Skip to content

Commit b5df4ba

Browse files
committed
rename flag to resource-tracking-configuration
1 parent 55e9ec4 commit b5df4ba

File tree

6 files changed

+25
-23
lines changed

6 files changed

+25
-23
lines changed

controllers/ingress/group_controller.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ func NewGroupReconciler(cloud aws.Cloud, k8sClient client.Client, eventRecorder
5252
authConfigBuilder := ingress.NewDefaultAuthConfigBuilder(annotationParser)
5353
enhancedBackendBuilder := ingress.NewDefaultEnhancedBackendBuilder(k8sClient, annotationParser, authConfigBuilder, controllerConfig.IngressConfig.TolerateNonExistentBackendService, controllerConfig.IngressConfig.TolerateNonExistentBackendAction)
5454
referenceIndexer := ingress.NewDefaultReferenceIndexer(enhancedBackendBuilder, authConfigBuilder, logger)
55-
trackingProvider := tracking.NewDefaultProvider(controllerConfig.ResourcePrefix[config.ClusterTagPrefixKey], controllerConfig.ResourcePrefix[config.IngressTagPrefixKey], controllerConfig.ClusterName)
55+
trackingProvider := tracking.NewDefaultProvider(controllerConfig.ResourceTrackingConfiguration[config.ClusterTagPrefixKey], controllerConfig.ResourceTrackingConfiguration[config.IngressTagPrefixKey], controllerConfig.ClusterName)
5656
modelBuilder := ingress.NewDefaultModelBuilder(k8sClient, eventRecorder,
5757
cloud.EC2(), cloud.ELBV2(), cloud.ACM(),
5858
annotationParser, subnetsResolver,
@@ -62,7 +62,7 @@ func NewGroupReconciler(cloud aws.Cloud, k8sClient client.Client, eventRecorder
6262
controllerConfig.EnableBackendSecurityGroup, controllerConfig.DisableRestrictedSGRules, controllerConfig.IngressConfig.AllowedCertificateAuthorityARNs, controllerConfig.FeatureGates.Enabled(config.EnableIPTargetType), logger)
6363
stackMarshaller := deploy.NewDefaultStackMarshaller()
6464
stackDeployer := deploy.NewDefaultStackDeployer(cloud, k8sClient, networkingSGManager, networkingSGReconciler, elbv2TaggingManager,
65-
controllerConfig, controllerConfig.ResourcePrefix[config.ClusterTagPrefixKey], controllerConfig.ResourcePrefix[config.IngressTagPrefixKey], logger)
65+
controllerConfig, controllerConfig.ResourceTrackingConfiguration[config.ClusterTagPrefixKey], controllerConfig.ResourceTrackingConfiguration[config.IngressTagPrefixKey], logger)
6666
classLoader := ingress.NewDefaultClassLoader(k8sClient, true)
6767
classAnnotationMatcher := ingress.NewDefaultClassAnnotationMatcher(controllerConfig.IngressConfig.IngressClass)
6868
manageIngressesWithoutIngressClass := controllerConfig.IngressConfig.IngressClass == ""

controllers/service/service_controller.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,14 @@ func NewServiceReconciler(cloud aws.Cloud, k8sClient client.Client, eventRecorde
4040
backendSGProvider networking.BackendSGProvider, sgResolver networking.SecurityGroupResolver, logger logr.Logger) *serviceReconciler {
4141

4242
annotationParser := annotations.NewSuffixAnnotationParser(serviceAnnotationPrefix)
43-
trackingProvider := tracking.NewDefaultProvider(controllerConfig.ResourcePrefix[config.ClusterTagPrefixKey], controllerConfig.ResourcePrefix[config.ServiceTagPrefixKey], controllerConfig.ClusterName)
43+
trackingProvider := tracking.NewDefaultProvider(controllerConfig.ResourceTrackingConfiguration[config.ClusterTagPrefixKey], controllerConfig.ResourceTrackingConfiguration[config.ServiceTagPrefixKey], controllerConfig.ClusterName)
4444
serviceUtils := service.NewServiceUtils(annotationParser, serviceFinalizer, controllerConfig.ServiceConfig.LoadBalancerClass, controllerConfig.FeatureGates)
4545
modelBuilder := service.NewDefaultModelBuilder(annotationParser, subnetsResolver, vpcInfoProvider, cloud.VpcID(), trackingProvider,
4646
elbv2TaggingManager, cloud.EC2(), controllerConfig.FeatureGates, controllerConfig.ClusterName, controllerConfig.DefaultTags, controllerConfig.ExternalManagedTags,
4747
controllerConfig.DefaultSSLPolicy, controllerConfig.DefaultTargetType, controllerConfig.FeatureGates.Enabled(config.EnableIPTargetType), serviceUtils,
4848
backendSGProvider, sgResolver, controllerConfig.EnableBackendSecurityGroup, controllerConfig.DisableRestrictedSGRules, logger)
4949
stackMarshaller := deploy.NewDefaultStackMarshaller()
50-
stackDeployer := deploy.NewDefaultStackDeployer(cloud, k8sClient, networkingSGManager, networkingSGReconciler, elbv2TaggingManager, controllerConfig, controllerConfig.ResourcePrefix[config.ClusterTagPrefixKey], controllerConfig.ResourcePrefix[config.ServiceTagPrefixKey], logger)
50+
stackDeployer := deploy.NewDefaultStackDeployer(cloud, k8sClient, networkingSGManager, networkingSGReconciler, elbv2TaggingManager, controllerConfig, controllerConfig.ResourceTrackingConfiguration[config.ClusterTagPrefixKey], controllerConfig.ResourceTrackingConfiguration[config.ServiceTagPrefixKey], logger)
5151
return &serviceReconciler{
5252
k8sClient: k8sClient,
5353
eventRecorder: eventRecorder,

main.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -115,9 +115,9 @@ func main() {
115115
tgbResManager := targetgroupbinding.NewDefaultResourceManager(mgr.GetClient(), cloud.ELBV2(), cloud.EC2(),
116116
podInfoRepo, sgManager, sgReconciler, vpcInfoProvider, multiClusterManager,
117117
cloud.VpcID(), controllerCFG.ClusterName, controllerCFG.FeatureGates.Enabled(config.EndpointsFailOpen), controllerCFG.EnableEndpointSlices, controllerCFG.DisableRestrictedSGRules,
118-
controllerCFG.ServiceTargetENISGTags, controllerCFG.ResourcePrefix[config.ClusterSgRuleLabelPrefixKey], mgr.GetEventRecorderFor("targetGroupBinding"), ctrl.Log)
118+
controllerCFG.ServiceTargetENISGTags, controllerCFG.ResourceTrackingConfiguration[config.ClusterSgRuleLabelPrefixKey], mgr.GetEventRecorderFor("targetGroupBinding"), ctrl.Log)
119119
backendSGProvider := networking.NewBackendSGProvider(controllerCFG.ClusterName, controllerCFG.BackendSecurityGroup,
120-
cloud.VpcID(), cloud.EC2(), mgr.GetClient(), controllerCFG.ResourcePrefix[config.ClusterTagPrefixKey], controllerCFG.ResourcePrefix[config.BackendSGNamePrefixKey], controllerCFG.DefaultTags, ctrl.Log.WithName("backend-sg-provider"))
120+
cloud.VpcID(), cloud.EC2(), mgr.GetClient(), controllerCFG.ResourceTrackingConfiguration[config.ClusterTagPrefixKey], controllerCFG.ResourceTrackingConfiguration[config.BackendSGNamePrefixKey], controllerCFG.DefaultTags, ctrl.Log.WithName("backend-sg-provider"))
121121
sgResolver := networking.NewDefaultSecurityGroupResolver(cloud.EC2(), cloud.VpcID())
122122
elbv2TaggingManager := elbv2deploy.NewDefaultTaggingManager(cloud.ELBV2(), cloud.VpcID(), controllerCFG.FeatureGates, cloud.RGT(), ctrl.Log)
123123
ingGroupReconciler := ingress.NewGroupReconciler(cloud, mgr.GetClient(), mgr.GetEventRecorderFor("ingress"),

pkg/config/controller_config.go

+12-12
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ const (
1717
flagLogLevel = "log-level"
1818
flagK8sClusterName = "cluster-name"
1919
flagDefaultTags = "default-tags"
20-
flagResourcePrefix = "resource-prefix"
20+
flagResourceTrackingConfiguration = "resource-tracking-configuration"
2121
flagDefaultTargetType = "default-target-type"
2222
flagExternalManagedTags = "external-managed-tags"
2323
flagServiceTargetENISGTags = "service-target-eni-security-group-tags"
@@ -89,8 +89,8 @@ type ControllerConfig struct {
8989
// Default AWS Tags that will be applied to all AWS resources managed by this controller.
9090
DefaultTags map[string]string
9191

92-
// ResourcePrefix provides prefix for resource tags, backend SG name and worker node SG rules label.
93-
ResourcePrefix map[string]string
92+
// ResourceTrackingConfiguration provides tracking prefix for resource tags, backend SG name and worker node SG rules label.
93+
ResourceTrackingConfiguration map[string]string
9494

9595
// Default target type for Ingress and Service objects
9696
DefaultTargetType string
@@ -157,7 +157,7 @@ func (cfg *ControllerConfig) BindFlags(fs *pflag.FlagSet) {
157157
"Disable the usage of restricted security group rules")
158158
fs.StringToStringVar(&cfg.ServiceTargetENISGTags, flagServiceTargetENISGTags, nil,
159159
"AWS Tags, in addition to cluster tags, for finding the target ENI security group to which to add inbound rules from NLBs")
160-
fs.StringToStringVar(&cfg.ResourcePrefix, flagResourcePrefix, defaultResourcePrefix,
160+
fs.StringToStringVar(&cfg.ResourceTrackingConfiguration, flagResourceTrackingConfiguration, defaultResourcePrefix,
161161
"the prefixes for resource tags, backend SG name and worker node SG rules label.")
162162

163163
cfg.FeatureGates.BindFlags(fs)
@@ -180,12 +180,12 @@ func (cfg *ControllerConfig) Validate() error {
180180
}
181181

182182
trackingTagKeys := sets.New[string](
183-
cfg.ResourcePrefix[ClusterTagPrefixKey]+"/cluster",
184-
cfg.ResourcePrefix[ClusterTagPrefixKey]+"/resource",
185-
cfg.ResourcePrefix[IngressTagPrefixKey]+"/stack",
186-
cfg.ResourcePrefix[IngressTagPrefixKey]+"/resource",
187-
cfg.ResourcePrefix[ServiceTagPrefixKey]+"/stack",
188-
cfg.ResourcePrefix[ServiceTagPrefixKey]+"/resource",
183+
cfg.ResourceTrackingConfiguration[ClusterTagPrefixKey]+"/cluster",
184+
cfg.ResourceTrackingConfiguration[ClusterTagPrefixKey]+"/resource",
185+
cfg.ResourceTrackingConfiguration[IngressTagPrefixKey]+"/stack",
186+
cfg.ResourceTrackingConfiguration[IngressTagPrefixKey]+"/resource",
187+
cfg.ResourceTrackingConfiguration[ServiceTagPrefixKey]+"/stack",
188+
cfg.ResourceTrackingConfiguration[ServiceTagPrefixKey]+"/resource",
189189
)
190190

191191
if err := cfg.validateDefaultTagsCollisionWithTrackingTags(trackingTagKeys); err != nil {
@@ -254,8 +254,8 @@ func (cfg *ControllerConfig) validateBackendSecurityGroupConfiguration() error {
254254
}
255255

256256
func (cfg *ControllerConfig) validateResourcePrefixKeys() error {
257-
keys := make([]string, 0, len(cfg.ResourcePrefix))
258-
for key := range cfg.ResourcePrefix {
257+
keys := make([]string, 0, len(cfg.ResourceTrackingConfiguration))
258+
for key := range cfg.ResourceTrackingConfiguration {
259259
if !validPrefixKeys.Has(key) {
260260
return fmt.Errorf("invalid key: %s. Valid keys are: %v", key, validPrefixKeys.List())
261261
}

pkg/config/controller_config_test.go

+5-5
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ func TestControllerConfig_validateExternalManagedTagsCollisionWithDefaultTags(t
184184

185185
func TestControllerConfig_validateResourcePrefixKeys(t *testing.T) {
186186
type fields struct {
187-
ResourcePrefix map[string]string
187+
ResourceTrackingConfiguration map[string]string
188188
}
189189
tests := []struct {
190190
name string
@@ -194,7 +194,7 @@ func TestControllerConfig_validateResourcePrefixKeys(t *testing.T) {
194194
{
195195
name: "resource prefix has all keys",
196196
fields: fields{
197-
ResourcePrefix: map[string]string{
197+
ResourceTrackingConfiguration: map[string]string{
198198
"clusterTagPrefix": "elbv2.k8s.aws",
199199
"ingressTagPrefix": "ingress.k8s.aws",
200200
"serviceTagPrefix": "service.k8s.aws",
@@ -207,7 +207,7 @@ func TestControllerConfig_validateResourcePrefixKeys(t *testing.T) {
207207
{
208208
name: "resource prefix has some invalid keys",
209209
fields: fields{
210-
ResourcePrefix: map[string]string{
210+
ResourceTrackingConfiguration: map[string]string{
211211
"clusterTagPrefix": "elbv2.k8s.aws",
212212
"ingressTagPrefix": "ingress.k8s.aws",
213213
"serviceTagPrefix": "service.k8s.aws",
@@ -220,7 +220,7 @@ func TestControllerConfig_validateResourcePrefixKeys(t *testing.T) {
220220
{
221221
name: "resource prefix is missing some valid keys",
222222
fields: fields{
223-
ResourcePrefix: map[string]string{
223+
ResourceTrackingConfiguration: map[string]string{
224224
"clusterTagPrefix": "elbv2.k8s.aws",
225225
"ingressTagPrefix": "ingress.k8s.aws",
226226
"serviceTagPrefix": "service.k8s.aws",
@@ -233,7 +233,7 @@ func TestControllerConfig_validateResourcePrefixKeys(t *testing.T) {
233233
for _, tt := range tests {
234234
t.Run(tt.name, func(t *testing.T) {
235235
cfg := &ControllerConfig{
236-
ResourcePrefix: tt.fields.ResourcePrefix,
236+
ResourceTrackingConfiguration: tt.fields.ResourceTrackingConfiguration,
237237
}
238238
err := cfg.validateResourcePrefixKeys()
239239
if tt.wantErr != nil {

pkg/networking/backend_sg_provider.go

+2
Original file line numberDiff line numberDiff line change
@@ -324,13 +324,15 @@ func (p *defaultBackendSGProvider) releaseSG(ctx context.Context) error {
324324
p.logger.V(1).Info("releaseSG ignore delete", "required", required, "err", err)
325325
return err
326326
}
327+
p.logger.V(0).Info("releaseSG deleting sg %v", p.autoGeneratedSG)
327328
req := &ec2sdk.DeleteSecurityGroupInput{
328329
GroupId: awssdk.String(p.autoGeneratedSG),
329330
}
330331
if err := runtime.RetryImmediateOnError(p.defaultDeletionPollInterval, p.defaultDeletionTimeout, isSecurityGroupDependencyViolationError, func() error {
331332
_, err := p.ec2Client.DeleteSecurityGroupWithContext(ctx, req)
332333
return err
333334
}); err != nil {
335+
p.logger.V(0).Info("releaseSG failed to delete securityGroup", "sgID", p.autoGeneratedSG)
334336
return errors.Wrap(err, "failed to delete securityGroup")
335337
}
336338
p.logger.Info("deleted securityGroup", "ID", p.autoGeneratedSG)

0 commit comments

Comments
 (0)