Sync node security groups to cache before node initialization #2427
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
What type of PR is this?
bug
Which issue does this PR fix:
#2426
What does this PR do / Why do we need it:
This PR fixes a bug in v1.13.0 where custom ENIs could not be created when an
ENIConfig
definition did not contain a security group ID. The expected behavior is that we fall back to the security group ID assigned to the primary ENI. The issue is that we were trying to create the ENI before the security group assigned to the primary ENI was synced to the EC2 metadata cache.If an issue # is not available please add repro steps and logs from IPAMD/CNI showing the issue:
N/A
Testing done on this change:
Manually verified that
ENIConfig
s with no security group work following this change. Integration test coverage is pending, as this PR is being fast-tracked to makev1.13.1
release. The manual test cases that were run are being added to custom networking test suite.Automation added to e2e:
Pending, will be added in a follow-up PR
Will this PR introduce any new dependencies?:
No
Will this break upgrades or downgrades. Has updating a running cluster been tested?:
No, Yes
Does this change require updates to the CNI daemonset config files to work?:
No
Does this PR introduce any user-facing change?:
Yes
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.