-
Notifications
You must be signed in to change notification settings - Fork 123
/
zz_controller.go
executable file
·78 lines (69 loc) · 3.7 KB
/
zz_controller.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
// SPDX-FileCopyrightText: 2024 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
// Code generated by upjet. DO NOT EDIT.
package bucketpolicy
import (
"time"
"github.com/crossplane/crossplane-runtime/pkg/connection"
"github.com/crossplane/crossplane-runtime/pkg/event"
"github.com/crossplane/crossplane-runtime/pkg/ratelimiter"
"github.com/crossplane/crossplane-runtime/pkg/reconciler/managed"
xpresource "github.com/crossplane/crossplane-runtime/pkg/resource"
tjcontroller "github.com/crossplane/upjet/pkg/controller"
"github.com/crossplane/upjet/pkg/controller/handler"
"github.com/crossplane/upjet/pkg/metrics"
"github.com/pkg/errors"
ctrl "sigs.k8s.io/controller-runtime"
v1beta1 "github.com/upbound/provider-aws/apis/s3/v1beta1"
features "github.com/upbound/provider-aws/internal/features"
)
// Setup adds a controller that reconciles BucketPolicy managed resources.
func Setup(mgr ctrl.Manager, o tjcontroller.Options) error {
name := managed.ControllerName(v1beta1.BucketPolicy_GroupVersionKind.String())
var initializers managed.InitializerChain
cps := []managed.ConnectionPublisher{managed.NewAPISecretPublisher(mgr.GetClient(), mgr.GetScheme())}
if o.SecretStoreConfigGVK != nil {
cps = append(cps, connection.NewDetailsManager(mgr.GetClient(), *o.SecretStoreConfigGVK, connection.WithTLSConfig(o.ESSOptions.TLSConfig)))
}
eventHandler := handler.NewEventHandler(handler.WithLogger(o.Logger.WithValues("gvk", v1beta1.BucketPolicy_GroupVersionKind)))
ac := tjcontroller.NewAPICallbacks(mgr, xpresource.ManagedKind(v1beta1.BucketPolicy_GroupVersionKind), tjcontroller.WithEventHandler(eventHandler), tjcontroller.WithStatusUpdates(false))
opts := []managed.ReconcilerOption{
managed.WithExternalConnecter(
tjcontroller.NewTerraformPluginSDKAsyncConnector(mgr.GetClient(), o.OperationTrackerStore, o.SetupFn, o.Provider.Resources["aws_s3_bucket_policy"],
tjcontroller.WithTerraformPluginSDKAsyncLogger(o.Logger),
tjcontroller.WithTerraformPluginSDKAsyncConnectorEventHandler(eventHandler),
tjcontroller.WithTerraformPluginSDKAsyncCallbackProvider(ac),
tjcontroller.WithTerraformPluginSDKAsyncMetricRecorder(metrics.NewMetricRecorder(v1beta1.BucketPolicy_GroupVersionKind, mgr, o.PollInterval)),
tjcontroller.WithTerraformPluginSDKAsyncManagementPolicies(o.Features.Enabled(features.EnableBetaManagementPolicies)))),
managed.WithLogger(o.Logger.WithValues("controller", name)),
managed.WithRecorder(event.NewAPIRecorder(mgr.GetEventRecorderFor(name))),
managed.WithFinalizer(tjcontroller.NewOperationTrackerFinalizer(o.OperationTrackerStore, xpresource.NewAPIFinalizer(mgr.GetClient(), managed.FinalizerName))),
managed.WithTimeout(3 * time.Minute),
managed.WithInitializers(initializers),
managed.WithConnectionPublishers(cps...),
managed.WithPollInterval(o.PollInterval),
}
if o.PollJitter != 0 {
opts = append(opts, managed.WithPollJitterHook(o.PollJitter))
}
if o.Features.Enabled(features.EnableBetaManagementPolicies) {
opts = append(opts, managed.WithManagementPolicies())
}
// register webhooks for the kind v1beta1.BucketPolicy
// if they're enabled.
if o.StartWebhooks {
if err := ctrl.NewWebhookManagedBy(mgr).
For(&v1beta1.BucketPolicy{}).
Complete(); err != nil {
return errors.Wrap(err, "cannot register webhook for the kind v1beta1.BucketPolicy")
}
}
r := managed.NewReconciler(mgr, xpresource.ManagedKind(v1beta1.BucketPolicy_GroupVersionKind), opts...)
return ctrl.NewControllerManagedBy(mgr).
Named(name).
WithOptions(o.ForControllerRuntime()).
WithEventFilter(xpresource.DesiredStateChanged()).
Watches(&v1beta1.BucketPolicy{}, eventHandler).
Complete(ratelimiter.NewReconciler(name, r, o.GlobalRateLimiter))
}