2015-01-25 06:32:33 +03:00
|
|
|
// Copyright 2015 CoreOS, Inc.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
2014-10-22 22:27:51 +04:00
|
|
|
|
|
|
|
package validate
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2015-01-13 02:43:58 +03:00
|
|
|
"net/url"
|
2015-01-12 23:25:28 +03:00
|
|
|
"path"
|
2014-10-22 22:27:51 +04:00
|
|
|
"reflect"
|
2015-01-12 23:25:28 +03:00
|
|
|
"strings"
|
2014-10-22 22:27:51 +04:00
|
|
|
|
2015-11-09 11:24:52 +03:00
|
|
|
"github.com/coreos/coreos-cloudinit/config"
|
2014-10-22 22:27:51 +04:00
|
|
|
)
|
|
|
|
|
|
|
|
type rule func(config node, report *Report)
|
|
|
|
|
|
|
|
// Rules contains all of the validation rules.
|
|
|
|
var Rules []rule = []rule{
|
2015-01-13 02:43:58 +03:00
|
|
|
checkDiscoveryUrl,
|
2015-01-14 03:28:47 +03:00
|
|
|
checkEncoding,
|
2014-10-22 22:27:51 +04:00
|
|
|
checkStructure,
|
|
|
|
checkValidity,
|
2015-01-12 23:25:28 +03:00
|
|
|
checkWriteFiles,
|
2015-01-13 03:09:21 +03:00
|
|
|
checkWriteFilesUnderCoreos,
|
2014-10-22 22:27:51 +04:00
|
|
|
}
|
|
|
|
|
2015-01-13 02:43:58 +03:00
|
|
|
// checkDiscoveryUrl verifies that the string is a valid url.
|
|
|
|
func checkDiscoveryUrl(cfg node, report *Report) {
|
|
|
|
c := cfg.Child("coreos").Child("etcd").Child("discovery")
|
|
|
|
if !c.IsValid() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := url.ParseRequestURI(c.String()); err != nil {
|
|
|
|
report.Warning(c.line, "discovery URL is not valid")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-14 03:28:47 +03:00
|
|
|
// checkEncoding validates that, for each file under 'write_files', the
|
|
|
|
// content can be decoded given the specified encoding.
|
|
|
|
func checkEncoding(cfg node, report *Report) {
|
|
|
|
for _, f := range cfg.Child("write_files").children {
|
|
|
|
e := f.Child("encoding")
|
|
|
|
if !e.IsValid() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2015-02-23 19:17:21 +03:00
|
|
|
c := f.Child("content")
|
2015-01-14 03:28:47 +03:00
|
|
|
if _, err := config.DecodeContent(c.String(), e.String()); err != nil {
|
2015-02-23 19:17:21 +03:00
|
|
|
report.Error(c.line, fmt.Sprintf("content cannot be decoded as %q", e.String()))
|
2015-01-14 03:28:47 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-22 22:27:51 +04:00
|
|
|
// checkStructure compares the provided config to the empty config.CloudConfig
|
|
|
|
// structure. Each node is checked to make sure that it exists in the known
|
|
|
|
// structure and that its type is compatible.
|
|
|
|
func checkStructure(cfg node, report *Report) {
|
|
|
|
g := NewNode(config.CloudConfig{}, NewContext([]byte{}))
|
|
|
|
checkNodeStructure(cfg, g, report)
|
|
|
|
}
|
|
|
|
|
|
|
|
func checkNodeStructure(n, g node, r *Report) {
|
|
|
|
if !isCompatible(n.Kind(), g.Kind()) {
|
|
|
|
r.Warning(n.line, fmt.Sprintf("incorrect type for %q (want %s)", n.name, g.HumanType()))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
switch g.Kind() {
|
|
|
|
case reflect.Struct:
|
|
|
|
for _, cn := range n.children {
|
|
|
|
if cg := g.Child(cn.name); cg.IsValid() {
|
2015-03-30 22:15:16 +03:00
|
|
|
if msg := cg.field.Tag.Get("deprecated"); msg != "" {
|
|
|
|
r.Warning(cn.line, fmt.Sprintf("deprecated key %q (%s)", cn.name, msg))
|
|
|
|
}
|
2014-10-22 22:27:51 +04:00
|
|
|
checkNodeStructure(cn, cg, r)
|
|
|
|
} else {
|
|
|
|
r.Warning(cn.line, fmt.Sprintf("unrecognized key %q", cn.name))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
case reflect.Slice:
|
|
|
|
for _, cn := range n.children {
|
|
|
|
var cg node
|
|
|
|
c := g.Type().Elem()
|
|
|
|
toNode(reflect.New(c).Elem().Interface(), context{}, &cg)
|
|
|
|
checkNodeStructure(cn, cg, r)
|
|
|
|
}
|
2014-11-22 02:43:48 +03:00
|
|
|
case reflect.String, reflect.Int, reflect.Float64, reflect.Bool:
|
2014-10-22 22:27:51 +04:00
|
|
|
default:
|
|
|
|
panic(fmt.Sprintf("checkNodeStructure(): unhandled kind %s", g.Kind()))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-12 23:25:28 +03:00
|
|
|
// isCompatible determines if the type of kind n can be converted to the type
|
|
|
|
// of kind g in the context of YAML. This is not an exhaustive list, but its
|
|
|
|
// enough for the purposes of cloud-config validation.
|
|
|
|
func isCompatible(n, g reflect.Kind) bool {
|
|
|
|
switch g {
|
|
|
|
case reflect.String:
|
|
|
|
return n == reflect.String || n == reflect.Int || n == reflect.Float64 || n == reflect.Bool
|
|
|
|
case reflect.Struct:
|
|
|
|
return n == reflect.Struct || n == reflect.Map
|
|
|
|
case reflect.Float64:
|
|
|
|
return n == reflect.Float64 || n == reflect.Int
|
|
|
|
case reflect.Bool, reflect.Slice, reflect.Int:
|
|
|
|
return n == g
|
|
|
|
default:
|
|
|
|
panic(fmt.Sprintf("isCompatible(): unhandled kind %s", g))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-22 22:27:51 +04:00
|
|
|
// checkValidity checks the value of every node in the provided config by
|
|
|
|
// running config.AssertValid() on it.
|
|
|
|
func checkValidity(cfg node, report *Report) {
|
|
|
|
g := NewNode(config.CloudConfig{}, NewContext([]byte{}))
|
|
|
|
checkNodeValidity(cfg, g, report)
|
|
|
|
}
|
|
|
|
|
|
|
|
func checkNodeValidity(n, g node, r *Report) {
|
|
|
|
if err := config.AssertValid(n.Value, g.field.Tag.Get("valid")); err != nil {
|
2014-12-21 22:24:10 +03:00
|
|
|
r.Error(n.line, fmt.Sprintf("invalid value %v", n.Value.Interface()))
|
2014-10-22 22:27:51 +04:00
|
|
|
}
|
|
|
|
switch g.Kind() {
|
|
|
|
case reflect.Struct:
|
|
|
|
for _, cn := range n.children {
|
|
|
|
if cg := g.Child(cn.name); cg.IsValid() {
|
|
|
|
checkNodeValidity(cn, cg, r)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
case reflect.Slice:
|
|
|
|
for _, cn := range n.children {
|
|
|
|
var cg node
|
|
|
|
c := g.Type().Elem()
|
|
|
|
toNode(reflect.New(c).Elem().Interface(), context{}, &cg)
|
|
|
|
checkNodeValidity(cn, cg, r)
|
|
|
|
}
|
2014-11-22 02:43:48 +03:00
|
|
|
case reflect.String, reflect.Int, reflect.Float64, reflect.Bool:
|
2014-10-22 22:27:51 +04:00
|
|
|
default:
|
|
|
|
panic(fmt.Sprintf("checkNodeValidity(): unhandled kind %s", g.Kind()))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-12 23:25:28 +03:00
|
|
|
// checkWriteFiles checks to make sure that the target file can actually be
|
|
|
|
// written. Note that this check is approximate (it only checks to see if the file
|
|
|
|
// is under /usr).
|
|
|
|
func checkWriteFiles(cfg node, report *Report) {
|
|
|
|
for _, f := range cfg.Child("write_files").children {
|
|
|
|
c := f.Child("path")
|
|
|
|
if !c.IsValid() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
d := path.Dir(c.String())
|
|
|
|
switch {
|
|
|
|
case strings.HasPrefix(d, "/usr"):
|
|
|
|
report.Error(c.line, "file cannot be written to a read-only filesystem")
|
|
|
|
}
|
2014-10-22 22:27:51 +04:00
|
|
|
}
|
|
|
|
}
|
2015-01-13 03:09:21 +03:00
|
|
|
|
|
|
|
// checkWriteFilesUnderCoreos checks to see if the 'write_files' node is a
|
|
|
|
// child of 'coreos' (it shouldn't be).
|
|
|
|
func checkWriteFilesUnderCoreos(cfg node, report *Report) {
|
|
|
|
c := cfg.Child("coreos").Child("write_files")
|
|
|
|
if c.IsValid() {
|
|
|
|
report.Info(c.line, "write_files doesn't belong under coreos")
|
|
|
|
}
|
|
|
|
}
|