Skip to content

Commit f706998

Browse files
committed
fix: owner refs
1 parent 7820dda commit f706998

File tree

2 files changed

+130
-123
lines changed

2 files changed

+130
-123
lines changed

capi-lab/firewall-controller-manager/kustomization.yaml

Lines changed: 120 additions & 123 deletions
Original file line numberDiff line numberDiff line change
@@ -3,135 +3,132 @@ namespace: capms-system
33
namePrefix: capms-
44

55
resources:
6-
- bases/firewall.metal-stack.io_firewalldeployments.yaml
7-
- bases/firewall.metal-stack.io_firewallmonitors.yaml
8-
- bases/firewall.metal-stack.io_firewallsets.yaml
9-
- bases/firewall.metal-stack.io_firewalls.yaml
10-
- cluster-role-binding.yaml
11-
- cluster-role.yaml
12-
- deployment.yaml
13-
- mutatingwebhookconfiguration.yaml
14-
- namespace.yaml
15-
- sa.yaml
16-
- service.yaml
17-
- validatingwebhookconfiguration.yaml
18-
- webhook-certs.yaml
6+
- bases/firewall.metal-stack.io_firewalldeployments.yaml
7+
- bases/firewall.metal-stack.io_firewallmonitors.yaml
8+
- bases/firewall.metal-stack.io_firewallsets.yaml
9+
- bases/firewall.metal-stack.io_firewalls.yaml
10+
- cluster-role-binding.yaml
11+
- cluster-role.yaml
12+
- deployment.yaml
13+
- mutatingwebhookconfiguration.yaml
14+
- namespace.yaml
15+
- sa.yaml
16+
- service.yaml
17+
- validatingwebhookconfiguration.yaml
18+
- webhook-certs.yaml
1919

2020
patches:
21-
- patch: |-
22-
apiVersion: apiextensions.k8s.io/v1
23-
kind: CustomResourceDefinition
24-
metadata:
25-
name: firewalls.firewall.metal-stack.io
26-
labels:
27-
clusterctl.cluster.x-k8s.io/move: ""
28-
target:
29-
kind: CustomResourceDefinition
30-
name: firewalls.firewall.metal-stack.io
21+
- patch: |-
22+
apiVersion: apiextensions.k8s.io/v1
23+
kind: CustomResourceDefinition
24+
metadata:
25+
name: firewalls.firewall.metal-stack.io
26+
labels:
27+
clusterctl.cluster.x-k8s.io/move: ""
3128
3229
replacements:
33-
- source:
34-
kind: Certificate
35-
group: cert-manager.io
36-
version: v1
37-
name: capms-firewall-controller-manager-webhooks
38-
fieldPath: .metadata.namespace
39-
targets:
40-
- select:
41-
kind: ValidatingWebhookConfiguration
42-
name: capms-firewall-controller-manager
43-
fieldPaths:
44-
- .metadata.annotations.[cert-manager.io/inject-ca-from]
45-
options:
46-
delimiter: '/'
47-
index: 0
48-
create: true
30+
- source:
31+
kind: Certificate
32+
group: cert-manager.io
33+
version: v1
34+
name: capms-firewall-controller-manager-webhooks
35+
fieldPath: .metadata.namespace
36+
targets:
37+
- select:
38+
kind: ValidatingWebhookConfiguration
39+
name: capms-firewall-controller-manager
40+
fieldPaths:
41+
- .metadata.annotations.[cert-manager.io/inject-ca-from]
42+
options:
43+
delimiter: "/"
44+
index: 0
45+
create: true
4946

50-
- source:
51-
kind: Certificate
52-
group: cert-manager.io
53-
version: v1
54-
name: capms-firewall-controller-manager-webhooks
55-
fieldPath: .metadata.name
56-
targets:
57-
- select:
58-
kind: ValidatingWebhookConfiguration
59-
name: capms-firewall-controller-manager
60-
fieldPaths:
61-
- .metadata.annotations.[cert-manager.io/inject-ca-from]
62-
options:
63-
delimiter: '/'
64-
index: 1
65-
create: true
47+
- source:
48+
kind: Certificate
49+
group: cert-manager.io
50+
version: v1
51+
name: capms-firewall-controller-manager-webhooks
52+
fieldPath: .metadata.name
53+
targets:
54+
- select:
55+
kind: ValidatingWebhookConfiguration
56+
name: capms-firewall-controller-manager
57+
fieldPaths:
58+
- .metadata.annotations.[cert-manager.io/inject-ca-from]
59+
options:
60+
delimiter: "/"
61+
index: 1
62+
create: true
6663

67-
- source:
68-
kind: Certificate
69-
group: cert-manager.io
70-
version: v1
71-
name: capms-firewall-controller-manager-webhooks
72-
fieldPath: .metadata.namespace
73-
targets:
74-
- select:
75-
kind: MutatingWebhookConfiguration
76-
name: capms-firewall-controller-manager
77-
fieldPaths:
78-
- .metadata.annotations.[cert-manager.io/inject-ca-from]
79-
options:
80-
delimiter: '/'
81-
index: 0
82-
create: true
64+
- source:
65+
kind: Certificate
66+
group: cert-manager.io
67+
version: v1
68+
name: capms-firewall-controller-manager-webhooks
69+
fieldPath: .metadata.namespace
70+
targets:
71+
- select:
72+
kind: MutatingWebhookConfiguration
73+
name: capms-firewall-controller-manager
74+
fieldPaths:
75+
- .metadata.annotations.[cert-manager.io/inject-ca-from]
76+
options:
77+
delimiter: "/"
78+
index: 0
79+
create: true
8380

84-
- source:
85-
kind: Certificate
86-
group: cert-manager.io
87-
version: v1
88-
name: capms-firewall-controller-manager-webhooks
89-
fieldPath: .metadata.name
90-
targets:
91-
- select:
92-
kind: MutatingWebhookConfiguration
93-
name: capms-firewall-controller-manager
94-
fieldPaths:
95-
- .metadata.annotations.[cert-manager.io/inject-ca-from]
96-
options:
97-
delimiter: '/'
98-
index: 1
99-
create: true
81+
- source:
82+
kind: Certificate
83+
group: cert-manager.io
84+
version: v1
85+
name: capms-firewall-controller-manager-webhooks
86+
fieldPath: .metadata.name
87+
targets:
88+
- select:
89+
kind: MutatingWebhookConfiguration
90+
name: capms-firewall-controller-manager
91+
fieldPaths:
92+
- .metadata.annotations.[cert-manager.io/inject-ca-from]
93+
options:
94+
delimiter: "/"
95+
index: 1
96+
create: true
10097

101-
- source:
102-
kind: Service
103-
version: v1
104-
name: firewall-controller-manager
105-
fieldPath: .metadata.name
106-
targets:
107-
- select:
108-
kind: Certificate
109-
group: cert-manager.io
110-
version: v1
111-
name: firewall-controller-manager-webhooks
112-
fieldPaths:
113-
- .spec.dnsNames.0
114-
- .spec.dnsNames.1
115-
options:
116-
delimiter: '.'
117-
index: 0
118-
create: true
98+
- source:
99+
kind: Service
100+
version: v1
101+
name: firewall-controller-manager
102+
fieldPath: .metadata.name
103+
targets:
104+
- select:
105+
kind: Certificate
106+
group: cert-manager.io
107+
version: v1
108+
name: firewall-controller-manager-webhooks
109+
fieldPaths:
110+
- .spec.dnsNames.0
111+
- .spec.dnsNames.1
112+
options:
113+
delimiter: "."
114+
index: 0
115+
create: true
119116

120-
- source:
121-
kind: Service
122-
version: v1
123-
name: firewall-controller-manager
124-
fieldPath: .metadata.namespace
125-
targets:
126-
- select:
127-
kind: Certificate
128-
group: cert-manager.io
129-
version: v1
130-
name: firewall-controller-manager-webhooks
131-
fieldPaths:
132-
- .spec.dnsNames.0
133-
- .spec.dnsNames.1
134-
options:
135-
delimiter: '.'
136-
index: 1
137-
create: true
117+
- source:
118+
kind: Service
119+
version: v1
120+
name: firewall-controller-manager
121+
fieldPath: .metadata.namespace
122+
targets:
123+
- select:
124+
kind: Certificate
125+
group: cert-manager.io
126+
version: v1
127+
name: firewall-controller-manager-webhooks
128+
fieldPaths:
129+
- .spec.dnsNames.0
130+
- .spec.dnsNames.1
131+
options:
132+
delimiter: "."
133+
index: 1
134+
create: true

internal/controller/metalstackcluster_controller.go

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -125,8 +125,10 @@ func (r *MetalStackClusterReconciler) Reconcile(ctx context.Context, req ctrl.Re
125125
}
126126

127127
if annotations.IsPaused(cluster, infraCluster) {
128+
// TODO: pause firewalldeployment
128129
conditions.MarkTrue(infraCluster, v1alpha1.ClusterPaused)
129130
} else {
131+
// TODO: unpause firewalldeployment if needed
130132
conditions.MarkFalse(infraCluster, v1alpha1.ClusterPaused, clusterv1.PausedV1Beta2Reason, clusterv1.ConditionSeverityInfo, "")
131133
}
132134

@@ -482,10 +484,15 @@ func (r *clusterReconciler) ensureSshKeyPair(ctx context.Context) (string, error
482484
return "", err
483485
}
484486

487+
secret.Type = clusterv1.ClusterSecretType
485488
secret.Data = map[string][]byte{
486489
"id_rsa": pem.EncodeToMemory(privateKeyBlock),
487490
"id_rsa.pub": ssh.MarshalAuthorizedKey(pubKey),
488491
}
492+
secret.Labels = map[string]string{
493+
clusterv1.ClusterNameLabel: r.cluster.Name,
494+
}
495+
secret.OwnerReferences = append(secret.OwnerReferences, *metav1.NewControllerRef(r.infraCluster, r.infraCluster.GroupVersionKind()))
489496

490497
err = r.client.Create(ctx, secret)
491498
if err != nil {
@@ -553,6 +560,8 @@ func (r *clusterReconciler) ensureFirewallDeployment(nodeNetworkID, sshPubKey st
553560
deploy.Labels = map[string]string{}
554561
}
555562

563+
deploy.Labels[clusterv1.ClusterNameLabel] = r.cluster.Name
564+
556565
deploy.Spec.Replicas = 1
557566
deploy.Spec.Selector = map[string]string{
558567
tag.ClusterID: string(r.infraCluster.GetUID()),
@@ -647,6 +656,7 @@ func (r *clusterReconciler) ensureFirewallDeployment(nodeNetworkID, sshPubKey st
647656
deploy.Spec.Template.Labels = map[string]string{}
648657
}
649658
deploy.Spec.Template.Labels[tag.ClusterID] = string(r.infraCluster.GetUID())
659+
deploy.Spec.Template.Labels[clusterv1.ClusterNameLabel] = r.cluster.Name
650660

651661
deploy.Spec.Template.Spec.Size = r.infraCluster.Spec.Firewall.Size
652662
deploy.Spec.Template.Spec.Image = r.infraCluster.Spec.Firewall.Image

0 commit comments

Comments
 (0)