Skip to content

Commit 26ea85e

Browse files
committed
Update webspherelibertyapplication_controller.go
1 parent 0ee359c commit 26ea85e

File tree

1 file changed

+0
-62
lines changed

1 file changed

+0
-62
lines changed

controllers/webspherelibertyapplication_controller.go

Lines changed: 0 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -408,68 +408,6 @@ func (r *ReconcileWebSphereLiberty) Reconcile(ctx context.Context, request ctrl.
408408
OperatorAllowAPIServerAccessLabel: "true",
409409
},
410410
}
411-
// Add OpenShift DNS NetworkPolicy (if applicable)
412-
if r.IsOpenShift() {
413-
dnsRule := networkingv1.NetworkPolicyEgressRule{}
414-
if dnsEndpoints, err := r.getEndpoints("dns-default", "openshift-dns"); err == nil {
415-
if endpointPort := lutils.GetEndpointPortByName(&dnsEndpoints.Subsets[0].Ports, "dns"); endpointPort != nil {
416-
dnsRule.Ports = append(dnsRule.Ports, lutils.CreateNetworkPolicyPortFromEndpointPort(endpointPort))
417-
}
418-
if endpointPort := lutils.GetEndpointPortByName(&dnsEndpoints.Subsets[0].Ports, "dns-tcp"); endpointPort != nil {
419-
dnsRule.Ports = append(dnsRule.Ports, lutils.CreateNetworkPolicyPortFromEndpointPort(endpointPort))
420-
}
421-
peer := networkingv1.NetworkPolicyPeer{}
422-
peer.NamespaceSelector = &metav1.LabelSelector{
423-
MatchLabels: map[string]string{
424-
"kubernetes.io/metadata.name": "openshift-dns",
425-
},
426-
}
427-
dnsRule.To = append(dnsRule.To, peer)
428-
reqLogger.Info("Found endpoints for dns-default service in the openshift-dns namespace")
429-
} else {
430-
peer := networkingv1.NetworkPolicyPeer{}
431-
peer.NamespaceSelector = &metav1.LabelSelector{
432-
MatchLabels: map[string]string{},
433-
}
434-
dnsRule.To = append(dnsRule.To, peer)
435-
reqLogger.Info("Failed to retrieve endpoints for dns-default service in the openshift-dns namespace. Using more permissive rule.")
436-
}
437-
apiServerNetworkPolicy.Spec.Egress = append(apiServerNetworkPolicy.Spec.Egress, dnsRule)
438-
}
439-
440-
rule := networkingv1.NetworkPolicyEgressRule{}
441-
if apiServerEndpoints, err := r.getEndpoints("kubernetes", "default"); err == nil {
442-
// Define the port
443-
port := networkingv1.NetworkPolicyPort{}
444-
port.Protocol = &apiServerEndpoints.Subsets[0].Ports[0].Protocol
445-
var portNumber intstr.IntOrString = intstr.FromInt((int)(apiServerEndpoints.Subsets[0].Ports[0].Port))
446-
port.Port = &portNumber
447-
rule.Ports = append(rule.Ports, port)
448-
449-
// Add the endpoint address as ipBlock entries
450-
for _, endpoint := range apiServerEndpoints.Subsets {
451-
for _, address := range endpoint.Addresses {
452-
peer := networkingv1.NetworkPolicyPeer{}
453-
ipBlock := networkingv1.IPBlock{}
454-
ipBlock.CIDR = address.IP + "/32"
455-
456-
peer.IPBlock = &ipBlock
457-
rule.To = append(rule.To, peer)
458-
}
459-
}
460-
reqLogger.Info("Found endpoints for kubernetes service in the default namespace")
461-
} else {
462-
peer := networkingv1.NetworkPolicyPeer{}
463-
peer.NamespaceSelector = &metav1.LabelSelector{
464-
MatchLabels: map[string]string{},
465-
}
466-
rule.To = append(rule.To, peer)
467-
reqLogger.Info("Failed to retrieve endpoints for kubernetes service in the default namespace. Using more permissive rule.")
468-
}
469-
apiServerNetworkPolicy.Spec.Egress = append(apiServerNetworkPolicy.Spec.Egress, rule)
470-
apiServerNetworkPolicy.Labels = ba.GetLabels()
471-
apiServerNetworkPolicy.Annotations = oputils.MergeMaps(apiServerNetworkPolicy.Annotations, ba.GetAnnotations())
472-
apiServerNetworkPolicy.Spec.PolicyTypes = []networkingv1.PolicyType{networkingv1.PolicyTypeEgress}
473411
err = r.CreateOrUpdate(apiServerNetworkPolicy, instance, func() error {
474412
apiServerNetworkPolicy.Spec.PodSelector = metav1.LabelSelector{
475413
MatchLabels: map[string]string{

0 commit comments

Comments
 (0)