1
0
Fork 0
mirror of https://github.com/kubernetes-sigs/node-feature-discovery.git synced 2024-12-14 11:57:51 +00:00
Commit graph

1173 commits

Author SHA1 Message Date
Kubernetes Prow Robot
19ee3691c9
Merge pull request #730 from marquiz/devel/buildx
cloudbuild.yaml: set HOME to /root
2022-01-20 09:29:36 -08:00
Markus Lehtonen
38d1f1b15d cloudbuild.yaml: set HOME to /root
As per
https://github.com/kubernetes/test-infra/blob/master/config/jobs/image-pushing/README.md
we need that for buildx.
2022-01-20 19:07:25 +02:00
Kubernetes Prow Robot
a00970db9c
Merge pull request #728 from zvonkok/mulit-build-fix
Adding missing target dep
2022-01-20 08:17:51 -08:00
Zvonko Kaiser
8414fe8c07 Adding missing target dep 2022-01-20 17:01:54 +01:00
Kubernetes Prow Robot
8ea6b765c8
Merge pull request #698 from zvonkok/multi-arch
Multi ARCH build amd64, arm64
2022-01-20 07:21:52 -08:00
Zvonko Kaiser
c69e47a27a Iniital multi arch build 2022-01-20 15:41:08 +01:00
Dipto Chakrabarty
755294184c
Fix GoLinter Issues in the files (#711)
* fix linter issues for few files

* fix linter issue of exported const Name should have comment or be unexported

* fix name lint issue and resolve lints

* add changes to comments
2022-01-18 23:12:06 -08:00
Kubernetes Prow Robot
3df3156dee
Merge pull request #721 from marquiz/devel/release-process
github: re-organize the release process slightly
2022-01-18 06:23:08 -08:00
Kubernetes Prow Robot
caf7c33d1d
Merge pull request #725 from marquiz/devel/deps
go.mod: bump kubernetes to v1.23.1
2022-01-12 07:10:37 -08:00
Markus Lehtonen
d1bd603052 go.mod: bump kubernetes to v1.23.1
Update k/k to the latest release and sync all related dependencies.

Align e2e-tests with changes in the k8s e2e test framework.
2022-01-12 16:43:21 +02:00
Kubernetes Prow Robot
a1afaea417
Merge pull request #724 from marquiz/devel/gh-pages
scripts/update-gh-pages: fix symlink to stable version
2022-01-11 13:41:15 -08:00
Markus Lehtonen
2ac10d854f scripts/update-gh-pages: fix symlink to stable version
Fix the sorting magic of release directories. Correctly sort according
to the version number.
2022-01-11 23:28:05 +02:00
Markus Lehtonen
1a6461ff23 github: re-organize the release process slightly
Reorganize the steps in the release process slightly to make it more
consistent and streamlined. Also update the kubernetes-dev mailing list
address.
2022-01-11 21:43:09 +02:00
Kubernetes Prow Robot
12126a3eea
Merge pull request #720 from marquiz/devel/readme
README: bump to v0.10.0
2022-01-11 11:33:15 -08:00
Markus Lehtonen
1d817babac README: bump to v0.10.0 2022-01-11 21:26:25 +02:00
Kubernetes Prow Robot
cc08c39902
Merge pull request #715 from marquiz/documentation/features
docs: small fix in block and net features in customization guide
2022-01-11 06:41:17 -08:00
Kubernetes Prow Robot
a1cb431503
Merge pull request #705 from marquiz/devel/iommu-dev-attributes
source/pci: add iommu_group/type attribute
2022-01-11 05:19:17 -08:00
Markus Lehtonen
58a1b04b2f docs: small fix in block and net features in customization guide
In the list of available features, list 'name' separately as it's not
from a sysfs file like the other attributes.
2022-01-11 12:01:55 +02:00
Markus Lehtonen
152f3531fe source/pci: add iommu_group/type attribute
Add "iommu_group/type" to the list of PCI device attributes that are
discovered. The value is the raw value from sysfs (i.e DMA, DMA-FQ or
identity).

