Commit Graph

12536 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
b82013ecd6 Merge pull request #127326 from stlaz/ctb_new_signer
trustbundles: add a new kube-apiserver-serving signer
2024-11-07 21:07:02 +00:00
Stanislav Láznička
a4b83e77d9 trustbundles: add a new kube-apiserver-serving signer 2024-11-07 18:07:06 +01:00
HirazawaUi
ecf2b402be remove runonce mode 2024-11-07 19:54:11 +08:00
Kubernetes Prow Robot
6cc3570466 Merge pull request #128190 from HarshalNeelkamal/external-jwt
Add plugin and key-cache for ExternalJWTSigner integration
2024-11-07 06:29:45 +00:00
Kubernetes Prow Robot
c462d4c8e5 Merge pull request #126096 from utam0k/support-disabling-oom-group-kill
kubelet: new kubelet config option for disabling group oom kill
2024-11-07 06:29:36 +00:00
Harshal Neelkamal
6fdacf0411 Add plugin and key-cache for ExternalJWTSigner integration 2024-11-07 03:16:23 +00:00
utam0k
4f909c14a0 kubelet: new kubelet config option for disabling group oom kill
Signed-off-by: utam0k <k0ma@utam0k.jp>
2024-11-07 12:03:04 +09:00
Kubernetes Prow Robot
dfba334a33 Merge pull request #128242 from jsafrane/selinux-controller
1710: Add SELinux warning controller
2024-11-06 20:09:44 +00:00
Kubernetes Prow Robot
983dd07760 Merge pull request #128031 from HirazawaUi/kep-4656
[Kubeadm] KEP-4656: Add kubelet instance configuration to configure CRI socket for each node
2024-11-06 20:09:37 +00:00
HirazawaUi
d3ea4d3d9a Implement kubeadm reset 2024-11-06 21:43:09 +08:00
HirazawaUi
c47eaa88b1 Implement kubeadm upgrade 2024-11-06 21:43:05 +08:00
Patrick Ohly
33ea278c51 DRA: use v1beta1 API
No code is left which depends on the v1alpha3, except of course the code
implementing that version.
2024-11-06 13:03:19 +01:00
Patrick Ohly
2e64c72249 DRA API: register v1beta1
This is the minimal set of changes that are needed to make the new version
usable. The storage version is still v1alpha3. More changes will follow.
2024-11-06 13:03:18 +01:00
Jan Safranek
52b47ea4de Don't create a new controller context 2024-11-06 12:29:56 +01:00
Jan Safranek
4b99a342f4 Move feature gate to ControllerDescriptor 2024-11-06 12:29:56 +01:00
Jan Safranek
da2d9fa16e Fix golint errors
Revealed by the new SELinux warning controller, but not related to it.
2024-11-06 11:16:05 +01:00
Jan Safranek
aa8872d7a3 Add SELinux warning controller 2024-11-06 11:16:02 +01:00
Kubernetes Prow Robot
3dcad5f0db Merge pull request #128532 from neolit123/1.32-handle-custom-addreses-comp-readyz
kubeadm: use advertise address for WaitForAllControlPlaneComponents
2024-11-06 08:51:29 +00:00
Kubernetes Prow Robot
be7d1000ee Merge pull request #127404 from zylxjtu/master
Windows node graceful shutdown
2024-11-05 23:21:42 +00:00
Kubernetes Prow Robot
08391b3d27 Merge pull request #123549 from carlory/kep-3751-finalizer
A new controller adds/removes finalizer to VAC for protection
2024-11-05 21:45:30 +00:00
zylxjtu
459952a067 Windows node graceful shutdown 2024-11-05 17:46:22 +00:00
HirazawaUi
12a394fcc7 Implement kubeadm join 2024-11-05 20:59:57 +08:00
HirazawaUi
16e767d915 Implement kubeadm init 2024-11-05 20:59:53 +08:00
Lubomir I. Ivanov
0cfcaa82e1 kubeadm: use advertise address for WaitForAllControlPlaneComponents 2024-11-05 09:00:38 +02:00
Kubernetes Prow Robot
6fce566781 Merge pull request #128474 from neolit123/1.32-handle-custom-addreses-comp-readyz
kubeadm: use actual addresses/ports for WaitForAllControlPlaneComponents
2024-11-02 17:19:26 +00:00
Lubomir I. Ivanov
b2741f7b1c kubeadm: use actual addresses/ports for WaitForAllControlPlaneComponents
By default check the KCM and scheduler on 127.0.0.1:<port> as that is the
defaall --bind-address kubeamd uses for these components.

For kube-apiserver take the value from APIEndpoint.AdvertiseAddress which is
dynamically detected from the host. Unless the user has passed explicitly --advertise-address
as an extra arg.

Read the <port> values for all components from the --secure-port flag
value if needed. Otherwise use defaults.

Use /livez for apiserver and scheduler. Add TODO for KCM to
switch to /livez as well.
2024-11-02 18:09:36 +02:00
Lubomir I. Ivanov
fceb39ecd2 kubeadm: ensure proper parsing of SSR username
- Split the code that tries to get node name from SSR into
a new function getNodeNameFromSSR(). Unit test the function.
- Fix error that the "system:nodes:" prefix was not trimmed.
- Fix mislearding errors around FetchInitConfigurationFromCluster.
This function performs multiple actions, and the "get node"
action can also be of type apierrors.NotFound(). This creates
confusion in the returned error in enforceRequirement during
upgrade. Fix this problem.
2024-11-01 11:42:58 +02:00
Kubernetes Prow Robot
d34c181465 Merge pull request #128444 from tosi3k/ds-syncs
Add --concurrent-daemonset-syncs argument to kube-controller-manager
2024-10-31 19:21:34 +00:00
Kubernetes Prow Robot
365b457e3e Merge pull request #128455 from jsafrane/refactor-kcm-plugins
Refactor KCM volume plugin probe
2024-10-31 17:17:34 +00:00
HirazawaUi
fc5b3e2dfb add NodeLocalCRISocket feature gate 2024-10-31 23:09:05 +08:00
Lubomir I. Ivanov
07918a59e8 kubeadm: support dryrunning upgrade wihout a real cluster
Make the following changes:
- When dryrunning if the given kubeconfig does not exist
create a DryRun object without a real client. This means only
a fake client will be used for all actions.
- Skip the preflight check if manifests exist during dryrun.
Print "would ..." instead.
- Add new reactors that handle objects during upgrade.
- Add unit tests for new reactors.
- Print message on "upgrade node" that this is not a CP node
if the apiserver manifest is missing.
- Add a new function GetNodeName() that uses 3 different methods
for fetching the node name. Solves a long standing issue where
we only used the cert in kubelet.conf for determining node name.
- Various other minor fixes.
2024-10-31 14:58:47 +02:00
Jan Safranek
9e29f95618 Refactor controller-manager volume plugins
Most of the volume plugins were removed from k/k. Refactor how KCM
controllers initialize the few leftovers.
2024-10-31 09:08:30 +01:00
Jan Safranek
cba5a93468 Remove portworx from attachable volume plugins
The volume plugin does not implement AttachableVolumePlugin interface.
2024-10-31 09:08:21 +01:00
Jan Safranek
0ecbdf3622 Remove fc from expandable plugins
FibreChannel volume plugin does not implement ExpandableVolumePlugin.
2024-10-31 09:08:21 +01:00
Jan Safranek
1fa8877c33 Add unit tests for KCM volume plugin probers 2024-10-31 09:08:19 +01:00
Antoni Zawodny
4afa554f65 Add --concurrent-daemonset-syncs flag to kube-controller-manager 2024-10-30 15:03:26 +01:00
Kubernetes Prow Robot
daef8c2419 Merge pull request #127266 from pohly/dra-admin-access-in-status
DRA API: AdminAccess in DeviceRequestAllocationResult + DRAAdminAccess feature gate
2024-10-30 03:41:25 +00:00
Kubernetes Prow Robot
db66e397d9 Merge pull request #128359 from matteriben/disable-caching-for-authoritative-zone
disable caching for authoritative zone to comply with rfc-1035 section 6.1.2
2024-10-30 02:37:24 +00:00
Kubernetes Prow Robot
f087575f21 Merge pull request #127226 from myeunee/cleanup
Clean up unnecessary else block and redundant variable assignment
2024-10-29 22:41:25 +00:00
Matt Riben
30d9ed7203 disable caching for authoritative zone
Signed-off-by: Matt Riben <matt.riben@swirldslabs.com>
2024-10-29 17:10:07 -05:00
myeunee
9cc65ce872 Restrict cz variable scope within else clause 2024-10-30 06:31:06 +09:00
myeunee
2faaedbe39 Refactor error handling for configz initialization
Improved code readability and limited variable scope as per reviewer's suggestion.
2024-10-30 04:53:51 +09:00
Patrick Ohly
9a7e4ccab2 DRA admin access: add feature gate
The new DRAAdminAccess feature gate has the following effects:
- If disabled in the apiserver, the spec.devices.requests[*].adminAccess
  field gets cleared. Same in the status. In both cases the scenario
  that it was already set and a claim or claim template get updated
  is special: in those cases, the field is not cleared.

  Also, allocating a claim with admin access is allowed regardless of the
  feature gate and the field is not cleared. In practice, the scheduler
  will not do that.
- If disabled in the resource claim controller, creating ResourceClaims
  with the field set gets rejected. This prevents running workloads
  which depend on admin access.
- If disabled in the scheduler, claims with admin access don't get
  allocated. The effect is the same.

The alternative would have been to ignore the fields in claim controller and
scheduler. This is bad because a monitoring workload then runs, blocking
resources that probably were meant for production workloads.
2024-10-29 09:50:11 +01:00
Kubernetes Prow Robot
646b0bc49b Merge pull request #128354 from SataQiu/join-control-plane-e2e
kubeadm: support joining control plane nodes in dryrun mode without a real initialized control plane
2024-10-28 14:40:55 +00:00
SataQiu
dc48aed791 kubeadm: support joining control plane nodes in dryrun mode without a real initialized control plane 2024-10-28 21:37:58 +08:00
Kubernetes Prow Robot
9ec52fc063 Merge pull request #128283 from bzsuni/bz/ut/kubeadm
kubeadm: Add UT for cmd/kubeadm/app/cmd/util/join.go
2024-10-28 06:42:54 +00:00
bzsuni
80fe671cc9 Add UT for cmd/kubeadm/app/cmd/util/join.go
Signed-off-by: bzsuni <bingzhe.sun@daocloud.io>
2024-10-28 11:12:06 +08:00
Kubernetes Prow Robot
119f114f01 Merge pull request #128196 from richabanker/move-version
Move k8s.io/apiserver/pkg/util/version to component-base
2024-10-25 18:33:01 +01:00
Richa Banker
9274a584b8 Split k8s.io/component-base/registry and add into k8s.io/component-base/version and k8s.io/component-base/featuregate 2024-10-24 19:09:30 -07:00
Kubernetes Prow Robot
7b7a7968d4 Merge pull request #125314 from enj/enj/i/proto_for_core
Use protobuf for core clients
2024-10-24 18:20:54 +01:00