Skip to content

Commit

Permalink
handling cyclomatic complexity for all controllers
Browse files Browse the repository at this point in the history
  • Loading branch information
unnatiagg committed Sep 10, 2024
1 parent 0ca521f commit 180534c
Show file tree
Hide file tree
Showing 6 changed files with 33 additions and 30 deletions.
13 changes: 8 additions & 5 deletions cloud/scope/object_storage_key.go
Original file line number Diff line number Diff line change
Expand Up @@ -170,11 +170,14 @@ func (s *ObjectStorageKeyScope) ShouldRotateKey() bool {

// Override the controller credentials with ones from the Cluster's Secret reference (if supplied).
func (s *ObjectStorageKeyScope) SetCredentialRefTokenForLinodeClients(ctx context.Context) error {
// TODO: This key is hard-coded (for now) to match the externally-managed `manager-credentials` Secret.
apiToken, err := getCredentialDataFromRef(ctx, s.Client, *s.Key.Spec.CredentialsRef, s.Key.GetNamespace(), "apiToken")
if err != nil {
return fmt.Errorf("credentials from secret ref: %w", err)
if s.Key.Spec.CredentialsRef != nil {
// TODO: This key is hard-coded (for now) to match the externally-managed `manager-credentials` Secret.
apiToken, err := getCredentialDataFromRef(ctx, s.Client, *s.Key.Spec.CredentialsRef, s.Key.GetNamespace(), "apiToken")
if err != nil {
return fmt.Errorf("credentials from secret ref: %w", err)
}
s.LinodeClient = s.LinodeClient.SetToken(string(apiToken))
return nil
}
s.LinodeClient = s.LinodeClient.SetToken(string(apiToken))
return nil

Check warning on line 182 in cloud/scope/object_storage_key.go

View check run for this annotation

Codecov / codecov/patch

cloud/scope/object_storage_key.go#L182

Added line #L182 was not covered by tests
}
13 changes: 8 additions & 5 deletions cloud/scope/placement_group.go
Original file line number Diff line number Diff line change
Expand Up @@ -122,11 +122,14 @@ func NewPlacementGroupScope(ctx context.Context, linodeClientConfig ClientConfig
}

func (s *PlacementGroupScope) SetCredentialRefTokenForLinodeClients(ctx context.Context) error {
// TODO: This key is hard-coded (for now) to match the externally-managed `manager-credentials` Secret.
apiToken, err := getCredentialDataFromRef(ctx, s.Client, *s.LinodePlacementGroup.Spec.CredentialsRef, s.LinodePlacementGroup.GetNamespace(), "apiToken")
if err != nil {
return fmt.Errorf("credentials from secret ref: %w", err)
if s.LinodePlacementGroup.Spec.CredentialsRef != nil {
// TODO: This key is hard-coded (for now) to match the externally-managed `manager-credentials` Secret.
apiToken, err := getCredentialDataFromRef(ctx, s.Client, *s.LinodePlacementGroup.Spec.CredentialsRef, s.LinodePlacementGroup.GetNamespace(), "apiToken")
if err != nil {
return fmt.Errorf("credentials from secret ref: %w", err)
}
s.LinodeClient = s.LinodeClient.SetToken(string(apiToken))
return nil
}
s.LinodeClient = s.LinodeClient.SetToken(string(apiToken))
return nil

Check warning on line 134 in cloud/scope/placement_group.go

View check run for this annotation

Codecov / codecov/patch

cloud/scope/placement_group.go#L134

Added line #L134 was not covered by tests
}
13 changes: 8 additions & 5 deletions cloud/scope/vpc.go
Original file line number Diff line number Diff line change
Expand Up @@ -121,11 +121,14 @@ func (s *VPCScope) RemoveCredentialsRefFinalizer(ctx context.Context) error {
}

func (s *VPCScope) SetCredentialRefTokenForLinodeClients(ctx context.Context) error {
// TODO: This key is hard-coded (for now) to match the externally-managed `manager-credentials` Secret.
apiToken, err := getCredentialDataFromRef(ctx, s.Client, *s.LinodeVPC.Spec.CredentialsRef, s.LinodeVPC.GetNamespace(), "apiToken")
if err != nil {
return fmt.Errorf("credentials from secret ref: %w", err)
if s.LinodeVPC.Spec.CredentialsRef != nil {
// TODO: This key is hard-coded (for now) to match the externally-managed `manager-credentials` Secret.
apiToken, err := getCredentialDataFromRef(ctx, s.Client, *s.LinodeVPC.Spec.CredentialsRef, s.LinodeVPC.GetNamespace(), "apiToken")
if err != nil {
return fmt.Errorf("credentials from secret ref: %w", err)
}
s.LinodeClient = s.LinodeClient.SetToken(string(apiToken))
return nil
}
s.LinodeClient = s.LinodeClient.SetToken(string(apiToken))
return nil

Check warning on line 133 in cloud/scope/vpc.go

View check run for this annotation

Codecov / codecov/patch

cloud/scope/vpc.go#L133

Added line #L133 was not covered by tests
}
8 changes: 3 additions & 5 deletions controller/linodeobjectstoragekey_controller.go
Original file line number Diff line number Diff line change
Expand Up @@ -132,11 +132,9 @@ func (r *LinodeObjectStorageKeyReconciler) reconcile(ctx context.Context, keySco
}

// Override the controller credentials with ones from the Key's Secret reference (if supplied).
if keyScope.Key.Spec.CredentialsRef != nil {
if err := keyScope.SetCredentialRefTokenForLinodeClients(ctx); err != nil {
keyScope.Logger.Error(err, "failed to update linode client token from Credential Ref")
return res, err
}
if err := keyScope.SetCredentialRefTokenForLinodeClients(ctx); err != nil {
keyScope.Logger.Error(err, "failed to update linode client token from Credential Ref")
return res, err

Check warning on line 137 in controller/linodeobjectstoragekey_controller.go

View check run for this annotation

Codecov / codecov/patch

controller/linodeobjectstoragekey_controller.go#L136-L137

Added lines #L136 - L137 were not covered by tests
}

if err := r.reconcileApply(ctx, keyScope); err != nil {
Expand Down
8 changes: 3 additions & 5 deletions controller/linodeplacementgroup_controller.go
Original file line number Diff line number Diff line change
Expand Up @@ -153,11 +153,9 @@ func (r *LinodePlacementGroupReconciler) reconcile(
}

// Override the controller credentials with ones from the Placement Groups's Secret reference (if supplied).
if pgScope.LinodePlacementGroup.Spec.CredentialsRef != nil {
if err := pgScope.SetCredentialRefTokenForLinodeClients(ctx); err != nil {
logger.Error(err, "failed to update linode client token from Credential Ref")
return res, err
}
if err := pgScope.SetCredentialRefTokenForLinodeClients(ctx); err != nil {
logger.Error(err, "failed to update linode client token from Credential Ref")
return res, err

Check warning on line 158 in controller/linodeplacementgroup_controller.go

View check run for this annotation

Codecov / codecov/patch

controller/linodeplacementgroup_controller.go#L157-L158

Added lines #L157 - L158 were not covered by tests
}

// Update
Expand Down
8 changes: 3 additions & 5 deletions controller/linodevpc_controller.go
Original file line number Diff line number Diff line change
Expand Up @@ -159,11 +159,9 @@ func (r *LinodeVPCReconciler) reconcile(
}

// Override the controller credentials with ones from the VPC's Secret reference (if supplied).
if vpcScope.LinodeVPC.Spec.CredentialsRef != nil {
if err := vpcScope.SetCredentialRefTokenForLinodeClients(ctx); err != nil {
logger.Error(err, "failed to update linode client token from Credential Ref")
return res, err
}
if err := vpcScope.SetCredentialRefTokenForLinodeClients(ctx); err != nil {
logger.Error(err, "failed to update linode client token from Credential Ref")
return res, err

Check warning on line 164 in controller/linodevpc_controller.go

View check run for this annotation

Codecov / codecov/patch

controller/linodevpc_controller.go#L163-L164

Added lines #L163 - L164 were not covered by tests
}

// Update
Expand Down

0 comments on commit 180534c

Please sign in to comment.