Skip to content

Commit ca9b8b2

Browse files
tkashemk8s-publishing-bot
authored andcommitted
api: add a new field to meta/v1 DeleteOptions
- add a new boolean field IgnoreStoreReadErrorWithClusterBreakingPotential to meta/v1 DeleteOptions - add validation for the new delete option add validation for the new field in the delete options ignoreStoreReadErrorWithClusterBreakingPotential - prevent the pod eviction handler from issuing an unsafe pod delete prevent the pod eviction handler from enabling the 'ignoreStoreReadErrorWithClusterBreakingPotential' delete option Kubernetes-commit: b6773f15897dc31190b2be7cb49dd02015440465
1 parent d941d9f commit ca9b8b2

File tree

3 files changed

+140
-0
lines changed

3 files changed

+140
-0
lines changed

pkg/apis/meta/v1/types.go

+15
Original file line numberDiff line numberDiff line change
@@ -560,6 +560,21 @@ type DeleteOptions struct {
560560
// +optional
561561
// +listType=atomic
562562
DryRun []string `json:"dryRun,omitempty" protobuf:"bytes,5,rep,name=dryRun"`
563+
564+
// if set to true, it will trigger an unsafe deletion of the resource in
565+
// case the normal deletion flow fails with a corrupt object error.
566+
// A resource is considered corrupt if it can not be retrieved from
567+
// the underlying storage successfully because of a) its data can
568+
// not be transformed e.g. decryption failure, or b) it fails
569+
// to decode into an object.
570+
// NOTE: unsafe deletion ignores finalizer constraints, skips
571+
// precondition checks, and removes the object from the storage.
572+
// WARNING: This may potentially break the cluster if the workload
573+
// associated with the resource being unsafe-deleted relies on normal
574+
// deletion flow. Use only if you REALLY know what you are doing.
575+
// The default value is false, and the user must opt in to enable it
576+
// +optional
577+
IgnoreStoreReadErrorWithClusterBreakingPotential *bool `json:"ignoreStoreReadErrorWithClusterBreakingPotential,omitempty" protobuf:"varint,6,opt,name=ignoreStoreReadErrorWithClusterBreakingPotential"`
563578
}
564579

565580
const (

pkg/apis/meta/v1/validation/validation.go

+31
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,8 @@ import (
2626
"k8s.io/apimachinery/pkg/util/sets"
2727
"k8s.io/apimachinery/pkg/util/validation"
2828
"k8s.io/apimachinery/pkg/util/validation/field"
29+
30+
"k8s.io/utils/ptr"
2931
)
3032

3133
// LabelSelectorValidationOptions is a struct that can be passed to ValidateLabelSelector to record the validate options
@@ -165,6 +167,7 @@ func ValidateDeleteOptions(options *metav1.DeleteOptions) field.ErrorList {
165167
allErrs = append(allErrs, field.NotSupported(field.NewPath("propagationPolicy"), options.PropagationPolicy, []string{string(metav1.DeletePropagationForeground), string(metav1.DeletePropagationBackground), string(metav1.DeletePropagationOrphan), "nil"}))
166168
}
167169
allErrs = append(allErrs, ValidateDryRun(field.NewPath("dryRun"), options.DryRun)...)
170+
allErrs = append(allErrs, ValidateIgnoreStoreReadError(field.NewPath("ignoreStoreReadErrorWithClusterBreakingPotential"), options)...)
168171
return allErrs
169172
}
170173

@@ -358,3 +361,31 @@ func isValidConditionReason(value string) []string {
358361
}
359362
return nil
360363
}
364+
365+
// ValidateIgnoreStoreReadError validates that delete options are valid when
366+
// ignoreStoreReadErrorWithClusterBreakingPotential is enabled
367+
func ValidateIgnoreStoreReadError(fldPath *field.Path, options *metav1.DeleteOptions) field.ErrorList {
368+
allErrs := field.ErrorList{}
369+
if enabled := ptr.Deref[bool](options.IgnoreStoreReadErrorWithClusterBreakingPotential, false); !enabled {
370+
return allErrs
371+
}
372+
373+
if len(options.DryRun) > 0 {
374+
allErrs = append(allErrs, field.Invalid(fldPath, true, "cannot be set together with .dryRun"))
375+
}
376+
if options.PropagationPolicy != nil {
377+
allErrs = append(allErrs, field.Invalid(fldPath, true, "cannot be set together with .propagationPolicy"))
378+
}
379+
//nolint:staticcheck // Keep validation for deprecated OrphanDependents option until it's being removed
380+
if options.OrphanDependents != nil {
381+
allErrs = append(allErrs, field.Invalid(fldPath, true, "cannot be set together with .orphanDependents"))
382+
}
383+
if options.GracePeriodSeconds != nil {
384+
allErrs = append(allErrs, field.Invalid(fldPath, true, "cannot be set together with .gracePeriodSeconds"))
385+
}
386+
if options.Preconditions != nil {
387+
allErrs = append(allErrs, field.Invalid(fldPath, true, "cannot be set together with .preconditions"))
388+
}
389+
390+
return allErrs
391+
}

pkg/apis/meta/v1/validation/validation_test.go

+94
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,13 @@ import (
2121
"strings"
2222
"testing"
2323

24+
"github.com/google/go-cmp/cmp"
25+
2426
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
2527
"k8s.io/apimachinery/pkg/types"
2628
"k8s.io/apimachinery/pkg/util/validation/field"
29+
30+
"k8s.io/utils/ptr"
2731
)
2832

2933
func TestValidateLabels(t *testing.T) {
@@ -132,6 +136,96 @@ func boolPtr(b bool) *bool {
132136
return &b
133137
}
134138

139+
func TestValidateDeleteOptionsWithIgnoreStoreReadError(t *testing.T) {
140+
fieldPath := field.NewPath("ignoreStoreReadErrorWithClusterBreakingPotential")
141+
tests := []struct {
142+
name string
143+
opts metav1.DeleteOptions
144+
expectedErrors field.ErrorList
145+
}{
146+
{
147+
name: "option is nil",
148+
opts: metav1.DeleteOptions{
149+
IgnoreStoreReadErrorWithClusterBreakingPotential: nil,
150+
DryRun: []string{"All"},
151+
},
152+
expectedErrors: field.ErrorList{},
153+
},
154+
{
155+
name: "option is false, PropagationPolicy is set",
156+
opts: metav1.DeleteOptions{
157+
IgnoreStoreReadErrorWithClusterBreakingPotential: ptr.To[bool](false),
158+
DryRun: []string{"All"},
159+
PropagationPolicy: ptr.To[metav1.DeletionPropagation](metav1.DeletePropagationBackground),
160+
GracePeriodSeconds: ptr.To[int64](0),
161+
Preconditions: &metav1.Preconditions{},
162+
},
163+
expectedErrors: field.ErrorList{},
164+
},
165+
{
166+
name: "option is false, OrphanDependents is set",
167+
opts: metav1.DeleteOptions{
168+
IgnoreStoreReadErrorWithClusterBreakingPotential: ptr.To[bool](false),
169+
DryRun: []string{"All"},
170+
//nolint:staticcheck // until it's being removed
171+
OrphanDependents: ptr.To[bool](true),
172+
GracePeriodSeconds: ptr.To[int64](0),
173+
Preconditions: &metav1.Preconditions{},
174+
},
175+
expectedErrors: field.ErrorList{},
176+
},
177+
{
178+
name: "option is true, PropagationPolicy is set",
179+
opts: metav1.DeleteOptions{
180+
IgnoreStoreReadErrorWithClusterBreakingPotential: ptr.To[bool](true),
181+
DryRun: []string{"All"},
182+
PropagationPolicy: ptr.To[metav1.DeletionPropagation](metav1.DeletePropagationBackground),
183+
GracePeriodSeconds: ptr.To[int64](0),
184+
Preconditions: &metav1.Preconditions{},
185+
},
186+
expectedErrors: field.ErrorList{
187+
field.Invalid(fieldPath, true, "cannot be set together with .dryRun"),
188+
field.Invalid(fieldPath, true, "cannot be set together with .propagationPolicy"),
189+
field.Invalid(fieldPath, true, "cannot be set together with .gracePeriodSeconds"),
190+
field.Invalid(fieldPath, true, "cannot be set together with .preconditions"),
191+
},
192+
},
193+
{
194+
name: "option is true, OrphanDependents is set",
195+
opts: metav1.DeleteOptions{
196+
IgnoreStoreReadErrorWithClusterBreakingPotential: ptr.To[bool](true),
197+
DryRun: []string{"All"},
198+
//nolint:staticcheck // until it's being removed
199+
OrphanDependents: ptr.To[bool](true),
200+
GracePeriodSeconds: ptr.To[int64](0),
201+
Preconditions: &metav1.Preconditions{},
202+
},
203+
expectedErrors: field.ErrorList{
204+
field.Invalid(fieldPath, true, "cannot be set together with .dryRun"),
205+
field.Invalid(fieldPath, true, "cannot be set together with .orphanDependents"),
206+
field.Invalid(fieldPath, true, "cannot be set together with .gracePeriodSeconds"),
207+
field.Invalid(fieldPath, true, "cannot be set together with .preconditions"),
208+
},
209+
},
210+
{
211+
name: "option is true, no other option is set",
212+
opts: metav1.DeleteOptions{
213+
IgnoreStoreReadErrorWithClusterBreakingPotential: ptr.To[bool](false),
214+
},
215+
expectedErrors: field.ErrorList{},
216+
},
217+
}
218+
219+
for _, test := range tests {
220+
t.Run(test.name, func(t *testing.T) {
221+
errGot := ValidateDeleteOptions(&test.opts)
222+
if !cmp.Equal(test.expectedErrors, errGot) {
223+
t.Errorf("expected error(s) to match, diff: %s", cmp.Diff(test.expectedErrors, errGot))
224+
}
225+
})
226+
}
227+
}
228+
135229
func TestValidPatchOptions(t *testing.T) {
136230
tests := []struct {
137231
opts metav1.PatchOptions

0 commit comments

Comments
 (0)