Skip to content

Commit 520737f

Browse files
guicassolatoR-Lawton
authored andcommitted
fix predicates for all sotw watchers
Signed-off-by: Guilherme Cassolato <[email protected]>
1 parent 9156543 commit 520737f

File tree

1 file changed

+101
-20
lines changed

1 file changed

+101
-20
lines changed

controllers/state_of_the_world.go

+101-20
Original file line numberDiff line numberDiff line change
@@ -46,20 +46,53 @@ func NewPolicyMachineryController(manager ctrlruntime.Manager, client *dynamic.D
4646
controller.ManagedBy(manager),
4747
controller.WithLogger(logger),
4848
controller.WithClient(client),
49-
controller.WithRunnable("kuadrant watcher", controller.Watch(&kuadrantv1beta1.Kuadrant{}, kuadrantv1beta1.KuadrantsResource, metav1.NamespaceAll)),
50-
controller.WithRunnable("dnspolicy watcher", controller.Watch(&kuadrantv1alpha1.DNSPolicy{}, kuadrantv1alpha1.DNSPoliciesResource, metav1.NamespaceAll)),
51-
controller.WithRunnable("tlspolicy watcher", controller.Watch(&kuadrantv1alpha1.TLSPolicy{}, kuadrantv1alpha1.TLSPoliciesResource, metav1.NamespaceAll)),
52-
controller.WithRunnable("authpolicy watcher", controller.Watch(&kuadrantv1beta2.AuthPolicy{}, kuadrantv1beta2.AuthPoliciesResource, metav1.NamespaceAll)),
53-
controller.WithRunnable("ratelimitpolicy watcher", controller.Watch(&kuadrantv1beta3.RateLimitPolicy{}, kuadrantv1beta3.RateLimitPoliciesResource, metav1.NamespaceAll)),
49+
controller.WithRunnable("kuadrant watcher", controller.Watch(
50+
&kuadrantv1beta1.Kuadrant{},
51+
kuadrantv1beta1.KuadrantsResource,
52+
metav1.NamespaceAll,
53+
controller.WithPredicates(&ctrlruntimepredicate.TypedGenerationChangedPredicate[*kuadrantv1beta1.Kuadrant]{}),
54+
)),
55+
controller.WithRunnable("dnspolicy watcher", controller.Watch(
56+
&kuadrantv1alpha1.DNSPolicy{},
57+
kuadrantv1alpha1.DNSPoliciesResource,
58+
metav1.NamespaceAll,
59+
controller.WithPredicates(&ctrlruntimepredicate.TypedGenerationChangedPredicate[*kuadrantv1alpha1.DNSPolicy]{}),
60+
)),
61+
controller.WithRunnable("tlspolicy watcher", controller.Watch(
62+
&kuadrantv1alpha1.TLSPolicy{},
63+
kuadrantv1alpha1.TLSPoliciesResource,
64+
metav1.NamespaceAll,
65+
controller.WithPredicates(&ctrlruntimepredicate.TypedGenerationChangedPredicate[*kuadrantv1alpha1.TLSPolicy]{}),
66+
)),
67+
controller.WithRunnable("authpolicy watcher", controller.Watch(
68+
&kuadrantv1beta2.AuthPolicy{},
69+
kuadrantv1beta2.AuthPoliciesResource,
70+
metav1.NamespaceAll,
71+
controller.WithPredicates(&ctrlruntimepredicate.TypedGenerationChangedPredicate[*kuadrantv1beta2.AuthPolicy]{}),
72+
)),
73+
controller.WithRunnable("ratelimitpolicy watcher", controller.Watch(
74+
&kuadrantv1beta3.RateLimitPolicy{},
75+
kuadrantv1beta3.RateLimitPoliciesResource,
76+
metav1.NamespaceAll,
77+
controller.WithPredicates(&ctrlruntimepredicate.TypedGenerationChangedPredicate[*kuadrantv1beta3.RateLimitPolicy]{}),
78+
)),
5479
controller.WithRunnable("topology configmap watcher", controller.Watch(
5580
&corev1.ConfigMap{},
5681
controller.ConfigMapsResource,
5782
operatorNamespace,
58-
controller.FilterResourcesByLabel[*corev1.ConfigMap](fmt.Sprintf("%s=true", kuadrant.TopologyLabel)),
5983
controller.WithPredicates(&ctrlruntimepredicate.TypedGenerationChangedPredicate[*corev1.ConfigMap]{}),
84+
controller.FilterResourcesByLabel[*corev1.ConfigMap](fmt.Sprintf("%s=true", kuadrant.TopologyLabel)),
85+
)),
86+
controller.WithRunnable("limitador watcher", controller.Watch(
87+
&limitadorv1alpha1.Limitador{},
88+
kuadrantv1beta1.LimitadorsResource,
89+
metav1.NamespaceAll,
90+
)),
91+
controller.WithRunnable("authorino watcher", controller.Watch(
92+
&authorinov1beta1.Authorino{},
93+
kuadrantv1beta1.AuthorinosResource,
94+
metav1.NamespaceAll,
6095
)),
61-
controller.WithRunnable("limitador watcher", controller.Watch(&limitadorv1alpha1.Limitador{}, kuadrantv1beta1.LimitadorsResource, metav1.NamespaceAll)),
62-
controller.WithRunnable("authorino watcher", controller.Watch(&authorinov1beta1.Authorino{}, kuadrantv1beta1.AuthorinosResource, metav1.NamespaceAll)),
6396
controller.WithPolicyKinds(
6497
kuadrantv1alpha1.DNSPolicyGroupKind,
6598
kuadrantv1alpha1.TLSPolicyGroupKind,
@@ -84,9 +117,21 @@ func NewPolicyMachineryController(manager ctrlruntime.Manager, client *dynamic.D
84117
logger.Info("gateway api is not installed, skipping watches and reconcilers", "err", err)
85118
} else {
86119
controllerOpts = append(controllerOpts,
87-
controller.WithRunnable("gatewayclass watcher", controller.Watch(&gwapiv1.GatewayClass{}, controller.GatewayClassesResource, metav1.NamespaceAll)),
88-
controller.WithRunnable("gateway watcher", controller.Watch(&gwapiv1.Gateway{}, controller.GatewaysResource, metav1.NamespaceAll)),
89-
controller.WithRunnable("httproute watcher", controller.Watch(&gwapiv1.HTTPRoute{}, controller.HTTPRoutesResource, metav1.NamespaceAll)),
120+
controller.WithRunnable("gatewayclass watcher", controller.Watch(
121+
&gwapiv1.GatewayClass{},
122+
controller.GatewayClassesResource,
123+
metav1.NamespaceAll,
124+
)),
125+
controller.WithRunnable("gateway watcher", controller.Watch(
126+
&gwapiv1.Gateway{},
127+
controller.GatewaysResource,
128+
metav1.NamespaceAll,
129+
)),
130+
controller.WithRunnable("httproute watcher", controller.Watch(
131+
&gwapiv1.HTTPRoute{},
132+
controller.HTTPRoutesResource,
133+
metav1.NamespaceAll,
134+
)),
90135
)
91136
}
92137

@@ -95,9 +140,21 @@ func NewPolicyMachineryController(manager ctrlruntime.Manager, client *dynamic.D
95140
logger.Info("envoygateway is not installed, skipping related watches and reconcilers", "err", err)
96141
} else {
97142
controllerOpts = append(controllerOpts,
98-
controller.WithRunnable("envoypatchpolicy watcher", controller.Watch(&egv1alpha1.EnvoyPatchPolicy{}, envoygateway.EnvoyPatchPoliciesResource, metav1.NamespaceAll)),
99-
controller.WithRunnable("envoyextensionpolicy watcher", controller.Watch(&egv1alpha1.EnvoyExtensionPolicy{}, envoygateway.EnvoyExtensionPoliciesResource, metav1.NamespaceAll)),
100-
controller.WithRunnable("envoysecuritypolicy watcher", controller.Watch(&egv1alpha1.SecurityPolicy{}, envoygateway.SecurityPoliciesResource, metav1.NamespaceAll)),
143+
controller.WithRunnable("envoypatchpolicy watcher", controller.Watch(
144+
&egv1alpha1.EnvoyPatchPolicy{},
145+
envoygateway.EnvoyPatchPoliciesResource,
146+
metav1.NamespaceAll,
147+
)),
148+
controller.WithRunnable("envoyextensionpolicy watcher", controller.Watch(
149+
&egv1alpha1.EnvoyExtensionPolicy{},
150+
envoygateway.EnvoyExtensionPoliciesResource,
151+
metav1.NamespaceAll,
152+
)),
153+
controller.WithRunnable("envoysecuritypolicy watcher", controller.Watch(
154+
&egv1alpha1.SecurityPolicy{},
155+
envoygateway.SecurityPoliciesResource,
156+
metav1.NamespaceAll,
157+
)),
101158
controller.WithObjectKinds(
102159
envoygateway.EnvoyPatchPolicyGroupKind,
103160
envoygateway.EnvoyExtensionPolicyGroupKind,
@@ -113,9 +170,21 @@ func NewPolicyMachineryController(manager ctrlruntime.Manager, client *dynamic.D
113170
logger.Info("istio is not installed, skipping related watches and reconcilers", "err", err)
114171
} else {
115172
controllerOpts = append(controllerOpts,
116-
controller.WithRunnable("envoyfilter watcher", controller.Watch(&istioclientnetworkingv1alpha3.EnvoyFilter{}, istio.EnvoyFiltersResource, metav1.NamespaceAll)),
117-
controller.WithRunnable("wasmplugin watcher", controller.Watch(&istioclientgoextensionv1alpha1.WasmPlugin{}, istio.WasmPluginsResource, metav1.NamespaceAll)),
118-
controller.WithRunnable("authorizationpolicy watcher", controller.Watch(&istioclientgosecurityv1beta1.AuthorizationPolicy{}, istio.AuthorizationPoliciesResource, metav1.NamespaceAll)),
173+
controller.WithRunnable("envoyfilter watcher", controller.Watch(
174+
&istioclientnetworkingv1alpha3.EnvoyFilter{},
175+
istio.EnvoyFiltersResource,
176+
metav1.NamespaceAll,
177+
)),
178+
controller.WithRunnable("wasmplugin watcher", controller.Watch(
179+
&istioclientgoextensionv1alpha1.WasmPlugin{},
180+
istio.WasmPluginsResource,
181+
metav1.NamespaceAll,
182+
)),
183+
controller.WithRunnable("authorizationpolicy watcher", controller.Watch(
184+
&istioclientgosecurityv1beta1.AuthorizationPolicy{},
185+
istio.AuthorizationPoliciesResource,
186+
metav1.NamespaceAll,
187+
)),
119188
controller.WithObjectKinds(
120189
istio.EnvoyFilterGroupKind,
121190
istio.WasmPluginGroupKind,
@@ -131,9 +200,21 @@ func NewPolicyMachineryController(manager ctrlruntime.Manager, client *dynamic.D
131200
logger.Info("cert manager is not installed, skipping related watches and reconcilers", "err", err)
132201
} else {
133202
controllerOpts = append(controllerOpts,
134-
controller.WithRunnable("certificate watcher", controller.Watch(&certmanagerv1.Certificate{}, CertManagerCertificatesResource, metav1.NamespaceAll)),
135-
controller.WithRunnable("issuers watcher", controller.Watch(&certmanagerv1.Issuer{}, CertManagerIssuersResource, metav1.NamespaceAll)),
136-
controller.WithRunnable("clusterissuers watcher", controller.Watch(&certmanagerv1.Certificate{}, CertMangerClusterIssuersResource, metav1.NamespaceAll)),
203+
controller.WithRunnable("certificate watcher", controller.Watch(
204+
&certmanagerv1.Certificate{},
205+
CertManagerCertificatesResource,
206+
metav1.NamespaceAll,
207+
)),
208+
controller.WithRunnable("issuers watcher", controller.Watch(
209+
&certmanagerv1.Issuer{},
210+
CertManagerIssuersResource,
211+
metav1.NamespaceAll,
212+
)),
213+
controller.WithRunnable("clusterissuers watcher", controller.Watch(
214+
&certmanagerv1.Certificate{},
215+
CertMangerClusterIssuersResource,
216+
metav1.NamespaceAll,
217+
)),
137218
controller.WithObjectKinds(
138219
CertManagerCertificateKind,
139220
CertManagerIssuerKind,

0 commit comments

Comments
 (0)