@@ -46,20 +46,53 @@ func NewPolicyMachineryController(manager ctrlruntime.Manager, client *dynamic.D
46
46
controller .ManagedBy (manager ),
47
47
controller .WithLogger (logger ),
48
48
controller .WithClient (client ),
49
- controller .WithRunnable ("kuadrant watcher" , controller .Watch (& kuadrantv1beta1.Kuadrant {}, kuadrantv1beta1 .KuadrantsResource , metav1 .NamespaceAll )),
50
- controller .WithRunnable ("dnspolicy watcher" , controller .Watch (& kuadrantv1alpha1.DNSPolicy {}, kuadrantv1alpha1 .DNSPoliciesResource , metav1 .NamespaceAll )),
51
- controller .WithRunnable ("tlspolicy watcher" , controller .Watch (& kuadrantv1alpha1.TLSPolicy {}, kuadrantv1alpha1 .TLSPoliciesResource , metav1 .NamespaceAll )),
52
- controller .WithRunnable ("authpolicy watcher" , controller .Watch (& kuadrantv1beta2.AuthPolicy {}, kuadrantv1beta2 .AuthPoliciesResource , metav1 .NamespaceAll )),
53
- controller .WithRunnable ("ratelimitpolicy watcher" , controller .Watch (& kuadrantv1beta3.RateLimitPolicy {}, kuadrantv1beta3 .RateLimitPoliciesResource , metav1 .NamespaceAll )),
49
+ controller .WithRunnable ("kuadrant watcher" , controller .Watch (
50
+ & kuadrantv1beta1.Kuadrant {},
51
+ kuadrantv1beta1 .KuadrantsResource ,
52
+ metav1 .NamespaceAll ,
53
+ controller .WithPredicates (& ctrlruntimepredicate.TypedGenerationChangedPredicate [* kuadrantv1beta1.Kuadrant ]{}),
54
+ )),
55
+ controller .WithRunnable ("dnspolicy watcher" , controller .Watch (
56
+ & kuadrantv1alpha1.DNSPolicy {},
57
+ kuadrantv1alpha1 .DNSPoliciesResource ,
58
+ metav1 .NamespaceAll ,
59
+ controller .WithPredicates (& ctrlruntimepredicate.TypedGenerationChangedPredicate [* kuadrantv1alpha1.DNSPolicy ]{}),
60
+ )),
61
+ controller .WithRunnable ("tlspolicy watcher" , controller .Watch (
62
+ & kuadrantv1alpha1.TLSPolicy {},
63
+ kuadrantv1alpha1 .TLSPoliciesResource ,
64
+ metav1 .NamespaceAll ,
65
+ controller .WithPredicates (& ctrlruntimepredicate.TypedGenerationChangedPredicate [* kuadrantv1alpha1.TLSPolicy ]{}),
66
+ )),
67
+ controller .WithRunnable ("authpolicy watcher" , controller .Watch (
68
+ & kuadrantv1beta2.AuthPolicy {},
69
+ kuadrantv1beta2 .AuthPoliciesResource ,
70
+ metav1 .NamespaceAll ,
71
+ controller .WithPredicates (& ctrlruntimepredicate.TypedGenerationChangedPredicate [* kuadrantv1beta2.AuthPolicy ]{}),
72
+ )),
73
+ controller .WithRunnable ("ratelimitpolicy watcher" , controller .Watch (
74
+ & kuadrantv1beta3.RateLimitPolicy {},
75
+ kuadrantv1beta3 .RateLimitPoliciesResource ,
76
+ metav1 .NamespaceAll ,
77
+ controller .WithPredicates (& ctrlruntimepredicate.TypedGenerationChangedPredicate [* kuadrantv1beta3.RateLimitPolicy ]{}),
78
+ )),
54
79
controller .WithRunnable ("topology configmap watcher" , controller .Watch (
55
80
& corev1.ConfigMap {},
56
81
controller .ConfigMapsResource ,
57
82
operatorNamespace ,
58
- controller.FilterResourcesByLabel [* corev1.ConfigMap ](fmt .Sprintf ("%s=true" , kuadrant .TopologyLabel )),
59
83
controller .WithPredicates (& ctrlruntimepredicate.TypedGenerationChangedPredicate [* corev1.ConfigMap ]{}),
84
+ controller.FilterResourcesByLabel [* corev1.ConfigMap ](fmt .Sprintf ("%s=true" , kuadrant .TopologyLabel )),
85
+ )),
86
+ controller .WithRunnable ("limitador watcher" , controller .Watch (
87
+ & limitadorv1alpha1.Limitador {},
88
+ kuadrantv1beta1 .LimitadorsResource ,
89
+ metav1 .NamespaceAll ,
90
+ )),
91
+ controller .WithRunnable ("authorino watcher" , controller .Watch (
92
+ & authorinov1beta1.Authorino {},
93
+ kuadrantv1beta1 .AuthorinosResource ,
94
+ metav1 .NamespaceAll ,
60
95
)),
61
- controller .WithRunnable ("limitador watcher" , controller .Watch (& limitadorv1alpha1.Limitador {}, kuadrantv1beta1 .LimitadorsResource , metav1 .NamespaceAll )),
62
- controller .WithRunnable ("authorino watcher" , controller .Watch (& authorinov1beta1.Authorino {}, kuadrantv1beta1 .AuthorinosResource , metav1 .NamespaceAll )),
63
96
controller .WithPolicyKinds (
64
97
kuadrantv1alpha1 .DNSPolicyGroupKind ,
65
98
kuadrantv1alpha1 .TLSPolicyGroupKind ,
@@ -84,9 +117,21 @@ func NewPolicyMachineryController(manager ctrlruntime.Manager, client *dynamic.D
84
117
logger .Info ("gateway api is not installed, skipping watches and reconcilers" , "err" , err )
85
118
} else {
86
119
controllerOpts = append (controllerOpts ,
87
- controller .WithRunnable ("gatewayclass watcher" , controller .Watch (& gwapiv1.GatewayClass {}, controller .GatewayClassesResource , metav1 .NamespaceAll )),
88
- controller .WithRunnable ("gateway watcher" , controller .Watch (& gwapiv1.Gateway {}, controller .GatewaysResource , metav1 .NamespaceAll )),
89
- controller .WithRunnable ("httproute watcher" , controller .Watch (& gwapiv1.HTTPRoute {}, controller .HTTPRoutesResource , metav1 .NamespaceAll )),
120
+ controller .WithRunnable ("gatewayclass watcher" , controller .Watch (
121
+ & gwapiv1.GatewayClass {},
122
+ controller .GatewayClassesResource ,
123
+ metav1 .NamespaceAll ,
124
+ )),
125
+ controller .WithRunnable ("gateway watcher" , controller .Watch (
126
+ & gwapiv1.Gateway {},
127
+ controller .GatewaysResource ,
128
+ metav1 .NamespaceAll ,
129
+ )),
130
+ controller .WithRunnable ("httproute watcher" , controller .Watch (
131
+ & gwapiv1.HTTPRoute {},
132
+ controller .HTTPRoutesResource ,
133
+ metav1 .NamespaceAll ,
134
+ )),
90
135
)
91
136
}
92
137
@@ -95,9 +140,21 @@ func NewPolicyMachineryController(manager ctrlruntime.Manager, client *dynamic.D
95
140
logger .Info ("envoygateway is not installed, skipping related watches and reconcilers" , "err" , err )
96
141
} else {
97
142
controllerOpts = append (controllerOpts ,
98
- controller .WithRunnable ("envoypatchpolicy watcher" , controller .Watch (& egv1alpha1.EnvoyPatchPolicy {}, envoygateway .EnvoyPatchPoliciesResource , metav1 .NamespaceAll )),
99
- controller .WithRunnable ("envoyextensionpolicy watcher" , controller .Watch (& egv1alpha1.EnvoyExtensionPolicy {}, envoygateway .EnvoyExtensionPoliciesResource , metav1 .NamespaceAll )),
100
- controller .WithRunnable ("envoysecuritypolicy watcher" , controller .Watch (& egv1alpha1.SecurityPolicy {}, envoygateway .SecurityPoliciesResource , metav1 .NamespaceAll )),
143
+ controller .WithRunnable ("envoypatchpolicy watcher" , controller .Watch (
144
+ & egv1alpha1.EnvoyPatchPolicy {},
145
+ envoygateway .EnvoyPatchPoliciesResource ,
146
+ metav1 .NamespaceAll ,
147
+ )),
148
+ controller .WithRunnable ("envoyextensionpolicy watcher" , controller .Watch (
149
+ & egv1alpha1.EnvoyExtensionPolicy {},
150
+ envoygateway .EnvoyExtensionPoliciesResource ,
151
+ metav1 .NamespaceAll ,
152
+ )),
153
+ controller .WithRunnable ("envoysecuritypolicy watcher" , controller .Watch (
154
+ & egv1alpha1.SecurityPolicy {},
155
+ envoygateway .SecurityPoliciesResource ,
156
+ metav1 .NamespaceAll ,
157
+ )),
101
158
controller .WithObjectKinds (
102
159
envoygateway .EnvoyPatchPolicyGroupKind ,
103
160
envoygateway .EnvoyExtensionPolicyGroupKind ,
@@ -113,9 +170,21 @@ func NewPolicyMachineryController(manager ctrlruntime.Manager, client *dynamic.D
113
170
logger .Info ("istio is not installed, skipping related watches and reconcilers" , "err" , err )
114
171
} else {
115
172
controllerOpts = append (controllerOpts ,
116
- controller .WithRunnable ("envoyfilter watcher" , controller .Watch (& istioclientnetworkingv1alpha3.EnvoyFilter {}, istio .EnvoyFiltersResource , metav1 .NamespaceAll )),
117
- controller .WithRunnable ("wasmplugin watcher" , controller .Watch (& istioclientgoextensionv1alpha1.WasmPlugin {}, istio .WasmPluginsResource , metav1 .NamespaceAll )),
118
- controller .WithRunnable ("authorizationpolicy watcher" , controller .Watch (& istioclientgosecurityv1beta1.AuthorizationPolicy {}, istio .AuthorizationPoliciesResource , metav1 .NamespaceAll )),
173
+ controller .WithRunnable ("envoyfilter watcher" , controller .Watch (
174
+ & istioclientnetworkingv1alpha3.EnvoyFilter {},
175
+ istio .EnvoyFiltersResource ,
176
+ metav1 .NamespaceAll ,
177
+ )),
178
+ controller .WithRunnable ("wasmplugin watcher" , controller .Watch (
179
+ & istioclientgoextensionv1alpha1.WasmPlugin {},
180
+ istio .WasmPluginsResource ,
181
+ metav1 .NamespaceAll ,
182
+ )),
183
+ controller .WithRunnable ("authorizationpolicy watcher" , controller .Watch (
184
+ & istioclientgosecurityv1beta1.AuthorizationPolicy {},
185
+ istio .AuthorizationPoliciesResource ,
186
+ metav1 .NamespaceAll ,
187
+ )),
119
188
controller .WithObjectKinds (
120
189
istio .EnvoyFilterGroupKind ,
121
190
istio .WasmPluginGroupKind ,
@@ -131,9 +200,21 @@ func NewPolicyMachineryController(manager ctrlruntime.Manager, client *dynamic.D
131
200
logger .Info ("cert manager is not installed, skipping related watches and reconcilers" , "err" , err )
132
201
} else {
133
202
controllerOpts = append (controllerOpts ,
134
- controller .WithRunnable ("certificate watcher" , controller .Watch (& certmanagerv1.Certificate {}, CertManagerCertificatesResource , metav1 .NamespaceAll )),
135
- controller .WithRunnable ("issuers watcher" , controller .Watch (& certmanagerv1.Issuer {}, CertManagerIssuersResource , metav1 .NamespaceAll )),
136
- controller .WithRunnable ("clusterissuers watcher" , controller .Watch (& certmanagerv1.Certificate {}, CertMangerClusterIssuersResource , metav1 .NamespaceAll )),
203
+ controller .WithRunnable ("certificate watcher" , controller .Watch (
204
+ & certmanagerv1.Certificate {},
205
+ CertManagerCertificatesResource ,
206
+ metav1 .NamespaceAll ,
207
+ )),
208
+ controller .WithRunnable ("issuers watcher" , controller .Watch (
209
+ & certmanagerv1.Issuer {},
210
+ CertManagerIssuersResource ,
211
+ metav1 .NamespaceAll ,
212
+ )),
213
+ controller .WithRunnable ("clusterissuers watcher" , controller .Watch (
214
+ & certmanagerv1.Certificate {},
215
+ CertMangerClusterIssuersResource ,
216
+ metav1 .NamespaceAll ,
217
+ )),
137
218
controller .WithObjectKinds (
138
219
CertManagerCertificateKind ,
139
220
CertManagerIssuerKind ,
0 commit comments