-
Notifications
You must be signed in to change notification settings - Fork 41.1k
Pod Certificates: Fix kubelet volume host arg order; improve logging #133242
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/retest |
/lgtm I'd +1 asking release folks to add to the milestone, this would be an unfortunate reason for the alpha to be unusable to get feedback in 1.34 |
LGTM label has been added. Git tree hash: 5ffc7627df9b50eaba05259a491caeb3587fb2c4
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ahmedtd, liggitt, TP-O The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
1 similar comment
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ahmedtd, liggitt, TP-O The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Turned up during manual end-to-end testing of the Pod Certificates feature. This issue prevents podCertificate projected volumes from successfully mounting. Would have been caught by a feature e2e test. After this fix, podCertificate volumes function correctly in a Kind cluster. Additionally, fix logging from podcertificatemanager. In order for projectionKey to have sensible logging output, its fields need to be exported.
I fixed the unchecked error return in the test, but I prefer not to fix the "could remove embedded field" findings --- I personally find it very confusing to have a field be referenced, but not visible in the structure definition. |
did you push the change?
this will hunt everybody touching this file. If you don't feel this is a reasonable linter, maybe it needs to be discussed as a separate issue? I am pretty sure we have this everywhere in codebase so your code will not make it better. |
I had not, apologies. It's pushed now.
Based on the discussion that introduced this linter [1], there is no expectation that all issues reported by pull-kubernetes-linter-hints should be fixed. The original PR that introduced this feature (and many other PRs, I'm sure) merged with issues reported by the linter, and I don't think it's worthwhile to pursue zero findings from the linter without a project-wide policy to do so. [1] https://groups.google.com/a/kubernetes.io/g/dev/c/myGiml72IbM/m/00vB96RKBAAJ |
/lgtm |
LGTM label has been added. Git tree hash: f6d8c22be96ffea005e7ac4aa30585ec900dd323
|
The remaining test failures look like flakes. I will try to rerun them. /retest |
The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass. This bot retests PRs for certain kubernetes repos according to the following rules:
You can:
/retest |
/skip |
The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass. This bot retests PRs for certain kubernetes repos according to the following rules:
You can:
/retest |
5 similar comments
The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass. This bot retests PRs for certain kubernetes repos according to the following rules:
You can:
/retest |
The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass. This bot retests PRs for certain kubernetes repos according to the following rules:
You can:
/retest |
The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass. This bot retests PRs for certain kubernetes repos according to the following rules:
You can:
/retest |
The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass. This bot retests PRs for certain kubernetes repos according to the following rules:
You can:
/retest |
The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass. This bot retests PRs for certain kubernetes repos according to the following rules:
You can:
/retest |
@ahmedtd: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
/milestone v1.34 |
/skip |
While manually testing the Pod Certificates feature end-to-end using Kind, I found that the argument order got swapped in the kubelet volume host when adding the Pod UID. This would have been caught by an e2e test. I'll follow up with one.
Additionally, give projectionKey sensible logging output by making its fields exported.
/kind bug
/sig auth
KEP: kubernetes/enhancements#4317