/* Copyright 2014 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package validation import ( "fmt" "reflect" "time" v1 "k8s.io/api/core/v1" eventsv1beta1 "k8s.io/api/events/v1beta1" apimachineryvalidation "k8s.io/apimachinery/pkg/api/validation" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime/schema" "k8s.io/apimachinery/pkg/util/validation" "k8s.io/apimachinery/pkg/util/validation/field" "k8s.io/kubernetes/pkg/apis/core" ) const ( ReportingInstanceLengthLimit = 128 ActionLengthLimit = 128 ReasonLengthLimit = 128 NoteLengthLimit = 1024 ) func ValidateEventCreate(event *core.Event, requestVersion schema.GroupVersion) field.ErrorList { // Make sure events always pass legacy validation. allErrs := legacyValidateEvent(event, requestVersion) if requestVersion == v1.SchemeGroupVersion || requestVersion == eventsv1beta1.SchemeGroupVersion { // No further validation for backwards compatibility. return allErrs } // Strict validation applies to creation via events.k8s.io/v1 API and newer. allErrs = append(allErrs, ValidateObjectMeta(&event.ObjectMeta, true, apimachineryvalidation.NameIsDNSSubdomain, field.NewPath("metadata"))...) allErrs = append(allErrs, validateV1EventSeries(event)...) zeroTime := time.Time{} if event.EventTime.Time == zeroTime { allErrs = append(allErrs, field.Required(field.NewPath("eventTime"), "")) } if event.Type != v1.EventTypeNormal && event.Type != v1.EventTypeWarning { allErrs = append(allErrs, field.Invalid(field.NewPath("type"), "", fmt.Sprintf("has invalid value: %v", event.Type))) } if event.FirstTimestamp.Time != zeroTime { allErrs = append(allErrs, field.Invalid(field.NewPath("firstTimestamp"), "", "needs to be unset")) } if event.LastTimestamp.Time != zeroTime { allErrs = append(allErrs, field.Invalid(field.NewPath("lastTimestamp"), "", "needs to be unset")) } if event.Count != 0 { allErrs = append(allErrs, field.Invalid(field.NewPath("count"), "", "needs to be unset")) } if event.Source.Component != "" || event.Source.Host != "" { allErrs = append(allErrs, field.Invalid(field.NewPath("source"), "", "needs to be unset")) } return allErrs } func ValidateEventUpdate(newEvent, oldEvent *core.Event, requestVersion schema.GroupVersion) field.ErrorList { // Make sure the new event always passes legacy validation. allErrs := legacyValidateEvent(newEvent, requestVersion) if requestVersion == v1.SchemeGroupVersion || requestVersion == eventsv1beta1.SchemeGroupVersion { // No further validation for backwards compatibility. return allErrs } // Strict validation applies to update via events.k8s.io/v1 API and newer. allErrs = append(allErrs, ValidateObjectMetaUpdate(&newEvent.ObjectMeta, &oldEvent.ObjectMeta, field.NewPath("metadata"))...) // if the series was modified, validate the new data if !reflect.DeepEqual(newEvent.Series, oldEvent.Series) { allErrs = append(allErrs, validateV1EventSeries(newEvent)...) } allErrs = append(allErrs, ValidateImmutableField(newEvent.InvolvedObject, oldEvent.InvolvedObject, field.NewPath("involvedObject"))...) allErrs = append(allErrs, ValidateImmutableField(newEvent.Reason, oldEvent.Reason, field.NewPath("reason"))...) allErrs = append(allErrs, ValidateImmutableField(newEvent.Message, oldEvent.Message, field.NewPath("message"))...) allErrs = append(allErrs, ValidateImmutableField(newEvent.Source, oldEvent.Source, field.NewPath("source"))...) allErrs = append(allErrs, ValidateImmutableField(newEvent.FirstTimestamp, oldEvent.FirstTimestamp, field.NewPath("firstTimestamp"))...) allErrs = append(allErrs, ValidateImmutableField(newEvent.LastTimestamp, oldEvent.LastTimestamp, field.NewPath("lastTimestamp"))...) allErrs = append(allErrs, ValidateImmutableField(newEvent.Count, oldEvent.Count, field.NewPath("count"))...) allErrs = append(allErrs, ValidateImmutableField(newEvent.Reason, oldEvent.Reason, field.NewPath("reason"))...) allErrs = append(allErrs, ValidateImmutableField(newEvent.Type, oldEvent.Type, field.NewPath("type"))...) // Disallow changes to eventTime greater than microsecond-level precision. // Tolerating sub-microsecond changes is required to tolerate updates // from clients that correctly truncate to microsecond-precision when serializing, // or from clients built with incorrect nanosecond-precision protobuf serialization. // See https://github.com/kubernetes/kubernetes/issues/111928 newTruncated := newEvent.EventTime.Truncate(time.Microsecond).UTC() oldTruncated := oldEvent.EventTime.Truncate(time.Microsecond).UTC() if newTruncated != oldTruncated { allErrs = append(allErrs, ValidateImmutableField(newEvent.EventTime, oldEvent.EventTime, field.NewPath("eventTime"))...) } allErrs = append(allErrs, ValidateImmutableField(newEvent.Action, oldEvent.Action, field.NewPath("action"))...) allErrs = append(allErrs, ValidateImmutableField(newEvent.Related, oldEvent.Related, field.NewPath("related"))...) allErrs = append(allErrs, ValidateImmutableField(newEvent.ReportingController, oldEvent.ReportingController, field.NewPath("reportingController"))...) allErrs = append(allErrs, ValidateImmutableField(newEvent.ReportingInstance, oldEvent.ReportingInstance, field.NewPath("reportingInstance"))...) return allErrs } func validateV1EventSeries(event *core.Event) field.ErrorList { allErrs := field.ErrorList{} zeroTime := time.Time{} if event.Series != nil { if event.Series.Count < 2 { allErrs = append(allErrs, field.Invalid(field.NewPath("series.count"), "", "should be at least 2")) } if event.Series.LastObservedTime.Time == zeroTime { allErrs = append(allErrs, field.Required(field.NewPath("series.lastObservedTime"), "")) } } return allErrs } // legacyValidateEvent makes sure that the event makes sense. func legacyValidateEvent(event *core.Event, requestVersion schema.GroupVersion) field.ErrorList { allErrs := field.ErrorList{} // Because go zeroTime := time.Time{} reportingControllerFieldName := "reportingController" if requestVersion == v1.SchemeGroupVersion { reportingControllerFieldName = "reportingComponent" } // "New" Events need to have EventTime set, so it's validating old object. if event.EventTime.Time == zeroTime { // Make sure event.Namespace and the involvedInvolvedObject.Namespace agree if len(event.InvolvedObject.Namespace) == 0 { // event.Namespace must also be empty (or "default", for compatibility with old clients) if event.Namespace != metav1.NamespaceNone && event.Namespace != metav1.NamespaceDefault { allErrs = append(allErrs, field.Invalid(field.NewPath("involvedObject", "namespace"), event.InvolvedObject.Namespace, "does not match event.namespace")) } } else { // event namespace must match if event.Namespace != event.InvolvedObject.Namespace { allErrs = append(allErrs, field.Invalid(field.NewPath("involvedObject", "namespace"), event.InvolvedObject.Namespace, "does not match event.namespace")) } } } else { if len(event.InvolvedObject.Namespace) == 0 && event.Namespace != metav1.NamespaceDefault && event.Namespace != metav1.NamespaceSystem { allErrs = append(allErrs, field.Invalid(field.NewPath("involvedObject", "namespace"), event.InvolvedObject.Namespace, "does not match event.namespace")) } if len(event.ReportingController) == 0 { allErrs = append(allErrs, field.Required(field.NewPath(reportingControllerFieldName), "")) } allErrs = append(allErrs, ValidateQualifiedName(event.ReportingController, field.NewPath(reportingControllerFieldName))...) if len(event.ReportingInstance) == 0 { allErrs = append(allErrs, field.Required(field.NewPath("reportingInstance"), "")) } if len(event.ReportingInstance) > ReportingInstanceLengthLimit { allErrs = append(allErrs, field.Invalid(field.NewPath("reportingInstance"), "", fmt.Sprintf("can have at most %v characters", ReportingInstanceLengthLimit))) } if len(event.Action) == 0 { allErrs = append(allErrs, field.Required(field.NewPath("action"), "")) } if len(event.Action) > ActionLengthLimit { allErrs = append(allErrs, field.Invalid(field.NewPath("action"), "", fmt.Sprintf("can have at most %v characters", ActionLengthLimit))) } if len(event.Reason) == 0 { allErrs = append(allErrs, field.Required(field.NewPath("reason"), "")) } if len(event.Reason) > ReasonLengthLimit { allErrs = append(allErrs, field.Invalid(field.NewPath("reason"), "", fmt.Sprintf("can have at most %v characters", ReasonLengthLimit))) } if len(event.Message) > NoteLengthLimit { allErrs = append(allErrs, field.Invalid(field.NewPath("message"), "", fmt.Sprintf("can have at most %v characters", NoteLengthLimit))) } } for _, msg := range validation.IsDNS1123Subdomain(event.Namespace) { allErrs = append(allErrs, field.Invalid(field.NewPath("namespace"), event.Namespace, msg)) } return allErrs }