Skip to content

Commit 2260356

Browse files
committed
refactor: cluster controller rely on fields
1 parent 34a9df1 commit 2260356

File tree

1 file changed

+37
-37
lines changed

1 file changed

+37
-37
lines changed

internal/controller/metalstackcluster_controller.go

Lines changed: 37 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ type MetalStackClusterReconciler struct {
6060
}
6161

6262
type clusterReconciler struct {
63-
MetalClient metalgo.Client
64-
Client client.Client
63+
metalClient metalgo.Client
64+
client client.Client
6565
ctx context.Context
6666
log logr.Logger
6767
cluster *clusterv1.Cluster
@@ -101,8 +101,8 @@ func (r *MetalStackClusterReconciler) Reconcile(ctx context.Context, req ctrl.Re
101101
}
102102

103103
reconciler := &clusterReconciler{
104-
MetalClient: r.MetalClient,
105-
Client: r.Client,
104+
metalClient: r.MetalClient,
105+
client: r.Client,
106106
ctx: ctx,
107107
log: log,
108108
cluster: cluster,
@@ -122,7 +122,7 @@ func (r *MetalStackClusterReconciler) Reconcile(ctx context.Context, req ctrl.Re
122122
}
123123

124124
log.Info("reconciling resource deletion flow")
125-
err := reconciler.delete(ctx, log, infraCluster)
125+
err := reconciler.delete()
126126
if err != nil {
127127
return ctrl.Result{}, err
128128
}
@@ -148,7 +148,7 @@ func (r *MetalStackClusterReconciler) Reconcile(ctx context.Context, req ctrl.Re
148148
return ctrl.Result{}, nil
149149
}
150150

151-
err = reconciler.reconcile(ctx, log, infraCluster)
151+
err = reconciler.reconcile()
152152

153153
return ctrl.Result{}, err // remember to return err here and not nil because the defer func can influence this
154154
}
@@ -163,34 +163,34 @@ func (r *MetalStackClusterReconciler) SetupWithManager(mgr ctrl.Manager) error {
163163
Complete(r)
164164
}
165165

166-
func (r *clusterReconciler) reconcile(ctx context.Context, log logr.Logger, infraCluster *v1alpha1.MetalStackCluster) error {
166+
func (r *clusterReconciler) reconcile() error {
167167
nodeCIDR, err := r.ensureNodeNetwork()
168168
if err != nil {
169169
return fmt.Errorf("unable to ensure node network: %w", err)
170170
}
171171

172-
log.Info("reconciled node network", "cidr", nodeCIDR)
172+
r.log.Info("reconciled node network", "cidr", nodeCIDR)
173173

174174
ip, err := r.ensureControlPlaneIP()
175175
if err != nil {
176176
return fmt.Errorf("unable to ensure control plane ip: %w", err)
177177
}
178178

179-
log.Info("reconciled control plane ip", "ip", *ip.Ipaddress)
179+
r.log.Info("reconciled control plane ip", "ip", *ip.Ipaddress)
180180

181-
log.Info("setting control plane endpoint into cluster resource")
181+
r.log.Info("setting control plane endpoint into cluster resource")
182182

183-
helper, err := patch.NewHelper(infraCluster, r.Client)
183+
helper, err := patch.NewHelper(r.infraCluster, r.client)
184184
if err != nil {
185185
return err
186186
}
187187

188-
infraCluster.Spec.ControlPlaneEndpoint = infrastructurev1alpha1.APIEndpoint{
188+
r.infraCluster.Spec.ControlPlaneEndpoint = infrastructurev1alpha1.APIEndpoint{
189189
Host: *ip.Ipaddress,
190190
Port: v1alpha1.ClusterControlPlaneEndpointDefaultPort,
191191
}
192192

193-
err = helper.Patch(ctx, infraCluster) // TODO:check whether patch is not executed when no changes occur
193+
err = helper.Patch(r.ctx, r.infraCluster) // TODO:check whether patch is not executed when no changes occur
194194
if err != nil {
195195
return fmt.Errorf("failed to update infra cluster control plane endpoint: %w", err)
196196
}
@@ -200,12 +200,12 @@ func (r *clusterReconciler) reconcile(ctx context.Context, log logr.Logger, infr
200200
return fmt.Errorf("unable to ensure firewall deployment: %w", err)
201201
}
202202

203-
log.Info("reconciled firewall deployment", "name", fwdeploy.Name, "namespace", fwdeploy.Namespace)
203+
r.log.Info("reconciled firewall deployment", "name", fwdeploy.Name, "namespace", fwdeploy.Namespace)
204204

205205
return err
206206
}
207207

208-
func (r *clusterReconciler) delete(ctx context.Context, log logr.Logger, infraCluster *v1alpha1.MetalStackCluster) error {
208+
func (r *clusterReconciler) delete() error {
209209
var err error
210210
defer func() {
211211
statusErr := r.status()
@@ -219,21 +219,21 @@ func (r *clusterReconciler) delete(ctx context.Context, log logr.Logger, infraCl
219219
return fmt.Errorf("unable to delete firewall deployment: %w", err)
220220
}
221221

222-
log.Info("deleted firewall deployment")
222+
r.log.Info("deleted firewall deployment")
223223

224224
err = r.deleteControlPlaneIP()
225225
if err != nil {
226226
return fmt.Errorf("unable to delete control plane ip: %w", err)
227227
}
228228

229-
log.Info("deleted control plane ip")
229+
r.log.Info("deleted control plane ip")
230230

231231
err = r.deleteNodeNetwork()
232232
if err != nil {
233233
return fmt.Errorf("unable to delete node network: %w", err)
234234
}
235235

236-
log.Info("deleted node network")
236+
r.log.Info("deleted node network")
237237

238238
return err
239239
}
@@ -246,7 +246,7 @@ func (r *clusterReconciler) ensureNodeNetwork() (string, error) {
246246

247247
switch len(nws) {
248248
case 0:
249-
resp, err := r.MetalClient.Network().AllocateNetwork(network.NewAllocateNetworkParams().WithBody(&models.V1NetworkAllocateRequest{
249+
resp, err := r.metalClient.Network().AllocateNetwork(network.NewAllocateNetworkParams().WithBody(&models.V1NetworkAllocateRequest{
250250
Projectid: r.infraCluster.Spec.ProjectID,
251251
Partitionid: r.infraCluster.Spec.Partition,
252252
Name: r.infraCluster.GetName(),
@@ -287,7 +287,7 @@ func (r *clusterReconciler) deleteNodeNetwork() error {
287287
return fmt.Errorf("node network id not set")
288288
}
289289

290-
_, err := r.MetalClient.Network().FreeNetwork(network.NewFreeNetworkParams().WithID(*nw.ID).WithContext(r.ctx), nil)
290+
_, err := r.metalClient.Network().FreeNetwork(network.NewFreeNetworkParams().WithID(*nw.ID).WithContext(r.ctx), nil)
291291
if err != nil {
292292
return err
293293
}
@@ -299,7 +299,7 @@ func (r *clusterReconciler) deleteNodeNetwork() error {
299299
}
300300

301301
func (r *clusterReconciler) findNodeNetwork() ([]*models.V1NetworkResponse, error) {
302-
resp, err := r.MetalClient.Network().FindNetworks(network.NewFindNetworksParams().WithBody(&models.V1NetworkFindRequest{
302+
resp, err := r.metalClient.Network().FindNetworks(network.NewFindNetworksParams().WithBody(&models.V1NetworkFindRequest{
303303
Projectid: r.infraCluster.Spec.ProjectID,
304304
Partitionid: r.infraCluster.Spec.Partition,
305305
Labels: map[string]string{tag.ClusterID: string(r.infraCluster.GetUID())},
@@ -312,14 +312,14 @@ func (r *clusterReconciler) findNodeNetwork() ([]*models.V1NetworkResponse, erro
312312
}
313313

314314
func (r *clusterReconciler) ensureControlPlaneIP() (*models.V1IPResponse, error) {
315-
ips, err := r.findControlPlaneIP(r.ctx, r.infraCluster)
315+
ips, err := r.findControlPlaneIP()
316316
if err != nil {
317317
return nil, err
318318
}
319319

320320
switch len(ips) {
321321
case 0:
322-
nwResp, err := r.MetalClient.Network().FindNetworks(network.NewFindNetworksParams().WithBody(&models.V1NetworkFindRequest{
322+
nwResp, err := r.metalClient.Network().FindNetworks(network.NewFindNetworksParams().WithBody(&models.V1NetworkFindRequest{
323323
Labels: map[string]string{
324324
tag.NetworkDefault: "",
325325
},
@@ -332,7 +332,7 @@ func (r *clusterReconciler) ensureControlPlaneIP() (*models.V1IPResponse, error)
332332
return nil, fmt.Errorf("no distinct default network configured in the metal-api")
333333
}
334334

335-
resp, err := r.MetalClient.IP().AllocateIP(ipmodels.NewAllocateIPParams().WithBody(&models.V1IPAllocateRequest{
335+
resp, err := r.metalClient.IP().AllocateIP(ipmodels.NewAllocateIPParams().WithBody(&models.V1IPAllocateRequest{
336336
Description: fmt.Sprintf("%s/%s control plane ip", r.infraCluster.GetNamespace(), r.infraCluster.GetName()),
337337
Name: r.infraCluster.GetName() + "-control-plane",
338338
Networkid: nwResp.Payload[0].ID,
@@ -356,7 +356,7 @@ func (r *clusterReconciler) ensureControlPlaneIP() (*models.V1IPResponse, error)
356356
}
357357

358358
func (r *clusterReconciler) deleteControlPlaneIP() error {
359-
ips, err := r.findControlPlaneIP(r.ctx, r.infraCluster)
359+
ips, err := r.findControlPlaneIP()
360360
if err != nil {
361361
return err
362362
}
@@ -371,7 +371,7 @@ func (r *clusterReconciler) deleteControlPlaneIP() error {
371371
return fmt.Errorf("control plane ip address not set")
372372
}
373373

374-
_, err := r.MetalClient.IP().FreeIP(ipmodels.NewFreeIPParams().WithID(*ip.Ipaddress).WithContext(r.ctx), nil)
374+
_, err := r.metalClient.IP().FreeIP(ipmodels.NewFreeIPParams().WithID(*ip.Ipaddress).WithContext(r.ctx), nil)
375375
if err != nil {
376376
return err
377377
}
@@ -382,14 +382,14 @@ func (r *clusterReconciler) deleteControlPlaneIP() error {
382382
}
383383
}
384384

385-
func (r *clusterReconciler) findControlPlaneIP(ctx context.Context, infraCluster *v1alpha1.MetalStackCluster) ([]*models.V1IPResponse, error) {
386-
resp, err := r.MetalClient.IP().FindIPs(ipmodels.NewFindIPsParams().WithBody(&models.V1IPFindRequest{
387-
Projectid: infraCluster.Spec.ProjectID,
385+
func (r *clusterReconciler) findControlPlaneIP() ([]*models.V1IPResponse, error) {
386+
resp, err := r.metalClient.IP().FindIPs(ipmodels.NewFindIPsParams().WithBody(&models.V1IPFindRequest{
387+
Projectid: r.infraCluster.Spec.ProjectID,
388388
Tags: []string{
389-
tag.New(tag.ClusterID, string(infraCluster.GetUID())),
389+
tag.New(tag.ClusterID, string(r.infraCluster.GetUID())),
390390
v1alpha1.TagControlPlanePurpose,
391391
},
392-
}).WithContext(ctx), nil)
392+
}).WithContext(r.ctx), nil)
393393
if err != nil {
394394
return nil, err
395395
}
@@ -413,7 +413,7 @@ func (r *clusterReconciler) ensureFirewallDeployment(nodeCIDR string) (*fcmv2.Fi
413413
},
414414
}
415415

416-
_, err := controllerutil.CreateOrUpdate(r.ctx, r.Client, deploy, func() error {
416+
_, err := controllerutil.CreateOrUpdate(r.ctx, r.client, deploy, func() error {
417417
if deploy.Annotations == nil {
418418
deploy.Annotations = map[string]string{}
419419
}
@@ -474,7 +474,7 @@ func (r *clusterReconciler) deleteFirewallDeployment() error {
474474
},
475475
}
476476

477-
err := r.Client.Get(r.ctx, client.ObjectKeyFromObject(deploy), deploy)
477+
err := r.client.Get(r.ctx, client.ObjectKeyFromObject(deploy), deploy)
478478
if err != nil {
479479
if apierrors.IsNotFound(err) {
480480
return nil
@@ -484,7 +484,7 @@ func (r *clusterReconciler) deleteFirewallDeployment() error {
484484
}
485485

486486
if deploy.DeletionTimestamp == nil {
487-
err = r.Client.Delete(r.ctx, deploy)
487+
err = r.client.Delete(r.ctx, deploy)
488488
if err != nil {
489489
return fmt.Errorf("error deleting firewall deployment: %w", err)
490490
}
@@ -546,7 +546,7 @@ func (r *clusterReconciler) status() error {
546546
})
547547

548548
g.Go(func() error {
549-
ips, err := r.findControlPlaneIP(r.ctx, r.infraCluster)
549+
ips, err := r.findControlPlaneIP()
550550

551551
conditionUpdates <- func() {
552552
if err != nil {
@@ -579,7 +579,7 @@ func (r *clusterReconciler) status() error {
579579
},
580580
}
581581

582-
err := r.Client.Get(r.ctx, client.ObjectKeyFromObject(deploy), deploy)
582+
err := r.client.Get(r.ctx, client.ObjectKeyFromObject(deploy), deploy)
583583

584584
conditionUpdates <- func() {
585585
if err != nil && !apierrors.IsNotFound(err) {
@@ -614,7 +614,7 @@ func (r *clusterReconciler) status() error {
614614
r.infraCluster.Status.Ready = true
615615
}
616616

617-
err := r.Client.Status().Update(r.ctx, r.infraCluster)
617+
err := r.client.Status().Update(r.ctx, r.infraCluster)
618618

619619
return errors.Join(groupErr, err)
620620
}

0 commit comments

Comments
 (0)