73 lines
2.5 KiB
Go
73 lines
2.5 KiB
Go
package clusterpropagationpolicy
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/http"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/webhook/admission"
|
|
|
|
policyv1alpha1 "github.com/karmada-io/karmada/pkg/apis/policy/v1alpha1"
|
|
"github.com/karmada-io/karmada/pkg/util/helper"
|
|
"github.com/karmada-io/karmada/pkg/util/validation"
|
|
)
|
|
|
|
// MutatingAdmission mutates API request if necessary.
|
|
type MutatingAdmission struct {
|
|
decoder *admission.Decoder
|
|
|
|
DefaultNotReadyTolerationSeconds int64
|
|
DefaultUnreachableTolerationSeconds int64
|
|
}
|
|
|
|
// Check if our MutatingAdmission implements necessary interface
|
|
var _ admission.Handler = &MutatingAdmission{}
|
|
var _ admission.DecoderInjector = &MutatingAdmission{}
|
|
|
|
// NewMutatingHandler builds a new admission.Handler.
|
|
func NewMutatingHandler(notReadyTolerationSeconds, unreachableTolerationSeconds int64) admission.Handler {
|
|
return &MutatingAdmission{
|
|
DefaultNotReadyTolerationSeconds: notReadyTolerationSeconds,
|
|
DefaultUnreachableTolerationSeconds: unreachableTolerationSeconds,
|
|
}
|
|
}
|
|
|
|
// Handle yields a response to an AdmissionRequest.
|
|
func (a *MutatingAdmission) Handle(ctx context.Context, req admission.Request) admission.Response {
|
|
policy := &policyv1alpha1.ClusterPropagationPolicy{}
|
|
|
|
err := a.decoder.Decode(req, policy)
|
|
if err != nil {
|
|
return admission.Errored(http.StatusBadRequest, err)
|
|
}
|
|
|
|
// Set default spread constraints if both 'SpreadByField' and 'SpreadByLabel' not set.
|
|
helper.SetDefaultSpreadConstraints(policy.Spec.Placement.SpreadConstraints)
|
|
helper.AddTolerations(&policy.Spec.Placement, helper.NewNotReadyToleration(a.DefaultNotReadyTolerationSeconds),
|
|
helper.NewUnreachableToleration(a.DefaultUnreachableTolerationSeconds))
|
|
|
|
if len(policy.Name) > validation.LabelValueMaxLength {
|
|
return admission.Errored(http.StatusBadRequest, fmt.Errorf("ClusterPropagationPolicy's name should be no more than %d characters", validation.LabelValueMaxLength))
|
|
}
|
|
|
|
addedResourceSelectors := helper.GetFollowedResourceSelectorsWhenMatchServiceImport(policy.Spec.ResourceSelectors)
|
|
if addedResourceSelectors != nil {
|
|
policy.Spec.ResourceSelectors = append(policy.Spec.ResourceSelectors, addedResourceSelectors...)
|
|
}
|
|
|
|
marshaledBytes, err := json.Marshal(policy)
|
|
if err != nil {
|
|
return admission.Errored(http.StatusInternalServerError, err)
|
|
}
|
|
|
|
return admission.PatchResponseFromRaw(req.Object.Raw, marshaledBytes)
|
|
}
|
|
|
|
// InjectDecoder implements admission.DecoderInjector interface.
|
|
// A decoder will be automatically injected.
|
|
func (a *MutatingAdmission) InjectDecoder(d *admission.Decoder) error {
|
|
a.decoder = d
|
|
return nil
|
|
}
|