-
Notifications
You must be signed in to change notification settings - Fork 7.6k
/
validation.go
110 lines (99 loc) · 3.57 KB
/
validation.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
// Copyright Istio Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package schema
import (
"github.com/hashicorp/go-multierror"
"istio.io/istio/pkg/config"
"istio.io/istio/pkg/config/analysis"
"istio.io/istio/pkg/config/analysis/diag"
"istio.io/istio/pkg/config/analysis/msg"
"istio.io/istio/pkg/config/resource"
"istio.io/istio/pkg/config/schema/collections"
sresource "istio.io/istio/pkg/config/schema/resource"
"istio.io/istio/pkg/config/validation"
)
// ValidationAnalyzer runs schema validation as an analyzer and reports any violations as messages
type ValidationAnalyzer struct {
s sresource.Schema
}
var _ analysis.Analyzer = &ValidationAnalyzer{}
func CollectionValidationAnalyzer(s sresource.Schema) analysis.Analyzer {
return &ValidationAnalyzer{s: s}
}
// AllValidationAnalyzers returns a slice with a validation analyzer for each Istio schema
// This automation comes with an assumption: that the collection names used by the schema match the metadata used by Galley components
func AllValidationAnalyzers() []analysis.Analyzer {
result := make([]analysis.Analyzer, 0)
collections.Istio.ForEach(func(s sresource.Schema) (done bool) {
result = append(result, &ValidationAnalyzer{s: s})
return
})
return result
}
// Metadata implements Analyzer
func (a *ValidationAnalyzer) Metadata() analysis.Metadata {
return analysis.Metadata{
Name: "schema.ValidationAnalyzer." + a.s.Kind(),
Description: "Runs schema validation as an analyzer on '" + a.s.Kind() + "' resources",
Inputs: []config.GroupVersionKind{a.s.GroupVersionKind()},
}
}
// Analyze implements Analyzer
func (a *ValidationAnalyzer) Analyze(ctx analysis.Context) {
gv := a.s.GroupVersionKind()
ctx.ForEach(gv, func(r *resource.Instance) bool {
ns := r.Metadata.FullName.Namespace
name := r.Metadata.FullName.Name
warnings, err := a.s.ValidateConfig(config.Config{
Meta: config.Meta{
Name: string(name),
Namespace: string(ns),
},
Spec: r.Message,
})
if err != nil {
if multiErr, ok := err.(*multierror.Error); ok {
for _, err := range multiErr.WrappedErrors() {
ctx.Report(gv, morePreciseMessage(r, err, true))
}
} else {
ctx.Report(gv, morePreciseMessage(r, err, true))
}
}
if warnings != nil {
if multiErr, ok := warnings.(*multierror.Error); ok {
for _, err := range multiErr.WrappedErrors() {
ctx.Report(gv, morePreciseMessage(r, err, false))
}
} else {
ctx.Report(gv, morePreciseMessage(r, warnings, false))
}
}
return true
})
}
func morePreciseMessage(r *resource.Instance, err error, isError bool) diag.Message {
if aae, ok := err.(*validation.AnalysisAwareError); ok {
switch aae.Type {
case "VirtualServiceUnreachableRule":
return msg.NewVirtualServiceUnreachableRule(r, aae.Parameters[0].(string), aae.Parameters[1].(string))
case "VirtualServiceIneffectiveMatch":
return msg.NewVirtualServiceIneffectiveMatch(r, aae.Parameters[0].(string), aae.Parameters[1].(string), aae.Parameters[2].(string))
}
}
if !isError {
return msg.NewSchemaWarning(r, err)
}
return msg.NewSchemaValidationError(r, err)
}