mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-02 00:07:50 +00:00
feat: graduate ResourceQuotaScopeSelectors to GA
This commit is contained in:
parent
bb55aa7c54
commit
5cb92260a6
@ -17,7 +17,6 @@ filegroup(
|
|||||||
"//pkg/api/persistentvolumeclaim:all-srcs",
|
"//pkg/api/persistentvolumeclaim:all-srcs",
|
||||||
"//pkg/api/pod:all-srcs",
|
"//pkg/api/pod:all-srcs",
|
||||||
"//pkg/api/podsecuritypolicy:all-srcs",
|
"//pkg/api/podsecuritypolicy:all-srcs",
|
||||||
"//pkg/api/resourcequota:all-srcs",
|
|
||||||
"//pkg/api/service:all-srcs",
|
"//pkg/api/service:all-srcs",
|
||||||
"//pkg/api/testapi:all-srcs",
|
"//pkg/api/testapi:all-srcs",
|
||||||
"//pkg/api/testing:all-srcs",
|
"//pkg/api/testing:all-srcs",
|
||||||
|
@ -1,40 +0,0 @@
|
|||||||
load("@io_bazel_rules_go//go:def.bzl", "go_library", "go_test")
|
|
||||||
|
|
||||||
go_library(
|
|
||||||
name = "go_default_library",
|
|
||||||
srcs = ["util.go"],
|
|
||||||
importpath = "k8s.io/kubernetes/pkg/api/resourcequota",
|
|
||||||
visibility = ["//visibility:public"],
|
|
||||||
deps = [
|
|
||||||
"//pkg/apis/core:go_default_library",
|
|
||||||
"//pkg/features:go_default_library",
|
|
||||||
"//staging/src/k8s.io/apiserver/pkg/util/feature:go_default_library",
|
|
||||||
],
|
|
||||||
)
|
|
||||||
|
|
||||||
go_test(
|
|
||||||
name = "go_default_test",
|
|
||||||
srcs = ["util_test.go"],
|
|
||||||
embed = [":go_default_library"],
|
|
||||||
deps = [
|
|
||||||
"//pkg/apis/core:go_default_library",
|
|
||||||
"//pkg/features:go_default_library",
|
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/util/diff:go_default_library",
|
|
||||||
"//staging/src/k8s.io/apiserver/pkg/util/feature:go_default_library",
|
|
||||||
"//staging/src/k8s.io/component-base/featuregate/testing:go_default_library",
|
|
||||||
],
|
|
||||||
)
|
|
||||||
|
|
||||||
filegroup(
|
|
||||||
name = "package-srcs",
|
|
||||||
srcs = glob(["**"]),
|
|
||||||
tags = ["automanaged"],
|
|
||||||
visibility = ["//visibility:private"],
|
|
||||||
)
|
|
||||||
|
|
||||||
filegroup(
|
|
||||||
name = "all-srcs",
|
|
||||||
srcs = [":package-srcs"],
|
|
||||||
tags = ["automanaged"],
|
|
||||||
visibility = ["//visibility:public"],
|
|
||||||
)
|
|
@ -1,41 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright 2019 The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package resourcequota
|
|
||||||
|
|
||||||
import (
|
|
||||||
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
|
||||||
api "k8s.io/kubernetes/pkg/apis/core"
|
|
||||||
"k8s.io/kubernetes/pkg/features"
|
|
||||||
)
|
|
||||||
|
|
||||||
// DropDisabledFields removes disabled fields from the ResourceQuota spec.
|
|
||||||
// This should be called from PrepareForCreate/PrepareForUpdate for all resources containing a ResourceQuota spec.
|
|
||||||
func DropDisabledFields(resSpec *api.ResourceQuotaSpec, oldResSpec *api.ResourceQuotaSpec) {
|
|
||||||
if !utilfeature.DefaultFeatureGate.Enabled(features.ResourceQuotaScopeSelectors) && !resourceQuotaScopeSelectorInUse(oldResSpec) {
|
|
||||||
resSpec.ScopeSelector = nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func resourceQuotaScopeSelectorInUse(oldResSpec *api.ResourceQuotaSpec) bool {
|
|
||||||
if oldResSpec == nil {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
if oldResSpec.ScopeSelector != nil {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
|
@ -1,117 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright 2019 The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package resourcequota
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"reflect"
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
"k8s.io/apimachinery/pkg/util/diff"
|
|
||||||
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
|
||||||
featuregatetesting "k8s.io/component-base/featuregate/testing"
|
|
||||||
api "k8s.io/kubernetes/pkg/apis/core"
|
|
||||||
"k8s.io/kubernetes/pkg/features"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestDropDisabledFields(t *testing.T) {
|
|
||||||
rqWithScopeSelector := func() *api.ResourceQuota {
|
|
||||||
return &api.ResourceQuota{Spec: api.ResourceQuotaSpec{Scopes: []api.ResourceQuotaScope{"scope-1"}, ScopeSelector: &api.ScopeSelector{
|
|
||||||
MatchExpressions: []api.ScopedResourceSelectorRequirement{
|
|
||||||
{
|
|
||||||
ScopeName: api.ResourceQuotaScopePriorityClass,
|
|
||||||
Operator: api.ScopeSelectorOpIn,
|
|
||||||
Values: []string{"scope-1"},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}}}
|
|
||||||
}
|
|
||||||
rqWithoutScopeSelector := func() *api.ResourceQuota {
|
|
||||||
return &api.ResourceQuota{Spec: api.ResourceQuotaSpec{Scopes: []api.ResourceQuotaScope{"scope-1"}, ScopeSelector: nil}}
|
|
||||||
}
|
|
||||||
|
|
||||||
rqInfo := []struct {
|
|
||||||
description string
|
|
||||||
hasScopeSelector bool
|
|
||||||
resourceQuota func() *api.ResourceQuota
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
description: "ResourceQuota without Scopes Selector",
|
|
||||||
hasScopeSelector: false,
|
|
||||||
resourceQuota: rqWithoutScopeSelector,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "ResourceQuota with Scope Selector",
|
|
||||||
hasScopeSelector: true,
|
|
||||||
resourceQuota: rqWithScopeSelector,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "is nil",
|
|
||||||
hasScopeSelector: false,
|
|
||||||
resourceQuota: func() *api.ResourceQuota { return nil },
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, enabled := range []bool{true, false} {
|
|
||||||
for _, oldRQInfo := range rqInfo {
|
|
||||||
for _, newRQInfo := range rqInfo {
|
|
||||||
oldRQHasSelector, oldrq := oldRQInfo.hasScopeSelector, oldRQInfo.resourceQuota()
|
|
||||||
newRQHasSelector, newrq := newRQInfo.hasScopeSelector, newRQInfo.resourceQuota()
|
|
||||||
if newrq == nil {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
t.Run(fmt.Sprintf("feature enabled=%v, old ResourceQuota %v, new ResourceQuota %v", enabled, oldRQInfo.description, newRQInfo.description), func(t *testing.T) {
|
|
||||||
defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.ResourceQuotaScopeSelectors, enabled)()
|
|
||||||
|
|
||||||
var oldRQSpec *api.ResourceQuotaSpec
|
|
||||||
if oldrq != nil {
|
|
||||||
oldRQSpec = &oldrq.Spec
|
|
||||||
}
|
|
||||||
DropDisabledFields(&newrq.Spec, oldRQSpec)
|
|
||||||
|
|
||||||
// old ResourceQuota should never be changed
|
|
||||||
if !reflect.DeepEqual(oldrq, oldRQInfo.resourceQuota()) {
|
|
||||||
t.Errorf("old ResourceQuota changed: %v", diff.ObjectReflectDiff(oldrq, oldRQInfo.resourceQuota()))
|
|
||||||
}
|
|
||||||
|
|
||||||
switch {
|
|
||||||
case enabled || oldRQHasSelector:
|
|
||||||
// new ResourceQuota should not be changed if the feature is enabled, or if the old ResourceQuota had ScopeSelector
|
|
||||||
if !reflect.DeepEqual(newrq, newRQInfo.resourceQuota()) {
|
|
||||||
t.Errorf("new ResourceQuota changed: %v", diff.ObjectReflectDiff(newrq, newRQInfo.resourceQuota()))
|
|
||||||
}
|
|
||||||
case newRQHasSelector:
|
|
||||||
// new ResourceQuota should be changed
|
|
||||||
if reflect.DeepEqual(newrq, newRQInfo.resourceQuota()) {
|
|
||||||
t.Errorf("new ResourceQuota was not changed")
|
|
||||||
}
|
|
||||||
// new ResourceQuota should not have ScopeSelector
|
|
||||||
if !reflect.DeepEqual(newrq, rqWithoutScopeSelector()) {
|
|
||||||
t.Errorf("new ResourceQuota had ScopeSelector: %v", diff.ObjectReflectDiff(newrq, rqWithoutScopeSelector()))
|
|
||||||
}
|
|
||||||
default:
|
|
||||||
// new ResourceQuota should not need to be changed
|
|
||||||
if !reflect.DeepEqual(newrq, newRQInfo.resourceQuota()) {
|
|
||||||
t.Errorf("new ResourceQuota changed: %v", diff.ObjectReflectDiff(newrq, newRQInfo.resourceQuota()))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -308,7 +308,7 @@ const (
|
|||||||
|
|
||||||
// owner: @vikaschoudhary16
|
// owner: @vikaschoudhary16
|
||||||
// beta: v1.12
|
// beta: v1.12
|
||||||
//
|
// ga: v1.17
|
||||||
//
|
//
|
||||||
// Enable resource quota scope selectors
|
// Enable resource quota scope selectors
|
||||||
ResourceQuotaScopeSelectors featuregate.Feature = "ResourceQuotaScopeSelectors"
|
ResourceQuotaScopeSelectors featuregate.Feature = "ResourceQuotaScopeSelectors"
|
||||||
@ -556,7 +556,7 @@ var defaultKubernetesFeatureGates = map[featuregate.Feature]featuregate.FeatureS
|
|||||||
VolumeSubpath: {Default: true, PreRelease: featuregate.GA},
|
VolumeSubpath: {Default: true, PreRelease: featuregate.GA},
|
||||||
BalanceAttachedNodeVolumes: {Default: false, PreRelease: featuregate.Alpha},
|
BalanceAttachedNodeVolumes: {Default: false, PreRelease: featuregate.Alpha},
|
||||||
VolumeSubpathEnvExpansion: {Default: true, PreRelease: featuregate.GA, LockToDefault: true}, // remove in 1.19,
|
VolumeSubpathEnvExpansion: {Default: true, PreRelease: featuregate.GA, LockToDefault: true}, // remove in 1.19,
|
||||||
ResourceQuotaScopeSelectors: {Default: true, PreRelease: featuregate.Beta},
|
ResourceQuotaScopeSelectors: {Default: true, PreRelease: featuregate.GA, LockToDefault: true}, // remove in 1.18
|
||||||
CSIBlockVolume: {Default: true, PreRelease: featuregate.Beta},
|
CSIBlockVolume: {Default: true, PreRelease: featuregate.Beta},
|
||||||
CSIInlineVolume: {Default: true, PreRelease: featuregate.Beta},
|
CSIInlineVolume: {Default: true, PreRelease: featuregate.Beta},
|
||||||
RuntimeClass: {Default: true, PreRelease: featuregate.Beta},
|
RuntimeClass: {Default: true, PreRelease: featuregate.Beta},
|
||||||
|
@ -15,7 +15,6 @@ go_library(
|
|||||||
importpath = "k8s.io/kubernetes/pkg/registry/core/resourcequota",
|
importpath = "k8s.io/kubernetes/pkg/registry/core/resourcequota",
|
||||||
deps = [
|
deps = [
|
||||||
"//pkg/api/legacyscheme:go_default_library",
|
"//pkg/api/legacyscheme:go_default_library",
|
||||||
"//pkg/api/resourcequota:go_default_library",
|
|
||||||
"//pkg/apis/core:go_default_library",
|
"//pkg/apis/core:go_default_library",
|
||||||
"//pkg/apis/core/validation:go_default_library",
|
"//pkg/apis/core/validation:go_default_library",
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/runtime:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/runtime:go_default_library",
|
||||||
|
@ -23,7 +23,6 @@ import (
|
|||||||
"k8s.io/apimachinery/pkg/util/validation/field"
|
"k8s.io/apimachinery/pkg/util/validation/field"
|
||||||
"k8s.io/apiserver/pkg/storage/names"
|
"k8s.io/apiserver/pkg/storage/names"
|
||||||
"k8s.io/kubernetes/pkg/api/legacyscheme"
|
"k8s.io/kubernetes/pkg/api/legacyscheme"
|
||||||
resourcequotautil "k8s.io/kubernetes/pkg/api/resourcequota"
|
|
||||||
api "k8s.io/kubernetes/pkg/apis/core"
|
api "k8s.io/kubernetes/pkg/apis/core"
|
||||||
"k8s.io/kubernetes/pkg/apis/core/validation"
|
"k8s.io/kubernetes/pkg/apis/core/validation"
|
||||||
)
|
)
|
||||||
@ -47,7 +46,6 @@ func (resourcequotaStrategy) NamespaceScoped() bool {
|
|||||||
func (resourcequotaStrategy) PrepareForCreate(ctx context.Context, obj runtime.Object) {
|
func (resourcequotaStrategy) PrepareForCreate(ctx context.Context, obj runtime.Object) {
|
||||||
resourcequota := obj.(*api.ResourceQuota)
|
resourcequota := obj.(*api.ResourceQuota)
|
||||||
resourcequota.Status = api.ResourceQuotaStatus{}
|
resourcequota.Status = api.ResourceQuotaStatus{}
|
||||||
resourcequotautil.DropDisabledFields(&resourcequota.Spec, nil)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// PrepareForUpdate clears fields that are not allowed to be set by end users on update.
|
// PrepareForUpdate clears fields that are not allowed to be set by end users on update.
|
||||||
@ -55,7 +53,6 @@ func (resourcequotaStrategy) PrepareForUpdate(ctx context.Context, obj, old runt
|
|||||||
newResourcequota := obj.(*api.ResourceQuota)
|
newResourcequota := obj.(*api.ResourceQuota)
|
||||||
oldResourcequota := old.(*api.ResourceQuota)
|
oldResourcequota := old.(*api.ResourceQuota)
|
||||||
newResourcequota.Status = oldResourcequota.Status
|
newResourcequota.Status = oldResourcequota.Status
|
||||||
resourcequotautil.DropDisabledFields(&newResourcequota.Spec, &oldResourcequota.Spec)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Validate validates a new resourcequota.
|
// Validate validates a new resourcequota.
|
||||||
|
@ -35,12 +35,10 @@ go_library(
|
|||||||
deps = [
|
deps = [
|
||||||
"//pkg/apis/core:go_default_library",
|
"//pkg/apis/core:go_default_library",
|
||||||
"//pkg/apis/scheduling:go_default_library",
|
"//pkg/apis/scheduling:go_default_library",
|
||||||
"//pkg/apis/scheduling/v1:go_default_library",
|
|
||||||
"//pkg/features:go_default_library",
|
"//pkg/features:go_default_library",
|
||||||
"//staging/src/k8s.io/api/core/v1:go_default_library",
|
"//staging/src/k8s.io/api/core/v1:go_default_library",
|
||||||
"//staging/src/k8s.io/api/scheduling/v1:go_default_library",
|
"//staging/src/k8s.io/api/scheduling/v1:go_default_library",
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/api/errors:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/api/errors:go_default_library",
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/labels:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/labels:go_default_library",
|
||||||
"//staging/src/k8s.io/apiserver/pkg/admission:go_default_library",
|
"//staging/src/k8s.io/apiserver/pkg/admission:go_default_library",
|
||||||
"//staging/src/k8s.io/apiserver/pkg/admission/initializer:go_default_library",
|
"//staging/src/k8s.io/apiserver/pkg/admission/initializer:go_default_library",
|
||||||
|
@ -24,7 +24,6 @@ import (
|
|||||||
apiv1 "k8s.io/api/core/v1"
|
apiv1 "k8s.io/api/core/v1"
|
||||||
schedulingv1 "k8s.io/api/scheduling/v1"
|
schedulingv1 "k8s.io/api/scheduling/v1"
|
||||||
"k8s.io/apimachinery/pkg/api/errors"
|
"k8s.io/apimachinery/pkg/api/errors"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
"k8s.io/apiserver/pkg/admission"
|
"k8s.io/apiserver/pkg/admission"
|
||||||
genericadmissioninitializers "k8s.io/apiserver/pkg/admission/initializer"
|
genericadmissioninitializers "k8s.io/apiserver/pkg/admission/initializer"
|
||||||
@ -35,7 +34,6 @@ import (
|
|||||||
"k8s.io/kubernetes/pkg/apis/core"
|
"k8s.io/kubernetes/pkg/apis/core"
|
||||||
api "k8s.io/kubernetes/pkg/apis/core"
|
api "k8s.io/kubernetes/pkg/apis/core"
|
||||||
"k8s.io/kubernetes/pkg/apis/scheduling"
|
"k8s.io/kubernetes/pkg/apis/scheduling"
|
||||||
schedulingapiv1 "k8s.io/kubernetes/pkg/apis/scheduling/v1"
|
|
||||||
"k8s.io/kubernetes/pkg/features"
|
"k8s.io/kubernetes/pkg/features"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -54,10 +52,9 @@ func Register(plugins *admission.Plugins) {
|
|||||||
// Plugin is an implementation of admission.Interface.
|
// Plugin is an implementation of admission.Interface.
|
||||||
type Plugin struct {
|
type Plugin struct {
|
||||||
*admission.Handler
|
*admission.Handler
|
||||||
client kubernetes.Interface
|
client kubernetes.Interface
|
||||||
lister schedulingv1listers.PriorityClassLister
|
lister schedulingv1listers.PriorityClassLister
|
||||||
resourceQuotaFeatureGateEnabled bool
|
nonPreemptingPriority bool
|
||||||
nonPreemptingPriority bool
|
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ admission.MutationInterface = &Plugin{}
|
var _ admission.MutationInterface = &Plugin{}
|
||||||
@ -87,7 +84,6 @@ func (p *Plugin) ValidateInitialization() error {
|
|||||||
// InspectFeatureGates allows setting bools without taking a dep on a global variable
|
// InspectFeatureGates allows setting bools without taking a dep on a global variable
|
||||||
func (p *Plugin) InspectFeatureGates(featureGates featuregate.FeatureGate) {
|
func (p *Plugin) InspectFeatureGates(featureGates featuregate.FeatureGate) {
|
||||||
p.nonPreemptingPriority = featureGates.Enabled(features.NonPreemptingPriority)
|
p.nonPreemptingPriority = featureGates.Enabled(features.NonPreemptingPriority)
|
||||||
p.resourceQuotaFeatureGateEnabled = featureGates.Enabled(features.ResourceQuotaScopeSelectors)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetExternalKubeClientSet implements the WantsInternalKubeClientSet interface.
|
// SetExternalKubeClientSet implements the WantsInternalKubeClientSet interface.
|
||||||
@ -147,20 +143,6 @@ func (p *Plugin) Validate(ctx context.Context, a admission.Attributes, o admissi
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// priorityClassPermittedInNamespace returns true if we allow the given priority class name in the
|
|
||||||
// given namespace. It currently checks that system priorities are created only in the system namespace.
|
|
||||||
func priorityClassPermittedInNamespace(priorityClassName string, namespace string) bool {
|
|
||||||
// Only allow system priorities in the system namespace. This is to prevent abuse or incorrect
|
|
||||||
// usage of these priorities. Pods created at these priorities could preempt system critical
|
|
||||||
// components.
|
|
||||||
for _, spc := range schedulingapiv1.SystemPriorityClasses() {
|
|
||||||
if spc.Name == priorityClassName && namespace != metav1.NamespaceSystem {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
|
|
||||||
// admitPod makes sure a new pod does not set spec.Priority field. It also makes sure that the PriorityClassName exists if it is provided and resolves the pod priority from the PriorityClassName.
|
// admitPod makes sure a new pod does not set spec.Priority field. It also makes sure that the PriorityClassName exists if it is provided and resolves the pod priority from the PriorityClassName.
|
||||||
func (p *Plugin) admitPod(a admission.Attributes) error {
|
func (p *Plugin) admitPod(a admission.Attributes) error {
|
||||||
operation := a.GetOperation()
|
operation := a.GetOperation()
|
||||||
@ -196,15 +178,6 @@ func (p *Plugin) admitPod(a admission.Attributes) error {
|
|||||||
}
|
}
|
||||||
pod.Spec.PriorityClassName = pcName
|
pod.Spec.PriorityClassName = pcName
|
||||||
} else {
|
} else {
|
||||||
pcName := pod.Spec.PriorityClassName
|
|
||||||
// If ResourceQuotaScopeSelectors is enabled, we should let pods with critical priorityClass to be created
|
|
||||||
// any namespace where administrator wants it to be created.
|
|
||||||
if !p.resourceQuotaFeatureGateEnabled {
|
|
||||||
if !priorityClassPermittedInNamespace(pcName, a.GetNamespace()) {
|
|
||||||
return admission.NewForbidden(a, fmt.Errorf("pods with %v priorityClass is not permitted in %v namespace", pcName, a.GetNamespace()))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Try resolving the priority class name.
|
// Try resolving the priority class name.
|
||||||
pc, err := p.lister.Get(pod.Spec.PriorityClassName)
|
pc, err := p.lister.Get(pod.Spec.PriorityClassName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -682,7 +682,6 @@ func TestPodAdmission(t *testing.T) {
|
|||||||
for _, test := range tests {
|
for _, test := range tests {
|
||||||
klog.V(4).Infof("starting test %q", test.name)
|
klog.V(4).Infof("starting test %q", test.name)
|
||||||
ctrl := NewPlugin()
|
ctrl := NewPlugin()
|
||||||
ctrl.resourceQuotaFeatureGateEnabled = true
|
|
||||||
ctrl.nonPreemptingPriority = true
|
ctrl.nonPreemptingPriority = true
|
||||||
// Add existing priority classes.
|
// Add existing priority classes.
|
||||||
if err := addPriorityClasses(ctrl, test.existingClasses); err != nil {
|
if err := addPriorityClasses(ctrl, test.existingClasses); err != nil {
|
||||||
|
Loading…
Reference in New Issue
Block a user