Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
30 changes: 15 additions & 15 deletions internal/controller/linodecluster_controller_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -114,6 +114,21 @@ var _ = Describe("cluster-lifecycle", Ordered, Label("cluster", "cluster-lifecyc

ctlrSuite.Run(
OneOf(
Path(
Call("vpc present but not ready", func(ctx context.Context, mck Mock) {
Expect(k8sClient.Create(ctx, &linodeVPC)).To(Succeed())
linodeVPC.Status.Ready = false
k8sClient.Status().Update(ctx, &linodeVPC)
}),
OneOf(
Path(Result("", func(ctx context.Context, mck Mock) {
reconciler.Client = k8sClient
_, err := reconciler.reconcile(ctx, cScope, mck.Logger())
Expect(err).NotTo(HaveOccurred())
Expect(rec.ConditionTrue(&linodeCluster, ConditionPreflightLinodeVPCReady)).To(BeFalse())
})),
),
),
Path(
Call("firewall doesn't exist", func(ctx context.Context, mck Mock) {
cScope.LinodeCluster.Spec.NodeBalancerFirewallRef = &corev1.ObjectReference{Name: "firewalltest"}
Expand Down Expand Up @@ -151,21 +166,6 @@ var _ = Describe("cluster-lifecycle", Ordered, Label("cluster", "cluster-lifecyc
})),
),
),
Path(
Call("vpc present but not ready", func(ctx context.Context, mck Mock) {
Expect(k8sClient.Create(ctx, &linodeVPC)).To(Succeed())
linodeVPC.Status.Ready = false
k8sClient.Status().Update(ctx, &linodeVPC)
}),
OneOf(
Path(Result("", func(ctx context.Context, mck Mock) {
reconciler.Client = k8sClient
_, err := reconciler.reconcile(ctx, cScope, mck.Logger())
Expect(err).NotTo(HaveOccurred())
Expect(rec.ConditionTrue(&linodeCluster, ConditionPreflightLinodeVPCReady)).To(BeFalse())
})),
),
),
Path(
Call("cluster is not created because there was an error creating nb", func(ctx context.Context, mck Mock) {
cScope.LinodeClient = mck.LinodeClient
Expand Down
3 changes: 3 additions & 0 deletions internal/controller/linodefirewall_controller_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,8 @@ import (
"github.com/linode/linodego"
"go.uber.org/mock/gomock"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1"
"sigs.k8s.io/cluster-api/util/conditions"
"sigs.k8s.io/cluster-api/util/patch"
"sigs.k8s.io/controller-runtime/pkg/client"

Expand Down Expand Up @@ -169,6 +171,7 @@ var _ = Describe("lifecycle", Ordered, Label("firewalls", "lifecycle"), func() {
}),
OneOf(
Path(Result("update requeues for update rules error", func(ctx context.Context, mck Mock) {
conditions.MarkFalse(fwScope.LinodeFirewall, clusterv1.ReadyCondition, "test", clusterv1.ConditionSeverityWarning, "%s", "test")
mck.LinodeClient.EXPECT().UpdateFirewallRules(ctx, 1, gomock.Any()).Return(nil, &linodego.Error{Code: http.StatusInternalServerError})
res, err := reconciler.reconcile(ctx, mck.Logger(), &fwScope)
Expect(err).NotTo(HaveOccurred())
Expand Down
2 changes: 1 addition & 1 deletion internal/controller/linodemachine_controller_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -630,7 +630,7 @@ var _ = Describe("create", Label("machine", "create"), func() {

Expect(rutil.ConditionTrue(&linodeMachine, ConditionPreflightMetadataSupportConfigured)).To(BeTrue())
Expect(rutil.ConditionTrue(&linodeMachine, ConditionPreflightCreated)).To(BeFalse())
Expect(conditions.Get(&linodeMachine, ConditionPreflightCreated).Severity).To(Equal(clusterv1.ConditionSeverityError))
Expect(conditions.Get(&linodeMachine, ConditionPreflightCreated).Severity).To(Equal(clusterv1.ConditionSeverityWarning))
Expect(conditions.Get(&linodeMachine, ConditionPreflightCreated).Message).To(ContainSubstring("time is up"))
})
})
Expand Down
3 changes: 3 additions & 0 deletions internal/controller/linodevpc_controller_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,8 @@ import (
apierrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/utils/ptr"
clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1"
"sigs.k8s.io/cluster-api/util/conditions"
"sigs.k8s.io/cluster-api/util/patch"
"sigs.k8s.io/controller-runtime/pkg/client"

Expand Down Expand Up @@ -163,6 +165,7 @@ var _ = Describe("lifecycle", Ordered, Label("vpc", "lifecycle"), func() {
}),
OneOf(
Path(Result("update requeues", func(ctx context.Context, mck Mock) {
conditions.MarkFalse(vpcScope.LinodeVPC, clusterv1.ReadyCondition, "test", clusterv1.ConditionSeverityWarning, "%s", "test")
res, err := reconciler.reconcile(ctx, mck.Logger(), &vpcScope)
Expect(err).NotTo(HaveOccurred())
Expect(res.RequeueAfter).To(Equal(rec.DefaultVPCControllerReconcileDelay))
Expand Down
6 changes: 3 additions & 3 deletions util/reconciler/conditions.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,13 +31,12 @@ func HasConditionSeverity(from conditions.Getter, typ clusterv1.ConditionType, s
}

func RecordDecayingCondition(to conditions.Setter, typ clusterv1.ConditionType, reason, message string, timeout time.Duration) bool {
conditions.MarkFalse(to, typ, reason, clusterv1.ConditionSeverityWarning, "%s", message)

if HasStaleCondition(to, typ, timeout) {
conditions.MarkFalse(to, typ, reason, clusterv1.ConditionSeverityError, "%s", message)
return true
}

conditions.MarkFalse(to, typ, reason, clusterv1.ConditionSeverityWarning, "%s", message)
return false
}

Expand All @@ -47,5 +46,6 @@ func HasStaleCondition(from conditions.Getter, typ clusterv1.ConditionType, time
return false
}

return time.Now().After(cond.LastTransitionTime.Add(timeout))
// if severity is already set to error, it was a stale condition
return cond.Severity == clusterv1.ConditionSeverityError || time.Now().After(cond.LastTransitionTime.Add(timeout))
}