@@ -412,68 +412,6 @@ func (r *ReconcileWebSphereLiberty) Reconcile(ctx context.Context, request ctrl.
412412 OperatorAllowAPIServerAccessLabel : "true" ,
413413 },
414414 }
415- // Add OpenShift DNS NetworkPolicy (if applicable)
416- if r .IsOpenShift () {
417- dnsRule := networkingv1.NetworkPolicyEgressRule {}
418- if dnsEndpoints , err := r .getEndpoints ("dns-default" , "openshift-dns" ); err == nil {
419- if endpointPort := lutils .GetEndpointPortByName (& dnsEndpoints .Subsets [0 ].Ports , "dns" ); endpointPort != nil {
420- dnsRule .Ports = append (dnsRule .Ports , lutils .CreateNetworkPolicyPortFromEndpointPort (endpointPort ))
421- }
422- if endpointPort := lutils .GetEndpointPortByName (& dnsEndpoints .Subsets [0 ].Ports , "dns-tcp" ); endpointPort != nil {
423- dnsRule .Ports = append (dnsRule .Ports , lutils .CreateNetworkPolicyPortFromEndpointPort (endpointPort ))
424- }
425- peer := networkingv1.NetworkPolicyPeer {}
426- peer .NamespaceSelector = & metav1.LabelSelector {
427- MatchLabels : map [string ]string {
428- "kubernetes.io/metadata.name" : "openshift-dns" ,
429- },
430- }
431- dnsRule .To = append (dnsRule .To , peer )
432- reqLogger .Info ("Found endpoints for dns-default service in the openshift-dns namespace" )
433- } else {
434- peer := networkingv1.NetworkPolicyPeer {}
435- peer .NamespaceSelector = & metav1.LabelSelector {
436- MatchLabels : map [string ]string {},
437- }
438- dnsRule .To = append (dnsRule .To , peer )
439- reqLogger .Info ("Failed to retrieve endpoints for dns-default service in the openshift-dns namespace. Using more permissive rule." )
440- }
441- apiServerNetworkPolicy .Spec .Egress = append (apiServerNetworkPolicy .Spec .Egress , dnsRule )
442- }
443-
444- rule := networkingv1.NetworkPolicyEgressRule {}
445- if apiServerEndpoints , err := r .getEndpoints ("kubernetes" , "default" ); err == nil {
446- // Define the port
447- port := networkingv1.NetworkPolicyPort {}
448- port .Protocol = & apiServerEndpoints .Subsets [0 ].Ports [0 ].Protocol
449- var portNumber intstr.IntOrString = intstr .FromInt ((int )(apiServerEndpoints .Subsets [0 ].Ports [0 ].Port ))
450- port .Port = & portNumber
451- rule .Ports = append (rule .Ports , port )
452-
453- // Add the endpoint address as ipBlock entries
454- for _ , endpoint := range apiServerEndpoints .Subsets {
455- for _ , address := range endpoint .Addresses {
456- peer := networkingv1.NetworkPolicyPeer {}
457- ipBlock := networkingv1.IPBlock {}
458- ipBlock .CIDR = address .IP + "/32"
459-
460- peer .IPBlock = & ipBlock
461- rule .To = append (rule .To , peer )
462- }
463- }
464- reqLogger .Info ("Found endpoints for kubernetes service in the default namespace" )
465- } else {
466- peer := networkingv1.NetworkPolicyPeer {}
467- peer .NamespaceSelector = & metav1.LabelSelector {
468- MatchLabels : map [string ]string {},
469- }
470- rule .To = append (rule .To , peer )
471- reqLogger .Info ("Failed to retrieve endpoints for kubernetes service in the default namespace. Using more permissive rule." )
472- }
473- apiServerNetworkPolicy .Spec .Egress = append (apiServerNetworkPolicy .Spec .Egress , rule )
474- apiServerNetworkPolicy .Labels = ba .GetLabels ()
475- apiServerNetworkPolicy .Annotations = oputils .MergeMaps (apiServerNetworkPolicy .Annotations , ba .GetAnnotations ())
476- apiServerNetworkPolicy .Spec .PolicyTypes = []networkingv1.PolicyType {networkingv1 .PolicyTypeEgress }
477415 err = r .CreateOrUpdate (apiServerNetworkPolicy , instance , func () error {
478416 apiServerNetworkPolicy .Spec .PodSelector = metav1.LabelSelector {
479417 MatchLabels : map [string ]string {
0 commit comments