Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add validation to ensure no duplicate TargetRefs in policies #2986

Open
wants to merge 6 commits into
base: main
Choose a base branch
from

Conversation

bjee19
Copy link
Contributor

@bjee19 bjee19 commented Jan 7, 2025

Proposed changes

Validate that there are no duplicate TargetRefs in the UpstreamSettingsPolicy and ObservabilityPolicy. Additionally, since this change strengthens the validation rules on the ObservabilityPolicy API, we are bumping the ObservabilityPolicy API version from v1alpha1 to v1alpha2.

Problem: It's possible to create an ObservabilityPolicy or UpstreamSettingsPolicy with duplicate targetRefs. This is not a valid configuration and should be prevented.

Solution: Add CEL validation to prevent this.

Testing: Manually deployed both the UpstreamSettingsPolicy and ObservabilityPolicy and verified that duplicate targetRefs are invalid.

Closes #2923

Checklist

Before creating a PR, run through this checklist and mark each as complete.

  • I have read the CONTRIBUTING doc
  • I have added tests that prove my fix is effective or that my feature works
  • I have checked that all unit tests pass after adding my changes
  • I have updated necessary documentation
  • I have rebased my branch onto main
  • I will ensure my PR is targeting the main branch and pulling from my branch from my own fork

Release notes

If this PR introduces a change that affects users and needs to be mentioned in the release notes,
please add a brief note that summarizes the change.

Add validation to ObservabilityPolicy and UpstreamSettingsPolicy APIs to ensure no duplicate targetRefs are allowed. Also, bumped the ObservabilityPolicy API version from `v1alpha1` to `v1alpha2`.

@bjee19 bjee19 requested review from a team as code owners January 7, 2025 19:15
@github-actions github-actions bot added documentation Improvements or additions to documentation enhancement New feature or request tests Pull requests that update tests labels Jan 7, 2025
@bjee19
Copy link
Contributor Author

bjee19 commented Jan 7, 2025

Is there any specific testing I should do when bumping the version of the ObservabilityPolicy?

I verified applying the v1alpha1 version policy still works, and shows this warning:

Warning: The 'v1alpha1' version of ObservabilityPolicy API is deprecated, please migrate to 'v1alpha2'..

In addition the CEL validation is not present in the v1alpha1 version.

@bjee19
Copy link
Contributor Author

bjee19 commented Jan 7, 2025

For visibility, here is the commit which @salonichf5 wrote which bumped the version in the past but was reverted. I based my work off of that.

Should I reopen this task to fully remove v1alpha1 in 2.3.0?

@salonichf5
Copy link
Contributor

salonichf5 commented Jan 7, 2025

Is there any specific testing I should do when bumping the version of the ObservabilityPolicy?

I verified applying the v1alpha1 version policy still works, and shows this warning:

Warning: The 'v1alpha1' version of ObservabilityPolicy API is deprecated, please migrate to 'v1alpha2'..

In addition the CEL validation is not present in the v1alpha1 version.

There are 4 cases you should test

  • We can create a policy with v1alpha1 version
  • We can create a policy with v1alpha2 version
  • We can upgrade the policy from v1alpha1 --> v1alpha2 version.

Let me know if this assumption is correct @sjberman

  • I remember not being able to downgrade from v1alpha2 to v1alpha1 and this is the desired behavior.

@salonichf5
Copy link
Contributor

For visibility, here is the commit which @salonichf5 wrote which bumped the version in the past but was reverted. I based my work off of that.

Should I reopen this task to fully remove v1alpha1 in 2.3.0?

Yes we need a story to track deprecation of the old version.

Copy link
Contributor

@ADubhlaoich ADubhlaoich left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Doc changes LGTM!

@bjee19
Copy link
Contributor Author

bjee19 commented Jan 7, 2025

We can create a policy with v1alpha1 version

Works, displays Warning message, and when using kubectl get on the policy it shows apiVersion: gateway.nginx.org/v1alpha2 which was the same result from when we tried to change it last time.

We can create a policy with v1alpha2 version

Works, CEL validation is enabled.

We can upgrade a policy from v1alpha1 to v1alpha2

I tested this by simply changing the apiVersion on the policy to v1alpha2 and applying the change through kubectl apply -f. This works, not sure if there is some other more formal way I should be testing upgrading through.

I remember not being able to downgrade from v1alpha2 to v1alpha1 and this is the desired behavior.

This lines up with my results. Can't really downgrade because the apiversion shown on a policy created with v1alpha1 is shown as v1alpha2

@bjee19
Copy link
Contributor Author

bjee19 commented Jan 7, 2025

Re-opened #2767 to track the removal of the v1alpha1 API version.

@salonichf5
Copy link
Contributor

We can create a policy with v1alpha1 version

Works, displays Warning message, and when using kubectl get on the policy it shows apiVersion: gateway.nginx.org/v1alpha2 which was the same result from when we tried to change it last time.

We can create a policy with v1alpha2 version

Works, CEL validation is enabled.

We can upgrade a policy from v1alpha1 to v1alpha2

I tested this by simply changing the apiVersion on the policy to v1alpha2 and applying the change through kubectl apply -f. This works, not sure if there is some other more formal way I should be testing upgrading through.

I remember not being able to downgrade from v1alpha2 to v1alpha1 and this is the desired behavior.

This lines up with my results. Can't really downgrade because the apiversion shown on a policy created with v1alpha1 is shown as v1alpha2

Looks right !

Comment on lines +58 to +59
// TargetRefs must be _distinct_. The `name` field must be unique for all targetRef entries in the UpstreamSettingsPolicy.
//
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

question: Why is only name considered for UpstreamSettings Policy and not a combination of name and kind. Assuming their parent Ref is a gateway?

// TargetRefs must be _distinct_. This means that the multi-part key defined by `kind` and `name` must
	// be unique across all targetRef entries in the ObservabilityPolicy.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

good question, I did it this way because in the UpstreamSettingsPolicy, the Kind must be of type "service" and also has constraints on the group.

I originally had combination of name-kind-group, but realized since we have constraints and already have validation on these other fields, we can just do name for USP and combination of name and kind for the observability policy

@salonichf5
Copy link
Contributor

You might need to open this PR against main branch instead of your fork for the Plus Build fails

Copy link
Contributor

@salonichf5 salonichf5 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just had a small question otherwise looks good to me

@kate-osborn kate-osborn added the change Pull requests that introduce a change label Jan 8, 2025
@kate-osborn
Copy link
Contributor

@bjee19 since this is a breaking change, I added the change label to the PR.

// Examples: 120s, 50ms, 5m, 1h.
//
// +kubebuilder:validation:Pattern=`^[0-9]{1,4}(ms|s|m|h)?$`
type Duration string
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I feel like ObservabilityPolicy could just import these from v1alpha1, no?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep, we can leave this file in v1alpha1

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I like the idea of keeping the package shared types different and since I also saw that there were distinct shared_types.go files in the gateway api repo https://github.com/kubernetes-sigs/gateway-api/tree/main/apis , I think it would be good to do.

However I do see how the alpha packages (only 2 of them) share the same shared_types.go while the beta and v1 packages have their own shared_types.go files (even though there is a lot of overlap).

So I would also be fine with sharing the types within the larger version (alpha,beta,v1) and creating a new file perhaps if a type changes within (like alpha1->alpha2) with only the specific changes necessary. While creating different shared_types.go files for the larger version/stage changes (not sure what this is called).

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My opinion is that we shouldn't create a new shared_types file until there's a reason to (e.g. a new shared type is added to v1alpha2 or a field changes).

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds good yea I'll change it

@kate-osborn
Copy link
Contributor

@bjee19 even though there are no spec/status field changes to ObservabilityPolicy, now that we moved the API to v1alpha2, we need to update the controller code to process v1alpha2 ObservabilityPolicies instead of v1alpha1.

@github-actions github-actions bot removed the change Pull requests that introduce a change label Jan 8, 2025
@bjee19 bjee19 added the change Pull requests that introduce a change label Jan 8, 2025
@bjee19
Copy link
Contributor Author

bjee19 commented Jan 8, 2025

we need to update the controller code to process v1alpha2 ObservabilityPolicies instead of v1alpha1.

Following doing this, I tested applying a v1alpha1 Observability policy following the tracing guide here: https://docs.nginx.com/nginx-gateway-fabric/how-to/monitoring/tracing/, and found that it successfully updated NGINX conf. Tested the v1alpha2 and that successfully updated NGINX conf too.

@bjee19 bjee19 requested review from kate-osborn and sjberman January 8, 2025 22:37
@bjee19
Copy link
Contributor Author

bjee19 commented Jan 8, 2025

Does anyone know if there is a better way to update the controller code to use the new version of a CRD? I manually did it and there isn't really any verification that I caught all the places besides me just double checking and running the tests.

Comment on lines -37 to +38
ngfAPI "github.com/nginxinc/nginx-gateway-fabric/apis/v1alpha1"
ngfAPIv1alpha1 "github.com/nginxinc/nginx-gateway-fabric/apis/v1alpha1"
ngfAPIv1alpha2 "github.com/nginxinc/nginx-gateway-fabric/apis/v1alpha2"
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

how is this naming change? I followed what we do above with the gatewayv1alpha3 and gatewayv1beta1 style formatting.

Should we change other places in the code base that still use ngfAPI on a need to basis?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Name change looks good to me.

Should we change other places in the code base that still use ngfAPI on a need to basis?

Yep 🙂

@kate-osborn
Copy link
Contributor

Does anyone know if there is a better way to update the controller code to use the new version of a CRD? I manually did it and there isn't really any verification that I caught all the places besides me just double checking and running the tests.

Don't think there's a quicker way. You can double check that you caught everything by looking at the code references of the v1alpha1 ObservabilityPolicy types. There shouldn't be any in the internal directory.

@bjee19
Copy link
Contributor Author

bjee19 commented Jan 8, 2025

You can double check that you caught everything by looking at the code references of the v1alpha1 ObservabilityPolicy types. There shouldn't be any in the internal directory.

Yep, thanks for pointing that out, I already did that on my double check so we're good i guess 🤞

@github-actions github-actions bot removed the change Pull requests that introduce a change label Jan 8, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation enhancement New feature or request release-notes tests Pull requests that update tests
Projects
Status: 🆕 New
Development

Successfully merging this pull request may close these issues.

Don't allow duplicate TargetRefs for NGF Policies
5 participants