Merge pull request #130595 from tkashem/omit-admission

KEP-3926: skip admission validation for unsafe delete
This commit is contained in:
Kubernetes Prow Robot 2025-03-17 09:35:49 -07:00 committed by GitHub
commit 61529d54f2
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 52 additions and 2 deletions

View File

@ -107,8 +107,14 @@ func (d *corruptObjectDeleter) Delete(ctx context.Context, name string, deleteVa
klog.FromContext(ctx).V(1).Info("Going to perform unsafe object deletion", "object", klog.KRef(genericapirequest.NamespaceValue(ctx), name))
out := d.store.NewFunc()
storageOpts := storage.DeleteOptions{IgnoreStoreReadError: true}
// dropping preconditions, and keeping the admission
if err := storageBackend.Delete(ctx, key, out, nil, storage.ValidateObjectFunc(deleteValidation), nil, storageOpts); err != nil {
// we don't have the old object in the cache, neither can it be
// retrieved from the storage and decoded into an object
// successfully, so we do the following:
// a) skip preconditions check
// b) skip admission validation, rest.ValidateAllObjectFunc will "admit everything"
var nilPreconditions *storage.Preconditions = nil
var nilCachedExistingObject runtime.Object = nil
if err := storageBackend.Delete(ctx, key, out, nilPreconditions, rest.ValidateAllObjectFunc, nilCachedExistingObject, storageOpts); err != nil {
if storage.IsNotFound(err) {
// the DELETE succeeded, but we don't have the object since it's
// not retrievable from the storage, so we send a nil object

View File

@ -267,6 +267,50 @@ func TestUnsafeDeleteWithUnexpectedError(t *testing.T) {
}
}
func TestUnsafeDeleteWithAdmissionShouldBeSkipped(t *testing.T) {
ctx := genericapirequest.WithNamespace(genericapirequest.NewContext(), "test")
destroyFunc, registry := NewTestGenericStoreRegistry(t)
defer destroyFunc()
// a) create the target object
object := &example.Pod{
ObjectMeta: metav1.ObjectMeta{Name: "foo"},
Spec: example.PodSpec{NodeName: "machine"},
}
_, err := registry.Create(ctx, object, rest.ValidateAllObjectFunc, &metav1.CreateOptions{})
if err != nil {
t.Fatalf("Unexpected error: %v", err)
}
// b) wrap the storage layer to return corrupt object error
registry.Storage.Storage = &corruptStorage{
Interface: registry.Storage.Storage,
err: storage.NewCorruptObjError("key", fmt.Errorf("untransformable")),
}
// c) set up a corrupt object deleter for the registry
deleter := NewCorruptObjectDeleter(registry)
// d) try unsafe delete, but pass a validation that always fails
var admissionInvoked int
_, deleted, err := deleter.Delete(ctx, object.Name, func(_ context.Context, _ runtime.Object) error {
admissionInvoked++
return fmt.Errorf("admission was not skipped")
}, &metav1.DeleteOptions{
IgnoreStoreReadErrorWithClusterBreakingPotential: ptr.To[bool](true),
})
if err != nil {
t.Errorf("Unexpected error from Delete: %v", err)
}
if want, got := true, deleted; want != got {
t.Errorf("Expected deleted: %t, but got: %t", want, got)
}
if want, got := 0, admissionInvoked; want != got {
t.Errorf("Expected admission to be invoked %d time(s), but got: %d", want, got)
}
}
type corruptStorage struct {
storage.Interface
err error