-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add binary configmap #57938
Add binary configmap #57938
Conversation
New variation based on discussion in #57899 |
@@ -4353,6 +4353,12 @@ func ValidateConfigMap(cfg *core.ConfigMap) field.ErrorList { | |||
} | |||
totalSize += len(value) | |||
} | |||
for key, value := range cfg.BinaryData { | |||
for _, msg := range validation.IsConfigMapKey(key) { | |||
allErrs = append(allErrs, field.Invalid(field.NewPath("binarydata").Key(key), key, msg)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
binaryData
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed!
@@ -4353,6 +4353,12 @@ func ValidateConfigMap(cfg *core.ConfigMap) field.ErrorList { | |||
} | |||
totalSize += len(value) | |||
} | |||
for key, value := range cfg.BinaryData { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
also need to ensure there is no key duplication between data and binarydata maps
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please see note from @smarterclayton here, there was an ask to remove that validation i believe:
9ba0da8#r100961600
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hmm... allowing the same key in both data
and binaryData
seems buggy and undefined...
also, from #33549 (comment):
Needs a much more descriptive comment, including a description of the validation rules (must not overlap with data)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@smarterclayton can you please chime in?
Did you think or write about the options for design? Would we want to make
a parallel change to Secret so they both feel the same?
…On Jan 6, 2018 3:11 PM, "Davanum Srinivas" ***@***.***> wrote:
New variation based on discussion in #57899
<#57899>
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#57938 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AFVgVPKOS-AkTNi5rNxTo7yQhJLq_6aaks5tH_2cgaJpZM4RVeO7>
.
|
8aaaee1
to
3b810dd
Compare
/test pull-kubernetes-verify |
What we have today is as follows
Proposal is to:
Problems still that need to be thought about:
Suggestions welcome! ( cc @thockin @liggitt @smarterclayton ) |
I don't think so. The existing
the objects are fundamentally different today, and ConfigMap is less expressive than Secret. duplicating the same data in multiple fields won't work (see https://github.com/kubernetes/community/blob/master/contributors/devel/api_changes.md#backward-compatibility-gotchas - "A single feature/property cannot be represented using multiple spec fields in the same API version simultaneously") I probably wouldn't try to harmonize the two types here. This change makes ConfigMap as expressive as Secret. |
+1 @liggitt. i agree. |
/assign @smarterclayton |
api/swagger-spec/v1.json
Outdated
}, | ||
"binaryData": { | ||
"type": "object", | ||
"description": "Data contains the binary data. Each key must consist of alphanumeric characters, '-', '_' or '.'." |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Better description here, and improve the existing data
description. binaryData contains configuration data that is not required to be UTF-8 and ...
. Describe how the two fields validate together. Describe why I would use one or the other.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done
I agree with Jordan's position - V2 can pick up the pieces, as long as validation is crisp, this is the best way I can see to add the feature without breaking old clients. The minor ugliness seems outweighed by the value in the config map. I'd like to see the api description significantly improved so users understand when to use each, and understand that keys are exclusive. Improve both. Otherwise makes sense to do this change. |
@smarterclayton @liggitt thanks for the guidance, looks like we are on the right track. will add validation, update description, add some tests over the next few days. |
/hold |
551f394
to
690244d
Compare
pkg/apis/core/types.go
Outdated
@@ -4383,8 +4383,22 @@ type ConfigMap struct { | |||
|
|||
// Data contains the configuration data. | |||
// Each key must consist of alphanumeric characters, '-', '_' or '.'. | |||
// The value must be a string (UTF-8). If the value has byte | |||
// sequences not in the UTF-8 range, please use the BinaryData field. | |||
// The keys stored in Data should not overlap with the keys in |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
must not overlap
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done
pkg/apis/core/types.go
Outdated
@@ -4383,8 +4383,22 @@ type ConfigMap struct { | |||
|
|||
// Data contains the configuration data. | |||
// Each key must consist of alphanumeric characters, '-', '_' or '.'. | |||
// The value must be a string (UTF-8). If the value has byte | |||
// sequences not in the UTF-8 range, please use the BinaryData field. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
values with non-UTF-8 byte sequences must use the binaryData field
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done
/retest |
facdcae
to
df1351f
Compare
thanks @thockin i've added a comment and rebased the PR to latest master as well. |
/lgtm |
/test pull-kubernetes-e2e-kops-aws |
1 similar comment
/test pull-kubernetes-e2e-kops-aws |
@pmorie @saad-ali @thockin @matchstick - Can one of you please approve for "pkg/volume/configmap"? thanks! |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: cblecker, dims, liggitt, saad-ali Associated issue: #32432 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
/test all [submit-queue is verifying that this PR is safe to merge] |
/test pull-kubernetes-unit |
/test all [submit-queue is verifying that this PR is safe to merge] |
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions here. |
@@ -148,7 +148,7 @@ not their metadata (e.g. the Data of a ConfigMap, but nothing in ObjectMeta). | |||
obj interface{} | |||
expect int | |||
}{ | |||
{"ConfigMap", v1.ConfigMap{}, 3}, | |||
{"ConfigMap", v1.ConfigMap{}, 4}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviving code from #33549 submitted by @zreigz
What this PR does / why we need it:
Add support for binary files in ConfigMap
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #32432
Special notes for your reviewer:
Sample API data:
Release note: