@@ -408,68 +408,6 @@ func (r *ReconcileWebSphereLiberty) Reconcile(ctx context.Context, request ctrl.
408408 OperatorAllowAPIServerAccessLabel : "true" ,
409409 },
410410 }
411- // Add OpenShift DNS NetworkPolicy (if applicable)
412- if r .IsOpenShift () {
413- dnsRule := networkingv1.NetworkPolicyEgressRule {}
414- if dnsEndpoints , err := r .getEndpoints ("dns-default" , "openshift-dns" ); err == nil {
415- if endpointPort := lutils .GetEndpointPortByName (& dnsEndpoints .Subsets [0 ].Ports , "dns" ); endpointPort != nil {
416- dnsRule .Ports = append (dnsRule .Ports , lutils .CreateNetworkPolicyPortFromEndpointPort (endpointPort ))
417- }
418- if endpointPort := lutils .GetEndpointPortByName (& dnsEndpoints .Subsets [0 ].Ports , "dns-tcp" ); endpointPort != nil {
419- dnsRule .Ports = append (dnsRule .Ports , lutils .CreateNetworkPolicyPortFromEndpointPort (endpointPort ))
420- }
421- peer := networkingv1.NetworkPolicyPeer {}
422- peer .NamespaceSelector = & metav1.LabelSelector {
423- MatchLabels : map [string ]string {
424- "kubernetes.io/metadata.name" : "openshift-dns" ,
425- },
426- }
427- dnsRule .To = append (dnsRule .To , peer )
428- reqLogger .Info ("Found endpoints for dns-default service in the openshift-dns namespace" )
429- } else {
430- peer := networkingv1.NetworkPolicyPeer {}
431- peer .NamespaceSelector = & metav1.LabelSelector {
432- MatchLabels : map [string ]string {},
433- }
434- dnsRule .To = append (dnsRule .To , peer )
435- reqLogger .Info ("Failed to retrieve endpoints for dns-default service in the openshift-dns namespace. Using more permissive rule." )
436- }
437- apiServerNetworkPolicy .Spec .Egress = append (apiServerNetworkPolicy .Spec .Egress , dnsRule )
438- }
439-
440- rule := networkingv1.NetworkPolicyEgressRule {}
441- if apiServerEndpoints , err := r .getEndpoints ("kubernetes" , "default" ); err == nil {
442- // Define the port
443- port := networkingv1.NetworkPolicyPort {}
444- port .Protocol = & apiServerEndpoints .Subsets [0 ].Ports [0 ].Protocol
445- var portNumber intstr.IntOrString = intstr .FromInt ((int )(apiServerEndpoints .Subsets [0 ].Ports [0 ].Port ))
446- port .Port = & portNumber
447- rule .Ports = append (rule .Ports , port )
448-
449- // Add the endpoint address as ipBlock entries
450- for _ , endpoint := range apiServerEndpoints .Subsets {
451- for _ , address := range endpoint .Addresses {
452- peer := networkingv1.NetworkPolicyPeer {}
453- ipBlock := networkingv1.IPBlock {}
454- ipBlock .CIDR = address .IP + "/32"
455-
456- peer .IPBlock = & ipBlock
457- rule .To = append (rule .To , peer )
458- }
459- }
460- reqLogger .Info ("Found endpoints for kubernetes service in the default namespace" )
461- } else {
462- peer := networkingv1.NetworkPolicyPeer {}
463- peer .NamespaceSelector = & metav1.LabelSelector {
464- MatchLabels : map [string ]string {},
465- }
466- rule .To = append (rule .To , peer )
467- reqLogger .Info ("Failed to retrieve endpoints for kubernetes service in the default namespace. Using more permissive rule." )
468- }
469- apiServerNetworkPolicy .Spec .Egress = append (apiServerNetworkPolicy .Spec .Egress , rule )
470- apiServerNetworkPolicy .Labels = ba .GetLabels ()
471- apiServerNetworkPolicy .Annotations = oputils .MergeMaps (apiServerNetworkPolicy .Annotations , ba .GetAnnotations ())
472- apiServerNetworkPolicy .Spec .PolicyTypes = []networkingv1.PolicyType {networkingv1 .PolicyTypeEgress }
473411 err = r .CreateOrUpdate (apiServerNetworkPolicy , instance , func () error {
474412 apiServerNetworkPolicy .Spec .PodSelector = metav1.LabelSelector {
475413 MatchLabels : map [string ]string {
0 commit comments