forked from gardener/gardener
-
Notifications
You must be signed in to change notification settings - Fork 0
/
add.go
129 lines (110 loc) · 4.79 KB
/
add.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
// Copyright (c) 2022 SAP SE or an SAP affiliate company. All rights reserved. This file is licensed under the Apache Software License, v. 2 except as noted otherwise in the LICENSE file
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package controllerinstallation
import (
"context"
"reflect"
"k8s.io/utils/pointer"
"sigs.k8s.io/controller-runtime/pkg/builder"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/cluster"
"sigs.k8s.io/controller-runtime/pkg/controller"
"sigs.k8s.io/controller-runtime/pkg/event"
"sigs.k8s.io/controller-runtime/pkg/handler"
"sigs.k8s.io/controller-runtime/pkg/manager"
"sigs.k8s.io/controller-runtime/pkg/predicate"
"sigs.k8s.io/controller-runtime/pkg/source"
gardencorev1beta1 "github.com/gardener/gardener/pkg/apis/core/v1beta1"
contextutil "github.com/gardener/gardener/pkg/utils/context"
kutil "github.com/gardener/gardener/pkg/utils/kubernetes"
)
// ControllerName is the name of this controller.
const ControllerName = "controllerinstallation"
// AddToManager adds Reconciler to the given manager.
func (r *Reconciler) AddToManager(mgr manager.Manager, gardenCluster cluster.Cluster) error {
if r.GardenClient == nil {
r.GardenClient = gardenCluster.GetClient()
}
c, err := builder.
ControllerManagedBy(mgr).
Named(ControllerName).
WithOptions(controller.Options{
MaxConcurrentReconciles: pointer.IntDeref(r.Config.ConcurrentSyncs, 0),
}).
Build(r)
if err != nil {
return err
}
return c.Watch(
source.NewKindWithCache(&gardencorev1beta1.ControllerInstallation{}, gardenCluster.GetCache()),
&handler.EnqueueRequestForObject{},
r.ControllerInstallationPredicate(),
r.HelmTypePredicate(gardenCluster.GetClient()),
)
}
// ControllerInstallationPredicate returns a predicate that evaluates to true in all cases except for 'Update' events.
// Here, it only returns true if the references change or the deletion timestamp gets set.
func (r *Reconciler) ControllerInstallationPredicate() predicate.Predicate {
return predicate.Funcs{
UpdateFunc: func(e event.UpdateEvent) bool {
// enqueue on periodic cache resyncs
if e.ObjectOld.GetResourceVersion() == e.ObjectNew.GetResourceVersion() {
return true
}
controllerInstallation, ok := e.ObjectNew.(*gardencorev1beta1.ControllerInstallation)
if !ok {
return false
}
oldControllerInstallation, ok := e.ObjectOld.(*gardencorev1beta1.ControllerInstallation)
if !ok {
return false
}
return (oldControllerInstallation.DeletionTimestamp == nil && controllerInstallation.DeletionTimestamp != nil) ||
!reflect.DeepEqual(oldControllerInstallation.Spec.DeploymentRef, controllerInstallation.Spec.DeploymentRef) ||
oldControllerInstallation.Spec.RegistrationRef.ResourceVersion != controllerInstallation.Spec.RegistrationRef.ResourceVersion ||
oldControllerInstallation.Spec.SeedRef.ResourceVersion != controllerInstallation.Spec.SeedRef.ResourceVersion
},
}
}
// HelmTypePredicate is a predicate which checks whether the ControllerDeployment referenced in the
// ControllerInstallation has .type=helm.
func (r *Reconciler) HelmTypePredicate(reader client.Reader) predicate.Predicate {
return &helmTypePredicate{reader: reader}
}
type helmTypePredicate struct {
ctx context.Context
reader client.Reader
}
func (p *helmTypePredicate) InjectStopChannel(stopChan <-chan struct{}) error {
p.ctx = contextutil.FromStopChannel(stopChan)
return nil
}
func (p *helmTypePredicate) Create(e event.CreateEvent) bool { return p.isResponsible(e.Object) }
func (p *helmTypePredicate) Update(e event.UpdateEvent) bool { return p.isResponsible(e.ObjectNew) }
func (p *helmTypePredicate) Delete(e event.DeleteEvent) bool { return p.isResponsible(e.Object) }
func (p *helmTypePredicate) Generic(e event.GenericEvent) bool { return p.isResponsible(e.Object) }
func (p *helmTypePredicate) isResponsible(obj client.Object) bool {
controllerInstallation, ok := obj.(*gardencorev1beta1.ControllerInstallation)
if !ok {
return false
}
if deploymentName := controllerInstallation.Spec.DeploymentRef; deploymentName != nil {
controllerDeployment := &gardencorev1beta1.ControllerDeployment{}
if err := p.reader.Get(p.ctx, kutil.Key(deploymentName.Name), controllerDeployment); err != nil {
return false
}
return controllerDeployment.Type == "helm"
}
return false
}