| // Licensed to the Apache Software Foundation (ASF) under one or more |
| // contributor license agreements. See the NOTICE file distributed with |
| // this work for additional information regarding copyright ownership. |
| // The ASF licenses this file to You under the Apache License, Version 2.0 |
| // (the "License"); you may not use this file except in compliance with |
| // the License. You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| package v1 |
| |
| import ( |
| "context" |
| "fmt" |
| |
| corev1 "k8s.io/api/core/v1" |
| "k8s.io/apimachinery/pkg/runtime" |
| "k8s.io/apimachinery/pkg/types" |
| ctrl "sigs.k8s.io/controller-runtime" |
| "sigs.k8s.io/controller-runtime/pkg/client" |
| logf "sigs.k8s.io/controller-runtime/pkg/log" |
| "sigs.k8s.io/controller-runtime/pkg/webhook" |
| "sigs.k8s.io/controller-runtime/pkg/webhook/admission" |
| gatewayv1alpha2 "sigs.k8s.io/gateway-api/apis/v1alpha2" |
| |
| internaltypes "github.com/apache/apisix-ingress-controller/internal/types" |
| "github.com/apache/apisix-ingress-controller/internal/webhook/v1/reference" |
| ) |
| |
| var tcpRouteLog = logf.Log.WithName("tcproute-resource") |
| |
| func SetupTCPRouteWebhookWithManager(mgr ctrl.Manager) error { |
| return ctrl.NewWebhookManagedBy(mgr). |
| For(&gatewayv1alpha2.TCPRoute{}). |
| WithValidator(NewTCPRouteCustomValidator(mgr.GetClient())). |
| Complete() |
| } |
| |
| // +kubebuilder:webhook:path=/validate-gateway-networking-k8s-io-v1alpha2-tcproute,mutating=false,failurePolicy=fail,sideEffects=None,groups=gateway.networking.k8s.io,resources=tcproutes,verbs=create;update,versions=v1alpha2,name=vtcproute-v1alpha2.kb.io,admissionReviewVersions=v1 |
| |
| type TCPRouteCustomValidator struct { |
| Client client.Client |
| checker reference.Checker |
| } |
| |
| var _ webhook.CustomValidator = &TCPRouteCustomValidator{} |
| |
| func NewTCPRouteCustomValidator(c client.Client) *TCPRouteCustomValidator { |
| return &TCPRouteCustomValidator{ |
| Client: c, |
| checker: reference.NewChecker(c, tcpRouteLog), |
| } |
| } |
| |
| func (v *TCPRouteCustomValidator) ValidateCreate(ctx context.Context, obj runtime.Object) (admission.Warnings, error) { |
| route, ok := obj.(*gatewayv1alpha2.TCPRoute) |
| if !ok { |
| return nil, fmt.Errorf("expected a TCPRoute object but got %T", obj) |
| } |
| tcpRouteLog.Info("Validation for TCPRoute upon creation", "name", route.GetName(), "namespace", route.GetNamespace()) |
| managed, err := isTCPRouteManaged(ctx, v.Client, route) |
| if err != nil { |
| tcpRouteLog.Error(err, "failed to decide controller ownership", "name", route.GetName(), "namespace", route.GetNamespace()) |
| return nil, nil |
| } |
| if !managed { |
| return nil, nil |
| } |
| |
| return v.collectWarnings(ctx, route), nil |
| } |
| |
| func (v *TCPRouteCustomValidator) ValidateUpdate(ctx context.Context, oldObj, newObj runtime.Object) (admission.Warnings, error) { |
| route, ok := newObj.(*gatewayv1alpha2.TCPRoute) |
| if !ok { |
| return nil, fmt.Errorf("expected a TCPRoute object for the newObj but got %T", newObj) |
| } |
| tcpRouteLog.Info("Validation for TCPRoute upon update", "name", route.GetName(), "namespace", route.GetNamespace()) |
| managed, err := isTCPRouteManaged(ctx, v.Client, route) |
| if err != nil { |
| tcpRouteLog.Error(err, "failed to decide controller ownership", "name", route.GetName(), "namespace", route.GetNamespace()) |
| return nil, nil |
| } |
| if !managed { |
| return nil, nil |
| } |
| |
| return v.collectWarnings(ctx, route), nil |
| } |
| |
| func (*TCPRouteCustomValidator) ValidateDelete(context.Context, runtime.Object) (admission.Warnings, error) { |
| return nil, nil |
| } |
| |
| func (v *TCPRouteCustomValidator) collectWarnings(ctx context.Context, route *gatewayv1alpha2.TCPRoute) admission.Warnings { |
| serviceVisited := make(map[types.NamespacedName]struct{}) |
| namespace := route.GetNamespace() |
| |
| var warnings admission.Warnings |
| |
| addServiceWarning := func(nn types.NamespacedName) { |
| if nn.Name == "" || nn.Namespace == "" { |
| return |
| } |
| if _, seen := serviceVisited[nn]; seen { |
| return |
| } |
| serviceVisited[nn] = struct{}{} |
| warnings = append(warnings, v.checker.Service(ctx, reference.ServiceRef{ |
| Object: route, |
| NamespacedName: nn, |
| })...) |
| } |
| |
| addBackendRef := func(ns, name string, group *gatewayv1alpha2.Group, kind *gatewayv1alpha2.Kind) { |
| if name == "" { |
| return |
| } |
| if group != nil && string(*group) != corev1.GroupName { |
| return |
| } |
| if kind != nil && *kind != internaltypes.KindService { |
| return |
| } |
| nn := types.NamespacedName{Namespace: ns, Name: name} |
| addServiceWarning(nn) |
| } |
| |
| for _, rule := range route.Spec.Rules { |
| for _, backend := range rule.BackendRefs { |
| targetNamespace := namespace |
| if backend.Namespace != nil && *backend.Namespace != "" { |
| targetNamespace = string(*backend.Namespace) |
| } |
| addBackendRef(targetNamespace, string(backend.Name), backend.Group, backend.Kind) |
| } |
| } |
| |
| return warnings |
| } |