Documentation ¶
Index ¶
- func CleanupMysqlBackupJob(log vzlog.VerrazzanoLogger, cli client.Client) error
- func CreateRancherIngressAndCertCopies(componentCtx componentspi.ComponentContext)
- func DeleteIstioCARootCert(ctx componentspi.ComponentContext) error
- func DeleteMCResources(componentCtx componentspi.ComponentContext) error
- func DeleteNamespace(cli client.Client, log vzlog.VerrazzanoLogger, namespace string) error
- func DeleteNamespaces(componentCtx componentspi.ComponentContext, rancherProvisioned bool) result.Result
- func DeleteSecret(cli client.Client, log vzlog.VerrazzanoLogger, namespace string, name string) error
- func DoesOCIDNSConfigSecretExist(cli client.Client, vz *vzv1alpha1.Verrazzano) error
- func IsMysqlOperatorJob(cli client.Client, object client.Object) bool
- func MergeMaps(to map[string]string, from map[string]string) (map[string]string, bool)
- func NodeExporterCleanup(cli client.Client, log vzlog.VerrazzanoLogger) error
- func PreUninstallRancher(cli client.Client, log vzlog.VerrazzanoLogger, actualCR *vzv1alpha1.Verrazzano, ...) result.Result
- func RunRancherPostUninstall(componentCtx componentspi.ComponentContext) error
- func SyncLocalRegistrationSecret(cli client.Client) error
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func CleanupMysqlBackupJob ¶
func CleanupMysqlBackupJob(log vzlog.VerrazzanoLogger, cli client.Client) error
CleanupMysqlBackupJob checks for the existence of a stale MySQL restore job and deletes the job if one is found
func CreateRancherIngressAndCertCopies ¶
func CreateRancherIngressAndCertCopies(componentCtx componentspi.ComponentContext)
CreateRancherIngressAndCertCopies - creates copies of Rancher ingress and cert secret if they exist. If there is a DNS update in progress, we want to do this so that the old DNS continues to work as long as there is a good DNS entry, so that managed clusters can continue connecting using the old Rancher DNS in their kubeconfig, until they are updated with the new DNS.
func DeleteIstioCARootCert ¶
func DeleteIstioCARootCert(ctx componentspi.ComponentContext) error
DeleteIstioCARootCert deletes the Istio root cert ConfigMap that gets distributed across the cluster
func DeleteMCResources ¶
func DeleteMCResources(componentCtx componentspi.ComponentContext) error
DeleteMCResources deletes multicluster related resources
func DeleteNamespace ¶
DeleteNamespace deletes a namespace
func DeleteNamespaces ¶
func DeleteNamespaces(componentCtx componentspi.ComponentContext, rancherProvisioned bool) result.Result
DeleteNamespaces deletes up all component namespaces plus any namespaces shared by multiple components - returns an error or a requeue with delay result
func DeleteSecret ¶
func DeleteSecret(cli client.Client, log vzlog.VerrazzanoLogger, namespace string, name string) error
DeleteSecret deletes a Kubernetes secret
func DoesOCIDNSConfigSecretExist ¶
func DoesOCIDNSConfigSecretExist(cli client.Client, vz *vzv1alpha1.Verrazzano) error
DoesOCIDNSConfigSecretExist returns true if the DNS secret exists
func IsMysqlOperatorJob ¶
IsMysqlOperatorJob returns true if this is the MySQL backup job
func MergeMaps ¶
MergeMaps Merge one map into another, creating new one if necessary; returns the updated map and true if it was modified
func NodeExporterCleanup ¶
func NodeExporterCleanup(cli client.Client, log vzlog.VerrazzanoLogger) error
NodeExporterCleanup cleans up any resources from the old node-exporter that was replaced with the node-exporter from the prometheus-operator
func PreUninstallRancher ¶
func PreUninstallRancher(cli client.Client, log vzlog.VerrazzanoLogger, actualCR *vzv1alpha1.Verrazzano, effectiveCR *vzv1alpha1.Verrazzano) result.Result
preUninstallRancherLocal does Rancher pre-uninstall
func RunRancherPostUninstall ¶
func RunRancherPostUninstall(componentCtx componentspi.ComponentContext) error
func SyncLocalRegistrationSecret ¶
SyncLocalRegistrationSecret creats a registration secret in the verrazzano-system namespace, with the managed cluster information. This secret will be used on the admin cluster to get information about itself, like the cluster name, so that the admin cluster can manage multi-cluster resources without the need of a VMC. In the case of a cluster that is used as a managed cluster, this secret will still be created, but not used, and ultimately replaced when the user applies the managed cluster YAML which has the replacement secret.
Types ¶
This section is empty.