// isFederationQuery checks if the given query `path` matches the federated service query pattern. // The conjunction of the following conditions forms the test for the federated service query // pattern: // 1. `path` has exactly 4+len(domainPath) segments: mysvc.myns.myfederation.svc.domain.path. // 2. Service name component must be a valid RFC 1035 name. // 3. Namespace component must be a valid RFC 1123 name. // 4. Federation component must also be a valid RFC 1123 name. // 5. Fourth segment is exactly "svc" // 6. The remaining segments match kd.domainPath. // 7. And federation must be one of the listed federations in the config. // Note: Because of the above conditions, this method will treat wildcard queries such as // *.mysvc.myns.myfederation.svc.domain.path as non-federation queries. // We can add support for wildcard queries later, if needed. func (kd *KubeDNS) isFederationQuery(path []string) bool { if len(path) != 4+len(kd.domainPath) { glog.V(2).Infof("not a federation query: len(%q) != 4+len(%q)", path, kd.domainPath) return false } if errs := validation.IsDNS1035Label(path[0]); len(errs) != 0 { glog.V(2).Infof("not a federation query: %q is not an RFC 1035 label: %q", path[0], errs) return false } if errs := validation.IsDNS1123Label(path[1]); len(errs) != 0 { glog.V(2).Infof("not a federation query: %q is not an RFC 1123 label: %q", path[1], errs) return false } if errs := validation.IsDNS1123Label(path[2]); len(errs) != 0 { glog.V(2).Infof("not a federation query: %q is not an RFC 1123 label: %q", path[2], errs) return false } if path[3] != serviceSubdomain { glog.V(2).Infof("not a federation query: %q != %q (serviceSubdomain)", path[3], serviceSubdomain) return false } for i, domComp := range kd.domainPath { // kd.domainPath is reversed, so we need to look in the `path` in the reverse order. if domComp != path[len(path)-i-1] { glog.V(2).Infof("not a federation query: kd.domainPath[%d] != path[%d] (%q != %q)", i, len(path)-i-1, domComp, path[len(path)-i-1]) return false } } if _, ok := kd.federations[path[2]]; !ok { glog.V(2).Infof("not a federation query: kd.federations[%q] not found", path[2]) return false } return true }
func ValidateAPIService(apiServer *discoveryapi.APIService) field.ErrorList { requiredName := apiServer.Spec.Version + "." + apiServer.Spec.Group allErrs := validation.ValidateObjectMeta(&apiServer.ObjectMeta, false, func(name string, prefix bool) []string { if minimalFailures := path.IsValidPathSegmentName(name); len(minimalFailures) > 0 { return minimalFailures } // the name *must* be version.group if name != requiredName { return []string{fmt.Sprintf("must be `spec.version+\".\"+spec.group`: %q", requiredName)} } return []string{} }, field.NewPath("metadata")) // in this case we allow empty group if len(apiServer.Spec.Group) == 0 && apiServer.Spec.Version != "v1" { allErrs = append(allErrs, field.Required(field.NewPath("spec", "group"), "only v1 may have an empty group and it better be legacy kube")) } if len(apiServer.Spec.Group) > 0 { for _, errString := range utilvalidation.IsDNS1123Subdomain(apiServer.Spec.Group) { allErrs = append(allErrs, field.Invalid(field.NewPath("spec", "group"), apiServer.Spec.Group, errString)) } } for _, errString := range utilvalidation.IsDNS1035Label(apiServer.Spec.Version) { allErrs = append(allErrs, field.Invalid(field.NewPath("spec", "version"), apiServer.Spec.Version, errString)) } if apiServer.Spec.Priority <= 0 || apiServer.Spec.Priority > 1000 { allErrs = append(allErrs, field.Invalid(field.NewPath("spec", "priority"), apiServer.Spec.Priority, "priority must be positive and less than 1000")) } if len(apiServer.Spec.Service.Namespace) == 0 { allErrs = append(allErrs, field.Required(field.NewPath("spec", "service", "namespace"), "")) } if len(apiServer.Spec.Service.Name) == 0 { allErrs = append(allErrs, field.Required(field.NewPath("spec", "service", "name"), "")) } if apiServer.Spec.InsecureSkipTLSVerify && len(apiServer.Spec.CABundle) > 0 { allErrs = append(allErrs, field.Invalid(field.NewPath("spec", "insecureSkipTLSVerify"), apiServer.Spec.InsecureSkipTLSVerify, "may not be true if caBundle is present")) } return allErrs }