-
Notifications
You must be signed in to change notification settings - Fork 2.3k
fix(kyaml/yaml): minor nil safety fix for RNode.Content etc #5985
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…l-safe" This change is addressing observed panics within kustomize that obscure the actual failure. The primary observed problem case involves RNode.Content.
|
This PR has multiple commits, and the default merge method is: merge. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
Welcome @joeycumines! |
|
Hi @joeycumines. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
koba1t
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for your contribution!
Changing to nil safe seems like an entirely welcome change.
I added a few review comments, please check that.
|
|
||
| // Content returns Node Content field. | ||
| func (rn *RNode) Content() []*yaml.Node { | ||
| if rn == nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please remain to check if rn == nil
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@koba1t do you still want this check retained with the knowledge that:
// YNode returns the yaml.Node value. If the yaml.Node value is a DocumentNode,
// YNode will return the DocumentNode Content entry instead of the DocumentNode.
func (rn *RNode) YNode() *yaml.Node {
if rn == nil || rn.value == nil {
return nil
}
will achieve the same?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think so.
Additionally, Please add a test to check if rn == nil.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There is already a test for that @koba1t.
The test I already added has two cases, one of which is where rn == nil.
kyaml/yaml/rnode.go
Outdated
| if rn.YNode().Kind != yaml.MappingNode { | ||
| return nil | ||
| if yNode := rn.YNode(); yNode != nil { | ||
| if yNode.Kind != yaml.MappingNode { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please don't make the indent too deep here.
I think it's better to first store the value in the local variable of yNode and then check with if yNode == nil in an early-return format.
kyaml/yaml/rnode.go
Outdated
| if rn == nil { | ||
| return nil | ||
| if yNode := rn.YNode(); yNode != nil { | ||
| return yNode.Content |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same.
I think it's better to first store the value in the local variable of yNode and then check with if yNode == nil in an early-return format.
kyaml/yaml/rnode.go
Outdated
| elem, err := rn.Pipe(MatchElement(key, value)) | ||
| if err != nil { | ||
| return nil | ||
| if yNode := rn.YNode(); yNode != nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same
kyaml/yaml/rnode.go
Outdated
| elem, err := rn.Pipe(MatchElementList(keys, values)) | ||
| if err != nil { | ||
| return nil | ||
| if yNode := rn.YNode(); yNode != nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same
| // Both of these scenarios should cause rn.YNode() to return nil. | ||
| nodesToTest := [...]struct { | ||
| name string | ||
| rn *RNode |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please add a test case that rn is nil
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There is one :) it tests both:
{"nil *RNode receiver", nil},
{"RNode with nil internal node", &RNode{value: nil}},
|
@koba1t I've updated the style of the guards per your request, please re-review / see my replies to your other comments :) |
|
/ok-to-test |
|
Thank you. Your explanation helped me understand what this test is doing. |
|
/lgtm |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: joeycumines, koba1t The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
…es-sigs#5985) * Fix kyaml/yaml field access deref nil value for methods that look "nil-safe" This change is addressing observed panics within kustomize that obscure the actual failure. The primary observed problem case involves RNode.Content. * Fix test case * Fixes from review
This MR contains the following updates: | Package | Update | Change | |---|---|---| | [kubernetes-sigs/kustomize](https://github.com/kubernetes-sigs/kustomize) | minor | `v5.7.1` -> `v5.8.0` | MR created with the help of [el-capitano/tools/renovate-bot](https://gitlab.com/el-capitano/tools/renovate-bot). **Proposed changes to behavior should be submitted there as MRs.** --- ### Release Notes <details> <summary>kubernetes-sigs/kustomize (kubernetes-sigs/kustomize)</summary> ### [`v5.8.0`](https://github.com/kubernetes-sigs/kustomize/releases/tag/kustomize/v5.8.0) [Compare Source](kubernetes-sigs/kustomize@kustomize/v5.7.1...kustomize/v5.8.0) ### Highlights ##### implements to replacements value in the structured data Now, We can edit yaml/json in yaml manifests with replacements transformer. See [#​5679](kubernetes-sigs/kustomize#5679) ##### For example ```yaml ## source apiVersion: v1 kind: ConfigMap metadata: name: source-configmap data: HOSTNAME: www.example.com --- apiVersion: v1 kind: ConfigMap metadata: name: target-configmap data: config.json: |- {"config": { "id": "42", "hostname": "REPLACE_TARGET_HOSTNAME" }} ``` ```yaml ## replacement replacements: - source: kind: ConfigMap name: source-configmap fieldPath: data.HOSTNAME targets: - select: kind: ConfigMap name: target-configmap fieldPaths: - data.config\.json.config.hostname ``` ##### fix: Propagate Namespace correctly to Helm The long-standing bug where kustomize's namespace transformer did not pass namespaces to helmCharts has been fixed. See [#​5940](kubernetes-sigs/kustomize#5940) ##### For example ```yaml ## define namespace namespace: any-namespace helmCharts: - name: minecraft repo: https://kubernetes-charts.storage.googleapis.com version: v1.2.0 # namespace: any-namespace ## propagates without additional namespace specific valuesFile: values.yaml ``` #### Feature [#​5679](kubernetes-sigs/kustomize#5679): implements to replacements value in the structured data [#​5863](kubernetes-sigs/kustomize#5863): Add regex support for Replacement selectors [#​5930](kubernetes-sigs/kustomize#5930): feat: add PatchArgs API type to populate patch options #### fix [#​5940](kubernetes-sigs/kustomize#5940): fix: Propagate Namespace correctly to Helm [#​5971](kubernetes-sigs/kustomize#5971): fix: performance recession when propagating namespace to helm [#​5942](kubernetes-sigs/kustomize#5942): fix fnplugin storagemounts validation [#​5958](kubernetes-sigs/kustomize#5958): fix: make AbsorbAll conflict error more verbose [#​5961](kubernetes-sigs/kustomize#5961): refactor: nested format string [#​5967](kubernetes-sigs/kustomize#5967): Fix infinite loop in HTTP client by validating URLs before requests [#​5985](kubernetes-sigs/kustomize#5985): fix(kyaml/yaml): minor nil safety fix for RNode.Content etc [#​5991](kubernetes-sigs/kustomize#5991): Fix duplicate key error when adding multiple labels with --without-selector #### Dependencies [#​5962](kubernetes-sigs/kustomize#5962): chore: update dependencies from security alert [#​5959](kubernetes-sigs/kustomize#5959): update go 1.24.6 #### chore [#​6007](kubernetes-sigs/kustomize#6007): Update kyaml to v0.21.0 [#​6008](kubernetes-sigs/kustomize#6008): Update cmd/config to v0.21.0 [#​6009](kubernetes-sigs/kustomize#6009): Update api to v0.21.0 </details> --- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever MR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this MR and you won't be reminded about this update again. --- - [ ] <!-- rebase-check -->If you want to rebase/retry this MR, check this box --- This MR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate). <!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS4xNzMuMSIsInVwZGF0ZWRJblZlciI6IjQxLjE3My4xIiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6WyJSZW5vdmF0ZSBCb3QiXX0=-->
…es-sigs#5985) * Fix kyaml/yaml field access deref nil value for methods that look "nil-safe" This change is addressing observed panics within kustomize that obscure the actual failure. The primary observed problem case involves RNode.Content. * Fix test case * Fixes from review
The
RNode.YNodemethod appears to make an effort to be "nil-safe". This change applies the same sort of behavior to a subset of other methods, e.g.RNode.Content, which access fields on the value returned by that method.N.B. This change was originally prepared based on v5.4.2, as panics were observed when applying patches, using the
kustomizecommand, indirectly, viaskaffold. I didn't go as far as to determine what specifically was happening there, and whatever issue was present is notably resolved, as of v5.7.1.With the above in mind, please close this PR if this change is not relevant or desirable 😄