// Copyright 2020-2026 Project Capsule Authors // SPDX-License-Identifier: Apache-2.0 package dra import ( "context" "net/http" corev1 "k8s.io/api/core/v1" resources "k8s.io/api/resource/v1" k8serrors "k8s.io/apimachinery/pkg/api/errors" "k8s.io/client-go/tools/events" "sigs.k8s.io/controller-runtime/pkg/client" "sigs.k8s.io/controller-runtime/pkg/webhook/admission" "github.com/projectcapsule/capsule/internal/webhook/utils" caperrors "github.com/projectcapsule/capsule/pkg/api/errors" evt "github.com/projectcapsule/capsule/pkg/runtime/events" "github.com/projectcapsule/capsule/pkg/runtime/handlers" "github.com/projectcapsule/capsule/pkg/tenant" ) type deviceClass struct{} func DeviceClass() handlers.Handler { return &deviceClass{} } func (h *deviceClass) OnCreate(c client.Client, decoder admission.Decoder, recorder events.EventRecorder) handlers.Func { return func(ctx context.Context, req admission.Request) *admission.Response { switch res := req.Kind.Kind; res { case "ResourceClaim": rc := &resources.ResourceClaim{} if err := decoder.Decode(req, rc); err != nil { return utils.ErroredResponse(err) } return h.validateResourceRequest(ctx, c, decoder, recorder, req, rc.Namespace, rc.Spec.Devices.Requests) case "ResourceClaimTemplate": rct := &resources.ResourceClaimTemplate{} if err := decoder.Decode(req, rct); err != nil { return utils.ErroredResponse(err) } return h.validateResourceRequest(ctx, c, decoder, recorder, req, rct.Namespace, rct.Spec.Spec.Devices.Requests) default: return nil } } } func (h *deviceClass) OnDelete(client.Client, admission.Decoder, events.EventRecorder) handlers.Func { return func(context.Context, admission.Request) *admission.Response { return nil } } func (h *deviceClass) OnUpdate(client.Client, admission.Decoder, events.EventRecorder) handlers.Func { return func(context.Context, admission.Request) *admission.Response { return nil } } func (h *deviceClass) validateResourceRequest(ctx context.Context, c client.Client, _ admission.Decoder, recorder events.EventRecorder, req admission.Request, namespace string, requests []resources.DeviceRequest) *admission.Response { tnt, err := tenant.TenantByStatusNamespace(ctx, c, namespace) if err != nil { return utils.ErroredResponse(err) } if tnt == nil { return nil } allowed := tnt.Spec.DeviceClasses if allowed == nil { return nil } for _, dr := range requests { dc, err := utils.GetDeviceClassByName(ctx, c, dr.Exactly.DeviceClassName) if err != nil && !k8serrors.IsNotFound(err) { response := admission.Errored(http.StatusInternalServerError, err) return &response } if dc == nil { recorder.Eventf(tnt, dc, corev1.EventTypeWarning, evt.ReasonMissingDeviceClass, evt.ActionValidationDenied, "%s %s/%s is missing DeviceClass", req.Kind.Kind, req.Namespace, req.Name) response := admission.Denied(caperrors.NewDeviceClassUndefined(*allowed).Error()) return &response } selector := allowed.SelectorMatch(dc) switch { case allowed.Match(dc.Name) || selector: return nil default: recorder.Eventf(tnt, dc, corev1.EventTypeWarning, evt.ReasonForbiddenDeviceClass, evt.ActionValidationDenied, "%s %s/%s DeviceClass %s is forbidden for the current Tenant", req.Kind.Kind, req.Namespace, req.Name, &dc) response := admission.Denied(caperrors.NewDeviceClassForbidden(dc.Name, *allowed).Error()) return &response } } return nil }