| /* |
| Copyright 2015 The Kubernetes Authors. |
| |
| Licensed under the Apache License, Version 2.0 (the "License"); |
| you may not use this file except in compliance with the License. |
| You may obtain a copy of the License at |
| |
| http://www.apache.org/licenses/LICENSE-2.0 |
| |
| Unless required by applicable law or agreed to in writing, software |
| distributed under the License is distributed on an "AS IS" BASIS, |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| See the License for the specific language governing permissions and |
| limitations under the License. |
| */ |
| |
| package pod |
| |
| import ( |
| "strings" |
| |
| "github.com/google/go-cmp/cmp" |
| metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" |
| metavalidation "k8s.io/apimachinery/pkg/apis/meta/v1/validation" |
| "k8s.io/apimachinery/pkg/util/sets" |
| "k8s.io/apimachinery/pkg/util/validation" |
| utilfeature "k8s.io/apiserver/pkg/util/feature" |
| api "k8s.io/kubernetes/pkg/apis/core" |
| "k8s.io/kubernetes/pkg/apis/core/helper" |
| apivalidation "k8s.io/kubernetes/pkg/apis/core/validation" |
| "k8s.io/kubernetes/pkg/features" |
| ) |
| |
| // ContainerType signifies container type |
| type ContainerType int |
| |
| const ( |
| // Containers is for normal containers |
| Containers ContainerType = 1 << iota |
| // InitContainers is for init containers |
| InitContainers |
| // EphemeralContainers is for ephemeral containers |
| EphemeralContainers |
| ) |
| |
| // AllContainers specifies that all containers be visited |
| const AllContainers ContainerType = (InitContainers | Containers | EphemeralContainers) |
| |
| // AllFeatureEnabledContainers returns a ContainerType mask which includes all container |
| // types except for the ones guarded by feature gate. |
| func AllFeatureEnabledContainers() ContainerType { |
| return AllContainers |
| } |
| |
| // ContainerVisitor is called with each container spec, and returns true |
| // if visiting should continue. |
| type ContainerVisitor func(container *api.Container, containerType ContainerType) (shouldContinue bool) |
| |
| // VisitContainers invokes the visitor function with a pointer to every container |
| // spec in the given pod spec with type set in mask. If visitor returns false, |
| // visiting is short-circuited. VisitContainers returns true if visiting completes, |
| // false if visiting was short-circuited. |
| func VisitContainers(podSpec *api.PodSpec, mask ContainerType, visitor ContainerVisitor) bool { |
| if mask&InitContainers != 0 { |
| for i := range podSpec.InitContainers { |
| if !visitor(&podSpec.InitContainers[i], InitContainers) { |
| return false |
| } |
| } |
| } |
| if mask&Containers != 0 { |
| for i := range podSpec.Containers { |
| if !visitor(&podSpec.Containers[i], Containers) { |
| return false |
| } |
| } |
| } |
| if mask&EphemeralContainers != 0 { |
| for i := range podSpec.EphemeralContainers { |
| if !visitor((*api.Container)(&podSpec.EphemeralContainers[i].EphemeralContainerCommon), EphemeralContainers) { |
| return false |
| } |
| } |
| } |
| return true |
| } |
| |
| // Visitor is called with each object name, and returns true if visiting should continue |
| type Visitor func(name string) (shouldContinue bool) |
| |
| func skipEmptyNames(visitor Visitor) Visitor { |
| return func(name string) bool { |
| if len(name) == 0 { |
| // continue visiting |
| return true |
| } |
| // delegate to visitor |
| return visitor(name) |
| } |
| } |
| |
| // VisitPodSecretNames invokes the visitor function with the name of every secret |
| // referenced by the pod spec. If visitor returns false, visiting is short-circuited. |
| // Transitive references (e.g. pod -> pvc -> pv -> secret) are not visited. |
| // Returns true if visiting completed, false if visiting was short-circuited. |
| func VisitPodSecretNames(pod *api.Pod, visitor Visitor, containerType ContainerType) bool { |
| visitor = skipEmptyNames(visitor) |
| for _, reference := range pod.Spec.ImagePullSecrets { |
| if !visitor(reference.Name) { |
| return false |
| } |
| } |
| VisitContainers(&pod.Spec, containerType, func(c *api.Container, containerType ContainerType) bool { |
| return visitContainerSecretNames(c, visitor) |
| }) |
| var source *api.VolumeSource |
| for i := range pod.Spec.Volumes { |
| source = &pod.Spec.Volumes[i].VolumeSource |
| switch { |
| case source.AzureFile != nil: |
| if len(source.AzureFile.SecretName) > 0 && !visitor(source.AzureFile.SecretName) { |
| return false |
| } |
| case source.CephFS != nil: |
| if source.CephFS.SecretRef != nil && !visitor(source.CephFS.SecretRef.Name) { |
| return false |
| } |
| case source.Cinder != nil: |
| if source.Cinder.SecretRef != nil && !visitor(source.Cinder.SecretRef.Name) { |
| return false |
| } |
| case source.FlexVolume != nil: |
| if source.FlexVolume.SecretRef != nil && !visitor(source.FlexVolume.SecretRef.Name) { |
| return false |
| } |
| case source.Projected != nil: |
| for j := range source.Projected.Sources { |
| if source.Projected.Sources[j].Secret != nil { |
| if !visitor(source.Projected.Sources[j].Secret.Name) { |
| return false |
| } |
| } |
| } |
| case source.RBD != nil: |
| if source.RBD.SecretRef != nil && !visitor(source.RBD.SecretRef.Name) { |
| return false |
| } |
| case source.Secret != nil: |
| if !visitor(source.Secret.SecretName) { |
| return false |
| } |
| case source.ScaleIO != nil: |
| if source.ScaleIO.SecretRef != nil && !visitor(source.ScaleIO.SecretRef.Name) { |
| return false |
| } |
| case source.ISCSI != nil: |
| if source.ISCSI.SecretRef != nil && !visitor(source.ISCSI.SecretRef.Name) { |
| return false |
| } |
| case source.StorageOS != nil: |
| if source.StorageOS.SecretRef != nil && !visitor(source.StorageOS.SecretRef.Name) { |
| return false |
| } |
| case source.CSI != nil: |
| if source.CSI.NodePublishSecretRef != nil && !visitor(source.CSI.NodePublishSecretRef.Name) { |
| return false |
| } |
| } |
| } |
| return true |
| } |
| |
| func visitContainerSecretNames(container *api.Container, visitor Visitor) bool { |
| for _, env := range container.EnvFrom { |
| if env.SecretRef != nil { |
| if !visitor(env.SecretRef.Name) { |
| return false |
| } |
| } |
| } |
| for _, envVar := range container.Env { |
| if envVar.ValueFrom != nil && envVar.ValueFrom.SecretKeyRef != nil { |
| if !visitor(envVar.ValueFrom.SecretKeyRef.Name) { |
| return false |
| } |
| } |
| } |
| return true |
| } |
| |
| // VisitPodConfigmapNames invokes the visitor function with the name of every configmap |
| // referenced by the pod spec. If visitor returns false, visiting is short-circuited. |
| // Transitive references (e.g. pod -> pvc -> pv -> secret) are not visited. |
| // Returns true if visiting completed, false if visiting was short-circuited. |
| func VisitPodConfigmapNames(pod *api.Pod, visitor Visitor, containerType ContainerType) bool { |
| visitor = skipEmptyNames(visitor) |
| VisitContainers(&pod.Spec, containerType, func(c *api.Container, containerType ContainerType) bool { |
| return visitContainerConfigmapNames(c, visitor) |
| }) |
| var source *api.VolumeSource |
| for i := range pod.Spec.Volumes { |
| source = &pod.Spec.Volumes[i].VolumeSource |
| switch { |
| case source.Projected != nil: |
| for j := range source.Projected.Sources { |
| if source.Projected.Sources[j].ConfigMap != nil { |
| if !visitor(source.Projected.Sources[j].ConfigMap.Name) { |
| return false |
| } |
| } |
| } |
| case source.ConfigMap != nil: |
| if !visitor(source.ConfigMap.Name) { |
| return false |
| } |
| } |
| } |
| return true |
| } |
| |
| func visitContainerConfigmapNames(container *api.Container, visitor Visitor) bool { |
| for _, env := range container.EnvFrom { |
| if env.ConfigMapRef != nil { |
| if !visitor(env.ConfigMapRef.Name) { |
| return false |
| } |
| } |
| } |
| for _, envVar := range container.Env { |
| if envVar.ValueFrom != nil && envVar.ValueFrom.ConfigMapKeyRef != nil { |
| if !visitor(envVar.ValueFrom.ConfigMapKeyRef.Name) { |
| return false |
| } |
| } |
| } |
| return true |
| } |
| |
| // IsPodReady returns true if a pod is ready; false otherwise. |
| func IsPodReady(pod *api.Pod) bool { |
| return IsPodReadyConditionTrue(pod.Status) |
| } |
| |
| // IsPodReadyConditionTrue returns true if a pod is ready; false otherwise. |
| func IsPodReadyConditionTrue(status api.PodStatus) bool { |
| condition := GetPodReadyCondition(status) |
| return condition != nil && condition.Status == api.ConditionTrue |
| } |
| |
| // GetPodReadyCondition extracts the pod ready condition from the given status and returns that. |
| // Returns nil if the condition is not present. |
| func GetPodReadyCondition(status api.PodStatus) *api.PodCondition { |
| _, condition := GetPodCondition(&status, api.PodReady) |
| return condition |
| } |
| |
| // GetPodCondition extracts the provided condition from the given status and returns that. |
| // Returns nil and -1 if the condition is not present, and the index of the located condition. |
| func GetPodCondition(status *api.PodStatus, conditionType api.PodConditionType) (int, *api.PodCondition) { |
| if status == nil { |
| return -1, nil |
| } |
| for i := range status.Conditions { |
| if status.Conditions[i].Type == conditionType { |
| return i, &status.Conditions[i] |
| } |
| } |
| return -1, nil |
| } |
| |
| // UpdatePodCondition updates existing pod condition or creates a new one. Sets LastTransitionTime to now if the |
| // status has changed. |
| // Returns true if pod condition has changed or has been added. |
| func UpdatePodCondition(status *api.PodStatus, condition *api.PodCondition) bool { |
| condition.LastTransitionTime = metav1.Now() |
| // Try to find this pod condition. |
| conditionIndex, oldCondition := GetPodCondition(status, condition.Type) |
| |
| if oldCondition == nil { |
| // We are adding new pod condition. |
| status.Conditions = append(status.Conditions, *condition) |
| return true |
| } |
| // We are updating an existing condition, so we need to check if it has changed. |
| if condition.Status == oldCondition.Status { |
| condition.LastTransitionTime = oldCondition.LastTransitionTime |
| } |
| |
| isEqual := condition.Status == oldCondition.Status && |
| condition.Reason == oldCondition.Reason && |
| condition.Message == oldCondition.Message && |
| condition.LastProbeTime.Equal(&oldCondition.LastProbeTime) && |
| condition.LastTransitionTime.Equal(&oldCondition.LastTransitionTime) |
| |
| status.Conditions[conditionIndex] = *condition |
| // Return true if one of the fields have changed. |
| return !isEqual |
| } |
| |
| func checkContainerUseIndivisibleHugePagesValues(container api.Container) bool { |
| for resourceName, quantity := range container.Resources.Limits { |
| if helper.IsHugePageResourceName(resourceName) { |
| if !helper.IsHugePageResourceValueDivisible(resourceName, quantity) { |
| return true |
| } |
| } |
| } |
| |
| for resourceName, quantity := range container.Resources.Requests { |
| if helper.IsHugePageResourceName(resourceName) { |
| if !helper.IsHugePageResourceValueDivisible(resourceName, quantity) { |
| return true |
| } |
| } |
| } |
| |
| return false |
| } |
| |
| // usesIndivisibleHugePagesValues returns true if the one of the containers uses non-integer multiple |
| // of huge page unit size |
| func usesIndivisibleHugePagesValues(podSpec *api.PodSpec) bool { |
| foundIndivisibleHugePagesValue := false |
| VisitContainers(podSpec, AllContainers, func(c *api.Container, containerType ContainerType) bool { |
| if checkContainerUseIndivisibleHugePagesValues(*c) { |
| foundIndivisibleHugePagesValue = true |
| } |
| return !foundIndivisibleHugePagesValue // continue visiting if we haven't seen an invalid value yet |
| }) |
| |
| if foundIndivisibleHugePagesValue { |
| return true |
| } |
| |
| for resourceName, quantity := range podSpec.Overhead { |
| if helper.IsHugePageResourceName(resourceName) { |
| if !helper.IsHugePageResourceValueDivisible(resourceName, quantity) { |
| return true |
| } |
| } |
| } |
| |
| return false |
| } |
| |
| // hasInvalidTopologySpreadConstraintLabelSelector return true if spec.TopologySpreadConstraints have any entry with invalid labelSelector |
| func hasInvalidTopologySpreadConstraintLabelSelector(spec *api.PodSpec) bool { |
| for _, constraint := range spec.TopologySpreadConstraints { |
| errs := metavalidation.ValidateLabelSelector(constraint.LabelSelector, metavalidation.LabelSelectorValidationOptions{AllowInvalidLabelValueInSelector: false}, nil) |
| if len(errs) != 0 { |
| return true |
| } |
| } |
| return false |
| } |
| |
| // hasNonLocalProjectedTokenPath return true if spec.Volumes have any entry with non-local projected token path |
| func hasNonLocalProjectedTokenPath(spec *api.PodSpec) bool { |
| for _, volume := range spec.Volumes { |
| if volume.Projected != nil { |
| for _, source := range volume.Projected.Sources { |
| if source.ServiceAccountToken == nil { |
| continue |
| } |
| errs := apivalidation.ValidateLocalNonReservedPath(source.ServiceAccountToken.Path, nil) |
| if len(errs) != 0 { |
| return true |
| } |
| } |
| } |
| } |
| return false |
| } |
| |
| // GetValidationOptionsFromPodSpecAndMeta returns validation options based on pod specs and metadata |
| func GetValidationOptionsFromPodSpecAndMeta(podSpec, oldPodSpec *api.PodSpec, podMeta, oldPodMeta *metav1.ObjectMeta) apivalidation.PodValidationOptions { |
| // default pod validation options based on feature gate |
| opts := apivalidation.PodValidationOptions{ |
| AllowInvalidPodDeletionCost: !utilfeature.DefaultFeatureGate.Enabled(features.PodDeletionCost), |
| // Allow pod spec to use status.hostIPs in downward API if feature is enabled |
| AllowHostIPsField: utilfeature.DefaultFeatureGate.Enabled(features.PodHostIPs), |
| // Do not allow pod spec to use non-integer multiple of huge page unit size default |
| AllowIndivisibleHugePagesValues: false, |
| AllowInvalidLabelValueInSelector: false, |
| AllowInvalidTopologySpreadConstraintLabelSelector: false, |
| AllowNamespacedSysctlsForHostNetAndHostIPC: false, |
| AllowNonLocalProjectedTokenPath: false, |
| } |
| |
| // If old spec uses relaxed validation or enabled the RelaxedEnvironmentVariableValidation feature gate, |
| // we must allow it |
| opts.AllowRelaxedEnvironmentVariableValidation = useRelaxedEnvironmentVariableValidation(podSpec, oldPodSpec) |
| |
| if oldPodSpec != nil { |
| // if old spec has status.hostIPs downwardAPI set, we must allow it |
| opts.AllowHostIPsField = opts.AllowHostIPsField || hasUsedDownwardAPIFieldPathWithPodSpec(oldPodSpec, "status.hostIPs") |
| |
| // if old spec used non-integer multiple of huge page unit size, we must allow it |
| opts.AllowIndivisibleHugePagesValues = usesIndivisibleHugePagesValues(oldPodSpec) |
| |
| opts.AllowInvalidLabelValueInSelector = hasInvalidLabelValueInAffinitySelector(oldPodSpec) |
| // if old spec has invalid labelSelector in topologySpreadConstraint, we must allow it |
| opts.AllowInvalidTopologySpreadConstraintLabelSelector = hasInvalidTopologySpreadConstraintLabelSelector(oldPodSpec) |
| // if old spec has an invalid projected token volume path, we must allow it |
| opts.AllowNonLocalProjectedTokenPath = hasNonLocalProjectedTokenPath(oldPodSpec) |
| |
| // if old spec has invalid sysctl with hostNet or hostIPC, we must allow it when update |
| if oldPodSpec.SecurityContext != nil && len(oldPodSpec.SecurityContext.Sysctls) != 0 { |
| for _, s := range oldPodSpec.SecurityContext.Sysctls { |
| err := apivalidation.ValidateHostSysctl(s.Name, oldPodSpec.SecurityContext, nil) |
| if err != nil { |
| opts.AllowNamespacedSysctlsForHostNetAndHostIPC = true |
| break |
| } |
| } |
| } |
| } |
| if oldPodMeta != nil && !opts.AllowInvalidPodDeletionCost { |
| // This is an update, so validate only if the existing object was valid. |
| _, err := helper.GetDeletionCostFromPodAnnotations(oldPodMeta.Annotations) |
| opts.AllowInvalidPodDeletionCost = err != nil |
| } |
| |
| return opts |
| } |
| |
| func useRelaxedEnvironmentVariableValidation(podSpec, oldPodSpec *api.PodSpec) bool { |
| if utilfeature.DefaultFeatureGate.Enabled(features.RelaxedEnvironmentVariableValidation) { |
| return true |
| } |
| |
| var oldPodEnvVarNames, podEnvVarNames sets.Set[string] |
| if oldPodSpec != nil { |
| oldPodEnvVarNames = gatherPodEnvVarNames(oldPodSpec) |
| } |
| |
| if podSpec != nil { |
| podEnvVarNames = gatherPodEnvVarNames(podSpec) |
| } |
| |
| for env := range podEnvVarNames { |
