@derekwaynecarr](https://github.com/derekwaynecarr)) [SIG Node] | ||||||
| - Enables Kubelet to check volume condition and log events to corresponding pods. ([#99284](https://github.com/kubernetes/kubernetes/pull/99284), [@fengzixu](https://github.com/fengzixu)) [SIG Apps, Instrumentation, Node and Storage] | - Enables Kubelet to check volume condition and log events to corresponding pods. ([#99284](https://github.com/kubernetes/kubernetes/pull/99284), [@fengzixu](https://github.com/fengzixu)) [SIG Apps, Instrumentation, Node and Storage] | ||||||
| - EndpointSliceNodeName graduates to GA and thus will be unconditionally enabled -- NodeName will always be available in the v1beta1 API. ([#99746](https://github.com/kubernetes/kubernetes/pull/99746), [@swetharepakula](https://github.com/swetharepakula)) | - EndpointSliceNodeName graduates to GA and thus will be unconditionally enabled -- NodeName will always be available in the v1beta1 API. ([#99746](https://github.com/kubernetes/kubernetes/pull/99746), [@swetharepakula](https://github.com/swetharepakula)) | ||||||
| - Export `NewDebuggingRoundTripper` function and `DebugLevel` options in the k8s.io/client-go/transport package. ([#98324](https://github.com/kubernetes/kubernetes/pull/98324), [@atosatto](https://github.com/atosatto)) | - Export `NewDebuggingRoundTripper` function and `DebugLevel` options in the k8s.io/client-go/transport package. ([#98324](https://github.com/kubernetes/kubernetes/pull/98324), [@atosatto](https://github.com/atosatto)) | ||||||
| @@ -2256,7 +2256,7 @@ filename | sha512 hash | |||||||
| ### Feature | ### Feature | ||||||
|  |  | ||||||
| - Add e2e test to validate performance metrics of volume lifecycle operations ([#94334](https://github.com/kubernetes/kubernetes/pull/94334), [@RaunakShah](https://github.com/RaunakShah)) [SIG Storage and Testing] | - Add e2e test to validate performance metrics of volume lifecycle operations ([#94334](https://github.com/kubernetes/kubernetes/pull/94334), [@RaunakShah](https://github.com/RaunakShah)) [SIG Storage and Testing] | ||||||
| - EmptyDir memory backed volumes are sized as the the minimum of pod allocatable memory on a host and an optional explicit user provided value. ([#100319](https://github.com/kubernetes/kubernetes/pull/100319), [@derekwaynecarr](https://github.com/derekwaynecarr)) [SIG Node] | - EmptyDir memory backed volumes are sized as the minimum of pod allocatable memory on a host and an optional explicit user provided value. ([#100319](https://github.com/kubernetes/kubernetes/pull/100319), [@derekwaynecarr](https://github.com/derekwaynecarr)) [SIG Node] | ||||||
| - Enables Kubelet to check volume condition and log events to corresponding pods. ([#99284](https://github.com/kubernetes/kubernetes/pull/99284), [@fengzixu](https://github.com/fengzixu)) [SIG Apps, Instrumentation, Node and Storage] | - Enables Kubelet to check volume condition and log events to corresponding pods. ([#99284](https://github.com/kubernetes/kubernetes/pull/99284), [@fengzixu](https://github.com/fengzixu)) [SIG Apps, Instrumentation, Node and Storage] | ||||||
| - Introduce a churn operator to scheduler perf testing framework. ([#98900](https://github.com/kubernetes/kubernetes/pull/98900), [@Huang-Wei](https://github.com/Huang-Wei)) [SIG Scheduling and Testing] | - Introduce a churn operator to scheduler perf testing framework. ([#98900](https://github.com/kubernetes/kubernetes/pull/98900), [@Huang-Wei](https://github.com/Huang-Wei)) [SIG Scheduling and Testing] | ||||||
| - Kubernetes is now built with Golang 1.16.1 ([#100106](https://github.com/kubernetes/kubernetes/pull/100106), [@justaugustus](https://github.com/justaugustus)) [SIG Cloud Provider, Instrumentation, Release and Testing] | - Kubernetes is now built with Golang 1.16.1 ([#100106](https://github.com/kubernetes/kubernetes/pull/100106), [@justaugustus](https://github.com/justaugustus)) [SIG Cloud Provider, Instrumentation, Release and Testing] | ||||||
|   | |||||||
| @@ -2173,7 +2173,7 @@ Data corruption issue was found in etcd v3.5.0 release that was shipped with 1.2 | |||||||
