feat: kubesphere 4.0 (#6115)
* feat: kubesphere 4.0 Signed-off-by: ci-bot <ci-bot@kubesphere.io> * feat: kubesphere 4.0 Signed-off-by: ci-bot <ci-bot@kubesphere.io> --------- Signed-off-by: ci-bot <ci-bot@kubesphere.io> Co-authored-by: ks-ci-bot <ks-ci-bot@example.com> Co-authored-by: joyceliu <joyceliu@yunify.com>
This commit is contained in:
committed by
GitHub
parent
b5015ec7b9
commit
447a51f08b
47
vendor/sigs.k8s.io/controller-runtime/pkg/controller/controller.go
generated
vendored
47
vendor/sigs.k8s.io/controller-runtime/pkg/controller/controller.go
generated
vendored
@@ -39,6 +39,18 @@ type Options struct {
|
||||
// MaxConcurrentReconciles is the maximum number of concurrent Reconciles which can be run. Defaults to 1.
|
||||
MaxConcurrentReconciles int
|
||||
|
||||
// CacheSyncTimeout refers to the time limit set to wait for syncing caches.
|
||||
// Defaults to 2 minutes if not set.
|
||||
CacheSyncTimeout time.Duration
|
||||
|
||||
// RecoverPanic indicates whether the panic caused by reconcile should be recovered.
|
||||
// Defaults to the Controller.RecoverPanic setting from the Manager if unset.
|
||||
RecoverPanic *bool
|
||||
|
||||
// NeedLeaderElection indicates whether the controller needs to use leader election.
|
||||
// Defaults to true, which means the controller will use leader election.
|
||||
NeedLeaderElection *bool
|
||||
|
||||
// Reconciler reconciles an object
|
||||
Reconciler reconcile.Reconciler
|
||||
|
||||
@@ -50,14 +62,6 @@ type Options struct {
|
||||
// LogConstructor is used to construct a logger used for this controller and passed
|
||||
// to each reconciliation via the context field.
|
||||
LogConstructor func(request *reconcile.Request) logr.Logger
|
||||
|
||||
// CacheSyncTimeout refers to the time limit set to wait for syncing caches.
|
||||
// Defaults to 2 minutes if not set.
|
||||
CacheSyncTimeout time.Duration
|
||||
|
||||
// RecoverPanic indicates whether the panic caused by reconcile should be recovered.
|
||||
// Defaults to the Controller.RecoverPanic setting from the Manager if unset.
|
||||
RecoverPanic *bool
|
||||
}
|
||||
|
||||
// Controller implements a Kubernetes API. A Controller manages a work queue fed reconcile.Requests
|
||||
@@ -124,38 +128,47 @@ func NewUnmanaged(name string, mgr manager.Manager, options Options) (Controller
|
||||
}
|
||||
|
||||
if options.MaxConcurrentReconciles <= 0 {
|
||||
options.MaxConcurrentReconciles = 1
|
||||
if mgr.GetControllerOptions().MaxConcurrentReconciles > 0 {
|
||||
options.MaxConcurrentReconciles = mgr.GetControllerOptions().MaxConcurrentReconciles
|
||||
} else {
|
||||
options.MaxConcurrentReconciles = 1
|
||||
}
|
||||
}
|
||||
|
||||
if options.CacheSyncTimeout == 0 {
|
||||
options.CacheSyncTimeout = 2 * time.Minute
|
||||
if mgr.GetControllerOptions().CacheSyncTimeout != 0 {
|
||||
options.CacheSyncTimeout = mgr.GetControllerOptions().CacheSyncTimeout
|
||||
} else {
|
||||
options.CacheSyncTimeout = 2 * time.Minute
|
||||
}
|
||||
}
|
||||
|
||||
if options.RateLimiter == nil {
|
||||
options.RateLimiter = workqueue.DefaultControllerRateLimiter()
|
||||
}
|
||||
|
||||
// Inject dependencies into Reconciler
|
||||
if err := mgr.SetFields(options.Reconciler); err != nil {
|
||||
return nil, err
|
||||
if options.RecoverPanic == nil {
|
||||
options.RecoverPanic = mgr.GetControllerOptions().RecoverPanic
|
||||
}
|
||||
|
||||
if options.RecoverPanic == nil {
|
||||
options.RecoverPanic = mgr.GetControllerOptions().RecoverPanic //nolint:staticcheck
|
||||
if options.NeedLeaderElection == nil {
|
||||
options.NeedLeaderElection = mgr.GetControllerOptions().NeedLeaderElection
|
||||
}
|
||||
|
||||
// Create controller with dependencies set
|
||||
return &controller.Controller{
|
||||
Do: options.Reconciler,
|
||||
MakeQueue: func() workqueue.RateLimitingInterface {
|
||||
return workqueue.NewNamedRateLimitingQueue(options.RateLimiter, name)
|
||||
return workqueue.NewRateLimitingQueueWithConfig(options.RateLimiter, workqueue.RateLimitingQueueConfig{
|
||||
Name: name,
|
||||
})
|
||||
},
|
||||
MaxConcurrentReconciles: options.MaxConcurrentReconciles,
|
||||
CacheSyncTimeout: options.CacheSyncTimeout,
|
||||
SetFields: mgr.SetFields,
|
||||
Name: name,
|
||||
LogConstructor: options.LogConstructor,
|
||||
RecoverPanic: options.RecoverPanic,
|
||||
LeaderElected: options.NeedLeaderElection,
|
||||
}, nil
|
||||
}
|
||||
|
||||
|
||||
20
vendor/sigs.k8s.io/controller-runtime/pkg/controller/controllertest/doc.go
generated
vendored
Normal file
20
vendor/sigs.k8s.io/controller-runtime/pkg/controller/controllertest/doc.go
generated
vendored
Normal file
@@ -0,0 +1,20 @@
|
||||
/*
|
||||
Copyright 2017 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
// Package controllertest contains fake informers for testing controllers
|
||||
// When in doubt, it's almost always better to test against a real API server
|
||||
// using envtest.Environment.
|
||||
package controllertest
|
||||
68
vendor/sigs.k8s.io/controller-runtime/pkg/controller/controllertest/testing.go
generated
vendored
Normal file
68
vendor/sigs.k8s.io/controller-runtime/pkg/controller/controllertest/testing.go
generated
vendored
Normal file
@@ -0,0 +1,68 @@
|
||||
/*
|
||||
Copyright 2018 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllertest
|
||||
|
||||
import (
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"k8s.io/apimachinery/pkg/runtime"
|
||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||
"k8s.io/client-go/util/workqueue"
|
||||
)
|
||||
|
||||
var _ runtime.Object = &ErrorType{}
|
||||
|
||||
// ErrorType implements runtime.Object but isn't registered in any scheme and should cause errors in tests as a result.
|
||||
type ErrorType struct{}
|
||||
|
||||
// GetObjectKind implements runtime.Object.
|
||||
func (ErrorType) GetObjectKind() schema.ObjectKind { return nil }
|
||||
|
||||
// DeepCopyObject implements runtime.Object.
|
||||
func (ErrorType) DeepCopyObject() runtime.Object { return nil }
|
||||
|
||||
var _ workqueue.RateLimitingInterface = &Queue{}
|
||||
|
||||
// Queue implements a RateLimiting queue as a non-ratelimited queue for testing.
|
||||
// This helps testing by having functions that use a RateLimiting queue synchronously add items to the queue.
|
||||
type Queue struct {
|
||||
workqueue.Interface
|
||||
AddedRateLimitedLock sync.Mutex
|
||||
AddedRatelimited []any
|
||||
}
|
||||
|
||||
// AddAfter implements RateLimitingInterface.
|
||||
func (q *Queue) AddAfter(item interface{}, duration time.Duration) {
|
||||
q.Add(item)
|
||||
}
|
||||
|
||||
// AddRateLimited implements RateLimitingInterface. TODO(community): Implement this.
|
||||
func (q *Queue) AddRateLimited(item interface{}) {
|
||||
q.AddedRateLimitedLock.Lock()
|
||||
q.AddedRatelimited = append(q.AddedRatelimited, item)
|
||||
q.AddedRateLimitedLock.Unlock()
|
||||
q.Add(item)
|
||||
}
|
||||
|
||||
// Forget implements RateLimitingInterface. TODO(community): Implement this.
|
||||
func (q *Queue) Forget(item interface{}) {}
|
||||
|
||||
// NumRequeues implements RateLimitingInterface. TODO(community): Implement this.
|
||||
func (q *Queue) NumRequeues(item interface{}) int {
|
||||
return 0
|
||||
}
|
||||
76
vendor/sigs.k8s.io/controller-runtime/pkg/controller/controllertest/unconventionallisttypecrd.go
generated
vendored
Normal file
76
vendor/sigs.k8s.io/controller-runtime/pkg/controller/controllertest/unconventionallisttypecrd.go
generated
vendored
Normal file
@@ -0,0 +1,76 @@
|
||||
/*
|
||||
Copyright 2021 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllertest
|
||||
|
||||
import (
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/runtime"
|
||||
)
|
||||
|
||||
var _ runtime.Object = &UnconventionalListType{}
|
||||
var _ runtime.Object = &UnconventionalListTypeList{}
|
||||
|
||||
// UnconventionalListType is used to test CRDs with List types that
|
||||
// have a slice of pointers rather than a slice of literals.
|
||||
type UnconventionalListType struct {
|
||||
metav1.TypeMeta `json:",inline"`
|
||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||
Spec string `json:"spec,omitempty"`
|
||||
}
|
||||
|
||||
// DeepCopyObject implements runtime.Object
|
||||
// Handwritten for simplicity.
|
||||
func (u *UnconventionalListType) DeepCopyObject() runtime.Object {
|
||||
return u.DeepCopy()
|
||||
}
|
||||
|
||||
// DeepCopy implements *UnconventionalListType
|
||||
// Handwritten for simplicity.
|
||||
func (u *UnconventionalListType) DeepCopy() *UnconventionalListType {
|
||||
return &UnconventionalListType{
|
||||
TypeMeta: u.TypeMeta,
|
||||
ObjectMeta: *u.ObjectMeta.DeepCopy(),
|
||||
Spec: u.Spec,
|
||||
}
|
||||
}
|
||||
|
||||
// UnconventionalListTypeList is used to test CRDs with List types that
|
||||
// have a slice of pointers rather than a slice of literals.
|
||||
type UnconventionalListTypeList struct {
|
||||
metav1.TypeMeta `json:",inline"`
|
||||
metav1.ListMeta `json:"metadata,omitempty"`
|
||||
Items []*UnconventionalListType `json:"items"`
|
||||
}
|
||||
|
||||
// DeepCopyObject implements runtime.Object
|
||||
// Handwritten for simplicity.
|
||||
func (u *UnconventionalListTypeList) DeepCopyObject() runtime.Object {
|
||||
return u.DeepCopy()
|
||||
}
|
||||
|
||||
// DeepCopy implements *UnconventionalListTypeListt
|
||||
// Handwritten for simplicity.
|
||||
func (u *UnconventionalListTypeList) DeepCopy() *UnconventionalListTypeList {
|
||||
out := &UnconventionalListTypeList{
|
||||
TypeMeta: u.TypeMeta,
|
||||
ListMeta: *u.ListMeta.DeepCopy(),
|
||||
}
|
||||
for _, item := range u.Items {
|
||||
out.Items = append(out.Items, item.DeepCopy())
|
||||
}
|
||||
return out
|
||||
}
|
||||
171
vendor/sigs.k8s.io/controller-runtime/pkg/controller/controllertest/util.go
generated
vendored
Normal file
171
vendor/sigs.k8s.io/controller-runtime/pkg/controller/controllertest/util.go
generated
vendored
Normal file
@@ -0,0 +1,171 @@
|
||||
/*
|
||||
Copyright 2017 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllertest
|
||||
|
||||
import (
|
||||
"time"
|
||||
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/client-go/tools/cache"
|
||||
)
|
||||
|
||||
var _ cache.SharedIndexInformer = &FakeInformer{}
|
||||
|
||||
// FakeInformer provides fake Informer functionality for testing.
|
||||
type FakeInformer struct {
|
||||
// Synced is returned by the HasSynced functions to implement the Informer interface
|
||||
Synced bool
|
||||
|
||||
// RunCount is incremented each time RunInformersAndControllers is called
|
||||
RunCount int
|
||||
|
||||
handlers []eventHandlerWrapper
|
||||
}
|
||||
|
||||
type modernResourceEventHandler interface {
|
||||
OnAdd(obj interface{}, isInInitialList bool)
|
||||
OnUpdate(oldObj, newObj interface{})
|
||||
OnDelete(obj interface{})
|
||||
}
|
||||
|
||||
type legacyResourceEventHandler interface {
|
||||
OnAdd(obj interface{})
|
||||
OnUpdate(oldObj, newObj interface{})
|
||||
OnDelete(obj interface{})
|
||||
}
|
||||
|
||||
// eventHandlerWrapper wraps a ResourceEventHandler in a manner that is compatible with client-go 1.27+ and older.
|
||||
// The interface was changed in these versions.
|
||||
type eventHandlerWrapper struct {
|
||||
handler any
|
||||
}
|
||||
|
||||
func (e eventHandlerWrapper) OnAdd(obj interface{}) {
|
||||
if m, ok := e.handler.(modernResourceEventHandler); ok {
|
||||
m.OnAdd(obj, false)
|
||||
return
|
||||
}
|
||||
e.handler.(legacyResourceEventHandler).OnAdd(obj)
|
||||
}
|
||||
|
||||
func (e eventHandlerWrapper) OnUpdate(oldObj, newObj interface{}) {
|
||||
if m, ok := e.handler.(modernResourceEventHandler); ok {
|
||||
m.OnUpdate(oldObj, newObj)
|
||||
return
|
||||
}
|
||||
e.handler.(legacyResourceEventHandler).OnUpdate(oldObj, newObj)
|
||||
}
|
||||
|
||||
func (e eventHandlerWrapper) OnDelete(obj interface{}) {
|
||||
if m, ok := e.handler.(modernResourceEventHandler); ok {
|
||||
m.OnDelete(obj)
|
||||
return
|
||||
}
|
||||
e.handler.(legacyResourceEventHandler).OnDelete(obj)
|
||||
}
|
||||
|
||||
// AddIndexers does nothing. TODO(community): Implement this.
|
||||
func (f *FakeInformer) AddIndexers(indexers cache.Indexers) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
// GetIndexer does nothing. TODO(community): Implement this.
|
||||
func (f *FakeInformer) GetIndexer() cache.Indexer {
|
||||
return nil
|
||||
}
|
||||
|
||||
// Informer returns the fake Informer.
|
||||
func (f *FakeInformer) Informer() cache.SharedIndexInformer {
|
||||
return f
|
||||
}
|
||||
|
||||
// HasSynced implements the Informer interface. Returns f.Synced.
|
||||
func (f *FakeInformer) HasSynced() bool {
|
||||
return f.Synced
|
||||
}
|
||||
|
||||
// AddEventHandler implements the Informer interface. Adds an EventHandler to the fake Informers. TODO(community): Implement Registration.
|
||||
func (f *FakeInformer) AddEventHandler(handler cache.ResourceEventHandler) (cache.ResourceEventHandlerRegistration, error) {
|
||||
f.handlers = append(f.handlers, eventHandlerWrapper{handler})
|
||||
return nil, nil
|
||||
}
|
||||
|
||||
// Run implements the Informer interface. Increments f.RunCount.
|
||||
func (f *FakeInformer) Run(<-chan struct{}) {
|
||||
f.RunCount++
|
||||
}
|
||||
|
||||
// Add fakes an Add event for obj.
|
||||
func (f *FakeInformer) Add(obj metav1.Object) {
|
||||
for _, h := range f.handlers {
|
||||
h.OnAdd(obj)
|
||||
}
|
||||
}
|
||||
|
||||
// Update fakes an Update event for obj.
|
||||
func (f *FakeInformer) Update(oldObj, newObj metav1.Object) {
|
||||
for _, h := range f.handlers {
|
||||
h.OnUpdate(oldObj, newObj)
|
||||
}
|
||||
}
|
||||
|
||||
// Delete fakes an Delete event for obj.
|
||||
func (f *FakeInformer) Delete(obj metav1.Object) {
|
||||
for _, h := range f.handlers {
|
||||
h.OnDelete(obj)
|
||||
}
|
||||
}
|
||||
|
||||
// AddEventHandlerWithResyncPeriod does nothing. TODO(community): Implement this.
|
||||
func (f *FakeInformer) AddEventHandlerWithResyncPeriod(handler cache.ResourceEventHandler, resyncPeriod time.Duration) (cache.ResourceEventHandlerRegistration, error) {
|
||||
return nil, nil
|
||||
}
|
||||
|
||||
// RemoveEventHandler does nothing. TODO(community): Implement this.
|
||||
func (f *FakeInformer) RemoveEventHandler(handle cache.ResourceEventHandlerRegistration) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
// GetStore does nothing. TODO(community): Implement this.
|
||||
func (f *FakeInformer) GetStore() cache.Store {
|
||||
return nil
|
||||
}
|
||||
|
||||
// GetController does nothing. TODO(community): Implement this.
|
||||
func (f *FakeInformer) GetController() cache.Controller {
|
||||
return nil
|
||||
}
|
||||
|
||||
// LastSyncResourceVersion does nothing. TODO(community): Implement this.
|
||||
func (f *FakeInformer) LastSyncResourceVersion() string {
|
||||
return ""
|
||||
}
|
||||
|
||||
// SetWatchErrorHandler does nothing. TODO(community): Implement this.
|
||||
func (f *FakeInformer) SetWatchErrorHandler(cache.WatchErrorHandler) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
// SetTransform does nothing. TODO(community): Implement this.
|
||||
func (f *FakeInformer) SetTransform(t cache.TransformFunc) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
// IsStopped does nothing. TODO(community): Implement this.
|
||||
func (f *FakeInformer) IsStopped() bool {
|
||||
return false
|
||||
}
|
||||
116
vendor/sigs.k8s.io/controller-runtime/pkg/controller/controllerutil/controllerutil.go
generated
vendored
116
vendor/sigs.k8s.io/controller-runtime/pkg/controller/controllerutil/controllerutil.go
generated
vendored
@@ -27,7 +27,8 @@ import (
|
||||
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
||||
"k8s.io/apimachinery/pkg/runtime"
|
||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||
"k8s.io/utils/pointer"
|
||||
"k8s.io/utils/ptr"
|
||||
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client/apiutil"
|
||||
)
|
||||
@@ -76,8 +77,8 @@ func SetControllerReference(owner, controlled metav1.Object, scheme *runtime.Sch
|
||||
Kind: gvk.Kind,
|
||||
Name: owner.GetName(),
|
||||
UID: owner.GetUID(),
|
||||
BlockOwnerDeletion: pointer.Bool(true),
|
||||
Controller: pointer.Bool(true),
|
||||
BlockOwnerDeletion: ptr.To(true),
|
||||
Controller: ptr.To(true),
|
||||
}
|
||||
|
||||
// Return early with an error if the object is already controlled.
|
||||
@@ -120,6 +121,84 @@ func SetOwnerReference(owner, object metav1.Object, scheme *runtime.Scheme) erro
|
||||
return nil
|
||||
}
|
||||
|
||||
// RemoveOwnerReference is a helper method to make sure the given object removes an owner reference to the object provided.
|
||||
// This allows you to remove the owner to establish a new owner of the object in a subsequent call.
|
||||
func RemoveOwnerReference(owner, object metav1.Object, scheme *runtime.Scheme) error {
|
||||
owners := object.GetOwnerReferences()
|
||||
length := len(owners)
|
||||
if length < 1 {
|
||||
return fmt.Errorf("%T does not have any owner references", object)
|
||||
}
|
||||
ro, ok := owner.(runtime.Object)
|
||||
if !ok {
|
||||
return fmt.Errorf("%T is not a runtime.Object, cannot call RemoveOwnerReference", owner)
|
||||
}
|
||||
gvk, err := apiutil.GVKForObject(ro, scheme)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
index := indexOwnerRef(owners, metav1.OwnerReference{
|
||||
APIVersion: gvk.GroupVersion().String(),
|
||||
Name: owner.GetName(),
|
||||
Kind: gvk.Kind,
|
||||
})
|
||||
if index == -1 {
|
||||
return fmt.Errorf("%T does not have an owner reference for %T", object, owner)
|
||||
}
|
||||
|
||||
owners = append(owners[:index], owners[index+1:]...)
|
||||
object.SetOwnerReferences(owners)
|
||||
return nil
|
||||
}
|
||||
|
||||
// HasControllerReference returns true if the object
|
||||
// has an owner ref with controller equal to true
|
||||
func HasControllerReference(object metav1.Object) bool {
|
||||
owners := object.GetOwnerReferences()
|
||||
for _, owner := range owners {
|
||||
isTrue := owner.Controller
|
||||
if owner.Controller != nil && *isTrue {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
// RemoveControllerReference removes an owner reference where the controller
|
||||
// equals true
|
||||
func RemoveControllerReference(owner, object metav1.Object, scheme *runtime.Scheme) error {
|
||||
if ok := HasControllerReference(object); !ok {
|
||||
return fmt.Errorf("%T does not have a owner reference with controller equals true", object)
|
||||
}
|
||||
ro, ok := owner.(runtime.Object)
|
||||
if !ok {
|
||||
return fmt.Errorf("%T is not a runtime.Object, cannot call RemoveControllerReference", owner)
|
||||
}
|
||||
gvk, err := apiutil.GVKForObject(ro, scheme)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
ownerRefs := object.GetOwnerReferences()
|
||||
index := indexOwnerRef(ownerRefs, metav1.OwnerReference{
|
||||
APIVersion: gvk.GroupVersion().String(),
|
||||
Name: owner.GetName(),
|
||||
Kind: gvk.Kind,
|
||||
})
|
||||
|
||||
if index == -1 {
|
||||
return fmt.Errorf("%T does not have an controller reference for %T", object, owner)
|
||||
}
|
||||
|
||||
if ownerRefs[index].Controller == nil || !*ownerRefs[index].Controller {
|
||||
return fmt.Errorf("%T owner is not the controller reference for %T", owner, object)
|
||||
}
|
||||
|
||||
ownerRefs = append(ownerRefs[:index], ownerRefs[index+1:]...)
|
||||
object.SetOwnerReferences(ownerRefs)
|
||||
return nil
|
||||
}
|
||||
|
||||
func upsertOwnerRef(ref metav1.OwnerReference, object metav1.Object) {
|
||||
owners := object.GetOwnerReferences()
|
||||
if idx := indexOwnerRef(owners, ref); idx == -1 {
|
||||
@@ -165,7 +244,6 @@ func referSameObject(a, b metav1.OwnerReference) bool {
|
||||
if err != nil {
|
||||
return false
|
||||
}
|
||||
|
||||
return aGV.Group == bGV.Group && a.Kind == b.Kind && a.Name == b.Name
|
||||
}
|
||||
|
||||
@@ -192,6 +270,9 @@ const ( // They should complete the sentence "Deployment default/foo has been ..
|
||||
// The MutateFn is called regardless of creating or updating an object.
|
||||
//
|
||||
// It returns the executed operation and an error.
|
||||
//
|
||||
// Note: changes made by MutateFn to any sub-resource (status...), will be
|
||||
// discarded.
|
||||
func CreateOrUpdate(ctx context.Context, c client.Client, obj client.Object, f MutateFn) (OperationResult, error) {
|
||||
key := client.ObjectKeyFromObject(obj)
|
||||
if err := c.Get(ctx, key, obj); err != nil {
|
||||
@@ -229,6 +310,12 @@ func CreateOrUpdate(ctx context.Context, c client.Client, obj client.Object, f M
|
||||
// The MutateFn is called regardless of creating or updating an object.
|
||||
//
|
||||
// It returns the executed operation and an error.
|
||||
//
|
||||
// Note: changes to any sub-resource other than status will be ignored.
|
||||
// Changes to the status sub-resource will only be applied if the object
|
||||
// already exist. To change the status on object creation, the easiest
|
||||
// way is to requeue the object in the controller if OperationResult is
|
||||
// OperationResultCreated
|
||||
func CreateOrPatch(ctx context.Context, c client.Client, obj client.Object, f MutateFn) (OperationResult, error) {
|
||||
key := client.ObjectKeyFromObject(obj)
|
||||
if err := c.Get(ctx, key, obj); err != nil {
|
||||
@@ -365,15 +452,18 @@ func AddFinalizer(o client.Object, finalizer string) (finalizersUpdated bool) {
|
||||
// It returns an indication of whether it updated the object's list of finalizers.
|
||||
func RemoveFinalizer(o client.Object, finalizer string) (finalizersUpdated bool) {
|
||||
f := o.GetFinalizers()
|
||||
for i := 0; i < len(f); i++ {
|
||||
length := len(f)
|
||||
|
||||
index := 0
|
||||
for i := 0; i < length; i++ {
|
||||
if f[i] == finalizer {
|
||||
f = append(f[:i], f[i+1:]...)
|
||||
i--
|
||||
finalizersUpdated = true
|
||||
continue
|
||||
}
|
||||
f[index] = f[i]
|
||||
index++
|
||||
}
|
||||
o.SetFinalizers(f)
|
||||
return
|
||||
o.SetFinalizers(f[:index])
|
||||
return length != index
|
||||
}
|
||||
|
||||
// ContainsFinalizer checks an Object that the provided finalizer is present.
|
||||
@@ -386,9 +476,3 @@ func ContainsFinalizer(o client.Object, finalizer string) bool {
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
// Object allows functions to work indistinctly with any resource that
|
||||
// implements both Object interfaces.
|
||||
//
|
||||
// Deprecated: Use client.Object instead.
|
||||
type Object = client.Object
|
||||
|
||||
Reference in New Issue
Block a user