-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RuntimeClassScheduling] Update runtime class admission plugin - Part2 #81072
[RuntimeClassScheduling] Update runtime class admission plugin - Part2 #81072
Conversation
/cc |
773c7f0
to
b823da7
Compare
b823da7
to
78cf4a9
Compare
/hold cancel |
This PR may require API review. If so, when the changes are ready, complete the pre-review checklist and request an API review. Status of requested reviews is tracked in the API Review project. |
/retest
Regards,
Draven
…On Aug 13, 2019, 11:17 PM +0800, Kubernetes Prow Robot ***@***.***>, wrote:
@draveness: The following tests failed, say /retest to rerun them all:
Test name
Commit
Details
Rerun command
pull-kubernetes-verify
773c7f0
link
/test pull-kubernetes-verify
pull-kubernetes-e2e-gce-device-plugin-gpu
b823da7
link
/test pull-kubernetes-e2e-gce-device-plugin-gpu
pull-kubernetes-e2e-gce-100-performance
b823da7
link
/test pull-kubernetes-e2e-gce-100-performance
pull-kubernetes-kubemark-e2e-gce-big
b823da7
link
/test pull-kubernetes-kubemark-e2e-gce-big
pull-kubernetes-e2e-gce
78cf4a9
link
/test pull-kubernetes-e2e-gce
pull-kubernetes-integration
78cf4a9
link
/test pull-kubernetes-integration
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub, or mute the thread.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
newNodeSelector[key] = value | ||
} | ||
|
||
newTolerations := tolerations.MergeTolerations(pod.Spec.Tolerations, nodeScheduling.Tolerations) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Merge tolerations is incomplete, since it only keys off of key & effect, but it's valid to have different values and/or operators. I suggest using a custom method here, and then following up with a separate PR to fix MergeTolerations (if you're up for it).
On a related note, we need to decide what to do if there is a conflict (same {key, op, val, effect} and different TolerationSeconds
). I think options are: use the pod value, return an error (reject the pod), or update the API validation to forbid setting TolerationSeconds on RuntimeClass (punt the problem)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The PodRestrictionTolerations use the same utility function, is it on purpose to override the toleration in these situations?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
OK, I think it makes sense to be consistent and use MergeTolerations here, but I think there is a bug with merge tolerations. Let's stick with this method, and I'll send a PR to fix it at the source.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed in #81732
a192a94
to
dc72d45
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I did a first pass, I'll take a look to the tests later
I'd like to know how to define conflict tolerations, toleration with the same The PodRestrictionTolerations use the same utility function, is it on purpose to override the toleration in these situations and are we supposed to follow them? |
dc72d45
to
e48cba7
Compare
newNodeSelector[key] = value | ||
} | ||
|
||
newTolerations := tolerations.MergeTolerations(pod.Spec.Tolerations, nodeScheduling.Tolerations) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
OK, I think it makes sense to be consistent and use MergeTolerations here, but I think there is a bug with merge tolerations. Let's stick with this method, and I'll send a PR to fix it at the source.
e48cba7
to
8e34776
Compare
8e34776
to
5732c63
Compare
/retest |
@tallclair Are we supposed to wait for #81732 be merged into the master? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/hold
I don't think this needs to block on #81732 /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: draveness, tallclair The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@draveness Thanks for working on this! This feature needs an E2E test - would you be interested in following up with a PR to add that? |
/retest Review the full test history for this PR. Silence the bot with an |
Yes, I'll send a follow-up PR soon. |
/kind feature
/priority important-soon
/sig node
/assign @tallclair
/hold
What this PR does / why we need it:
This is the second part of RuntimeClassScheduling which update runtime class admission plugin.
Depends on #80825
Which issue(s) this PR fixes:
Ref: #81016
Does this PR introduce a user-facing change?:
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.: