@@ -756,10 +756,12 @@ func (r *DesignateAPIReconciler) reconcileNormal(ctx context.Context, instance *
756756 )
757757 if err != nil {
758758 if k8s_errors .IsNotFound (err ) {
759+ // Since the CA cert secret should have been manually created by the user and referenced in the spec,
760+ // we treat this as a warning because it means that the service will not be able to start.
759761 instance .Status .Conditions .Set (condition .FalseCondition (
760762 condition .TLSInputReadyCondition ,
761- condition .RequestedReason ,
762- condition .SeverityInfo ,
763+ condition .ErrorReason ,
764+ condition .SeverityWarning ,
763765 condition .TLSInputReadyWaitingMessage , instance .Spec .TLS .CaBundleSecretName ))
764766 return ctrl.Result {}, nil
765767 }
@@ -780,6 +782,8 @@ func (r *DesignateAPIReconciler) reconcileNormal(ctx context.Context, instance *
780782 certsHash , err := instance .Spec .TLS .API .ValidateCertSecrets (ctx , helper , instance .Namespace )
781783 if err != nil {
782784 if k8s_errors .IsNotFound (err ) {
785+ // Since the OpenStackControlPlane creates the API service certs secrets,
786+ // we treat this as an info (because the user is not responsible for manually creating them).
783787 instance .Status .Conditions .Set (condition .FalseCondition (
784788 condition .TLSInputReadyCondition ,
785789 condition .RequestedReason ,
@@ -900,11 +904,13 @@ func (r *DesignateAPIReconciler) reconcileNormal(ctx context.Context, instance *
900904 nad , err := nad .GetNADWithName (ctx , helper , netAtt , instance .Namespace )
901905 if err != nil {
902906 if k8s_errors .IsNotFound (err ) {
907+ // Since the net-attach-def CR should have been manually created by the user and referenced in the spec,
908+ // we treat this as a warning because it means that the service will not be able to start.
903909 Log .Info (fmt .Sprintf ("network-attachment-definition %s not found" , netAtt ))
904910 instance .Status .Conditions .Set (condition .FalseCondition (
905911 condition .NetworkAttachmentsReadyCondition ,
906- condition .RequestedReason ,
907- condition .SeverityInfo ,
912+ condition .ErrorReason ,
913+ condition .SeverityWarning ,
908914 condition .NetworkAttachmentsReadyWaitingMessage ,
909915 netAtt ))
910916 return ctrl.Result {RequeueAfter : time .Second * 10 }, nil
@@ -1172,11 +1178,13 @@ func (r *DesignateAPIReconciler) generateServiceConfigMaps(
11721178 adminPasswordSecret , _ , err := oko_secret .GetSecret (ctx , h , instance .Spec .Secret , instance .Namespace )
11731179 if err != nil {
11741180 if k8s_errors .IsNotFound (err ) {
1181+ // Since the service secret should have been manually created by the user and referenced in the spec,
1182+ // we treat this as a warning because it means that the service will not be able to start.
11751183 Log .Info (fmt .Sprintf ("AdminPassword secret %s not found" , instance .Spec .Secret ))
11761184 instance .Status .Conditions .Set (condition .FalseCondition (
11771185 condition .InputReadyCondition ,
1178- condition .RequestedReason ,
1179- condition .SeverityInfo ,
1186+ condition .ErrorReason ,
1187+ condition .SeverityWarning ,
11801188 condition .InputReadyWaitingMessage ))
11811189 return nil
11821190 }
0 commit comments