mirror of
https://github.com/projectcapsule/capsule.git
synced 2026-05-17 06:46:38 +00:00
* chore(deps): update dependency golangci/golangci-lint to v2.8.0 * chore(deps): update dependency golangci/golangci-lint to v2.8.0 Signed-off-by: Hristo Hristov <me@hhristov.info> * chore(deps): update dependency golangci/golangci-lint to v2.8.0 Signed-off-by: Hristo Hristov <me@hhristov.info> * chore(deps): update dependency golangci/golangci-lint to v2.8.0 Signed-off-by: Hristo Hristov <me@hhristov.info> --------- Signed-off-by: Hristo Hristov <me@hhristov.info> Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> Co-authored-by: Hristo Hristov <me@hhristov.info>
107 lines
2.9 KiB
Go
107 lines
2.9 KiB
Go
// Copyright 2020-2026 Project Capsule Authors
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package pvc
|
|
|
|
import (
|
|
"context"
|
|
"net/http"
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
|
"k8s.io/apimachinery/pkg/api/errors"
|
|
"k8s.io/client-go/tools/record"
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
"sigs.k8s.io/controller-runtime/pkg/webhook/admission"
|
|
|
|
capsulev1beta2 "github.com/projectcapsule/capsule/api/v1beta2"
|
|
capsulewebhook "github.com/projectcapsule/capsule/internal/webhook"
|
|
"github.com/projectcapsule/capsule/internal/webhook/utils"
|
|
)
|
|
|
|
type validating struct{}
|
|
|
|
func Validating() capsulewebhook.TypedHandlerWithTenant[*corev1.PersistentVolumeClaim] {
|
|
return &validating{}
|
|
}
|
|
|
|
func (h *validating) OnCreate(
|
|
c client.Client,
|
|
pvc *corev1.PersistentVolumeClaim,
|
|
decoder admission.Decoder,
|
|
recorder record.EventRecorder,
|
|
tnt *capsulev1beta2.Tenant,
|
|
) capsulewebhook.Func {
|
|
return func(ctx context.Context, req admission.Request) *admission.Response {
|
|
allowed := tnt.Spec.StorageClasses
|
|
|
|
if allowed == nil {
|
|
return nil
|
|
}
|
|
|
|
storageClass := pvc.Spec.StorageClassName
|
|
|
|
if storageClass == nil {
|
|
recorder.Eventf(tnt, corev1.EventTypeWarning, "MissingStorageClass", "PersistentVolumeClaim %s/%s is missing StorageClass", req.Namespace, req.Name)
|
|
|
|
response := admission.Denied(NewStorageClassNotValid(*tnt.Spec.StorageClasses).Error())
|
|
|
|
return &response
|
|
}
|
|
|
|
selector := false
|
|
|
|
// Verify if the StorageClass exists and matches the label selector/expression
|
|
if len(allowed.MatchExpressions) > 0 || len(allowed.MatchLabels) > 0 {
|
|
storageClassObj, err := utils.GetStorageClassByName(ctx, c, *storageClass)
|
|
if err != nil && !errors.IsNotFound(err) {
|
|
response := admission.Errored(http.StatusInternalServerError, err)
|
|
|
|
return &response
|
|
}
|
|
|
|
// Storage Class is present, check if it matches the selector
|
|
if storageClassObj != nil {
|
|
selector = allowed.SelectorMatch(storageClassObj)
|
|
}
|
|
}
|
|
|
|
switch {
|
|
case allowed.MatchDefault(*storageClass):
|
|
return nil
|
|
case allowed.Match(*storageClass) || selector:
|
|
return nil
|
|
default:
|
|
recorder.Eventf(tnt, corev1.EventTypeWarning, "ForbiddenStorageClass", "PersistentVolumeClaim %s/%s StorageClass %s is forbidden for the current Tenant", req.Namespace, req.Name, *storageClass)
|
|
|
|
response := admission.Denied(NewStorageClassForbidden(*pvc.Spec.StorageClassName, *tnt.Spec.StorageClasses).Error())
|
|
|
|
return &response
|
|
}
|
|
}
|
|
}
|
|
|
|
func (h *validating) OnUpdate(
|
|
client.Client,
|
|
*corev1.PersistentVolumeClaim,
|
|
*corev1.PersistentVolumeClaim,
|
|
admission.Decoder,
|
|
record.EventRecorder,
|
|
*capsulev1beta2.Tenant,
|
|
) capsulewebhook.Func {
|
|
return func(context.Context, admission.Request) *admission.Response {
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func (h *validating) OnDelete(
|
|
client.Client,
|
|
*corev1.PersistentVolumeClaim,
|
|
admission.Decoder,
|
|
record.EventRecorder,
|
|
*capsulev1beta2.Tenant,
|
|
) capsulewebhook.Func {
|
|
return func(context.Context, admission.Request) *admission.Response {
|
|
return nil
|
|
}
|
|
}
|