forked from gardener/gardener
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathadd.go
84 lines (74 loc) · 3.08 KB
/
add.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
// Copyright 2021 SAP SE or an SAP affiliate company. All rights reserved. This file is licensed under the Apache Software License, v. 2 except as noted otherwise in the LICENSE file
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package tokenrequestor
import (
"fmt"
corev1 "k8s.io/api/core/v1"
corev1clientset "k8s.io/client-go/kubernetes/typed/core/v1"
"sigs.k8s.io/controller-runtime/pkg/builder"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/cluster"
"sigs.k8s.io/controller-runtime/pkg/controller"
"sigs.k8s.io/controller-runtime/pkg/event"
"sigs.k8s.io/controller-runtime/pkg/manager"
"sigs.k8s.io/controller-runtime/pkg/predicate"
resourcesv1alpha1 "github.com/gardener/gardener/pkg/apis/resources/v1alpha1"
)
// ControllerName is the name of the controller.
const ControllerName = "token-requestor"
// AddToManager adds Reconciler to the given manager.
func (r *Reconciler) AddToManager(mgr manager.Manager, sourceCluster, targetCluster cluster.Cluster) error {
if r.SourceClient == nil {
r.SourceClient = sourceCluster.GetClient()
}
if r.TargetClient == nil {
r.TargetClient = targetCluster.GetClient()
}
if r.TargetCoreV1Client == nil {
var err error
r.TargetCoreV1Client, err = corev1clientset.NewForConfig(targetCluster.GetConfig())
if err != nil {
return fmt.Errorf("could not create coreV1Client: %w", err)
}
}
return builder.
ControllerManagedBy(mgr).
Named(ControllerName).
For(&corev1.Secret{}, builder.WithPredicates(r.SecretPredicate())).
WithOptions(controller.Options{
MaxConcurrentReconciles: r.ConcurrentSyncs,
}).
Complete(r)
}
// SecretPredicate is the predicate for secrets.
func (r *Reconciler) SecretPredicate() predicate.Predicate {
return predicate.Funcs{
CreateFunc: func(e event.CreateEvent) bool { return r.isRelevantSecret(e.Object) },
UpdateFunc: func(e event.UpdateEvent) bool { return r.isRelevantSecretUpdate(e.ObjectOld, e.ObjectNew) },
DeleteFunc: func(e event.DeleteEvent) bool { return r.isRelevantSecret(e.Object) },
GenericFunc: func(e event.GenericEvent) bool { return false },
}
}
func (r *Reconciler) isRelevantSecret(obj client.Object) bool {
secret, ok := obj.(*corev1.Secret)
if !ok {
return false
}
return secret.Labels != nil &&
secret.Labels[resourcesv1alpha1.ResourceManagerPurpose] == resourcesv1alpha1.LabelPurposeTokenRequest &&
(r.Class == nil || secret.Labels[resourcesv1alpha1.ResourceManagerClass] == *r.Class)
}
func (r *Reconciler) isRelevantSecretUpdate(oldObj, newObj client.Object) bool {
return r.isRelevantSecret(newObj) || r.isRelevantSecret(oldObj)
}