mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-23 19:56:01 +00:00
Merge pull request #130595 from tkashem/omit-admission
KEP-3926: skip admission validation for unsafe delete
This commit is contained in:
commit
61529d54f2
@ -107,8 +107,14 @@ func (d *corruptObjectDeleter) Delete(ctx context.Context, name string, deleteVa
|
||||
klog.FromContext(ctx).V(1).Info("Going to perform unsafe object deletion", "object", klog.KRef(genericapirequest.NamespaceValue(ctx), name))
|
||||
out := d.store.NewFunc()
|
||||
storageOpts := storage.DeleteOptions{IgnoreStoreReadError: true}
|
||||
// dropping preconditions, and keeping the admission
|
||||
if err := storageBackend.Delete(ctx, key, out, nil, storage.ValidateObjectFunc(deleteValidation), nil, storageOpts); err != nil {
|
||||
// we don't have the old object in the cache, neither can it be
|
||||
// retrieved from the storage and decoded into an object
|
||||
// successfully, so we do the following:
|
||||
// a) skip preconditions check
|
||||
// b) skip admission validation, rest.ValidateAllObjectFunc will "admit everything"
|
||||
var nilPreconditions *storage.Preconditions = nil
|
||||
var nilCachedExistingObject runtime.Object = nil
|
||||
if err := storageBackend.Delete(ctx, key, out, nilPreconditions, rest.ValidateAllObjectFunc, nilCachedExistingObject, storageOpts); err != nil {
|
||||
if storage.IsNotFound(err) {
|
||||
// the DELETE succeeded, but we don't have the object since it's
|
||||
// not retrievable from the storage, so we send a nil object
|
||||
|
@ -267,6 +267,50 @@ func TestUnsafeDeleteWithUnexpectedError(t *testing.T) {
|
||||
}
|
||||
}
|
||||
|
||||
func TestUnsafeDeleteWithAdmissionShouldBeSkipped(t *testing.T) {
|
||||
ctx := genericapirequest.WithNamespace(genericapirequest.NewContext(), "test")
|
||||
destroyFunc, registry := NewTestGenericStoreRegistry(t)
|
||||
defer destroyFunc()
|
||||
|
||||
// a) create the target object
|
||||
object := &example.Pod{
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "foo"},
|
||||
Spec: example.PodSpec{NodeName: "machine"},
|
||||
}
|
||||
_, err := registry.Create(ctx, object, rest.ValidateAllObjectFunc, &metav1.CreateOptions{})
|
||||
if err != nil {
|
||||
t.Fatalf("Unexpected error: %v", err)
|
||||
}
|
||||
|
||||
// b) wrap the storage layer to return corrupt object error
|
||||
registry.Storage.Storage = &corruptStorage{
|
||||
Interface: registry.Storage.Storage,
|
||||
err: storage.NewCorruptObjError("key", fmt.Errorf("untransformable")),
|
||||
}
|
||||
|
||||
// c) set up a corrupt object deleter for the registry
|
||||
deleter := NewCorruptObjectDeleter(registry)
|
||||
|
||||
// d) try unsafe delete, but pass a validation that always fails
|
||||
var admissionInvoked int
|
||||
_, deleted, err := deleter.Delete(ctx, object.Name, func(_ context.Context, _ runtime.Object) error {
|
||||
admissionInvoked++
|
||||
return fmt.Errorf("admission was not skipped")
|
||||
}, &metav1.DeleteOptions{
|
||||
IgnoreStoreReadErrorWithClusterBreakingPotential: ptr.To[bool](true),
|
||||
})
|
||||
|
||||
if err != nil {
|
||||
t.Errorf("Unexpected error from Delete: %v", err)
|
||||
}
|
||||
if want, got := true, deleted; want != got {
|
||||
t.Errorf("Expected deleted: %t, but got: %t", want, got)
|
||||
}
|
||||
if want, got := 0, admissionInvoked; want != got {
|
||||
t.Errorf("Expected admission to be invoked %d time(s), but got: %d", want, got)
|
||||
}
|
||||
}
|
||||
|
||||
type corruptStorage struct {
|
||||
storage.Interface
|
||||
err error
|
||||
|
Loading…
Reference in New Issue
Block a user