blob: 7edc6a0c97ae6d3be3ff2a300e24777d3ac524cb [file] [log] [blame]
// Licensed to the Apache Software Foundation (ASF) under one or more
// contributor license agreements. See the NOTICE file distributed with
// this work for additional information regarding copyright ownership.
// The ASF licenses this file to You under the Apache License, Version 2.0
// (the "License"); you may not use this file except in compliance with
// the License. You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package v1
import (
"context"
"fmt"
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/types"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
logf "sigs.k8s.io/controller-runtime/pkg/log"
"sigs.k8s.io/controller-runtime/pkg/webhook"
"sigs.k8s.io/controller-runtime/pkg/webhook/admission"
gatewayv1alpha2 "sigs.k8s.io/gateway-api/apis/v1alpha2"
internaltypes "github.com/apache/apisix-ingress-controller/internal/types"
"github.com/apache/apisix-ingress-controller/internal/webhook/v1/reference"
)
var tcpRouteLog = logf.Log.WithName("tcproute-resource")
func SetupTCPRouteWebhookWithManager(mgr ctrl.Manager) error {
return ctrl.NewWebhookManagedBy(mgr).
For(&gatewayv1alpha2.TCPRoute{}).
WithValidator(NewTCPRouteCustomValidator(mgr.GetClient())).
Complete()
}
// +kubebuilder:webhook:path=/validate-gateway-networking-k8s-io-v1alpha2-tcproute,mutating=false,failurePolicy=fail,sideEffects=None,groups=gateway.networking.k8s.io,resources=tcproutes,verbs=create;update,versions=v1alpha2,name=vtcproute-v1alpha2.kb.io,admissionReviewVersions=v1
type TCPRouteCustomValidator struct {
Client client.Client
checker reference.Checker
}
var _ webhook.CustomValidator = &TCPRouteCustomValidator{}
func NewTCPRouteCustomValidator(c client.Client) *TCPRouteCustomValidator {
return &TCPRouteCustomValidator{
Client: c,
checker: reference.NewChecker(c, tcpRouteLog),
}
}
func (v *TCPRouteCustomValidator) ValidateCreate(ctx context.Context, obj runtime.Object) (admission.Warnings, error) {
route, ok := obj.(*gatewayv1alpha2.TCPRoute)
if !ok {
return nil, fmt.Errorf("expected a TCPRoute object but got %T", obj)
}
tcpRouteLog.Info("Validation for TCPRoute upon creation", "name", route.GetName(), "namespace", route.GetNamespace())
managed, err := isTCPRouteManaged(ctx, v.Client, route)
if err != nil {
tcpRouteLog.Error(err, "failed to decide controller ownership", "name", route.GetName(), "namespace", route.GetNamespace())
return nil, nil
}
if !managed {
return nil, nil
}
return v.collectWarnings(ctx, route), nil
}
func (v *TCPRouteCustomValidator) ValidateUpdate(ctx context.Context, oldObj, newObj runtime.Object) (admission.Warnings, error) {
route, ok := newObj.(*gatewayv1alpha2.TCPRoute)
if !ok {
return nil, fmt.Errorf("expected a TCPRoute object for the newObj but got %T", newObj)
}
tcpRouteLog.Info("Validation for TCPRoute upon update", "name", route.GetName(), "namespace", route.GetNamespace())
managed, err := isTCPRouteManaged(ctx, v.Client, route)
if err != nil {
tcpRouteLog.Error(err, "failed to decide controller ownership", "name", route.GetName(), "namespace", route.GetNamespace())
return nil, nil
}
if !managed {
return nil, nil
}
return v.collectWarnings(ctx, route), nil
}
func (*TCPRouteCustomValidator) ValidateDelete(context.Context, runtime.Object) (admission.Warnings, error) {
return nil, nil
}
func (v *TCPRouteCustomValidator) collectWarnings(ctx context.Context, route *gatewayv1alpha2.TCPRoute) admission.Warnings {
serviceVisited := make(map[types.NamespacedName]struct{})
namespace := route.GetNamespace()
var warnings admission.Warnings
addServiceWarning := func(nn types.NamespacedName) {
if nn.Name == "" || nn.Namespace == "" {
return
}
if _, seen := serviceVisited[nn]; seen {
return
}
serviceVisited[nn] = struct{}{}
warnings = append(warnings, v.checker.Service(ctx, reference.ServiceRef{
Object: route,
NamespacedName: nn,
})...)
}
addBackendRef := func(ns, name string, group *gatewayv1alpha2.Group, kind *gatewayv1alpha2.Kind) {
if name == "" {
return
}
if group != nil && string(*group) != corev1.GroupName {
return
}
if kind != nil && *kind != internaltypes.KindService {
return
}
nn := types.NamespacedName{Namespace: ns, Name: name}
addServiceWarning(nn)
}
for _, rule := range route.Spec.Rules {
for _, backend := range rule.BackendRefs {
targetNamespace := namespace
if backend.Namespace != nil && *backend.Namespace != "" {
targetNamespace = string(*backend.Namespace)
}
addBackendRef(targetNamespace, string(backend.Name), backend.Group, backend.Kind)
}
}
return warnings
}