Skip to content

Commit bbd3320

Browse files
committed
react to upstream fixes
1 parent eb542f6 commit bbd3320

File tree

3 files changed

+19
-12
lines changed

3 files changed

+19
-12
lines changed

pkg/cmd/server/kubernetes/master/master_config_test.go

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -321,17 +321,7 @@ func TestCMServerDefaults(t *testing.T) {
321321
ConcurrentGCSyncs: 20,
322322
EnableGarbageCollector: true,
323323
GCIgnoredResources: []componentconfig.GroupResource{
324-
{Group: "extensions", Resource: "replicationcontrollers"},
325-
{Group: "", Resource: "bindings"},
326-
{Group: "", Resource: "componentstatuses"},
327324
{Group: "", Resource: "events"},
328-
{Group: "authentication.k8s.io", Resource: "tokenreviews"},
329-
{Group: "authorization.k8s.io", Resource: "subjectaccessreviews"},
330-
{Group: "authorization.k8s.io", Resource: "selfsubjectaccessreviews"},
331-
{Group: "authorization.k8s.io", Resource: "localsubjectaccessreviews"},
332-
{Group: "authorization.k8s.io", Resource: "selfsubjectrulesreviews"},
333-
{Group: "apiregistration.k8s.io", Resource: "apiservices"},
334-
{Group: "apiextensions.k8s.io", Resource: "customresourcedefinitions"},
335325
},
336326
},
337327
HPAController: &cmoptions.HPAControllerOptions{

pkg/quota/admission/clusterresourcequota/admission.go

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,10 @@ import (
77
"sync"
88
"time"
99

10+
"k8s.io/apimachinery/pkg/runtime/schema"
1011
utilwait "k8s.io/apimachinery/pkg/util/wait"
1112
"k8s.io/apiserver/pkg/admission"
13+
"k8s.io/apiserver/pkg/admission/plugin/namespace/lifecycle"
1214
kapi "k8s.io/kubernetes/pkg/apis/core"
1315
kinternalinformers "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion"
1416
kcorelisters "k8s.io/kubernetes/pkg/client/listers/core/internalversion"
@@ -94,7 +96,7 @@ func (q *clusterQuotaAdmission) Admit(a admission.Attributes) (err error) {
9496

9597
q.init.Do(func() {
9698
clusterQuotaAccessor := newQuotaAccessor(q.clusterQuotaLister, q.namespaceLister, q.clusterQuotaClient, q.clusterQuotaMapper)
97-
q.evaluator = resourcequota.NewQuotaEvaluator(clusterQuotaAccessor, install.DefaultIgnoredResources(), q.registry, q.lockAquisition, &resourcequotaapi.Configuration{}, numEvaluatorThreads, utilwait.NeverStop)
99+
q.evaluator = resourcequota.NewQuotaEvaluator(clusterQuotaAccessor, ignoredResources, q.registry, q.lockAquisition, &resourcequotaapi.Configuration{}, numEvaluatorThreads, utilwait.NeverStop)
98100
})
99101

100102
return q.evaluator.Evaluate(a)
@@ -174,3 +176,18 @@ type ByName []kapi.ResourceQuota
174176
func (v ByName) Len() int { return len(v) }
175177
func (v ByName) Swap(i, j int) { v[i], v[j] = v[j], v[i] }
176178
func (v ByName) Less(i, j int) bool { return v[i].Name < v[j].Name }
179+
180+
// ignoredResources is the set of resources that clusterquota ignores. It's larger because we have to ignore requests
181+
// that the namespace lifecycle plugin ignores. This is because of the need to have a matching namespace in order to be sure
182+
// that the cache is current enough to have mapped the CRQ to the namespaces. Normal RQ doesn't have that requirement.
183+
var ignoredResources = map[schema.GroupResource]struct{}{}
184+
185+
func init() {
186+
for k, _ := range install.DefaultIgnoredResources() {
187+
ignoredResources[k] = struct{}{}
188+
}
189+
for k, _ := range lifecycle.AccessReviewResources() {
190+
ignoredResources[k] = struct{}{}
191+
}
192+
193+
}

test/integration/oauth_serviceaccount_client_events_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ func TestOAuthServiceAccountClientEvent(t *testing.T) {
8787
annotationPrefix: saoauth.OAuthRedirectModelAnnotationReferencePrefix + "1",
8888
annotation: `{"kind":"foo","apiVersion":"oauth.openshift.io/v1","metadata":{"creationTimestamp":null},"reference":{"group":"foo","kind":"Route","name":"route1"}}`,
8989
expectedEventReason: "NoSAOAuthRedirectURIs",
90-
expectedEventMsg: `[no kind "foo" is registered for version "oauth.openshift.io/v1", system:serviceaccount:` + projectName + ":" + saName + " has no redirectURIs; set serviceaccounts.openshift.io/oauth-redirecturi.<some-value>=<redirect> or create a dynamic URI using serviceaccounts.openshift.io/oauth-redirectreference.<some-value>=<reference>]",
90+
expectedEventMsg: `[no kind "foo" is registered for version "oauth.openshift.io/v1" in scheme "github.com/openshift/origin/pkg/serviceaccounts/oauthclient/oauthclientregistry.go:54", system:serviceaccount:` + projectName + ":" + saName + " has no redirectURIs; set serviceaccounts.openshift.io/oauth-redirecturi.<some-value>=<redirect> or create a dynamic URI using serviceaccounts.openshift.io/oauth-redirectreference.<some-value>=<reference>]",
9191
numEvents: 1,
9292
expectBadRequest: true,
9393
},

0 commit comments

Comments
 (0)