-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
change DefaultGarbageCollectionPolicy to DeleteDependents for workloads controllers #55148
change DefaultGarbageCollectionPolicy to DeleteDependents for workloads controllers #55148
Conversation
/unassign @derekwaynecarr @eparis |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for picking this up so quickly! It looks like what I had in mind. Can you just add strategy tests and integration tests like in #50719?
if requestInfo, found := genericapirequest.RequestInfoFrom(ctx); found { | ||
groupVersion := schema.GroupVersion{Group: requestInfo.APIGroup, Version: requestInfo.APIVersion} | ||
switch groupVersion { | ||
case extensionsv1beta1.SchemeGroupVersion, appsv1beta1.SchemeGroupVersion, appsv1beta2.SchemeGroupVersion: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You can leave out extensions/v1beta1
for StatefulSet, since it never existed there.
if requestInfo, found := genericapirequest.RequestInfoFrom(ctx); found { | ||
groupVersion := schema.GroupVersion{Group: requestInfo.APIGroup, Version: requestInfo.APIVersion} | ||
switch groupVersion { | ||
case extensionsv1beta1.SchemeGroupVersion, appsv1beta1.SchemeGroupVersion, appsv1beta2.SchemeGroupVersion: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You can leave out apps/v1beta1
for DaemonSet, since it never existed there.
if requestInfo, found := genericapirequest.RequestInfoFrom(ctx); found { | ||
groupVersion := schema.GroupVersion{Group: requestInfo.APIGroup, Version: requestInfo.APIVersion} | ||
switch groupVersion { | ||
case extensionsv1beta1.SchemeGroupVersion, appsv1beta1.SchemeGroupVersion, appsv1beta2.SchemeGroupVersion: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You can leave out apps/v1beta1
for ReplicaSet, since it never existed there.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Generally LGTM but could use some unit tests.
/cc @mml |
fa8eac8
to
3ce2bac
Compare
3ce2bac
to
6facef9
Compare
@dixudx @enisoc @kow3ns this came up in our team meeting today. @lavalamp raised concerns for upgrading/downgrading the cluster. I think what he meant was that if the apiserver was downgraded to an old version, but the controller manager was not downgraded yet, was it possible that the controller manager got confused because the old apiserver didn't do cascading deletion for apps/v1/replicaset? I don't have any specific objection, but I agree that we need to think the implication through. |
If I'm understanding the scenario correctly, I think it should be ok. We aren't changing anything in the GC itself (the part that lives in controller manager). We're only changing the finalizers added by apiserver at the moment when a DELETE request comes in. If a DELETE comes through apps/v1 after apiserver is upgraded, it sets the right finalizers for cascading. After that, the behavior of GC should depend only on the finalizers on the object (I don't see anywhere that GC fails to send an explicit DeletionPropagation policy), so downgrading apiserver during this process shouldn't have any effect. If a DELETE comes through apps/v1 after apiserver is downgraded, it will fail because apps/v1 doesn't exist there. This is the same as any time we add a new version; it's not related to whether we change the default GC policy. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The unit tests look good, but I'd like to have at least one integration test before we merge to prove this works.
Can you test that the expected finalizers get added when you delete via apps/v1beta2
vs apps/v1
? To avoid racing with actual deletion, you can add your own made up finalizer that you don't remove until after you've verified the other expected values.
genericapirequest.RequestInfo{ | ||
APIGroup: "apps", | ||
APIVersion: "v1beta1", | ||
Resource: "statefulset", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: It doesn't affect the current code, but for the sake of realism I think the Resource
names should be plural.
6facef9
to
f70da82
Compare
@enisoc Did find a bug. |
f70da82
to
178f0cd
Compare
Another comment on release note:
Is We need to update documents (e.g. https://kubernetes.io/docs/concepts/workloads/controllers/garbage-collection/#setting-the-cascading-deletion-policy) once this is merged. |
68db654
to
e389936
Compare
ping @janetkuo @enisoc @caesarxuchao Updated. PTAL. Thanks. |
t.Fatalf("Failed to verify the finalizer: %v", err) | ||
} | ||
|
||
// remove fakeFinalizer |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Use updateRS
just like above, so this gets retried on conflict. It's fine to do the update via extensions/v1beta1.
return false, err | ||
} | ||
t.Logf("getting the fianlizer: %s", newRS.Finalizers) | ||
return newRS.DeletionTimestamp != nil && reflect.DeepEqual(newRS.Finalizers, []string{fakeFinalizer}), nil |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's better to fail if any new finalizers were added, rather than continue polling:
if newRS.DeletionTimestamp == nil {
return false, nil
}
if got, want := newRS.Finalizers, []string{fakeFinalizer}; !reflect.DeepEqual(got, want) {
return false, fmt.Errorf("Finalizers = %+v; want %+v", got, want)
}
return true, nil
/assign @liggitt |
e389936
to
344fe56
Compare
/lgtm |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dixudx, enisoc, liggitt Associated issue: 353 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
/priority critical-urgent /remove-priority important-soon adjusting priorities for code freeze |
[MILESTONENOTIFIER] Milestone Pull Request Current @dixudx @enisoc @janetkuo @liggitt @smarterclayton Note: This pull request is marked as Example update:
Pull Request Labels
|
Automatic merge from submit-queue (batch tested with PRs 52767, 55065, 55148, 56228, 56221). If you want to cherry-pick this change to another branch, please follow the instructions here. |
What this PR does / why we need it:
As part of the apps/v1 GA effort (kubernetes/enhancements#353) for v1.9. For core controllers, like
Deployment
,DaemonSet
,ReplicaSet
, andStatefulSet
, changing theDefaultGarbageCollectionPolicy
fromOrphanDependents
toDeleteDependents
will make these objects consistent with the default behavior for all new objects.For legacy API versions, the
DefaultGarbageCollectionPolicy
remainsOrphanDependents
.Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):ref #55027
Special notes for your reviewer:
/cc @enisoc @caesarxuchao @kow3ns
/assign @kubernetes/sig-apps-api-reviews
Release note: