Skip to content

Commit

Permalink
fix secrets/configmap updates do not trigger a controller reconcile (e…
Browse files Browse the repository at this point in the history
…nvoyproxy#3499)

* ensure both secrets and config map reconcile upon changes

ensure secret/config map changes trigger a reconcile

Signed-off-by: Alex Volchok <[email protected]>

* Update controller.go

Signed-off-by: Alex Volchok <[email protected]>

* Update controller.go

Signed-off-by: Alex Volchok <[email protected]>

---------

Signed-off-by: Alex Volchok <[email protected]>
  • Loading branch information
alexwo authored May 30, 2024
1 parent 6f30397 commit ff2c598
Showing 1 changed file with 0 additions and 2 deletions.
2 changes: 0 additions & 2 deletions internal/provider/kubernetes/controller.go
Original file line number Diff line number Diff line change
Expand Up @@ -1216,7 +1216,6 @@ func (r *gatewayAPIReconciler) watchResources(ctx context.Context, mgr manager.M

// Watch Secret CRUDs and process affected EG CRs (Gateway, SecurityPolicy, more in the future).
secretPredicates := []predicate.TypedPredicate[*corev1.Secret]{
predicate.TypedGenerationChangedPredicate[*corev1.Secret]{},
predicate.NewTypedPredicateFuncs(func(s *corev1.Secret) bool {
return r.validateSecretForReconcile(s)
}),
Expand All @@ -1237,7 +1236,6 @@ func (r *gatewayAPIReconciler) watchResources(ctx context.Context, mgr manager.M

// Watch ConfigMap CRUDs and process affected ClienTraffiPolicies and BackendTLSPolicies.
configMapPredicates := []predicate.TypedPredicate[*corev1.ConfigMap]{
predicate.TypedGenerationChangedPredicate[*corev1.ConfigMap]{},
predicate.NewTypedPredicateFuncs[*corev1.ConfigMap](func(cm *corev1.ConfigMap) bool {
return r.validateConfigMapForReconcile(cm)
}),
Expand Down

0 comments on commit ff2c598

Please sign in to comment.