-
Notifications
You must be signed in to change notification settings - Fork 345
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
replace deployment reconciler with webhook #1828
replace deployment reconciler with webhook #1828
Conversation
f50dddd
to
20cecf0
Compare
Codecov Report
@@ Coverage Diff @@
## main #1828 +/- ##
==========================================
+ Coverage 88.18% 89.04% +0.86%
==========================================
Files 101 100 -1
Lines 6153 6136 -17
==========================================
+ Hits 5426 5464 +38
+ Misses 544 495 -49
+ Partials 183 177 -6
Continue to review full report at Codecov.
|
59af5f0
to
783c306
Compare
@@ -352,3 +356,75 @@ func (r ReconcileJaeger) getSecretsForNamespace(secrets []corev1.Secret, namespa | |||
} | |||
return secretsForNamespace | |||
} | |||
|
|||
// SyncOnJaegerChanges sync deployments with sidecars when a jaeger CR changes | |||
func (r *ReconcileJaeger) SyncOnJaegerChanges(object client.Object) []reconcile.Request { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As far as I understand this function is watching Jaeger CRs for changes, and triggers deployment/namespace reconciliations using a modified annotation.
Why do we need this, Could be a part of the Jaeger CRs reconciliation? what is the difference?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure we can move it up. the function exists only because I have tried to change as little as possible in the existing behavior. But it makes sense. especially considering the potential error when the deployment state has changed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
moved syncOnJaegerChanges
into the reconcile loop. 👍
see: 72abc37
call syncOnJaegerChanges in jaeger reconciler
This change ensures that in the event of an error, e.g. when
updating a deployment or ns, syncOnJaegerChanges is executed again.
Signed-off-by: Benedikt Bongartz <[email protected]>
72c69d5
to
955e4c5
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Signed-off-by: Benedikt Bongartz <[email protected]>
Signed-off-by: Benedikt Bongartz <[email protected]>
- extend tests Signed-off-by: Benedikt Bongartz <[email protected]>
This change ensures that in the event of an error, e.g. when updating a deployment or ns, syncOnJaegerChanges is executed again. Signed-off-by: Benedikt Bongartz <[email protected]>
Signed-off-by: Benedikt Bongartz <[email protected]>
Signed-off-by: Benedikt Bongartz <[email protected]>
Head branch was pushed to by a user without write access
2f305f4
to
f400d1e
Compare
improved flaky unittest 32eeb2a and rebased branch onto main. |
Hey, could you tell me how should work provisioning of tls certificate. I see that it is self signed with custom issuer. Beside that the DNS records points to webhook-services svc. My issue is that controller push log |
Which problem is this PR solving?
Short description of the changes
cc @rubenvp8510