| - The CSI driver supports the NodeServiceCapability `VOLUME_MOUNT_GROUP` and the `DelegateFSGroupToCSIDriver` feature gate is enabled, kubelet will delegate applying FSGroup to the driver by passing it to `NodeStageVolume` and `NodePublishVolume`, regardless of what other `FSGroup` policies are set, this is an alpha feature. ([#103244](https://github.com/kubernetes/kubernetes/pull/103244), [@verult](https://github.com/verult)) | - The CSI driver supports the NodeServiceCapability `VOLUME_MOUNT_GROUP` and the `DelegateFSGroupToCSIDriver` feature gate is enabled, kubelet will delegate applying FSGroup to the driver by passing it to `NodeStageVolume` and `NodePublishVolume`, regardless of what other `FSGroup` policies are set, this is an alpha feature. ([#103244](https://github.com/kubernetes/kubernetes/pull/103244), [@verult](https://github.com/verult)) | ||||||
| - The Memory Manager feature graduates to Beta and it is enabled by default. ([#101947](https://github.com/kubernetes/kubernetes/pull/101947), [@cynepco3hahue](https://github.com/cynepco3hahue)) | - The Memory Manager feature graduates to Beta and it is enabled by default. ([#101947](https://github.com/kubernetes/kubernetes/pull/101947), [@cynepco3hahue](https://github.com/cynepco3hahue)) | ||||||
| - The `BoundServiceAccountTokenVolume` graduates to GA and thus will be unconditionally enabled. The feature gate is going to be removed in 1.23. ([#101992](https://github.com/kubernetes/kubernetes/pull/101992), [@zshihang](https://github.com/zshihang)) | - The `BoundServiceAccountTokenVolume` graduates to GA and thus will be unconditionally enabled. The feature gate is going to be removed in 1.23. ([#101992](https://github.com/kubernetes/kubernetes/pull/101992), [@zshihang](https://github.com/zshihang)) | ||||||
| - The `EmptyDir` memory backed volumes are sized as the the minimum of pod allocatable memory on a host and an optional explicit user provided value. ([#101048](https://github.com/kubernetes/kubernetes/pull/101048), [@dims](https://github.com/dims)) | - The `EmptyDir` memory backed volumes are sized as the minimum of pod allocatable memory on a host and an optional explicit user provided value. ([#101048](https://github.com/kubernetes/kubernetes/pull/101048), [@dims](https://github.com/dims)) | ||||||
| - The `HugePageStorageMediumSize` feature graduates to GA and unconditionally enabled. Allowing unconditional usage of multiple sizes huge page resources on a container level. ([#99144](https://github.com/kubernetes/kubernetes/pull/99144), [@bart0sh](https://github.com/bart0sh)) | - The `HugePageStorageMediumSize` feature graduates to GA and unconditionally enabled. Allowing unconditional usage of multiple sizes huge page resources on a container level. ([#99144](https://github.com/kubernetes/kubernetes/pull/99144), [@bart0sh](https://github.com/bart0sh)) | ||||||
| - The `IngressClassNamespacedParams` feature gate has graduated to beta and is enabled by default. This means IngressClass resource will now have two new fields - `spec.paramters.namespace` and `spec.parameters.scope`. ([#101711](https://github.com/kubernetes/kubernetes/pull/101711), [@hbagdi](https://github.com/hbagdi)) | - The `IngressClassNamespacedParams` feature gate has graduated to beta and is enabled by default. This means IngressClass resource will now have two new fields - `spec.paramters.namespace` and `spec.parameters.scope`. ([#101711](https://github.com/kubernetes/kubernetes/pull/101711), [@hbagdi](https://github.com/hbagdi)) | ||||||
| - The `LogarithmicScaleDown` feature graduates to Beta and enabled by default. ([#101767](https://github.com/kubernetes/kubernetes/pull/101767), [@damemi](https://github.com/damemi)) | - The `LogarithmicScaleDown` feature graduates to Beta and enabled by default. ([#101767](https://github.com/kubernetes/kubernetes/pull/101767), [@damemi](https://github.com/damemi)) | ||||||
| @@ -3710,7 +3710,7 @@ filename | sha512 hash | |||||||
| - Base image updates to mitigate kube-proxy and etcd container image CVEs | - Base image updates to mitigate kube-proxy and etcd container image CVEs | ||||||
|   - debian-base to buster-v1.6.0 |   - debian-base to buster-v1.6.0 | ||||||
|   - debian-iptables to buster-v1.6.0 ([#100976](https://github.com/kubernetes/kubernetes/pull/100976), [@jindijamie](https://github.com/jindijamie)) [SIG Release and Testing] |   - debian-iptables to buster-v1.6.0 ([#100976](https://github.com/kubernetes/kubernetes/pull/100976), [@jindijamie](https://github.com/jindijamie)) [SIG Release and Testing] | ||||||
| - EmptyDir memory backed volumes are sized as the the minimum of pod allocatable memory on a host and an optional explicit user provided value. ([#101048](https://github.com/kubernetes/kubernetes/pull/101048), [@dims](https://github.com/dims)) [SIG Node] | - EmptyDir memory backed volumes are sized as the minimum of pod allocatable memory on a host and an optional explicit user provided value. ([#101048](https://github.com/kubernetes/kubernetes/pull/101048), [@dims](https://github.com/dims)) [SIG Node] | ||||||
| - Fluentd: isolate logging resources in separate namespace ([#68004](https://github.com/kubernetes/kubernetes/pull/68004), [@saravanan30erd](https://github.com/saravanan30erd)) [SIG Cloud Provider and Instrumentation] | - Fluentd: isolate logging resources in separate namespace ([#68004](https://github.com/kubernetes/kubernetes/pull/68004), [@saravanan30erd](https://github.com/saravanan30erd)) [SIG Cloud Provider and Instrumentation] | ||||||
| - It add two flags, `--max-pods` and `--extended-resources` ([#100267](https://github.com/kubernetes/kubernetes/pull/100267), [@Jeffwan](https://github.com/Jeffwan)) [SIG Node and Scalability] | - It add two flags, `--max-pods` and `--extended-resources` ([#100267](https://github.com/kubernetes/kubernetes/pull/100267), [@Jeffwan](https://github.com/Jeffwan)) [SIG Node and Scalability] | ||||||
| - Kube config is now exposed in the scheduler framework handle. Out-of-tree plugins can leverage that to build CRD informers easily. ([#100644](https://github.com/kubernetes/kubernetes/pull/100644), [@Huang-Wei](https://github.com/Huang-Wei)) [SIG Apps, Scheduling and Testing] | - Kube config is now exposed in the scheduler framework handle. Out-of-tree plugins can leverage that to build CRD informers easily. ([#100644](https://github.com/kubernetes/kubernetes/pull/100644), [@Huang-Wei](https://github.com/Huang-Wei)) [SIG Apps, Scheduling and Testing] | ||||||
|   | |||||||
| @@ -2825,7 +2825,7 @@ filename | sha512 hash | |||||||
| - Fixes a bug that could result in the EndpointSlice controller unnecessarily updating EndpointSlices associated with a Service that had Topology Aware Hints enabled. (#105267, @llhuii) [SIG Apps and Network] | - Fixes a bug that could result in the EndpointSlice controller unnecessarily updating EndpointSlices associated with a Service that had Topology Aware Hints enabled. (#105267, @llhuii) [SIG Apps and Network] | ||||||
| - Fixes the `should support building a client with a CSR` e2e test to work with clusters configured with short certificate lifetimes (#105396, @liggitt) [SIG Auth and Testing] | - Fixes the `should support building a client with a CSR` e2e test to work with clusters configured with short certificate lifetimes (#105396, @liggitt) [SIG Auth and Testing] | ||||||
| - Generic ephemeral volumes can be used also as raw block devices, but the Pod validation was refusing to create pods with that combination. (#105682, @pohly) [SIG Apps, Storage and Testing] | - Generic ephemeral volumes can be used also as raw block devices, but the Pod validation was refusing to create pods with that combination. (#105682, @pohly) [SIG Apps, Storage and Testing] | ||||||
| - Generic ephemeral volumes were not considered properly by the the node limits scheduler filter and the kubelet hostpath check. (#100482, @pohly) [SIG Node, Scheduling, Storage and Testing] | - Generic ephemeral volumes were not considered properly by the node limits scheduler filter and the kubelet hostpath check. (#100482, @pohly) [SIG Node, Scheduling, Storage and Testing] | ||||||
| - Kube-apiserver: fix a memory leak when deleting multiple objects with a deletecollection. (#105606, @sxllwx) [SIG API Machinery] | - Kube-apiserver: fix a memory leak when deleting multiple objects with a deletecollection. (#105606, @sxllwx) [SIG API Machinery] | ||||||
| - Kubeadm: do not allow empty "--config" paths to be passed to "kubeadm kubeconfig user" (#105649, @navist2020) [SIG Cluster Lifecycle] | - Kubeadm: do not allow empty "--config" paths to be passed to "kubeadm kubeconfig user" (#105649, @navist2020) [SIG Cluster Lifecycle] | ||||||
| - Kubelet did not report `kubelet_volume_stats_*` metrics for generic ephemeral voiumes. (#105569, @pohly) [SIG Node] | - Kubelet did not report `kubelet_volume_stats_*` metrics for generic ephemeral voiumes. (#105569, @pohly) [SIG Node] | ||||||
|   | |||||||
| @@ -236,7 +236,7 @@ func podToEndpointAddressForService(svc *v1.Service, pod *v1.Pod) (*v1.EndpointA | |||||||
| 			// this is *most probably* the case. | 			// this is *most probably* the case. | ||||||
|  |  | ||||||
| 			// if the family was incorrectly identified then this will be corrected once the | 			// if the family was incorrectly identified then this will be corrected once the | ||||||
| 			// the upgrade is completed (controller connects to api-server that correctly defaults services) | 			// upgrade is completed (controller connects to api-server that correctly defaults services) | ||||||
| 			if utilnet.IsIPv6String(pod.Status.PodIP) { | 			if utilnet.IsIPv6String(pod.Status.PodIP) { | ||||||
| 				ipFamily = v1.IPv6Protocol | 				ipFamily = v1.IPv6Protocol | ||||||
| 			} | 			} | ||||||
|   | |||||||
| @@ -317,7 +317,7 @@ func iterateAllProviderTopologyHints(allProviderHints [][]TopologyHint, callback | |||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		// Loop through all hints for provider 'i', and recurse to build the | 		// Loop through all hints for provider 'i', and recurse to build the | ||||||
| 		// the permutation of this hint with all hints from providers 'i++'. | 		// permutation of this hint with all hints from providers 'i++'. | ||||||
| 		for j := range allProviderHints[i] { | 		for j := range allProviderHints[i] { | ||||||
| 			iterate(i+1, append(accum, allProviderHints[i][j])) | 			iterate(i+1, append(accum, allProviderHints[i][j])) | ||||||
| 		} | 		} | ||||||
|   | |||||||
| @@ -916,7 +916,7 @@ func (p *podWorkers) managePodLoop(podUpdates <-chan podWork) { | |||||||
| 				// wait until we see the next refresh from the PLEG via the cache (max 2s) | 				// wait until we see the next refresh from the PLEG via the cache (max 2s) | ||||||
| 				// TODO: this adds ~1s of latency on all transitions from sync to terminating | 				// TODO: this adds ~1s of latency on all transitions from sync to terminating | ||||||
| 				//  to terminated, and on all termination retries (including evictions). We should | 				//  to terminated, and on all termination retries (including evictions). We should | ||||||
| 				//  improve latency by making the the pleg continuous and by allowing pod status | 				//  improve latency by making the pleg continuous and by allowing pod status | ||||||
| 				//  changes to be refreshed when key events happen (killPod, sync->terminating). | 				//  changes to be refreshed when key events happen (killPod, sync->terminating). | ||||||
| 				//  Improving this latency also reduces the possibility that a terminated | 				//  Improving this latency also reduces the possibility that a terminated | ||||||
| 				//  container's status is garbage collected before we have a chance to update the | 				//  container's status is garbage collected before we have a chance to update the | ||||||
|   | |||||||
| @@ -286,7 +286,7 @@ type DeviceMounter interface { | |||||||
|  |  | ||||||
| type BulkVolumeVerifier interface { | type BulkVolumeVerifier interface { | ||||||
| 	// BulkVerifyVolumes checks whether the list of volumes still attached to the | 	// BulkVerifyVolumes checks whether the list of volumes still attached to the | ||||||
| 	// the clusters in the node. It returns a map which maps from the volume spec to the checking result. | 	// clusters in the node. It returns a map which maps from the volume spec to the checking result. | ||||||
| 	// If an error occurs during check - error should be returned and volume on nodes | 	// If an error occurs during check - error should be returned and volume on nodes | ||||||
| 	// should be assumed as still attached. | 	// should be assumed as still attached. | ||||||
| 	BulkVerifyVolumes(volumesByNode map[types.NodeName][]*Spec) (map[types.NodeName]map[*Spec]bool, error) | 	BulkVerifyVolumes(volumesByNode map[types.NodeName][]*Spec) (map[types.NodeName]map[*Spec]bool, error) | ||||||
|   | |||||||
| @@ -85,7 +85,7 @@ func (ps *Plugins) Register(name string, plugin Factory) { | |||||||
| 	ps.registry[name] = plugin | 	ps.registry[name] = plugin | ||||||
| } | } | ||||||
|  |  | ||||||
| // getPlugin creates an instance of the named plugin.  It returns `false` if the | // getPlugin creates an instance of the named plugin.  It returns `false` if | ||||||
| // the name is not known. The error is returned only when the named provider was | // the name is not known. The error is returned only when the named provider was | ||||||
| // known but failed to initialize.  The config parameter specifies the io.Reader | // known but failed to initialize.  The config parameter specifies the io.Reader | ||||||
| // handler of the configuration file for the cloud provider, or nil for no configuration. | // handler of the configuration file for the cloud provider, or nil for no configuration. | ||||||
|   | |||||||
| @@ -25,7 +25,7 @@ import ( | |||||||
| // NameGenerator generates names for objects. Some backends may have more information | // NameGenerator generates names for objects. Some backends may have more information | ||||||
| // available to guide selection of new names and this interface hides those details. | // available to guide selection of new names and this interface hides those details. | ||||||
| type NameGenerator interface { | type NameGenerator interface { | ||||||
| 	// GenerateName generates a valid name from the base name, adding a random suffix to the | 	// GenerateName generates a valid name from the base name, adding a random suffix to | ||||||
| 	// the base. If base is valid, the returned name must also be valid. The generator is | 	// the base. If base is valid, the returned name must also be valid. The generator is | ||||||
| 	// responsible for knowing the maximum valid name length. | 	// responsible for knowing the maximum valid name length. | ||||||
| 	GenerateName(base string) string | 	GenerateName(base string) string | ||||||
|   | |||||||
| @@ -336,7 +336,7 @@ func (r *RuntimeSort) Less(i, j int) bool { | |||||||
|  |  | ||||||
| // OriginalPosition returns the starting (original) position of a particular index. | // OriginalPosition returns the starting (original) position of a particular index. | ||||||
| // e.g. If OriginalPosition(0) returns 5 than the | // e.g. If OriginalPosition(0) returns 5 than the | ||||||
| // the item currently at position 0 was at position 5 in the original unsorted array. | // item currently at position 0 was at position 5 in the original unsorted array. | ||||||
| func (r *RuntimeSort) OriginalPosition(ix int) int { | func (r *RuntimeSort) OriginalPosition(ix int) int { | ||||||
| 	if ix < 0 || ix > len(r.origPosition) { | 	if ix < 0 || ix > len(r.origPosition) { | ||||||
| 		return -1 | 		return -1 | ||||||
|   | |||||||
| @@ -126,7 +126,7 @@ var codeFilterRE = regexp.MustCompile(`/github.com/onsi/ginkgo/v2/`) | |||||||
| func PrunedStack(skip int) []byte { | func PrunedStack(skip int) []byte { | ||||||
| 	fullStackTrace := debug.Stack() | 	fullStackTrace := debug.Stack() | ||||||
| 	stack := bytes.Split(fullStackTrace, []byte("\n")) | 	stack := bytes.Split(fullStackTrace, []byte("\n")) | ||||||
| 	// Ensure that the even entries are the method names and the | 	// Ensure that the even entries are the method names and | ||||||
| 	// the odd entries the source code information. | 	// the odd entries the source code information. | ||||||
| 	if len(stack) > 0 && bytes.HasPrefix(stack[0], []byte("goroutine ")) { | 	if len(stack) > 0 && bytes.HasPrefix(stack[0], []byte("goroutine ")) { | ||||||
| 		// Ignore "goroutine 29 [running]:" line. | 		// Ignore "goroutine 29 [running]:" line. | ||||||
|   | |||||||
| @@ -159,7 +159,7 @@ func waitAndVerifyLBWithTier(jig *e2eservice.TestJig, existingIP string, waitTim | |||||||
| 	} | 	} | ||||||
| 	// If the IP has been used by previous test, sometimes we get the lingering | 	// If the IP has been used by previous test, sometimes we get the lingering | ||||||
| 	// 404 errors even after the LB is long gone. Tolerate and retry until the | 	// 404 errors even after the LB is long gone. Tolerate and retry until the | ||||||
| 	// the new LB is fully established. | 	// new LB is fully established. | ||||||
| 	e2eservice.TestReachableHTTPWithRetriableErrorCodes(ingressIP, svcPort, []int{http.StatusNotFound}, checkTimeout) | 	e2eservice.TestReachableHTTPWithRetriableErrorCodes(ingressIP, svcPort, []int{http.StatusNotFound}, checkTimeout) | ||||||
|  |  | ||||||
| 	// Verify the network tier matches the desired. | 	// Verify the network tier matches the desired. | ||||||
|   | |||||||
| @@ -319,7 +319,7 @@ func StopServeHostnameService(clientset clientset.Interface, ns, name string) er | |||||||
| } | } | ||||||
|  |  | ||||||
| // verifyServeHostnameServiceUp wgets the given serviceIP:servicePort from the | // verifyServeHostnameServiceUp wgets the given serviceIP:servicePort from the | ||||||
| // the host exec pod of host network type and from the exec pod of container network type. | // host exec pod of host network type and from the exec pod of container network type. | ||||||
| // Each pod in the service is expected to echo its name. These names are compared with the | // Each pod in the service is expected to echo its name. These names are compared with the | ||||||
| // given expectedPods list after a sort | uniq. | // given expectedPods list after a sort | uniq. | ||||||
| func verifyServeHostnameServiceUp(c clientset.Interface, ns string, expectedPods []string, serviceIP string, servicePort int) error { | func verifyServeHostnameServiceUp(c clientset.Interface, ns string, expectedPods []string, serviceIP string, servicePort int) error { | ||||||
|   | |||||||
| @@ -135,7 +135,7 @@ var _ = SIGDescribe("[Feature:Windows] SecurityContext", func() { | |||||||
| 		ginkgo.By("Creating a pod with SELinux options") | 		ginkgo.By("Creating a pod with SELinux options") | ||||||
| 		// It is sufficient to show that the pod comes up here. Since we're stripping the SELinux and other linux | 		// It is sufficient to show that the pod comes up here. Since we're stripping the SELinux and other linux | ||||||
| 		// security contexts in apiserver and not updating the pod object in the apiserver, we cannot validate the | 		// security contexts in apiserver and not updating the pod object in the apiserver, we cannot validate the | ||||||
| 		// the pod object to not have those security contexts. However the pod coming to running state is a sufficient | 		// pod object to not have those security contexts. However the pod coming to running state is a sufficient | ||||||
| 		// enough condition for us to validate since prior to https://github.com/kubernetes/kubernetes/pull/93475 | 		// enough condition for us to validate since prior to https://github.com/kubernetes/kubernetes/pull/93475 | ||||||
| 		// the pod would have failed to come up. | 		// the pod would have failed to come up. | ||||||
| 		windowsPodWithSELinux := createTestPod(f, windowsBusyBoximage, windowsOS) | 		windowsPodWithSELinux := createTestPod(f, windowsBusyBoximage, windowsOS) | ||||||
|   | |||||||
| @@ -163,7 +163,7 @@ func TestJobPodFailurePolicyWithFailedPodDeletedDuringControllerRestart(t *testi | |||||||
| 			return false, nil | 			return false, nil | ||||||
| 		}) | 		}) | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			t.Logf("Failed awaiting for the the finalizer removal for pod %v", klog.KObj(jobPods[failedIndex])) | 			t.Logf("Failed awaiting for the finalizer removal for pod %v", klog.KObj(jobPods[failedIndex])) | ||||||
| 		} | 		} | ||||||
| 		wg.Done() | 		wg.Done() | ||||||
| 	}() | 	}() | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 Oscar Utbult
					Oscar Utbult