Skip to content

Commit 8b997dc

Browse files
Address reviews (#887)
Signed-off-by: Varsha Prasad Narsing <[email protected]>
1 parent 60f4c80 commit 8b997dc

File tree

6 files changed

+7
-29
lines changed

6 files changed

+7
-29
lines changed

api/v1alpha1/clusterextension_types.go

-2
Original file line numberDiff line numberDiff line change
@@ -127,8 +127,6 @@ func init() {
127127
ReasonUpgradeFailed,
128128
ReasonBundleLoadFailed,
129129
ReasonErrorGettingClient,
130-
// TODO: this reason is not being used in the reconciler, it will be removed
131-
// when we fix the tests. Avoiding removal here, to reduce diffs.
132130
ReasonInstallationStatusUnknown,
133131
)
134132
}

cmd/manager/main.go

-1
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,6 @@ func main() {
184184
Client: cl,
185185
ReleaseNamespace: systemNamespace,
186186
BundleProvider: catalogClient,
187-
Scheme: mgr.GetScheme(),
188187
ActionClientGetter: acg,
189188
Unpacker: unpacker,
190189
Storage: localStorage,

internal/catalogmetadata/types.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ func (b *Bundle) loadRequiredPackages() error {
8686
if b.requiredPackages == nil {
8787
requiredPackages, err := loadFromProps[PackageRequired](b, property.TypePackageRequired, false)
8888
if err != nil {
89-
return fmt.Errorf("error determining bundle required packages for bundle %q: %s", b.Bundle.Name, err)
89+
return fmt.Errorf("error determining bundle required packages for bundle %q: %s", b.Name, err)
9090
}
9191
for i := range requiredPackages {
9292
semverRange, err := bsemver.ParseRange(requiredPackages[i].PackageRequired.VersionRange)

internal/controllers/clusterextension_controller.go

+4-23
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,6 @@ type ClusterExtensionReconciler struct {
8989
ActionClientGetter helmclient.ActionClientGetter
9090
Storage storage.Storage
9191
Handler handler.Handler
92-
Scheme *runtime.Scheme
9392
dynamicWatchMutex sync.RWMutex
9493
dynamicWatchGVKs map[schema.GroupVersionKind]struct{}
9594
controller crcontroller.Controller
@@ -225,11 +224,9 @@ func (r *ClusterExtensionReconciler) handleResolutionErrors(ext *ocv1alpha1.Clus
225224
*/
226225
//nolint:unparam
227226
func (r *ClusterExtensionReconciler) reconcile(ctx context.Context, ext *ocv1alpha1.ClusterExtension) (ctrl.Result, error) {
228-
l := log.FromContext(ctx).WithName("operator-controller")
229227
// run resolution
230228
bundle, err := r.resolve(ctx, *ext)
231229
if err != nil {
232-
l.V(1).Info("bundle resolve error", "error", err)
233230
return r.handleResolutionErrors(ext, err)
234231
}
235232

@@ -243,8 +240,8 @@ func (r *ClusterExtensionReconciler) reconcile(ctx context.Context, ext *ocv1alp
243240
if err != nil {
244241
ext.Status.ResolvedBundle = nil
245242
ext.Status.InstalledBundle = nil
246-
setResolvedStatusConditionFailed(&ext.Status.Conditions, fmt.Sprintf("%s:%v", ocv1alpha1.ReasonResolutionFailed, err), ext.GetGeneration())
247-
setInstalledStatusConditionFailed(&ext.Status.Conditions, fmt.Sprintf("%s:%v", ocv1alpha1.ReasonInstallationFailed, err), ext.Generation)
243+
setResolvedStatusConditionFailed(&ext.Status.Conditions, err.Error(), ext.GetGeneration())
244+
setInstalledStatusConditionFailed(&ext.Status.Conditions, err.Error(), ext.Generation)
248245
return ctrl.Result{}, err
249246
}
250247

@@ -382,7 +379,7 @@ func (r *ClusterExtensionReconciler) reconcile(ctx context.Context, ext *ocv1alp
382379
if !isWatched {
383380
if err := r.controller.Watch(
384381
source.Kind(r.cache, unstructuredObj),
385-
crhandler.EnqueueRequestForOwner(r.Scheme, r.Client.RESTMapper(), ext, crhandler.OnlyControllerOwner()),
382+
crhandler.EnqueueRequestForOwner(r.Scheme(), r.RESTMapper(), ext, crhandler.OnlyControllerOwner()),
386383
helmpredicate.DependentPredicateFuncs()); err != nil {
387384
return err
388385
}
@@ -620,11 +617,6 @@ func mapOwneeToOwnerHandler(cl client.Client, log logr.Logger, owner client.Obje
620617
log.Error(err, "map ownee to owner: lookup GVK for owner")
621618
return nil
622619
}
623-
owneeGVK, err := apiutil.GVKForObject(obj, cl.Scheme())
624-
if err != nil {
625-
log.Error(err, "map ownee to owner: lookup GVK for ownee")
626-
return nil
627-
}
628620

629621
type ownerInfo struct {
630622
key types.NamespacedName
@@ -650,17 +642,6 @@ func mapOwneeToOwnerHandler(cl client.Client, log logr.Logger, owner client.Obje
650642
if oi == nil {
651643
return nil
652644
}
653-
654-
if err := cl.Get(ctx, oi.key, owner); client.IgnoreNotFound(err) != nil {
655-
log.Info("map ownee to owner: get owner",
656-
"ownee", client.ObjectKeyFromObject(obj),
657-
"owneeKind", owneeGVK,
658-
"owner", oi.key,
659-
"ownerKind", oi.gvk,
660-
"error", err.Error(),
661-
)
662-
return nil
663-
}
664645
return []reconcile.Request{{NamespacedName: oi.key}}
665646
})
666647
}
@@ -715,7 +696,7 @@ func (r *ClusterExtensionReconciler) installedBundle(ctx context.Context, allBun
715696
catalogfilter.InMastermindsSemverRange(vr),
716697
))
717698
if len(resultSet) == 0 {
718-
return nil, fmt.Errorf("bundle %q for package %q not found in available catalogs but is currently installed via helm chart %q in namespace %q", release.Labels[labels.BundleNameKey], ext.Spec.PackageName, release.Name, release.Namespace)
699+
return nil, fmt.Errorf("bundle %q for package %q not found in available catalogs but is currently installed in namespace %q", release.Labels[labels.BundleNameKey], ext.Spec.PackageName, release.Namespace)
719700
}
720701

721702
sort.SliceStable(resultSet, func(i, j int) bool {

internal/controllers/suite_test.go

-1
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,6 @@ func newClientAndReconciler(t *testing.T) (client.Client, *controllers.ClusterEx
5353
reconciler := &controllers.ClusterExtensionReconciler{
5454
Client: cl,
5555
BundleProvider: &fakeCatalogClient,
56-
Scheme: scheme.Scheme,
5756
ActionClientGetter: acg,
5857
Unpacker: unp,
5958
}

internal/labels/labels.go

+2-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,8 @@ const (
55
OwnerNameKey = "olm.operatorframework.io/owner-name"
66

77
// Helm Secret annotations use the regex `(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?`
8-
// to validate labels. Open to any suggestions, keeping this for now.
8+
// to validate labels. Which is why a similar format as OwnerKindKey/OwnerNameKey
9+
// cannot be used as they do not conform to the regex requirements.
910
PackageNameKey = "olm_operatorframework_io_package_name"
1011
BundleNameKey = "olm_operatorframework_io_bundle_name"
1112
BundleVersionKey = "olm_operatorframework_io_bundle_version"

0 commit comments

Comments
 (0)