Compare commits
10 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 7c850018ca | |||
|
3623ede85d
|
|||
|
a7ce0a5b5d
|
|||
| 6b70891bb0 | |||
|
4452c7e136
|
|||
| 15cb442a9a | |||
| 415105faef | |||
| 1147e461f8 | |||
| 110773b067 | |||
| 7068fee1b7 |
@@ -2,6 +2,28 @@
|
|||||||
|
|
||||||
All notable changes to this project will be documented in this file.
|
All notable changes to this project will be documented in this file.
|
||||||
|
|
||||||
|
## [1.2.1] - 2025-10-01
|
||||||
|
|
||||||
|
### 🚜 Refactor
|
||||||
|
|
||||||
|
- Simplify namespace exclusion logic
|
||||||
|
|
||||||
|
### 📚 Documentation
|
||||||
|
|
||||||
|
- *(deploy)* Add delete permission for limitranges resource
|
||||||
|
|
||||||
|
## [1.2.0] - 2025-10-01
|
||||||
|
|
||||||
|
### 🚀 Features
|
||||||
|
|
||||||
|
- Improve LimitRange management in namespaces
|
||||||
|
|
||||||
|
## [1.1.14] - 2025-09-10
|
||||||
|
|
||||||
|
### 🐛 Bug Fixes
|
||||||
|
|
||||||
|
- *(deps)* Update kubernetes packages to v0.34.1
|
||||||
|
|
||||||
## [1.1.13] - 2025-08-28
|
## [1.1.13] - 2025-08-28
|
||||||
|
|
||||||
### 🐛 Bug Fixes
|
### 🐛 Bug Fixes
|
||||||
|
|||||||
+1
-1
@@ -1,4 +1,4 @@
|
|||||||
FROM amd64/golang:1.25.0@sha256:f6b9e1a566fe69bad9613bd0165f0a5032b2cfb14630833522988864ebeb8c9f as deps
|
FROM amd64/golang:1.25.1@sha256:53f7808857782118f3a062261f721507dfa36e5c545e5d39c2dcf9916e3f0b1b as deps
|
||||||
WORKDIR /build
|
WORKDIR /build
|
||||||
ADD go.* /build
|
ADD go.* /build
|
||||||
RUN go mod download
|
RUN go mod download
|
||||||
|
|||||||
@@ -17,6 +17,10 @@ rules:
|
|||||||
- apiGroups: [""]
|
- apiGroups: [""]
|
||||||
resources: ["limitranges"]
|
resources: ["limitranges"]
|
||||||
verbs: ["list","create"]
|
verbs: ["list","create"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["limitranges"]
|
||||||
|
verbs: ["delete"]
|
||||||
|
resourceNames: ["extreme-request-defaults"]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -2,12 +2,12 @@ module gitlab.com/unboundsoftware/default-request-adder
|
|||||||
|
|
||||||
go 1.24.0
|
go 1.24.0
|
||||||
|
|
||||||
toolchain go1.25.0
|
toolchain go1.25.1
|
||||||
|
|
||||||
require (
|
require (
|
||||||
k8s.io/api v0.34.0
|
k8s.io/api v0.34.1
|
||||||
k8s.io/apimachinery v0.34.0
|
k8s.io/apimachinery v0.34.1
|
||||||
k8s.io/client-go v0.34.0
|
k8s.io/client-go v0.34.1
|
||||||
)
|
)
|
||||||
|
|
||||||
require (
|
require (
|
||||||
|
|||||||
@@ -135,12 +135,12 @@ gopkg.in/inf.v0 v0.9.1/go.mod h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw=
|
|||||||
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||||
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
|
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
|
||||||
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||||
k8s.io/api v0.34.0 h1:L+JtP2wDbEYPUeNGbeSa/5GwFtIA662EmT2YSLOkAVE=
|
k8s.io/api v0.34.1 h1:jC+153630BMdlFukegoEL8E/yT7aLyQkIVuwhmwDgJM=
|
||||||
k8s.io/api v0.34.0/go.mod h1:YzgkIzOOlhl9uwWCZNqpw6RJy9L2FK4dlJeayUoydug=
|
k8s.io/api v0.34.1/go.mod h1:SB80FxFtXn5/gwzCoN6QCtPD7Vbu5w2n1S0J5gFfTYk=
|
||||||
k8s.io/apimachinery v0.34.0 h1:eR1WO5fo0HyoQZt1wdISpFDffnWOvFLOOeJ7MgIv4z0=
|
k8s.io/apimachinery v0.34.1 h1:dTlxFls/eikpJxmAC7MVE8oOeP1zryV7iRyIjB0gky4=
|
||||||
k8s.io/apimachinery v0.34.0/go.mod h1:/GwIlEcWuTX9zKIg2mbw0LRFIsXwrfoVxn+ef0X13lw=
|
k8s.io/apimachinery v0.34.1/go.mod h1:/GwIlEcWuTX9zKIg2mbw0LRFIsXwrfoVxn+ef0X13lw=
|
||||||
k8s.io/client-go v0.34.0 h1:YoWv5r7bsBfb0Hs2jh8SOvFbKzzxyNo0nSb0zC19KZo=
|
k8s.io/client-go v0.34.1 h1:ZUPJKgXsnKwVwmKKdPfw4tB58+7/Ik3CrjOEhsiZ7mY=
|
||||||
k8s.io/client-go v0.34.0/go.mod h1:ozgMnEKXkRjeMvBZdV1AijMHLTh3pbACPvK7zFR+QQY=
|
k8s.io/client-go v0.34.1/go.mod h1:kA8v0FP+tk6sZA0yKLRG67LWjqufAoSHA2xVGKw9Of8=
|
||||||
k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
|
k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
|
||||||
k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
|
k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
|
||||||
k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b h1:MloQ9/bdJyIu9lb1PzujOPolHyvO06MXG5TUIj2mNAA=
|
k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b h1:MloQ9/bdJyIu9lb1PzujOPolHyvO06MXG5TUIj2mNAA=
|
||||||
|
|||||||
@@ -4,6 +4,7 @@ import (
|
|||||||
"context"
|
"context"
|
||||||
"flag"
|
"flag"
|
||||||
"log"
|
"log"
|
||||||
|
"slices"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
@@ -61,18 +62,26 @@ func main() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for _, ns := range namespaces.Items {
|
for _, ns := range namespaces.Items {
|
||||||
|
log.Printf("Checking for LimitRange named extreme-request-defaults in namespace '%v'\n", ns.Name)
|
||||||
|
limitRanges, err := clientset.CoreV1().LimitRanges(ns.Name).List(ctx, metav1.ListOptions{FieldSelector: "metadata.name=extreme-request-defaults"})
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Unable to list LimitRanges in namespace '%v': Error: %v\n", ns.Name, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
if !nsExcluded(ns.Name, excludedNS) {
|
if !nsExcluded(ns.Name, excludedNS) {
|
||||||
log.Printf("Checking for LimitRange named extreme-request-defaults in namespace '%v'\n", ns.Name)
|
if len(limitRanges.Items) == 0 {
|
||||||
if limitRanges, err := clientset.CoreV1().LimitRanges(ns.Name).List(ctx, metav1.ListOptions{FieldSelector: "metadata.name=extreme-request-defaults"}); err != nil {
|
log.Printf("Trying to create LimitRange\n")
|
||||||
panic(err)
|
if _, err := clientset.CoreV1().LimitRanges(ns.Name).Create(ctx, &limitRange, metav1.CreateOptions{}); err != nil {
|
||||||
} else {
|
log.Printf("Unable to create LimitRange in namespace '%v': Error: %v\n", ns.Name, err)
|
||||||
if len(limitRanges.Items) == 0 {
|
} else {
|
||||||
log.Printf("Trying to create LimitRange\n")
|
log.Printf("LimitRange extreme-request-defaults created in namespace '%v'\n", ns.Name)
|
||||||
if _, err := clientset.CoreV1().LimitRanges(ns.Name).Create(ctx, &limitRange, metav1.CreateOptions{}); err != nil {
|
}
|
||||||
log.Printf("Unable to create LimitRange in namespace '%v': Error: %v\n", ns.Name, err)
|
}
|
||||||
} else {
|
} else {
|
||||||
log.Printf("LimitRange extreme-request-defaults created in namespace '%v'\n", ns.Name)
|
if len(limitRanges.Items) > 0 {
|
||||||
}
|
log.Printf("Trying to delete LimitRange\n")
|
||||||
|
if err := clientset.CoreV1().LimitRanges(ns.Name).Delete(ctx, "extreme-request-defaults", metav1.DeleteOptions{}); err != nil {
|
||||||
|
log.Printf("Unable to delete LimitRange in namespace '%v': Error: %v\n", ns.Name, err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -83,12 +92,7 @@ func main() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func nsExcluded(name string, excludedNS []string) bool {
|
func nsExcluded(name string, excludedNS []string) bool {
|
||||||
for _, ns := range excludedNS {
|
return slices.Contains(excludedNS, name) || slices.Contains(excludedNS, "*")
|
||||||
if name == ns {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func parseArgs() args {
|
func parseArgs() args {
|
||||||
|
|||||||
Reference in New Issue
Block a user