-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
50342: Establish '406 Not Acceptable' response for protobuf serializa… #67041
50342: Establish '406 Not Acceptable' response for protobuf serializa… #67041
Conversation
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
I have signed the CLA, should be all set with that now. |
One remaining concern is of unit tests: I couldn't find any protobuf specific unit tests in |
output, err := runtime.Encode(codec, status) | ||
if err != nil { | ||
w.WriteHeader(code) | ||
w.Header().Set("Content-Type", "text/plain") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we modify header before calling WriteHeader?
From the document: https://golang.org/pkg/net/http/#ResponseWriter
// Changing the header map after a call to WriteHeader (or
// Write) has no effect unless the modified headers are
// trailers.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, definitely, good catch. As the document implies, WriteHeader()
and Write()
are final in terms of header modification (andWriteHeader()
seems to be intended to be called immediately before Write()
, if it is used to modify the status code). I will make the change.
/ok-to-test |
/assign @liggitt |
|
||
if err := encoder.Encode(object, w); err != nil { | ||
errorJSONFatal(err, encoder, w) | ||
if output, err := runtime.Encode(encoder, object); err != nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This means we will no longer serialize large responses (like list all nodes
, list all pods
, etc) in a streaming fashion.
@kubernetes/sig-scalability-pr-reviews @kubernetes/sig-api-machinery-pr-reviews might have opinions around losing that in order to get a better status code for something that is arguably a coding error.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it would make more sense to wrap the responsewriter we pass to encoder.Encode
to call WriteHeader(statusCode)
on first Write()
(basically the same thing response writer already does, but with our custom status code instead of an implicit 200). Then, as long as an encoder error doesn't output anything before failure (which it shouldn't if the object can't be encoded at all), we still have the ability to write a serialization error code/response in failure cases.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks, understood on the first point. Definitely don't think the tradeoff is worth it in that case. Good idea on the second point. I will look into getting that off the ground.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If we're going to make this change, I'd suggest we run some scalability tests first to ensure api call latencies aren't affected much.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@shyamjvs @liggitt I made a new commit that preserves the streaming fashion of serialization, while still allowing for more control over the header content. I believe this should take care of any scalability concern, but please let me know if there's tests I should run to ensure this. Thanks very much @liggitt for the review and idea.
} | ||
w.Header().Set("Content-Type", "application/json") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why did this get dropped? I didn't expect errorJSONFatal to change much, given the new wrapped-writer approach. was the encoded status actually coming out in protobuf?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That particular line drop was from an earlier commit, and had no effect previously due to similar reasons as to why the status code wasn't changing. WriteHeader() had occurred before errJSONFatal, and afterwards prevents further modifications to the header. Further, the error status encoder above does encode the response to protobuf (or whatever other codec that's supported and used), and the request in the original issue filed did have vnd.kubernetes.protobuf
in the Accept header, so a protobuf response is expected. Thus, this needed to be cleaned up, otherwise the error would be returned as JSON all the time, which is unexpected.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I see, thanks.
|
||
if err := encoder.Encode(object, w); err != nil { | ||
errorJSONFatal(err, encoder, w) | ||
errSerializationFatal(err, encoder, w) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I actually expected to pass innerW
here, and for errorJSONFatal
to remain more or less as-is. were there other issues with that?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If we pass innerW, we lose the original status code, which we still keep around if the original status code itself was an error. I chose this behavior based on similar implementation choices I found in this file; if the original status code was an error (4xx, 5xx etc), don't change the status code due to serialization problems. I also added the client expected media type as a separate field in the new type, so that we can control that part of header write time as well, the same way as the status code.
// still be an error object. This seems ok, the alternative is to validate the object before | ||
// encoding, but this really should never happen, so it's wasted compute for every API request. | ||
status := expectApiStatus(t, "GET", server.URL, nil, http.StatusOK) | ||
// This used to send the original response's HTTP status code, but the behavior in staging/src/k8s.io/apiserver/pkg/endpoints/handlers/responsewriters/status.go::ErrorToAPIStatus() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can drop the historical note from the comment. justification for the current behavior is fine.
// HTTPResponseWriterWithInit wraps http.ResponseWriter, and implements the io.Writer interface to be used | ||
// with encoding. The purpose is to allow for encoding to a stream, while accommodating a custom HTTP status code | ||
// if encoding fails, and meeting the encoder's io.Writer interface requirement. | ||
type HTTPResponseWriterWithInit struct { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
let's keep this unexported for now
a couple nits, needs squashing, then LGTM. thanks for chasing this down |
…tion 'errNotMarshalable' - Added metav1.Status() that enforces '406 Not Acceptable' response if protobuf serialization is not fully supported for the API resource type. - JSON and YAML serialization are supposed to be more completely baked in, so serialization involving those, and general errors with seralizing protobuf, will return '500 Internal Server Error'. - If serialization failure occurs and original HTTP status code is error, use the original status code, else use the serialization failure status code. - Write encoded API responses to intermediate buffer - Use apimachinery/runtime::Encode() instead of apimachinery/runtime/protocol::Encode() in apiserver/endpoints/handlers/responsewriters/writers::SerializeObject() - This allows for intended encoder error handling to fully work, facilitated by apiserver/endpoints/handlers/responsewriters/status::ErrorToAPIResponse() before officially writing to the http.ResponseWriter - The specific part that wasn't working by ErrorToAPIResponse() was the HTTP status code set. A direct call to http.ResponseWriter::WriteHeader(statusCode) was made in SerializeObject() with the original response status code, before performing the encode. Once this method is called, it can not again update the status code at a later time, with say, an erro status code due to encode failure. - Updated relevant apiserver unit test to reflect the new behavior (TestWriteJSONDecodeError()) - Add build deps from make update for protobuf serializer 50342: Code review suggestion impl - Ensure that http.ResponseWriter::Header().Set() is called before http.ResponseWriter::WriteHeader() - This will avert a potential issue where changing the response media type to text/plain wouldn't work. - We want to respond with plain text if serialization fails of the original response, and serialization also fails for the resultant error response. 50342: wrapper for http.ResponseWriter - Prevent potential performance regression caused by modifying encode to use a buffer instead of streaming - This is achieved by creating a wrapper type for http.ResponseWriter that will use WriteHeader(statusCode) on the first call to Write(). Thus, on encode success, Write() will write the original statusCode. On encode failure, we pass control onto responsewriters::errSerializationFatal(), which will process the error to obtain potentially a new status code, depending on whether or not the original status code was itself an error. 50342: code review suggestions - Remove historical note from unit test comment - Don't export httpResponseWriterWithInit type (for now)
Thanks @liggitt, I committed the changes for the nits and squashed. Thanks for taking the time to review. |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: liggitt, tristanburgess The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/test all [submit-queue is verifying that this PR is safe to merge] |
@tristanburgess: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Automatic merge from submit-queue (batch tested with PRs 67041, 66948). If you want to cherry-pick this change to another branch, please follow the instructions here. |
Believe the test |
…tion 'errNotMarshalable'
What this PR does / why we need it:
This PR fixes a bug that was blocking extensible error handling in the case that serializing response data fails, and implements a '406 Not Acceptable' status code response if protobuf marshal definitions are not implemented for an API resource type. See commit message for further details.
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #50342
Special notes for your reviewer:
Release note: