mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-30 10:10:21 +00:00
5af3fe5deb
this commits add the controller runtime and its dependency to the vendor. Signed-off-by: Madhu Rajanna <madhupr007@gmail.com>
201 lines
6.1 KiB
Go
201 lines
6.1 KiB
Go
/*
|
|
Copyright 2018 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package admission
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net/http"
|
|
|
|
"github.com/go-logr/logr"
|
|
"gomodules.xyz/jsonpatch/v2"
|
|
admissionv1beta1 "k8s.io/api/admission/v1beta1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/apimachinery/pkg/util/json"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/runtime/inject"
|
|
)
|
|
|
|
var (
|
|
errUnableToEncodeResponse = errors.New("unable to encode response")
|
|
)
|
|
|
|
// Request defines the input for an admission handler.
|
|
// It contains information to identify the object in
|
|
// question (group, version, kind, resource, subresource,
|
|
// name, namespace), as well as the operation in question
|
|
// (e.g. Get, Create, etc), and the object itself.
|
|
type Request struct {
|
|
admissionv1beta1.AdmissionRequest
|
|
}
|
|
|
|
// Response is the output of an admission handler.
|
|
// It contains a response indicating if a given
|
|
// operation is allowed, as well as a set of patches
|
|
// to mutate the object in the case of a mutating admission handler.
|
|
type Response struct {
|
|
// Patches are the JSON patches for mutating webhooks.
|
|
// Using this instead of setting Response.Patch to minimize
|
|
// overhead of serialization and deserialization.
|
|
// Patches set here will override any patches in the response,
|
|
// so leave this empty if you want to set the patch response directly.
|
|
Patches []jsonpatch.JsonPatchOperation
|
|
// AdmissionResponse is the raw admission response.
|
|
// The Patch field in it will be overwritten by the listed patches.
|
|
admissionv1beta1.AdmissionResponse
|
|
}
|
|
|
|
// Complete populates any fields that are yet to be set in
|
|
// the underlying AdmissionResponse, It mutates the response.
|
|
func (r *Response) Complete(req Request) error {
|
|
r.UID = req.UID
|
|
|
|
// ensure that we have a valid status code
|
|
if r.Result == nil {
|
|
r.Result = &metav1.Status{}
|
|
}
|
|
if r.Result.Code == 0 {
|
|
r.Result.Code = http.StatusOK
|
|
}
|
|
// TODO(directxman12): do we need to populate this further, and/or
|
|
// is code actually necessary (the same webhook doesn't use it)
|
|
|
|
if len(r.Patches) == 0 {
|
|
return nil
|
|
}
|
|
|
|
var err error
|
|
r.Patch, err = json.Marshal(r.Patches)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
patchType := admissionv1beta1.PatchTypeJSONPatch
|
|
r.PatchType = &patchType
|
|
|
|
return nil
|
|
}
|
|
|
|
// Handler can handle an AdmissionRequest.
|
|
type Handler interface {
|
|
// Handle yields a response to an AdmissionRequest.
|
|
//
|
|
// The supplied context is extracted from the received http.Request, allowing wrapping
|
|
// http.Handlers to inject values into and control cancelation of downstream request processing.
|
|
Handle(context.Context, Request) Response
|
|
}
|
|
|
|
// HandlerFunc implements Handler interface using a single function.
|
|
type HandlerFunc func(context.Context, Request) Response
|
|
|
|
var _ Handler = HandlerFunc(nil)
|
|
|
|
// Handle process the AdmissionRequest by invoking the underlying function.
|
|
func (f HandlerFunc) Handle(ctx context.Context, req Request) Response {
|
|
return f(ctx, req)
|
|
}
|
|
|
|
// Webhook represents each individual webhook.
|
|
type Webhook struct {
|
|
// Handler actually processes an admission request returning whether it was allowed or denied,
|
|
// and potentially patches to apply to the handler.
|
|
Handler Handler
|
|
|
|
// decoder is constructed on receiving a scheme and passed down to then handler
|
|
decoder *Decoder
|
|
|
|
log logr.Logger
|
|
}
|
|
|
|
// InjectLogger gets a handle to a logging instance, hopefully with more info about this particular webhook.
|
|
func (w *Webhook) InjectLogger(l logr.Logger) error {
|
|
w.log = l
|
|
return nil
|
|
}
|
|
|
|
// Handle processes AdmissionRequest.
|
|
// If the webhook is mutating type, it delegates the AdmissionRequest to each handler and merge the patches.
|
|
// If the webhook is validating type, it delegates the AdmissionRequest to each handler and
|
|
// deny the request if anyone denies.
|
|
func (w *Webhook) Handle(ctx context.Context, req Request) Response {
|
|
resp := w.Handler.Handle(ctx, req)
|
|
if err := resp.Complete(req); err != nil {
|
|
w.log.Error(err, "unable to encode response")
|
|
return Errored(http.StatusInternalServerError, errUnableToEncodeResponse)
|
|
}
|
|
|
|
return resp
|
|
}
|
|
|
|
// InjectScheme injects a scheme into the webhook, in order to construct a Decoder.
|
|
func (w *Webhook) InjectScheme(s *runtime.Scheme) error {
|
|
// TODO(directxman12): we should have a better way to pass this down
|
|
|
|
var err error
|
|
w.decoder, err = NewDecoder(s)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// inject the decoder here too, just in case the order of calling this is not
|
|
// scheme first, then inject func
|
|
if w.Handler != nil {
|
|
if _, err := InjectDecoderInto(w.GetDecoder(), w.Handler); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// GetDecoder returns a decoder to decode the objects embedded in admission requests.
|
|
// It may be nil if we haven't received a scheme to use to determine object types yet.
|
|
func (w *Webhook) GetDecoder() *Decoder {
|
|
return w.decoder
|
|
}
|
|
|
|
// InjectFunc injects the field setter into the webhook.
|
|
func (w *Webhook) InjectFunc(f inject.Func) error {
|
|
// inject directly into the handlers. It would be more correct
|
|
// to do this in a sync.Once in Handle (since we don't have some
|
|
// other start/finalize-type method), but it's more efficient to
|
|
// do it here, presumably.
|
|
|
|
// also inject a decoder, and wrap this so that we get a setFields
|
|
// that injects a decoder (hopefully things don't ignore the duplicate
|
|
// InjectorInto call).
|
|
|
|
var setFields inject.Func
|
|
setFields = func(target interface{}) error {
|
|
if err := f(target); err != nil {
|
|
return err
|
|
}
|
|
|
|
if _, err := inject.InjectorInto(setFields, target); err != nil {
|
|
return err
|
|
}
|
|
|
|
if _, err := InjectDecoderInto(w.GetDecoder(), target); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
return setFields(w.Handler)
|
|
}
|