-
Notifications
You must be signed in to change notification settings - Fork 40.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fixing a small bug with GMSA support #74737
Conversation
Hi @wk8. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/ok-to-test |
A previous PR (kubernetes#73726) added GMSA support to the dockershim. Unfortunately, there was a bug in there: the registry keys used to pass the cred specs down to Docker were being cleaned up too early, right after the containers' creation - before Docker would ever try to read them, when trying to actually start the container. This patch fixes this. An e2e test is also provided in a separate PR. Signed-off-by: Jean Rouge <rougej+github@gmail.com>
9bfd260
to
1908a0c
Compare
/sig windows |
/test pull-kubernetes-e2e-gce-100-performance |
/lgtm |
@yujuhong @michmike @derekwaynecarr : thanks a lot for the reviews. Addressed your comments. Could you please have another look? |
/lgtm |
/assign @derekwaynecarr |
/lgtm Leaving the approval for @derekwaynecarr |
thank you for the clarifications. /approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: derekwaynecarr, wk8 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/milestone v1.14 |
This patch is adding an e2e on the Windows GMSA support added in kubernetes#73726 and kubernetes#74737. Signed-off-by: Jean Rouge <rougej+github@gmail.com>
kubernetes#74737 introduced a new in-memory map for the dockershim, that could potentially (in pathological cases) cause memory leaks - for containers that use GMSA cred specs, get created successfully, but then never get started nor removed. This patch adds a new goroutine in the dockershim that periodically cleans up stale `containerCleanupInfos`. Resolves issue kubernetes#74843. Added unit tests. Signed-off-by: Jean Rouge <rougej+github@gmail.com>
kubernetes#74737 introduced a new in-memory map for the dockershim, that could potentially (in pathological cases) cause memory leaks - for containers that use GMSA cred specs, get created successfully, but then never get started nor removed. This patch adds a new goroutine in the dockershim that periodically cleans up stale `containerCleanupInfos`. Resolves issue kubernetes#74843. Added unit tests. Signed-off-by: Jean Rouge <rougej+github@gmail.com>
kubernetes#74737 introduced a new in-memory map for the dockershim, that could potentially (in pathological cases) cause memory leaks - for containers that use GMSA cred specs, get created successfully, but then never get started nor removed. This patch addresses this issue by making container removal fail altogether when platform-specific clean ups fail: this allows clean ups to be retried later, when the kubelet attempts to remove the container again. Resolves issue kubernetes#74843. Signed-off-by: Jean Rouge <rougej+github@gmail.com>
What type of PR is this?
/kind bug
What this PR does / why we need it:
A previous PR (#73726)
added GMSA support to the dockershim. Unfortunately, there was a
bug in there: the registry keys used to pass the cred specs down
to Docker were being cleaned up too early, right after the containers'
creation - before Docker would ever try to read them, when trying to
actually start the container.
This patch fixes this.
An e2e test is also provided in a separate PR (#74738)
Does this PR introduce a user-facing change?: