Skip to content

Commit 90639f1

Browse files
kabicinKirby Chin
authored andcommitted
Update webspherelibertyapplication_controller.go
1 parent f230c21 commit 90639f1

File tree

1 file changed

+0
-62
lines changed

1 file changed

+0
-62
lines changed

controllers/webspherelibertyapplication_controller.go

Lines changed: 0 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -412,68 +412,6 @@ func (r *ReconcileWebSphereLiberty) Reconcile(ctx context.Context, request ctrl.
412412
OperatorAllowAPIServerAccessLabel: "true",
413413
},
414414
}
415-
// Add OpenShift DNS NetworkPolicy (if applicable)
416-
if r.IsOpenShift() {
417-
dnsRule := networkingv1.NetworkPolicyEgressRule{}
418-
if dnsEndpoints, err := r.getEndpoints("dns-default", "openshift-dns"); err == nil {
419-
if endpointPort := lutils.GetEndpointPortByName(&dnsEndpoints.Subsets[0].Ports, "dns"); endpointPort != nil {
420-
dnsRule.Ports = append(dnsRule.Ports, lutils.CreateNetworkPolicyPortFromEndpointPort(endpointPort))
421-
}
422-
if endpointPort := lutils.GetEndpointPortByName(&dnsEndpoints.Subsets[0].Ports, "dns-tcp"); endpointPort != nil {
423-
dnsRule.Ports = append(dnsRule.Ports, lutils.CreateNetworkPolicyPortFromEndpointPort(endpointPort))
424-
}
425-
peer := networkingv1.NetworkPolicyPeer{}
426-
peer.NamespaceSelector = &metav1.LabelSelector{
427-
MatchLabels: map[string]string{
428-
"kubernetes.io/metadata.name": "openshift-dns",
429-
},
430-
}
431-
dnsRule.To = append(dnsRule.To, peer)
432-
reqLogger.Info("Found endpoints for dns-default service in the openshift-dns namespace")
433-
} else {
434-
peer := networkingv1.NetworkPolicyPeer{}
435-
peer.NamespaceSelector = &metav1.LabelSelector{
436-
MatchLabels: map[string]string{},
437-
}
438-
dnsRule.To = append(dnsRule.To, peer)
439-
reqLogger.Info("Failed to retrieve endpoints for dns-default service in the openshift-dns namespace. Using more permissive rule.")
440-
}
441-
apiServerNetworkPolicy.Spec.Egress = append(apiServerNetworkPolicy.Spec.Egress, dnsRule)
442-
}
443-
444-
rule := networkingv1.NetworkPolicyEgressRule{}
445-
if apiServerEndpoints, err := r.getEndpoints("kubernetes", "default"); err == nil {
446-
// Define the port
447-
port := networkingv1.NetworkPolicyPort{}
448-
port.Protocol = &apiServerEndpoints.Subsets[0].Ports[0].Protocol
449-
var portNumber intstr.IntOrString = intstr.FromInt((int)(apiServerEndpoints.Subsets[0].Ports[0].Port))
450-
port.Port = &portNumber
451-
rule.Ports = append(rule.Ports, port)
452-
453-
// Add the endpoint address as ipBlock entries
454-
for _, endpoint := range apiServerEndpoints.Subsets {
455-
for _, address := range endpoint.Addresses {
456-
peer := networkingv1.NetworkPolicyPeer{}
457-
ipBlock := networkingv1.IPBlock{}
458-
ipBlock.CIDR = address.IP + "/32"
459-
460-
peer.IPBlock = &ipBlock
461-
rule.To = append(rule.To, peer)
462-
}
463-
}
464-
reqLogger.Info("Found endpoints for kubernetes service in the default namespace")
465-
} else {
466-
peer := networkingv1.NetworkPolicyPeer{}
467-
peer.NamespaceSelector = &metav1.LabelSelector{
468-
MatchLabels: map[string]string{},
469-
}
470-
rule.To = append(rule.To, peer)
471-
reqLogger.Info("Failed to retrieve endpoints for kubernetes service in the default namespace. Using more permissive rule.")
472-
}
473-
apiServerNetworkPolicy.Spec.Egress = append(apiServerNetworkPolicy.Spec.Egress, rule)
474-
apiServerNetworkPolicy.Labels = ba.GetLabels()
475-
apiServerNetworkPolicy.Annotations = oputils.MergeMaps(apiServerNetworkPolicy.Annotations, ba.GetAnnotations())
476-
apiServerNetworkPolicy.Spec.PolicyTypes = []networkingv1.PolicyType{networkingv1.PolicyTypeEgress}
477415
err = r.CreateOrUpdate(apiServerNetworkPolicy, instance, func() error {
478416
apiServerNetworkPolicy.Spec.PodSelector = metav1.LabelSelector{
479417
MatchLabels: map[string]string{

0 commit comments

Comments
 (0)