/
validation.go
77 lines (65 loc) · 3.18 KB
/
validation.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
/*
* Tencent is pleased to support the open source community by making TKEStack
* available.
*
* Copyright (C) 2012-2019 Tencent. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use
* this file except in compliance with the License. You may obtain a copy of the
* License at
*
* https://opensource.org/licenses/Apache-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OF ANY KIND, either express or implied. See the License for the
* specific language governing permissions and limitations under the License.
*/
package namespace
import (
"context"
"fmt"
apimachineryvalidation "k8s.io/apimachinery/pkg/api/validation"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/util/sets"
"k8s.io/apimachinery/pkg/util/validation/field"
registryinternalclient "tkestack.io/tke/api/client/clientset/internalversion/typed/registry/internalversion"
"tkestack.io/tke/api/registry"
)
// ValidateNamespaceName is a ValidateNameFunc for names that must be a DNS
// subdomain.
var ValidateNamespaceName = apimachineryvalidation.NameIsDNSLabel
// ValidateNamespace tests if required fields in the namespace are set.
func ValidateNamespace(ctx context.Context, namespace *registry.Namespace, registryClient *registryinternalclient.RegistryClient) field.ErrorList {
allErrs := apimachineryvalidation.ValidateObjectMeta(&namespace.ObjectMeta, false, ValidateNamespaceName, field.NewPath("metadata"))
fldSpecPath := field.NewPath("spec")
if namespace.Spec.Name == "" {
allErrs = append(allErrs, field.Required(fldSpecPath.Child("name"), "must specify name"))
} else {
namespaceList, err := registryClient.Namespaces().List(ctx, metav1.ListOptions{
FieldSelector: fmt.Sprintf("spec.tenantID=%s,spec.name=%s", namespace.Spec.TenantID, namespace.Spec.Name),
})
if err != nil {
allErrs = append(allErrs, field.InternalError(fldSpecPath.Child("name"), err))
} else if len(namespaceList.Items) > 0 {
allErrs = append(allErrs, field.Duplicate(fldSpecPath.Child("name"), namespace.Spec.Name))
}
}
visibilities := sets.NewString(string(registry.VisibilityPrivate), string(registry.VisibilityPublic))
if !visibilities.Has(string(namespace.Spec.Visibility)) {
allErrs = append(allErrs, field.NotSupported(fldSpecPath.Child("visibility"), namespace.Spec.Visibility, visibilities.List()))
}
return allErrs
}
// ValidateNamespaceUpdate tests if required fields in the namespace are set during
// an update.
func ValidateNamespaceUpdate(ctx context.Context, namespace *registry.Namespace, old *registry.Namespace) field.ErrorList {
allErrs := apimachineryvalidation.ValidateObjectMetaUpdate(&namespace.ObjectMeta, &old.ObjectMeta, field.NewPath("metadata"))
if namespace.Spec.TenantID != old.Spec.TenantID {
allErrs = append(allErrs, field.Invalid(field.NewPath("spec", "tenantID"), namespace.Spec.TenantID, "disallowed change the tenant"))
}
if namespace.Spec.Name != old.Spec.Name {
allErrs = append(allErrs, field.Invalid(field.NewPath("spec", "name"), namespace.Spec.Name, "disallowed change the name"))
}
return allErrs
}