| if relaxedEnvVarUsed(env, oldPodEnvVarNames) { |
| return true |
| } |
| } |
| |
| return false |
| } |
| |
| func gatherPodEnvVarNames(podSpec *api.PodSpec) sets.Set[string] { |
| podEnvVarNames := sets.Set[string]{} |
| |
| for _, c := range podSpec.Containers { |
| for _, env := range c.Env { |
| podEnvVarNames.Insert(env.Name) |
| } |
| |
| for _, env := range c.EnvFrom { |
| podEnvVarNames.Insert(env.Prefix) |
| } |
| } |
| |
| for _, c := range podSpec.InitContainers { |
| for _, env := range c.Env { |
| podEnvVarNames.Insert(env.Name) |
| } |
| |
| for _, env := range c.EnvFrom { |
| podEnvVarNames.Insert(env.Prefix) |
| } |
| } |
| |
| for _, c := range podSpec.EphemeralContainers { |
| for _, env := range c.Env { |
| podEnvVarNames.Insert(env.Name) |
| } |
| |
| for _, env := range c.EnvFrom { |
| podEnvVarNames.Insert(env.Prefix) |
| } |
| } |
| |
| return podEnvVarNames |
| } |
| |
| func relaxedEnvVarUsed(name string, oldPodEnvVarNames sets.Set[string]) bool { |
| // A length of 0 means this is not an update request, |
| // or the old pod does not exist in the env. |
| // We will let the feature gate decide whether to use relaxed rules. |
| if oldPodEnvVarNames.Len() == 0 { |
| return false |
| } |
| |
| if len(validation.IsEnvVarName(name)) == 0 || len(validation.IsRelaxedEnvVarName(name)) != 0 { |
| // It's either a valid name by strict rules or an invalid name under relaxed rules. |
| // Either way, we'll use strict rules to validate. |
| return false |
| } |
| |
| // The name in question failed strict rules but passed relaxed rules. |
| if oldPodEnvVarNames.Has(name) { |
| // This relaxed-rules name was already in use. |
| return true |
| } |
| |
| return false |
| } |
| |
| func hasUsedDownwardAPIFieldPathWithPodSpec(podSpec *api.PodSpec, fieldPath string) bool { |
| if podSpec == nil { |
| return false |
| } |
| for _, vol := range podSpec.Volumes { |
| if hasUsedDownwardAPIFieldPathWithVolume(&vol, fieldPath) { |
| return true |
| } |
| } |
| for _, c := range podSpec.InitContainers { |
| if hasUsedDownwardAPIFieldPathWithContainer(&c, fieldPath) { |
| return true |
| } |
| } |
| for _, c := range podSpec.Containers { |
| if hasUsedDownwardAPIFieldPathWithContainer(&c, fieldPath) { |
| return true |
| } |
| } |
| return false |
| } |
| |
| func hasUsedDownwardAPIFieldPathWithVolume(volume *api.Volume, fieldPath string) bool { |
| if volume == nil || volume.DownwardAPI == nil { |
| return false |
| } |
| for _, file := range volume.DownwardAPI.Items { |
| if file.FieldRef != nil && |
| file.FieldRef.FieldPath == fieldPath { |
| return true |
| } |
| } |
| return false |
| } |
| |
| func hasUsedDownwardAPIFieldPathWithContainer(container *api.Container, fieldPath string) bool { |
| if container == nil { |
| return false |
| } |
| for _, env := range container.Env { |
| if env.ValueFrom != nil && |
| env.ValueFrom.FieldRef != nil && |
| env.ValueFrom.FieldRef.FieldPath == fieldPath { |
| return true |
| } |
| } |
| return false |
| } |
| |
| // GetValidationOptionsFromPodTemplate will return pod validation options for specified template. |
| func GetValidationOptionsFromPodTemplate(podTemplate, oldPodTemplate *api.PodTemplateSpec) apivalidation.PodValidationOptions { |
| var newPodSpec, oldPodSpec *api.PodSpec |
| var newPodMeta, oldPodMeta *metav1.ObjectMeta |
| // we have to be careful about nil pointers here |
| // replication controller in particular is prone to passing nil |
| if podTemplate != nil { |
| newPodSpec = &podTemplate.Spec |
| newPodMeta = &podTemplate.ObjectMeta |
| } |
| if oldPodTemplate != nil { |
| oldPodSpec = &oldPodTemplate.Spec |
| oldPodMeta = &oldPodTemplate.ObjectMeta |
| } |
| return GetValidationOptionsFromPodSpecAndMeta(newPodSpec, oldPodSpec, newPodMeta, oldPodMeta) |
| } |
| |
| // DropDisabledTemplateFields removes disabled fields from the pod template metadata and spec. |
| // This should be called from PrepareForCreate/PrepareForUpdate for all resources containing a PodTemplateSpec |
| func DropDisabledTemplateFields(podTemplate, oldPodTemplate *api.PodTemplateSpec) { |
| var ( |
| podSpec *api.PodSpec |
| podAnnotations map[string]string |
| oldPodSpec *api.PodSpec |
| oldPodAnnotations map[string]string |
| ) |
| if podTemplate != nil { |
| podSpec = &podTemplate.Spec |
| podAnnotations = podTemplate.Annotations |
| } |
| if oldPodTemplate != nil { |
| oldPodSpec = &oldPodTemplate.Spec |
| oldPodAnnotations = oldPodTemplate.Annotations |
| } |
| dropDisabledFields(podSpec, podAnnotations, oldPodSpec, oldPodAnnotations) |
| } |
| |
| // DropDisabledPodFields removes disabled fields from the pod metadata and spec. |
| // This should be called from PrepareForCreate/PrepareForUpdate for all resources containing a Pod |
| func DropDisabledPodFields(pod, oldPod *api.Pod) { |
| var ( |
| podSpec *api.PodSpec |
| podStatus *api.PodStatus |
| podAnnotations map[string]string |
| oldPodSpec *api.PodSpec |
| oldPodStatus *api.PodStatus |
| oldPodAnnotations map[string]string |
| ) |
| if pod != nil { |
| podSpec = &pod.Spec |
| podStatus = &pod.Status |
| podAnnotations = pod.Annotations |
| } |
| if oldPod != nil { |
| oldPodSpec = &oldPod.Spec |
| oldPodStatus = &oldPod.Status |
| oldPodAnnotations = oldPod.Annotations |
| } |
| dropDisabledFields(podSpec, podAnnotations, oldPodSpec, oldPodAnnotations) |
| dropDisabledPodStatusFields(podStatus, oldPodStatus, podSpec, oldPodSpec) |
| } |
| |
| // dropDisabledFields removes disabled fields from the pod metadata and spec. |
| func dropDisabledFields( |
| podSpec *api.PodSpec, podAnnotations map[string]string, |
| oldPodSpec *api.PodSpec, oldPodAnnotations map[string]string, |
| ) { |
| // the new spec must always be non-nil |
| if podSpec == nil { |
| podSpec = &api.PodSpec{} |
| } |
| |
| if !utilfeature.DefaultFeatureGate.Enabled(features.AppArmor) && !appArmorAnnotationsInUse(oldPodAnnotations) { |
| for k := range podAnnotations { |
| if strings.HasPrefix(k, api.DeprecatedAppArmorAnnotationKeyPrefix) { |
| delete(podAnnotations, k) |
| } |
| } |
| } |
| if (!utilfeature.DefaultFeatureGate.Enabled(features.AppArmor) || !utilfeature.DefaultFeatureGate.Enabled(features.AppArmorFields)) && !appArmorFieldsInUse(oldPodSpec) { |
| if podSpec.SecurityContext != nil { |
| podSpec.SecurityContext.AppArmorProfile = nil |
| } |
| VisitContainers(podSpec, AllContainers, func(c *api.Container, _ ContainerType) bool { |
| if c.SecurityContext != nil { |
| c.SecurityContext.AppArmorProfile = nil |
| } |
| return true |
| }) |
| } |
| |
| // If the feature is disabled and not in use, drop the hostUsers field. |
| if !utilfeature.DefaultFeatureGate.Enabled(features.UserNamespacesSupport) && !hostUsersInUse(oldPodSpec) { |
| // Drop the field in podSpec only if SecurityContext is not nil. |
| // If it is nil, there is no need to set hostUsers=nil (it will be nil too). |
| if podSpec.SecurityContext != nil { |
| podSpec.SecurityContext.HostUsers = nil |
| } |
| } |
| |
| dropDisabledProcMountField(podSpec, oldPodSpec) |
| |
| dropDisabledNodeInclusionPolicyFields(podSpec, oldPodSpec) |
| dropDisabledMatchLabelKeysFieldInTopologySpread(podSpec, oldPodSpec) |
| dropDisabledMatchLabelKeysFieldInPodAffinity(podSpec, oldPodSpec) |
| dropDisabledDynamicResourceAllocationFields(podSpec, oldPodSpec) |
| dropDisabledClusterTrustBundleProjection(podSpec, oldPodSpec) |
| |
| if !utilfeature.DefaultFeatureGate.Enabled(features.InPlacePodVerticalScaling) && !inPlacePodVerticalScalingInUse(oldPodSpec) { |
| // Drop ResizePolicy fields. Don't drop updates to Resources field as template.spec.resources |
| // field is mutable for certain controllers. Let ValidatePodUpdate handle it. |
| for i := range podSpec.Containers { |
| podSpec.Containers[i].ResizePolicy = nil |
| } |
| for i := range podSpec.InitContainers { |
| podSpec.InitContainers[i].ResizePolicy = nil |
| } |
| for i := range podSpec.EphemeralContainers { |
| podSpec.EphemeralContainers[i].ResizePolicy = nil |
| } |
| } |
| |
| if !utilfeature.DefaultFeatureGate.Enabled(features.SidecarContainers) && !restartableInitContainersInUse(oldPodSpec) { |
| // Drop the RestartPolicy field of init containers. |
| for i := range podSpec.InitContainers { |
| podSpec.InitContainers[i].RestartPolicy = nil |
| } |
| // For other types of containers, validateContainers will handle them. |
| } |
| |
| if !utilfeature.DefaultFeatureGate.Enabled(features.RecursiveReadOnlyMounts) && !rroInUse(oldPodSpec) { |
| for i := range podSpec.Containers { |
| for j := range podSpec.Containers[i].VolumeMounts { |
| podSpec.Containers[i].VolumeMounts[j].RecursiveReadOnly = nil |
| } |
| } |
| for i := range podSpec.InitContainers { |
| for j := range podSpec.InitContainers[i].VolumeMounts { |
| podSpec.InitContainers[i].VolumeMounts[j].RecursiveReadOnly = nil |
| } |
| } |
| for i := range podSpec.EphemeralContainers { |
| for j := range podSpec.EphemeralContainers[i].VolumeMounts { |
| podSpec.EphemeralContainers[i].VolumeMounts[j].RecursiveReadOnly = nil |
| } |
| } |
| } |
| |
| dropPodLifecycleSleepAction(podSpec, oldPodSpec) |
| } |
| |
| func dropPodLifecycleSleepAction(podSpec, oldPodSpec *api.PodSpec) { |
| if utilfeature.DefaultFeatureGate.Enabled(features.PodLifecycleSleepAction) || podLifecycleSleepActionInUse(oldPodSpec) { |
| return |
| } |
| |
| adjustLifecycle := func(lifecycle *api.Lifecycle) { |
| if lifecycle.PreStop != nil && lifecycle.PreStop.Sleep != nil { |
| lifecycle.PreStop.Sleep = nil |
| if lifecycle.PreStop.Exec == nil && lifecycle.PreStop.HTTPGet == nil && lifecycle.PreStop.TCPSocket == nil { |
| lifecycle.PreStop = nil |
| } |
| } |
| if lifecycle.PostStart != nil && lifecycle.PostStart.Sleep != nil { |
| lifecycle.PostStart.Sleep = nil |
| if lifecycle.PostStart.Exec == nil && lifecycle.PostStart.HTTPGet == nil && lifecycle.PostStart.TCPSocket == nil { |
| lifecycle.PostStart = nil |
| } |
| } |
| } |
| |
| for i := range podSpec.Containers { |
| if podSpec.Containers[i].Lifecycle == nil { |
| continue |
| } |
| adjustLifecycle(podSpec.Containers[i].Lifecycle) |
| if podSpec.Containers[i].Lifecycle.PreStop == nil && podSpec.Containers[i].Lifecycle.PostStart == nil { |
| podSpec.Containers[i].Lifecycle = nil |
| } |
| } |
| |
| for i := range podSpec.InitContainers { |
| if podSpec.InitContainers[i].Lifecycle == nil { |
| continue |
| } |
| adjustLifecycle(podSpec.InitContainers[i].Lifecycle) |
| if podSpec.InitContainers[i].Lifecycle.PreStop == nil && podSpec.InitContainers[i].Lifecycle.PostStart == nil { |
| podSpec.InitContainers[i].Lifecycle = nil |
| } |
| } |
| |
| for i := range podSpec.EphemeralContainers { |
| if podSpec.EphemeralContainers[i].Lifecycle == nil { |
| continue |
| } |
| adjustLifecycle(podSpec.EphemeralContainers[i].Lifecycle) |
| if podSpec.EphemeralContainers[i].Lifecycle.PreStop == nil && podSpec.EphemeralContainers[i].Lifecycle.PostStart == nil { |
| podSpec.EphemeralContainers[i].Lifecycle = nil |
| } |
| } |
| } |
| |
