-
Notifications
You must be signed in to change notification settings - Fork 67
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add validation webhook for policies.rabbitmq.com
- Loading branch information
Showing
9 changed files
with
181 additions
and
13 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
package v1alpha1 | ||
|
||
import ( | ||
"fmt" | ||
apierrors "k8s.io/apimachinery/pkg/api/errors" | ||
"k8s.io/apimachinery/pkg/runtime" | ||
"k8s.io/apimachinery/pkg/util/validation/field" | ||
ctrl "sigs.k8s.io/controller-runtime" | ||
"sigs.k8s.io/controller-runtime/pkg/webhook" | ||
) | ||
|
||
func (p *Policy) SetupWebhookWithManager(mgr ctrl.Manager) error { | ||
return ctrl.NewWebhookManagedBy(mgr). | ||
For(p). | ||
Complete() | ||
} | ||
|
||
// +kubebuilder:webhook:verbs=create;update,path=/validate-rabbitmq-com-v1alpha1-policy,mutating=false,failurePolicy=fail,groups=rabbitmq.com,resources=policies,versions=v1alpha1,name=vpolicy.kb.io,sideEffects=none,admissionReviewVersions=v1 | ||
|
||
var _ webhook.Validator = &Policy{} | ||
|
||
// no validation on create | ||
func (p *Policy) ValidateCreate() error { | ||
return nil | ||
} | ||
|
||
// returns error type 'forbidden' for updates on policy name, vhost and rabbitmqClusterReference | ||
func (p *Policy) ValidateUpdate(old runtime.Object) error { | ||
oldPolicy, ok := old.(*Policy) | ||
if !ok { | ||
return apierrors.NewBadRequest(fmt.Sprintf("expected a policy but got a %T", old)) | ||
} | ||
|
||
detailMsg := "updates on name, vhost and rabbitmqClusterReference are all forbidden" | ||
if p.Spec.Name != oldPolicy.Spec.Name { | ||
return apierrors.NewForbidden(p.GroupResource(), p.Name, | ||
field.Forbidden(field.NewPath("spec", "name"), detailMsg)) | ||
} | ||
|
||
if p.Spec.Vhost != oldPolicy.Spec.Vhost { | ||
return apierrors.NewForbidden(p.GroupResource(), p.Name, | ||
field.Forbidden(field.NewPath("spec", "vhost"), detailMsg)) | ||
} | ||
|
||
if p.Spec.RabbitmqClusterReference != oldPolicy.Spec.RabbitmqClusterReference { | ||
return apierrors.NewForbidden(p.GroupResource(), p.Name, | ||
field.Forbidden(field.NewPath("spec", "rabbitmqClusterReference"), detailMsg)) | ||
} | ||
return nil | ||
} | ||
|
||
// no validation on delete | ||
func (p *Policy) ValidateDelete() error { | ||
return nil | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,73 @@ | ||
package v1alpha1 | ||
|
||
import ( | ||
. "github.com/onsi/ginkgo" | ||
. "github.com/onsi/gomega" | ||
apierrors "k8s.io/apimachinery/pkg/api/errors" | ||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
"k8s.io/apimachinery/pkg/runtime" | ||
) | ||
|
||
var _ = Describe("policy webhook", func() { | ||
var policy = Policy{ | ||
ObjectMeta: metav1.ObjectMeta{ | ||
Name: "test", | ||
}, | ||
Spec: PolicySpec{ | ||
Name: "test", | ||
Vhost: "/test", | ||
Pattern: "a-pattern", | ||
ApplyTo: "all", | ||
Priority: 0, | ||
RabbitmqClusterReference: RabbitmqClusterReference{ | ||
Name: "a-cluster", | ||
Namespace: "default", | ||
}, | ||
}, | ||
} | ||
|
||
It("does not allow updates on policy name", func() { | ||
newPolicy := policy.DeepCopy() | ||
newPolicy.Spec.Name = "new-name" | ||
Expect(apierrors.IsForbidden(newPolicy.ValidateUpdate(&policy))).To(BeTrue()) | ||
}) | ||
|
||
It("does not allow updates on vhost", func() { | ||
newPolicy := policy.DeepCopy() | ||
newPolicy.Spec.Vhost = "new-vhost" | ||
Expect(apierrors.IsForbidden(newPolicy.ValidateUpdate(&policy))).To(BeTrue()) | ||
}) | ||
|
||
It("does not allow updates on RabbitmqClusterReference", func() { | ||
newPolicy := policy.DeepCopy() | ||
newPolicy.Spec.RabbitmqClusterReference = RabbitmqClusterReference{ | ||
Name: "new-cluster", | ||
Namespace: "default", | ||
} | ||
Expect(apierrors.IsForbidden(newPolicy.ValidateUpdate(&policy))).To(BeTrue()) | ||
}) | ||
|
||
It("allows updates on policy.spec.pattern", func() { | ||
newPolicy := policy.DeepCopy() | ||
newPolicy.Spec.Pattern = "new-pattern" | ||
Expect(newPolicy.ValidateUpdate(&policy)).To(Succeed()) | ||
}) | ||
|
||
It("allows updates on policy.spec.applyTo", func() { | ||
newPolicy := policy.DeepCopy() | ||
newPolicy.Spec.ApplyTo = "queues" | ||
Expect(newPolicy.ValidateUpdate(&policy)).To(Succeed()) | ||
}) | ||
|
||
It("allows updates on policy.spec.priority", func() { | ||
newPolicy := policy.DeepCopy() | ||
newPolicy.Spec.Priority = 1000 | ||
Expect(newPolicy.ValidateUpdate(&policy)).To(Succeed()) | ||
}) | ||
|
||
It("allows updates on policy.spec.definition", func() { | ||
newPolicy := policy.DeepCopy() | ||
newPolicy.Spec.Definition = &runtime.RawExtension{Raw: []byte(`{"key":"new-definition-value"}`)} | ||
Expect(newPolicy.ValidateUpdate(&policy)).To(Succeed()) | ||
}) | ||
}) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,17 +1,17 @@ | ||
# The following patch enables conversion webhook for CRD | ||
# CRD conversion requires k8s 1.13 or later. | ||
apiVersion: apiextensions.k8s.io/v1beta1 | ||
apiVersion: apiextensions.k8s.io/v1 | ||
kind: CustomResourceDefinition | ||
metadata: | ||
name: policies.rabbitmq.com | ||
spec: | ||
conversion: | ||
strategy: Webhook | ||
webhookClientConfig: | ||
# this is "\n" used as a placeholder, otherwise it will be rejected by the apiserver for being blank, | ||
# but we're going to set it later using the cert-manager (or potentially a patch if not using cert-manager) | ||
caBundle: Cg== | ||
service: | ||
namespace: system | ||
name: webhook-service | ||
path: /convert | ||
webhook: | ||
conversionReviewVersions: ["v1", "v1beta1"] | ||
clientConfig: | ||
caBundle: Cg== | ||
service: | ||
namespace: system | ||
name: webhook-service | ||
path: /convert |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters