che-operator/api/v2/checluster_webhook.go

197 lines
6.0 KiB
Go

//
// Copyright (c) 2019-2022 Red Hat, Inc.
// This program and the accompanying materials are made
// available under the terms of the Eclipse Public License 2.0
// which is available at https://www.eclipse.org/legal/epl-2.0/
//
// SPDX-License-Identifier: EPL-2.0
//
// Contributors:
// Red Hat, Inc. - initial API and implementation
//
package v2
import (
"context"
"fmt"
"strings"
"github.com/eclipse-che/che-operator/pkg/common/constants"
"k8s.io/apimachinery/pkg/types"
"k8s.io/apimachinery/pkg/util/json"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
k8shelper "github.com/eclipse-che/che-operator/pkg/common/k8s-helper"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/webhook"
)
var (
logger = ctrl.Log.WithName("webhook")
)
func (r *CheCluster) SetupWebhookWithManager(mgr ctrl.Manager) error {
return ctrl.NewWebhookManagedBy(mgr).
For(r).
Complete()
}
var _ webhook.Defaulter = &CheCluster{}
// Default implements webhook.Defaulter so a webhook will be registered for the type
func (r *CheCluster) Default() {
if r.IsContainerBuildCapabilitiesEnabled() && r.Spec.DevEnvironments.ContainerBuildConfiguration == nil {
r.Spec.DevEnvironments.ContainerBuildConfiguration = &ContainerBuildConfiguration{}
}
}
var _ webhook.Validator = &CheCluster{}
// ValidateCreate implements webhook.Validator so a webhook will be registered for the type
func (r *CheCluster) ValidateCreate() error {
if err := ensureSingletonCheCluster(); err != nil {
return err
}
return validate(r)
}
// ValidateUpdate implements webhook.Validator so a webhook will be registered for the type
func (r *CheCluster) ValidateUpdate(old runtime.Object) error {
return validate(r)
}
// ValidateDelete implements webhook.Validator so a webhook will be registered for the type
func (r *CheCluster) ValidateDelete() error {
return nil
}
func ensureSingletonCheCluster() error {
client := k8shelper.New().GetClient()
utilruntime.Must(AddToScheme(client.Scheme()))
che := &CheClusterList{}
err := client.List(context.TODO(), che)
if err != nil {
logger.Error(err, "Failed to list CheCluster Custom Resources.")
}
if len(che.Items) != 0 {
return fmt.Errorf("only one CheCluster is allowed")
}
return nil
}
func validate(checluster *CheCluster) error {
for _, github := range checluster.Spec.GitServices.GitHub {
if err := validateGitHubOAuthSecret(github, checluster.Namespace); err != nil {
return err
}
}
for _, gitlab := range checluster.Spec.GitServices.GitLab {
if err := validateGitLabOAuthSecret(gitlab, checluster.Namespace); err != nil {
return err
}
}
for _, bitbucket := range checluster.Spec.GitServices.BitBucket {
if err := validateBitBucketOAuthSecret(bitbucket, checluster.Namespace); err != nil {
return err
}
}
return nil
}
func validateGitHubOAuthSecret(github GitHubService, namespace string) error {
if github.SecretName == "" {
return nil
}
keys2validate := []string{constants.GitHubOAuthConfigClientIdFileName, constants.GitHubOAuthConfigClientSecretFileName}
if err := validateSecretKeys(keys2validate, github.SecretName, namespace); err != nil {
return err
}
if err := ensureScmLabelsAndAnnotations("github", github.Endpoint, github.SecretName, namespace); err != nil {
return err
}
return nil
}
func validateGitLabOAuthSecret(gitlab GitLabService, namespace string) error {
if gitlab.SecretName == "" {
return nil
}
keys2validate := []string{constants.GitLabOAuthConfigClientIdFileName, constants.GitLabOAuthConfigClientSecretFileName}
if err := validateSecretKeys(keys2validate, gitlab.SecretName, namespace); err != nil {
return err
}
if err := ensureScmLabelsAndAnnotations("gitlab", gitlab.Endpoint, gitlab.SecretName, namespace); err != nil {
return err
}
return nil
}
func validateBitBucketOAuthSecret(bitbucket BitBucketService, namespace string) error {
if bitbucket.SecretName == "" {
return nil
}
oauth1Keys2validate := []string{constants.BitBucketOAuthConfigPrivateKeyFileName, constants.BitBucketOAuthConfigConsumerKeyFileName}
errOauth1Keys := validateSecretKeys(oauth1Keys2validate, bitbucket.SecretName, namespace)
oauth2Keys2validate := []string{constants.BitBucketOAuthConfigClientIdFileName, constants.BitBucketOAuthConfigClientSecretFileName}
errOauth2Keys := validateSecretKeys(oauth2Keys2validate, bitbucket.SecretName, namespace)
if errOauth1Keys != nil && errOauth2Keys != nil {
return fmt.Errorf("secret must contain either [%s] or [%s] keys", strings.Join(oauth1Keys2validate, ", "), strings.Join(oauth2Keys2validate, ", "))
}
if err := ensureScmLabelsAndAnnotations("bitbucket", bitbucket.Endpoint, bitbucket.SecretName, namespace); err != nil {
return err
}
return nil
}
func ensureScmLabelsAndAnnotations(scmProvider string, endpointUrl string, secretName string, namespace string) error {
patch := corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Annotations: map[string]string{
constants.CheEclipseOrgOAuthScmServer: scmProvider,
constants.CheEclipseOrgScmServerEndpoint: endpointUrl,
},
Labels: map[string]string{
constants.KubernetesPartOfLabelKey: constants.CheEclipseOrg,
constants.KubernetesComponentLabelKey: constants.OAuthScmConfiguration,
},
},
}
patchData, _ := json.Marshal(patch)
k8sHelper := k8shelper.New()
if _, err := k8sHelper.GetClientset().CoreV1().Secrets(namespace).Patch(context.TODO(), secretName, types.MergePatchType, patchData, metav1.PatchOptions{}); err != nil {
return err
}
return nil
}
func validateSecretKeys(keys []string, secretName string, namespace string) error {
k8sHelper := k8shelper.New()
secret, err := k8sHelper.GetClientset().CoreV1().Secrets(namespace).Get(context.TODO(), secretName, metav1.GetOptions{})
if err != nil {
return err
}
for _, key := range keys {
if len(secret.Data[key]) == 0 {
return fmt.Errorf("secret must contain [%s] keys", strings.Join(keys, ", "))
}
}
return nil
}