-
Notifications
You must be signed in to change notification settings - Fork 3.8k
bugfix(port-forward): Correctly handle known errors #8418
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Hi @sxllwx. Thanks for your PR. I'm waiting for a containerd member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
28755ff to
6e65664
Compare
6e65664 to
f32b64b
Compare
f32b64b to
4ec346d
Compare
4ec346d to
4637380
Compare
|
What else do I need to do to promote this PR? |
|
/ok-to-test |
|
@dims: Cannot trigger testing until a trusted user reviews the PR and leaves an DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
4637380 to
d1837c9
Compare
|
I don't think the failing tests are related to this change |
|
@brianpursley: Cannot trigger testing until a trusted user reviews the PR and leaves an DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@dcantah Can we get /ok-to-test on this PR? There is another kubernetes PR that depends on this PR being merged to fix an issue with port forwarding, so I'm hoping this change can get in. Do you have any other thoughts on this PR? What else might be needed to move this forward? |
dcantah
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yea, the failures are unrelated they're known flakes. I forget if I have permissions to kick off the bot, lets see
|
/ok-to-test |
|
/retest |
|
Any plans to continue/merge this? @sxllwx @brianpursley |
Yes. I hope so, but I'm not sure how to focus attention on this PR. |
|
I've tried to push the PR to be merged via slack and github, but haven't gotten a response yet.😥 |
|
What else do I need to do to promote this PR? @dcantah |
|
@sxllwx Nothing more on your end, I apologize for this falling off my radar 🫠. We'll need one other maintainer to approve and we're good to check in. Thanks for your patience |
|
@sxllwx Could you rebase on main and push again so we can get a clearer CI signal? |
These two errors can occur in the following scenarios: ECONNRESET: the target process reset connection between CRI and itself. see: #111825 for detail EPIPE: the target process did not read the received data, causing the buffer in the kernel to be full, resulting in the occurrence of Zero Window, then closing the connection (FIN, RESET) see: #74551 for detail In both cases, we should RESET the httpStream. Signed-off-by: wangxiang <[email protected]>
d1837c9 to
232538b
Compare
Thanks for your support, I've rebase on main and push again. PTAL thx~ |
|
This fix should be cherry-picked into |
Thanks for your help, I have submitted PRs to do cherry-pick, please take a look. thx |
|
@brianpursley Nothing needs to be done at this point, the next time we go to make a release it will be included. We don't have a set release schedule, just whenever we feel there's decent payload or when there's a security fix. I think this probably justifies a release though so I'll look at getting the notes drafted |
|
@sxllwx @brianpursley is this PR sufficient to solve the SSL port forwarding issue (kubernetes/kubernetes#111825) or is kubernetes/kubernetes#117493 needed as well? Latest containerd version supported for 1.27 on EKS is 1.6.19 which would mean a mere 3 patch versions stand between EKS users and the ability to use SSL in Postgres again -if this does indeed solve the issue. |
|
Sorry for the late reply. This PR is enough to fix kubernetes/kubernetes#74551 We have observed that many non-containerd CRIs use code related to https://github.com/kubernetes/kubernetes/pull/117493/files in kubelet, so we hope to return these bugfixes to kubelet. If you still encounter problems later, please let me know (of course, you can also let me know if the problem has been solved.). You can leave a message at kubernetes/kubernetes#74551. grateful. |
Try to fix the issue: kubernetes/kubernetes#74551