| func podLifecycleSleepActionInUse(podSpec *api.PodSpec) bool { |
| if podSpec == nil { |
| return false |
| } |
| var inUse bool |
| VisitContainers(podSpec, AllContainers, func(c *api.Container, containerType ContainerType) bool { |
| if c.Lifecycle == nil { |
| return true |
| } |
| if c.Lifecycle.PreStop != nil && c.Lifecycle.PreStop.Sleep != nil { |
| inUse = true |
| return false |
| } |
| if c.Lifecycle.PostStart != nil && c.Lifecycle.PostStart.Sleep != nil { |
| inUse = true |
| return false |
| } |
| return true |
| }) |
| return inUse |
| } |
| |
| // dropDisabledPodStatusFields removes disabled fields from the pod status |
| func dropDisabledPodStatusFields(podStatus, oldPodStatus *api.PodStatus, podSpec, oldPodSpec *api.PodSpec) { |
| // the new status is always be non-nil |
| if podStatus == nil { |
| podStatus = &api.PodStatus{} |
| } |
| |
| if !utilfeature.DefaultFeatureGate.Enabled(features.InPlacePodVerticalScaling) && !inPlacePodVerticalScalingInUse(oldPodSpec) { |
| // Drop Resize, AllocatedResources, and Resources fields |
| dropResourcesFields := func(csl []api.ContainerStatus) { |
| for i := range csl { |
| csl[i].AllocatedResources = nil |
| csl[i].Resources = nil |
| } |
| } |
| dropResourcesFields(podStatus.ContainerStatuses) |
| dropResourcesFields(podStatus.InitContainerStatuses) |
| dropResourcesFields(podStatus.EphemeralContainerStatuses) |
| podStatus.Resize = "" |
| } |
| |
| if !utilfeature.DefaultFeatureGate.Enabled(features.DynamicResourceAllocation) && !dynamicResourceAllocationInUse(oldPodSpec) { |
| podStatus.ResourceClaimStatuses = nil |
| } |
| |
| // drop HostIPs to empty (disable PodHostIPs). |
| if !utilfeature.DefaultFeatureGate.Enabled(features.PodHostIPs) && !hostIPsInUse(oldPodStatus) { |
| podStatus.HostIPs = nil |
| } |
| |
| if !utilfeature.DefaultFeatureGate.Enabled(features.RecursiveReadOnlyMounts) && !rroInUse(oldPodSpec) { |
| for i := range podStatus.ContainerStatuses { |
| podStatus.ContainerStatuses[i].VolumeMounts = nil |
| } |
| for i := range podStatus.InitContainerStatuses { |
| podStatus.InitContainerStatuses[i].VolumeMounts = nil |
| } |
| for i := range podStatus.EphemeralContainerStatuses { |
| podStatus.EphemeralContainerStatuses[i].VolumeMounts = nil |
| } |
| } |
| } |
| |
| func hostIPsInUse(podStatus *api.PodStatus) bool { |
| if podStatus == nil { |
| return false |
| } |
| return len(podStatus.HostIPs) > 0 |
| } |
| |
| // dropDisabledDynamicResourceAllocationFields removes pod claim references from |
| // container specs and pod-level resource claims unless they are already used |
| // by the old pod spec. |
| func dropDisabledDynamicResourceAllocationFields(podSpec, oldPodSpec *api.PodSpec) { |
| if !utilfeature.DefaultFeatureGate.Enabled(features.DynamicResourceAllocation) && !dynamicResourceAllocationInUse(oldPodSpec) { |
| dropResourceClaimRequests(podSpec.Containers) |
| dropResourceClaimRequests(podSpec.InitContainers) |
| dropEphemeralResourceClaimRequests(podSpec.EphemeralContainers) |
| podSpec.ResourceClaims = nil |
| } |
| } |
| |
| func dynamicResourceAllocationInUse(podSpec *api.PodSpec) bool { |
| if podSpec == nil { |
| return false |
| } |
| |
| // We only need to check this field because the containers cannot have |
| // resource requirements entries for claims without a corresponding |
| // entry at the pod spec level. |
| return len(podSpec.ResourceClaims) > 0 |
| } |
| |
| func dropResourceClaimRequests(containers []api.Container) { |
| for i := range containers { |
| containers[i].Resources.Claims = nil |
| } |
| } |
| |
| func dropEphemeralResourceClaimRequests(containers []api.EphemeralContainer) { |
| for i := range containers { |
| containers[i].Resources.Claims = nil |
| } |
| } |
| |
| // dropDisabledProcMountField removes disabled fields from PodSpec related |
| // to ProcMount only if it is not already used by the old spec |
| func dropDisabledProcMountField(podSpec, oldPodSpec *api.PodSpec) { |
| if !utilfeature.DefaultFeatureGate.Enabled(features.ProcMountType) && !procMountInUse(oldPodSpec) { |
| defaultProcMount := api.DefaultProcMount |
| VisitContainers(podSpec, AllContainers, func(c *api.Container, containerType ContainerType) bool { |
| if c.SecurityContext != nil && c.SecurityContext.ProcMount != nil { |
| // The ProcMount field was improperly forced to non-nil in 1.12. |
| // If the feature is disabled, and the existing object is not using any non-default values, and the ProcMount field is present in the incoming object, force to the default value. |
| // Note: we cannot force the field to nil when the feature is disabled because it causes a diff against previously persisted data. |
| c.SecurityContext.ProcMount = &defaultProcMount |
| } |
| return true |
| }) |
| } |
| } |
| |
| // dropDisabledNodeInclusionPolicyFields removes disabled fields from PodSpec related |
| // to NodeInclusionPolicy only if it is not used by the old spec. |
| func dropDisabledNodeInclusionPolicyFields(podSpec, oldPodSpec *api.PodSpec) { |
| if !utilfeature.DefaultFeatureGate.Enabled(features.NodeInclusionPolicyInPodTopologySpread) && podSpec != nil { |
| if !nodeTaintsPolicyInUse(oldPodSpec) { |
| for i := range podSpec.TopologySpreadConstraints { |
| podSpec.TopologySpreadConstraints[i].NodeTaintsPolicy = nil |
| } |
| } |
| if !nodeAffinityPolicyInUse(oldPodSpec) { |
| for i := range podSpec.TopologySpreadConstraints { |
| podSpec.TopologySpreadConstraints[i].NodeAffinityPolicy = nil |
| } |
| } |
| } |
| } |
