Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merge https://github.com/kubernetes/cloud-provider-gcp:master (1de8477) into master #64

Open
wants to merge 51 commits into
base: master
Choose a base branch
from

Conversation

cloud-team-rebase-bot[bot]
Copy link

No description provided.

seans3 and others added 9 commits April 28, 2024 14:34
Update gcpcredential.go

Remove update from pkg file as it is obsolete
Create kustomization in deploy package
Parallel test closures execute in a goroutine, possibly after the next
loop iteration has already began. As a result, the loop var they
capture changes before the test execute, leading to all of them
executing just the last test in the map.

This fixes that by making the closure capture local variables rather
than the loop variables

See similar main kubernetes repo PR kubernetes/kubernetes#111846
@openshift-ci openshift-ci bot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Jun 13, 2024
Copy link

openshift-ci bot commented Jun 13, 2024

Hi @cloud-team-rebase-bot[bot]. Thanks for your PR.

I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-ci openshift-ci bot requested review from elmiko and RadekManak June 13, 2024 12:53
@openshift-ci openshift-ci bot added the do-not-merge/invalid-owners-file Indicates that a PR should not merge because it has an invalid OWNERS file in it. label Jun 13, 2024
k8s-ci-robot and others added 4 commits June 13, 2024 06:54
Fix broken `TestCACacheVerify` test
L4 ILB - skip nodes from the non default network if multi subnet is t…
Add NetworkAttachment to GKENetworkParamSet CRD
Change-Id: Ibf325679a341392e914ff1d9200aac0bb572a4d9
@cloud-team-rebase-bot cloud-team-rebase-bot bot changed the title Merge https://github.com/kubernetes/cloud-provider-gcp:master (1533c13) into master Merge https://github.com/kubernetes/cloud-provider-gcp:master (9400b6e) into master Jun 17, 2024
@cloud-team-rebase-bot cloud-team-rebase-bot bot changed the title Merge https://github.com/kubernetes/cloud-provider-gcp:master (9400b6e) into master Merge https://github.com/kubernetes/cloud-provider-gcp:master (31327cf) into master Jun 20, 2024
vinayakankugoyal and others added 6 commits June 20, 2024 16:14
Signed-off-by: Vinayak Goyal <vinaygo@google.com>
Ran go get -u github.com/GoogleCloudPlatform/gke-networking-api
Ran tools/update_vendor.sh
Update gke-networking-api to latest version
Remove all GKE specific code from gcp-controller-manager.
Update GNP validations for network attachments
Update golang compute api package version
@cloud-team-rebase-bot cloud-team-rebase-bot bot changed the title Merge https://github.com/kubernetes/cloud-provider-gcp:master (87a9842) into master Merge https://github.com/kubernetes/cloud-provider-gcp:master (ae239a3) into master Jul 11, 2024
liuyuan10 and others added 2 commits July 12, 2024 10:53
Different node pools can have NICs on the same VPC but different subnet.
This should be allowd
Allow multiple device networks to have the same VPC
@cloud-team-rebase-bot cloud-team-rebase-bot bot changed the title Merge https://github.com/kubernetes/cloud-provider-gcp:master (ae239a3) into master Merge https://github.com/kubernetes/cloud-provider-gcp:master (b38949b) into master Jul 15, 2024
@cloud-team-rebase-bot cloud-team-rebase-bot bot changed the title Merge https://github.com/kubernetes/cloud-provider-gcp:master (b38949b) into master Merge https://github.com/kubernetes/cloud-provider-gcp:master (8b385de) into master Jul 22, 2024
panslava and others added 15 commits August 6, 2024 18:08
- 5 years ago tpuapi.New(client) required a client, however now, it uses
  just a context, so argument that is passed is no longer needed
Commands executed:
- go get -u cloud.google.com/go/compute
- go mod tidy
- go mod vendor
- ./tools/update_vendor.sh
97e991b drops `maxNodeNamesToLog` when
applied on top of 0ee532a

Signed-off-by: Nolan Brubaker <nolan@nbrubaker.com>
Based on docs for internal loadbalancer here [1], backend services [2]
and instances in instance-groups [3], following restrictions apply:

- Internal LB can load balance to VMs in same region, but different
  subnets
- Instance groups for the backend service must contain instance of
  the same subnet
- An instance can only belong to one load balanced instance group
- It is probably useful use-case to have nodes for the cluster belong
  to more than one subnet. And the current setup fails to create an
  internal load balancer with nodes in multiple subnets.

This change finds pre-existing instance-groups that ONLY contain
instances that belong to the cluster, uses them for the backend
service. And only ensures instance-groups for remaining ones.

[1] https://cloud.google.com/load-balancing/docs/internal
[2] https://cloud.google.com/load-balancing/docs/backend-service#restrictions_and_guidance
[3] https://cloud.google.com/compute/docs/instance-groups/creating-groups-of-unmanaged-instances#addinstances

Co-authored-by: Abhinav Dahiya <abhinav.dahiya@redhat.com>
Signed-off-by: Nolan Brubaker <nolan@nbrubaker.com>

# Conflicts:
#	vendor/k8s.io/cloud-provider-gcp/providers/gce/gce.go
#	vendor/k8s.io/cloud-provider-gcp/providers/gce/gce_fake.go
#	vendor/k8s.io/cloud-provider-gcp/providers/gce/gce_instancegroup.go
#	vendor/k8s.io/cloud-provider-gcp/providers/gce/gce_loadbalancer_internal.go
This adds the .spec required for building auth-provider-gcp as an RPM

To keep naming consistent across credential provider specs, we use the
name gcr-credential-provider

It also includes build-rpms.sh, used to build the RPM in CI.
This updates the logic from ac00767 for using existing instance groups
to allow the bootstrap node to be present in the instance group..
Prior to this commit logic to utilize existing instance groups checked
to ensure the instance group contains only cluster nodes (which the
bootstrap node is not), so if the bootstrap node is in the same ig as
ne of the masters, the master would be added to a second ig, which
breaks things.

We can resolve the issue by relaxing the logic to ensure that
all instances in the instance group have the node prefix.

Vendors the changes in order to be utilized by the cloud provider.

Fixes OCPBUGS-35256

# Conflicts:
#	vendor/k8s.io/cloud-provider-gcp/providers/gce/gce_loadbalancer_internal.go
@cloud-team-rebase-bot cloud-team-rebase-bot bot changed the title Merge https://github.com/kubernetes/cloud-provider-gcp:master (8b385de) into master Merge https://github.com/kubernetes/cloud-provider-gcp:master (1de8477) into master Aug 8, 2024
Copy link

openshift-ci bot commented Aug 8, 2024

The following users are mentioned in OWNERS file(s) but are untrusted for the following reasons. One way to make the user trusted is to add them as members of the openshift org. You can then trigger verification by writing /verify-owners in a comment.

  • dangerontheranger
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.
    • cmd/auth-provider-gcp/OWNERS
  • jprzychodzen
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.
  • ahmedtd
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.
    • cmd/auth-provider-gcp/OWNERS
  • cici37
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
do-not-merge/invalid-owners-file Indicates that a PR should not merge because it has an invalid OWNERS file in it. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet