-
Notifications
You must be signed in to change notification settings - Fork 635
🌱 Bump CAPI to v1.11 and k8s to v1.33 #5720
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
- Update core Kubernetes dependencies from v0.32.3 to v0.33.4: - k8s.io/api, k8s.io/apimachinery, k8s.io/client-go - k8s.io/apiserver, k8s.io/cli-runtime, k8s.io/kubectl - k8s.io/apiextensions-apiserver, k8s.io/component-base - Upgrade prometheus/client_golang from v1.19.1 to v1.22.0 - Update cel.dev/expr from v0.18.0 to v0.19.1 - Upgrade google/cel-go from v0.22.0 to v0.23.2 - Update golang.org/x/time from v0.8.0 to v0.9.0 - Upgrade gRPC from v1.67.3 to v1.68.1 - Update OpenTelemetry packages to v1.33.0 - Refresh k8s.io/utils and other indirect dependencies - Update kube-openapi and structured-merge-diff versions
- Upgrade cluster-api from v1.10.2 to v1.11.1 - Upgrade controller-runtime from v0.20.4 to v0.21.0 - Update various golang.org/x/* packages - Update testing dependencies (ginkgo, gomega) - Update OpenTelemetry and other indirect dependencies
Signed-off-by: Borja Clemente <[email protected]>
- Update all imports to v1beta2 types except for conditions staying in v1beta1. - Adapt source code to work with v1beta2 and deprecated conditions. - Manually update conversions. Signed-off-by: Borja Clemente <[email protected]>
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Welcome @clebs! |
Hi @clebs. Thanks for your PR. I'm waiting for a github.com member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@richardcase This PR here based on @bryan-cox's: #5720 Changes:
Current state:
|
/ok-to-test |
|
||
clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1" | ||
clusterv1beta1 "sigs.k8s.io/cluster-api/api/core/v1beta1" | ||
clusterv1 "sigs.k8s.io/cluster-api/api/core/v1beta2" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If I'm right then this package should not import clusterv1 "sigs.k8s.io/cluster-api/api/core/v1beta2"
It should use keep using clusterv1beta1 "sigs.k8s.io/cluster-api/api/core/v1beta1"
Otherwise this could be considered a breaking api change (same for the whole package)
|
||
clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1" | ||
clusterv1beta1 "sigs.k8s.io/cluster-api/api/core/v1beta1" | ||
clusterv1 "sigs.k8s.io/cluster-api/api/core/v1beta2" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also here,
If I'm right then this package should not import clusterv1 "sigs.k8s.io/cluster-api/api/core/v1beta2"
It should use keep using clusterv1beta1 "sigs.k8s.io/cluster-api/api/core/v1beta1"
Otherwise this could be considered a breaking api change (same for the whole package)
- pkg: "sigs.k8s.io/cluster-api/api/core/v1beta1" | ||
alias: clusterv1 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- pkg: "sigs.k8s.io/cluster-api/api/core/v1beta1" | |
alias: clusterv1 | |
- pkg: "sigs.k8s.io/cluster-api/api/core/v1beta2" | |
alias: clusterv1 | |
- pkg: "sigs.k8s.io/cluster-api/api/core/v1beta1" | |
alias: clusterv1beta1 |
make lint-fix
(orgolangci-lint run --fix
)
func EnsurePausedCondition(ctx context.Context, c client.Client, cluster *clusterv1.Cluster, obj ConditionSetter) (isPaused bool, conditionChanged bool, err error) { | ||
oldCondition := conditions.Get(obj, clusterv1.PausedV1Beta2Condition) | ||
newCondition := pausedCondition(c.Scheme(), cluster, obj, clusterv1.PausedV1Beta2Condition) | ||
oldCondition := conditions.Get(obj, PausedCondition) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why adding your own instead of re-using clusterv1beta1.PausedCondition
as before?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe worth considering to use the same pattern as (via the CAPI utility):
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, that makes sense, I do not recall this change. Might have been by accident (claude)...
Looking at your suggestion, both methods seem to be the same. Does this mean we can get rid of the whole paused
package on CAPA?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
highly likely, in CAPV we just use the util from CAPI.
"sigs.k8s.io/cluster-api/util/conditions" | ||
"sigs.k8s.io/cluster-api/util/patch" | ||
"sigs.k8s.io/cluster-api/util/deprecated/v1beta1/conditions" | ||
patch "sigs.k8s.io/cluster-api/util/deprecated/v1beta1/patch" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
patch "sigs.k8s.io/cluster-api/util/deprecated/v1beta1/patch" | |
v1beta1patch "sigs.k8s.io/cluster-api/util/deprecated/v1beta1/patch" |
Let's be explicit and also add this to golangci-lint config :-)
@clebs: The following tests failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
||
clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1" | ||
"sigs.k8s.io/cluster-api/test/framework" | ||
clusterv1 "sigs.k8s.io/cluster-api/api/core/v1beta2" "sigs.k8s.io/cluster-api/test/framework" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
clusterv1 "sigs.k8s.io/cluster-api/api/core/v1beta2" "sigs.k8s.io/cluster-api/test/framework" | |
clusterv1 "sigs.k8s.io/cluster-api/api/core/v1beta2" | |
"sigs.k8s.io/cluster-api/test/framework" |
"sigs.k8s.io/cluster-api/util" | ||
capiannotations "sigs.k8s.io/cluster-api/util/annotations" | ||
"sigs.k8s.io/cluster-api/util/conditions" | ||
"sigs.k8s.io/cluster-api/util/deprecated/v1beta1/conditions" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's also use the import alias via golangci lint maybe?
v1beta1conditions "sigs.k8s.io/cluster-api/util/deprecated/v1beta1/conditions"
Helps for consistency IMHO
g.Expect(cluster.Spec.ControlPlaneEndpoint.Port).To(BeZero()) | ||
expectAWSClusterConditions(g, cs.AWSCluster, []conditionAssertion{ | ||
{conditionType: infrav1.LoadBalancerReadyCondition, status: corev1.ConditionFalse, severity: clusterv1.ConditionSeverityInfo, reason: infrav1.WaitForExternalControlPlaneEndpointReason}, | ||
{conditionType: infrav1beta1.LoadBalancerReadyCondition, status: corev1.ConditionFalse, severity: clusterv1beta1.ConditionSeverityInfo, reason: infrav1beta1.WaitForExternalControlPlaneEndpointReason}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This changes should not be there or required I think.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, this is wrong if the CAPA types stay on CAPI v1beta1
. Confusion came from treating CAPI v1beta2
and CAPA v1beta2
as the same.
Now I understand that CAPA v1beta2
makes use of CAPI v1beta1
, and so I have to revert CAPA v1beta1
to v1beta2
everywhere.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we be bumping KUBERNETES_VERSION_MANAGEMENT and KUBERNETES_VERSION_UPGRADE_FROM to target 1.33 in this file?
var errMessage string | ||
for _, subnet := range subnets { | ||
if failureDomain != nil && *subnet.AvailabilityZone != *failureDomain { | ||
if *subnet.AvailabilityZone != failureDomain { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This change introduces a regression. Check for failureDomain != ""
in addition to the existing condition here. Removing the nil check and omitting this breaks MachineDeployments without a failure domain configured.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
See my comment on the subnet filtering regression
What type of PR is this?
/kind support
What this PR does / why we need it:
This PR bumps CAPI to v1.11.0, and k8s to v1.33.3.
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #5593
Replaces #5624
Special notes for your reviewer:
Checklist:
Release note: