Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[release-4.13] OCPBUGS-8308: Bump to k8s 1.26.2 #1495

Merged
merged 57 commits into from
Mar 6, 2023

Conversation

sanchezl
Copy link

@sanchezl sanchezl commented Mar 3, 2023

  • PodGC should not add DisruptionTarget condition for pods which are in terminal phase
  • Fixes the issue [Flaky test] Tests in vendor/k8s.io/apiserver/pkg/server/genericapiserver_graceful_termination_test.go are flaking kubernetes/kubernetes#114145
  • Release commit for Kubernetes v1.26.2-rc.0
  • Update CHANGELOG/CHANGELOG-1.26.md for v1.26.1
  • bump honnef.co/go/tools to support go1.20
  • Fix shadowing lint error
  • fix bug with param controllers being removed if used by more than one policy
  • k8s.io/component-base/logs: fix usage through Go flag package
  • k8s.io/component-base/logs: unit test for command line help output
  • k8s.io/component-base/logs: relax flagset unit tests
  • k8s.io/component-base/logs: match full help text in unit test
  • add custom dialer optimized for probes
  • use custom dialer for tcp probes
  • use custom dialer for http probes
  • Fix panic on ClusterIP allocation for /28 subnets
  • kubectl: use v2 for hpa
  • add scale test for probes
  • Fix nil pointer error in nodevolumelimits csi logging
  • Fix konnectivity-client metric registration.
  • Avoid typechecking stdlib
  • dynamic resource allocation: avoid apiserver complaint about list content
  • update prev succeeded indexes for indexed jobs unconditionally
  • apiserver: remove 34s from DELETECOLLECTION rest handler
  • Ignore container events with nil PodSandboxStatus
  • kubelet/client: collapse transport wiring onto standard approach
  • hack/tools: Bump golangci-lint version
  • *: Fix linter warnings
  • Enforce nodeName cannot be set along with non empty schedulingGates
  • Pin golang.org/x/net to v0.4.0 in 1.26
  • Update golang.org/x/net to v0.7.0
  • releng: Update images, dependencies and version to Go 1.19.6
  • Release commit for Kubernetes v1.26.2
  • UPSTREAM: : manually resolve conflicts
  • UPSTREAM: : kubelet: fix readiness probes with pod termination
  • UPSTREAM: : hack/update-vendor.sh, make update and update image

What type of PR is this?

What this PR does / why we need it:

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

Does this PR introduce a user-facing change?


Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:


mimowo and others added 30 commits January 16, 2023 11:14
…d-cherry-pick-of-#114940-upstream-release-1.26

Automated cherry pick of kubernetes#114940: Fixes the issue kubernetes#114145
api/v1.AddFlags only supports a pflag.FlagSet. The assumption was that code
which wants to use flag.FlagSet can use VisitAll to copy the flags. That works,
with one caveat: the flag.FlagSet help implementation will call String for the
zero value to determine whether the flag has a non-default value. This
currently leads to additional warnings at the end of the -help output:

     panic calling String method on zero v1.verbosityLevelPflag for flag v: runtime error: invalid memory address or nil pointer dereference
     panic calling String method on zero v1.vmoduleConfigurationPFlag for flag vmodule: runtime error: invalid memory address or nil pointer dereference

Supporting usage of methods with the zero value is good practice anyway and
thus gets added. This then avoids these panics.
Both pflag and standard FlagSet are covered.
A full string comparison might fail when the underlying libraries change how
they format the help text. A regex match is less strict, but still makes some
assumptions about the implementation.
The test was meant to fail when there are unexpected additional lines like the
"panic calling String method" messages. But `assert.Regexp` does a search for
the regexp, not a full string match, and thus succeeded even if those lines are
present. A full match needs to be requested explicitly with ^ and $.
…ck-of-#115129-upstream-release-1.26

Automated cherry pick of kubernetes#115129: bump honnef.co/go/tools to support go1.20
probe util dial set linger to 1s
Change-Id: I323b472606eaf3242b665022afe2a79ecf3b8358
The ClusterIP allocator tries to reserve on part of the ServiceCIDR
to allocate static IPs to the Services.

The heuristic of the allocator to obtain the offset was taking into
account the whole range size, not the IPs available in the range, the
subnet address and the broadcast address for IPv4 are not available.

This caused that for CIDRs with 16 hosts, /28 for IPv4 and /124 for
IPv6, the offset calculated was higher than the max number of available
addresses on the allocator, causing this to panic.

Change-Id: I6c6f527b0a600b3612be37769e405b8fb3dd33a8
Signed-off-by: Amir Alavi <[email protected]>
Change-Id: I1e49943531b569b5e02f82369750a9ca899ae726
…-of-#115322-upstream-release-1.26

Automated cherry pick of kubernetes#115322: Fix panic on ClusterIP allocation for /28 subnets
…k-of-#115056-upstream-release-1.26

Automated cherry pick of kubernetes#115056: PodGC should not add DisruptionTarget condition for pods
…herry-pick-of-#115143-upstream-release-1.26

Automated cherry pick of kubernetes#115143: add custom dialer optimized for probes
…tent

This fixes the following warning (error?) in the apiserver:

E0126 18:10:38.665239   16370 fieldmanager.go:210] "[SHOULD NOT HAPPEN] failed to update managedFields" err="failed to convert new object (test/claim-84; resource.k8s.io/v1alpha1, Kind=ResourceClaim) to smd typed: .status.reservedFor: element 0: associative list without keys has an element that's a map type" VersionKind="/, Kind=" namespace="test" name="claim-84"

The root cause is the same as in e50e8a0:
nothing in Kubernetes outright complains about a list of items where the item
type is comparable in Go, but not a simple type. This nonetheless isn't
supposed to be done in the API and can causes problems elsewhere.

For the ReservedFor field, everything seems to work okay except for the
warning. However, it's better to follow conventions and use a map. This is
possible in this case because UID is guaranteed to be a unique key.

Validation is now stricter than before, which is a good thing: previously,
two entries with the same UID were allowed as long as some other field was
different, which wasn't a situation that should have been allowed.
…ck-of-#115382-upstream-release-1.26

Automated cherry pick of kubernetes#115382: Avoid typechecking stdlib
@sanchezl sanchezl changed the title OCPBUGS-8308: [release-4.13] Bump to k8s 1.26.2 [release-4.13] OCPBUGS-8308: Bump to k8s 1.26.2 Mar 3, 2023
@openshift-ci
Copy link

openshift-ci bot commented Mar 3, 2023

@sanchezl: No Bugzilla bug is referenced in the title of this pull request.
To reference a bug, add 'Bug XXX:' to the title of this pull request and request another bug refresh with /bugzilla refresh.

Retaining the bugzilla/valid-bug label as it was manually added.

In response to this:

[release-4.13] OCPBUGS-8308: Bump to k8s 1.26.2

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@soltysh
Copy link

soltysh commented Mar 3, 2023

/override ci/prow/verify-commits
this never passes on k8s bump

@openshift-ci
Copy link

openshift-ci bot commented Mar 3, 2023

@soltysh: Overrode contexts on behalf of soltysh: ci/prow/verify-commits

In response to this:

/override ci/prow/verify-commits
this never passes on k8s bump

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@soltysh
Copy link

soltysh commented Mar 3, 2023

/remove-label backports/unvalidated-commits
/label backports/validated-commits

@openshift-ci openshift-ci bot added backports/validated-commits Indicates that all commits come to merged upstream PRs. and removed backports/unvalidated-commits Indicates that not all commits come to merged upstream PRs. labels Mar 3, 2023
Copy link

@soltysh soltysh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve
/label backport-risk-assessed

@openshift-ci openshift-ci bot added the backport-risk-assessed Indicates a PR to a release branch has been evaluated and considered safe to accept. label Mar 3, 2023
@openshift-ci openshift-ci bot added lgtm Indicates that a PR is ready to be merged. approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Mar 3, 2023
@tkashem
Copy link

tkashem commented Mar 3, 2023

/lgtm

@openshift-ci
Copy link

openshift-ci bot commented Mar 3, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: sanchezl, soltysh, tkashem

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@wangke19
Copy link

wangke19 commented Mar 6, 2023

/label cherry-pick-approved

@openshift-ci openshift-ci bot added the cherry-pick-approved Indicates a cherry-pick PR into a release branch has been approved by the release branch manager. label Mar 6, 2023
@openshift-ci-robot
Copy link

/retest-required

Remaining retests: 0 against base HEAD 8cfbab7 and 2 for PR HEAD 219d4a6 in total

@soltysh
Copy link

soltysh commented Mar 6, 2023

/override ci/prow/verify-commits
/test k8s-e2e-aws-ovn-serial

@openshift-ci
Copy link

openshift-ci bot commented Mar 6, 2023

@soltysh: Overrode contexts on behalf of soltysh: ci/prow/verify-commits

In response to this:

/override ci/prow/verify-commits
/test k8s-e2e-aws-ovn-serial

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-merge-robot openshift-merge-robot merged commit bc894ae into openshift:release-4.13 Mar 6, 2023
@openshift-ci-robot
Copy link

@sanchezl: All pull requests linked via external trackers have merged:

Jira Issue OCPBUGS-8308 has been moved to the MODIFIED state.

In response to this:

  • PodGC should not add DisruptionTarget condition for pods which are in terminal phase
  • Fixes the issue [Flaky test] Tests in vendor/k8s.io/apiserver/pkg/server/genericapiserver_graceful_termination_test.go are flaking kubernetes/kubernetes#114145
  • Release commit for Kubernetes v1.26.2-rc.0
  • Update CHANGELOG/CHANGELOG-1.26.md for v1.26.1
  • bump honnef.co/go/tools to support go1.20
  • Fix shadowing lint error
  • fix bug with param controllers being removed if used by more than one policy
  • k8s.io/component-base/logs: fix usage through Go flag package
  • k8s.io/component-base/logs: unit test for command line help output
  • k8s.io/component-base/logs: relax flagset unit tests
  • k8s.io/component-base/logs: match full help text in unit test
  • add custom dialer optimized for probes
  • use custom dialer for tcp probes
  • use custom dialer for http probes
  • Fix panic on ClusterIP allocation for /28 subnets
  • kubectl: use v2 for hpa
  • add scale test for probes
  • Fix nil pointer error in nodevolumelimits csi logging
  • Fix konnectivity-client metric registration.
  • Avoid typechecking stdlib
  • dynamic resource allocation: avoid apiserver complaint about list content
  • update prev succeeded indexes for indexed jobs unconditionally
  • apiserver: remove 34s from DELETECOLLECTION rest handler
  • Ignore container events with nil PodSandboxStatus
  • kubelet/client: collapse transport wiring onto standard approach
  • hack/tools: Bump golangci-lint version
  • *: Fix linter warnings
  • Enforce nodeName cannot be set along with non empty schedulingGates
  • Pin golang.org/x/net to v0.4.0 in 1.26
  • Update golang.org/x/net to v0.7.0
  • releng: Update images, dependencies and version to Go 1.19.6
  • Release commit for Kubernetes v1.26.2
  • UPSTREAM: : manually resolve conflicts
  • UPSTREAM: : kubelet: fix readiness probes with pod termination
  • UPSTREAM: : hack/update-vendor.sh, make update and update image

What type of PR is this?

What this PR does / why we need it:

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

Does this PR introduce a user-facing change?


Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:


Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci
Copy link

openshift-ci bot commented Mar 6, 2023

@sanchezl: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/verify-commits 219d4a6 link unknown /test verify-commits

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. backport-risk-assessed Indicates a PR to a release branch has been evaluated and considered safe to accept. backports/validated-commits Indicates that all commits come to merged upstream PRs. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. cherry-pick-approved Indicates a cherry-pick PR into a release branch has been approved by the release branch manager. jira/severity-critical Referenced Jira bug's severity is critical for the branch this PR is targeting. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. vendor-update Touching vendor dir or related files
Projects
None yet
Development

Successfully merging this pull request may close these issues.