Skip to content

Cherry-picking commits to release-1.7 branch#1142

Merged
k8s-ci-robot merged 17 commits into
kubernetes-sigs:release-1.7from
seanzatzdev-amazon:release-1.7
Sep 19, 2023
Merged

Cherry-picking commits to release-1.7 branch#1142
k8s-ci-robot merged 17 commits into
kubernetes-sigs:release-1.7from
seanzatzdev-amazon:release-1.7

Conversation

jonathanrainer and others added 17 commits September 19, 2023 11:32
Adding subPathPattern allows us to support more use cases than before because
now users can specify a template they wish to be created when the access
point is created. This template matches the form of the nfs-subdir-provioner
which aids consistency. This defaults to /${.PV.name} to be in keeping with
current behaviour but allows much more flexibility.
This ensures we can control when we want directories created under
dynamic provisioning to be unique and when we don't (poweruser mode)
This code is needed to allow listing of access points. This can be used
by GID allocator to avoid assigning GIDs that might already be used.
Internal limit of EFS is 120 Access Points per Filesystem ID. There is
no reason to check the entire GID range specified by user if we can't
allocate those GIDs anyway.

Considering the internal limit there is no need to track the GIDs using
heap structure and we can always look up the next GID from the full
range which won't exceed 120.

Because the limit is relatively small this won't impact performance.
We added CSI_NODE_NAME as an environment variable to the Helm Chart's
node Daemonset, but we forget to add it to our kustomize deploy files as
well. This is required for users who have IMDS disabled on their
cluster, and who install the driver using kustomize.
Signed-off-by: Asher Foa <1268088+asherf@users.noreply.github.com>

PR feedback
I notice the name for `ensureUniqueDirectory` is wrong in the README, its correct at the example, but wrong here.
Signed-off-by: Davanum Srinivas <davanum@gmail.com>
Efs-utils requires IMDS to find the region of a file system. We will change this in a
future release of efs-utils, but for now, we have to roll back and add
host network back to the Node Daemonset.
@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Sep 19, 2023
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

Hi @seanzatzdev-amazon. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added the size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. label Sep 19, 2023
@Ashley-wenyizha
Copy link
Copy Markdown
Contributor

  • Could we change the title of the PR to be more specific, eg. Cherry-picking commits to release-1.7 branch?

  • Also could we add the PR links related to the commits in the overview?

@mskanth972
Copy link
Copy Markdown
Contributor

/ok-to-test

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Sep 19, 2023
@seanzatzdev-amazon seanzatzdev-amazon changed the title Release 1.7 Cherry-picking commits to release-1.7 branch Sep 19, 2023
@mskanth972
Copy link
Copy Markdown
Contributor

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Sep 19, 2023
@mskanth972
Copy link
Copy Markdown
Contributor

/approve

@k8s-ci-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: mskanth972, seanzatzdev-amazon

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 19, 2023
@k8s-ci-robot k8s-ci-robot merged commit 80d1a7c into kubernetes-sigs:release-1.7 Sep 19, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

10 participants