forked from redhat-cop/operator-utils
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathenforcingpatch_controller.go
148 lines (129 loc) · 5.43 KB
/
enforcingpatch_controller.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
package enforcingpatch
import (
"context"
errs "errors"
enforcingpatchv1alpha1 "github.com/redhat-cop/operator-utils/pkg/apis/example/v1alpha1"
"github.com/redhat-cop/operator-utils/pkg/util/lockedresourcecontroller"
"github.com/redhat-cop/operator-utils/pkg/util/lockedresourcecontroller/lockedpatch"
"github.com/redhat-cop/operator-utils/pkg/util/lockedresourcecontroller/lockedresource"
"k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"sigs.k8s.io/controller-runtime/pkg/controller"
"sigs.k8s.io/controller-runtime/pkg/handler"
logf "sigs.k8s.io/controller-runtime/pkg/log"
"sigs.k8s.io/controller-runtime/pkg/manager"
"sigs.k8s.io/controller-runtime/pkg/reconcile"
"sigs.k8s.io/controller-runtime/pkg/source"
)
var controllerName = "enforcingpatch_controller"
var log = logf.Log.WithName(controllerName)
// ReconcileEnforcingPatch reconciles a EnforcingPatch object
type ReconcileEnforcingPatch struct {
// This client, initialized using mgr.Client() above, is a split client
// that reads objects from the cache and writes to the apiserver
lockedresourcecontroller.EnforcingReconciler
}
/**
* USER ACTION REQUIRED: This is a scaffold file intended for the user to modify with their own Controller
* business logic. Delete these comments after modifying this file.*
*/
// Add creates a new EnforcingPatch Controller and adds it to the Manager. The Manager will set fields on the Controller
// and Start it when the Manager is Started.
func Add(mgr manager.Manager) error {
return add(mgr, newReconciler(mgr))
}
// newReconciler returns a new reconcile.Reconciler
func newReconciler(mgr manager.Manager) reconcile.Reconciler {
return &ReconcileEnforcingPatch{
EnforcingReconciler: lockedresourcecontroller.NewEnforcingReconciler(mgr.GetClient(), mgr.GetScheme(), mgr.GetConfig(), mgr.GetEventRecorderFor(controllerName)),
}
}
// add adds a new Controller to mgr with r as the reconcile.Reconciler
func add(mgr manager.Manager, r reconcile.Reconciler) error {
// Create a new controller
c, err := controller.New("enforcingpatch-controller", mgr, controller.Options{Reconciler: r})
if err != nil {
return err
}
// Watch for changes to primary resource EnforcingPatch
err = c.Watch(&source.Kind{Type: &enforcingpatchv1alpha1.EnforcingPatch{
TypeMeta: metav1.TypeMeta{
Kind: "EnforcingPatch",
}}}, &handler.EnqueueRequestForObject{})
if err != nil {
return err
}
//if interested in updates from the managed resources
// watch for changes in status in the locked resources
enforcingReconciler, ok := r.(*ReconcileEnforcingPatch)
if !ok {
err := errs.New("unable to convert reconciler to ReconcileEnforcingPatch")
log.Error(err, "unable to convert to ReconcileEnforcingPatch", "reconciler", r)
return err
}
err = c.Watch(
&source.Channel{Source: enforcingReconciler.GetStatusChangeChannel()},
&handler.EnqueueRequestForObject{},
)
if err != nil {
return err
}
return nil
}
// blank assignment to verify that ReconcileEnforcingPatch implements reconcile.Reconciler
var _ reconcile.Reconciler = &ReconcileEnforcingPatch{}
// Reconcile reads that state of the cluster for a EnforcingPatch object and makes changes based on the state read
// and what is in the EnforcingPatch.Spec
// TODO(user): Modify this Reconcile function to implement your Controller logic. This example creates
// a Pod as an example
// Note:
// The Controller will requeue the Request to be processed again if the returned error is non-nil or
// Result.Requeue is true, otherwise upon completion it will remove the work from the queue.
func (r *ReconcileEnforcingPatch) Reconcile(request reconcile.Request) (reconcile.Result, error) {
reqLogger := log.WithValues("Request.Namespace", request.Namespace, "Request.Name", request.Name)
reqLogger.Info("Reconciling EnforcingPatch")
// Fetch the EnforcingPatch instance
instance := &enforcingpatchv1alpha1.EnforcingPatch{}
err := r.GetClient().Get(context.TODO(), request.NamespacedName, instance)
if err != nil {
if errors.IsNotFound(err) {
// Request object not found, could have been deleted after reconcile request.
// Owned objects are automatically garbage collected. For additional cleanup logic use finalizers.
// Return and don't requeue
return reconcile.Result{}, nil
}
// Error reading the object - requeue the request.
return reconcile.Result{}, err
}
if ok := r.IsInitialized(instance); !ok {
err := r.GetClient().Update(context.TODO(), instance)
if err != nil {
log.Error(err, "unable to update instance", "instance", instance)
return r.ManageError(instance, err)
}
return reconcile.Result{}, nil
}
lockedPatches, err := lockedpatch.GetLockedPatches(instance.Spec.Patches)
if err != nil {
log.Error(err, "unable to get locked patches")
return r.ManageError(instance, err)
}
err = r.UpdateLockedResources(instance, []lockedresource.LockedResource{}, lockedPatches)
if err != nil {
log.Error(err, "unable to update locked pacthes")
return r.ManageError(instance, err)
}
return r.ManageSuccess(instance)
}
// IsInitialized can be used to check if isntance is correctlty initialuzed.
// returns false it it's not.
func (r *ReconcileEnforcingPatch) IsInitialized(instance *enforcingpatchv1alpha1.EnforcingPatch) bool {
needsUpdate := true
for i := range instance.Spec.Patches {
if instance.Spec.Patches[i].PatchType == "" {
instance.Spec.Patches[i].PatchType = "application/strategic-merge-patch+json"
needsUpdate = false
}
}
return needsUpdate
}