From 9c6126e29c2dd63668c5d2320a4c26ff173fc499 Mon Sep 17 00:00:00 2001 From: Davanum Srinivas Date: Sat, 9 Nov 2024 08:56:55 -0500 Subject: [PATCH] Possible fix for alpha CI jobs failing with AllowUnsafeMalformedObjectDeletion switched on Signed-off-by: Davanum Srinivas --- staging/src/k8s.io/apiserver/pkg/endpoints/handlers/delete.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/delete.go b/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/delete.go index 4d04fd0286a..0abba257e3a 100644 --- a/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/delete.go +++ b/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/delete.go @@ -306,7 +306,7 @@ func DeleteCollection(r rest.CollectionDeleter, checkBody bool, scope *RequestSc } if utilfeature.DefaultFeatureGate.Enabled(features.AllowUnsafeMalformedObjectDeletion) { - if options != nil && ptr.Deref(options.IgnoreStoreReadErrorWithClusterBreakingPotential, true) { + if options != nil && ptr.Deref(options.IgnoreStoreReadErrorWithClusterBreakingPotential, false) { fieldErrList := field.ErrorList{ field.Invalid(field.NewPath("ignoreStoreReadErrorWithClusterBreakingPotential"), true, "is not allowed with DELETECOLLECTION, try again after removing the option"), }