Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
118 commits
Select commit Hold shift + click to select a range
945f4d7
Release commit for Kubernetes v1.19.1-rc.0
Aug 26, 2020
1934870
Update CHANGELOG/CHANGELOG-1.19.md for v1.19.0
Aug 26, 2020
bd00ef8
Add PR #89069 Action Required
Aug 26, 2020
9b75b1c
Use NLB Subnet CIDRs instead of VPC CIDRs in updateInstanceSecurityGr…
t0rr3sp3dr0 Jul 28, 2020
c99083e
Fix issue on skipTest in storage suits
jingxu97 Aug 26, 2020
1b10b5e
fix(azure): check error returned by scaleSet.getVMSS
knight42 Aug 28, 2020
70a6823
Merge pull request #94266 from t0rr3sp3dr0/automated-cherry-pick-of-#…
k8s-ci-robot Aug 31, 2020
b605a78
fix(kubelet): protect `containerCleanupInfos` from concurrent map writes
knight42 Aug 7, 2020
1b1608d
test(kubelet): add a regression test to verify kubelet would not panic
knight42 Aug 7, 2020
aefa818
Remove duplicate nodeSelector
millermatt Aug 28, 2020
3392fdf
cleanup: decrease log level from warn to v3
jvanz Jul 7, 2020
3c4b036
Revert "cleanup: decrease log level from warn to v3"
jvanz Jul 20, 2020
3fa39f8
cleanup: print warning message after timeout
jvanz Jul 20, 2020
e0342c3
Add impersonated user to system:authenticated group
tkashem Aug 21, 2020
065f041
kubeadm: Fix `upgrade plan` for air-gapped setups
rosti Sep 2, 2020
c9d4923
let panics propagate up when processLoop panic
gobomb Aug 3, 2020
e21e490
Fixed reflector not recovering from "Too large resource version" erro…
janeczku Aug 28, 2020
228e1ee
kubeadm: make the scheduler and KCM connect to local endpoint
neolit123 Sep 1, 2020
554df36
Merge pull request #94442 from neolit123/automated-cherry-pick-of-#94…
k8s-ci-robot Sep 3, 2020
e78405e
Merge pull request #94264 from dekkagaijin/automated-cherry-pick-of-#…
k8s-ci-robot Sep 3, 2020
f611131
Merge pull request #94427 from gobomb/automated-cherry-pick-of-#93646…
k8s-ci-robot Sep 4, 2020
4756433
Update snapshot controller to use k8s.gcr.io
msau42 Aug 12, 2020
af6ebd4
Merge pull request #94283 from jingxu97/automated-cherry-pick-of-#942…
k8s-ci-robot Sep 4, 2020
8331637
Merge pull request #94431 from janeczku/automated-cherry-pick-of-#943…
k8s-ci-robot Sep 4, 2020
922b918
kubeadm: remove the CoreDNS check for supported image digests
neolit123 Sep 4, 2020
76b403c
Merge pull request #94342 from pandaamanda/automated-cherry-pick-of-#…
k8s-ci-robot Sep 4, 2020
89b5f50
Merge pull request #94344 from knight42/automated-cherry-pick-of-#943…
k8s-ci-robot Sep 4, 2020
706f39b
Merge pull request #94352 from knight42/automated-cherry-pick-of-#937…
k8s-ci-robot Sep 4, 2020
c1323c9
Merge pull request #94422 from rosti/automated-cherry-pick-of-#94421-…
k8s-ci-robot Sep 4, 2020
ba622d0
Merge pull request #94408 from tkashem/automated-cherry-pick-of-#9420…
k8s-ci-robot Sep 4, 2020
02b49ca
Merge pull request #94507 from neolit123/automated-cherry-pick-of-#94…
k8s-ci-robot Sep 4, 2020
3226daf
Update default etcd server to 3.4.13
jingyih Aug 27, 2020
ac5f7e5
Merge pull request #94405 from ehashman/automated-cherry-pick-of-#928…
k8s-ci-robot Sep 4, 2020
88c1ac8
Merge pull request #94502 from msau42/automated-cherry-pick-of-#93909…
k8s-ci-robot Sep 4, 2020
5f5b46a
Merge pull request #94536 from jingyih/automated-cherry-pick-of-#9428…
k8s-ci-robot Sep 4, 2020
2e5a8a4
build/common.sh: Remove extraneous reference to debian-base image
justaugustus Sep 5, 2020
2ecff9a
build/lib/release: Explicitly use '--platform' in building server images
justaugustus Sep 5, 2020
ccc0405
Merge pull request #94613 from justaugustus/119-fix-go-runner-arch
k8s-ci-robot Sep 8, 2020
0a54c78
Sort list of formats for --logging-format description to make it dete…
dims Sep 8, 2020
206bcad
