@@ -711,27 +711,28 @@ func (r *KeystoneAPIReconciler) reconcileNormal(
711711
712712 //
713713 // check for required OpenStack secret holding passwords for service/admin user and add hash to the vars map
714+ // NOTE: VerifySecret handles the "not found" error and returns RequeueAfter ctrl.Result if so, so we don't
715+ // need to check the error type here
714716 //
715- ospSecret , hash , err := oko_secret .GetSecret (ctx , helper , instance .Spec .Secret , instance .Namespace )
717+ hash , result , err := oko_secret .VerifySecret (ctx , types. NamespacedName { Name : instance .Spec .Secret , Namespace : instance .Namespace }, [] string { "AdminPassword" }, helper . GetClient (), time . Second * 10 )
716718 if err != nil {
717- if k8s_errors .IsNotFound (err ) {
718- Log .Info (fmt .Sprintf ("OpenStack secret %s not found" , instance .Spec .Secret ))
719- instance .Status .Conditions .Set (condition .FalseCondition (
720- condition .InputReadyCondition ,
721- condition .RequestedReason ,
722- condition .SeverityInfo ,
723- condition .InputReadyWaitingMessage ))
724- return ctrl.Result {RequeueAfter : time .Second * 10 }, nil
725- }
726719 instance .Status .Conditions .Set (condition .FalseCondition (
727720 condition .InputReadyCondition ,
728721 condition .ErrorReason ,
729722 condition .SeverityWarning ,
730723 condition .InputReadyErrorMessage ,
731724 err .Error ()))
732725 return ctrl.Result {}, err
726+ } else if (result != ctrl.Result {}) {
727+ // This case is "secret not found". VerifySecret already logs a message for it
728+ instance .Status .Conditions .Set (condition .FalseCondition (
729+ condition .InputReadyCondition ,
730+ condition .RequestedReason ,
731+ condition .SeverityInfo ,
732+ condition .InputReadyWaitingMessage ))
733+ return result , nil
733734 }
734- configMapVars [ospSecret . Name ] = env .SetValue (hash )
735+ configMapVars [instance . Spec . Secret ] = env .SetValue (hash )
735736
736737 instance .Status .Conditions .MarkTrue (condition .InputReadyCondition , condition .InputReadyMessage )
737738
@@ -889,6 +890,11 @@ func (r *KeystoneAPIReconciler) reconcileNormal(
889890 err .Error ()))
890891 return ctrlResult , err
891892 } else if (ctrlResult != ctrl.Result {}) {
893+ instance .Status .Conditions .Set (condition .FalseCondition (
894+ condition .TLSInputReadyCondition ,
895+ condition .RequestedReason ,
896+ condition .SeverityInfo ,
897+ fmt .Sprintf (condition .TLSInputReadyWaitingMessage , instance .Spec .TLS .CaBundleSecretName )))
892898 return ctrlResult , nil
893899 }
894900
@@ -908,6 +914,11 @@ func (r *KeystoneAPIReconciler) reconcileNormal(
908914 err .Error ()))
909915 return ctrlResult , err
910916 } else if (ctrlResult != ctrl.Result {}) {
917+ instance .Status .Conditions .Set (condition .FalseCondition (
918+ condition .TLSInputReadyCondition ,
919+ condition .RequestedReason ,
920+ condition .SeverityInfo ,
921+ fmt .Sprintf (condition .TLSInputReadyWaitingMessage , "one or more cert secrets" )))
911922 return ctrlResult , nil
912923 }
913924 configMapVars [tls .TLSHashName ] = env .SetValue (certsHash )
0 commit comments