Merge pull request #41737 from alexzielenski/4008-crd-validation
Add Documentation for CRD Validation Ratchetingpull/42462/head
commit
a2cf620ad5
|
@ -209,7 +209,7 @@ Aggregated APIs offer more advanced API features and customization of other feat
|
|||
|
||||
| Feature | Description | CRDs | Aggregated API |
|
||||
| ------- | ----------- | ---- | -------------- |
|
||||
| Validation | Help users prevent errors and allow you to evolve your API independently of your clients. These features are most useful when there are many clients who can't all update at the same time. | Yes. Most validation can be specified in the CRD using [OpenAPI v3.0 validation](/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definitions/#validation). Any other validations supported by addition of a [Validating Webhook](/docs/reference/access-authn-authz/admission-controllers/#validatingadmissionwebhook-alpha-in-1-8-beta-in-1-9). | Yes, arbitrary validation checks |
|
||||
| Validation | Help users prevent errors and allow you to evolve your API independently of your clients. These features are most useful when there are many clients who can't all update at the same time. | Yes. Most validation can be specified in the CRD using [OpenAPI v3.0 validation](/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definitions/#validation). [CRDValidationRatcheting](/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definitions/#validation-ratcheting) feature gate allows failing validations specified using OpenAPI also can be ignored if the failing part of the resource was unchanged. Any other validations supported by addition of a [Validating Webhook](/docs/reference/access-authn-authz/admission-controllers/#validatingadmissionwebhook-alpha-in-1-8-beta-in-1-9). | Yes, arbitrary validation checks |
|
||||
| Defaulting | See above | Yes, either via [OpenAPI v3.0 validation](/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definitions/#defaulting) `default` keyword (GA in 1.17), or via a [Mutating Webhook](/docs/reference/access-authn-authz/admission-controllers/#mutatingadmissionwebhook) (though this will not be run when reading from etcd for old objects). | Yes |
|
||||
| Multi-versioning | Allows serving the same object through two API versions. Can help ease API changes like renaming fields. Less important if you control your client versions. | [Yes](/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definition-versioning) | Yes |
|
||||
| Custom Storage | If you need storage with a different performance mode (for example, a time-series database instead of key-value store) or isolation for security (for example, encryption of sensitive information, etc.) | No | Yes |
|
||||
|
|
|
@ -88,6 +88,7 @@ For a reference to old feature gates that are removed, please refer to
|
|||
| `ComponentSLIs` | `true` | Beta | 1.27 | |
|
||||
| `ContainerCheckpoint` | `false` | Alpha | 1.25 | |
|
||||
| `ContextualLogging` | `false` | Alpha | 1.24 | |
|
||||
| CRDValidationRatcheting | false | Alpha | 1.28 |
|
||||
| `CrossNamespaceVolumeDataSource` | `false` | Alpha| 1.26 | |
|
||||
| `CustomCPUCFSQuotaPeriod` | `false` | Alpha | 1.12 | |
|
||||
| `CustomResourceValidationExpressions` | `false` | Alpha | 1.23 | 1.24 |
|
||||
|
@ -472,6 +473,9 @@ Each feature gate is designed for enabling/disabling a specific feature:
|
|||
- `ContextualLogging`: When you enable this feature gate, Kubernetes components that support
|
||||
contextual logging add extra detail to log output.
|
||||
- `CronJobTimeZone`: Allow the use of the `timeZone` optional field in [CronJobs](/docs/concepts/workloads/controllers/cron-jobs/)
|
||||
- `CRDValidationRatcheting`: Enable updates to custom resources to contain
|
||||
violations of their OpenAPI schema if the offending portions of the resource
|
||||
update did not change. See [Validation Ratcheting](/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definitions/#validation-ratcheting) for more details.
|
||||
- `CrossNamespaceVolumeDataSource`: Enable the usage of cross namespace volume data source
|
||||
to allow you to specify a source namespace in the `dataSourceRef` field of a
|
||||
PersistentVolumeClaim.
|
||||
|
|
|
@ -717,6 +717,57 @@ And create it:
|
|||
kubectl apply -f my-crontab.yaml
|
||||
crontab "my-new-cron-object" created
|
||||
```
|
||||
### Validation ratcheting
|
||||
|
||||
{{< feature-state state="alpha" for_k8s_version="v1.28" >}}
|
||||
|
||||
You need to enable the `CRDValidationRatcheting`
|
||||
[feature gate](/docs/reference/command-line-tools-reference/feature-gates/) to
|
||||
use this behavior, which then applies to all CustomResourceDefinitions in your
|
||||
cluster.
|
||||
|
||||
Provided you enabled the feature gate, Kubernetes implements _validation racheting_
|
||||
for CustomResourceDefinitions. The API server is willing accept updates to resources that
|
||||
are not valid after the update, provided that each part of the resource that failed to validate
|
||||
was not changed by the update operation. In other words, any invalid part of the resource
|
||||
that remains invalid must have already been wrong.
|
||||
You cannot use this mechanism to update a valid resource so that it becomes invalid.
|
||||
|
||||
This feature allows authors of CRDs to confidently add new validations to the
|
||||
OpenAPIV3 schema under certain conditions. Users can update to the new schema
|
||||
safely without bumping the version of the object or breaking workflows.
|
||||
|
||||
While most validations placed in the OpenAPIV3 schema of a CRD are support
|
||||
ratcheting, there are a few exceptions. The following OpenAPIV3 schema
|
||||
validations are not supported by ratcheting under the implementation in Kubernetes
|
||||
{{< skew currentVersion >}} and if violated will continue to throw an error as normally:
|
||||
|
||||
- Quantors
|
||||
- `allOf`
|
||||
- `oneOf`
|
||||
- `anyOf`
|
||||
- `not`
|
||||
- any validations in a descendent of one of these fields
|
||||
- `x-kubernetes-validations`
|
||||
For Kubernetes {{< skew currentVersion >}}, CRD validation rules](#validation-rules) are ignored by
|
||||
ratcheting. This may change in later Kubernetes releases.
|
||||
- `x-kubernetes-list-type`
|
||||
Errors arising from changing the list type of a subschema will not be
|
||||
ratcheted. For example adding `set` onto a list with duplicates will always
|
||||
result in an error.
|
||||
- `x-kubernetes-map-keys`
|
||||
Errors arising from changing the map keys of a list schema will not be
|
||||
ratcheted.
|
||||
- `required`
|
||||
Errors arising from changing the list of required fields will not be ratcheted.
|
||||
- `properties`
|
||||
Adding/removing/modifying the names of properties is not ratcheted, but
|
||||
changes to validations in each properties' schemas and subschemas may be ratcheted
|
||||
if the name of the property stays the same.
|
||||
- `additionalProperties`
|
||||
To remove a previously specified `additionalProperties` validation will not be
|
||||
ratcheted.
|
||||
|
||||
|
||||
## Validation rules
|
||||
|
||||
|
|
Loading…
Reference in New Issue