Skip to content

Commit

Permalink
[NET-9153] Handle Terminating Gateway ACL Setup (#3975)
Browse files Browse the repository at this point in the history
* first pass at creating write policy for service and updating term gw acl
role

* handle deregistering, update tests for registering with acls

* existing deregister tests passing

* failures with term gw role not existing

* clean up

* reorg code

* Move to own package

* watch for terminating gateways

* move files back, handle multiple terminating gateways

* handle errors and ensure finalizer is set

* Add tests for finalizers

* remove unused file

* fix import naming

* linting

* fix comment, extract constant
  • Loading branch information
jm96441n authored May 13, 2024
1 parent 69ba66c commit 6db22a7
Show file tree
Hide file tree
Showing 4 changed files with 1,031 additions and 80 deletions.
8 changes: 8 additions & 0 deletions control-plane/api/v1alpha1/registration_types.go
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ import (

corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
)

func init() {
Expand Down Expand Up @@ -289,6 +290,13 @@ func (r *Registration) ToCatalogDeregistration() *capi.CatalogDeregistration {
}
}

func (r *Registration) NamespacedName() types.NamespacedName {
return types.NamespacedName{
Namespace: r.Namespace,
Name: r.Name,
}
}

// SetSyncedCondition sets the synced condition on the Registration.
func (r *Registration) SetSyncedCondition(status corev1.ConditionStatus, reason string, message string) {
r.Status.Conditions = Conditions{
Expand Down
Loading

0 comments on commit 6db22a7

Please sign in to comment.