kuryr-kubernetes/kuryr_kubernetes/controller/handlers
Maysa Macedo bf848c5b22 Fix CRD update when NP has namespaceSelectors
To enforce the network policy isolation, the network policy
security group driver must be used. Thus the code needs to be
there instead of in the namespace security group driver (which
is used for namespace isolation)

Currently, when using the correct Network Policy drivers and
handlers the CRD is not updated on events applied over namespaces
that matches a NP.
This commit fixes the issue by moving the support of this
functionality from 'NamespacePodSecurityGroupsDriver' to
NetworkPolicySecurityGroupsDriver.

Closes-bug: 1811995
Partially Implements: blueprint k8s-network-policies
Change-Id: Idaf70ea8cb7677296d6bea59b4d551bbb87e0422
2019-01-23 16:07:17 +00:00
..
__init__.py Controller event handling pipeline 2016-11-03 13:08:29 +00:00
ingress_lbaas.py OCP-Router: OCP-Route and Ingress LBaaS handlers 2018-06-15 14:47:48 +00:00
lbaas.py Add Network Policy support to services 2019-01-08 06:35:55 -05:00
namespace.py Fix CRD update when NP has namespaceSelectors 2019-01-23 16:07:17 +00:00
pipeline.py Revert commits to use UID instead of SelfLink 2018-02-19 17:00:46 +09:00
pod_label.py Update CRD when NP has podSelectors 2019-01-02 22:14:44 +00:00
policy.py Ensure controller healthchecks passes without CRDs 2018-12-21 12:55:55 +00:00
vif.py Update CRD when NP has podSelectors 2019-01-02 22:14:44 +00:00