-
Notifications
You must be signed in to change notification settings - Fork 235
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fix ComputeFirewallPolicyRule Reference and Identity
- Loading branch information
Showing
5 changed files
with
266 additions
and
263 deletions.
There are no files selected for viewing
172 changes: 0 additions & 172 deletions
172
apis/compute/v1beta1/computefirewallpolicyrule_reference.go
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,87 @@ | ||
// Copyright 2024 Google LLC | ||
// | ||
// Licensed under the Apache License, Version 2.0 (the "License"); | ||
// you may not use this file except in compliance with the License. | ||
// You may obtain a copy of the License at | ||
// | ||
// http://www.apache.org/licenses/LICENSE-2.0 | ||
// | ||
// Unless required by applicable law or agreed to in writing, software | ||
// distributed under the License is distributed on an "AS IS" BASIS, | ||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
// See the License for the specific language governing permissions and | ||
// limitations under the License. | ||
|
||
package v1beta1 | ||
|
||
import ( | ||
"context" | ||
"fmt" | ||
"strconv" | ||
|
||
"github.com/GoogleCloudPlatform/k8s-config-connector/apis/common" | ||
refsv1beta1 "github.com/GoogleCloudPlatform/k8s-config-connector/apis/refs/v1beta1" | ||
"sigs.k8s.io/controller-runtime/pkg/client" | ||
) | ||
|
||
type FirewallPolicyRuleIdentity struct { | ||
id int64 | ||
parent *FirewallPolicyRuleParent | ||
} | ||
|
||
func (i *FirewallPolicyRuleIdentity) String() string { | ||
p := strconv.Itoa(int(i.id)) | ||
return i.parent.String() + "/rules/" + p | ||
} | ||
|
||
func (i *FirewallPolicyRuleIdentity) Parent() *FirewallPolicyRuleParent { | ||
return i.parent | ||
} | ||
|
||
func (i *FirewallPolicyRuleIdentity) ID() int64 { | ||
return i.id | ||
} | ||
|
||
type FirewallPolicyRuleParent struct { | ||
FirewallPolicy string | ||
} | ||
|
||
func (p *FirewallPolicyRuleParent) String() string { | ||
return "locations/global/firewallPolicies/" + p.FirewallPolicy | ||
} | ||
|
||
func NewSecretIdentity(ctx context.Context, reader client.Reader, obj *ComputeFirewallPolicyRule) (*FirewallPolicyRuleIdentity, error) { | ||
//Get parent | ||
firewallPolicyRef, err := refsv1beta1.ResolveComputeFirewallPolicy(ctx, reader, obj, obj.Spec.FirewallPolicyRef) | ||
if err != nil { | ||
return nil, err | ||
} | ||
firewallPolicy := firewallPolicyRef.External | ||
if firewallPolicy == "" { | ||
return nil, fmt.Errorf("cannot resolve firewallPolicy") | ||
} | ||
|
||
// Get priority. Priority is a required field | ||
priority := obj.Spec.Priority | ||
|
||
// Use approved External | ||
externalRef := common.ValueOf(obj.Status.ExternalRef) | ||
if externalRef != "" { | ||
actualIdentity, err := parseFirewallPolicyRuleExternal(externalRef) | ||
if err != nil { | ||
return nil, err | ||
} | ||
if actualIdentity.parent.FirewallPolicy != firewallPolicy { | ||
return nil, fmt.Errorf("spec.FirewallPolicyRef changed, expect %s, got %s", actualIdentity.parent.FirewallPolicy, firewallPolicy) | ||
} | ||
if actualIdentity.id != priority { | ||
return nil, fmt.Errorf("cannot reset `spec.priority` to %d, since it has already assigned to %d", | ||
priority, actualIdentity.id) | ||
} | ||
} | ||
|
||
return &FirewallPolicyRuleIdentity{ | ||
parent: &FirewallPolicyRuleParent{FirewallPolicy: firewallPolicy}, | ||
id: priority, | ||
}, nil | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,98 @@ | ||
// Copyright 2024 Google LLC | ||
// | ||
// Licensed under the Apache License, Version 2.0 (the "License"); | ||
// you may not use this file except in compliance with the License. | ||
// You may obtain a copy of the License at | ||
// | ||
// http://www.apache.org/licenses/LICENSE-2.0 | ||
// | ||
// Unless required by applicable law or agreed to in writing, software | ||
// distributed under the License is distributed on an "AS IS" BASIS, | ||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
// See the License for the specific language governing permissions and | ||
// limitations under the License. | ||
|
||
package v1beta1 | ||
|
||
import ( | ||
"context" | ||
"fmt" | ||
"strconv" | ||
"strings" | ||
|
||
refsv1beta1 "github.com/GoogleCloudPlatform/k8s-config-connector/apis/refs/v1beta1" | ||
"github.com/GoogleCloudPlatform/k8s-config-connector/pkg/k8s" | ||
apierrors "k8s.io/apimachinery/pkg/api/errors" | ||
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" | ||
"k8s.io/apimachinery/pkg/types" | ||
"sigs.k8s.io/controller-runtime/pkg/client" | ||
) | ||
|
||
var _ refsv1beta1.ExternalNormalizer = &FirewallPolicyRuleRef{} | ||
|
||
// FirewallPolicyRuleRef defines the resource reference to ComputeFirewallPolicyRule, which "External" field | ||
// holds the GCP identifier for the KRM object. | ||
type FirewallPolicyRuleRef struct { | ||
// A reference to an externally managed ComputeFirewallPolicyRule resource. | ||
// Should be in the format "locations/global/firewallPolicies/{{firewallPolicy}}/rules/{{priority}}". | ||
External string `json:"external,omitempty"` | ||
|
||
// The name of a ComputeFirewallPolicyRule resource. | ||
Name string `json:"name,omitempty"` | ||
|
||
// The namespace of a ComputeFirewallPolicyRule resource. | ||
Namespace string `json:"namespace,omitempty"` | ||
} | ||
|
||
// NormalizedExternal provision the "External" value for other resource that depends on ComputeFirewallPolicyRule. | ||
// If the "External" is given in the other resource's spec.ComputeFirewallPolicyRuleRef, the given value will be used. | ||
// Otherwise, the "Name" and "Namespace" will be used to query the actual ComputeFirewallPolicyRule object from the cluster. | ||
func (r *FirewallPolicyRuleRef) NormalizedExternal(ctx context.Context, reader client.Reader, otherNamespace string) (string, error) { | ||
if r.External != "" && r.Name != "" { | ||
return "", fmt.Errorf("cannot specify both name and external on %s reference", ComputeFirewallPolicyRuleGVK.Kind) | ||
} | ||
// From given External | ||
if r.External != "" { | ||
if _, err := parseFirewallPolicyRuleExternal(r.External); err != nil { | ||
return "", err | ||
} | ||
return r.External, nil | ||
} | ||
|
||
// From the Config Connector object | ||
if r.Namespace == "" { | ||
r.Namespace = otherNamespace | ||
} | ||
key := types.NamespacedName{Name: r.Name, Namespace: r.Namespace} | ||
u := &unstructured.Unstructured{} | ||
u.SetGroupVersionKind(ComputeFirewallPolicyRuleGVK) | ||
if err := reader.Get(ctx, key, u); err != nil { | ||
if apierrors.IsNotFound(err) { | ||
return "", k8s.NewReferenceNotFoundError(u.GroupVersionKind(), key) | ||
} | ||
return "", fmt.Errorf("reading referenced %s %s: %w", ComputeFirewallPolicyRuleGVK, key, err) | ||
} | ||
// Get external from status.externalRef. This is the most trustworthy place. | ||
actualExternalRef, _, err := unstructured.NestedString(u.Object, "status", "externalRef") | ||
if err != nil { | ||
return "", fmt.Errorf("reading status.externalRef: %w", err) | ||
} | ||
if actualExternalRef == "" { | ||
return "", fmt.Errorf("ComputeFirewallPolicyRule is not ready yet") | ||
} | ||
r.External = actualExternalRef | ||
return r.External, nil | ||
} | ||
|
||
func parseFirewallPolicyRuleExternal(external string) (*FirewallPolicyRuleIdentity, error) { | ||
tokens := strings.Split(external, "/") | ||
if len(tokens) != 6 || tokens[0] != "locations" || tokens[2] != "firewallPolicies" || tokens[4] != "rules" { | ||
return nil, fmt.Errorf("format of ComputeFirewallPolicyRule external=%q was not known (use firewallPolicies/{{firewallPolicy}}/rules/{{priority}})", external) | ||
} | ||
id := &FirewallPolicyRuleIdentity{} | ||
_, err := strconv.ParseInt(tokens[5], 10, 32) | ||
if err != nil { | ||
return nil, fmt.Errorf("error convert priority %s of ComputeFirewallPolicyRule external=%q to an integer: %w", tokens[5], external, err) | ||
} | ||
return id, nil | ||
} |
Oops, something went wrong.