Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use SetInformers method to register for Node events. (#449) #59440

Merged
merged 1 commit into from
Feb 14, 2018

Conversation

rjog
Copy link

@rjog rjog commented Feb 6, 2018

Till 1.9.2 Kubernetes release vSphere Cloud Provider needs a separate service account which is not needed.

What this PR does / why we need it:
In this fix, vSphere CLoud Provider is now implementing SetInformer API to get the required NodeInformer. With this change vSphere Cloud Provider no more requires separate service account for listening NodeEvents.

Which issue(s) this PR fixes
Fixes #58747

Special notes for your reviewer:
VMware vSphere Cloud Provide internal change

old release note: Till 1.9.3 vSphere Cloud Provider (VCP) need a separate service account for internal purpose. With this fix VCP is not need any special service account for functioning.

Release note:

Bugfix: vSphere Cloud Provider (VCP) does not need any special service account anymore.

@k8s-ci-robot k8s-ci-robot added release-note Denotes a PR that will be considered when it comes time to generate release notes. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Feb 6, 2018
@k8s-ci-robot k8s-ci-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Feb 6, 2018
@rjog
Copy link
Author

rjog commented Feb 6, 2018

/assign @divyenpatel
/assign @abrarshivani
/assign @BaluDontu

@divyenpatel
Copy link
Member

/approve

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 6, 2018
@divyenpatel
Copy link
Member

/ok-to-test

@k8s-ci-robot k8s-ci-robot removed the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Feb 6, 2018
Till 1.9.2 Kubernetes release vSphere Cloud Provider needs a separate service account which is not needed.
@liggitt
Copy link
Member

liggitt commented Feb 7, 2018

cc @deads2k
for cloud provider informer registration… not sure this is in the normal init flow

@dims
Copy link
Member

dims commented Feb 7, 2018

@liggitt this is exactly the GCE does too - http://dims.dynu.net/hound/?q=SetInformers&i=nope&files=&repos=kubernetes - so LGTM 👍

@liggitt
Copy link
Member

liggitt commented Feb 7, 2018

@liggitt this is exactly the GCE does too

Understood. It's possible that is problematic as well. Wanted @deads2k eyes on the init flow

@dims
Copy link
Member

dims commented Feb 7, 2018

Ack :) @liggitt

@deads2k
Copy link
Contributor

deads2k commented Feb 7, 2018

for cloud provider informer registration… not sure this is in the normal init flow

The cloud provider init code is pretty icky to begin with. I'd like to see a separate method for building the cloud provider that has args for every input it wants so we can start trying to see where the weird links are. I think a CloudControllerContext that includes the ControllerContext will give us a way to reliably wrap the controller context and then we can see which controllers are reliant on the cloud provider and need work to remove that dependency or remove the controller.

That would allow this flow to be splittable without weird side-effects as we split the cloud related controllers.

@rjog
Copy link
Author

rjog commented Feb 7, 2018

@deads2k, @liggitt, @dims,

Is there anything more that vSphere Cloud Provider can do here?

@dims
Copy link
Member

dims commented Feb 8, 2018

/hold

wait for #59568 to merge

@k8s-ci-robot k8s-ci-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 8, 2018
@dims
Copy link
Member

dims commented Feb 14, 2018

oops. forgot to remove hold.

/hold cancel
/lgtm

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 14, 2018
@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 14, 2018
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: dims, divyenpatel, rohitjogvmw

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these OWNERS Files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-github-robot
Copy link

/test all [submit-queue is verifying that this PR is safe to merge]

@k8s-github-robot
Copy link

Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions here.

@k8s-github-robot k8s-github-robot merged commit 6535c95 into kubernetes:master Feb 14, 2018
k8s-github-robot pushed a commit that referenced this pull request Feb 24, 2018
…-upstream-release-1.9

Automatic merge from submit-queue.

Automated cherry pick of #59440 upstream release-1.9

Cherry pick of #59440 on release-1.9
#59440: Use SetInformers method to register for Node events. 

Release note:
```
NONE
```
cc: @kubernetes/vmware
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. release-note Denotes a PR that will be considered when it comes time to generate release notes. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

vSphere cloud provider should not require its own role and policy
9 participants