@@ -43,6 +43,7 @@ import (
43
43
"github.com/aws/amazon-network-policy-controller-k8s/pkg/policyendpoints"
44
44
"github.com/aws/amazon-network-policy-controller-k8s/pkg/utils/configmap"
45
45
"github.com/aws/amazon-network-policy-controller-k8s/pkg/version"
46
+ adminnetworking "sigs.k8s.io/network-policy-api/apis/v1alpha1"
46
47
//+kubebuilder:scaffold:imports
47
48
)
48
49
@@ -55,6 +56,8 @@ func init() {
55
56
utilruntime .Must (clientgoscheme .AddToScheme (scheme ))
56
57
57
58
utilruntime .Must (policyinfo .AddToScheme (scheme ))
59
+
60
+ utilruntime .Must (adminnetworking .AddToScheme (scheme ))
58
61
//+kubebuilder:scaffold:scheme
59
62
}
60
63
@@ -121,12 +124,19 @@ func main() {
121
124
finalizerManager := k8s .NewDefaultFinalizerManager (mgr .GetClient (), ctrl .Log .WithName ("finalizer-manager" ))
122
125
policyController := controllers .NewPolicyReconciler (mgr .GetClient (), policyEndpointsManager ,
123
126
controllerCFG , finalizerManager , ctrl .Log .WithName ("controllers" ).WithName ("policy" ))
127
+ adminPolicyController := controllers .NewAdminPolicyReconciler (mgr .GetClient (), policyEndpointsManager ,
128
+ controllerCFG , finalizerManager , ctrl .Log .WithName ("controllers" ).WithName ("admin-policy" ))
124
129
if enableNetworkPolicyController {
125
130
setupLog .Info ("Network Policy controller is enabled, starting watches" )
126
131
if err := policyController .SetupWithManager (ctx , mgr ); err != nil {
127
132
setupLog .Error (err , "Unable to setup network policy controller" )
128
133
os .Exit (1 )
129
134
}
135
+ setupLog .Info ("Admin Network Policy controller is enabled, starting watches" )
136
+ if err := adminPolicyController .SetupWithManager (ctx , mgr ); err != nil {
137
+ setupLog .Error (err , "Unable to setup admin network policy controller" )
138
+ os .Exit (1 )
139
+ }
130
140
}
131
141
132
142
//+kubebuilder:scaffold:builder
0 commit comments