Skip to content

Conversation

@joeycumines
Copy link
Contributor

The RNode.YNode method appears to make an effort to be "nil-safe". This change applies the same sort of behavior to a subset of other methods, e.g. RNode.Content, which access fields on the value returned by that method.

N.B. This change was originally prepared based on v5.4.2, as panics were observed when applying patches, using the kustomize command, indirectly, via skaffold. I didn't go as far as to determine what specifically was happening there, and whatever issue was present is notably resolved, as of v5.7.1.

With the above in mind, please close this PR if this change is not relevant or desirable 😄

…l-safe"

This change is addressing observed panics within kustomize that obscure the
actual failure. The primary observed problem case involves RNode.Content.
@k8s-ci-robot
Copy link
Contributor

This PR has multiple commits, and the default merge method is: merge.
You can request commits to be squashed using the label: tide/merge-method-squash

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Sep 17, 2025
@k8s-ci-robot
Copy link
Contributor

Welcome @joeycumines!

It looks like this is your first PR to kubernetes-sigs/kustomize 🎉. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.

You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.

You can also check if kubernetes-sigs/kustomize has its own contribution guidelines.

You may want to refer to our testing guide if you run into trouble with your tests not passing.

If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!

Thank you, and welcome to Kubernetes. 😃

@k8s-ci-robot k8s-ci-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Sep 17, 2025
@k8s-ci-robot
Copy link
Contributor

Hi @joeycumines. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@k8s-ci-robot k8s-ci-robot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Sep 17, 2025
Copy link
Member

@koba1t koba1t left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for your contribution!
Changing to nil safe seems like an entirely welcome change.

I added a few review comments, please check that.


// Content returns Node Content field.
func (rn *RNode) Content() []*yaml.Node {
if rn == nil {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please remain to check if rn == nil

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@koba1t do you still want this check retained with the knowledge that:

// YNode returns the yaml.Node value.  If the yaml.Node value is a DocumentNode,
// YNode will return the DocumentNode Content entry instead of the DocumentNode.
func (rn *RNode) YNode() *yaml.Node {
	if rn == nil || rn.value == nil {
		return nil
	}

will achieve the same?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think so.

Additionally, Please add a test to check if rn == nil.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There is already a test for that @koba1t.

The test I already added has two cases, one of which is where rn == nil.

if rn.YNode().Kind != yaml.MappingNode {
return nil
if yNode := rn.YNode(); yNode != nil {
if yNode.Kind != yaml.MappingNode {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please don't make the indent too deep here.
I think it's better to first store the value in the local variable of yNode and then check with if yNode == nil in an early-return format.

if rn == nil {
return nil
if yNode := rn.YNode(); yNode != nil {
return yNode.Content
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same.
I think it's better to first store the value in the local variable of yNode and then check with if yNode == nil in an early-return format.

elem, err := rn.Pipe(MatchElement(key, value))
if err != nil {
return nil
if yNode := rn.YNode(); yNode != nil {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same

elem, err := rn.Pipe(MatchElementList(keys, values))
if err != nil {
return nil
if yNode := rn.YNode(); yNode != nil {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same

// Both of these scenarios should cause rn.YNode() to return nil.
nodesToTest := [...]struct {
name string
rn *RNode
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please add a test case that rn is nil

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There is one :) it tests both:

		{"nil *RNode receiver", nil},
		{"RNode with nil internal node", &RNode{value: nil}},

@joeycumines joeycumines requested a review from koba1t October 6, 2025 01:59
@k8s-ci-robot k8s-ci-robot added size/M Denotes a PR that changes 30-99 lines, ignoring generated files. and removed size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Oct 6, 2025
@joeycumines
Copy link
Contributor Author

@koba1t I've updated the style of the guards per your request, please re-review / see my replies to your other comments :)

@koba1t koba1t added the tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges. label Oct 6, 2025
@koba1t
Copy link
Member

koba1t commented Oct 6, 2025

/ok-to-test

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Oct 6, 2025
@koba1t
Copy link
Member

koba1t commented Nov 3, 2025

Thank you. Your explanation helped me understand what this test is doing.

@koba1t
Copy link
Member

koba1t commented Nov 3, 2025

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Nov 3, 2025
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: joeycumines, koba1t

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Nov 3, 2025
@k8s-ci-robot k8s-ci-robot merged commit 8761791 into kubernetes-sigs:master Nov 3, 2025
11 checks passed
carlosonunez-redhat pushed a commit to carlosonunez-redhat/kustomize that referenced this pull request Nov 3, 2025
…es-sigs#5985)

* Fix kyaml/yaml field access deref nil value for methods that look "nil-safe"

This change is addressing observed panics within kustomize that obscure the
actual failure. The primary observed problem case involves RNode.Content.

* Fix test case

* Fixes from review
tmeijn pushed a commit to tmeijn/dotfiles that referenced this pull request Nov 14, 2025
This MR contains the following updates:

| Package | Update | Change |
|---|---|---|
| [kubernetes-sigs/kustomize](https://github.com/kubernetes-sigs/kustomize) | minor | `v5.7.1` -> `v5.8.0` |

MR created with the help of [el-capitano/tools/renovate-bot](https://gitlab.com/el-capitano/tools/renovate-bot).

**Proposed changes to behavior should be submitted there as MRs.**

---

### Release Notes

<details>
<summary>kubernetes-sigs/kustomize (kubernetes-sigs/kustomize)</summary>

### [`v5.8.0`](https://github.com/kubernetes-sigs/kustomize/releases/tag/kustomize/v5.8.0)

[Compare Source](kubernetes-sigs/kustomize@kustomize/v5.7.1...kustomize/v5.8.0)

### Highlights

##### implements to replacements value in the structured data

Now, We can edit yaml/json in yaml manifests with replacements transformer.
See [#&#8203;5679](kubernetes-sigs/kustomize#5679)

##### For example

```yaml

## source
apiVersion: v1
kind: ConfigMap
metadata:
  name: source-configmap
data:
  HOSTNAME: www.example.com
---
apiVersion: v1
kind: ConfigMap
metadata:
  name: target-configmap
data:
  config.json: |-
    {"config": {
      "id": "42",
      "hostname": "REPLACE_TARGET_HOSTNAME"
    }}
```

```yaml

## replacement
replacements:
- source:
    kind: ConfigMap
    name: source-configmap
    fieldPath: data.HOSTNAME
  targets:
  - select:
      kind: ConfigMap
      name: target-configmap
    fieldPaths:
    - data.config\.json.config.hostname
```

##### fix: Propagate Namespace correctly to Helm

The long-standing bug where kustomize's namespace transformer did not pass namespaces to helmCharts has been fixed.
See [#&#8203;5940](kubernetes-sigs/kustomize#5940)

##### For example

```yaml

## define namespace
namespace: any-namespace

helmCharts:
- name: minecraft
  repo: https://kubernetes-charts.storage.googleapis.com
  version: v1.2.0
  # namespace: any-namespace   ## propagates without additional namespace specific
  valuesFile: values.yaml
```

#### Feature

[#&#8203;5679](kubernetes-sigs/kustomize#5679): implements to replacements value in the structured data
[#&#8203;5863](kubernetes-sigs/kustomize#5863): Add regex support for Replacement selectors
[#&#8203;5930](kubernetes-sigs/kustomize#5930): feat: add PatchArgs API type to populate patch options

#### fix

[#&#8203;5940](kubernetes-sigs/kustomize#5940): fix: Propagate Namespace correctly to Helm
[#&#8203;5971](kubernetes-sigs/kustomize#5971): fix: performance recession when propagating namespace to helm
[#&#8203;5942](kubernetes-sigs/kustomize#5942): fix fnplugin storagemounts validation
[#&#8203;5958](kubernetes-sigs/kustomize#5958): fix: make AbsorbAll conflict error more verbose
[#&#8203;5961](kubernetes-sigs/kustomize#5961): refactor: nested format string
[#&#8203;5967](kubernetes-sigs/kustomize#5967): Fix infinite loop in HTTP client by validating URLs before requests
[#&#8203;5985](kubernetes-sigs/kustomize#5985): fix(kyaml/yaml): minor nil safety fix for RNode.Content etc
[#&#8203;5991](kubernetes-sigs/kustomize#5991): Fix duplicate key error when adding multiple labels with --without-selector

#### Dependencies

[#&#8203;5962](kubernetes-sigs/kustomize#5962): chore: update dependencies from security alert
[#&#8203;5959](kubernetes-sigs/kustomize#5959): update go 1.24.6

#### chore

[#&#8203;6007](kubernetes-sigs/kustomize#6007): Update kyaml to v0.21.0
[#&#8203;6008](kubernetes-sigs/kustomize#6008): Update cmd/config to v0.21.0
[#&#8203;6009](kubernetes-sigs/kustomize#6009): Update api to v0.21.0

</details>

---

### Configuration

📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever MR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this MR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this MR, check this box

---

This MR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS4xNzMuMSIsInVwZGF0ZWRJblZlciI6IjQxLjE3My4xIiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6WyJSZW5vdmF0ZSBCb3QiXX0=-->
koba1t pushed a commit to koba1t/kustomize that referenced this pull request Nov 17, 2025
…es-sigs#5985)

* Fix kyaml/yaml field access deref nil value for methods that look "nil-safe"

This change is addressing observed panics within kustomize that obscure the
actual failure. The primary observed problem case involves RNode.Content.

* Fix test case

* Fixes from review
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants