github.com/verrazzano/verrazzano@v1.7.1/tools/vz/pkg/internal/util/cluster/clusterapi/ocneconfigs.go (about)

     1  // Copyright (c) 2023, 2024, Oracle and/or its affiliates.
     2  // Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl.
     3  
     4  package clusterapi
     5  
     6  import (
     7  	"fmt"
     8  	"path/filepath"
     9  
    10  	"github.com/verrazzano/verrazzano/tools/vz/pkg/internal/util/files"
    11  	"github.com/verrazzano/verrazzano/tools/vz/pkg/internal/util/report"
    12  	corev1 "k8s.io/api/core/v1"
    13  	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
    14  )
    15  
    16  const ocneConfigsResource = "ocneconfigs.bootstrap.cluster.x-k8s.io"
    17  
    18  // Minimal definition of ocneconfigs.bootstrap.cluster.x-k8s.io object that only contains the fields that will be analyzed.
    19  type ocneConfigList struct {
    20  	metav1.TypeMeta `json:",inline"`
    21  	metav1.ListMeta `json:"metadata,omitempty"`
    22  	Items           []ocneConfig `json:"items"`
    23  }
    24  type ocneConfig struct {
    25  	metav1.TypeMeta   `json:",inline"`
    26  	metav1.ObjectMeta `json:"metadata,omitempty"`
    27  	Status            capiStatus `json:"status,omitempty"`
    28  }
    29  
    30  // AnalyzeOCNEConfigs handles the checking of the status of cluster-api ocneConfig resources.
    31  func AnalyzeOCNEConfigs(clusterRoot string, namespace string, issueReporter *report.IssueReporter) error {
    32  	resourceRoot := clusterRoot
    33  	if len(namespace) != 0 {
    34  		resourceRoot = filepath.Join(clusterRoot, namespace)
    35  	}
    36  	list := &ocneConfigList{}
    37  	err := files.UnmarshallFileInClusterRoot(resourceRoot, "ocneconfig.bootstrap.cluster.x-k8s.io.json", list)
    38  	if err != nil {
    39  		return err
    40  	}
    41  
    42  	for _, ocneConfig := range list.Items {
    43  		analyzeOCNEConfig(clusterRoot, ocneConfig, issueReporter)
    44  	}
    45  
    46  	return nil
    47  }
    48  
    49  // analyzeOCNEConfig - analyze a single cluster API ocneConfig and report any issues
    50  func analyzeOCNEConfig(clusterRoot string, ocneConfig ocneConfig, issueReporter *report.IssueReporter) {
    51  
    52  	var messages []string
    53  	var subMessage string
    54  	for _, condition := range ocneConfig.Status.Conditions {
    55  		if condition.Status != corev1.ConditionTrue {
    56  			switch condition.Type {
    57  			case "CertificatesAvailable":
    58  				subMessage = "certificates are not available"
    59  			case "DataSecretAvailable":
    60  				subMessage = "data secret is not available"
    61  			case "Ready":
    62  				subMessage = "is not ready"
    63  			default:
    64  				continue
    65  			}
    66  			// Add a message for the issue
    67  			var message string
    68  			if len(condition.Reason) == 0 {
    69  				message = fmt.Sprintf("\t%s", subMessage)
    70  			} else {
    71  				message = fmt.Sprintf("\t%s - reason is %s", subMessage, condition.Reason)
    72  			}
    73  			messages = append([]string{message}, messages...)
    74  
    75  		}
    76  	}
    77  
    78  	if len(messages) > 0 {
    79  		messages = append([]string{fmt.Sprintf("%q resource %q in namespace %q", ocneConfigsResource, ocneConfig.Name, ocneConfig.Namespace)}, messages...)
    80  		issueReporter.AddKnownIssueMessagesFiles(report.ClusterAPIClusterIssues, clusterRoot, messages, []string{})
    81  	}
    82  }