OCPCLOUD-3094: Merge https://github.com/kubernetes/cloud-provider-gcp:master (4bc9861) into main#85
Conversation
This is checked in newer versions of go
The `GetLoadBalancer` function returns `found=true` with an empty status if the underlying forwarding rule is deleted but the Service object still contains a finalizer (`ILBFinalizerV1` or `NetLBFinalizerV1`). This indicates to the controller that resource cleanup is still in progress. This commit updates `TestGetLoadBalancer` to verify this behavior. After the load balancer is deleted, the test now adds a finalizer to the service and asserts that `GetLoadBalancer` correctly returns `found=true`.
Update k8s dependencies to 1.33.4.
|
Hi @cloud-team-rebase-bot[bot]. Thanks for your PR. I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
The `GetLoadBalancer` function returns `found=true` with an empty status if the underlying forwarding rule is deleted but the Service object still contains a finalizer (`ILBFinalizerV1` or `NetLBFinalizerV1`). This indicates to the controller that resource cleanup is still in progress. This commit updates `TestGetLoadBalancer` to verify this behavior. After the load balancer is deleted, the test now adds a finalizer to the service and asserts that `GetLoadBalancer` correctly returns `found=true`.
…balancer Update TestGetLoadBalancer with finalizer check
a1336f8 to
9d3dde7
Compare
example - go test -count=1 -race -v $(go list ./...)
Adding SyncMutex as unit tests is failing when detecting race
9d3dde7 to
5091c0a
Compare
TestGetLoadBalancer improvement: finalizer check logic in GetLoadBalancer
…rovider_tests tests: fix linting problem
f8d45cf to
4e89521
Compare
…1-33-4 go.mod: Update k8s replace dependencies to 1.33.4
4e89521 to
dd65db2
Compare
…lag to the CCM binary. (kubernetes#843) When enabled, NetLB controller will consider RBS the default implementation for L4 NetLBs without a LoadBalancerClass specified, and it will not provision the service.
e76cac4 to
ee74ba3
Compare
This commit updates all k8s.io dependencies to version v0.34.0. This also updates the vendor directory and regenerates the Bazel BUILD files.
|
build image with pr failed |
|
/test images |
|
@cloud-team-rebase-bot[bot]: This pull request references OCPCLOUD-3094 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.21.0" version, but no target version was set. DetailsIn response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
I think there might be an implicit conflict in the code that makes compilation fail cc. @theobarberbany |
|
sigh rebasebot has auto accepted our patch and merged the conflicts that way. It means the LB patch will need manual picking. Brace for this potentially taking a while @damdo |
update dependencies to kubernetes 1.34.1
This adds the .spec required for building auth-provider-gcp as an RPM To keep naming consistent across credential provider specs, we use the name gcr-credential-provider It also includes build-rpms.sh, used to build the RPM in CI.
This commit rewrites 49f5389. Work around GCP internal load balancer restrictions for multi-subnet clusters. GCP internal load balancers have specific restrictions that prevent straightforward load balancing across multiple subnets: 1. "Don't put a VM in more than one load-balanced instance group" 2. Instance groups can "only select VMs that are in the same zone, VPC network, and subnet" 3. "All VMs in an instance group must have their primary network interface in the same VPC network" 4. Internal LBs can load balance to VMs in same region but different subnets For clusters with nodes across multiple subnets, the previous implementation would fail to create internal load balancers. This change implements a two-pass approach: 1. Find existing external instance groups (matching externalInstanceGroupsPrefix) that contain ONLY cluster nodes and reuse them for the backend service 2. Create internal instance groups only for remaining nodes not covered by external groups This ensures compliance with GCP restrictions while enabling multi-subnet load balancing for Kubernetes clusters. References: - Internal LB docs: https://cloud.google.com/load-balancing/docs/internal - Backend service restrictions: https://cloud.google.com/load-balancing/docs/backend-service#restrictions_and_guidance - Instance group constraints: https://cloud.google.com/compute/docs/instance-groups/creating-groups-of-unmanaged-instances#addinstances 🤖 Commit message & comments Generated with [Claude Code](https://claude.ai/code)
…r image to be consistent with ART for 4.21 Reconciling with https://github.com/openshift/ocp-build-data/tree/3fdad9b43ac7aa4e2ed5db0c6f5266809a9ebbc0/images/ose-gcp-cloud-controller-manager.yml
48a7bb2 to
1563cbf
Compare
|
New changes are detected. LGTM label has been removed. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
The following users are mentioned in OWNERS file(s) but are untrusted for the following reasons. One way to make the user trusted is to add them as members of the openshift org. You can then trigger verification by writing
|
|
@cloud-team-rebase-bot[bot]: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
/close In favour of #93 |
No description provided.