external-dns/provider/webhook/webhook.go
Raffaele Di Fazio 8251b6dd85
Webhook provider (#3063)
* initial plugin implementation

* rename to webhook

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* json encoder changes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* addressing review comments

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* changes according to ionos review

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix to accomodate changes in master

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fixes to accomodate master changes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* remove all propertyvaluesequals leftovers

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* readd negotiation to pass the domain filter around

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix domain filter passing

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* webhook fixes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix tests

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix docs

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* docs fixes

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* code review comments on json unmarshal

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* handle error in adjustendpoints

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix a bunch of wrong require

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* tests and docs

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

* fix typo

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>

---------

Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
2023-09-25 01:14:58 -07:00

259 lines
7.5 KiB
Go

/*
Copyright 2023 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package webhook
import (
"bytes"
"context"
"encoding/json"
"fmt"
"net/http"
"net/url"
"sigs.k8s.io/external-dns/endpoint"
"sigs.k8s.io/external-dns/plan"
backoff "github.com/cenkalti/backoff/v4"
"github.com/prometheus/client_golang/prometheus"
log "github.com/sirupsen/logrus"
)
const (
mediaTypeFormatAndVersion = "application/external.dns.webhook+json;version=1"
contentTypeHeader = "Content-Type"
acceptHeader = "Accept"
maxRetries = 5
)
var (
recordsErrorsGauge = prometheus.NewGauge(
prometheus.GaugeOpts{
Namespace: "external_dns",
Subsystem: "webhook_provider",
Name: "records_errors",
Help: "Errors with Records method",
},
)
applyChangesErrorsGauge = prometheus.NewGauge(
prometheus.GaugeOpts{
Namespace: "external_dns",
Subsystem: "webhook_provider",
Name: "applychanges_errors",
Help: "Errors with ApplyChanges method",
},
)
adjustEndpointsErrorsGauge = prometheus.NewGauge(
prometheus.GaugeOpts{
Namespace: "external_dns",
Subsystem: "webhook_provider",
Name: "adjustendpointsgauge_errors",
Help: "Errors with AdjustEndpoints method",
},
)
)
type WebhookProvider struct {
client *http.Client
remoteServerURL *url.URL
DomainFilter endpoint.DomainFilter
}
func init() {
prometheus.MustRegister(recordsErrorsGauge)
prometheus.MustRegister(applyChangesErrorsGauge)
prometheus.MustRegister(adjustEndpointsErrorsGauge)
}
func NewWebhookProvider(u string) (*WebhookProvider, error) {
parsedURL, err := url.Parse(u)
if err != nil {
return nil, err
}
// negotiate API information
req, err := http.NewRequest("GET", u, nil)
if err != nil {
return nil, err
}
req.Header.Set(acceptHeader, mediaTypeFormatAndVersion)
client := &http.Client{}
var resp *http.Response
err = backoff.Retry(func() error {
resp, err = client.Do(req)
if err != nil {
log.Debugf("Failed to connect to plugin api: %v", err)
return err
}
// we currently only use 200 as success, but considering okay all 2XX for future usage
if resp.StatusCode >= 300 && resp.StatusCode < 500 {
return backoff.Permanent(fmt.Errorf("status code < 500"))
}
return nil
}, backoff.WithMaxRetries(backoff.NewExponentialBackOff(), maxRetries))
if err != nil {
return nil, fmt.Errorf("failed to connect to plugin api: %v", err)
}
contentType := resp.Header.Get(contentTypeHeader)
// read the serialized DomainFilter from the response body and set it in the webhook provider struct
defer resp.Body.Close()
df := endpoint.DomainFilter{}
if err := json.NewDecoder(resp.Body).Decode(&df); err != nil {
return nil, fmt.Errorf("failed to unmarshal response body of DomainFilter: %v", err)
}
if contentType != mediaTypeFormatAndVersion {
return nil, fmt.Errorf("wrong content type returned from server: %s", contentType)
}
return &WebhookProvider{
client: client,
remoteServerURL: parsedURL,
DomainFilter: df,
}, nil
}
// Records will make a GET call to remoteServerURL/records and return the results
func (p WebhookProvider) Records(ctx context.Context) ([]*endpoint.Endpoint, error) {
u := p.remoteServerURL.JoinPath("records").String()
req, err := http.NewRequest("GET", u, nil)
if err != nil {
recordsErrorsGauge.Inc()
log.Debugf("Failed to create request: %s", err.Error())
return nil, err
}
req.Header.Set(acceptHeader, mediaTypeFormatAndVersion)
resp, err := p.client.Do(req)
if err != nil {
recordsErrorsGauge.Inc()
log.Debugf("Failed to perform request: %s", err.Error())
return nil, err
}
defer resp.Body.Close()
if resp.StatusCode != http.StatusOK {
recordsErrorsGauge.Inc()
log.Debugf("Failed to get records with code %d", resp.StatusCode)
return nil, fmt.Errorf("failed to get records with code %d", resp.StatusCode)
}
endpoints := []*endpoint.Endpoint{}
if err := json.NewDecoder(resp.Body).Decode(&endpoints); err != nil {
recordsErrorsGauge.Inc()
log.Debugf("Failed to decode response body: %s", err.Error())
return nil, err
}
return endpoints, nil
}
// ApplyChanges will make a POST to remoteServerURL/records with the changes
func (p WebhookProvider) ApplyChanges(ctx context.Context, changes *plan.Changes) error {
u := p.remoteServerURL.JoinPath("records").String()
b := new(bytes.Buffer)
if err := json.NewEncoder(b).Encode(changes); err != nil {
applyChangesErrorsGauge.Inc()
log.Debugf("Failed to encode changes: %s", err.Error())
return err
}
req, err := http.NewRequest("POST", u, b)
if err != nil {
applyChangesErrorsGauge.Inc()
log.Debugf("Failed to create request: %s", err.Error())
return err
}
req.Header.Set(contentTypeHeader, mediaTypeFormatAndVersion)
resp, err := p.client.Do(req)
if err != nil {
applyChangesErrorsGauge.Inc()
log.Debugf("Failed to perform request: %s", err.Error())
return err
}
defer resp.Body.Close()
if resp.StatusCode != http.StatusNoContent {
applyChangesErrorsGauge.Inc()
log.Debugf("Failed to apply changes with code %d", resp.StatusCode)
return fmt.Errorf("failed to apply changes with code %d", resp.StatusCode)
}
return nil
}
// AdjustEndpoints will call the provider doing a POST on `/adjustendpoints` which will return a list of modified endpoints
// based on a provider specific requirement.
// This method returns an empty slice in case there is a technical error on the provider's side so that no endpoints will be considered.
func (p WebhookProvider) AdjustEndpoints(e []*endpoint.Endpoint) ([]*endpoint.Endpoint, error) {
endpoints := []*endpoint.Endpoint{}
u, err := url.JoinPath(p.remoteServerURL.String(), "adjustendpoints")
if err != nil {
adjustEndpointsErrorsGauge.Inc()
log.Debugf("Failed to join path, %s", err)
return nil, err
}
b := new(bytes.Buffer)
if err := json.NewEncoder(b).Encode(e); err != nil {
adjustEndpointsErrorsGauge.Inc()
log.Debugf("Failed to encode endpoints, %s", err)
return nil, err
}
req, err := http.NewRequest("POST", u, b)
if err != nil {
adjustEndpointsErrorsGauge.Inc()
log.Debugf("Failed to create new HTTP request, %s", err)
return nil, err
}
req.Header.Set(contentTypeHeader, mediaTypeFormatAndVersion)
req.Header.Set(acceptHeader, mediaTypeFormatAndVersion)
resp, err := p.client.Do(req)
if err != nil {
adjustEndpointsErrorsGauge.Inc()
log.Debugf("Failed executing http request, %s", err)
return nil, err
}
defer resp.Body.Close()
if resp.StatusCode != http.StatusOK {
adjustEndpointsErrorsGauge.Inc()
log.Debugf("Failed to AdjustEndpoints with code %d", resp.StatusCode)
return nil, fmt.Errorf("failed to AdjustEndpoints with code %d", resp.StatusCode)
}
if err := json.NewDecoder(resp.Body).Decode(&endpoints); err != nil {
recordsErrorsGauge.Inc()
log.Debugf("Failed to decode response body: %s", err.Error())
return nil, err
}
return endpoints, nil
}
// GetDomainFilter make calls to get the serialized version of the domain filter
func (p WebhookProvider) GetDomainFilter() endpoint.DomainFilter {
return p.DomainFilter
}