-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dry-run: Create Options with dryRun for POST/PUT/PATCH #65105
Conversation
133048b
to
45640e8
Compare
@@ -65,7 +65,7 @@ func (s *storage) GetDeployment(ctx context.Context, deploymentID string, option | |||
} | |||
|
|||
func (s *storage) CreateDeployment(ctx context.Context, deployment *extensions.Deployment, createValidation rest.ValidateObjectFunc) (*extensions.Deployment, error) { | |||
obj, err := s.Create(ctx, deployment, createValidation, false) | |||
obj, err := s.Create(ctx, deployment, createValidation, &metav1.CreateOptions{}) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe make a metav1.CreateOptionsTODO() function so you can be sure to find and fix all of these after the fact? If you go this route, anyway.
9a4dd58
to
cacf1ac
Compare
|
||
// DryRun decides if the request should be completed or not. | ||
// +optional | ||
DryRun bool `json:"dryRun,omitempty" protobuf:"varint,1,opt,name=dryRun"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think the decision from the call yesterday was to make this an enumerated string.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Absolutely, I haven't taken the time to update yet.
|
||
// If IncludeUninitialized is specified, the object may be | ||
// returned without completing initialization. | ||
IncludeUninitialized bool `json:"includeUninitialized,omitempty" protobuf:"varint,2,opt,name=includeUninitialized"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this surprises me. How is this related to dry-run? Why do we expose that via an API "suddenly"?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also note that initializers go away (if I have understood @smarterclayton correctly). We should not expose a parameter for something that is planned to be removed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ok, found it: 69e757a#diff-7861f33474e4eb8d21cf1d33de5e4d4eL114 had the logic before, with a manually parsed get var. So nvm my comment above.
@@ -260,6 +260,14 @@ func DeleteCollection(r rest.CollectionDeleter, checkBody bool, scope RequestSco | |||
|
|||
ae := request.AuditEventFrom(ctx) | |||
audit.LogRequestObject(ae, obj, scope.Resource, scope.Subresource, scope.Serializer) | |||
} else { | |||
if values := req.URL.Query(); len(values) > 0 { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is guarded by if checkBody
. Looks odd.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In the delete handler we call the guarding var allowsOptions
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, I'm not sure what the point of these variable is, but it looks like "checkBody" and "allowOptions" have the same goal, so this is "correct".
@@ -111,7 +111,9 @@ func createHandler(r rest.NamedCreater, scope RequestScope, admit admission.Inte | |||
} | |||
|
|||
// TODO: replace with content type negotiation? | |||
includeUninitialized := req.URL.Query().Get("includeUninitialized") == "1" | |||
options := &metav1.CreateOptions{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Shouldn't this be using the parameter decoder? This looks hacky. Next commit.
} | ||
} | ||
// Timeout is not part of the options, drop it. | ||
delete(values, "timeout") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
DecodeParameters ignores params that are not in the struct (necessary for new clients speaking to old servers). So, no need for the delete.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed
pkg/master/reconcilers/lease.go
Outdated
@@ -221,7 +221,8 @@ func (r *leaseEndpointReconciler) doReconcile(serviceName string, endpointPorts | |||
} | |||
|
|||
glog.Warningf("Resetting endpoints for master service %q to %v", serviceName, masterIPs) | |||
return r.endpointRegistry.UpdateEndpoints(ctx, e, rest.ValidateAllObjectFunc, rest.ValidateAllObjectUpdateFunc) | |||
// PLEASE_PAY_ATTENTION(apelisse): No idea if this is what we need to do here. Does it make sense to have DryRun here anyway? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is the leader election code which speaks directly to the registry to update the (kubernetes service) endpoints. So this certainly does not need do a dry-run here. It is very very special purpose.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed
Heh, I just thought to ask about that too. /approve cancel |
765dc08
to
a4b8a7e
Compare
@@ -453,6 +453,42 @@ type DeleteOptions struct { | |||
// foreground. | |||
// +optional | |||
PropagationPolicy *DeletionPropagation `json:"propagationPolicy,omitempty" protobuf:"varint,4,opt,name=propagationPolicy"` | |||
|
|||
// Whether the request should be completed and modifications will not be persisted. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd suggest something more like this:
When present, indicates that modifications should not be persisted.
An invalid or unrecognized dryRun directive will result in a BadRequest response and no further processing of the request.
and then we can add details about what directives are supported as we determine that
/retest |
type looks correct now. /approve |
/hold cancel |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: apelisse, deads2k, liggitt The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest |
Automatic merge from submit-queue (batch tested with PRs 65105, 62948). If you want to cherry-pick this change to another branch, please follow the instructions here. |
Automatic merge from submit-queue (batch tested with PRs 66158, 66041, 66210). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. Remove manually written typed registries These were only used in a handful of places, and were not consistently available for all types. They add a lot of call sites for PRs like #65105 and are not generally useful (very few callers have the ability to construct the underlying store). This PR switches the scale subresources to use the underlying store directly (like the status subresources already were), and removes the manually written Registry impls. /sig api-machinery /kind cleanup /assign @deads2k /hold will hold for #65105 and rebase after that ```release-note NONE ```
Automatic merge from submit-queue (batch tested with PRs 66158, 66041, 66210). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. Remove manually written typed registries These were only used in a handful of places, and were not consistently available for all types. They add a lot of call sites for PRs like kubernetes/kubernetes#65105 and are not generally useful (very few callers have the ability to construct the underlying store). This PR switches the scale subresources to use the underlying store directly (like the status subresources already were), and removes the manually written Registry impls. /sig api-machinery /kind cleanup /assign @deads2k /hold will hold for kubernetes/kubernetes#65105 and rebase after that ```release-note NONE ``` Kubernetes-commit: 43b801d499f95a4a89fe3319347225e9ad643359
It looks like we added |
What this PR does / why we need it:
Create new options for Create and Update (through POST/PUT/PATCH).
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #
Special notes for your reviewer:
Release note: