Skip to content

Commit b401112

Browse files
authored
Merge pull request #4940 from XiShanYongYe-Chang/remove-retain-annotations-logic
[Cleanup] remove retain annotations logic
2 parents 774a2b1 + 581f392 commit b401112

File tree

2 files changed

+16
-31
lines changed

2 files changed

+16
-31
lines changed

pkg/resourceinterpreter/default/native/retain.go

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ package native
1818

1919
import (
2020
"fmt"
21-
"strings"
2221

2322
appsv1 "k8s.io/api/apps/v1"
2423
batchv1 "k8s.io/api/batch/v1"
@@ -165,18 +164,6 @@ func retainWorkloadReplicas(desired, observed *unstructured.Unstructured) (*unst
165164

166165
func retainSecretServiceAccountToken(desired *unstructured.Unstructured, observed *unstructured.Unstructured) (retained *unstructured.Unstructured, err error) {
167166
if secretType, exists, _ := unstructured.NestedString(desired.Object, "type"); exists && secretType == string(corev1.SecretTypeServiceAccountToken) {
168-
// retain service-account.uid which is a unique per cluster
169-
serviceAccountUIDPath := []string{"metadata", "annotations", corev1.ServiceAccountUIDKey}
170-
uid, exist, err := unstructured.NestedString(observed.Object, serviceAccountUIDPath...)
171-
if err != nil {
172-
return nil, fmt.Errorf("failed to get %s from desired.Object: %+v", corev1.ServiceAccountUIDKey, err)
173-
}
174-
if exist {
175-
if err := unstructured.SetNestedField(desired.Object, uid, serviceAccountUIDPath...); err != nil {
176-
return nil, fmt.Errorf("failed to set %s for %s %s/%s", strings.Join(serviceAccountUIDPath, "."), desired.GetKind(), desired.GetNamespace(), desired.GetName())
177-
}
178-
}
179-
180167
// retain token generated by cluster kube-controller-manager
181168
data, exist, err := unstructured.NestedStringMap(observed.Object, "data")
182169
if err != nil {

pkg/resourceinterpreter/default/native/retain_test.go

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -111,13 +111,11 @@ func Test_retainK8sWorkloadReplicas(t *testing.T) {
111111
}
112112

113113
func Test_retainSecretServiceAccountToken(t *testing.T) {
114-
createSecret := func(secretType corev1.SecretType, uuid, key, value string) *unstructured.Unstructured {
114+
createSecret := func(secretType corev1.SecretType, dataKey, dataValue string) *unstructured.Unstructured {
115115
ret, _ := helper.ToUnstructured(&corev1.Secret{
116-
ObjectMeta: metav1.ObjectMeta{
117-
Annotations: map[string]string{corev1.ServiceAccountUIDKey: uuid},
118-
},
119-
Data: map[string][]byte{key: []byte(value)},
120-
Type: secretType,
116+
ObjectMeta: metav1.ObjectMeta{},
117+
Data: map[string][]byte{dataKey: []byte(dataValue)},
118+
Type: secretType,
121119
})
122120
return ret
123121
}
@@ -134,10 +132,10 @@ func Test_retainSecretServiceAccountToken(t *testing.T) {
134132
{
135133
name: "secret data and uid are retained for type service-account-token",
136134
args: args{
137-
desired: createSecret(corev1.SecretTypeServiceAccountToken, "111", corev1.ServiceAccountTokenKey, "desired-token"),
138-
observed: createSecret(corev1.SecretTypeServiceAccountToken, "999", corev1.ServiceAccountTokenKey, "observed-token"),
135+
desired: createSecret(corev1.SecretTypeServiceAccountToken, corev1.ServiceAccountTokenKey, "desired-token"),
136+
observed: createSecret(corev1.SecretTypeServiceAccountToken, corev1.ServiceAccountTokenKey, "observed-token"),
139137
},
140-
want: createSecret(corev1.SecretTypeServiceAccountToken, "999", corev1.ServiceAccountTokenKey, "observed-token"),
138+
want: createSecret(corev1.SecretTypeServiceAccountToken, corev1.ServiceAccountTokenKey, "observed-token"),
141139
},
142140
{
143141
name: "ignores missing uid and data for type service-account-token",
@@ -150,26 +148,26 @@ func Test_retainSecretServiceAccountToken(t *testing.T) {
150148
{
151149
name: "does not retain for type tls",
152150
args: args{
153-
desired: createSecret(corev1.SecretTypeTLS, "111", corev1.TLSCertKey, "desired-cert"),
154-
observed: createSecret(corev1.SecretTypeTLS, "999", corev1.TLSCertKey, "observed-cert"),
151+
desired: createSecret(corev1.SecretTypeTLS, corev1.TLSCertKey, "desired-cert"),
152+
observed: createSecret(corev1.SecretTypeTLS, corev1.TLSCertKey, "observed-cert"),
155153
},
156-
want: createSecret(corev1.SecretTypeTLS, "111", corev1.TLSCertKey, "desired-cert"),
154+
want: createSecret(corev1.SecretTypeTLS, corev1.TLSCertKey, "desired-cert"),
157155
},
158156
{
159157
name: "does not retain for type basic-auth",
160158
args: args{
161-
desired: createSecret(corev1.SecretTypeBasicAuth, "111", corev1.BasicAuthUsernameKey, "desired-user"),
162-
observed: createSecret(corev1.SecretTypeBasicAuth, "999", corev1.BasicAuthUsernameKey, "observed-user"),
159+
desired: createSecret(corev1.SecretTypeBasicAuth, corev1.BasicAuthUsernameKey, "desired-user"),
160+
observed: createSecret(corev1.SecretTypeBasicAuth, corev1.BasicAuthUsernameKey, "observed-user"),
163161
},
164-
want: createSecret(corev1.SecretTypeBasicAuth, "111", corev1.BasicAuthUsernameKey, "desired-user"),
162+
want: createSecret(corev1.SecretTypeBasicAuth, corev1.BasicAuthUsernameKey, "desired-user"),
165163
},
166164
{
167165
name: "does not retain for type dockercfg",
168166
args: args{
169-
desired: createSecret(corev1.SecretTypeDockercfg, "111", corev1.DockerConfigKey, "desired-docker-cfg"),
170-
observed: createSecret(corev1.SecretTypeDockercfg, "999", corev1.DockerConfigKey, "observed-docker-cfg"),
167+
desired: createSecret(corev1.SecretTypeDockercfg, corev1.DockerConfigKey, "desired-docker-cfg"),
168+
observed: createSecret(corev1.SecretTypeDockercfg, corev1.DockerConfigKey, "observed-docker-cfg"),
171169
},
172-
want: createSecret(corev1.SecretTypeDockercfg, "111", corev1.DockerConfigKey, "desired-docker-cfg"),
170+
want: createSecret(corev1.SecretTypeDockercfg, corev1.DockerConfigKey, "desired-docker-cfg"),
173171
},
174172
}
175173
for _, tt := range tests {

0 commit comments

Comments
 (0)