• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

opendefensecloud / solution-arsenal / 25548725966

08 May 2026 09:43AM UTC coverage: 70.931% (-0.2%) from 71.112%
25548725966

push

github

web-flow
fix(deps): update k8s.io/kube-openapi digest to 19c3011 (#512)

This PR contains the following updates:

| Package | Type | Update | Change |
|---|---|---|---|
|
[k8s.io/kube-openapi](https://redirect.github.com/kubernetes/kube-openapi)
| require | digest | `3334182` → `19c3011` |

---

### Configuration

📅 **Schedule**: (UTC)

- Branch creation
  - At any time (no schedule defined)
- Automerge
  - At any time (no schedule defined)

🚦 **Automerge**: Disabled by config. Please merge this manually once you
are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the
rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update
again.

---

- [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check
this box

---

This PR was generated by [Mend Renovate](https://mend.io/renovate/).
View the [repository job
log](https://developer.mend.io/github/opendefensecloud/solution-arsenal).

<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My4xNTkuMiIsInVwZGF0ZWRJblZlciI6IjQzLjE1OS4yIiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6W119-->

2340 of 3299 relevant lines covered (70.93%)

28.88 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

87.24
/pkg/controller/rendertask_controller.go
1
// Copyright 2026 BWI GmbH and Solution Arsenal contributors
2
// SPDX-License-Identifier: Apache-2.0
3

4
package controller
5

6
import (
7
        "context"
8
        "encoding/json"
9
        "fmt"
10
        "strings"
11
        "time"
12

13
        batchv1 "k8s.io/api/batch/v1"
14
        corev1 "k8s.io/api/core/v1"
15
        apierrors "k8s.io/apimachinery/pkg/api/errors"
16
        apimeta "k8s.io/apimachinery/pkg/api/meta"
17
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
18
        "k8s.io/apimachinery/pkg/runtime"
19
        "k8s.io/client-go/tools/events"
20
        ctrl "sigs.k8s.io/controller-runtime"
21
        "sigs.k8s.io/controller-runtime/pkg/client"
22
        "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
23

24
        solarv1alpha1 "go.opendefense.cloud/solar/api/solar/v1alpha1"
25
)
26

27
const (
28
        annotationJobName    = "solar.opendefense.cloud/job-name"
29
        annotationSecretName = "solar.opendefense.cloud/secret-name"
30

31
        // Condition types
32
        ConditionTypeJobScheduled = "JobScheduled"
33
        ConditionTypeJobSucceeded = "JobSucceeded"
34
        ConditionTypeJobFailed    = "JobFailed"
35

36
        ConditionTypeTaskCompleted = "TaskCompleted"
37
        ConditionTypeTaskFailed    = "TaskFailed"
38
)
39

40
// RenderTaskReconciler reconciles a RenderTask object.
41
// Each RenderTask carries its own BaseURL and PushSecretRef for the target registry.
42
type RenderTaskReconciler struct {
43
        client.Client
44
        Scheme              *runtime.Scheme
45
        Recorder            events.EventRecorder
46
        RendererImage       string
47
        RendererCommand     string
48
        RendererArgs        []string
49
        RendererCAConfigMap string
50
        // WatchNamespace restricts reconciliation to this namespace.
51
        // Should be empty in production (watches all namespaces).
52
        // Intended for use in integration tests only.
53
        // See: https://book.kubebuilder.io/reference/envtest#testing-considerations
54
        WatchNamespace string
55
}
56

57
//+kubebuilder:rbac:groups=solar.opendefense.cloud,resources=rendertasks,verbs=get;list;watch;create;update;patch;delete
58
//+kubebuilder:rbac:groups=solar.opendefense.cloud,resources=rendertasks/status,verbs=get;update;patch
59
//+kubebuilder:rbac:groups=solar.opendefense.cloud,resources=rendertasks/finalizers,verbs=update
60
//+kubebuilder:rbac:groups=batch,resources=jobs,verbs=get;list;watch;create;update;patch;delete
61
//+kubebuilder:rbac:groups="",resources=secrets,verbs=get;list;watch;create;update;patch;delete
62
//+kubebuilder:rbac:groups=core,resources=events,verbs=create;patch
63
//+kubebuilder:rbac:groups=events.k8s.io,resources=events,verbs=create;patch
64

65
// Reconcile moves the current state of the cluster closer to the desired state
66
func (r *RenderTaskReconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {
461✔
67
        log := ctrl.LoggerFrom(ctx)
461✔
68
        ctrlResult := ctrl.Result{}
461✔
69

461✔
70
        log.V(1).Info("RenderTask is being reconciled", "req", req)
461✔
71

461✔
72
        if r.WatchNamespace != "" && req.Namespace != r.WatchNamespace {
486✔
73
                return ctrlResult, nil
25✔
74
        }
25✔
75

76
        // Fetch the RenderTask instance
77
        res := &solarv1alpha1.RenderTask{}
436✔
78
        if err := r.Get(ctx, req.NamespacedName, res); err != nil {
437✔
79
                if apierrors.IsNotFound(err) {
2✔
80
                        return ctrlResult, nil
1✔
81
                }
1✔
82

83
                return ctrlResult, errLogAndWrap(log, err, "failed to get object")
×
84
        }
85

86
        // RenderTask instance marked for deletion, stop reconciling
87
        if !res.DeletionTimestamp.IsZero() {
435✔
88
                log.V(1).Info("RenderTask is being deleted")
×
89
                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "Deleting", "Delete", "RenderTask is being deleted, cleaning up secret and job")
×
90

×
91
                return ctrlResult, nil
×
92
        }
×
93

94
        // Check if renderjob has already completed successfully
95
        sc := apimeta.FindStatusCondition(res.Status.Conditions, ConditionTypeJobSucceeded)
435✔
96
        if sc != nil && sc.ObservedGeneration >= res.Generation && sc.Status == metav1.ConditionTrue {
439✔
97
                log.V(1).Info("RenderTask has already completed successfully, no further action needed")
4✔
98

4✔
99
                return ctrlResult, nil
4✔
100
        }
4✔
101

102
        // Determine the namespace for Jobs/Secrets — use the RenderTask's namespace
103
        jobNS := r.taskNamespace(res)
431✔
104

431✔
105
        // Reconcile Config Secret
431✔
106
        configSecret := &corev1.Secret{}
431✔
107
        err := r.Get(ctx, r.configSecretKey(res, jobNS), configSecret)
431✔
108
        if err != nil && apierrors.IsNotFound(err) {
719✔
109
                createdSecret, err := r.createConfigSecret(ctx, res, jobNS)
288✔
110
                if err != nil {
288✔
111
                        r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "CreateSecretFailed", "CreateConfigSecret", "Failed to create config secret: %s", err)
×
112

×
113
                        return ctrlResult, errLogAndWrap(log, err, "failed to create secret")
×
114
                }
×
115

116
                configSecret = createdSecret
288✔
117
        } else if err != nil {
143✔
118
                return ctrlResult, errLogAndWrap(log, err, "could not get secret")
×
119
        }
×
120

121
        // Resolve push secret from the RenderTask's PushSecretRef
122
        var pushSecret *corev1.Secret
431✔
123
        if res.Spec.PushSecretRef != nil {
862✔
124
                pushSecret = &corev1.Secret{}
431✔
125
                if err := r.Get(ctx, client.ObjectKey{Name: res.Spec.PushSecretRef.Name, Namespace: jobNS}, pushSecret); err != nil {
508✔
126
                        return ctrlResult, errLogAndWrap(log, err, "failed to get push secret")
77✔
127
                }
77✔
128
        }
129

130
        // Reconcile Job
131
        job := &batchv1.Job{}
354✔
132
        err = r.Get(ctx, r.renderJobKey(res, jobNS), job)
354✔
133
        if err != nil && apierrors.IsNotFound(err) {
370✔
134
                err := r.createRenderJob(ctx, res, configSecret, pushSecret, jobNS)
16✔
135
                if err != nil {
16✔
136
                        r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "CreateJobFailed", "CreateJob", "Failed to create job: %s", err)
×
137

×
138
                        return ctrlResult, errLogAndWrap(log, err, "failed to create job")
×
139
                }
×
140
        } else if err != nil {
338✔
141
                return ctrlResult, errLogAndWrap(log, err, "could not get job")
×
142
        }
×
143

144
        // Update Status
145
        if changed := r.updateResourceStatusFromJob(ctx, res, job); changed {
379✔
146
                if err := r.Status().Update(ctx, res); err != nil {
30✔
147
                        return ctrlResult, errLogAndWrap(log, err, "failed to update status")
5✔
148
                }
5✔
149
        }
150

151
        ttlDuration := time.Duration(ttlSeconds(res.Spec.FailedJobTTL)) * time.Second
349✔
152

349✔
153
        switch {
349✔
154
        case job.Status.Succeeded > 0:
3✔
155
                cleanupRenderResources(ctx, r, res, job, jobNS)
3✔
156
                log.V(1).Info("Cleaned up after successful job")
3✔
157

3✔
158
                return ctrlResult, nil
3✔
159

160
        case job.Status.Failed > 0:
314✔
161
                if shouldCleanupSecrets(res, ttlDuration) {
624✔
162
                        cleanupSecrets(ctx, r, res, jobNS)
310✔
163
                        log.V(1).Info("Cleaned up secrets after failed job TTL")
310✔
164

310✔
165
                        return ctrlResult, nil
310✔
166
                }
310✔
167

168
                remaining := remainingTTL(res, ttlDuration)
4✔
169
                log.V(1).Info("Waiting for TTL to expire before cleaning up secrets", "remainingSeconds", remaining.Seconds())
4✔
170

4✔
171
                return ctrl.Result{RequeueAfter: remaining + time.Second}, nil
4✔
172
        }
173

174
        return ctrlResult, nil
32✔
175
}
176

177
// taskNamespace returns the namespace to use for Jobs/Secrets.
178
func (r *RenderTaskReconciler) taskNamespace(res *solarv1alpha1.RenderTask) string {
431✔
179
        return res.Namespace
431✔
180
}
431✔
181

182
// updateResourceStatusFromJob updates the resource status based on job status
183
func (r *RenderTaskReconciler) updateResourceStatusFromJob(ctx context.Context, res *solarv1alpha1.RenderTask, job *batchv1.Job) (changed bool) {
354✔
184
        log := ctrl.LoggerFrom(ctx)
354✔
185

354✔
186
        if job == nil {
354✔
187
                changed = apimeta.SetStatusCondition(&res.Status.Conditions, metav1.Condition{
×
188
                        Type:               ConditionTypeJobScheduled,
×
189
                        Status:             metav1.ConditionFalse,
×
190
                        ObservedGeneration: res.Generation,
×
191
                        Reason:             "DoesNotExist",
×
192
                        Message:            "Renderer job does not exist",
×
193
                })
×
194

×
195
                return changed
×
196
        }
×
197

198
        if job.Status.Succeeded > 0 {
357✔
199
                changed = apimeta.SetStatusCondition(&res.Status.Conditions, metav1.Condition{
3✔
200
                        Type:               ConditionTypeJobSucceeded,
3✔
201
                        Status:             metav1.ConditionTrue,
3✔
202
                        ObservedGeneration: res.Generation,
3✔
203
                        Reason:             "JobSucceeded",
3✔
204
                        Message:            fmt.Sprintf("Renderer job completed successfully at %v", job.Status.CompletionTime),
3✔
205
                })
3✔
206

3✔
207
                chartURL := r.reference(res.Spec.BaseURL, res.Spec.Repository, res.Spec.Tag)
3✔
208
                if res.Status.ChartURL != chartURL {
6✔
209
                        res.Status.ChartURL = chartURL
3✔
210
                        changed = true
3✔
211
                }
3✔
212

213
                r.Recorder.Eventf(res, job, corev1.EventTypeNormal, "JobSucceeded", "RunJob", "Renderer job completed successfully")
3✔
214
                log.V(1).Info("Job succeeded", "name", job.Name)
3✔
215

3✔
216
                return changed
3✔
217
        }
218

219
        if job.Status.Failed > 0 {
665✔
220
                changed = apimeta.SetStatusCondition(&res.Status.Conditions, metav1.Condition{
314✔
221
                        Type:               ConditionTypeJobFailed,
314✔
222
                        Status:             metav1.ConditionTrue,
314✔
223
                        ObservedGeneration: res.Generation,
314✔
224
                        Reason:             "JobFailed",
314✔
225
                        Message:            "Renderer job failed",
314✔
226
                })
314✔
227
                r.Recorder.Eventf(res, job, corev1.EventTypeWarning, "JobFailed", "RunJob", "Renderer job failed")
314✔
228
                log.V(1).Info("Job failed", "name", job.Name)
314✔
229

314✔
230
                return changed
314✔
231
        }
314✔
232

233
        return apimeta.SetStatusCondition(&res.Status.Conditions, metav1.Condition{
37✔
234
                Type:               ConditionTypeJobScheduled,
37✔
235
                Status:             metav1.ConditionTrue,
37✔
236
                ObservedGeneration: res.Generation,
37✔
237
                Reason:             "JobScheduled",
37✔
238
                Message:            fmt.Sprintf("Renderer job is running (active: %d, succeeded: %d, failed: %d)", job.Status.Active, job.Status.Succeeded, job.Status.Failed),
37✔
239
        })
37✔
240
}
241

242
func (r *RenderTaskReconciler) deleteRenderJob(ctx context.Context, res *solarv1alpha1.RenderTask, jobNS string) error {
3✔
243
        job := &batchv1.Job{}
3✔
244
        if err := r.Get(ctx, r.renderJobKey(res, jobNS), job); err != nil {
3✔
245
                return err
×
246
        }
×
247

248
        return r.Delete(ctx, job, client.PropagationPolicy(metav1.DeletePropagationBackground))
3✔
249
}
250

251
func (r *RenderTaskReconciler) deleteConfigSecret(ctx context.Context, res *solarv1alpha1.RenderTask, jobNS string) error {
313✔
252
        secret := &corev1.Secret{}
313✔
253
        if err := r.Get(ctx, r.configSecretKey(res, jobNS), secret); err != nil {
316✔
254
                return err
3✔
255
        }
3✔
256

257
        return r.Delete(ctx, secret, client.PropagationPolicy(metav1.DeletePropagationBackground))
310✔
258
}
259

260
func (r *RenderTaskReconciler) createRenderJob(ctx context.Context, res *solarv1alpha1.RenderTask, configSecret, pushSecret *corev1.Secret, jobNS string) error {
16✔
261
        log := ctrl.LoggerFrom(ctx)
16✔
262

16✔
263
        jobKey := r.renderJobKey(res, jobNS)
16✔
264
        jobName := jobKey.Name
16✔
265
        backoffLimit := int32(3)
16✔
266
        ttlSecondsAfterFinished := int32(3600)
16✔
267
        if res.Spec.FailedJobTTL != nil {
18✔
268
                ttlSecondsAfterFinished = *res.Spec.FailedJobTTL
2✔
269
        }
2✔
270

271
        volumes := []corev1.Volume{
16✔
272
                {
16✔
273
                        Name: "config",
16✔
274
                        VolumeSource: corev1.VolumeSource{
16✔
275
                                Secret: &corev1.SecretVolumeSource{
16✔
276
                                        SecretName: configSecret.Name,
16✔
277
                                        Items: []corev1.KeyToPath{
16✔
278
                                                {
16✔
279
                                                        Key:  "config.json",
16✔
280
                                                        Path: "config.json",
16✔
281
                                                },
16✔
282
                                        },
16✔
283
                                },
16✔
284
                        },
16✔
285
                },
16✔
286
        }
16✔
287
        volumeMounts := []corev1.VolumeMount{
16✔
288
                {
16✔
289
                        Name:      "config",
16✔
290
                        MountPath: "/etc/renderer/config.json",
16✔
291
                        SubPath:   "config.json",
16✔
292
                        ReadOnly:  true,
16✔
293
                },
16✔
294
        }
16✔
295
        envVars := []corev1.EnvVar{
16✔
296
                {
16✔
297
                        Name: "POD_NAMESPACE",
16✔
298
                        ValueFrom: &corev1.EnvVarSource{
16✔
299
                                FieldRef: &corev1.ObjectFieldSelector{
16✔
300
                                        FieldPath: "metadata.namespace",
16✔
301
                                },
16✔
302
                        },
16✔
303
                },
16✔
304
                {
16✔
305
                        Name: "POD_NAME",
16✔
306
                        ValueFrom: &corev1.EnvVarSource{
16✔
307
                                FieldRef: &corev1.ObjectFieldSelector{
16✔
308
                                        FieldPath: "metadata.name",
16✔
309
                                },
16✔
310
                        },
16✔
311
                },
16✔
312
        }
16✔
313

16✔
314
        if r.RendererCAConfigMap != "" {
32✔
315
                volumes = append(volumes, corev1.Volume{
16✔
316
                        Name: "ca-bundle",
16✔
317
                        VolumeSource: corev1.VolumeSource{
16✔
318
                                ConfigMap: &corev1.ConfigMapVolumeSource{
16✔
319
                                        LocalObjectReference: corev1.LocalObjectReference{
16✔
320
                                                Name: r.RendererCAConfigMap,
16✔
321
                                        },
16✔
322
                                        Items: []corev1.KeyToPath{
16✔
323
                                                {
16✔
324
                                                        Key:  "trust-bundle.pem",
16✔
325
                                                        Path: "ca-bundle.pem",
16✔
326
                                                },
16✔
327
                                        },
16✔
328
                                },
16✔
329
                        },
16✔
330
                })
16✔
331
                volumeMounts = append(volumeMounts, corev1.VolumeMount{
16✔
332
                        Name:      "ca-bundle",
16✔
333
                        MountPath: "/etc/ssl/certs",
16✔
334
                        ReadOnly:  true,
16✔
335
                })
16✔
336
                envVars = append(envVars, corev1.EnvVar{
16✔
337
                        Name:  "SSL_CERT_FILE",
16✔
338
                        Value: "/etc/ssl/certs/ca-bundle.pem",
16✔
339
                })
16✔
340
        }
16✔
341

342
        pushURL := r.reference(res.Spec.BaseURL, res.Spec.Repository, res.Spec.Tag)
16✔
343

16✔
344
        job := &batchv1.Job{
16✔
345
                ObjectMeta: metav1.ObjectMeta{
16✔
346
                        Name:      jobName,
16✔
347
                        Namespace: jobKey.Namespace,
16✔
348
                        Annotations: map[string]string{
16✔
349
                                annotationJobName: jobName,
16✔
350
                        },
16✔
351
                },
16✔
352
                Spec: batchv1.JobSpec{
16✔
353
                        BackoffLimit:            &backoffLimit,
16✔
354
                        TTLSecondsAfterFinished: &ttlSecondsAfterFinished,
16✔
355
                        Template: corev1.PodTemplateSpec{
16✔
356
                                Spec: corev1.PodSpec{
16✔
357
                                        RestartPolicy: corev1.RestartPolicyNever,
16✔
358
                                        Containers: []corev1.Container{
16✔
359
                                                {
16✔
360
                                                        Name:    "renderer",
16✔
361
                                                        Image:   r.RendererImage,
16✔
362
                                                        Command: []string{r.RendererCommand},
16✔
363
                                                        Args: append(r.RendererArgs,
16✔
364
                                                                "/etc/renderer/config.json",
16✔
365
                                                                fmt.Sprintf("--url=%s", pushURL),
16✔
366
                                                        ),
16✔
367
                                                        Env:          envVars,
16✔
368
                                                        VolumeMounts: volumeMounts,
16✔
369
                                                },
16✔
370
                                        },
16✔
371
                                        Volumes: volumes,
16✔
372
                                },
16✔
373
                        },
16✔
374
                },
16✔
375
        }
16✔
376

16✔
377
        if pushSecret != nil {
32✔
378
                switch pushSecret.Type {
16✔
379
                case corev1.SecretTypeBasicAuth:
1✔
380
                        job.Spec.Template.Spec.Containers[0].Env = append(job.Spec.Template.Spec.Containers[0].Env,
1✔
381
                                corev1.EnvVar{
1✔
382
                                        Name: "REGISTRY_USERNAME",
1✔
383
                                        ValueFrom: &corev1.EnvVarSource{
1✔
384
                                                SecretKeyRef: &corev1.SecretKeySelector{
1✔
385
                                                        LocalObjectReference: corev1.LocalObjectReference{
1✔
386
                                                                Name: pushSecret.Name,
1✔
387
                                                        },
1✔
388
                                                        Key: "username",
1✔
389
                                                },
1✔
390
                                        },
1✔
391
                                },
1✔
392
                                corev1.EnvVar{
1✔
393
                                        Name: "REGISTRY_PASSWORD",
1✔
394
                                        ValueFrom: &corev1.EnvVarSource{
1✔
395
                                                SecretKeyRef: &corev1.SecretKeySelector{
1✔
396
                                                        LocalObjectReference: corev1.LocalObjectReference{
1✔
397
                                                                Name: pushSecret.Name,
1✔
398
                                                        },
1✔
399
                                                        Key: "password",
1✔
400
                                                },
1✔
401
                                        },
1✔
402
                                },
1✔
403
                        )
1✔
404

405
                case corev1.SecretTypeDockerConfigJson:
1✔
406
                        job.Spec.Template.Spec.Volumes = append(job.Spec.Template.Spec.Volumes, corev1.Volume{
1✔
407
                                Name: "dockerconfig",
1✔
408
                                VolumeSource: corev1.VolumeSource{
1✔
409
                                        Secret: &corev1.SecretVolumeSource{
1✔
410
                                                SecretName: pushSecret.Name,
1✔
411
                                                Items: []corev1.KeyToPath{
1✔
412
                                                        {
1✔
413
                                                                Key:  ".dockerconfigjson",
1✔
414
                                                                Path: "dockerconfig.json",
1✔
415
                                                        },
1✔
416
                                                },
1✔
417
                                        },
1✔
418
                                },
1✔
419
                        })
1✔
420

1✔
421
                        job.Spec.Template.Spec.Containers[0].VolumeMounts = append(job.Spec.Template.Spec.Containers[0].VolumeMounts, corev1.VolumeMount{
1✔
422
                                Name:      "dockerconfig",
1✔
423
                                MountPath: "/etc/renderer/dockerconfig.json",
1✔
424
                                SubPath:   "dockerconfig.json",
1✔
425
                                ReadOnly:  true,
1✔
426
                        })
1✔
427

1✔
428
                        job.Spec.Template.Spec.Containers[0].Env = append(job.Spec.Template.Spec.Containers[0].Env, corev1.EnvVar{
1✔
429
                                Name:  "DOCKER_CONFIG",
1✔
430
                                Value: "/etc/renderer/dockerconfig.json",
1✔
431
                        })
1✔
432
                default:
14✔
433
                }
434
        }
435

436
        // Set owner references
437
        if err := controllerutil.SetControllerReference(res, job, r.Scheme); err != nil {
16✔
438
                return errLogAndWrap(log, err, "failed to set controller reference")
×
439
        }
×
440

441
        if err := r.Create(ctx, job); err != nil {
16✔
442
                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "CreationFailed", "Create", "Failed to create job: %s", err)
×
443

×
444
                return errLogAndWrap(log, err, "job creation failed")
×
445
        }
×
446

447
        res.Status.JobRef = &corev1.ObjectReference{
16✔
448
                APIVersion: batchv1.SchemeGroupVersion.String(),
16✔
449
                Kind:       "Job",
16✔
450
                Namespace:  job.Namespace,
16✔
451
                Name:       job.Name,
16✔
452
        }
16✔
453

16✔
454
        if err := r.Status().Update(ctx, res); err != nil {
16✔
455
                return errLogAndWrap(log, err, "failed to update status")
×
456
        }
×
457

458
        return nil
16✔
459
}
460

461
func (r *RenderTaskReconciler) createConfigSecret(ctx context.Context, res *solarv1alpha1.RenderTask, jobNS string) (*corev1.Secret, error) {
288✔
462
        log := ctrl.LoggerFrom(ctx)
288✔
463

288✔
464
        cfgJson, err := json.Marshal(res.Spec.RendererConfig)
288✔
465
        if err != nil {
288✔
466
                return nil, err
×
467
        }
×
468

469
        secretKey := r.configSecretKey(res, jobNS)
288✔
470
        secret := &corev1.Secret{
288✔
471
                ObjectMeta: metav1.ObjectMeta{
288✔
472
                        Name:      secretKey.Name,
288✔
473
                        Namespace: secretKey.Namespace,
288✔
474
                        Annotations: map[string]string{
288✔
475
                                annotationSecretName: secretKey.Name,
288✔
476
                        },
288✔
477
                },
288✔
478
                Type: corev1.SecretTypeOpaque,
288✔
479
                Data: map[string][]byte{
288✔
480
                        "config.json": cfgJson,
288✔
481
                },
288✔
482
        }
288✔
483

288✔
484
        // Set owner references
288✔
485
        if err := controllerutil.SetControllerReference(res, secret, r.Scheme); err != nil {
288✔
486
                return nil, errLogAndWrap(log, err, "failed to set controller reference")
×
487
        }
×
488

489
        if err := r.Create(ctx, secret); err != nil {
288✔
490
                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "CreationFailed", "Create", "Failed to create secret: %s", err)
×
491

×
492
                return nil, errLogAndWrap(log, err, "secret creation failed")
×
493
        }
×
494

495
        res.Status.ConfigSecretRef = &corev1.ObjectReference{
288✔
496
                APIVersion: corev1.SchemeGroupVersion.String(),
288✔
497
                Kind:       "Secret",
288✔
498
                Namespace:  secret.Namespace,
288✔
499
                Name:       secret.Name,
288✔
500
        }
288✔
501

288✔
502
        if err := r.Status().Update(ctx, res); err != nil {
288✔
503
                return nil, errLogAndWrap(log, err, "failed to update status")
×
504
        }
×
505

506
        return secret, nil
288✔
507
}
508

509
func (r *RenderTaskReconciler) configSecretKey(res *solarv1alpha1.RenderTask, jobNS string) client.ObjectKey {
1,032✔
510
        return client.ObjectKey{
1,032✔
511
                Name:      truncateName(fmt.Sprintf("render-%s", res.Name), maxK8sLabelValueLen),
1,032✔
512
                Namespace: jobNS,
1,032✔
513
        }
1,032✔
514
}
1,032✔
515

516
func (r *RenderTaskReconciler) renderJobKey(res *solarv1alpha1.RenderTask, jobNS string) client.ObjectKey {
373✔
517
        return client.ObjectKey{
373✔
518
                Name:      truncateName(fmt.Sprintf("render-%s", res.Name), maxK8sLabelValueLen),
373✔
519
                Namespace: jobNS,
373✔
520
        }
373✔
521
}
373✔
522

523
func (r *RenderTaskReconciler) reference(baseURL, repo, tag string) string {
19✔
524
        base := baseURL
19✔
525
        if !strings.HasPrefix(base, "oci://") {
38✔
526
                base = fmt.Sprintf("oci://%s", base)
19✔
527
        }
19✔
528

529
        base = strings.TrimSuffix(base, "/")
19✔
530

19✔
531
        return fmt.Sprintf("%s/%s:%s", base, repo, tag)
19✔
532
}
533

534
func ttlSeconds(ttl *int32) int32 {
349✔
535
        if ttl != nil {
665✔
536
                return *ttl
316✔
537
        }
316✔
538

539
        return 3600
33✔
540
}
541

542
func shouldCleanupSecrets(res *solarv1alpha1.RenderTask, ttl time.Duration) bool {
314✔
543
        cond := apimeta.FindStatusCondition(res.Status.Conditions, ConditionTypeJobFailed)
314✔
544

314✔
545
        return cond != nil && time.Since(cond.LastTransitionTime.Time) >= ttl
314✔
546
}
314✔
547

548
func remainingTTL(res *solarv1alpha1.RenderTask, ttl time.Duration) time.Duration {
4✔
549
        cond := apimeta.FindStatusCondition(res.Status.Conditions, ConditionTypeJobFailed)
4✔
550
        if cond == nil {
4✔
551
                return ttl
×
552
        }
×
553

554
        remaining := ttl - time.Since(cond.LastTransitionTime.Time)
4✔
555
        if remaining < 0 {
4✔
556
                return 0
×
557
        }
×
558

559
        return remaining
4✔
560
}
561

562
func cleanupSecrets(ctx context.Context, r *RenderTaskReconciler, res *solarv1alpha1.RenderTask, jobNS string) {
313✔
563
        if err := r.deleteConfigSecret(ctx, res, jobNS); err != nil && !apierrors.IsNotFound(err) {
313✔
564
                r.Recorder.Eventf(res, nil, corev1.EventTypeWarning, "DeletionFailed", "Delete", "Failed to delete config secret: %s", err)
×
565
        }
×
566
}
567

568
func cleanupRenderResources(ctx context.Context, r *RenderTaskReconciler, res *solarv1alpha1.RenderTask, job *batchv1.Job, jobNS string) {
3✔
569
        cleanupSecrets(ctx, r, res, jobNS)
3✔
570
        if err := r.deleteRenderJob(ctx, res, jobNS); err != nil && !apierrors.IsNotFound(err) {
3✔
571
                r.Recorder.Eventf(res, job, corev1.EventTypeWarning, "DeletionFailed", "Delete", "Failed to delete job: %s", err)
×
572
        }
×
573
}
574

575
// SetupWithManager sets up the controller with the Manager.
576
func (r *RenderTaskReconciler) SetupWithManager(mgr ctrl.Manager) error {
1✔
577
        return ctrl.NewControllerManagedBy(mgr).
1✔
578
                For(&solarv1alpha1.RenderTask{}).
1✔
579
                Owns(&batchv1.Job{}).
1✔
580
                Owns(&corev1.Secret{}).
1✔
581
                Complete(r)
1✔
582
}
1✔
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc