Merge pull request #3655 from aledbf/change-defaults

Remove flag sort-backends
This commit is contained in:
Kubernetes Prow Robot 2019-01-11 10:27:07 -08:00 committed by GitHub
commit 287c4e5b7e
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 3 additions and 27 deletions

View file

@ -114,9 +114,6 @@ different namespace than their own. May be used together with watch-namespace.`)
`Update the load-balancer status of Ingress objects when the controller shuts down. `Update the load-balancer status of Ingress objects when the controller shuts down.
Requires the update-status parameter.`) Requires the update-status parameter.`)
sortBackends = flags.Bool("sort-backends", false,
`Sort servers inside NGINX upstreams.`)
useNodeInternalIP = flags.Bool("report-node-internal-ip-address", false, useNodeInternalIP = flags.Bool("report-node-internal-ip-address", false,
`Set the load-balancer status of Ingress objects to internal Node addresses instead of external. `Set the load-balancer status of Ingress objects to internal Node addresses instead of external.
Requires the update-status parameter.`) Requires the update-status parameter.`)
@ -130,7 +127,7 @@ Requires the update-status parameter.`)
annotationsPrefix = flags.String("annotations-prefix", "nginx.ingress.kubernetes.io", annotationsPrefix = flags.String("annotations-prefix", "nginx.ingress.kubernetes.io",
`Prefix of the Ingress annotations specific to the NGINX controller.`) `Prefix of the Ingress annotations specific to the NGINX controller.`)
enableSSLChainCompletion = flags.Bool("enable-ssl-chain-completion", true, enableSSLChainCompletion = flags.Bool("enable-ssl-chain-completion", false,
`Autocomplete SSL certificate chains with missing intermediate CA certificates. `Autocomplete SSL certificate chains with missing intermediate CA certificates.
A valid certificate chain is required to enable OCSP stapling. Certificates A valid certificate chain is required to enable OCSP stapling. Certificates
uploaded to Kubernetes must have the "Authority Information Access" X.509 v3 uploaded to Kubernetes must have the "Authority Information Access" X.509 v3
@ -163,6 +160,8 @@ Feature backed by OpenResty Lua libraries. Requires that OCSP stapling is not en
`Disable support for catch-all Ingresses`) `Disable support for catch-all Ingresses`)
) )
flags.MarkDeprecated("sort-backends", "Feature removed because of the lua load balancer that removed the need of reloads for change in endpoints")
flag.Set("logtostderr", "true") flag.Set("logtostderr", "true")
flags.AddGoFlagSet(flag.CommandLine) flags.AddGoFlagSet(flag.CommandLine)
@ -248,7 +247,6 @@ Feature backed by OpenResty Lua libraries. Requires that OCSP stapling is not en
PublishStatusAddress: *publishStatusAddress, PublishStatusAddress: *publishStatusAddress,
ForceNamespaceIsolation: *forceIsolation, ForceNamespaceIsolation: *forceIsolation,
UpdateStatusOnShutdown: *updateStatusOnShutdown, UpdateStatusOnShutdown: *updateStatusOnShutdown,
SortBackends: *sortBackends,
UseNodeInternalIP: *useNodeInternalIP, UseNodeInternalIP: *useNodeInternalIP,
SyncRateLimit: *syncRateLimit, SyncRateLimit: *syncRateLimit,
DynamicCertificatesEnabled: *dynamicCertificatesEnabled, DynamicCertificatesEnabled: *dynamicCertificatesEnabled,

View file

@ -18,7 +18,6 @@ package controller
import ( import (
"fmt" "fmt"
"math/rand"
"sort" "sort"
"strconv" "strconv"
"strings" "strings"
@ -79,8 +78,6 @@ type Configuration struct {
ElectionID string ElectionID string
UpdateStatusOnShutdown bool UpdateStatusOnShutdown bool
SortBackends bool
ListenPorts *ngx_config.ListenPorts ListenPorts *ngx_config.ListenPorts
EnableSSLPassthrough bool EnableSSLPassthrough bool
@ -845,17 +842,6 @@ func (n *NGINXController) serviceEndpoints(svcKey, backendPort string) ([]ingres
klog.Warningf("Service %q does not have any active Endpoint.", svcKey) klog.Warningf("Service %q does not have any active Endpoint.", svcKey)
} }
if n.cfg.SortBackends {
sort.SliceStable(endps, func(i, j int) bool {
iName := endps[i].Address
jName := endps[j].Address
if iName != jName {
return iName < jName
}
return endps[i].Port < endps[j].Port
})
}
upstreams = append(upstreams, endps...) upstreams = append(upstreams, endps...)
break break
} }
@ -884,14 +870,6 @@ func (n *NGINXController) serviceEndpoints(svcKey, backendPort string) ([]ingres
return upstreams, nil return upstreams, nil
} }
if !n.cfg.SortBackends {
rand.Seed(time.Now().UnixNano())
for i := range upstreams {
j := rand.Intn(i + 1)
upstreams[i], upstreams[j] = upstreams[j], upstreams[i]
}
}
return upstreams, nil return upstreams, nil
} }