• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

opendefensecloud / solution-arsenal / 23338972159

20 Mar 2026 10:32AM UTC coverage: 71.595% (-0.1%) from 71.696%
23338972159

Pull #287

github

web-flow
Merge 4c7c48614 into c756a4e61
Pull Request #287: Add e2e test for Flux deployment with bootstrap configuration

2145 of 2996 relevant lines covered (71.6%)

18.13 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

66.35
/pkg/controller/discovery_controller.go
1
// Copyright 2026 BWI GmbH and Artefact Conduit contributors
2
// SPDX-License-Identifier: Apache-2.0
3

4
package controller
5

6
import (
7
        "context"
8
        "fmt"
9
        "slices"
10

11
        corev1 "k8s.io/api/core/v1"
12
        rbacv1 "k8s.io/api/rbac/v1"
13
        apierrors "k8s.io/apimachinery/pkg/api/errors"
14
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
15
        "k8s.io/apimachinery/pkg/runtime"
16
        "k8s.io/apimachinery/pkg/types"
17
        "k8s.io/apimachinery/pkg/util/intstr"
18
        "k8s.io/client-go/tools/events"
19
        ctrl "sigs.k8s.io/controller-runtime"
20
        "sigs.k8s.io/controller-runtime/pkg/client"
21
        "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
22

23
        solarv1alpha1 "go.opendefense.cloud/solar/api/solar/v1alpha1"
24
        "go.opendefense.cloud/solar/pkg/discovery"
25
)
26

27
const (
28
        discoveryFinalizer = "solar.opendefense.cloud/discovery-finalizer"
29
        workerRoleName     = "solar-discovery-worker"
30
)
31

32
// DiscoveryReconciler reconciles a Discovery object
33
type DiscoveryReconciler struct {
34
        client.Client
35
        Scheme        *runtime.Scheme
36
        Recorder      events.EventRecorder
37
        WorkerImage   string
38
        WorkerCommand string
39
        WorkerArgs    []string
40
}
41

42
//nolint:lll
43
//+kubebuilder:rbac:groups=solar.opendefense.cloud,resources=discoveries,verbs=get;list;watch;create;update;patch;delete
44
//+kubebuilder:rbac:groups=solar.opendefense.cloud,resources=discoveries/status,verbs=get;update;patch
45
//+kubebuilder:rbac:groups=solar.opendefense.cloud,resources=discoveries/finalizers,verbs=update
46
//+kubebuilder:rbac:groups="",resources=pods,verbs=get;list;watch;create;update;patch;delete
47
//+kubebuilder:rbac:groups="",resources=secrets,verbs=get;list;watch;create;update;patch;delete
48
//+kubebuilder:rbac:groups="",resources=services,verbs=get;list;watch;create;update;patch;delete
49
//+kubebuilder:rbac:groups="",resources=serviceaccounts,verbs=get;list;watch;create;update;patch;delete
50
//+kubebuilder:rbac:groups=rbac.authorization.k8s.io,resources=rolebindings,verbs=get;list;watch;create;update;patch;delete
51
//+kubebuilder:rbac:groups=rbac.authorization.k8s.io,resources=roles,verbs=get;list;watch;create;update;patch;delete
52
//+kubebuilder:rbac:groups=core,resources=events,verbs=create;patch
53
//+kubebuilder:rbac:groups=events.k8s.io,resources=events,verbs=create;patch
54
//+kubebuilder:rbac:groups=solar.opendefense.cloud,resources=components,verbs=get;list;watch;create;update;patch;delete
55
//+kubebuilder:rbac:groups=solar.opendefense.cloud,resources=componentversions,verbs=get;list;watch;create;update;patch;delete
56

57
// needed in order to be able to grant permissions
58
//+kubebuilder:rbac:groups=solar.opendefense.cloud,resources=components,verbs=get;list;watch;create;update;patch;delete
59
//+kubebuilder:rbac:groups=solar.opendefense.cloud,resources=componentversions,verbs=get;list;watch;create;update;patch;delete
60

61
// Reconcile moves the current state of the cluster closer to the desired state
62
func (r *DiscoveryReconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {
20✔
63
        log := ctrl.LoggerFrom(ctx)
20✔
64
        ctrlResult := ctrl.Result{}
20✔
65

20✔
66
        log.V(1).Info("Discovery is being reconciled", "req", req)
20✔
67

20✔
68
        // Fetch the Order instance
20✔
69
        res := &solarv1alpha1.Discovery{}
20✔
70
        if err := r.Get(ctx, req.NamespacedName, res); err != nil {
21✔
71
                if apierrors.IsNotFound(err) {
2✔
72
                        // Object not found, return. Created objects are automatically garbage collected.
1✔
73
                        return ctrlResult, nil
1✔
74
                }
1✔
75

76
                return ctrlResult, errLogAndWrap(log, err, "failed to get object")
×
77
        }
78

79
        // Handle deletion: cleanup artifact workflows, then remove finalizer
80
        if !res.DeletionTimestamp.IsZero() {
20✔
81
                log.V(1).Info("Discovery is being deleted")
1✔
82
                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "Deleting", "Delete", "Discovery is being deleted, cleaning up worker")
1✔
83

1✔
84
                // Cleanup worker resources, if exists
1✔
85
                if err := r.deleteWorkerResources(ctx, res); err != nil {
1✔
86
                        return ctrlResult, errLogAndWrap(log, err, "failed to clean up worker resources")
×
87
                }
×
88

89
                // Remove finalizer
90
                if slices.Contains(res.Finalizers, discoveryFinalizer) {
2✔
91
                        log.V(1).Info("Removing finalizer from resource")
1✔
92
                        res.Finalizers = slices.DeleteFunc(res.Finalizers, func(f string) bool {
2✔
93
                                return f == discoveryFinalizer
1✔
94
                        })
1✔
95
                        if err := r.Update(ctx, res); err != nil {
1✔
96
                                return ctrlResult, errLogAndWrap(log, err, "failed to remove finalizer")
×
97
                        }
×
98
                }
99

100
                return ctrlResult, nil
1✔
101
        }
102

103
        // Add finalizer if not present and not deleting
104
        if res.DeletionTimestamp.IsZero() {
36✔
105
                if !slices.Contains(res.Finalizers, discoveryFinalizer) {
22✔
106
                        log.V(1).Info("Adding finalizer to resource")
4✔
107
                        res.Finalizers = append(res.Finalizers, discoveryFinalizer)
4✔
108
                        if err := r.Update(ctx, res); err != nil {
4✔
109
                                return ctrlResult, errLogAndWrap(log, err, "failed to add finalizer")
×
110
                        }
×
111
                        // Return without requeue; the Update event will trigger reconciliation again
112
                        return ctrlResult, nil
4✔
113
                }
114
        }
115

116
        pod := &corev1.Pod{}
14✔
117
        err := r.Get(ctx, types.NamespacedName{Name: discoveryPrefixed(res.Name), Namespace: res.Namespace}, pod)
14✔
118
        if err != nil && !apierrors.IsNotFound(err) {
14✔
119
                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "PodNotFound", "GetPod", "Failed to get pod", err)
×
120
                return ctrlResult, errLogAndWrap(log, err, "failed to get pod information")
×
121
        }
×
122

123
        // No pod yet, create it.
124
        if apierrors.IsNotFound(err) {
18✔
125
                if err := r.createWorkerResources(ctx, res); err != nil {
4✔
126
                        return ctrlResult, errLogAndWrap(log, err, "failed to create pod")
×
127
                }
×
128

129
                return ctrlResult, nil
4✔
130
        }
131

132
        // Pod exists, check if it's up to date with our configuration and if it is healthy.
133
        if res.Status.PodGeneration != res.GetGeneration() {
14✔
134
                // Recreate pod, configuration mismatch
4✔
135
                r.Recorder.Eventf(res, nil, corev1.EventTypeNormal, "ConfigurationChanged", "CompareConfiguration", "Configuration changed. Replacing pod.")
4✔
136
                if err := r.deleteWorkerResources(ctx, res); err != nil {
4✔
137
                        return ctrlResult, errLogAndWrap(log, err, "failed to clean up worker resources")
×
138
                }
×
139

140
                if err := r.createWorkerResources(ctx, res); err != nil {
6✔
141
                        return ctrlResult, errLogAndWrap(log, err, "failed to create pod")
2✔
142
                }
2✔
143

144
                return ctrlResult, nil
2✔
145
        } else {
6✔
146
                log.V(1).Info("Configuration hasn't changed", "podGen", res.Status.PodGeneration, "gen", res.GetGeneration())
6✔
147
        }
6✔
148

149
        return ctrlResult, nil
6✔
150
}
151

152
// deleteWorkerResources deletes the resources of the worker pod
153
func (r *DiscoveryReconciler) deleteWorkerResources(ctx context.Context, res *solarv1alpha1.Discovery) error {
5✔
154
        log := ctrl.LoggerFrom(ctx)
5✔
155

5✔
156
        if err := r.Delete(ctx, &corev1.Service{ObjectMeta: metav1.ObjectMeta{Name: discoveryPrefixed(res.Name), Namespace: res.Namespace}}); err != nil && !apierrors.IsNotFound(err) {
5✔
157
                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "ServiceDeletionFailed", "DeleteService", "Failed to delete service", err)
×
158
                return errLogAndWrap(log, err, "service deletion failed")
×
159
        }
×
160

161
        if err := r.Delete(ctx, &corev1.Secret{ObjectMeta: metav1.ObjectMeta{Name: discoveryPrefixed(res.Name), Namespace: res.Namespace}}); err != nil && !apierrors.IsNotFound(err) {
5✔
162
                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "SecretDeletionFailed", "DeleteSecret", "Failed to delete secret", err)
×
163
                return errLogAndWrap(log, err, "secret deletion failed")
×
164
        }
×
165

166
        if err := r.Delete(ctx, &corev1.Pod{ObjectMeta: metav1.ObjectMeta{Name: discoveryPrefixed(res.Name), Namespace: res.Namespace}}); err != nil && !apierrors.IsNotFound(err) {
5✔
167
                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "PodDeletionFailed", "DeletePod", "Failed to delete pod", err)
×
168
                return errLogAndWrap(log, err, "pod deletion failed")
×
169
        }
×
170

171
        if err := r.Delete(ctx, &rbacv1.Role{ObjectMeta: metav1.ObjectMeta{Name: workerRoleName, Namespace: res.Namespace}}); err != nil && !apierrors.IsNotFound(err) {
5✔
172
                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "RoleDeletionFailed", "DeleteRole", "Failed to delete role", err)
×
173
                return errLogAndWrap(log, err, "role deletion failed")
×
174
        }
×
175

176
        if err := r.Delete(ctx, &rbacv1.RoleBinding{ObjectMeta: metav1.ObjectMeta{Name: workerRoleName, Namespace: res.Namespace}}); err != nil && !apierrors.IsNotFound(err) {
5✔
177
                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "RoleBindingDeletionFailed", "DeleteRoleBinding", "Failed to delete rolebinding", err)
×
178
                return errLogAndWrap(log, err, "rolebinding deletion failed")
×
179
        }
×
180

181
        return nil
5✔
182
}
183

184
// createWorkerResources creates the necessary resources for the worker pod
185
func (r *DiscoveryReconciler) createWorkerResources(ctx context.Context, res *solarv1alpha1.Discovery) error {
8✔
186
        log := ctrl.LoggerFrom(ctx)
8✔
187

8✔
188
        // Create or get service account in the discovery's namespace
8✔
189
        workerSA := &corev1.ServiceAccount{
8✔
190
                ObjectMeta: objectMeta(res),
8✔
191
        }
8✔
192

8✔
193
        existingSA := &corev1.ServiceAccount{}
8✔
194
        err := r.Get(ctx, types.NamespacedName{Name: workerSA.Name, Namespace: workerSA.Namespace}, existingSA)
8✔
195
        if err != nil && !apierrors.IsNotFound(err) {
8✔
196
                return errLogAndWrap(log, err, "failed to get service account")
×
197
        }
×
198

199
        if apierrors.IsNotFound(err) {
12✔
200
                if err := r.Create(ctx, workerSA); err != nil {
4✔
201
                        r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "ServiceAccountCreationFailed", "CreateServiceAccount", "Failed to create service account", err)
×
202
                        return errLogAndWrap(log, err, "failed to create service account")
×
203
                }
×
204
                r.Recorder.Eventf(res, workerSA, corev1.EventTypeNormal, "ServiceAccountCreated", "CreateServiceAccount", "ServiceAccount created")
4✔
205
                if err := controllerutil.SetControllerReference(res, workerSA, r.Scheme); err != nil {
4✔
206
                        return errLogAndWrap(log, err, "failed to set controller reference on service account")
×
207
                }
×
208
        }
209

210
        // Create Role to define RBAC permissions required for discovery worker
211
        role := &rbacv1.Role{
8✔
212
                ObjectMeta: metav1.ObjectMeta{
8✔
213
                        Name:      workerRoleName,
8✔
214
                        Namespace: res.Namespace,
8✔
215
                        Labels: map[string]string{
8✔
216
                                "app.kubernetes.io/managed-by": "solar-discovery-controller",
8✔
217
                        },
8✔
218
                },
8✔
219
                Rules: []rbacv1.PolicyRule{
8✔
220
                        {
8✔
221
                                APIGroups: []string{solarv1alpha1.SchemeGroupVersion.Group},
8✔
222
                                Resources: []string{"componentversions", "components"},
8✔
223
                                Verbs:     []string{"get", "list", "watch", "create", "update", "patch", "delete"},
8✔
224
                        },
8✔
225
                },
8✔
226
        }
8✔
227

8✔
228
        existingRole := &rbacv1.Role{}
8✔
229
        err = r.Get(ctx, types.NamespacedName{Name: role.Name, Namespace: role.Namespace}, existingRole)
8✔
230
        if err != nil && !apierrors.IsNotFound(err) {
8✔
231
                return errLogAndWrap(log, err, "failed to get role")
×
232
        }
×
233

234
        if apierrors.IsNotFound(err) {
16✔
235
                if err := r.Create(ctx, role); err != nil {
8✔
236
                        r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "RoleCreationFailed", "CreateRole", "Failed to create role", err)
×
237
                        return errLogAndWrap(log, err, "failed to create role")
×
238
                }
×
239
                r.Recorder.Eventf(res, role, corev1.EventTypeNormal, "RoleCreated", "CreateRole", "Role created")
8✔
240
                if err := controllerutil.SetControllerReference(res, role, r.Scheme); err != nil {
8✔
241
                        return errLogAndWrap(log, err, "failed to set controller reference on role")
×
242
                }
×
243
        } else {
×
244
                // check if out of sync
×
245
                needsUpdate := false
×
246
                if len(existingRole.Rules) != len(role.Rules) ||
×
247
                        !slices.Equal(existingRole.Rules[0].Verbs, role.Rules[0].Verbs) ||
×
248
                        !slices.Equal(existingRole.Rules[0].APIGroups, role.Rules[0].APIGroups) ||
×
249
                        !slices.Equal(existingRole.Rules[0].Resources, role.Rules[0].Resources) {
×
250
                        existingRole.Rules = role.Rules
×
251
                        needsUpdate = true
×
252
                }
×
253
                if needsUpdate {
×
254
                        if err := r.Update(ctx, existingRole); err != nil {
×
255
                                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "RoleUpdateFailed", "UpdateRole", "Failed to update role", err)
×
256
                                return errLogAndWrap(log, err, "failed to update role")
×
257
                        }
×
258
                        r.Recorder.Eventf(res, existingRole, corev1.EventTypeNormal, "RoleUpdated", "UpdateRole", "Role updated")
×
259
                }
260
        }
261

262
        // Create roleBinding to grant RBAC permissions to the worker service account
263
        roleBinding := &rbacv1.RoleBinding{
8✔
264
                ObjectMeta: metav1.ObjectMeta{
8✔
265
                        Name:      workerRoleName,
8✔
266
                        Namespace: res.Namespace,
8✔
267
                        Labels: map[string]string{
8✔
268
                                "app.kubernetes.io/managed-by": "solar-discovery-controller",
8✔
269
                        },
8✔
270
                },
8✔
271
                RoleRef: rbacv1.RoleRef{
8✔
272
                        APIGroup: "rbac.authorization.k8s.io",
8✔
273
                        Kind:     "Role",
8✔
274
                        Name:     workerRoleName,
8✔
275
                },
8✔
276
                Subjects: []rbacv1.Subject{
8✔
277
                        {
8✔
278
                                Kind:      "ServiceAccount",
8✔
279
                                Name:      workerSA.Name,
8✔
280
                                Namespace: res.Namespace,
8✔
281
                        },
8✔
282
                },
8✔
283
        }
8✔
284

8✔
285
        existingRB := &rbacv1.RoleBinding{}
8✔
286
        err = r.Get(ctx, types.NamespacedName{Name: roleBinding.Name, Namespace: roleBinding.Namespace}, existingRB)
8✔
287
        if err != nil && !apierrors.IsNotFound(err) {
8✔
288
                return errLogAndWrap(log, err, "failed to get rolebinding")
×
289
        }
×
290

291
        if apierrors.IsNotFound(err) {
16✔
292
                if err := r.Create(ctx, roleBinding); err != nil {
8✔
293
                        r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "RoleBindingCreationFailed", "CreateRoleBinding", "Failed to create rolebinding", err)
×
294
                        return errLogAndWrap(log, err, "failed to create rolebinding")
×
295
                }
×
296
                r.Recorder.Eventf(res, roleBinding, corev1.EventTypeNormal, "RoleBindingCreated", "CreateRoleBinding", "RoleBinding created")
8✔
297
                if err := controllerutil.SetControllerReference(res, roleBinding, r.Scheme); err != nil {
8✔
298
                        return errLogAndWrap(log, err, "failed to set controller reference on rolebinding")
×
299
                }
×
300
        } else {
×
301
                needsUpdate := false
×
302
                if existingRB.RoleRef.Name != workerRoleName {
×
303
                        existingRB.RoleRef.Name = workerRoleName
×
304
                        needsUpdate = true
×
305
                }
×
306
                if len(existingRB.Subjects) != 1 ||
×
307
                        existingRB.Subjects[0].Kind != "ServiceAccount" ||
×
308
                        existingRB.Subjects[0].Name != discoveryPrefixed(res.Name) ||
×
309
                        existingRB.Subjects[0].Namespace != res.Namespace {
×
310
                        existingRB.Subjects = roleBinding.Subjects
×
311
                        needsUpdate = true
×
312
                }
×
313

314
                if needsUpdate {
×
315
                        if err := r.Update(ctx, existingRB); err != nil {
×
316
                                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "RoleBindingUpdateFailed", "UpdateRoleBinding", "Failed to update rolebinding", err)
×
317
                                return errLogAndWrap(log, err, "failed to update rolebinding")
×
318
                        }
×
319
                        r.Recorder.Eventf(res, existingRB, corev1.EventTypeNormal, "RoleBindingUpdated", "UpdateRoleBinding", "RoleBinding updated")
×
320
                }
321
        }
322

323
        // Create secret
324
        secret := &corev1.Secret{
8✔
325
                ObjectMeta: objectMeta(res),
8✔
326
        }
8✔
327

8✔
328
        rp := discovery.NewRegistryProvider()
8✔
329
        reg := &discovery.Registry{
8✔
330
                Name:      res.Name,
8✔
331
                PlainHTTP: res.Spec.Registry.PlainHTTP,
8✔
332
                Hostname:  res.Spec.Registry.RegistryURL,
8✔
333
        }
8✔
334
        if res.Spec.Webhook != nil {
8✔
335
                reg.WebhookPath = res.Spec.Webhook.Path
×
336
                reg.Flavor = res.Spec.Webhook.Flavor
×
337
        }
×
338
        if res.Spec.DiscoveryInterval != nil {
14✔
339
                reg.ScanInterval = res.Spec.DiscoveryInterval.Duration
6✔
340
        }
6✔
341
        if err := rp.Register(reg); err != nil {
8✔
342
                return errLogAndWrap(log, err, "failed to register registry")
×
343
        }
×
344

345
        // Add credentials if specified
346
        if res.Spec.Registry.SecretRef.Name != "" {
8✔
347
                sec := &corev1.Secret{}
×
348
                if err := r.Get(ctx, types.NamespacedName{Name: res.Spec.Registry.SecretRef.Name, Namespace: res.Namespace}, sec); err != nil {
×
349
                        return errLogAndWrap(log, err, "failed to get registry secret")
×
350
                } else {
×
351
                        username, okUser := sec.Data["username"]
×
352
                        password, okPass := sec.Data["password"]
×
353
                        if okUser && okPass {
×
354
                                reg.Credentials = &discovery.RegistryCredentials{
×
355
                                        Username: string(username),
×
356
                                        Password: string(password),
×
357
                                }
×
358
                        } else {
×
359
                                return fmt.Errorf("registry secret is missing username or password fields")
×
360
                        }
×
361
                }
362
        }
363

364
        confData, err := rp.Marshal()
8✔
365
        if err != nil {
8✔
366
                return errLogAndWrap(log, err, "failed to marshal registry configuration")
×
367
        }
×
368
        secret.StringData = map[string]string{
8✔
369
                "config.yaml": string(confData),
8✔
370
        }
8✔
371

8✔
372
        existingSecret := &corev1.Secret{}
8✔
373
        err = r.Get(ctx, types.NamespacedName{Name: secret.Name, Namespace: secret.Namespace}, existingSecret)
8✔
374
        if err != nil && !apierrors.IsNotFound(err) {
8✔
375
                return errLogAndWrap(log, err, "failed to get secret")
×
376
        }
×
377

378
        if apierrors.IsNotFound(err) {
16✔
379
                if err := r.Create(ctx, secret); err != nil {
8✔
380
                        r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "SecretCreationFailed", "CreateSecret", "Failed to create secret", err)
×
381
                        return errLogAndWrap(log, err, "failed to create secret")
×
382
                }
×
383
                r.Recorder.Eventf(res, secret, corev1.EventTypeNormal, "SecretCreated", "CreateSecret", "Secret created")
8✔
384

8✔
385
                if err := controllerutil.SetControllerReference(res, secret, r.Scheme); err != nil {
8✔
386
                        return errLogAndWrap(log, err, "failed to set controller reference")
×
387
                }
×
388
        } else {
×
389
                existingSecret.StringData = secret.StringData
×
390
                if err := r.Update(ctx, existingSecret); err != nil {
×
391
                        r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "SecretUpdateFailed", "UpdateSecret", "Failed to update secret", err)
×
392
                        return errLogAndWrap(log, err, "failed to update secret")
×
393
                }
×
394
                r.Recorder.Eventf(res, existingSecret, corev1.EventTypeNormal, "SecretUpdated", "UpdateSecret", "Secret updated")
×
395

×
396
                if err := controllerutil.SetControllerReference(res, existingSecret, r.Scheme); err != nil {
×
397
                        return errLogAndWrap(log, err, "failed to set controller reference")
×
398
                }
×
399
        }
400

401
        // Create pod
402
        var args = r.WorkerArgs
8✔
403
        args = append(args, "--config", "/etc/worker/config.yaml", "--namespace", res.Namespace)
8✔
404
        pod := &corev1.Pod{
8✔
405
                ObjectMeta: objectMeta(res),
8✔
406
                Spec: corev1.PodSpec{
8✔
407
                        ServiceAccountName: workerSA.Name,
8✔
408
                        Volumes: []corev1.Volume{
8✔
409
                                {
8✔
410
                                        Name: "config",
8✔
411
                                        VolumeSource: corev1.VolumeSource{
8✔
412
                                                Secret: &corev1.SecretVolumeSource{
8✔
413
                                                        SecretName: discoveryPrefixed(res.Name),
8✔
414
                                                },
8✔
415
                                        },
8✔
416
                                },
8✔
417
                        },
8✔
418
                },
8✔
419
        }
8✔
420

8✔
421
        container := corev1.Container{
8✔
422

8✔
423
                Name:    "worker",
8✔
424
                Image:   r.WorkerImage,
8✔
425
                Command: []string{r.WorkerCommand},
8✔
426
                Args:    args,
8✔
427
                VolumeMounts: []corev1.VolumeMount{
8✔
428
                        {
8✔
429
                                Name:      "config",
8✔
430
                                ReadOnly:  true,
8✔
431
                                MountPath: "/etc/worker"},
8✔
432
                },
8✔
433
                Ports: []corev1.ContainerPort{
8✔
434
                        {
8✔
435
                                Name:          "webhook",
8✔
436
                                ContainerPort: 8080,
8✔
437
                        },
8✔
438
                },
8✔
439
        }
8✔
440

8✔
441
        if cmName := res.Spec.Registry.CAConfigMapRef.Name; cmName != "" {
9✔
442
                pod.Spec.Volumes = append(pod.Spec.Volumes, corev1.Volume{
1✔
443
                        Name: "ca-bundle",
1✔
444
                        VolumeSource: corev1.VolumeSource{
1✔
445
                                ConfigMap: &corev1.ConfigMapVolumeSource{
1✔
446
                                        LocalObjectReference: corev1.LocalObjectReference{
1✔
447
                                                Name: cmName,
1✔
448
                                        },
1✔
449
                                        Items: []corev1.KeyToPath{
1✔
450
                                                {
1✔
451
                                                        Key:  "trust-bundle.pem",
1✔
452
                                                        Path: "ca-bundle.pem",
1✔
453
                                                },
1✔
454
                                        },
1✔
455
                                },
1✔
456
                        },
1✔
457
                })
1✔
458
                container.VolumeMounts = append(container.VolumeMounts, corev1.VolumeMount{
1✔
459
                        Name:      "ca-bundle",
1✔
460
                        MountPath: "/etc/ssl/certs",
1✔
461
                        ReadOnly:  true,
1✔
462
                })
1✔
463
                container.Env = append(container.Env, corev1.EnvVar{
1✔
464
                        Name:  "SSL_CERT_FILE",
1✔
465
                        Value: "/etc/ssl/certs/ca-bundle.pem",
1✔
466
                })
1✔
467
        }
1✔
468

469
        pod.Spec.Containers = []corev1.Container{container}
8✔
470

8✔
471
        // Set owner references
8✔
472
        if err := controllerutil.SetControllerReference(res, pod, r.Scheme); err != nil {
8✔
473
                return errLogAndWrap(log, err, "failed to set controller reference")
×
474
        }
×
475

476
        // Create pod in cluster
477
        if err := r.Create(ctx, pod); err != nil {
8✔
478
                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "PodCreationFailed", "CreatePod", "Failed to create pod", err)
×
479
                return errLogAndWrap(log, err, "failed to create pod")
×
480
        }
×
481
        r.Recorder.Eventf(res, pod, corev1.EventTypeNormal, "PodCreated", "CreatePod", "Pod created")
8✔
482
        log.V(1).Info("Pod created", "podGen", res.GetGeneration())
8✔
483

8✔
484
        // Create or update service
8✔
485
        svc := &corev1.Service{
8✔
486
                ObjectMeta: objectMeta(res),
8✔
487
                Spec: corev1.ServiceSpec{
8✔
488
                        Type:     corev1.ServiceTypeClusterIP,
8✔
489
                        Ports:    []corev1.ServicePort{{Name: "webhook", Port: 8080, TargetPort: intstr.FromString("webhook")}},
8✔
490
                        Selector: map[string]string{"app.kubernetes.io/name": discoveryPrefixed(res.Name)},
8✔
491
                },
8✔
492
        }
8✔
493

8✔
494
        existingSvc := &corev1.Service{}
8✔
495
        err = r.Get(ctx, types.NamespacedName{Name: svc.Name, Namespace: svc.Namespace}, existingSvc)
8✔
496
        if err != nil && !apierrors.IsNotFound(err) {
8✔
497
                return errLogAndWrap(log, err, "failed to get service")
×
498
        }
×
499

500
        if apierrors.IsNotFound(err) {
16✔
501
                if err := r.Create(ctx, svc); err != nil {
8✔
502
                        r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "ServiceCreationFailed", "CreateService", "Failed to create service", err)
×
503
                        return errLogAndWrap(log, err, "failed to create service")
×
504
                }
×
505
                r.Recorder.Eventf(res, svc, corev1.EventTypeNormal, "ServiceCreated", "CreateService", "Service created")
8✔
506
        } else {
×
507
                existingSvc.Spec = svc.Spec
×
508
                if err := r.Update(ctx, existingSvc); err != nil {
×
509
                        r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "ServiceUpdateFailed", "UpdateService", "Failed to update service", err)
×
510
                        return errLogAndWrap(log, err, "failed to update service")
×
511
                }
×
512
                r.Recorder.Eventf(res, existingSvc, corev1.EventTypeNormal, "ServiceUpdated", "UpdateService", "Service updated")
×
513
        }
514

515
        // Update discovery version in status
516
        res.Status.PodGeneration = res.GetGeneration()
8✔
517
        if err := r.Status().Update(ctx, res); err != nil {
10✔
518
                return errLogAndWrap(log, err, "failed to update status")
2✔
519
        }
2✔
520

521
        return nil
6✔
522
}
523

524
func objectMeta(res *solarv1alpha1.Discovery) metav1.ObjectMeta {
32✔
525
        labels := res.Labels
32✔
526
        if labels == nil {
64✔
527
                labels = make(map[string]string)
32✔
528
        }
32✔
529
        labels["app.kubernetes.io/managed-by"] = "solar-discovery-controller"
32✔
530
        labels["app.kubernetes.io/component"] = "discovery-worker"
32✔
531
        labels["app.kubernetes.io/instance"] = res.Name
32✔
532
        labels["app.kubernetes.io/name"] = discoveryPrefixed(res.Name)
32✔
533

32✔
534
        return metav1.ObjectMeta{
32✔
535
                Name:        discoveryPrefixed(res.Name),
32✔
536
                Namespace:   res.Namespace,
32✔
537
                Labels:      labels,
32✔
538
                Annotations: res.Annotations,
32✔
539
        }
32✔
540
}
541

542
// discoveryPrefixed returns the name of the discovery prefixed resource
543
func discoveryPrefixed(discoveryName string) string {
127✔
544
        return fmt.Sprintf("discovery-%s", discoveryName)
127✔
545
}
127✔
546

547
// SetupWithManager sets up the controller with the Manager.
548
func (r *DiscoveryReconciler) SetupWithManager(mgr ctrl.Manager) error {
1✔
549
        return ctrl.NewControllerManagedBy(mgr).
1✔
550
                For(&solarv1alpha1.Discovery{}).
1✔
551
                Owns(&corev1.Pod{}).
1✔
552
                Owns(&corev1.Secret{}).
1✔
553
                Complete(r)
1✔
554
}
1✔
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc