Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove unusued code and cleanup #520

Merged
merged 4 commits into from Mar 18, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
3 changes: 1 addition & 2 deletions cmd/machine-healthcheck/main.go
Expand Up @@ -7,7 +7,6 @@ import (
"github.com/openshift/machine-api-operator/pkg/controller/machinehealthcheck"

"github.com/golang/glog"
"github.com/openshift/machine-api-operator/pkg/apis/machine/v1beta1"
mapiv1 "github.com/openshift/machine-api-operator/pkg/apis/machine/v1beta1"
"github.com/openshift/machine-api-operator/pkg/controller"
sdkVersion "github.com/operator-framework/operator-sdk/version"
Expand Down Expand Up @@ -51,7 +50,7 @@ func main() {
glog.Infof("Registering Components.")

// Setup Scheme for all resources
if err := v1beta1.AddToScheme(mgr.GetScheme()); err != nil {
if err := mapiv1.AddToScheme(mgr.GetScheme()); err != nil {
glog.Fatal(err)
}
if err := mapiv1.AddToScheme(mgr.GetScheme()); err != nil {
Expand Down
8 changes: 2 additions & 6 deletions pkg/controller/machine/controller.go
Expand Up @@ -21,7 +21,6 @@ import (
"fmt"
"time"

commonerrors "github.com/openshift/machine-api-operator/pkg/apis/machine/v1beta1"
machinev1 "github.com/openshift/machine-api-operator/pkg/apis/machine/v1beta1"
"github.com/openshift/machine-api-operator/pkg/util"
corev1 "k8s.io/api/core/v1"
Expand Down Expand Up @@ -406,7 +405,7 @@ func delayIfRequeueAfterError(err error) (reconcile.Result, error) {
func isInvalidMachineConfigurationError(err error) bool {
switch t := err.(type) {
case *MachineError:
if t.Reason == commonerrors.InvalidConfigurationMachineError {
if t.Reason == machinev1.InvalidConfigurationMachineError {
klog.Infof("Actuator returned invalid configuration error: %v", err)
return true
}
Expand Down Expand Up @@ -442,10 +441,7 @@ func machineHasNode(machine *machinev1.Machine) bool {
}

func machineIsFailed(machine *machinev1.Machine) bool {
if stringPointerDeref(machine.Status.Phase) == phaseFailed {
return true
}
return false
return stringPointerDeref(machine.Status.Phase) == phaseFailed
}

func nodeIsUnreachable(node *corev1.Node) bool {
Expand Down
11 changes: 6 additions & 5 deletions pkg/controller/machine/machine_controller_suite_test.go
Expand Up @@ -61,14 +61,15 @@ func SetupTestReconcile(inner reconcile.Reconciler) (reconcile.Reconciler, chan
}

// StartTestManager adds recFn
func StartTestManager(mgr manager.Manager, t *testing.T) chan struct{} {
func StartTestManager(mgr manager.Manager, t *testing.T) (chan struct{}, chan error) {
t.Helper()

stop := make(chan struct{})
errs := make(chan error, 1)

go func() {
if err := mgr.Start(stop); err != nil {
t.Fatalf("error starting test manager: %v", err)
}
errs <- mgr.Start(stop)
}()
return stop

return stop, errs
}
9 changes: 8 additions & 1 deletion pkg/controller/machine/machine_controller_test.go
Expand Up @@ -53,7 +53,14 @@ func TestReconcile(t *testing.T) {
if err := add(mgr, recFn); err != nil {
t.Fatalf("error adding controller to manager: %v", err)
}
defer close(StartTestManager(mgr, t))

stop, errChan := StartTestManager(mgr, t)
defer func() {
close(stop)
if err := <-errChan; err != nil {
t.Fatalf("error starting test manager: %v", err)
}
}()

// Create the Machine object and expect Reconcile and the actuator to be called
if err := c.Create(context.TODO(), instance); err != nil {
Expand Down
Expand Up @@ -634,13 +634,6 @@ func derefStringPointer(stringPointer *string) string {
return ""
}

func derefStringInt(intPointer *int) int {
if intPointer != nil {
return 0
}
return *intPointer
}

func minDuration(durations []time.Duration) time.Duration {
if len(durations) == 0 {
return time.Duration(0)
Expand Down
11 changes: 6 additions & 5 deletions pkg/controller/machineset/machineset_controller_suite_test.go
Expand Up @@ -61,14 +61,15 @@ func SetupTestReconcile(inner reconcile.Reconciler) (reconcile.Reconciler, chan
}

// StartTestManager adds recFn
func StartTestManager(mgr manager.Manager, t *testing.T) chan struct{} {
func StartTestManager(mgr manager.Manager, t *testing.T) (chan struct{}, chan error) {
t.Helper()

stop := make(chan struct{})
errs := make(chan error, 1)

go func() {
if err := mgr.Start(stop); err != nil {
t.Fatalf("error starting test manager: %v", err)
}
errs <- mgr.Start(stop)
}()
return stop

return stop, errs
}
9 changes: 8 additions & 1 deletion pkg/controller/machineset/machineset_controller_test.go
Expand Up @@ -49,7 +49,14 @@ func TestReconcile(t *testing.T) {
if err := add(mgr, recFn, r.MachineToMachineSets); err != nil {
t.Errorf("error adding controller to manager: %v", err)
}
defer close(StartTestManager(mgr, t))

stop, errChan := StartTestManager(mgr, t)
defer func() {
close(stop)
if err := <-errChan; err != nil {
t.Fatalf("error starting test manager: %v", err)
}
}()

replicas := int32(2)
labels := map[string]string{"foo": "bar"}
Expand Down
7 changes: 3 additions & 4 deletions pkg/controller/vsphere/machine_scope.go
Expand Up @@ -22,10 +22,9 @@ const (
// machineScopeParams defines the input parameters used to create a new MachineScope.
type machineScopeParams struct {
context.Context
client runtimeclient.Client
apiReader runtimeclient.Reader
machine *machinev1.Machine
vSphereConfig *vSphereConfig
client runtimeclient.Client
apiReader runtimeclient.Reader
machine *machinev1.Machine
}

// machineScope defines a scope defined around a machine and its cluster.
Expand Down
49 changes: 24 additions & 25 deletions pkg/controller/vsphere/machine_scope_test.go
Expand Up @@ -7,8 +7,7 @@ import (
"testing"

machinev1 "github.com/openshift/machine-api-operator/pkg/apis/machine/v1beta1"
apivsphere "github.com/openshift/machine-api-operator/pkg/apis/vsphereprovider/v1alpha1"
vsphereapi "github.com/openshift/machine-api-operator/pkg/apis/vsphereprovider/v1alpha1"
vspherev1 "github.com/openshift/machine-api-operator/pkg/apis/vsphereprovider/v1alpha1"
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/equality"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
Expand All @@ -20,8 +19,8 @@ import (

const TestNamespace = "vsphere-test"

func MachineWithSpec(spec *apivsphere.VSphereMachineProviderSpec) *machinev1.Machine {
rawSpec, err := vsphereapi.RawExtensionFromProviderSpec(spec)
func MachineWithSpec(spec *vspherev1.VSphereMachineProviderSpec) *machinev1.Machine {
rawSpec, err := vspherev1.RawExtensionFromProviderSpec(spec)
if err != nil {
panic("Failed to encode raw extension from provider spec")
}
Expand All @@ -42,7 +41,7 @@ func MachineWithSpec(spec *apivsphere.VSphereMachineProviderSpec) *machinev1.Mac
func TestGetUserData(t *testing.T) {
userDataSecretName := "vsphere-ignition"

defaultProviderSpec := &apivsphere.VSphereMachineProviderSpec{
defaultProviderSpec := &vspherev1.VSphereMachineProviderSpec{
UserDataSecret: &corev1.LocalObjectReference{
Name: userDataSecretName,
},
Expand All @@ -51,7 +50,7 @@ func TestGetUserData(t *testing.T) {
testCases := []struct {
testCase string
userDataSecret *corev1.Secret
providerSpec *apivsphere.VSphereMachineProviderSpec
providerSpec *vspherev1.VSphereMachineProviderSpec
expectedUserdata []byte
expectError bool
}{
Expand Down Expand Up @@ -100,7 +99,7 @@ func TestGetUserData(t *testing.T) {
{
testCase: "no user-data in provider spec",
userDataSecret: nil,
providerSpec: &apivsphere.VSphereMachineProviderSpec{},
providerSpec: &vspherev1.VSphereMachineProviderSpec{},
expectError: false,
expectedUserdata: nil,
},
Expand Down Expand Up @@ -130,7 +129,7 @@ func TestGetUserData(t *testing.T) {
t.Errorf("Unexpected error: %v", err)
}

if bytes.Compare(userData, tc.expectedUserdata) != 0 {
if !bytes.Equal(userData, tc.expectedUserdata) {
t.Errorf("Got: %q, Want: %q", userData, tc.expectedUserdata)
}
})
Expand All @@ -146,7 +145,7 @@ func TestGetCredentialsSecret(t *testing.T) {
testCases := []struct {
testCase string
secret *corev1.Secret
providerSpec *apivsphere.VSphereMachineProviderSpec
providerSpec *vspherev1.VSphereMachineProviderSpec
expectError bool
expectCredentials bool
}{
Expand All @@ -162,11 +161,11 @@ func TestGetCredentialsSecret(t *testing.T) {
expectedCredentialsSecretPassword: []byte(expectedPassword),
},
},
providerSpec: &apivsphere.VSphereMachineProviderSpec{
providerSpec: &vspherev1.VSphereMachineProviderSpec{
CredentialsSecret: &corev1.LocalObjectReference{
Name: "test",
},
Workspace: &apivsphere.Workspace{
Workspace: &vspherev1.Workspace{
Server: expectedServer,
},
},
Expand All @@ -184,11 +183,11 @@ func TestGetCredentialsSecret(t *testing.T) {
expectedCredentialsSecretPassword: []byte(expectedPassword),
},
},
providerSpec: &apivsphere.VSphereMachineProviderSpec{
providerSpec: &vspherev1.VSphereMachineProviderSpec{
CredentialsSecret: &corev1.LocalObjectReference{
Name: "secret-does-not-exist",
},
Workspace: &apivsphere.Workspace{
Workspace: &vspherev1.Workspace{
Server: expectedServer,
},
},
Expand All @@ -206,11 +205,11 @@ func TestGetCredentialsSecret(t *testing.T) {
expectedCredentialsSecretPassword: []byte(expectedPassword),
},
},
providerSpec: &apivsphere.VSphereMachineProviderSpec{
providerSpec: &vspherev1.VSphereMachineProviderSpec{
CredentialsSecret: &corev1.LocalObjectReference{
Name: "test",
},
Workspace: &apivsphere.Workspace{
Workspace: &vspherev1.Workspace{
Server: expectedServer,
},
},
Expand All @@ -228,11 +227,11 @@ func TestGetCredentialsSecret(t *testing.T) {
"badPasswordKey": []byte(expectedPassword),
},
},
providerSpec: &apivsphere.VSphereMachineProviderSpec{
providerSpec: &vspherev1.VSphereMachineProviderSpec{
CredentialsSecret: &corev1.LocalObjectReference{
Name: "test",
},
Workspace: &apivsphere.Workspace{
Workspace: &vspherev1.Workspace{
Server: expectedServer,
},
},
Expand All @@ -250,7 +249,7 @@ func TestGetCredentialsSecret(t *testing.T) {
expectedCredentialsSecretPassword: []byte(expectedPassword),
},
},
providerSpec: &apivsphere.VSphereMachineProviderSpec{},
providerSpec: &vspherev1.VSphereMachineProviderSpec{},
expectError: false,
expectCredentials: false,
},
Expand Down Expand Up @@ -298,25 +297,25 @@ func TestPatchMachine(t *testing.T) {
}

// original objects
originalProviderSpec := apivsphere.VSphereMachineProviderSpec{
originalProviderSpec := vspherev1.VSphereMachineProviderSpec{
CredentialsSecret: &corev1.LocalObjectReference{
Name: "test",
},

Workspace: &apivsphere.Workspace{
Workspace: &vspherev1.Workspace{
Server: server.URL.Host,
Folder: "test",
},
}
rawProviderSpec, err := apivsphere.RawExtensionFromProviderSpec(&originalProviderSpec)
rawProviderSpec, err := vspherev1.RawExtensionFromProviderSpec(&originalProviderSpec)
if err != nil {
t.Fatal(err)
}

originalProviderStatus := &apivsphere.VSphereMachineProviderStatus{
originalProviderStatus := &vspherev1.VSphereMachineProviderStatus{
TaskRef: "test",
}
rawProviderStatus, err := apivsphere.RawExtensionFromProviderStatus(originalProviderStatus)
rawProviderStatus, err := vspherev1.RawExtensionFromProviderStatus(originalProviderStatus)
if err != nil {
t.Fatal(err)
}
Expand Down Expand Up @@ -349,10 +348,10 @@ func TestPatchMachine(t *testing.T) {
Address: "127.0.0.1",
},
}
expectedProviderStatus := &apivsphere.VSphereMachineProviderStatus{
expectedProviderStatus := &vspherev1.VSphereMachineProviderStatus{
TaskRef: "mutated",
}
rawProviderStatus, err = apivsphere.RawExtensionFromProviderStatus(expectedProviderStatus)
rawProviderStatus, err = vspherev1.RawExtensionFromProviderStatus(expectedProviderStatus)
if err != nil {
t.Fatal(err)
}
Expand Down
17 changes: 1 addition & 16 deletions pkg/operator/operator_test.go
Expand Up @@ -6,7 +6,6 @@ import (
"time"

openshiftv1 "github.com/openshift/api/config/v1"
osconfigv1 "github.com/openshift/api/config/v1"
fakeos "github.com/openshift/client-go/config/clientset/versioned/fake"
configinformersv1 "github.com/openshift/client-go/config/informers/externalversions"
"github.com/stretchr/testify/assert"
Expand All @@ -28,20 +27,6 @@ const (
releaseVersion = "0.0.0.test-unit"
)

func newOperatorConfig() *OperatorConfig {
baremetalControllers := BaremetalControllers{}

return &OperatorConfig{
targetNamespace,
Controllers{
"docker.io/openshift/origin-aws-machine-controllers:v4.0.0",
"docker.io/openshift/origin-machine-api-operator:v4.0.0",
"docker.io/openshift/origin-machine-api-operator:v4.0.0",
},
baremetalControllers,
}
}

func newFakeOperator(kubeObjects []runtime.Object, osObjects []runtime.Object, stopCh <-chan struct{}) *Operator {
kubeClient := fakekube.NewSimpleClientset(kubeObjects...)
osClient := fakeos.NewSimpleClientset(osObjects...)
Expand Down Expand Up @@ -72,7 +57,7 @@ func newFakeOperator(kubeObjects []runtime.Object, osObjects []runtime.Object, s
deployInformer.Informer().AddEventHandler(optr.eventHandlerDeployments())
featureGateInformer.Informer().AddEventHandler(optr.eventHandler())

optr.operandVersions = []osconfigv1.OperandVersion{
optr.operandVersions = []openshiftv1.OperandVersion{
{Name: "operator", Version: releaseVersion},
}

Expand Down
7 changes: 3 additions & 4 deletions pkg/operator/status_test.go
Expand Up @@ -35,10 +35,9 @@ func TestPrintOperandVersions(t *testing.T) {

func TestOperatorStatusProgressing(t *testing.T) {
type tCase struct {
currentVersion []osconfigv1.OperandVersion
desiredVersion []osconfigv1.OperandVersion
expectedConditions []osconfigv1.ClusterOperatorStatusCondition
transitionTimeUpdated bool
currentVersion []osconfigv1.OperandVersion
desiredVersion []osconfigv1.OperandVersion
expectedConditions []osconfigv1.ClusterOperatorStatusCondition
}
tCases := []tCase{
{
Expand Down