-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create "Lease" API in the new "coordination.k8s.io" api group #64246
Create "Lease" API in the new "coordination.k8s.io" api group #64246
Conversation
0022e67
to
3702402
Compare
3702402
to
92bd65a
Compare
/test pull-kubernetes-integration |
/retest |
@bgrant0607 @dchen1107 @derekwaynecarr @liggitt - I'm not sure if we want to merge it with 1.11 timeframe, but if so, the PR adding the "Lease" API is essentially ready for review. |
[MILESTONENOTIFIER] Milestone Pull Request: Up-to-date for process @bgrant0607 @dchen1107 @derekwaynecarr @liggitt @mtaufen @wojtek-t Pull Request Labels
|
|
||
// ValidateLease validates a Lease. | ||
func ValidateLease(lease *coordination.Lease) field.ErrorList { | ||
allErrs := ValidateLeaseSpec(&lease.Spec, field.NewPath("spec")) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what are the name restrictions around Lease objects? I expected a call to ValidateObjectMeta here with a name validator
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We don't have a step that does generic ObjectMeta validation?
Edit: I guess not... good to know.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
it does generic objectmeta validation with backstop restrictions on object names (disallows /
and %
characters, disallows .
and ..
names), but I'm assuming we want something more restrictive than that here
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@liggitt So given that we do generic ObjectMetadata validation in generic code (in staging/src/k8s.io/apiserver/pkg/registry/rest/), what other validation you would like to see here?
I'm not sure we would like to be more restrictive here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Discussed offline with Jordan and added ValidateObjectMeta call. Hopefully that's all we need.
|
||
// AllowCreateOnUpdate is true for Lease; this means you may create one with a PUT request. | ||
func (leaseStrategy) AllowCreateOnUpdate() bool { | ||
return false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this seems like an object it would be useful to allow this on... it would let us grant named create/update permissions on specific lease instances. as long as we don't allow unconditional update (which it looks like we don't), create-on-update is something I'd want on this resource
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also the godoc doesn't match the implementation here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for pointing on that Jordan - I completely agree we should allow for that (and after change godoc is finally correct :))
|
||
// AllowUnconditionalUpdate is the default update policy for Lease objects. | ||
func (leaseStrategy) AllowUnconditionalUpdate() bool { | ||
return false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1 for this
/lgtm cancel |
de84b51
to
134ce7b
Compare
134ce7b
to
0950084
Compare
PTAL |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: liggitt, wojtek-t The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/test all [submit-queue is verifying that this PR is safe to merge] |
Automatic merge from submit-queue (batch tested with PRs 64246, 65489, 65443). If you want to cherry-pick this change to another branch, please follow the instructions here. |
Hey there @wojtek-t, I was reading through this PR and associated KEP (I'm the Docs 1.12 release lead) do you think this is something that would need documentation around it? I was thinking it could be something mentioned in the large cluster section of the docs. https://kubernetes.io/docs/setup/cluster-large/ What do you think? |
Yes - it requires release note. Though, it's not large-cluster specific. The change was motivated by large clusters, but it will touch clusters of all sizes. So it should be in some more generic place (though I don't know where exactly). |
@zparnold, I'm working on the node heartbeats side of this, so let's definitely stay in touch regarding docs and where to put them. |
This should have a release note. @wojtek-t Can you edit the main PR body to include the release note? Thanks! |
Make periodic NodeStatus updates cheaper cherry-pick master, create lease api, kubernetes#64246 master, node lifecycle controller, kubernetes#69241 kubelet, kubernetes#66257 See merge request !184866
Part of "Efficient Node heartbeats" KEP:
https://github.com/kubernetes/community/blob/master/keps/0009-node-heartbeat.md
Part of: #14733