Release commit for Kubernetes v1.19.1
Sep 9, 2020
02b16f2
Release commit for Kubernetes v1.19.2-rc.0
Sep 9, 2020
a767ee5
Update CHANGELOG/CHANGELOG-1.19.md for v1.19.1
Sep 9, 2020
7d32772
Cleanup custom metrics conversion functions
wojtek-t Sep 3, 2020
0f098f5
Add roundtrip tests for metrics repo
wojtek-t Sep 9, 2020
c6328b3
Update CNI plugins to v0.8.7
justaugustus Aug 31, 2020
55b0dcd
kubectl describe pod: use ReportingController as an event source
ingvagabund Aug 4, 2020
8a59587
Merge pull request #94632 from dims/automated-cherry-pick-of-#94629-u…
k8s-ci-robot Sep 10, 2020
52aa885
Merge pull request #94654 from wojtek-t/automated-cherry-pick-of-#944…
k8s-ci-robot Sep 10, 2020
de697e7
Merge pull request #94677 from xmudrii/automated-cherry-pick-of-#9436…
k8s-ci-robot Sep 10, 2020
a1fade3
Merge pull request #94680 from ingvagabund/automated-cherry-pick-of-#…
k8s-ci-robot Sep 11, 2020
39fd13d
Fix index out of range panic for kubectl alpha debug
kiyoshim55 Sep 6, 2020
19706d9
Merge pull request #94724 from eddiezane/automated-cherry-pick-of-#94…
k8s-ci-robot Sep 11, 2020
f574309
Release commit for Kubernetes v1.19.2
Sep 16, 2020
4d51742
Merge remote-tracking branch 'openshift/master' into ocp-rebase-1.19.2
tnozicka Sep 30, 2020
6bff345
UPSTREAM: 74956: apiserver: switch authorization to use protobuf client
mfojtik Oct 29, 2020
338f8a0
UPSTREAM: 84466: gce: ensureInternalInstanceGroups: reuse instance-gr…
abhinavdahiya Oct 29, 2020
5a3cd68
UPSTREAM: 93286: wait for apiservices on startup
deads2k Oct 29, 2020
32e04c3
UPSTREAM: <carry>: filter out CustomResourceQuota paths from OpenAPI
sttts Oct 29, 2020
6b5bc3f
UPSTREAM: <carry>: patch aggregator to allow delegating resources
mfojtik Oct 29, 2020
febb3ce
UPSTREAM: <carry>: remove apiservice from sync in CRD registration wh…
mfojtik Oct 29, 2020
cb9d4ed
UPSTREAM: <carry>: hardcoded restmapper with a few entries to reboots…
deads2k Oct 29, 2020
26fbdcd
UPSTREAM: <carry>: kubelet: Expose a simple journald shim on the kube…
smarterclayton Oct 29, 2020
0b33877
UPSTREAM: <carry>: kube-controller-manager: add service serving cert …
deads2k Oct 29, 2020
015da00
UPSTREAM: <carry>: kube-controller-manager: allow running bare kube-c…
deads2k Oct 29, 2020
011c3fc
UPSTREAM: <carry>: kube-controller-manager: exclude some origin resou…
deads2k Oct 29, 2020
37052ef
UPSTREAM: <carry>: autoscaling: hack in working scaling for legacy de…
deads2k Oct 29, 2020
781dbc7
UPSTREAM: <carry>: kube-apiserver: add our immortal namespaces direct…
deads2k Oct 29, 2020
0b23e5a
UPSTREAM: <carry>: kube-apiserver: allow injection of kube-apiserver …
deads2k Oct 29, 2020
2ebb8be
UPSTREAM: <carry>: kube-apiserver: priorize some CRD groups over others
deads2k Oct 29, 2020
128d168
UPSTREAM: <carry>: Always test PDB's during service upgrade test
smarterclayton Oct 29, 2020
878bf2f
UPSTREAM: <carry>: kube-apiserver: allow rewiring
deads2k Oct 29, 2020
b45f23f
UPSTREAM: <carry>: openshift-kube-apiserver: add kube-apiserver patches
deads2k Oct 29, 2020
d9f0f42
UPSTREAM: <carry>: simplify the authorizer patch to allow the flags t…
deads2k Oct 29, 2020
257b5b9
UPSTREAM: <carry>: kube-apiserver: wire through isTerminating into ha…
sttts Oct 29, 2020
1fbe3bb
UPSTREAM: 94766: apiserver: fix healthz vs. livez vs. readyz log output
sttts Oct 29, 2020
d88b822
UPSTREAM: <carry>: create termination events
sttts Oct 29, 2020
2821d75
UPSTREAM: <carry>: bootstrap-rbac-policy: move over .well-known rules
sttts Oct 29, 2020
9df5ce2
UPSTREAM: <carry>: Read availability zone name from metadata
Fedosin Oct 29, 2020
b0cc54b
UPSTREAM: <carry>: warn only about unknown feature gates
sttts Oct 29, 2020
9002d3f
UPSTREAM: <carry>: CHECK(workload) disable kubectl client-side valida…
p0lyn0mial Oct 29, 2020
17bdbff
UPSTREAM: <carry>: disable AES24, not supported by FIPS
rphillips Oct 29, 2020
5e4001a
UPSTREAM: <carry>: add crdvalidation for apiserver.spec.tlsSecurityPr…
stlaz Oct 29, 2020
ec6e170
UPSTREAM: <carry>: bump nodes ready timeout
rphillips Oct 29, 2020
fd9adfd
UPSTREAM: <carry>: adapt to the new flag 'structure'
deads2k Oct 29, 2020
dbf7560
UPSTREAM: <carry>: Remove excessive e2e logging
p0lyn0mial Oct 29, 2020
974fabc
UPSTREAM: <carry>: conditionally fill the UserAgent from the currentl…
p0lyn0mial Oct 29, 2020
3fae575
UPSTREAM: <carry>: Extend default unit test timeout to 180s
marun Oct 29, 2020
9198f73
UPSTREAM: 89885: allow to read openstack cloud provider config from a…
Fedosin Oct 29, 2020
6317833
UPSTREAM: 90452: refactor/improve CRD publishing e2e tests in an HA s…
p0lyn0mial Oct 29, 2020
eb2a430
UPSTREAM: <carry>: Enable nested generation of k8s.io/kubernetes bindata
marun May 13, 2020
be0b9ad
UPSTREAM: <carry>: Bug 1852056: change etcd health check timeout to 10s
tkashem Oct 29, 2020
6aa1e2f
UPSTREAM: <carry>: eliminate unnecessary closure in openshift configu…
deads2k Oct 29, 2020
4c5c35a
UPSTREAM: <carry>: Add OpenShift tooling, images, configs and docs
marun Oct 29, 2020
51e3312
UPSTREAM: <carry>: Add OpenShift OWNERS
marun Jul 16, 2020
293fa63
UPSTREAM: <carry>: use new access token inactivity timeout field.
vareti Oct 29, 2020
8a7f130
UPSTREAM: <carry>: noderestrictions: add node-role.kubernetes.io/* to…
sttts Oct 29, 2020
e100532
UPSTREAM: <carry>: oauth-authn: support sha256 prefixed tokens
sttts Oct 29, 2020
a5566b3
UPSTREAM: <carry>: openshift-kube-apiserver: Add custom resource vali…
abhat Oct 29, 2020
356cd43
UPSTREAM: 93475: Strip unnecessary security contexts on Windows
ravisantoshgudimetla Oct 29, 2020
d06fd0b
UPSTREAM: <carry>: add readyz check for openshift apiserver availability
deads2k Oct 29, 2020
384128d
UPSTREAM: <drop>: don't use dynamic tokens for KCM
deads2k Oct 29, 2020
c4db7ac
UPSTREAM: 94134: Make similar buckets for api and etcd request durati…
tkashem Oct 29, 2020
07eb50b
UPSTREAM: 94614: e2e: fix deployment non-unique env vars to avoid SSA…
sttts Oct 29, 2020
d913d19
UPSTREAM: 94589: fixes a data race in SerializeObject function
p0lyn0mial Oct 29, 2020
4fcdf70
UPSTREAM: <carry>: Skip unit tests incompatible with openshift ci
marun Oct 29, 2020
54d827c
UPSTREAM: 94144: Reduce offline volume expansion flake
gnufied Oct 29, 2020
26aa795
UPSTREAM: <carry>: Stop ignoring test/e2e/generated/bindata.go
marun Sep 10, 2020
7278490
UPSTREAM: 94609: Use namespace flag passed to RunKubectl* methods
soltysh Oct 29, 2020
0676521
UPSTREAM: <carry>: Release lock on KCM and KS termination
tnozicka Oct 29, 2020
e524bb3
UPSTREAM: 94773: count of etcd object should be limited to the specif…
tkashem Oct 29, 2020
556c6dd
UPSTREAM: 94888: apiextensions: prune array type without items in pub…
sttts Oct 29, 2020
4048e5f
UPSTREAM: 94903: Take into account latency incurred in server filters
tkashem Oct 29, 2020
a076d09
UPSTREAM: 94984: check readyz before adding endpoint for kube-apiserver
deads2k Oct 29, 2020
73aba8b
UPSTREAM: 95009: Remove ext2 + ext3 tests
jsafrane Oct 29, 2020
cebccbf
UPSTREAM: 94986: drop managed fields from audit entries
tkashem Oct 29, 2020
d819935
UPSTREAM: 95003: Fail a test on pre-provisioned Cinder volume deletio…
jsafrane Oct 29, 2020
109af16
UPSTREAM: <drop>: pin and bump
tnozicka Oct 29, 2020
512f733
UPSTREAM: <drop>: update generated
tnozicka Oct 29, 2020
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2,941 changes: 0 additions & 2,941 deletions CHANGELOG/CHANGELOG-1.16.md

This file was deleted.

2,610 changes: 0 additions & 2,610 deletions CHANGELOG/CHANGELOG-1.17.md

This file was deleted.

2,267 changes: 0 additions & 2,267 deletions CHANGELOG/CHANGELOG-1.18.md

This file was deleted.

1,503 changes: 1,409 additions & 94 deletions CHANGELOG/CHANGELOG-1.19.md

Large diffs are not rendered by default.

25 changes: 11 additions & 14 deletions OWNERS
Original file line number Diff line number Diff line change
Expand Up @@ -3,25 +3,22 @@
filters:
".*":
reviewers:
- bparees
- deads2k
- sjenning
- smarterclayton
- sttts
- soltysh
- tbielawa
- mfojtik
- marun
- tnozicka

# approvers are limited to the team that manages rebases and pays the price for carries that are introduced
approvers:
- bparees
- deads2k
- derekwaynecarr
- eparis
- knobunc # Network, Multi-cluster, Storage
- mfojtik
- pweil-
- sjenning
- soltysh
- sttts
- smarterclayton
- tbielawa # also for build and automated release tooling changes
- soltysh
- mfojtik
- marun
- tnozicka

"^\\.go.(mod|sum)$":
labels:
- "vendor-update"
Expand Down
2 changes: 1 addition & 1 deletion README.openshift.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ any code you have in upstream Kubernetes will land in Openshift via
this mechanism.

2. Cherry-picked patches for important *bug fixes*. We really try to
limit feature back-porting entirely.
limit feature back-porting entirely. Unless there are exceptional circumstances, your backport should at least be merged in kubernetes master branch. With every carry patch (not included in upstream) you are introducing a maintenance burden for the team managing rebases.

### For Openshift newcomers: Pick my Kubernetes fix into Openshift vs. wait for the next rebase?

Expand Down
107 changes: 60 additions & 47 deletions REBASE.openshift.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,9 +51,12 @@ git remote add --fetch openshift https://github.com/openshift/kubernetes
git checkout -b rebase-1.20.0 v1.20.0
```

- Merge the targeted `openshift/kubernetes` branch (e.g. `master`) with
strategy `ours` to reset the the branch to the targeted release tag without
involving manual conflict resolution.
- Merge `openshift(master)` branch into the `rebase-1.20.0` branch with merge
strategy `ours`. It discards all changes from the other branch (`openshift/master`)
and create a merge commit. This leaves the content of your branch unchanged,
and when you next merge with the other branch, Git will only consider changes made
from this point forward. (Do not confuse this with `ours` conflict resolution
strategy for `recursive` merge strategy, `-X` option.)

```
git merge -s ours openshift/master
Expand All @@ -62,24 +65,29 @@ git merge -s ours openshift/master
## Creating a spreadsheet of carry commits from the previous release

Given the upstream tag (e.g. `v1.19.2`) of the most recent rebase and the name
of the branch that is targeted for rebase (e.g. `master`), generate a csv file
of the branch that is targeted for rebase (e.g. `openshift/master`), generate a tsv file
containing the set of carry commits that need to be considered for picking:

```
git log $( git merge-base master v1.19.2 )..master \
--pretty=format:',%H,%s,https://github.com/openshift/kubernetes/commit/%H' | \
grep -v 'Merge pull request' | \
sed 's#,UPSTREAM: \([0-9]*\)\(:.*\)#,UPSTREAM: \1\2,https://github.com/kubernetes/kubernetes/pull/\1#' > \
v1.19.2.csv
echo 'Comment Sha\tAction\tClean\tSummary\tCommit link\tPR link' > ~/Documents/v1.19.2.tsv
```
```
git log $( git merge-base openshift/master v1.19.2 )..openshift/master --ancestry-path --reverse --no-merges --pretty='tformat:%x09%h%x09%x09%x09%s%x09https://github.com/openshift/kubernetes/commit/%h?w=1' | grep -E $'\t''UPSTREAM: .*'$'\t' | sed -E 's~UPSTREAM: ([0-9]+)(:.*)~UPSTREAM: \1\2\thttps://github.com/kubernetes/kubernetes/pull/\1~' >> ~/Documents/v1.19.2.tsv
```

This csv file can be imported into a google sheets spreadsheet to track the
This tsv file can be imported into a google sheets spreadsheet to track the
progress of picking commits to the new rebase branch. The spreadsheet can also
be a way of communicating with rebase reviewers. For an example of this
communication, please see the [the spreadsheet used for the 1.19
rebase](https://docs.google.com/spreadsheets/d/10KYptJkDB1z8_RYCQVBYDjdTlRfyoXILMa0Fg8tnNlY/edit).

## Picking commits from the previous rebase branch to the new branch
Go through the spreadsheet and for every commit set one of the appropriate actions:
- `p`, to pick the commit
- `s`, to squash it (add a comment with the sha of the target)
- `d`, to drop the commit (if it is not obvious, comment why)

Set up conditional formatting in the google sheet to color these lines appropriately.

Commits carried on rebase branches have commit messages prefixed as follows:

Expand All @@ -102,27 +110,36 @@ Commits carried on rebase branches have commit messages prefixed as follows:
- <img src="openshift-hack/commit-tag.png">

With these guidelines in mind, pick the appropriate commits from the previous rebase
branch into the new rebase branch. As per the example of previous rebase spreadsheets,
color each commit in the spreadsheet to indicate to reviewers whether or not a commit
was picked and the rationale for your choice.
branch into the new rebase branch. Create a new filter view in the spreadsheet to allow
you get a view where `Action==p || Action==s` and copy paste the shas to `git cherry-pick`
command. Use `tr '\n' ' ' <<< "<line_separated_commits>"` to get a space separated list
from the copy&paste.

Where it makes sense to do so, squash carried changes that are tightly coupled to
simplify future rebases. If the commit message of a carry does not conform to
expectations, feel free to revise and note the change in the spreadsheet row for the
commit.

If you first pick all the pick+squash commits first and push them for review it is easier for you
and your reviewers to check the code changes and you squash it at the end.

Explicit commit rules:
- Anything touching `openshift-hack/`, openshift specific READMEs or similar files
should be squashed to 1 commit named "UPSTREAM: <carry>: Add OpenShift specific files"
- Updating generated files coming from kubernetes should be `<drop>` commit

## Update the hyperkube image version to the release tag

The [hyperkube dockerfile](openshift-hack/images/hyperkube/Dockerfile.rhel)
hard-codes the Kubernetes version in an image label. It's necessary to manually
set this label to the new release tag. Prefix the commit summary with
`UPSTREAM: <drop>:` since a future rebase will need to add its own commit.
`UPSTREAM: <carry>: (squash)` and squash it before merging the rebase PR.

## Updating dependencies

Once the commits are all picked from the previous rebase branch, each of the
following repositories need to be updated to depend on the upstream tag
targeted by the rebase:
Once the commits are all picked from the previous rebase branch, and your PR
is mostly ready, each of the following repositories need to be updated to depend
on the upstream tag targeted by the rebase:

- https://github.com/openshift/api
- https://github.com/openshift/apiserver-library-go
Expand All @@ -132,26 +149,29 @@ targeted by the rebase:
Often these repositories are updated in parallel by other team members, so make
sure to ask around before starting the work of bumping their dependencies.

Once the above repos have been updated to the target release, it will be necessary to
update go.mod to point to the appropriate revision of these repos by running
`hack/pin-dependency.sh` for each of them and then running `hack/update-vendor.sh` (as
per the [upstream
documentation](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/vendor.md#adding-or-updating-a-dependency)).
Once the above repos have been updated to depend on the target release,
it will be necessary to update `go.mod` to point to the appropriate revision
of these repos by running `hack/pin-dependency.sh` for each of them and then running
`hack/update-vendor.sh` (as per the [upstream documentation](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/vendor.md#adding-or-updating-a-dependency)).

Make sure to commit the result of a vendoring update with `UPSTREAM: <drop>: bump(*)`.
If you have already bumped the dependencies to get the repo to compile,
don't forget to squash the commits before merging the PR.

### Updating dependencies for pending bumps

The upstream `hack/pin-dependency.sh` script only supports setting dependency
for the original repository. To pin to a fork branch that has not yet been
merged (i.e. to test a rebase ahead of shared library bumps having merged), the
following `go mod` invovations are suggested:
following `go mod` invocations are suggested:

```
go mod edit -replace github.com/openshift/<lib>=github.com/<username>/<lib>@SHA
go mod tidy
go mod tidy && go mod vendor
```

Alternatively, you can edit `go.mod` file manually with your favourite editor and use search&replace.

## Review test annotation rules

The names of upstream e2e tests are annotated according to the a set of
Expand All @@ -178,17 +198,22 @@ regression in behavior) can often be skipped and addressed post-merge.
- Update generated files by running `make update`
- This step depends on etcd being installed in the path, which can be
accomplished by running `hack/install-etcd.sh`.
- Alternatively, run it in the same container as CI is using for build_root that already has
the etcd at correct version
```
podman run -it --rm -v $( pwd ):/go/k8s.io/kubernetes:Z --workdir=/go/k8s.io/kubernetes registry.svc.ci.openshift.org/openshift/release:rhel-8-release-golang-1.15-openshift-4.7 make update OS_RUN_WITHOUT_DOCKER=yes
```
- Commit the resulting changes as `UPSTREAM: <drop>: make update`.

## Building and testing

- Build the code with `make`
- Test the code with `make test`
- Where test failures are encountered and can't be trivially resolved, the
spreadsheet can be used to to track those failures to their resolution. The
spreadsheet can be used to track those failures to their resolution. The
example spreadsheet should have a sheet that demonstrates this tracking.
- Where a test failure proves challenging to fix without specialized knowledge,
make sure to coordinate with the team(s) responsible for areas of focus
make sure to coordinate with the team(s) responsible for area(s) of focus
exhibiting test failure. If in doubt, ask for help!
- Verify the code with `make verify`

Expand All @@ -206,36 +231,24 @@ should be true:
- [ ] `make` executes without error
- [ ] `make verify` executes without error
- [ ] `make test` executes without error
- [ ] Upstream tags are pushed to `openshift/kubernetes` to ensure that
- [ ] The upstream tag is pushed to `openshift/kubernetes` to ensure that
build artifacts are versioned correctly
- Upstream tooling uses the value of the most recent tag (e.g. `v1.20.0`)
in the branch history as the version of the binaries it builds.
- Pushing the tag is easy as
```
git push [email protected]:openshift/kubernetes.git refs/tags/v1.20.0
```

Details to include in the description of the PR:

- [ ] A link to the rebase spreadsheet for the benefit for reviewers
- [ ] A comment reminding reviewers of the need for manual upgrade testing
along with a `/hold` command to prevent merge until such testing is
completed.

In addition to the standard requirement that all CI jobs be passing, the rebase
PR should not be merged until additional upgrade testing initiated with
cluster-bot is passing:

- [ ] `test upgrade [previous release e.g. 4.6] openshift/kubernetes#[PR#] [aws|azure]`
- Only gcp upgrades are tested automatically via presubmit
(`e2e-gcp-upgrade`) and it's necessary to manually test aws and azure.
- [ ] `test upgrade openshift/kubernetes#[PR#] openshift/kubernetes#[PR#]`
- This 'self-upgrade' ensures that it is possible to upgrade _from_ the
rebased release. The other upgrade testing validates that it's possible
to upgrade _to_ the rebased release.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why is all this gone? We do that automatically?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yep, I've added all of this to CI and it is triggered by changing the kube version in the dockerfile and run automatically. you can see the jobs passing in status

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.


After the rebase PR has merged to `openshift/kubernetes`, vendor the changes
into `origin` to ensure that the openshift-tests binary reflects the upstream
test changes introduced by the rebase:
into `openshift/origin` to ensure that the openshift-tests binary reflects
the upstream test changes introduced by the rebase:

- [ ] Find the SHA of `openshift/kubernetes` branch after merge of the rebase
PR
- [ ] Find the SHA of the merge commit after your PR lands in `openshift/kubernetes`
- [ ] Run `hack/update-kube-vendor.sh <o/k SHA>` in a clone of the `origin`
repo and commit the results
- [ ] Run `make update` and commit the results
Expand All @@ -247,5 +260,5 @@ rebase. Make sure to include:
- [ ] The new version of upstream Kubernetes that OpenShift is now based on
- [ ] Link(s) to upstream changelog(s) detailing what has changed since the last rebase landed
- [ ] A reminder to component maintainers to bump their dependencies
- [ ] Relevent details of the challenges involved in landing the rebase that
- [ ] Relevant details of the challenges involved in landing the rebase that
could benefit from a wider audience.
2 changes: 1 addition & 1 deletion api/OWNERS
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

# Disable inheritance as this is an api owners file
options:
no_parent_owners: true
no_parent_owners: false
approvers:
- api-approvers
reviewers:
Expand Down
4 changes: 1 addition & 3 deletions build/common.sh
Original file line number Diff line number Diff line change
Expand Up @@ -93,8 +93,6 @@ readonly KUBE_CONTAINER_RSYNC_PORT=8730
#
# $1 - server architecture
kube::build::get_docker_wrapped_binaries() {
local arch=$1
local debian_base_version=v2.1.3
local debian_iptables_version=v12.1.2
local go_runner_version=buster-v2.0.0
### If you change any of these lists, please also update DOCKERIZED_BINARIES
Expand All @@ -103,7 +101,7 @@ kube::build::get_docker_wrapped_binaries() {
"kube-apiserver,${KUBE_BASE_IMAGE_REGISTRY}/go-runner:${go_runner_version}"
"kube-controller-manager,${KUBE_BASE_IMAGE_REGISTRY}/go-runner:${go_runner_version}"
"kube-scheduler,${KUBE_BASE_IMAGE_REGISTRY}/go-runner:${go_runner_version}"
"kube-proxy,${KUBE_BASE_IMAGE_REGISTRY}/debian-iptables-${arch}:${debian_iptables_version}"
"kube-proxy,${KUBE_BASE_IMAGE_REGISTRY}/debian-iptables:${debian_iptables_version}"
)

echo "${targets[@]}"
Expand Down
6 changes: 2 additions & 4 deletions build/dependencies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ dependencies:

# CNI plugins
- name: "cni"
version: 0.8.6
version: 0.8.7
refPaths:
- path: build/workspace.bzl
match: CNI_VERSION =
Expand Down Expand Up @@ -74,7 +74,7 @@ dependencies:

# etcd
- name: "etcd"
version: 3.4.9
version: 3.4.13
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

refPaths:
- path: cluster/gce/manifests/etcd.manifest
match: etcd_docker_tag|etcd_version
Expand Down Expand Up @@ -118,8 +118,6 @@ dependencies:
- name: "k8s.gcr.io/debian-base: dependents"
version: 2.1.3
refPaths:
- path: build/common.sh
match: debian_base_version=
- path: build/workspace.bzl
match: tag =
- path: cluster/images/etcd/Makefile
Expand Down
4 changes: 2 additions & 2 deletions build/lib/release.sh
Original file line number Diff line number Diff line change
Expand Up @@ -334,7 +334,7 @@ function kube::release::create_docker_images_for_server() {
local images_dir
binary_dir="$1"
arch="$2"
binaries=$(kube::build::get_docker_wrapped_binaries "${arch}")
binaries=$(kube::build::get_docker_wrapped_binaries)
images_dir="${RELEASE_IMAGES}/${arch}"
mkdir -p "${images_dir}"

Expand Down Expand Up @@ -375,7 +375,7 @@ function kube::release::create_docker_images_for_server() {
ln "${KUBE_ROOT}/build/nsswitch.conf" "${docker_build_path}/nsswitch.conf"
chmod 0644 "${docker_build_path}/nsswitch.conf"
cat <<EOF > "${docker_file_path}"
FROM ${base_image}
FROM --platform=linux/${arch} ${base_image}
COPY ${binary_name} /usr/local/bin/${binary_name}
EOF
# ensure /etc/nsswitch.conf exists so go's resolver respects /etc/hosts
Expand Down
20 changes: 10 additions & 10 deletions build/workspace.bzl
Original file line number Diff line number Diff line change
Expand Up @@ -17,13 +17,13 @@ load("//build:workspace_mirror.bzl", "mirror")
load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive", "http_file")
load("@io_bazel_rules_docker//container:container.bzl", "container_pull")

CNI_VERSION = "0.8.6"
CNI_VERSION = "0.8.7"
_CNI_TARBALL_ARCH_SHA256 = {
"amd64": "994fbfcdbb2eedcfa87e48d8edb9bb365f4e2747a7e47658482556c12fd9b2f5",
"arm": "28e61b5847265135dc1ca397bf94322ecce4acab5c79cc7d360ca3f6a655bdb7",
"arm64": "43fbf750c5eccb10accffeeb092693c32b236fb25d919cf058c91a677822c999",
"ppc64le": "61d6c6c15d3e4fa3eb85d128c9c0ff2658f38e59047ae359be47d193c673e116",
"s390x": "ca126a3bd2cd8dff1c7bbfc3c69933b284c4e77614391c7e1f74b0851fc3b289",
"amd64": "977824932d5667c7a37aa6a3cbba40100a6873e7bd97e83e8be837e3e7afd0a8",
"arm": "5757778f4c322ffd93d7586c60037b81a2eb79271af6f4edf9ff62b4f7868ed9",
"arm64": "ae13d7b5c05bd180ea9b5b68f44bdaa7bfb41034a2ef1d68fd8e1259797d642f",
"ppc64le": "70a8c5448ed03a3b27c6a89499a05285760a45252ec7eae4190c70ba5400d4ba",
"s390x": "3a0008f98ea5b4b6fd367cac3d8096f19bc080a779cf81fd0bcbc5bd1396ace7",
}

CRI_TOOLS_VERSION = "1.18.0"
Expand All @@ -38,11 +38,11 @@ _CRI_TARBALL_ARCH_SHA256 = {
"windows-amd64": "5045bcc6d8b0e6004be123ab99ea06e5b1b2ae1e586c968fcdf85fccd4d67ae1",
}

ETCD_VERSION = "3.4.9"
ETCD_VERSION = "3.4.13"
_ETCD_TARBALL_ARCH_SHA256 = {
"amd64": "bcab421f6bf4111accfceb004e0a0ac2bcfb92ac93081d9429e313248dd78c41",
"arm64": "fd9bf37662a851905d75160fea0f5d10055c1bee0a734e78c5112cc56c9faa18",
"ppc64le": "bfdcea0fc83c6d6edb70667a2272f8fc597c61976ecc6f8ecbfeb380ff02618b",
"amd64": "2ac029e47bab752dacdb7b30032f230f49e2f457cbc32e8f555c2210bb5ff107",
"arm64": "1934ebb9f9f6501f706111b78e5e321a7ff8d7792d3d96a76e2d01874e42a300",
"ppc64le": "fc77c3949b5178373734c3b276eb2281c954c3cd2225ccb05cdbdf721e1f775a",
}

# Dependencies needed for a Kubernetes "release", e.g. building docker images,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -105,6 +105,4 @@ spec:
tolerations:
- key: "CriticalAddonsOnly"
operator: "Exists"
nodeSelector:
kubernetes.io/os: linux
serviceAccountName: kube-dns-autoscaler
Original file line number Diff line number Diff line change
Expand Up @@ -22,8 +22,6 @@ spec:
serviceAccount: volume-snapshot-controller
containers:
- name: volume-snapshot-controller
# TODO(xyang): Replace with an official image when it is released
image: gcr.io/k8s-staging-csi/snapshot-controller:v2.0.0-rc2
image: k8s.gcr.io/sig-storage/snapshot-controller:v2.1.1
args:
- "--v=5"
imagePullPolicy: Always
2 changes: 1 addition & 1 deletion cluster/gce/config-common.sh
Original file line number Diff line number Diff line change
Expand Up @@ -142,7 +142,7 @@ export WINDOWS_CNI_CONFIG_DIR="${WINDOWS_K8S_DIR}\cni\config"
# CNI storage path for Windows nodes
export WINDOWS_CNI_STORAGE_PATH="https://storage.googleapis.com/k8s-artifacts-cni/release"
# CNI version for Windows nodes
export WINDOWS_CNI_VERSION="v0.8.6"
export WINDOWS_CNI_VERSION="v0.8.7"
# Pod manifests directory for Windows nodes on Windows nodes.
export WINDOWS_MANIFESTS_DIR="${WINDOWS_K8S_DIR}\manifests"
# Directory where cert/key files will be stores on Windows nodes.
Expand Down
2 changes: 1 addition & 1 deletion cluster/gce/config-test.sh
Original file line number Diff line number Diff line change
Expand Up @@ -202,7 +202,7 @@ HEAPSTER_MACHINE_TYPE=${HEAPSTER_MACHINE_TYPE:-}
NUM_ADDITIONAL_NODES=${NUM_ADDITIONAL_NODES:-}
ADDITIONAL_MACHINE_TYPE=${ADDITIONAL_MACHINE_TYPE:-}

# Set etcd image (e.g. k8s.gcr.io/etcd) and version (e.g. 3.4.9-1) if you need
# Set etcd image (e.g. k8s.gcr.io/etcd) and version (e.g. 3.4.13-0) if you need
# non-default version.
export ETCD_IMAGE=${TEST_ETCD_IMAGE:-}
export ETCD_DOCKER_REPOSITORY=${TEST_ETCD_DOCKER_REPOSITORY:-}
Expand Down
Loading