Skip to content

Commit 96f2bfd

Browse files
Merge pull request #292 from umangachapagain/remove-mirrpeersecretcontroller
remove mirrorpeersecret reconciler and unused utility functions
2 parents 4a4b80d + e7c0a6c commit 96f2bfd

17 files changed

+287
-1410
lines changed

controllers/common_controller_utils.go

Lines changed: 0 additions & 414 deletions
This file was deleted.

controllers/drpolicy_controller_test.go

Lines changed: 1 addition & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -96,37 +96,6 @@ func getFakeDRPolicyReconciler(drpolicy *ramenv1alpha1.DRPolicy, mp *multicluste
9696
Name: cName2,
9797
},
9898
}
99-
100-
// Constitutes both blue secret and green secret present on the hub
101-
hubSecret1 := corev1.Secret{
102-
ObjectMeta: metav1.ObjectMeta{
103-
Name: utils.GetSecretNameByPeerRef(mp.Spec.Items[0]),
104-
Namespace: cName1,
105-
},
106-
Data: map[string][]byte{
107-
"namespace": []byte("openshift-storage"),
108-
"secret-data": []byte(`{"cluster":"b2NzLXN0b3JhZ2VjbHVzdGVyLWNlcGhjbHVzdGVy","token":"ZXlKbWMybGtJam9pWXpSak56SmpNRE10WXpCbFlpMDBZMlppTFRnME16RXRNekExTmpZME16UmxZV1ZqSWl3aVkyeHBaVzUwWDJsa0lqb2ljbUprTFcxcGNuSnZjaTF3WldWeUlpd2lhMlY1SWpvaVFWRkVkbGxyTldrM04xbG9TMEpCUVZZM2NFZHlVVXBrU1VvelJtZGpjVWxGVUZWS0wzYzlQU0lzSW0xdmJsOW9iM04wSWpvaU1UY3lMak13TGpFd01TNHlORGs2TmpjNE9Td3hOekl1TXpBdU1UZ3pMakU1TURvMk56ZzVMREUzTWk0ek1DNHlNak11TWpFd09qWTNPRGtpTENKdVlXMWxjM0JoWTJVaU9pSnZjR1Z1YzJocFpuUXRjM1J2Y21GblpTSjk="}`),
109-
"secret-origin": []byte("rook"),
110-
"storage-cluster-name": []byte("ocs-storagecluster"),
111-
utils.SecretStorageIDKey: []byte("{\"cephfs\":\"f9708852fe4cf1f4d5de7e525f1b0aba\",\"rbd\":\"dcd70114947d0bb1f6b96f0dd6a9aaca\"}"),
112-
},
113-
Type: "multicluster.odf.openshift.io/secret-type",
114-
}
115-
116-
hubSecret2 := corev1.Secret{
117-
ObjectMeta: metav1.ObjectMeta{
118-
Name: utils.GetSecretNameByPeerRef(mp.Spec.Items[1]),
119-
Namespace: cName2,
120-
},
121-
Data: map[string][]byte{
122-
"namespace": []byte("openshift-storage"),
123-
"secret-data": []byte(`{"cluster":"b2NzLXN0b3JhZ2VjbHVzdGVyLWNlcGhjbHVzdGVy","token":"ZXlKbWMybGtJam9pWXpSak56SmpNRE10WXpCbFlpMDBZMlppTFRnME16RXRNekExTmpZME16UmxZV1ZqSWl3aVkyeHBaVzUwWDJsa0lqb2ljbUprTFcxcGNuSnZjaTF3WldWeUlpd2lhMlY1SWpvaVFWRkVkbGxyTldrM04xbG9TMEpCUVZZM2NFZHlVVXBrU1VvelJtZGpjVWxGVUZWS0wzYzlQU0lzSW0xdmJsOW9iM04wSWpvaU1UY3lMak13TGpFd01TNHlORGs2TmpjNE9Td3hOekl1TXpBdU1UZ3pMakU1TURvMk56ZzVMREUzTWk0ek1DNHlNak11TWpFd09qWTNPRGtpTENKdVlXMWxjM0JoWTJVaU9pSnZjR1Z1YzJocFpuUXRjM1J2Y21GblpTSjk="}`),
124-
"secret-origin": []byte("rook"),
125-
"storage-cluster-name": []byte("ocs-storagecluster"),
126-
utils.SecretStorageIDKey: []byte("{\"cephfs\":\"f9708852fe4cf1f4d5de7e525f1b0aba\",\"rbd\":\"dcd70114947d0bb1f6b96f0dd6a9aaca\"}"),
127-
},
128-
Type: "multicluster.odf.openshift.io/secret-type",
129-
}
13099
odfClientInfoConfigMap := &corev1.ConfigMap{
131100
ObjectMeta: metav1.ObjectMeta{
132101
Name: "odf-client-info",
@@ -146,7 +115,7 @@ func getFakeDRPolicyReconciler(drpolicy *ramenv1alpha1.DRPolicy, mp *multicluste
146115
},
147116
}
148117

149-
fakeClient := fake.NewClientBuilder().WithScheme(scheme).WithObjects(drpolicy, mp, ns1, ns2, &hubSecret1, &hubSecret2, odfClientInfoConfigMap).Build()
118+
fakeClient := fake.NewClientBuilder().WithScheme(scheme).WithObjects(drpolicy, mp, ns1, ns2, odfClientInfoConfigMap).Build()
150119

151120
r := DRPolicyReconciler{
152121
HubClient: fakeClient,

controllers/manager.go

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -194,17 +194,6 @@ func (o *ManagerOptions) runManager(ctx context.Context) {
194194
}
195195
//+kubebuilder:scaffold:builder
196196

197-
if err = (&MirrorPeerSecretReconciler{
198-
Client: mgr.GetClient(),
199-
Scheme: mgr.GetScheme(),
200-
Logger: logger.With("controller", "MirrorPeerSecretReconciler"),
201-
testEnvFile: o.testEnvFile,
202-
CurrentNamespace: currentNamespace,
203-
}).SetupWithManager(mgr); err != nil {
204-
logger.Error("Failed to create MirrorPeer controller", "error", err)
205-
os.Exit(1)
206-
}
207-
208197
if err = (&ManagedClusterReconciler{
209198
Client: mgr.GetClient(),
210199
Logger: logger.With("controller", "ManagedClusterReconciler"),

controllers/mirrorpeer_controller.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -275,7 +275,7 @@ func (r *MirrorPeerReconciler) Reconcile(ctx context.Context, req ctrl.Request)
275275
logger.Error("Error in fetching s3 internal secret", "Cluster", peerRef.ClusterName, "error", err)
276276
return ctrl.Result{}, err
277277
}
278-
err = createOrUpdateSecretsFromInternalSecret(ctx, r.Client, r.CurrentNamespace, &s3Secret, []multiclusterv1alpha1.MirrorPeer{mirrorPeer}, logger)
278+
err = utils.CreateOrUpdateSecretsFromInternalSecret(ctx, r.Client, r.CurrentNamespace, &s3Secret, []multiclusterv1alpha1.MirrorPeer{mirrorPeer}, logger)
279279
if err != nil {
280280
logger.Error("Error in updating S3 profile", "Cluster", peerRef.ClusterName, "error", err)
281281
return ctrl.Result{}, err

controllers/mirrorpeersecret_controller.go

Lines changed: 0 additions & 158 deletions
This file was deleted.

controllers/named_peerref_with_data.go

Lines changed: 0 additions & 141 deletions
This file was deleted.

0 commit comments

Comments
 (0)