Skip to content

Commit e59f517

Browse files
(fix) catalog deletion resilience support
Enables installed extensions to continue working when their source catalog becomes unavailable or is deleted. When resolution fails due to catalog unavailability, the operator now continues reconciling with the currently installed bundle instead of failing. Changes: - Resolution falls back to installed bundle when catalog unavailable - Unpacking skipped when maintaining current installed state - Helm and Boxcutter appliers handle nil contentFS gracefully - Version upgrades properly blocked without catalog access This ensures workloads remain stable and operational even when the catalog they were installed from is temporarily unavailable or deleted, while appropriately preventing version changes that require catalog access.
1 parent 44f5686 commit e59f517

7 files changed

Lines changed: 506 additions & 15 deletions

File tree

cmd/operator-controller/main.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -626,7 +626,7 @@ func (c *boxcutterReconcilerConfigurator) Configure(ceReconciler *controllers.Cl
626626
controllers.HandleFinalizers(c.finalizers),
627627
controllers.MigrateStorage(storageMigrator),
628628
controllers.RetrieveRevisionStates(revisionStatesGetter),
629-
controllers.ResolveBundle(c.resolver),
629+
controllers.ResolveBundle(c.resolver, c.mgr.GetClient()),
630630
controllers.UnpackBundle(c.imagePuller, c.imageCache),
631631
controllers.ApplyBundleWithBoxcutter(appl),
632632
}
@@ -737,7 +737,7 @@ func (c *helmReconcilerConfigurator) Configure(ceReconciler *controllers.Cluster
737737
ceReconciler.ReconcileSteps = []controllers.ReconcileStepFunc{
738738
controllers.HandleFinalizers(c.finalizers),
739739
controllers.RetrieveRevisionStates(revisionStatesGetter),
740-
controllers.ResolveBundle(c.resolver),
740+
controllers.ResolveBundle(c.resolver, c.mgr.GetClient()),
741741
controllers.UnpackBundle(c.imagePuller, c.imageCache),
742742
controllers.ApplyBundle(appl),
743743
}

internal/operator-controller/applier/boxcutter.go

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -303,22 +303,35 @@ func (bc *Boxcutter) createOrUpdate(ctx context.Context, obj client.Object) erro
303303
}
304304

305305
func (bc *Boxcutter) apply(ctx context.Context, contentFS fs.FS, ext *ocv1.ClusterExtension, objectLabels, revisionAnnotations map[string]string) (bool, string, error) {
306-
// Generate desired revision
307-
desiredRevision, err := bc.RevisionGenerator.GenerateRevision(ctx, contentFS, ext, objectLabels, revisionAnnotations)
306+
// List all existing revisions
307+
existingRevisions, err := bc.getExistingRevisions(ctx, ext.GetName())
308308
if err != nil {
309309
return false, "", err
310310
}
311311

312-
if err := controllerutil.SetControllerReference(ext, desiredRevision, bc.Scheme); err != nil {
313-
return false, "", fmt.Errorf("set ownerref: %w", err)
312+
// If contentFS is nil, we're maintaining the current state without catalog access.
313+
// In this case, we should use the existing installed revision without generating a new one.
314+
if contentFS == nil {
315+
if len(existingRevisions) == 0 {
316+
return false, "", fmt.Errorf("cannot maintain workload: no catalog content available and no previously installed revision found")
317+
}
318+
// Returning true here signals that the rollout has succeeded using the current revision. The
319+
// ClusterExtensionRevision controller will continue to reconcile, apply, and maintain the
320+
// resources defined in that revision via Server-Side Apply, ensuring the workload keeps running
321+
// even when catalog access (and thus new revision content) is unavailable.
322+
return true, "", nil
314323
}
315324

316-
// List all existing revisions
317-
existingRevisions, err := bc.getExistingRevisions(ctx, ext.GetName())
325+
// Generate desired revision
326+
desiredRevision, err := bc.RevisionGenerator.GenerateRevision(ctx, contentFS, ext, objectLabels, revisionAnnotations)
318327
if err != nil {
319328
return false, "", err
320329
}
321330

331+
if err := controllerutil.SetControllerReference(ext, desiredRevision, bc.Scheme); err != nil {
332+
return false, "", fmt.Errorf("set ownerref: %w", err)
333+
}
334+
322335
currentRevision := &ocv1.ClusterExtensionRevision{}
323336
state := StateNeedsInstall
324337
// check if we can update the current revision.

internal/operator-controller/applier/helm.go

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,16 @@ func (h *Helm) runPreAuthorizationChecks(ctx context.Context, ext *ocv1.ClusterE
103103
}
104104

105105
func (h *Helm) Apply(ctx context.Context, contentFS fs.FS, ext *ocv1.ClusterExtension, objectLabels map[string]string, storageLabels map[string]string) (bool, string, error) {
106+
// If contentFS is nil, we're maintaining the current state without catalog access.
107+
// In this case, reconcile the existing Helm release if it exists.
108+
if contentFS == nil {
109+
ac, err := h.ActionClientGetter.ActionClientFor(ctx, ext)
110+
if err != nil {
111+
return false, "", err
112+
}
113+
return h.reconcileExistingRelease(ctx, ac, ext)
114+
}
115+
106116
chrt, err := h.buildHelmChart(contentFS, ext)
107117
if err != nil {
108118
return false, "", err
@@ -197,6 +207,45 @@ func (h *Helm) Apply(ctx context.Context, contentFS fs.FS, ext *ocv1.ClusterExte
197207
return true, "", nil
198208
}
199209

210+
// reconcileExistingRelease reconciles an existing Helm release without catalog access.
211+
// This is used when the catalog is unavailable but we need to maintain the current installation.
212+
// It reconciles the release and sets up watchers to ensure resources are maintained.
213+
func (h *Helm) reconcileExistingRelease(ctx context.Context, ac helmclient.ActionInterface, ext *ocv1.ClusterExtension) (bool, string, error) {
214+
rel, err := ac.Get(ext.GetName())
215+
if errors.Is(err, driver.ErrReleaseNotFound) {
216+
return false, "", fmt.Errorf("cannot maintain workload: no catalog content available and no previously installed Helm release found")
217+
}
218+
if err != nil {
219+
return false, "", fmt.Errorf("getting current release: %w", err)
220+
}
221+
222+
// Reconcile the existing release to ensure resources are maintained
223+
if err := ac.Reconcile(rel); err != nil {
224+
// Reconcile failed - resources NOT maintained
225+
// Return false (rollout failed) with error
226+
return false, "", err
227+
}
228+
229+
// At this point: Reconcile succeeded - resources ARE maintained
230+
// The operations below are for setting up monitoring (watches).
231+
// If they fail, the resources are still successfully reconciled and maintained,
232+
// so we return true (rollout succeeded) even though monitoring setup failed.
233+
relObjects, err := util.ManifestObjects(strings.NewReader(rel.Manifest), fmt.Sprintf("%s-release-manifest", rel.Name))
234+
if err != nil {
235+
return true, "", err
236+
}
237+
klog.FromContext(ctx).Info("watching managed objects")
238+
cache, err := h.Manager.Get(ctx, ext)
239+
if err != nil {
240+
return true, "", err
241+
}
242+
if err := cache.Watch(ctx, h.Watcher, relObjects...); err != nil {
243+
return true, "", err
244+
}
245+
246+
return true, "", nil
247+
}
248+
200249
func (h *Helm) buildHelmChart(bundleFS fs.FS, ext *ocv1.ClusterExtension) (*chart.Chart, error) {
201250
if h.HelmChartProvider == nil {
202251
return nil, errors.New("HelmChartProvider is nil")

internal/operator-controller/controllers/clusterextension_controller.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -168,6 +168,8 @@ func (r *ClusterExtensionReconciler) Reconcile(ctx context.Context, req ctrl.Req
168168

169169
// ensureAllConditionsWithReason checks that all defined condition types exist in the given ClusterExtension,
170170
// and assigns a specified reason and custom message to any missing condition.
171+
//
172+
//nolint:unparam // reason parameter is designed to be flexible, even if current callers use the same value
171173
func ensureAllConditionsWithReason(ext *ocv1.ClusterExtension, reason v1alpha1.ConditionReason, message string) {
172174
for _, condType := range conditionsets.ConditionTypes {
173175
cond := apimeta.FindStatusCondition(ext.Status.Conditions, condType)

0 commit comments

Comments
 (0)