No built-in (automatic) labels are generated based on this, but, the
attribute is available for custom label rules to use. Examples of custom
rules:

  - name: "iommu enabled rule"
    labels:
      iommu.enabled: "true"
    matchFeatures:
      - feature: pci.device
        matchExpressions:
          "iommu_group/type": {op: NotIn, value: ["unknown"]}

  - name: "iommu passthrough rule"
    labels:
      iommu.passthrough: "true"
    matchFeatures:
      - feature: pci.device
        matchExpressions:
          "iommu_group/type": {op: In, value: ["identity"]}
2022-01-11 11:54:54 +02:00
Kubernetes Prow Robot
df9d4e2f24
Merge pull request #714 from marquiz/documentation/tls
docs: small tinkering on the TLS documentation
2022-01-10 11:58:25 -08:00
Markus Lehtonen
fc25bf2dc2 docs: small tinkering on the TLS documentation
Add cross-referencing links to the helm deployment and configuration
sections. Use correct names for the tls related helm options
(tls.enabled and tls.certManager).
2022-01-10 19:12:05 +02:00
Kubernetes Prow Robot
5a2e0ce5a6
Merge pull request #704 from marquiz/documentation/customization-guide
docs: add customization guide
2022-01-10 08:17:13 -08:00
Kubernetes Prow Robot
7c90d2bff4
Merge pull request #713 from dbaker-rh/tls-docs
Initial bash at new TLS docs
2022-01-10 04:27:12 -08:00
Dave Baker
9215d171c5 Initial bash at new TLS docs 2022-01-10 11:40:43 +00:00
Markus Lehtonen
302aa5a82a docs: add customization guide
Add a separate customization guide. Move documentation of the custom and
local sources there. Also, cover the new NodeFeatureRules custom
resource and the new expression-based label rule format.

This patch also simplifies the "Feature labels" page, describing
built-in labels. Reformat the tables describing feature labels.
2022-01-08 09:56:05 +02:00
Kubernetes Prow Robot
1567900238
Merge pull request #677 from marquiz/devel/iommu-deprecation
source/iommu: deprecate and disable by default
2022-01-05 10:05:48 -08:00
Kubernetes Prow Robot
885a061f12
Merge pull request #701 from marquiz/devel/deployment-custom-rule
deployment: use new custom rule format in sample configs
2022-01-05 09:53:48 -08:00
Kubernetes Prow Robot
ffb6a294e5
Merge pull request #699 from marquiz/devel/helm-featurerule-controller
deployment/helm: disable nfr controller for parallel instances
2022-01-05 06:08:34 -08:00
Markus Lehtonen
edb3e6824c deployment/helm: disable nfr controller for parallel instances
Change the helm chart so that the NodeFeatureRule controller will be
disabled for other than the default deployment (i.e. all deployments
where master.instance is non-empty), unless explicitly set to true. With
this we try to ensure that there is only on controller instance for the
CR, avoiding contention and conflicts.
2022-01-04 21:25:02 +02:00
Kubernetes Prow Robot
dccae8744f
Merge pull request #706 from marquiz/devel/helm-cleanup
deployment/helm: refactor nfd-master rbac parameters
2022-01-04 06:58:52 -08:00
Markus Lehtonen
812073a025 deployment/helm: refactor nfd-master rbac parameters
Move top-level serviceAccount and rbac fields under master, making the
Helm chart more coherent.

Also, drop unused rbac.serviceAccountName and
rbac.serviceAccountAnnotations from values.yaml.
2022-01-04 16:30:11 +02:00
Kubernetes Prow Robot
ec15f4f24c
Merge pull request #712 from dbaker-rh/helm-certs
Enable TLS and cert-manager created certs for helm chart
2022-01-04 06:24:52 -08:00
Kubernetes Prow Robot
4f85c0a24d
Merge pull request #710 from dbaker-rh/cert-manager
Fix kustomization template to work with cert-manager
2022-01-04 05:32:54 -08:00
Dave Baker
3e6ae535c7 Fix kustomization template to work with cert-manager 2022-01-04 13:19:09 +00:00
Dave Baker
b0834d7862 Enable TLS and cert-manager created certs for helm chart 2022-01-04 12:27:02 +00:00
Kubernetes Prow Robot
f3b714adc4
Merge pull request #709 from bart0sh/PR001-fix-probe-check
Fix readiness and liveness checks
2021-12-23 03:44:38 -08:00
Eduard Bartosh
c7bd2d9d8d Fix readiness and liveness checks
Rename grpc-health-probe -> grpc_health_probe as
our deployment yamls and its own documentation
refer to it by this name.

This should fix broken NFD deployments.

Signed-off-by: Eduard Bartosh <eduard.bartosh@intel.com>
2021-12-23 13:28:04 +02:00
Kubernetes Prow Robot
7a7b01216e
Merge pull request #707 from ArangoGutierrez/devel/multi_arch_grpc
Dockerfile: build grpc_health-probe from source
2021-12-22 06:31:35 -08:00
Carlos Eduardo Arango Gutierrez
bc88c91109
Dockerfile: build grpc_health-probe from source
Current grpc-health-probe functionality is pulling a binary, hard coded
to amd64, both unsecure and only works for 1 arch, preparing to build
NFD for multiple Arch's require we build the health probe from source,
that way we get rid of the unsecure binary pull, and guarantee a proper
arch build for the grpc-health-probe

Signed-off-by: Carlos Eduardo Arango Gutierrez <carangog@redhat.com>
2021-12-22 09:18:13 -05:00
Markus Lehtonen
7e8f96e7e1 deployment: drop legacy custom rules from the worker conf sample
They are still supported but no need to advertise them.
2021-12-22 09:21:26 +02:00
Markus Lehtonen
468fa2b817 deployment: use new rule format in sample custom rule overlay 2021-12-22 09:21:26 +02:00
Markus Lehtonen
838a375f85 source/iommu: deprecate and disable by default
Deprecate the iommu source and disable it by default.
2021-12-20 10:21:29 +02:00
Markus Lehtonen
a6eddbab4f source: rename TestSource to SupplementalSource
Just widen the scope in terms of naming, to cover deprecated and/or
experimental sources too, for example.
2021-12-20 10:05:00 +02:00
Kubernetes Prow Robot
09c1ff86ca
Merge pull request #697 from marquiz/devel/custom-label-prefix
nfd-worker: drop 'custom-' prefix from matchFeatures custom rules
2021-12-13 09:03:59 -08:00
Kubernetes Prow Robot
f550b6eb91
Merge pull request #695 from marquiz/devel/local-label-names
source/local: don't prefix label names with the filename
2021-12-13 08:48:00 -08:00
Markus Lehtonen
b89429a4db source/local: don't prefix label names with the filename
Implicitly injecting the filename of the hook/featurefile into the name
of the label is confusing, counter-intuitive and unnecessarily complex
to understand. It's much clearer to advertise features and labels as
presented in the feature file / output of the hook.

NOTE: this breaks backwards compatibility with usage scenarios that rely
on prefixing the label with the filename.
2021-12-13 09:00:59 +02:00
Kubernetes Prow Robot
2db16d30c5
Merge pull request #696 from marquiz/devel/local-logging
source/local: log features per each hook and feature file
2021-12-11 10:13:58 -08:00
Kubernetes Prow Robot
73597f4cc5
Merge pull request #694 from marquiz/fixes/usb
source/usb: fix fallback to default label format
2021-12-10 05:49:10 -08:00
Markus Lehtonen
19e0f77cb5 source/usb: fix fallback to default label format 2021-12-10 08:32:41 +02:00
Markus Lehtonen
bf01875368 nfd-worker: drop 'custom-' prefix from matchFeatures custom rules
Do not prefix label names from the new matchFeatures/matchAny custom
rules with "custom-". We want to have the same result (set of labels)
from a rule independent of whether it has been specified in worker
config or in a NodeFeatureRule CRs. Legacy matchOn rules (not available
in NodeFeatureRule CRs) are intact, i.e. still prefixed, in order to
retain backwards compatibility.
2021-12-09 21:52:40 +02:00