@@ -50,10 +50,10 @@ import (
50
50
"sigs.k8s.io/controller-runtime/pkg/source"
51
51
52
52
apiacl "github.com/fluxcd/pkg/apis/acl"
53
+ eventv1 "github.com/fluxcd/pkg/apis/event/v1beta1"
53
54
"github.com/fluxcd/pkg/apis/meta"
54
55
"github.com/fluxcd/pkg/runtime/acl"
55
56
fluxClient "github.com/fluxcd/pkg/runtime/client"
56
- "github.com/fluxcd/pkg/runtime/events"
57
57
"github.com/fluxcd/pkg/runtime/metrics"
58
58
"github.com/fluxcd/pkg/runtime/predicates"
59
59
"github.com/fluxcd/pkg/runtime/transform"
@@ -226,20 +226,20 @@ func (r *HelmReleaseReconciler) reconcile(ctx context.Context, hr v2.HelmRelease
226
226
if reconcileErr != nil {
227
227
if acl .IsAccessDenied (reconcileErr ) {
228
228
log .Error (reconcileErr , "access denied to cross-namespace source" )
229
- r .event (ctx , hr , hr .Status .LastAttemptedRevision , events .EventSeverityError , reconcileErr .Error ())
229
+ r .event (ctx , hr , hr .Status .LastAttemptedRevision , eventv1 .EventSeverityError , reconcileErr .Error ())
230
230
return v2 .HelmReleaseNotReady (hr , apiacl .AccessDeniedReason , reconcileErr .Error ()),
231
231
ctrl.Result {RequeueAfter : hr .Spec .Interval .Duration }, nil
232
232
}
233
233
234
234
msg := fmt .Sprintf ("chart reconciliation failed: %s" , reconcileErr .Error ())
235
- r .event (ctx , hr , hr .Status .LastAttemptedRevision , events .EventSeverityError , msg )
235
+ r .event (ctx , hr , hr .Status .LastAttemptedRevision , eventv1 .EventSeverityError , msg )
236
236
return v2 .HelmReleaseNotReady (hr , v2 .ArtifactFailedReason , msg ), ctrl.Result {Requeue : true }, reconcileErr
237
237
}
238
238
239
239
// Check chart readiness
240
240
if hc .Generation != hc .Status .ObservedGeneration || ! apimeta .IsStatusConditionTrue (hc .Status .Conditions , meta .ReadyCondition ) {
241
241
msg := fmt .Sprintf ("HelmChart '%s/%s' is not ready" , hc .GetNamespace (), hc .GetName ())
242
- r .event (ctx , hr , hr .Status .LastAttemptedRevision , events .EventSeverityInfo , msg )
242
+ r .event (ctx , hr , hr .Status .LastAttemptedRevision , eventv1 .EventSeverityInfo , msg )
243
243
log .Info (msg )
244
244
// Do not requeue immediately, when the artifact is created
245
245
// the watcher should trigger a reconciliation.
@@ -251,7 +251,7 @@ func (r *HelmReleaseReconciler) reconcile(ctx context.Context, hr v2.HelmRelease
251
251
if err := r .checkDependencies (hr ); err != nil {
252
252
msg := fmt .Sprintf ("dependencies do not meet ready condition (%s), retrying in %s" ,
253
253
err .Error (), r .requeueDependency .String ())
254
- r .event (ctx , hr , hc .GetArtifact ().Revision , events .EventSeverityInfo , msg )
254
+ r .event (ctx , hr , hc .GetArtifact ().Revision , eventv1 .EventSeverityInfo , msg )
255
255
log .Info (msg )
256
256
257
257
// Exponential backoff would cause execution to be prolonged too much,
@@ -265,21 +265,21 @@ func (r *HelmReleaseReconciler) reconcile(ctx context.Context, hr v2.HelmRelease
265
265
// Compose values
266
266
values , err := r .composeValues (ctx , hr )
267
267
if err != nil {
268
- r .event (ctx , hr , hr .Status .LastAttemptedRevision , events .EventSeverityError , err .Error ())
268
+ r .event (ctx , hr , hr .Status .LastAttemptedRevision , eventv1 .EventSeverityError , err .Error ())
269
269
return v2 .HelmReleaseNotReady (hr , v2 .InitFailedReason , err .Error ()), ctrl.Result {Requeue : true }, nil
270
270
}
271
271
272
272
// Load chart from artifact
273
273
chart , err := r .loadHelmChart (hc )
274
274
if err != nil {
275
- r .event (ctx , hr , hr .Status .LastAttemptedRevision , events .EventSeverityError , err .Error ())
275
+ r .event (ctx , hr , hr .Status .LastAttemptedRevision , eventv1 .EventSeverityError , err .Error ())
276
276
return v2 .HelmReleaseNotReady (hr , v2 .ArtifactFailedReason , err .Error ()), ctrl.Result {Requeue : true }, nil
277
277
}
278
278
279
279
// Reconcile Helm release
280
280
reconciledHr , reconcileErr := r .reconcileRelease (ctx , * hr .DeepCopy (), chart , values )
281
281
if reconcileErr != nil {
282
- r .event (ctx , hr , hc .GetArtifact ().Revision , events .EventSeverityError ,
282
+ r .event (ctx , hr , hc .GetArtifact ().Revision , eventv1 .EventSeverityError ,
283
283
fmt .Sprintf ("reconciliation failed: %s" , reconcileErr .Error ()))
284
284
}
285
285
return reconciledHr , ctrl.Result {RequeueAfter : hr .Spec .Interval .Duration }, reconcileErr
@@ -361,13 +361,13 @@ func (r *HelmReleaseReconciler) reconcileRelease(ctx context.Context,
361
361
// Deploy the release.
362
362
var deployAction v2.DeploymentAction
363
363
if rel == nil {
364
- r .event (ctx , hr , revision , events .EventSeverityInfo , "Helm install has started" )
364
+ r .event (ctx , hr , revision , eventv1 .EventSeverityInfo , "Helm install has started" )
365
365
deployAction = hr .Spec .GetInstall ()
366
366
rel , err = run .Install (hr , chart , values )
367
367
err = r .handleHelmActionResult (ctx , & hr , revision , err , deployAction .GetDescription (),
368
368
v2 .ReleasedCondition , v2 .InstallSucceededReason , v2 .InstallFailedReason )
369
369
} else {
370
- r .event (ctx , hr , revision , events .EventSeverityInfo , "Helm upgrade has started" )
370
+ r .event (ctx , hr , revision , eventv1 .EventSeverityInfo , "Helm upgrade has started" )
371
371
deployAction = hr .Spec .GetUpgrade ()
372
372
rel , err = run .Upgrade (hr , chart , values )
373
373
err = r .handleHelmActionResult (ctx , & hr , revision , err , deployAction .GetDescription (),
@@ -666,7 +666,7 @@ func (r *HelmReleaseReconciler) handleHelmActionResult(ctx context.Context,
666
666
Message : msg ,
667
667
}
668
668
apimeta .SetStatusCondition (hr .GetStatusConditions (), newCondition )
669
- r .event (ctx , * hr , revision , events .EventSeverityError , msg )
669
+ r .event (ctx , * hr , revision , eventv1 .EventSeverityError , msg )
670
670
return & ConditionError {Reason : failedReason , Err : err }
671
671
} else {
672
672
msg := fmt .Sprintf ("Helm %s succeeded" , action )
@@ -677,7 +677,7 @@ func (r *HelmReleaseReconciler) handleHelmActionResult(ctx context.Context,
677
677
Message : msg ,
678
678
}
679
679
apimeta .SetStatusCondition (hr .GetStatusConditions (), newCondition )
680
- r .event (ctx , * hr , revision , events .EventSeverityInfo , msg )
680
+ r .event (ctx , * hr , revision , eventv1 .EventSeverityInfo , msg )
681
681
return nil
682
682
}
683
683
}
@@ -728,7 +728,7 @@ func (r *HelmReleaseReconciler) event(_ context.Context, hr v2.HelmRelease, revi
728
728
meta = map [string ]string {v2 .GroupVersion .Group + "/revision" : revision }
729
729
}
730
730
eventtype := "Normal"
731
- if severity == events .EventSeverityError {
731
+ if severity == eventv1 .EventSeverityError {
732
732
eventtype = "Warning"
733
733
}
734
734
r .EventRecorder .AnnotatedEventf (& hr , meta , eventtype , severity , msg )
0 commit comments