| |
| // dropDisabledMatchLabelKeysFieldInPodAffinity removes disabled fields from PodSpec related |
| // to MatchLabelKeys in required/preferred PodAffinity/PodAntiAffinity only if it is not already used by the old spec. |
| func dropDisabledMatchLabelKeysFieldInPodAffinity(podSpec, oldPodSpec *api.PodSpec) { |
| if podSpec == nil || podSpec.Affinity == nil || utilfeature.DefaultFeatureGate.Enabled(features.MatchLabelKeysInPodAffinity) || matchLabelKeysFieldInPodAffinityInUse(oldPodSpec) { |
| return |
| } |
| |
| if affinity := podSpec.Affinity.PodAffinity; affinity != nil { |
| dropMatchLabelKeysFieldInPodAffnityTerm(affinity.RequiredDuringSchedulingIgnoredDuringExecution) |
| dropMatchLabelKeysFieldInWeightedPodAffnityTerm(affinity.PreferredDuringSchedulingIgnoredDuringExecution) |
| } |
| if antiaffinity := podSpec.Affinity.PodAntiAffinity; antiaffinity != nil { |
| dropMatchLabelKeysFieldInPodAffnityTerm(antiaffinity.RequiredDuringSchedulingIgnoredDuringExecution) |
| dropMatchLabelKeysFieldInWeightedPodAffnityTerm(antiaffinity.PreferredDuringSchedulingIgnoredDuringExecution) |
| } |
| } |
| |
| // dropDisabledMatchLabelKeysFieldInTopologySpread removes disabled fields from PodSpec related |
| // to MatchLabelKeys in TopologySpread only if it is not already used by the old spec. |
| func dropDisabledMatchLabelKeysFieldInTopologySpread(podSpec, oldPodSpec *api.PodSpec) { |
| if !utilfeature.DefaultFeatureGate.Enabled(features.MatchLabelKeysInPodTopologySpread) && !matchLabelKeysInTopologySpreadInUse(oldPodSpec) { |
| for i := range podSpec.TopologySpreadConstraints { |
| podSpec.TopologySpreadConstraints[i].MatchLabelKeys = nil |
| } |
| } |
| } |
| |
| // dropMatchLabelKeysFieldInWeightedPodAffnityTerm removes MatchLabelKeys and MismatchLabelKeys fields from WeightedPodAffinityTerm |
| func dropMatchLabelKeysFieldInWeightedPodAffnityTerm(terms []api.WeightedPodAffinityTerm) { |
| for i := range terms { |
| terms[i].PodAffinityTerm.MatchLabelKeys = nil |
| terms[i].PodAffinityTerm.MismatchLabelKeys = nil |
| } |
| } |
| |
| // dropMatchLabelKeysFieldInPodAffnityTerm removes MatchLabelKeys and MismatchLabelKeys fields from PodAffinityTerm |
| func dropMatchLabelKeysFieldInPodAffnityTerm(terms []api.PodAffinityTerm) { |
| for i := range terms { |
| terms[i].MatchLabelKeys = nil |
| terms[i].MismatchLabelKeys = nil |
| } |
| } |
| |
| // matchLabelKeysFieldInPodAffinityInUse returns true if given affinityTerms have MatchLabelKeys field set. |
| func matchLabelKeysFieldInPodAffinityInUse(podSpec *api.PodSpec) bool { |
| if podSpec == nil || podSpec.Affinity == nil { |
| return false |
| } |
| |
| if affinity := podSpec.Affinity.PodAffinity; affinity != nil { |
| for _, c := range affinity.RequiredDuringSchedulingIgnoredDuringExecution { |
| if len(c.MatchLabelKeys) > 0 || len(c.MismatchLabelKeys) > 0 { |
| return true |
| } |
| } |
| |
| for _, c := range affinity.PreferredDuringSchedulingIgnoredDuringExecution { |
| if len(c.PodAffinityTerm.MatchLabelKeys) > 0 || len(c.PodAffinityTerm.MismatchLabelKeys) > 0 { |
| return true |
| } |
| } |
| } |
| |
| if antiAffinity := podSpec.Affinity.PodAntiAffinity; antiAffinity != nil { |
| for _, c := range antiAffinity.RequiredDuringSchedulingIgnoredDuringExecution { |
| if len(c.MatchLabelKeys) > 0 || len(c.MismatchLabelKeys) > 0 { |
| return true |
| } |
| } |
| |
| for _, c := range antiAffinity.PreferredDuringSchedulingIgnoredDuringExecution { |
| if len(c.PodAffinityTerm.MatchLabelKeys) > 0 || len(c.PodAffinityTerm.MismatchLabelKeys) > 0 { |
| return true |
| } |
| } |
| } |
| |
| return false |
| } |
| |
| // matchLabelKeysInTopologySpreadInUse returns true if the pod spec is non-nil |
| // and has MatchLabelKeys field set in TopologySpreadConstraints. |
| func matchLabelKeysInTopologySpreadInUse(podSpec *api.PodSpec) bool { |
| if podSpec == nil { |
| return false |
| } |
| |
| for _, c := range podSpec.TopologySpreadConstraints { |
| if len(c.MatchLabelKeys) > 0 { |
| return true |
| } |
| } |
| return false |
| } |
| |
| // nodeAffinityPolicyInUse returns true if the pod spec is non-nil and has NodeAffinityPolicy field set |
| // in TopologySpreadConstraints |
| func nodeAffinityPolicyInUse(podSpec *api.PodSpec) bool { |
| if podSpec == nil { |
| return false |
| } |
| for _, c := range podSpec.TopologySpreadConstraints { |
| if c.NodeAffinityPolicy != nil { |
| return true |
| } |
| } |
| return false |
| } |
| |
| // nodeTaintsPolicyInUse returns true if the pod spec is non-nil and has NodeTaintsPolicy field set |
| // in TopologySpreadConstraints |
| func nodeTaintsPolicyInUse(podSpec *api.PodSpec) bool { |
| if podSpec == nil { |
| return false |
| } |
| for _, c := range podSpec.TopologySpreadConstraints { |
| if c.NodeTaintsPolicy != nil { |
| return true |
| } |
| } |
| return false |
| } |
| |
| // hostUsersInUse returns true if the pod spec has spec.hostUsers field set. |
| func hostUsersInUse(podSpec *api.PodSpec) bool { |
| if podSpec != nil && podSpec.SecurityContext != nil && podSpec.SecurityContext.HostUsers != nil { |
| return true |
| } |
| |
| return false |
| } |
| |
| // inPlacePodVerticalScalingInUse returns true if pod spec is non-nil and ResizePolicy is set |
| func inPlacePodVerticalScalingInUse(podSpec *api.PodSpec) bool { |
| if podSpec == nil { |
| return false |
| } |
| var inUse bool |
| VisitContainers(podSpec, Containers, func(c *api.Container, containerType ContainerType) bool { |
| if len(c.ResizePolicy) > 0 { |
