80 lines
2.8 KiB
Go
80 lines
2.8 KiB
Go
package multiclusteringress
|
|
|
|
import (
|
|
"context"
|
|
"net/http"
|
|
|
|
admissionv1 "k8s.io/api/admission/v1"
|
|
apimachineryvalidation "k8s.io/apimachinery/pkg/api/validation"
|
|
"k8s.io/apimachinery/pkg/util/validation/field"
|
|
"k8s.io/klog/v2"
|
|
"sigs.k8s.io/controller-runtime/pkg/webhook/admission"
|
|
|
|
networkingv1alpha1 "github.com/karmada-io/karmada/pkg/apis/networking/v1alpha1"
|
|
"github.com/karmada-io/karmada/pkg/util/lifted"
|
|
)
|
|
|
|
// ValidatingAdmission validates MultiClusterIngress object when creating/updating.
|
|
type ValidatingAdmission struct {
|
|
decoder *admission.Decoder
|
|
}
|
|
|
|
// Check if our ValidatingAdmission implements necessary interface
|
|
var _ admission.Handler = &ValidatingAdmission{}
|
|
var _ admission.DecoderInjector = &ValidatingAdmission{}
|
|
|
|
// Handle implements admission.Handler interface.
|
|
// It yields a response to an AdmissionRequest.
|
|
func (v *ValidatingAdmission) Handle(ctx context.Context, req admission.Request) admission.Response {
|
|
mci := &networkingv1alpha1.MultiClusterIngress{}
|
|
|
|
err := v.decoder.Decode(req, mci)
|
|
if err != nil {
|
|
return admission.Errored(http.StatusBadRequest, err)
|
|
}
|
|
klog.Infof("Validating MultiClusterIngress(%s/%s) for request: %s", mci.Namespace, mci.Name, req.Operation)
|
|
|
|
if req.Operation == admissionv1.Update {
|
|
oldMci := &networkingv1alpha1.MultiClusterIngress{}
|
|
err = v.decoder.DecodeRaw(req.OldObject, oldMci)
|
|
if err != nil {
|
|
return admission.Errored(http.StatusBadRequest, err)
|
|
}
|
|
if errs := validateMCIUpdate(oldMci, mci); len(errs) != 0 {
|
|
klog.Errorf("%v", errs)
|
|
return admission.Denied(errs.ToAggregate().Error())
|
|
}
|
|
} else {
|
|
if errs := validateMCI(mci); len(errs) != 0 {
|
|
klog.Errorf("%v", errs)
|
|
return admission.Denied(errs.ToAggregate().Error())
|
|
}
|
|
}
|
|
return admission.Allowed("")
|
|
}
|
|
|
|
// InjectDecoder implements admission.DecoderInjector interface.
|
|
// A decoder will be automatically injected.
|
|
func (v *ValidatingAdmission) InjectDecoder(d *admission.Decoder) error {
|
|
v.decoder = d
|
|
return nil
|
|
}
|
|
|
|
func validateMCIUpdate(oldMci, newMci *networkingv1alpha1.MultiClusterIngress) field.ErrorList {
|
|
allErrs := apimachineryvalidation.ValidateObjectMetaUpdate(&newMci.ObjectMeta, &oldMci.ObjectMeta, field.NewPath("metadata"))
|
|
allErrs = append(allErrs, validateMCI(newMci)...)
|
|
allErrs = append(allErrs, lifted.ValidateIngressLoadBalancerStatus(&newMci.Status.LoadBalancer, field.NewPath("status", "loadBalancer"))...)
|
|
return allErrs
|
|
}
|
|
|
|
func validateMCI(mci *networkingv1alpha1.MultiClusterIngress) field.ErrorList {
|
|
allErrs := apimachineryvalidation.ValidateObjectMeta(&mci.ObjectMeta, true,
|
|
apimachineryvalidation.NameIsDNSSubdomain, field.NewPath("metadata"))
|
|
opts := lifted.IngressValidationOptions{
|
|
AllowInvalidSecretName: false,
|
|
AllowInvalidWildcardHostRule: false,
|
|
}
|
|
allErrs = append(allErrs, lifted.ValidateIngressSpec(&mci.Spec, field.NewPath("spec"), opts)...)
|
|
return allErrs
|
|
}
|