mirror of https://github.com/k3s-io/k3s
Merge pull request #72714 from mourya007/features_gate
Move TokenRequestProjection feature gate out of validationpull/564/head
commit
52d4500f23
|
@ -285,6 +285,18 @@ func dropDisabledFields(
|
||||||
podSpec = &api.PodSpec{}
|
podSpec = &api.PodSpec{}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if !utilfeature.DefaultFeatureGate.Enabled(features.TokenRequestProjection) &&
|
||||||
|
!tokenRequestProjectionInUse(oldPodSpec) {
|
||||||
|
for i := range podSpec.Volumes {
|
||||||
|
if podSpec.Volumes[i].Projected != nil {
|
||||||
|
for j := range podSpec.Volumes[i].Projected.Sources {
|
||||||
|
podSpec.Volumes[i].Projected.Sources[j].ServiceAccountToken = nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if !utilfeature.DefaultFeatureGate.Enabled(features.AppArmor) && !appArmorInUse(oldPodAnnotations) {
|
if !utilfeature.DefaultFeatureGate.Enabled(features.AppArmor) && !appArmorInUse(oldPodAnnotations) {
|
||||||
for k := range podAnnotations {
|
for k := range podAnnotations {
|
||||||
if strings.HasPrefix(k, apparmor.ContainerAnnotationKeyPrefix) {
|
if strings.HasPrefix(k, apparmor.ContainerAnnotationKeyPrefix) {
|
||||||
|
@ -480,6 +492,23 @@ func shareProcessNamespaceInUse(podSpec *api.PodSpec) bool {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func tokenRequestProjectionInUse(podSpec *api.PodSpec) bool {
|
||||||
|
if podSpec == nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
for _, v := range podSpec.Volumes {
|
||||||
|
if v.Projected == nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
for _, s := range v.Projected.Sources {
|
||||||
|
if s.ServiceAccountToken != nil {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
// podPriorityInUse returns true if the pod spec is non-nil and has Priority or PriorityClassName set.
|
// podPriorityInUse returns true if the pod spec is non-nil and has Priority or PriorityClassName set.
|
||||||
func podPriorityInUse(podSpec *api.PodSpec) bool {
|
func podPriorityInUse(podSpec *api.PodSpec) bool {
|
||||||
if podSpec == nil {
|
if podSpec == nil {
|
||||||
|
|
|
@ -1177,7 +1177,124 @@ func TestDropReadinessGates(t *testing.T) {
|
||||||
}
|
}
|
||||||
// new pod should not have ReadinessGates
|
// new pod should not have ReadinessGates
|
||||||
if !reflect.DeepEqual(newPod, podWithoutReadinessGates()) {
|
if !reflect.DeepEqual(newPod, podWithoutReadinessGates()) {
|
||||||
t.Errorf("new pod had ReadinessGates: %v", diff.ObjectReflectDiff(newPod, podWithoutReadinessGates()))
|
t.Errorf("new pod had ReadinessGates: %v",
|
||||||
|
diff.ObjectReflectDiff(newPod, podWithoutReadinessGates()))
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
// new pod should not need to be changed
|
||||||
|
if !reflect.DeepEqual(newPod, newPodInfo.pod()) {
|
||||||
|
t.Errorf("new pod changed: %v", diff.ObjectReflectDiff(newPod, newPodInfo.pod()))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDropTokenRequestProjection(t *testing.T) {
|
||||||
|
podWithoutTRProjection := func() *api.Pod {
|
||||||
|
return &api.Pod{
|
||||||
|
Spec: api.PodSpec{
|
||||||
|
Volumes: []api.Volume{{
|
||||||
|
VolumeSource: api.VolumeSource{
|
||||||
|
Projected: &api.ProjectedVolumeSource{
|
||||||
|
Sources: []api.VolumeProjection{{
|
||||||
|
ServiceAccountToken: nil,
|
||||||
|
}},
|
||||||
|
}}},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
podWithoutProjectedVolumeSource := func() *api.Pod {
|
||||||
|
return &api.Pod{
|
||||||
|
Spec: api.PodSpec{
|
||||||
|
Volumes: []api.Volume{
|
||||||
|
{VolumeSource: api.VolumeSource{
|
||||||
|
ConfigMap: &api.ConfigMapVolumeSource{},
|
||||||
|
}},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
podWithTRProjection := func() *api.Pod {
|
||||||
|
return &api.Pod{
|
||||||
|
Spec: api.PodSpec{
|
||||||
|
Volumes: []api.Volume{{
|
||||||
|
VolumeSource: api.VolumeSource{
|
||||||
|
Projected: &api.ProjectedVolumeSource{
|
||||||
|
Sources: []api.VolumeProjection{{
|
||||||
|
ServiceAccountToken: &api.ServiceAccountTokenProjection{
|
||||||
|
Audience: "api",
|
||||||
|
ExpirationSeconds: 3600,
|
||||||
|
Path: "token",
|
||||||
|
}},
|
||||||
|
}},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}}
|
||||||
|
}
|
||||||
|
podInfo := []struct {
|
||||||
|
description string
|
||||||
|
hasTRProjection bool
|
||||||
|
pod func() *api.Pod
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "has TokenRequestProjection",
|
||||||
|
hasTRProjection: true,
|
||||||
|
pod: podWithTRProjection,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "does not have TokenRequestProjection",
|
||||||
|
hasTRProjection: false,
|
||||||
|
pod: podWithoutTRProjection,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "does not have ProjectedVolumeSource",
|
||||||
|
hasTRProjection: false,
|
||||||
|
pod: podWithoutProjectedVolumeSource,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "is nil",
|
||||||
|
hasTRProjection: false,
|
||||||
|
pod: func() *api.Pod { return nil },
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, enabled := range []bool{true, false} {
|
||||||
|
for _, oldPodInfo := range podInfo {
|
||||||
|
for _, newPodInfo := range podInfo {
|
||||||
|
oldPodhasTRProjection, oldPod := oldPodInfo.hasTRProjection, oldPodInfo.pod()
|
||||||
|
newPodhasTRProjection, newPod := newPodInfo.hasTRProjection, newPodInfo.pod()
|
||||||
|
if newPod == nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
t.Run(fmt.Sprintf("feature enabled=%v, old pod %v, new pod %v", enabled, oldPodInfo.description, newPodInfo.description), func(t *testing.T) {
|
||||||
|
defer utilfeaturetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.TokenRequestProjection, enabled)()
|
||||||
|
var oldPodSpec *api.PodSpec
|
||||||
|
if oldPod != nil {
|
||||||
|
oldPodSpec = &oldPod.Spec
|
||||||
|
}
|
||||||
|
dropDisabledFields(&newPod.Spec, nil, oldPodSpec, nil)
|
||||||
|
// old pod should never be changed
|
||||||
|
if !reflect.DeepEqual(oldPod, oldPodInfo.pod()) {
|
||||||
|
t.Errorf("old pod changed: %v", diff.ObjectReflectDiff(oldPod, oldPodInfo.pod()))
|
||||||
|
}
|
||||||
|
switch {
|
||||||
|
case enabled || oldPodhasTRProjection:
|
||||||
|
if !reflect.DeepEqual(newPod, newPodInfo.pod()) {
|
||||||
|
t.Errorf("new pod changed: %v", diff.ObjectReflectDiff(newPod, newPodInfo.pod()))
|
||||||
|
}
|
||||||
|
case newPodhasTRProjection:
|
||||||
|
// new pod should be changed
|
||||||
|
if reflect.DeepEqual(newPod, newPodInfo.pod()) {
|
||||||
|
t.Errorf("%v", oldPod)
|
||||||
|
t.Errorf("%v", newPod)
|
||||||
|
t.Errorf("new pod was not changed")
|
||||||
|
}
|
||||||
|
if !reflect.DeepEqual(newPod, podWithoutTRProjection()) {
|
||||||
|
t.Errorf("new pod had Tokenrequestprojection: %v", diff.ObjectReflectDiff(newPod, podWithoutTRProjection()))
|
||||||
}
|
}
|
||||||
default:
|
default:
|
||||||
// new pod should not need to be changed
|
// new pod should not need to be changed
|
||||||
|
|
|
@ -1039,9 +1039,6 @@ func validateProjectionSources(projection *core.ProjectedVolumeSource, projectio
|
||||||
}
|
}
|
||||||
if projPath := srcPath.Child("serviceAccountToken"); source.ServiceAccountToken != nil {
|
if projPath := srcPath.Child("serviceAccountToken"); source.ServiceAccountToken != nil {
|
||||||
numSources++
|
numSources++
|
||||||
if !utilfeature.DefaultFeatureGate.Enabled(features.TokenRequestProjection) {
|
|
||||||
allErrs = append(allErrs, field.Forbidden(projPath, "TokenRequestProjection feature is not enabled"))
|
|
||||||
}
|
|
||||||
if source.ServiceAccountToken.ExpirationSeconds < 10*60 {
|
if source.ServiceAccountToken.ExpirationSeconds < 10*60 {
|
||||||
allErrs = append(allErrs, field.Invalid(projPath.Child("expirationSeconds"), source.ServiceAccountToken.ExpirationSeconds, "may not specify a duration less than 10 minutes"))
|
allErrs = append(allErrs, field.Invalid(projPath.Child("expirationSeconds"), source.ServiceAccountToken.ExpirationSeconds, "may not specify a duration less than 10 minutes"))
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue