cluster-api-provider-rke2/bootstrap/api/v1beta1/rke2config_webhook.go

265 lines
8.7 KiB
Go

/*
Copyright 2024 SUSE LLC.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package v1beta1
import (
"bytes"
"context"
"fmt"
"strings"
"github.com/coreos/butane/config/common"
fcos "github.com/coreos/butane/config/fcos/v1_4"
"gopkg.in/yaml.v3"
v1 "k8s.io/api/core/v1"
apierrors "k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/util/validation/field"
"k8s.io/klog/v2"
ctrl "sigs.k8s.io/controller-runtime"
logf "sigs.k8s.io/controller-runtime/pkg/log"
"sigs.k8s.io/controller-runtime/pkg/webhook"
"sigs.k8s.io/controller-runtime/pkg/webhook/admission"
)
var (
cannotUseWithIgnition = fmt.Sprintf("not supported when spec.format is set to %q", Ignition)
rke2ConfigLogger = logf.Log.WithName("RKE2Config")
)
// RKE2ConfigCustomDefaulter struct is responsible for setting default values on the custom resource of the
// Kind RKE2Config when those are created or updated.
// NOTE: The +kubebuilder:object:generate=false marker prevents controller-gen from generating DeepCopy methods,
// as it is used only for temporary operations and does not need to be deeply copied.
// +kubebuilder:object:generate=false
type RKE2ConfigCustomDefaulter struct{}
// RKE2ConfigCustomValidator struct is responsible for validating the RKE2Config resource
// when it is created, updated, or deleted.
// NOTE: The +kubebuilder:object:generate=false marker prevents controller-gen from generating DeepCopy methods,
// as it is used only for temporary operations and does not need to be deeply copied.
// +kubebuilder:object:generate=false
type RKE2ConfigCustomValidator struct{}
// SetupRKE2ConfigWebhookWithManager sets up the Controller Manager for the Webhook for the RKE2ControlPlaneTemplate resource.
func SetupRKE2ConfigWebhookWithManager(mgr ctrl.Manager) error {
return ctrl.NewWebhookManagedBy(mgr).
For(&RKE2Config{}).
WithValidator(&RKE2ConfigCustomValidator{}).
WithDefaulter(&RKE2ConfigCustomDefaulter{}, admission.DefaulterRemoveUnknownOrOmitableFields).
Complete()
}
//+kubebuilder:webhook:path=/mutate-bootstrap-cluster-x-k8s-io-v1beta1-rke2config,mutating=true,failurePolicy=fail,sideEffects=None,groups=bootstrap.cluster.x-k8s.io,resources=rke2configs,verbs=create;update,versions=v1beta1,name=mrke2config.kb.io,admissionReviewVersions=v1
var _ webhook.CustomDefaulter = &RKE2ConfigCustomDefaulter{}
// Default implements webhook.Defaulter so a webhook will be registered for the type.
func (r *RKE2ConfigCustomDefaulter) Default(_ context.Context, obj runtime.Object) error {
rc, ok := obj.(*RKE2Config)
if !ok {
return apierrors.NewBadRequest(fmt.Sprintf("expected a RKE2Config but got a %T", obj))
}
rke2ConfigLogger.Info("defaulting", "RKE2Config", klog.KObj(rc))
DefaultRKE2ConfigSpec(&rc.Spec)
return nil
}
// DefaultRKE2ConfigSpec defaults the RKE2ConfigSpec.
func DefaultRKE2ConfigSpec(spec *RKE2ConfigSpec) {
if spec.AgentConfig.Format == "" {
spec.AgentConfig.Format = CloudConfig
}
if spec.AgentConfig.AdditionalUserData.Data != nil {
if err := CorrectArbitraryData(spec.AgentConfig.AdditionalUserData.Data); err != nil {
rke2ConfigLogger.Error(err, "failed to correct the additional user data for RKE2ConfigSpec")
}
}
}
var ignoredCloudInitFields = []string{"write_files", "ntp", "runcmd"}
// CorrectArbitraryData makes individual corrections to data and makes it YAML compliant.
func CorrectArbitraryData(arbitraryData map[string]string) error {
// Remove ignored fields from the map
for _, key := range ignoredCloudInitFields {
delete(arbitraryData, key)
}
// Make individual corrections to each value
for k, v := range arbitraryData {
b := bytes.Buffer{}
en := yaml.NewEncoder(&b)
en.SetIndent(2)
mapping := map[string]interface{}{}
if err := yaml.Unmarshal([]byte(v), &mapping); err == nil {
if err := en.Encode(&mapping); err != nil {
return fmt.Errorf("invalid map value provided: '%s', error: %w", v, err)
}
ident := "\n "
arbitraryData[k] = ident + strings.ReplaceAll(b.String(), "\n", ident)
continue
}
list := []interface{}{}
if err := yaml.Unmarshal([]byte(v), &list); err == nil {
if err := en.Encode(&list); err != nil {
return fmt.Errorf("invalid list value provided: '%s', error: %w", v, err)
}
arbitraryData[k] = "\n" + b.String()
continue
}
}
return nil
}
//+kubebuilder:webhook:path=/validate-bootstrap-cluster-x-k8s-io-v1beta1-rke2config,mutating=false,failurePolicy=fail,sideEffects=None,groups=bootstrap.cluster.x-k8s.io,resources=rke2configs,verbs=create;update,versions=v1beta1,name=vrke2config.kb.io,admissionReviewVersions=v1
var _ webhook.CustomValidator = &RKE2ConfigCustomValidator{}
// ValidateCreate implements webhook.Validator so a webhook will be registered for the type.
func (r *RKE2ConfigCustomValidator) ValidateCreate(_ context.Context, obj runtime.Object) (admission.Warnings, error) {
rc, ok := obj.(*RKE2Config)
if !ok {
return nil, fmt.Errorf("expected a RKE2Config object but got %T", obj)
}
rke2ConfigLogger.Info("validate create", "RKE2Config", klog.KObj(rc))
var allErrs field.ErrorList
allErrs = append(allErrs, ValidateRKE2ConfigSpec(rc.Name, &rc.Spec)...)
if len(allErrs) == 0 {
return nil, nil
}
return nil, apierrors.NewInvalid(GroupVersion.WithKind("RKE2Config").GroupKind(), rc.Name, allErrs)
}
// ValidateUpdate implements webhook.Validator so a webhook will be registered for the type.
func (r *RKE2ConfigCustomValidator) ValidateUpdate(_ context.Context, _, newObj runtime.Object) (admission.Warnings, error) {
newrc, ok := newObj.(*RKE2Config)
if !ok {
return nil, fmt.Errorf("expected a RKE2Config object but got %T", newObj)
}
rke2ConfigLogger.Info("validate update", "RKE2Config", klog.KObj(newrc))
var allErrs field.ErrorList
allErrs = append(allErrs, ValidateRKE2ConfigSpec(newrc.Name, &newrc.Spec)...)
if len(allErrs) == 0 {
return nil, nil
}
return nil, apierrors.NewInvalid(GroupVersion.WithKind("RKE2Config").GroupKind(), newrc.Name, allErrs)
}
// ValidateDelete implements webhook.Validator so a webhook will be registered for the type.
func (r *RKE2ConfigCustomValidator) ValidateDelete(_ context.Context, obj runtime.Object) (admission.Warnings, error) {
rc, ok := obj.(*RKE2Config)
if !ok {
return nil, fmt.Errorf("expected a RKE2Config object but got %T", obj)
}
rke2ConfigLogger.Info("validate delete", "RKE2Config", klog.KObj(rc))
return nil, nil
}
// ValidateRKE2ConfigSpec validates the RKE2ConfigSpec.
func ValidateRKE2ConfigSpec(_ string, spec *RKE2ConfigSpec) field.ErrorList {
allErrs := spec.validate(field.NewPath("spec"))
if len(allErrs) == 0 {
return nil
}
return allErrs
}
func (s *RKE2ConfigSpec) validate(pathPrefix *field.Path) field.ErrorList {
var allErrs field.ErrorList
allErrs = append(allErrs, s.validateIgnition(pathPrefix)...)
allErrs = append(allErrs, s.validateRegistries(pathPrefix)...)
return allErrs
}
func (s *RKE2ConfigSpec) validateRegistries(pathPrefix *field.Path) field.ErrorList {
var allErrs field.ErrorList
for regName, regConfig := range s.PrivateRegistriesConfig.Configs {
if regConfig.AuthSecret == (v1.ObjectReference{}) && regConfig.TLS == (TLSConfig{}) {
allErrs = append(
allErrs,
field.Invalid(
pathPrefix.Child("privateRegistriesConfig.configs."+regName),
regConfig,
"need either credentials, tls settings or both for registry: "+regName),
)
}
}
return allErrs
}
func (s *RKE2ConfigSpec) validateIgnition(pathPrefix *field.Path) field.ErrorList {
var allErrs field.ErrorList
if s.AgentConfig.Format == Ignition {
_, reports, _ := fcos.ToIgn3_3Bytes([]byte(s.AgentConfig.AdditionalUserData.Config), common.TranslateBytesOptions{})
if (len(reports.Entries) > 0 && s.AgentConfig.AdditionalUserData.Strict) || reports.IsFatal() {
allErrs = append(
allErrs,
field.Invalid(
pathPrefix.Child("agentConfig.AdditionalUserData.Config"),
s.AgentConfig.AdditionalUserData.Config,
fmt.Sprintf("error parsing Butane config: %v", reports.String()),
),
)
}
for i, file := range s.Files {
if file.Encoding == Gzip || file.Encoding == GzipBase64 {
allErrs = append(
allErrs,
field.Forbidden(
pathPrefix.Child("files").Index(i).Child("encoding"),
cannotUseWithIgnition,
),
)
}
}
}
return allErrs
}