Skip to content

Fix crash when image_pull_secret.name set to an empty string #2657

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 1 commit into
base: main
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
112 changes: 112 additions & 0 deletions kubernetes/resource_kubernetes_pod_v1_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -1640,6 +1640,61 @@ func TestAccKubernetesPodV1_os(t *testing.T) {
})
}

func TestAccKubernetesPodV1_imagePullSecret(t *testing.T) {
name := acctest.RandomWithPrefix("tf-acc-test")
resourceName := "kubernetes_pod_v1.test"
imageName := busyboxImage

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ProviderFactories: testAccProviderFactories,
CheckDestroy: testAccCheckKubernetesPodV1Destroy,
Steps: []resource.TestStep{
{
Config: testAccKubernetesPodV1ConfigImagePullSecret(name, imageName),
Check: resource.ComposeAggregateTestCheckFunc(
resource.TestCheckResourceAttrSet(resourceName, "metadata.0.generation"),
resource.TestCheckResourceAttrSet(resourceName, "metadata.0.resource_version"),
resource.TestCheckResourceAttrSet(resourceName, "metadata.0.uid"),
resource.TestCheckResourceAttr(resourceName, "spec.0.image_pull_secrets.#", "1"),
resource.TestCheckResourceAttr(resourceName, "spec.0.image_pull_secrets.0.name", "secret"),
),
},
{
Config: testAccKubernetesPodV1ConfigImagePullSecretEmpty(name, imageName),
Check: resource.ComposeAggregateTestCheckFunc(
resource.TestCheckResourceAttrSet(resourceName, "metadata.0.generation"),
resource.TestCheckResourceAttrSet(resourceName, "metadata.0.resource_version"),
resource.TestCheckResourceAttrSet(resourceName, "metadata.0.uid"),
resource.TestCheckResourceAttr(resourceName, "spec.0.image_pull_secrets.#", "1"),
resource.TestCheckResourceAttr(resourceName, "spec.0.image_pull_secrets.0.name", ""),
),
},
{
Config: testAccKubernetesPodV1ConfigImagePullSecretMulty(name, imageName),
Check: resource.ComposeAggregateTestCheckFunc(
resource.TestCheckResourceAttrSet(resourceName, "metadata.0.generation"),
resource.TestCheckResourceAttrSet(resourceName, "metadata.0.resource_version"),
resource.TestCheckResourceAttrSet(resourceName, "metadata.0.uid"),
resource.TestCheckResourceAttr(resourceName, "spec.0.image_pull_secrets.#", "2"),
resource.TestCheckResourceAttr(resourceName, "spec.0.image_pull_secrets.0.name", ""),
resource.TestCheckResourceAttr(resourceName, "spec.0.image_pull_secrets.1.name", "secret"),
),
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
ImportStateVerifyIgnore: []string{"metadata.0.resource_version"},
},
{
Config: testAccKubernetesPodV1ConfigMinimal(name, imageName),
PlanOnly: true,
},
},
})
}

func testAccCheckCSIDriverExists(csiDriverName string) error {
conn, err := testAccProvider.Meta().(KubeClientsets).MainClientset()
if err != nil {
Expand Down Expand Up @@ -3551,3 +3606,60 @@ func testAccKubernetesPodV1ConfigOS(name, imageName string) string {
}
`, name, imageName)
}

func testAccKubernetesPodV1ConfigImagePullSecret(name, imageName string) string {
return fmt.Sprintf(`resource "kubernetes_pod_v1" "test" {
metadata {
name = "%s"
}
spec {
image_pull_secrets {
name = "secret"
}
container {
image = "%s"
name = "containername"
}
}
}
`, name, imageName)
}

func testAccKubernetesPodV1ConfigImagePullSecretEmpty(name, imageName string) string {
return fmt.Sprintf(`resource "kubernetes_pod_v1" "test" {
metadata {
name = "%s"
}
spec {
image_pull_secrets {
name = ""
}
container {
image = "%s"
name = "containername"
}
}
}
`, name, imageName)
}

func testAccKubernetesPodV1ConfigImagePullSecretMulty(name, imageName string) string {
return fmt.Sprintf(`resource "kubernetes_pod_v1" "test" {
metadata {
name = "%s"
}
spec {
image_pull_secrets {
name = ""
}
image_pull_secrets {
name = "secret"
}
container {
image = "%s"
name = "containername"
}
}
}
`, name, imageName)
}
54 changes: 54 additions & 0 deletions kubernetes/resource_kubernetes_service_account_v1_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -271,6 +271,44 @@ func TestAccKubernetesServiceAccount_generatedName(t *testing.T) {
})
}

func TestAccKubernetesServiceAccount_imagePullSecret(t *testing.T) {
var conf corev1.ServiceAccount
name := fmt.Sprintf("tf-acc-test-%s", acctest.RandStringFromCharSet(10, acctest.CharSetAlphaNum))
resourceName := "kubernetes_service_account_v1.test"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
IDRefreshName: "kubernetes_service_account.test",
IDRefreshIgnore: []string{"metadata.0.resource_version"},
ProviderFactories: testAccProviderFactories,
CheckDestroy: testAccCheckKubernetesServiceAccountV1Destroy,
Steps: []resource.TestStep{
{
Config: testAccKubernetesServiceAccountV1ConfigImagePullSecret(name),
Check: resource.ComposeAggregateTestCheckFunc(
testAccCheckKubernetesServiceAccountV1Exists(resourceName, &conf),
resource.TestCheckResourceAttr(resourceName, "metadata.0.name", name),
resource.TestCheckResourceAttrSet(resourceName, "metadata.0.generation"),
resource.TestCheckResourceAttrSet(resourceName, "metadata.0.resource_version"),
resource.TestCheckResourceAttrSet(resourceName, "metadata.0.uid"),
resource.TestCheckResourceAttr(resourceName, "image_pull_secret.#", "2"),
resource.TestCheckResourceAttr(resourceName, "automount_service_account_token", "true"),
testAccCheckServiceAccountV1ImagePullSecrets(&conf, []*regexp.Regexp{
regexp.MustCompile("^$"),
regexp.MustCompile("^secret$"),
}),
),
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
ImportStateVerifyIgnore: []string{"metadata.0.resource_version", "automount_service_account_token"},
},
},
})
}

func testAccCheckServiceAccountV1ImagePullSecrets(m *corev1.ServiceAccount, expected []*regexp.Regexp) resource.TestCheckFunc {
return func(s *terraform.State) error {
if len(expected) == 0 && len(m.ImagePullSecrets) == 0 {
Expand Down Expand Up @@ -591,3 +629,19 @@ resource "kubernetes_secret_v1" "four" {
}
`, name, name, name, name, name)
}

func testAccKubernetesServiceAccountV1ConfigImagePullSecret(name string) string {
return fmt.Sprintf(`resource "kubernetes_service_account_v1" "test" {
metadata {
name = "%s"
}
image_pull_secret {
name = ""
}

image_pull_secret {
name = "secret"
}
}
`, name)
}
6 changes: 6 additions & 0 deletions kubernetes/structures.go
Original file line number Diff line number Diff line change
Expand Up @@ -607,6 +607,12 @@ func expandLocalObjectReferenceArray(in []interface{}) []api.LocalObjectReferenc
}
att = make([]api.LocalObjectReference, len(in))
for i, c := range in {
// If an item is an empty string, we treat it as nil.
// Kubernetes accepts an empty string as a name but issues a warning: `invalid empty name ""`.
// Therefore, we should handle this case appropriately.
if c == nil {
continue
}
p := c.(map[string]interface{})
if name, ok := p["name"]; ok {
att[i].Name = name.(string)
Expand Down
Loading