mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	api: Handle validation of PodOS field presence
This commit is contained in:
		@@ -418,6 +418,8 @@ func GetValidationOptionsFromPodSpecAndMeta(podSpec, oldPodSpec *api.PodSpec, po
 | 
				
			|||||||
		AllowWindowsHostProcessField:    utilfeature.DefaultFeatureGate.Enabled(features.WindowsHostProcessContainers),
 | 
							AllowWindowsHostProcessField:    utilfeature.DefaultFeatureGate.Enabled(features.WindowsHostProcessContainers),
 | 
				
			||||||
		// Allow pod spec with expanded DNS configuration
 | 
							// Allow pod spec with expanded DNS configuration
 | 
				
			||||||
		AllowExpandedDNSConfig: utilfeature.DefaultFeatureGate.Enabled(features.ExpandedDNSConfig) || haveSameExpandedDNSConfig(podSpec, oldPodSpec),
 | 
							AllowExpandedDNSConfig: utilfeature.DefaultFeatureGate.Enabled(features.ExpandedDNSConfig) || haveSameExpandedDNSConfig(podSpec, oldPodSpec),
 | 
				
			||||||
 | 
							// Allow pod spec to use OS field
 | 
				
			||||||
 | 
							AllowOSField: utilfeature.DefaultFeatureGate.Enabled(features.IdentifyPodOS),
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if oldPodSpec != nil {
 | 
						if oldPodSpec != nil {
 | 
				
			||||||
@@ -433,6 +435,9 @@ func GetValidationOptionsFromPodSpecAndMeta(podSpec, oldPodSpec *api.PodSpec, po
 | 
				
			|||||||
		// if old spec has Windows Host Process fields set, we must allow it
 | 
							// if old spec has Windows Host Process fields set, we must allow it
 | 
				
			||||||
		opts.AllowWindowsHostProcessField = opts.AllowWindowsHostProcessField || setsWindowsHostProcess(oldPodSpec)
 | 
							opts.AllowWindowsHostProcessField = opts.AllowWindowsHostProcessField || setsWindowsHostProcess(oldPodSpec)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// if old spec has OS field set, we must allow it
 | 
				
			||||||
 | 
							opts.AllowOSField = opts.AllowOSField || oldPodSpec.OS != nil
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// if old spec used non-integer multiple of huge page unit size, we must allow it
 | 
							// if old spec used non-integer multiple of huge page unit size, we must allow it
 | 
				
			||||||
		opts.AllowIndivisibleHugePagesValues = usesIndivisibleHugePagesValues(oldPodSpec)
 | 
							opts.AllowIndivisibleHugePagesValues = usesIndivisibleHugePagesValues(oldPodSpec)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -564,10 +569,24 @@ func dropDisabledFields(
 | 
				
			|||||||
		// does not specify any values for these fields.
 | 
							// does not specify any values for these fields.
 | 
				
			||||||
		podSpec.PreemptionPolicy = nil
 | 
							podSpec.PreemptionPolicy = nil
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
						if !utilfeature.DefaultFeatureGate.Enabled(features.IdentifyPodOS) && !podOSInUse(oldPodSpec) {
 | 
				
			||||||
 | 
							podSpec.OS = nil
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	dropDisabledPodAffinityTermFields(podSpec, oldPodSpec)
 | 
						dropDisabledPodAffinityTermFields(podSpec, oldPodSpec)
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// podOSInUse returns true if the pod spec is non-nil and has OS field set
 | 
				
			||||||
 | 
					func podOSInUse(podSpec *api.PodSpec) bool {
 | 
				
			||||||
 | 
						if podSpec == nil {
 | 
				
			||||||
 | 
							return false
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if podSpec.OS != nil {
 | 
				
			||||||
 | 
							return true
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return false
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// dropDisabledProcMountField removes disabled fields from PodSpec related
 | 
					// dropDisabledProcMountField removes disabled fields from PodSpec related
 | 
				
			||||||
// to ProcMount only if it is not already used by the old spec
 | 
					// to ProcMount only if it is not already used by the old spec
 | 
				
			||||||
func dropDisabledProcMountField(podSpec, oldPodSpec *api.PodSpec) {
 | 
					func dropDisabledProcMountField(podSpec, oldPodSpec *api.PodSpec) {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1708,3 +1708,85 @@ func TestDropDisabledPodAffinityTermFields(t *testing.T) {
 | 
				
			|||||||
		})
 | 
							})
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func TestDropOSField(t *testing.T) {
 | 
				
			||||||
 | 
						podWithOSField := func() *api.Pod {
 | 
				
			||||||
 | 
							osField := api.PodOS{Name: "linux"}
 | 
				
			||||||
 | 
							return &api.Pod{
 | 
				
			||||||
 | 
								Spec: api.PodSpec{
 | 
				
			||||||
 | 
									OS: &osField,
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						podWithoutOSField := func() *api.Pod { return &api.Pod{} }
 | 
				
			||||||
 | 
						podInfo := []struct {
 | 
				
			||||||
 | 
							description   string
 | 
				
			||||||
 | 
							hasPodOSField bool
 | 
				
			||||||
 | 
							pod           func() *api.Pod
 | 
				
			||||||
 | 
						}{
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								description:   "has PodOS field",
 | 
				
			||||||
 | 
								hasPodOSField: true,
 | 
				
			||||||
 | 
								pod:           podWithOSField,
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								description:   "does not have PodOS field",
 | 
				
			||||||
 | 
								hasPodOSField: false,
 | 
				
			||||||
 | 
								pod:           podWithoutOSField,
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								description:   "is nil",
 | 
				
			||||||
 | 
								hasPodOSField: false,
 | 
				
			||||||
 | 
								pod:           func() *api.Pod { return nil },
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						for _, enabled := range []bool{true, false} {
 | 
				
			||||||
 | 
							for _, oldPodInfo := range podInfo {
 | 
				
			||||||
 | 
								for _, newPodInfo := range podInfo {
 | 
				
			||||||
 | 
									oldPodHasOsField, oldPod := oldPodInfo.hasPodOSField, oldPodInfo.pod()
 | 
				
			||||||
 | 
									newPodHasOSField, newPod := newPodInfo.hasPodOSField, newPodInfo.pod()
 | 
				
			||||||
 | 
									if newPod == nil {
 | 
				
			||||||
 | 
										continue
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									t.Run(fmt.Sprintf("feature enabled=%v, old pod %v, new pod %v", enabled, oldPodInfo.description, newPodInfo.description), func(t *testing.T) {
 | 
				
			||||||
 | 
										defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.IdentifyPodOS, enabled)()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
										var oldPodSpec *api.PodSpec
 | 
				
			||||||
 | 
										if oldPod != nil {
 | 
				
			||||||
 | 
											oldPodSpec = &oldPod.Spec
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
										dropDisabledFields(&newPod.Spec, nil, oldPodSpec, nil)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
										// old pod should never be changed
 | 
				
			||||||
 | 
										if !reflect.DeepEqual(oldPod, oldPodInfo.pod()) {
 | 
				
			||||||
 | 
											t.Errorf("old pod changed: %v", cmp.Diff(oldPod, oldPodInfo.pod()))
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
										switch {
 | 
				
			||||||
 | 
										case enabled || oldPodHasOsField:
 | 
				
			||||||
 | 
											// new pod should not be changed if the feature is enabled, or if the old pod had subpaths
 | 
				
			||||||
 | 
											if !reflect.DeepEqual(newPod, newPodInfo.pod()) {
 | 
				
			||||||
 | 
												t.Errorf("new pod changed: %v", cmp.Diff(newPod, newPodInfo.pod()))
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
										case newPodHasOSField:
 | 
				
			||||||
 | 
											// new pod should be changed
 | 
				
			||||||
 | 
											if reflect.DeepEqual(newPod, newPodInfo.pod()) {
 | 
				
			||||||
 | 
												t.Errorf("new pod was not changed")
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
											// new pod should not have OSfield
 | 
				
			||||||
 | 
											if !reflect.DeepEqual(newPod, podWithoutOSField()) {
 | 
				
			||||||
 | 
												t.Errorf("new pod has OS field: %v", cmp.Diff(newPod, podWithoutOSField()))
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
										default:
 | 
				
			||||||
 | 
											// new pod should not need to be changed
 | 
				
			||||||
 | 
											if !reflect.DeepEqual(newPod, newPodInfo.pod()) {
 | 
				
			||||||
 | 
												t.Errorf("new pod changed: %v", cmp.Diff(newPod, newPodInfo.pod()))
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									})
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -98,6 +98,12 @@ var allowedEphemeralContainerFields = map[string]bool{
 | 
				
			|||||||
	"TTY":                      true,
 | 
						"TTY":                      true,
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// validOS stores the set of valid OSes within pod spec.
 | 
				
			||||||
 | 
					// The valid values currently are linux, windows.
 | 
				
			||||||
 | 
					// In future, they can be expanded to values from
 | 
				
			||||||
 | 
					// https://github.com/opencontainers/runtime-spec/blob/master/config.md#platform-specific-configuration
 | 
				
			||||||
 | 
					var validOS = sets.NewString(string(core.Linux), string(core.Windows))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// ValidateHasLabel requires that metav1.ObjectMeta has a Label with key and expectedValue
 | 
					// ValidateHasLabel requires that metav1.ObjectMeta has a Label with key and expectedValue
 | 
				
			||||||
func ValidateHasLabel(meta metav1.ObjectMeta, fldPath *field.Path, key, expectedValue string) field.ErrorList {
 | 
					func ValidateHasLabel(meta metav1.ObjectMeta, fldPath *field.Path, key, expectedValue string) field.ErrorList {
 | 
				
			||||||
	allErrs := field.ErrorList{}
 | 
						allErrs := field.ErrorList{}
 | 
				
			||||||
@@ -2923,7 +2929,7 @@ func validateFieldAllowList(value interface{}, allowedFields map[string]bool, er
 | 
				
			|||||||
	return allErrs
 | 
						return allErrs
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func validateInitContainers(containers, otherContainers []core.Container, deviceVolumes map[string]core.VolumeSource, fldPath *field.Path, opts PodValidationOptions) field.ErrorList {
 | 
					func validateInitContainers(containers []core.Container, otherContainers []core.Container, deviceVolumes map[string]core.VolumeSource, fldPath *field.Path, opts PodValidationOptions) field.ErrorList {
 | 
				
			||||||
	var allErrs field.ErrorList
 | 
						var allErrs field.ErrorList
 | 
				
			||||||
	if len(containers) > 0 {
 | 
						if len(containers) > 0 {
 | 
				
			||||||
		allErrs = append(allErrs, validateContainers(containers, true, deviceVolumes, fldPath, opts)...)
 | 
							allErrs = append(allErrs, validateContainers(containers, true, deviceVolumes, fldPath, opts)...)
 | 
				
			||||||
@@ -3347,6 +3353,8 @@ type PodValidationOptions struct {
 | 
				
			|||||||
	AllowWindowsHostProcessField bool
 | 
						AllowWindowsHostProcessField bool
 | 
				
			||||||
	// Allow more DNSSearchPaths and longer DNSSearchListChars
 | 
						// Allow more DNSSearchPaths and longer DNSSearchListChars
 | 
				
			||||||
	AllowExpandedDNSConfig bool
 | 
						AllowExpandedDNSConfig bool
 | 
				
			||||||
 | 
						// Allow OSField to be set in the pod spec
 | 
				
			||||||
 | 
						AllowOSField bool
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// validatePodMetadataAndSpec tests if required fields in the pod.metadata and pod.spec are set,
 | 
					// validatePodMetadataAndSpec tests if required fields in the pod.metadata and pod.spec are set,
 | 
				
			||||||
@@ -3503,6 +3511,115 @@ func ValidatePodSpec(spec *core.PodSpec, podMeta *metav1.ObjectMeta, fldPath *fi
 | 
				
			|||||||
		allErrs = append(allErrs, validateOverhead(spec.Overhead, fldPath.Child("overhead"), opts)...)
 | 
							allErrs = append(allErrs, validateOverhead(spec.Overhead, fldPath.Child("overhead"), opts)...)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if spec.OS != nil {
 | 
				
			||||||
 | 
							osErrs := validateOS(spec, fldPath.Child("os"), opts)
 | 
				
			||||||
 | 
							switch {
 | 
				
			||||||
 | 
							case len(osErrs) > 0:
 | 
				
			||||||
 | 
								allErrs = append(allErrs, osErrs...)
 | 
				
			||||||
 | 
							case spec.OS.Name == core.Linux:
 | 
				
			||||||
 | 
								allErrs = append(allErrs, validateLinux(spec, fldPath)...)
 | 
				
			||||||
 | 
							case spec.OS.Name == core.Windows:
 | 
				
			||||||
 | 
								allErrs = append(allErrs, validateWindows(spec, fldPath)...)
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return allErrs
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func validateLinux(spec *core.PodSpec, fldPath *field.Path) field.ErrorList {
 | 
				
			||||||
 | 
						allErrs := field.ErrorList{}
 | 
				
			||||||
 | 
						securityContext := spec.SecurityContext
 | 
				
			||||||
 | 
						if securityContext != nil && securityContext.WindowsOptions != nil {
 | 
				
			||||||
 | 
							allErrs = append(allErrs, field.Forbidden(fldPath.Child("securityContext").Child("windowsOptions"), "windows options cannot be set for a linux pod"))
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						podshelper.VisitContainersWithPath(spec, fldPath, func(c *core.Container, cFldPath *field.Path) bool {
 | 
				
			||||||
 | 
							sc := c.SecurityContext
 | 
				
			||||||
 | 
							if sc != nil && sc.WindowsOptions != nil {
 | 
				
			||||||
 | 
								fldPath := cFldPath.Child("securityContext")
 | 
				
			||||||
 | 
								allErrs = append(allErrs, field.Forbidden(fldPath.Child("windowsOptions"), "windows options cannot be set for a linux pod"))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return true
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
						return allErrs
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func validateWindows(spec *core.PodSpec, fldPath *field.Path) field.ErrorList {
 | 
				
			||||||
 | 
						allErrs := field.ErrorList{}
 | 
				
			||||||
 | 
						securityContext := spec.SecurityContext
 | 
				
			||||||
 | 
						// validate Pod SecurityContext
 | 
				
			||||||
 | 
						if securityContext != nil {
 | 
				
			||||||
 | 
							if securityContext.SELinuxOptions != nil {
 | 
				
			||||||
 | 
								allErrs = append(allErrs, field.Forbidden(fldPath.Child("securityContext").Child("seLinuxOptions"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if securityContext.HostPID {
 | 
				
			||||||
 | 
								allErrs = append(allErrs, field.Forbidden(fldPath.Child("hostPID"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if securityContext.HostIPC {
 | 
				
			||||||
 | 
								allErrs = append(allErrs, field.Forbidden(fldPath.Child("hostIPC"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if securityContext.SeccompProfile != nil {
 | 
				
			||||||
 | 
								allErrs = append(allErrs, field.Forbidden(fldPath.Child("securityContext").Child("seccompProfile"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if securityContext.FSGroup != nil {
 | 
				
			||||||
 | 
								allErrs = append(allErrs, field.Forbidden(fldPath.Child("securityContext").Child("fsGroup"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if securityContext.FSGroupChangePolicy != nil {
 | 
				
			||||||
 | 
								allErrs = append(allErrs, field.Forbidden(fldPath.Child("securityContext").Child("fsGroupChangePolicy"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if len(securityContext.Sysctls) > 0 {
 | 
				
			||||||
 | 
								allErrs = append(allErrs, field.Forbidden(fldPath.Child("securityContext").Child("sysctls"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if securityContext.ShareProcessNamespace != nil {
 | 
				
			||||||
 | 
								allErrs = append(allErrs, field.Forbidden(fldPath.Child("shareProcessNamespace"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if securityContext.RunAsUser != nil {
 | 
				
			||||||
 | 
								allErrs = append(allErrs, field.Forbidden(fldPath.Child("securityContext").Child("runAsUser"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if securityContext.RunAsGroup != nil {
 | 
				
			||||||
 | 
								allErrs = append(allErrs, field.Forbidden(fldPath.Child("securityContext").Child("runAsGroup"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if securityContext.SupplementalGroups != nil {
 | 
				
			||||||
 | 
								allErrs = append(allErrs, field.Forbidden(fldPath.Child("securityContext").Child("supplementalGroups"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						podshelper.VisitContainersWithPath(spec, fldPath, func(c *core.Container, cFldPath *field.Path) bool {
 | 
				
			||||||
 | 
							// validate container security context
 | 
				
			||||||
 | 
							sc := c.SecurityContext
 | 
				
			||||||
 | 
							// OS based podSecurityContext validation
 | 
				
			||||||
 | 
							// There is some naming overlap between Windows and Linux Security Contexts but all the Windows Specific options
 | 
				
			||||||
 | 
							// are set via securityContext.WindowsOptions which we validate below
 | 
				
			||||||
 | 
							// TODO: Think if we need to relax this restriction or some of the restrictions
 | 
				
			||||||
 | 
							if sc != nil {
 | 
				
			||||||
 | 
								fldPath := cFldPath.Child("securityContext")
 | 
				
			||||||
 | 
								if sc.SELinuxOptions != nil {
 | 
				
			||||||
 | 
									allErrs = append(allErrs, field.Forbidden(fldPath.Child("seLinuxOptions"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								if sc.SeccompProfile != nil {
 | 
				
			||||||
 | 
									allErrs = append(allErrs, field.Forbidden(fldPath.Child("seccompProfile"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								if sc.Capabilities != nil {
 | 
				
			||||||
 | 
									allErrs = append(allErrs, field.Forbidden(fldPath.Child("capabilities"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								if sc.ReadOnlyRootFilesystem != nil {
 | 
				
			||||||
 | 
									allErrs = append(allErrs, field.Forbidden(fldPath.Child("readOnlyRootFilesystem"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								if sc.Privileged != nil {
 | 
				
			||||||
 | 
									allErrs = append(allErrs, field.Forbidden(fldPath.Child("privileged"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								if sc.AllowPrivilegeEscalation != nil {
 | 
				
			||||||
 | 
									allErrs = append(allErrs, field.Forbidden(fldPath.Child("allowPrivilegeEscalation"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								if sc.ProcMount != nil {
 | 
				
			||||||
 | 
									allErrs = append(allErrs, field.Forbidden(fldPath.Child("procMount"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								if sc.RunAsUser != nil {
 | 
				
			||||||
 | 
									allErrs = append(allErrs, field.Forbidden(fldPath.Child("runAsUser"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								if sc.RunAsGroup != nil {
 | 
				
			||||||
 | 
									allErrs = append(allErrs, field.Forbidden(fldPath.Child("runAsGroup"), "cannot be set for a windows pod"))
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return true
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
	return allErrs
 | 
						return allErrs
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -6174,6 +6291,26 @@ func validateWindowsHostProcessPod(podSpec *core.PodSpec, fieldPath *field.Path,
 | 
				
			|||||||
	return allErrs
 | 
						return allErrs
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// validateOS validates the OS field within pod spec
 | 
				
			||||||
 | 
					func validateOS(podSpec *core.PodSpec, fldPath *field.Path, opts PodValidationOptions) field.ErrorList {
 | 
				
			||||||
 | 
						allErrs := field.ErrorList{}
 | 
				
			||||||
 | 
						os := podSpec.OS
 | 
				
			||||||
 | 
						if os == nil {
 | 
				
			||||||
 | 
							return allErrs
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if !opts.AllowOSField {
 | 
				
			||||||
 | 
							return append(allErrs, field.Forbidden(fldPath, "cannot be set when IdentifyPodOS feature is not enabled"))
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if len(os.Name) == 0 {
 | 
				
			||||||
 | 
							return append(allErrs, field.Required(fldPath.Child("name"), "cannot be empty"))
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						osName := string(os.Name)
 | 
				
			||||||
 | 
						if !validOS.Has(osName) {
 | 
				
			||||||
 | 
							allErrs = append(allErrs, field.NotSupported(fldPath, osName, validOS.List()))
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return allErrs
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func ValidatePodLogOptions(opts *core.PodLogOptions) field.ErrorList {
 | 
					func ValidatePodLogOptions(opts *core.PodLogOptions) field.ErrorList {
 | 
				
			||||||
	allErrs := field.ErrorList{}
 | 
						allErrs := field.ErrorList{}
 | 
				
			||||||
	if opts.TailLines != nil && *opts.TailLines < 0 {
 | 
						if opts.TailLines != nil && *opts.TailLines < 0 {
 | 
				
			||||||
 
 | 
				
			|||||||
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
		Reference in New Issue
	
	Block a user