| inUse = true |
| return false |
| } |
| return true |
| }) |
| return inUse |
| } |
| |
| // procMountInUse returns true if the pod spec is non-nil and has a SecurityContext's ProcMount field set to a non-default value |
| func procMountInUse(podSpec *api.PodSpec) bool { |
| if podSpec == nil { |
| return false |
| } |
| |
| var inUse bool |
| VisitContainers(podSpec, AllContainers, func(c *api.Container, containerType ContainerType) bool { |
| if c.SecurityContext == nil || c.SecurityContext.ProcMount == nil { |
| return true |
| } |
| if *c.SecurityContext.ProcMount != api.DefaultProcMount { |
| inUse = true |
| return false |
| } |
| return true |
| }) |
| |
| return inUse |
| } |
| |
| // appArmorAnnotationsInUse returns true if the pod has apparmor annotations |
| func appArmorAnnotationsInUse(podAnnotations map[string]string) bool { |
| for k := range podAnnotations { |
| if strings.HasPrefix(k, api.DeprecatedAppArmorAnnotationKeyPrefix) { |
| return true |
| } |
| } |
| return false |
| } |
| |
| // appArmorFieldsInUse returns true if the pod has apparmor fields set |
| func appArmorFieldsInUse(podSpec *api.PodSpec) bool { |
| if podSpec == nil { |
| return false |
| } |
| if podSpec.SecurityContext != nil && podSpec.SecurityContext.AppArmorProfile != nil { |
| return true |
| } |
| hasAppArmorContainer := false |
| VisitContainers(podSpec, AllContainers, func(c *api.Container, _ ContainerType) bool { |
| if c.SecurityContext != nil && c.SecurityContext.AppArmorProfile != nil { |
| hasAppArmorContainer = true |
| return false |
| } |
| return true |
| }) |
| return hasAppArmorContainer |
| } |
| |
| // restartableInitContainersInUse returns true if the pod spec is non-nil and |
| // it has any init container with ContainerRestartPolicyAlways. |
| func restartableInitContainersInUse(podSpec *api.PodSpec) bool { |
| if podSpec == nil { |
| return false |
| } |
| var inUse bool |
| VisitContainers(podSpec, InitContainers, func(c *api.Container, containerType ContainerType) bool { |
| if c.RestartPolicy != nil && *c.RestartPolicy == api.ContainerRestartPolicyAlways { |
| inUse = true |
| return false |
| } |
| return true |
| }) |
| return inUse |
| } |
| |
| func clusterTrustBundleProjectionInUse(podSpec *api.PodSpec) bool { |
| if podSpec == nil { |
| return false |
| } |
| for _, v := range podSpec.Volumes { |
| if v.Projected == nil { |
| continue |
| } |
| |
| for _, s := range v.Projected.Sources { |
| if s.ClusterTrustBundle != nil { |
| return true |
| } |
| } |
| } |
| |
| return false |
| } |
| |
| func rroInUse(podSpec *api.PodSpec) bool { |
| if podSpec == nil { |
| return false |
| } |
| var inUse bool |
| VisitContainers(podSpec, AllContainers, func(c *api.Container, _ ContainerType) bool { |
| for _, f := range c.VolumeMounts { |
| if f.RecursiveReadOnly != nil { |
| inUse = true |
| return false |
| } |
| } |
| return true |
| }) |
| return inUse |
| } |
| |
| func dropDisabledClusterTrustBundleProjection(podSpec, oldPodSpec *api.PodSpec) { |
| if utilfeature.DefaultFeatureGate.Enabled(features.ClusterTrustBundleProjection) { |
| return |
| } |
| if podSpec == nil { |
| return |
| } |
| |
| // If the pod was already using it, it can keep using it. |
| if clusterTrustBundleProjectionInUse(oldPodSpec) { |
| return |
| } |
| |
| for i := range podSpec.Volumes { |
| if podSpec.Volumes[i].Projected == nil { |
| continue |
| } |
| |
| for j := range podSpec.Volumes[i].Projected.Sources { |
| podSpec.Volumes[i].Projected.Sources[j].ClusterTrustBundle = nil |
| } |
| } |
| } |
| |
| func hasInvalidLabelValueInAffinitySelector(spec *api.PodSpec) bool { |
| if spec.Affinity != nil { |
| if spec.Affinity.PodAffinity != nil { |
| for _, term := range spec.Affinity.PodAffinity.RequiredDuringSchedulingIgnoredDuringExecution { |
| allErrs := apivalidation.ValidatePodAffinityTermSelector(term, false, nil) |
| if len(allErrs) != 0 { |
| return true |
| } |
| } |
| for _, term := range spec.Affinity.PodAffinity.PreferredDuringSchedulingIgnoredDuringExecution { |
| allErrs := apivalidation.ValidatePodAffinityTermSelector(term.PodAffinityTerm, false, nil) |
| if len(allErrs) != 0 { |
| return true |
| } |
| } |
| } |
| if spec.Affinity.PodAntiAffinity != nil { |
| for _, term := range spec.Affinity.PodAntiAffinity.RequiredDuringSchedulingIgnoredDuringExecution { |
| allErrs := apivalidation.ValidatePodAffinityTermSelector(term, false, nil) |
| if len(allErrs) != 0 { |
| return true |
| } |
| } |
| for _, term := range spec.Affinity.PodAntiAffinity.PreferredDuringSchedulingIgnoredDuringExecution { |
| allErrs := apivalidation.ValidatePodAffinityTermSelector(term.PodAffinityTerm, false, nil) |
| if len(allErrs) != 0 { |
| return true |
| } |
| } |
| } |
| } |
| return false |
| } |
| |
| func MarkPodProposedForResize(oldPod, newPod *api.Pod) { |
| for i, c := range newPod.Spec.Containers { |
| if c.Resources.Requests == nil { |
| continue |
| } |
| if cmp.Equal(oldPod.Spec.Containers[i].Resources, c.Resources) { |
| continue |
| } |
| findContainerStatus := func(css []api.ContainerStatus, cName string) (api.ContainerStatus, bool) { |
| for i := range css { |
| if css[i].Name == cName { |
| return css[i], true |
| } |
| } |
| return api.ContainerStatus{}, false |
| } |
| if cs, ok := findContainerStatus(newPod.Status.ContainerStatuses, c.Name); ok { |
| if !cmp.Equal(c.Resources.Requests, cs.AllocatedResources) { |
| newPod.Status.Resize = api.PodResizeStatusProposed |
| break |
| } |
| } |
| } |
| } |