revert sync configmaps
This commit is contained in:
		
							parent
							
								
									22b6abcf95
								
							
						
					
					
						commit
						b40188f0df
					
				|  | @ -1499,12 +1499,9 @@ func (c *Cluster) GetStatus() *ClusterStatus { | |||
| 		Error: fmt.Errorf("error: %s", c.Error), | ||||
| 	} | ||||
| 
 | ||||
| 	if c.patroniKubernetesUseConfigMaps() { | ||||
| 	if !c.patroniKubernetesUseConfigMaps() { | ||||
| 		status.MasterEndpoint = c.GetEndpointMaster() | ||||
| 		status.ReplicaEndpoint = c.GetEndpointReplica() | ||||
| 	} else { | ||||
| 		status.MasterConfigMap = c.GetConfigMapMaster() | ||||
| 		status.ReplicaConfigMap = c.GetConfigMapReplica() | ||||
| 	} | ||||
| 
 | ||||
| 	return status | ||||
|  |  | |||
|  | @ -76,11 +76,8 @@ func (c *Cluster) statefulSetName() string { | |||
| 	return c.Name | ||||
| } | ||||
| 
 | ||||
| func (c *Cluster) configMapName(role PostgresRole) string { | ||||
| func (c *Cluster) endpointName(role PostgresRole) string { | ||||
| 	name := c.Name | ||||
| 	if role == Master { | ||||
| 		name = name + "-leader" | ||||
| 	} | ||||
| 	if role == Replica { | ||||
| 		name = name + "-repl" | ||||
| 	} | ||||
|  | @ -88,10 +85,6 @@ func (c *Cluster) configMapName(role PostgresRole) string { | |||
| 	return name | ||||
| } | ||||
| 
 | ||||
| func (c *Cluster) endpointName(role PostgresRole) string { | ||||
| 	return c.serviceName(role) | ||||
| } | ||||
| 
 | ||||
| func (c *Cluster) serviceName(role PostgresRole) string { | ||||
| 	name := c.Name | ||||
| 	if role == Replica { | ||||
|  | @ -1828,16 +1821,6 @@ func (c *Cluster) generateEndpoint(role PostgresRole, subsets []v1.EndpointSubse | |||
| 	return endpoints | ||||
| } | ||||
| 
 | ||||
| func (c *Cluster) generateConfigMap(role PostgresRole) *v1.ConfigMap { | ||||
| 	return &v1.ConfigMap{ | ||||
| 		ObjectMeta: metav1.ObjectMeta{ | ||||
| 			Name:      c.configMapName(role), | ||||
| 			Namespace: c.Namespace, | ||||
| 			Labels:    c.roleLabelsSet(true, role), | ||||
| 		}, | ||||
| 	} | ||||
| } | ||||
| 
 | ||||
| func (c *Cluster) generateCloneEnvironment(description *acidv1.CloneDescription) []v1.EnvVar { | ||||
| 	result := make([]v1.EnvVar, 0) | ||||
| 
 | ||||
|  |  | |||
|  | @ -35,11 +35,7 @@ func (c *Cluster) listResources() error { | |||
| 		c.logger.Infof("found secret: %q (uid: %q) namesapce: %s", util.NameFromMeta(obj.ObjectMeta), obj.UID, obj.ObjectMeta.Namespace) | ||||
| 	} | ||||
| 
 | ||||
| 	if c.patroniKubernetesUseConfigMaps() { | ||||
| 		for role, configMap := range c.ConfigMaps { | ||||
| 			c.logger.Infof("found %s config map: %q (uid: %q)", role, util.NameFromMeta(configMap.ObjectMeta), configMap.UID) | ||||
| 		} | ||||
| 	} else { | ||||
| 	if !c.patroniKubernetesUseConfigMaps() { | ||||
| 		for role, endpoint := range c.Endpoints { | ||||
| 			c.logger.Infof("found %s endpoint: %q (uid: %q)", role, util.NameFromMeta(endpoint.ObjectMeta), endpoint.UID) | ||||
| 		} | ||||
|  | @ -408,20 +404,6 @@ func (c *Cluster) generateEndpointSubsets(role PostgresRole) []v1.EndpointSubset | |||
| 	return result | ||||
| } | ||||
| 
 | ||||
| func (c *Cluster) createConfigMap(role PostgresRole) (*v1.ConfigMap, error) { | ||||
| 	c.setProcessName("creating config map") | ||||
| 	configMapSpec := c.generateConfigMap(role) | ||||
| 
 | ||||
| 	configMap, err := c.KubeClient.ConfigMaps(configMapSpec.Namespace).Create(context.TODO(), configMapSpec, metav1.CreateOptions{}) | ||||
| 	if err != nil { | ||||
| 		return nil, fmt.Errorf("could not create %s config map: %v", role, err) | ||||
| 	} | ||||
| 
 | ||||
| 	c.ConfigMaps[role] = configMap | ||||
| 
 | ||||
| 	return configMap, nil | ||||
| } | ||||
| 
 | ||||
| func (c *Cluster) createPodDisruptionBudget() (*policybeta1.PodDisruptionBudget, error) { | ||||
| 	podDisruptionBudgetSpec := c.generatePodDisruptionBudget() | ||||
| 	podDisruptionBudget, err := c.KubeClient. | ||||
|  | @ -614,16 +596,6 @@ func (c *Cluster) GetEndpointReplica() *v1.Endpoints { | |||
| 	return c.Endpoints[Replica] | ||||
| } | ||||
| 
 | ||||
| // GetConfigMapMaster returns cluster's kubernetes master ConfigMap
 | ||||
| func (c *Cluster) GetConfigMapMaster() *v1.ConfigMap { | ||||
| 	return c.ConfigMaps[Master] | ||||
| } | ||||
| 
 | ||||
| // GetConfigMapReplica returns cluster's kubernetes replica ConfigMap
 | ||||
| func (c *Cluster) GetConfigMapReplica() *v1.ConfigMap { | ||||
| 	return c.ConfigMaps[Replica] | ||||
| } | ||||
| 
 | ||||
| // GetStatefulSet returns cluster's kubernetes StatefulSet
 | ||||
| func (c *Cluster) GetStatefulSet() *appsv1.StatefulSet { | ||||
| 	return c.Statefulset | ||||
|  |  | |||
|  | @ -144,11 +144,7 @@ func (c *Cluster) syncServices() error { | |||
| 	for _, role := range []PostgresRole{Master, Replica} { | ||||
| 		c.logger.Debugf("syncing %s service", role) | ||||
| 
 | ||||
| 		if c.patroniKubernetesUseConfigMaps() { | ||||
| 			if err := c.syncConfigMap(role); err != nil { | ||||
| 				return fmt.Errorf("could not sync %s config map: %v", role, err) | ||||
| 			} | ||||
| 		} else { | ||||
| 		if !c.patroniKubernetesUseConfigMaps() { | ||||
| 			if err := c.syncEndpoint(role); err != nil { | ||||
| 				return fmt.Errorf("could not sync %s endpoint: %v", role, err) | ||||
| 			} | ||||
|  | @ -238,40 +234,6 @@ func (c *Cluster) syncEndpoint(role PostgresRole) error { | |||
| 	return nil | ||||
| } | ||||
| 
 | ||||
| func (c *Cluster) syncConfigMap(role PostgresRole) error { | ||||
| 	var ( | ||||
| 		cm  *v1.ConfigMap | ||||
| 		err error | ||||
| 	) | ||||
| 	c.setProcessName("syncing %s config map", role) | ||||
| 
 | ||||
| 	if cm, err = c.KubeClient.ConfigMaps(c.Namespace).Get(context.TODO(), c.configMapName(role), metav1.GetOptions{}); err == nil { | ||||
| 		// TODO: No syncing of config map here, is this covered completely by updateService?
 | ||||
| 		c.ConfigMaps[role] = cm | ||||
| 		return nil | ||||
| 	} | ||||
| 	if !k8sutil.ResourceNotFound(err) { | ||||
| 		return fmt.Errorf("could not get %s config map: %v", role, err) | ||||
| 	} | ||||
| 	// no existing config map, create new one
 | ||||
| 	c.ConfigMaps[role] = nil | ||||
| 	c.logger.Infof("could not find the cluster's %s config map", role) | ||||
| 
 | ||||
| 	if cm, err = c.createConfigMap(role); err == nil { | ||||
| 		c.logger.Infof("created missing %s config map %q", role, util.NameFromMeta(cm.ObjectMeta)) | ||||
| 	} else { | ||||
| 		if !k8sutil.ResourceAlreadyExists(err) { | ||||
| 			return fmt.Errorf("could not create missing %s config map: %v", role, err) | ||||
| 		} | ||||
| 		c.logger.Infof("%s config map %q already exists", role, util.NameFromMeta(cm.ObjectMeta)) | ||||
| 		if cm, err = c.KubeClient.ConfigMaps(c.Namespace).Get(context.TODO(), c.configMapName(role), metav1.GetOptions{}); err != nil { | ||||
| 			return fmt.Errorf("could not fetch existing %s config map: %v", role, err) | ||||
| 		} | ||||
| 	} | ||||
| 	c.ConfigMaps[role] = cm | ||||
| 	return nil | ||||
| } | ||||
| 
 | ||||
| func (c *Cluster) syncPodDisruptionBudget(isUpdate bool) error { | ||||
| 	var ( | ||||
| 		pdb *policybeta1.PodDisruptionBudget | ||||
|  |  | |||
|  | @ -63,8 +63,6 @@ type ClusterStatus struct { | |||
| 	ReplicaService      *v1.Service | ||||
| 	MasterEndpoint      *v1.Endpoints | ||||
| 	ReplicaEndpoint     *v1.Endpoints | ||||
| 	MasterConfigMap     *v1.ConfigMap | ||||
| 	ReplicaConfigMap    *v1.ConfigMap | ||||
| 	StatefulSet         *appsv1.StatefulSet | ||||
| 	PodDisruptionBudget *policybeta1.PodDisruptionBudget | ||||
| 
 | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue