forked from gardener/gardener
-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathadd.go
More file actions
75 lines (66 loc) · 2.43 KB
/
add.go
File metadata and controls
75 lines (66 loc) · 2.43 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
// SPDX-FileCopyrightText: SAP SE or an SAP affiliate company and Gardener contributors
//
// SPDX-License-Identifier: Apache-2.0
package tokenrequestor
import (
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/util/wait"
"k8s.io/utils/clock"
"sigs.k8s.io/controller-runtime/pkg/builder"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/cluster"
"sigs.k8s.io/controller-runtime/pkg/controller"
"sigs.k8s.io/controller-runtime/pkg/event"
"sigs.k8s.io/controller-runtime/pkg/manager"
"sigs.k8s.io/controller-runtime/pkg/predicate"
resourcesv1alpha1 "github.com/gardener/gardener/pkg/apis/resources/v1alpha1"
)
// ControllerName is the name of the controller.
const ControllerName = "token-requestor"
// AddToManager adds Reconciler to the given manager.
func (r *Reconciler) AddToManager(mgr manager.Manager, sourceCluster, targetCluster cluster.Cluster) error {
if r.SourceClient == nil {
r.SourceClient = sourceCluster.GetClient()
}
if r.TargetClient == nil {
r.TargetClient = targetCluster.GetClient()
}
if len(r.CAData) == 0 {
r.CAData = targetCluster.GetConfig().CAData
}
if r.Clock == nil {
r.Clock = clock.RealClock{}
}
if r.JitterFunc == nil {
r.JitterFunc = wait.Jitter
}
return builder.
ControllerManagedBy(mgr).
Named(ControllerName).
For(&corev1.Secret{}, builder.WithPredicates(r.SecretPredicate())).
WithOptions(controller.Options{
MaxConcurrentReconciles: r.ConcurrentSyncs,
}).
Complete(r)
}
// SecretPredicate is the predicate for secrets.
func (r *Reconciler) SecretPredicate() predicate.Predicate {
return predicate.Funcs{
CreateFunc: func(e event.CreateEvent) bool { return r.isRelevantSecret(e.Object) },
UpdateFunc: func(e event.UpdateEvent) bool { return r.isRelevantSecretUpdate(e.ObjectOld, e.ObjectNew) },
DeleteFunc: func(e event.DeleteEvent) bool { return r.isRelevantSecret(e.Object) },
GenericFunc: func(_ event.GenericEvent) bool { return false },
}
}
func (r *Reconciler) isRelevantSecret(obj client.Object) bool {
secret, ok := obj.(*corev1.Secret)
if !ok {
return false
}
return secret.Labels != nil &&
secret.Labels[resourcesv1alpha1.ResourceManagerPurpose] == resourcesv1alpha1.LabelPurposeTokenRequest &&
(r.Class == nil || secret.Labels[resourcesv1alpha1.ResourceManagerClass] == *r.Class)
}
func (r *Reconciler) isRelevantSecretUpdate(oldObj, newObj client.Object) bool {
return r.isRelevantSecret(newObj) || r.isRelevantSecret(oldObj)
}