-
Notifications
You must be signed in to change notification settings - Fork 73
🌱 Ensure COS phase immutability for referenced object approach #2635
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -6,6 +6,7 @@ import ( | |
| "bytes" | ||
| "compress/gzip" | ||
| "context" | ||
| "crypto/sha256" | ||
| "encoding/json" | ||
| "errors" | ||
| "fmt" | ||
|
|
@@ -15,6 +16,7 @@ import ( | |
|
|
||
| corev1 "k8s.io/api/core/v1" | ||
| "k8s.io/apimachinery/pkg/api/equality" | ||
| apierrors "k8s.io/apimachinery/pkg/api/errors" | ||
| "k8s.io/apimachinery/pkg/api/meta" | ||
| metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
| "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" | ||
|
|
@@ -144,12 +146,36 @@ func (c *ClusterObjectSetReconciler) reconcile(ctx context.Context, cos *ocv1.Cl | |
| return c.delete(ctx, cos) | ||
| } | ||
|
|
||
| if err := c.verifyReferencedSecretsImmutable(ctx, cos); err != nil { | ||
| l.Error(err, "referenced Secret verification failed, blocking reconciliation") | ||
| markAsNotProgressing(cos, ocv1.ClusterObjectSetReasonBlocked, err.Error()) | ||
| return ctrl.Result{}, nil | ||
| } | ||
|
|
||
| phases, opts, err := c.buildBoxcutterPhases(ctx, cos) | ||
| if err != nil { | ||
| setRetryingConditions(cos, err.Error()) | ||
| return ctrl.Result{}, fmt.Errorf("converting to boxcutter revision: %v", err) | ||
| } | ||
|
|
||
| currentPhases := make([]ocv1.ObservedPhase, 0, len(phases)) | ||
| for _, phase := range phases { | ||
| hash, err := computePhaseDigest(phase) | ||
| if err != nil { | ||
| setRetryingConditions(cos, err.Error()) | ||
| return ctrl.Result{}, fmt.Errorf("computing phase digest: %v", err) | ||
| } | ||
| currentPhases = append(currentPhases, ocv1.ObservedPhase{Name: phase.GetName(), Digest: hash}) | ||
| } | ||
|
Comment on lines
+161
to
+169
|
||
|
|
||
| if len(cos.Status.ObservedPhases) == 0 { | ||
| cos.Status.ObservedPhases = currentPhases | ||
| } else if err := verifyObservedPhases(cos.Status.ObservedPhases, currentPhases); err != nil { | ||
| l.Error(err, "resolved phases content changed, blocking reconciliation") | ||
| markAsNotProgressing(cos, ocv1.ClusterObjectSetReasonBlocked, err.Error()) | ||
| return ctrl.Result{}, nil | ||
pedjak marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| } | ||
|
Comment on lines
+171
to
+177
|
||
|
|
||
| revisionEngine, err := c.RevisionEngineFactory.CreateRevisionEngine(ctx, cos) | ||
| if err != nil { | ||
| setRetryingConditions(cos, err.Error()) | ||
|
|
@@ -343,8 +369,10 @@ func (c *ClusterObjectSetReconciler) SetupWithManager(mgr ctrl.Manager) error { | |
| if !rev.DeletionTimestamp.IsZero() { | ||
| return true | ||
| } | ||
| if cnd := meta.FindStatusCondition(rev.Status.Conditions, ocv1.ClusterObjectSetTypeProgressing); cnd != nil && cnd.Status == metav1.ConditionFalse && cnd.Reason == ocv1.ReasonProgressDeadlineExceeded { | ||
| return false | ||
| if cnd := meta.FindStatusCondition(rev.Status.Conditions, ocv1.ClusterObjectSetTypeProgressing); cnd != nil && cnd.Status == metav1.ConditionFalse { | ||
| if cnd.Reason == ocv1.ReasonProgressDeadlineExceeded { | ||
| return false | ||
| } | ||
| } | ||
| return true | ||
| }, | ||
|
|
@@ -693,3 +721,82 @@ func markAsArchived(cos *ocv1.ClusterObjectSet) bool { | |
| updated := markAsNotProgressing(cos, ocv1.ClusterObjectSetReasonArchived, msg) | ||
| return markAsAvailableUnknown(cos, ocv1.ClusterObjectSetReasonArchived, msg) || updated | ||
| } | ||
|
|
||
| // computePhaseDigest computes a deterministic SHA-256 digest of a phase's | ||
| // resolved content (name + objects). JSON serialization of each object | ||
| // produces a canonical encoding with sorted map keys. | ||
| func computePhaseDigest(phase boxcutter.Phase) (string, error) { | ||
| h := sha256.New() | ||
| fmt.Fprintf(h, "phase:%s\n", phase.GetName()) | ||
| for _, obj := range phase.GetObjects() { | ||
| data, err := json.Marshal(obj) | ||
| if err != nil { | ||
| return "", fmt.Errorf("marshaling object in phase %q: %w", phase.GetName(), err) | ||
| } | ||
| h.Write(data) | ||
pedjak marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| h.Write([]byte{'\n'}) | ||
| } | ||
| return fmt.Sprintf("%x", h.Sum(nil)), nil | ||
| } | ||
|
|
||
| // verifyObservedPhases compares current per-phase digests against stored | ||
| // digests. Returns an error naming the first mismatched phase. | ||
| func verifyObservedPhases(stored, current []ocv1.ObservedPhase) error { | ||
| storedMap := make(map[string]string, len(stored)) | ||
| for _, s := range stored { | ||
| storedMap[s.Name] = s.Digest | ||
| } | ||
| for _, c := range current { | ||
| if prev, ok := storedMap[c.Name]; ok && prev != c.Digest { | ||
| return fmt.Errorf( | ||
| "resolved content of phase %q has changed (expected digest %s, got %s): "+ | ||
| "a referenced object source may have been deleted and recreated with different content", | ||
| c.Name, prev, c.Digest) | ||
| } | ||
| } | ||
| return nil | ||
pedjak marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| } | ||
|
|
||
| // verifyReferencedSecretsImmutable checks that all referenced Secrets | ||
| // have Immutable set to true. This is a fast-fail validation that | ||
| // provides a clear error message for misconfigured Secrets. | ||
| func (c *ClusterObjectSetReconciler) verifyReferencedSecretsImmutable(ctx context.Context, cos *ocv1.ClusterObjectSet) error { | ||
| type secretRef struct { | ||
| name string | ||
| namespace string | ||
| } | ||
| seen := make(map[secretRef]struct{}) | ||
| var refs []secretRef | ||
|
|
||
| for _, phase := range cos.Spec.Phases { | ||
| for _, obj := range phase.Objects { | ||
| if obj.Ref.Name == "" { | ||
| continue | ||
| } | ||
| sr := secretRef{name: obj.Ref.Name, namespace: obj.Ref.Namespace} | ||
| if _, ok := seen[sr]; !ok { | ||
| seen[sr] = struct{}{} | ||
| refs = append(refs, sr) | ||
| } | ||
| } | ||
| } | ||
|
|
||
| for _, ref := range refs { | ||
| secret := &corev1.Secret{} | ||
| key := client.ObjectKey{Name: ref.name, Namespace: ref.namespace} | ||
| if err := c.Client.Get(ctx, key, secret); err != nil { | ||
| if apierrors.IsNotFound(err) { | ||
| // Secret not yet available — skip verification. | ||
| // resolveObjectRef will handle the not-found with a retryable error. | ||
| continue | ||
| } | ||
| return fmt.Errorf("getting Secret %s/%s: %w", ref.namespace, ref.name, err) | ||
| } | ||
|
|
||
| if secret.Immutable == nil || !*secret.Immutable { | ||
| return fmt.Errorf("secret %s/%s is not immutable: referenced secrets must have immutable set to true", ref.namespace, ref.name) | ||
| } | ||
| } | ||
pedjak marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| return nil | ||
| } | ||
Uh oh!
There was an error while loading. Please reload this page.