Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove gcp in-tree cloud provider and credential providers #124519

Merged

Conversation

dims
Copy link
Member

@dims dims commented Apr 24, 2024

Related to KEPs:

What type of PR is this?

/kind cleanup

What this PR does / why we need it:

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

Does this PR introduce a user-facing change?

Removing the last remaining in-tree gcp cloud provider and credential provider. Please use the external cloud provider and credential provider from https://github.com/kubernetes/cloud-provider-gcp instead.

Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:


/sig cloud-provider
/sig auth

@k8s-ci-robot k8s-ci-robot added release-note Denotes a PR that will be considered when it comes time to generate release notes. kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. sig/cloud-provider Categorizes an issue or PR as relevant to SIG Cloud Provider. sig/auth Categorizes an issue or PR as relevant to SIG Auth. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. needs-priority Indicates a PR lacks a `priority/foo` label and requires one. approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Apr 24, 2024
@dims
Copy link
Member Author

dims commented Apr 24, 2024

/priority important-soon
/assign @aojea @BenTheElder

@k8s-ci-robot k8s-ci-robot added priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. area/apiserver area/cloudprovider area/dependency Issues or PRs related to dependency changes area/e2e-test-framework Issues or PRs related to refactoring the kubernetes e2e test framework area/kubelet area/test sig/api-machinery Categorizes an issue or PR as relevant to SIG API Machinery. sig/apps Categorizes an issue or PR as relevant to SIG Apps. sig/autoscaling Categorizes an issue or PR as relevant to SIG Autoscaling. sig/instrumentation Categorizes an issue or PR as relevant to SIG Instrumentation. sig/network Categorizes an issue or PR as relevant to SIG Network. sig/node Categorizes an issue or PR as relevant to SIG Node. sig/scheduling Categorizes an issue or PR as relevant to SIG Scheduling. sig/storage Categorizes an issue or PR as relevant to SIG Storage. sig/testing Categorizes an issue or PR as relevant to SIG Testing. and removed needs-priority Indicates a PR lacks a `priority/foo` label and requires one. labels Apr 24, 2024
@elmiko
Copy link
Contributor

elmiko commented May 6, 2024

/hold

didn't know if we are waiting for any other area reviews. feel free to remove hold if not.

@dims
Copy link
Member Author

dims commented May 6, 2024

didn't know if we are waiting for any other area reviews. feel free to remove hold if not.

Thanks @elmiko

I have a side note from @seans3 about making progress on moving some of the in-tree e2e tests to cloud-provider-gcp repo. Since we can always look at what we dropped in git and in older branches. I am happy to land this now to avoid rebasing this large of a PR again and again.

thanks everyone for the support and reviews!

/hold cancel

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label May 6, 2024
@k8s-ci-robot k8s-ci-robot merged commit 4d17d30 into kubernetes:master May 6, 2024
34 checks passed
SIG Node CI/Test Board automation moved this from PRs - Needs Reviewer to Done May 6, 2024
SIG Node PR Triage automation moved this from Needs Reviewer to Done May 6, 2024
@carlory
Copy link
Member

carlory commented May 7, 2024

Hi @dims After this PR is merged, is it time to remove k8s.io/legacy-cloud-providers from staging?

@dims
Copy link
Member Author

dims commented May 7, 2024

@carlory let's give it some time in case we find something really wrong, am sure there's quite a few things we'll have to go clean up and we'll need your help.

Copy link

@todaywasawesome todaywasawesome left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@sftim
Copy link
Contributor

sftim commented May 7, 2024

Changelog suggestion (untested for accuracy; this is based on my guesses as to what the current text means)

Removed the last remaining in-tree code for integrating with GCP as cloud provider (cloud controller manager),
and code fetching GCP credentials used during container image pulls.
Please use the external cloud provider and credential provider from https://github.com/kubernetes/cloud-provider-gcp instead.

ℹ️ It's possible the removed code was for kubectl credential exec plugins instead, I haven't checked.

@jbtk
Copy link
Contributor

jbtk commented May 13, 2024

Hi! This change broke the autoscaler tests https://testgrid.k8s.io/sig-autoscaling-cluster-autoscaler#gci-gce-autoscaling - I started looking at them just recently (just before they broke as there were some constantly failing ones) and it seems that they might have missed some required migration. Since KEP does not mention any required migration for tests could you have a look and try pointing out what these tests are missing? They are probably missing some switch to external provider, but I am not sure where it should be made. Could you link for example migration of other tests so that I can apply the same logic to these tests?

@carlory
Copy link
Member

carlory commented May 13, 2024

This PR switches the provider implement to NULLProvider, it means that the provider does not do anything useful, it's there only to provide valid --provider cmdline option to allow testing of CSI migration tests of kubernetes.io/pd volume plugin.

FYI:

@carlory
Copy link
Member

carlory commented May 13, 2024

e2e tests:

var _ = SIGDescribe("Cluster size autoscaling", framework.WithSlow(), func() {

Hi @jbtk, Do those tests must be run on a cluster with GCE, or can be run on a kind cluster? I saw that @pohly is raising a PR #123078. In that PR, it uses kind cluster to run some tests related to cluster autoscaler and DRA.

cc @dims

should we revert this PR or just skip e2e tests util it can use kind cluster?

@carlory
Copy link
Member

carlory commented May 13, 2024

Learnt from the release notes: we may need to install https://github.com/kubernetes/cloud-provider-gcp before running the ginkgo test on GCP.

@aojea
Copy link
Member

aojea commented May 13, 2024

Hi! This change broke the autoscaler tests https://testgrid.k8s.io/sig-autoscaling-cluster-autoscaler#gci-gce-autoscaling - I started looking at them just recently (just before they broke as there were some constantly failing ones) and it seems that they might have missed some required migration. Since KEP does not mention any required migration for tests could you have a look and try pointing out what these tests are missing? They are probably missing some switch to external provider, but I am not sure where it should be made. Could you link for example migration of other tests so that I can apply the same logic to these tests?

These tests that are cloud provider specific have to be moved to the corresponding cloud-provider repo @jbtk , please reach out to @seans3 and @BenTheElder

kubernetes/cloud-provider-gcp#683

Learnt from the release notes: we may need to install https://github.com/kubernetes/cloud-provider-gcp before running the ginkgo test on GCP.

@carlory these tests will not work from this repo since this change

@fedebongio
Copy link
Contributor

/triage accepted

@k8s-ci-robot k8s-ci-robot added triage/accepted Indicates an issue or PR is ready to be actively worked on. and removed needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. labels May 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/apiserver area/cloudprovider area/dependency Issues or PRs related to dependency changes area/e2e-test-framework Issues or PRs related to refactoring the kubernetes e2e test framework area/kubelet area/test cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. lgtm "Looks good to me", indicates that a PR is ready to be merged. priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. release-note Denotes a PR that will be considered when it comes time to generate release notes. sig/api-machinery Categorizes an issue or PR as relevant to SIG API Machinery. sig/apps Categorizes an issue or PR as relevant to SIG Apps. sig/auth Categorizes an issue or PR as relevant to SIG Auth. sig/autoscaling Categorizes an issue or PR as relevant to SIG Autoscaling. sig/cloud-provider Categorizes an issue or PR as relevant to SIG Cloud Provider. sig/instrumentation Categorizes an issue or PR as relevant to SIG Instrumentation. sig/network Categorizes an issue or PR as relevant to SIG Network. sig/node Categorizes an issue or PR as relevant to SIG Node. sig/scheduling Categorizes an issue or PR as relevant to SIG Scheduling. sig/storage Categorizes an issue or PR as relevant to SIG Storage. sig/testing Categorizes an issue or PR as relevant to SIG Testing. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. triage/accepted Indicates an issue or PR is ready to be actively worked on.
Projects
Status: Done
Status: Closed / Done
Development

Successfully merging this pull request may close these issues.

None yet