mirror of https://github.com/k3s-io/k3s
parent
d7de3e5369
commit
8477389e7c
|
@ -605,7 +605,7 @@ filename | sha256 hash
|
||||||
* Fixed a race condition in k8s.io/client-go/tools/cache.SharedInformer that could violate the sequential delivery guarantee and cause panics on shutdown. ([#59828](https://github.com/kubernetes/kubernetes/pull/59828), [@krousey](https://github.com/krousey))
|
* Fixed a race condition in k8s.io/client-go/tools/cache.SharedInformer that could violate the sequential delivery guarantee and cause panics on shutdown. ([#59828](https://github.com/kubernetes/kubernetes/pull/59828), [@krousey](https://github.com/krousey))
|
||||||
* [fluentd-gcp addon] Update fluentd and event-exporter images to have the latest base image. ([#61719](https://github.com/kubernetes/kubernetes/pull/61719), [@crassirostris](https://github.com/crassirostris))
|
* [fluentd-gcp addon] Update fluentd and event-exporter images to have the latest base image. ([#61719](https://github.com/kubernetes/kubernetes/pull/61719), [@crassirostris](https://github.com/crassirostris))
|
||||||
* Support new NODE_OS_DISTRIBUTION 'custom' on GCE ([#61235](https://github.com/kubernetes/kubernetes/pull/61235), [@yguo0905](https://github.com/yguo0905))
|
* Support new NODE_OS_DISTRIBUTION 'custom' on GCE ([#61235](https://github.com/kubernetes/kubernetes/pull/61235), [@yguo0905](https://github.com/yguo0905))
|
||||||
* Fixes a bug where character devices are not recongized by the kubelet ([#60440](https://github.com/kubernetes/kubernetes/pull/60440), [@andrewsykim](https://github.com/andrewsykim))
|
* Fixes a bug where character devices are not recognized by the kubelet ([#60440](https://github.com/kubernetes/kubernetes/pull/60440), [@andrewsykim](https://github.com/andrewsykim))
|
||||||
* Fixes storage e2e test failures in GKE regional clusters. ([#61303](https://github.com/kubernetes/kubernetes/pull/61303), [@verult](https://github.com/verult))
|
* Fixes storage e2e test failures in GKE regional clusters. ([#61303](https://github.com/kubernetes/kubernetes/pull/61303), [@verult](https://github.com/verult))
|
||||||
* fix the error prone account creation method of blob disk ([#59739](https://github.com/kubernetes/kubernetes/pull/59739), [@andyzhangx](https://github.com/andyzhangx))
|
* fix the error prone account creation method of blob disk ([#59739](https://github.com/kubernetes/kubernetes/pull/59739), [@andyzhangx](https://github.com/andyzhangx))
|
||||||
* The webhook admission controller in a custom apiserver now works off-the-shelf. ([#60995](https://github.com/kubernetes/kubernetes/pull/60995), [@caesarxuchao](https://github.com/caesarxuchao))
|
* The webhook admission controller in a custom apiserver now works off-the-shelf. ([#60995](https://github.com/kubernetes/kubernetes/pull/60995), [@caesarxuchao](https://github.com/caesarxuchao))
|
||||||
|
|
|
@ -122,7 +122,7 @@ type VersionFile struct {
|
||||||
path string
|
path string
|
||||||
}
|
}
|
||||||
|
|
||||||
// Exists returns true if a version.txt file exists on the filesystem.
|
// Exists returns true if a version.txt file exists on the file system.
|
||||||
func (v *VersionFile) Exists() (bool, error) {
|
func (v *VersionFile) Exists() (bool, error) {
|
||||||
return exists(v.path)
|
return exists(v.path)
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
||||||
limitations under the License.
|
limitations under the License.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
// The kubapiserver package holds code that is common to both the kube-apiserver
|
// The kubeapiserver package holds code that is common to both the kube-apiserver
|
||||||
// and the federation-apiserver, but isn't part of a generic API server.
|
// and the federation-apiserver, but isn't part of a generic API server.
|
||||||
// For instance, the non-delegated authorization options are used by those two
|
// For instance, the non-delegated authorization options are used by those two
|
||||||
// servers, but no generic API server is likely to use them.
|
// servers, but no generic API server is likely to use them.
|
||||||
|
|
|
@ -1050,15 +1050,15 @@ type Kubelet struct {
|
||||||
nodeStatusUpdateFrequency time.Duration
|
nodeStatusUpdateFrequency time.Duration
|
||||||
|
|
||||||
// syncNodeStatusMux is a lock on updating the node status, because this path is not thread-safe.
|
// syncNodeStatusMux is a lock on updating the node status, because this path is not thread-safe.
|
||||||
// This lock is used by Kublet.syncNodeStatus function and shouldn't be used anywhere else.
|
// This lock is used by Kubelet.syncNodeStatus function and shouldn't be used anywhere else.
|
||||||
syncNodeStatusMux sync.Mutex
|
syncNodeStatusMux sync.Mutex
|
||||||
|
|
||||||
// updatePodCIDRMux is a lock on updating pod CIDR, because this path is not thread-safe.
|
// updatePodCIDRMux is a lock on updating pod CIDR, because this path is not thread-safe.
|
||||||
// This lock is used by Kublet.syncNodeStatus function and shouldn't be used anywhere else.
|
// This lock is used by Kubelet.syncNodeStatus function and shouldn't be used anywhere else.
|
||||||
updatePodCIDRMux sync.Mutex
|
updatePodCIDRMux sync.Mutex
|
||||||
|
|
||||||
// updateRuntimeMux is a lock on updating runtime, because this path is not thread-safe.
|
// updateRuntimeMux is a lock on updating runtime, because this path is not thread-safe.
|
||||||
// This lock is used by Kublet.updateRuntimeUp function and shouldn't be used anywhere else.
|
// This lock is used by Kubelet.updateRuntimeUp function and shouldn't be used anywhere else.
|
||||||
updateRuntimeMux sync.Mutex
|
updateRuntimeMux sync.Mutex
|
||||||
|
|
||||||
// nodeLeaseController claims and renews the node lease for this Kubelet
|
// nodeLeaseController claims and renews the node lease for this Kubelet
|
||||||
|
|
|
@ -103,7 +103,7 @@ func (attacher *rbdAttacher) VolumesAreAttached(specs []*volume.Spec, nodeName t
|
||||||
return volumesAttachedCheck, nil
|
return volumesAttachedCheck, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// WaitForAttach implements Attacher.WaitForAttach. It's called by kublet to
|
// WaitForAttach implements Attacher.WaitForAttach. It's called by kubelet to
|
||||||
// attach volume onto the node.
|
// attach volume onto the node.
|
||||||
// This method is idempotent, callers are responsible for retrying on failure.
|
// This method is idempotent, callers are responsible for retrying on failure.
|
||||||
func (attacher *rbdAttacher) WaitForAttach(spec *volume.Spec, devicePath string, pod *v1.Pod, timeout time.Duration) (string, error) {
|
func (attacher *rbdAttacher) WaitForAttach(spec *volume.Spec, devicePath string, pod *v1.Pod, timeout time.Duration) (string, error) {
|
||||||
|
|
|
@ -45,7 +45,7 @@ func getTestTaint() v1.Taint {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Creates a defaut pod for this test, with argument saying if the Pod should have
|
// Create a defaut pod for this test, with argument saying if the Pod should have
|
||||||
// toleration for Taits used in this test.
|
// toleration for Taits used in this test.
|
||||||
func createPodForTaintsTest(hasToleration bool, tolerationSeconds int, podName, podLabel, ns string) *v1.Pod {
|
func createPodForTaintsTest(hasToleration bool, tolerationSeconds int, podName, podLabel, ns string) *v1.Pod {
|
||||||
grace := int64(1)
|
grace := int64(1)
|
||||||
|
|
|
@ -334,7 +334,7 @@ var _ = utils.SIGDescribe("Pod Disks", func() {
|
||||||
disruptOp := t.disruptOp
|
disruptOp := t.disruptOp
|
||||||
It(fmt.Sprintf("when %s", t.descr), func() {
|
It(fmt.Sprintf("when %s", t.descr), func() {
|
||||||
framework.SkipUnlessProviderIs("gce")
|
framework.SkipUnlessProviderIs("gce")
|
||||||
origNodeCnt := len(nodes.Items) // healhy nodes running kublet
|
origNodeCnt := len(nodes.Items) // healhy nodes running kubelet
|
||||||
|
|
||||||
By("creating a pd")
|
By("creating a pd")
|
||||||
diskName, err := framework.CreatePDWithRetry()
|
diskName, err := framework.CreatePDWithRetry()
|
||||||
|
|
Loading…
Reference in New Issue