Skip to content

Commit 9bbd567

Browse files
committed
Weave the proper context through k8s and machine environ apis
1 parent 673adb1 commit 9bbd567

File tree

222 files changed

+1638
-1431
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

222 files changed

+1638
-1431
lines changed

agent/agentbootstrap/bootstrap.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -652,7 +652,7 @@ func (b *AgentBootstrap) initControllerCloudService(
652652
// this should never happen.
653653
return errors.Errorf("environ %T does not implement ServiceManager interface", env)
654654
}
655-
svc, err := broker.GetService(k8sconstants.JujuControllerStackName, true)
655+
svc, err := broker.GetService(ctx, k8sconstants.JujuControllerStackName, true)
656656
if err != nil {
657657
return errors.Trace(err)
658658
}

api/apiclient.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -639,7 +639,7 @@ func dialAPI(ctx context.Context, info *Info, opts0 DialOpts) (*dialResult, erro
639639
addrs := info.Addrs[:]
640640

641641
if info.Proxier != nil {
642-
if err := info.Proxier.Start(); err != nil {
642+
if err := info.Proxier.Start(ctx); err != nil {
643643
return nil, errors.Annotate(err, "starting proxy for api connection")
644644
}
645645
logger.Debugf("starting proxier for connection")

api/client/modelupgrader/upgrader.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ func (c *Client) UpgradeModel(
8080
}
8181

8282
// UploadTools uploads tools at the specified location to the API server over HTTPS.
83-
func (c *Client) UploadTools(r io.ReadSeeker, vers version.Binary) (tools.List, error) {
83+
func (c *Client) UploadTools(_ context.Context, r io.ReadSeeker, vers version.Binary) (tools.List, error) {
8484
req, err := http.NewRequest("POST", fmt.Sprintf("/tools?binaryVersion=%s", vers), r)
8585
if err != nil {
8686
return nil, errors.Annotate(err, "cannot create upload request")

api/client/modelupgrader/upgrader_test.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -115,6 +115,7 @@ func (s *UpgradeModelSuite) TestUploadTools(c *gc.C) {
115115
client := modelupgrader.NewClient(apiCaller)
116116

117117
result, err := client.UploadTools(
118+
context.Background(),
118119
nil, version.MustParseBinary("2.9.100-ubuntu-amd64"),
119120
)
120121
c.Assert(err, jc.ErrorIsNil)

api/controller/caasoperatorupgrader/client.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,13 +34,13 @@ func NewClient(caller base.APICaller, options ...Option) *Client {
3434
}
3535

3636
// Upgrade upgrades the operator for the specified agent tag to v.
37-
func (c *Client) Upgrade(agentTag string, v version.Number) error {
37+
func (c *Client) Upgrade(ctx context.Context, agentTag string, v version.Number) error {
3838
var result params.ErrorResult
3939
arg := params.KubernetesUpgradeArg{
4040
AgentTag: agentTag,
4141
Version: v,
4242
}
43-
if err := c.facade.FacadeCall(context.TODO(), "UpgradeOperator", arg, &result); err != nil {
43+
if err := c.facade.FacadeCall(ctx, "UpgradeOperator", arg, &result); err != nil {
4444
return errors.Trace(err)
4545
}
4646
if result.Error != nil {

api/controller/caasoperatorupgrader/client_test.go

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@
44
package caasoperatorupgrader_test
55

66
import (
7+
"context"
8+
79
"github.com/juju/testing"
810
jc "github.com/juju/testing/checkers"
911
"github.com/juju/version/v2"
@@ -41,7 +43,7 @@ func (s *provisionerSuite) TestUpgrader(c *gc.C) {
4143
}
4244
return nil
4345
})
44-
err := client.Upgrade("application-foo", version.MustParse("6.6.6"))
46+
err := client.Upgrade(context.Background(), "application-foo", version.MustParse("6.6.6"))
4547
c.Check(err, gc.ErrorMatches, "FAIL")
4648
c.Check(called, jc.IsTrue)
4749
}

api/testing/fakeserver.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ func FakeAPIServer(root interface{}) net.Conn {
1919
serverCodec := jsoncodec.NewNet(c1)
2020
serverRPC := rpc.NewConn(serverCodec, nil)
2121
serverRPC.Serve(root, nil, nil)
22-
serverRPC.Start(context.TODO())
22+
serverRPC.Start(context.Background())
2323
go func() {
2424
<-serverRPC.Dead()
2525
serverRPC.Close()

apiserver/common/secrets/mocks/provider_mock.go

Lines changed: 8 additions & 8 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

apiserver/common/secrets/secrets.go

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ func DrainBackendConfigInfo(
150150
if !ok {
151151
return nil, errors.Errorf("missing secret backend %q", backendID)
152152
}
153-
backendCfg, err := backendConfigInfo(model, backendID, &cfg, authTag, leadershipChecker, true)
153+
backendCfg, err := backendConfigInfo(ctx, model, backendID, &cfg, authTag, leadershipChecker, true)
154154
if err != nil {
155155
return nil, errors.Trace(err)
156156
}
@@ -193,7 +193,7 @@ func BackendConfigInfo(
193193
if !ok {
194194
return nil, errors.Errorf("missing secret backend %q", backendID)
195195
}
196-
backendCfg, err := backendConfigInfo(model, backendID, &cfg, authTag, leadershipChecker, false)
196+
backendCfg, err := backendConfigInfo(ctx, model, backendID, &cfg, authTag, leadershipChecker, false)
197197
if err != nil {
198198
return nil, errors.Trace(err)
199199
}
@@ -203,6 +203,7 @@ func BackendConfigInfo(
203203
}
204204

205205
func backendConfigInfo(
206+
ctx context.Context,
206207
model Model, backendID string, adminCfg *provider.ModelBackendConfig,
207208
authTag names.Tag, leadershipChecker leadership.Checker, forDrain bool,
208209
) (*provider.ModelBackendConfig, error) {
@@ -271,7 +272,7 @@ func backendConfigInfo(
271272
}
272273

273274
logger.Debugf("secrets for %v:\nowned: %v\nconsumed:%v", authTag.String(), ownedRevisions, readRevisions)
274-
cfg, err := p.RestrictedConfig(adminCfg, forDrain, authTag, ownedRevisions[backendID], readRevisions[backendID])
275+
cfg, err := p.RestrictedConfig(ctx, adminCfg, forDrain, authTag, ownedRevisions[backendID], readRevisions[backendID])
275276
if err != nil {
276277
return nil, errors.Trace(err)
277278
}
@@ -603,7 +604,7 @@ func RemoveUserSecrets(
603604
return errors.Trace(err)
604605
}
605606
}
606-
if err := p.CleanupSecrets(&cfg, authTag, revs); err != nil {
607+
if err := p.CleanupSecrets(ctx, &cfg, authTag, revs); err != nil {
607608
return errors.Trace(err)
608609
}
609610
return nil

apiserver/common/secrets/secrets_test.go

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -299,7 +299,7 @@ func (s *secretsSuite) assertBackendConfigInfoLeaderUnit(c *gc.C, wanted []strin
299299
ValueRef: &coresecrets.ValueRef{BackendID: "backend-id", RevisionID: "read-rev-1"},
300300
}}, nil),
301301
)
302-
p.EXPECT().RestrictedConfig(&adminCfg, false, unitTag, ownedRevs, readRevs).Return(&adminCfg.BackendConfig, nil)
302+
p.EXPECT().RestrictedConfig(context.Background(), &adminCfg, false, unitTag, ownedRevs, readRevs).Return(&adminCfg.BackendConfig, nil)
303303

304304
info, err := secrets.BackendConfigInfo(context.Background(), model, cloudService, credentialService, wanted, false, unitTag, leadershipChecker)
305305
c.Assert(err, jc.ErrorIsNil)
@@ -412,7 +412,7 @@ func (s *secretsSuite) TestBackendConfigInfoNonLeaderUnit(c *gc.C) {
412412
ValueRef: &coresecrets.ValueRef{BackendID: "backend-id", RevisionID: "app-owned-rev-3"},
413413
}}, nil),
414414
)
415-
p.EXPECT().RestrictedConfig(&adminCfg, false, unitTag, ownedRevs, readRevs).Return(&adminCfg.BackendConfig, nil)
415+
p.EXPECT().RestrictedConfig(context.Background(), &adminCfg, false, unitTag, ownedRevs, readRevs).Return(&adminCfg.BackendConfig, nil)
416416

417417
info, err := secrets.BackendConfigInfo(context.Background(), model, cloudService, credentialService, []string{"backend-id"}, false, unitTag, leadershipChecker)
418418
c.Assert(err, jc.ErrorIsNil)
@@ -525,7 +525,7 @@ func (s *secretsSuite) TestDrainBackendConfigInfo(c *gc.C) {
525525
ValueRef: &coresecrets.ValueRef{BackendID: "backend-id", RevisionID: "app-owned-rev-3"},
526526
}}, nil),
527527
)
528-
p.EXPECT().RestrictedConfig(&adminCfg, true, unitTag, ownedRevs, readRevs).Return(&adminCfg.BackendConfig, nil)
528+
p.EXPECT().RestrictedConfig(context.Background(), &adminCfg, true, unitTag, ownedRevs, readRevs).Return(&adminCfg.BackendConfig, nil)
529529

530530
info, err := secrets.DrainBackendConfigInfo(context.Background(), "backend-id", model, cloudService, credentialService, unitTag, leadershipChecker)
531531
c.Assert(err, jc.ErrorIsNil)
@@ -617,7 +617,7 @@ func (s *secretsSuite) TestBackendConfigInfoAppTagLogin(c *gc.C) {
617617
ValueRef: &coresecrets.ValueRef{BackendID: "backend-id", RevisionID: "read-rev-1"},
618618
}}, nil),
619619
)
620-
p.EXPECT().RestrictedConfig(&adminCfg, false, appTag, ownedRevs, readRevs).Return(&adminCfg.BackendConfig, nil)
620+
p.EXPECT().RestrictedConfig(context.Background(), &adminCfg, false, appTag, ownedRevs, readRevs).Return(&adminCfg.BackendConfig, nil)
621621

622622
info, err := secrets.BackendConfigInfo(context.Background(), model, cloudService, credentialService, []string{"backend-id"}, false, appTag, leadershipChecker)
623623
c.Assert(err, jc.ErrorIsNil)
@@ -965,6 +965,7 @@ func (s *secretsSuite) TestRemoveSecretsForModelAdminWithRevisions(c *gc.C) {
965965
mockprovider.EXPECT().NewBackend(cfg).Return(backend, nil)
966966
backend.EXPECT().DeleteContent(gomock.Any(), "rev-666").Return(nil)
967967
mockprovider.EXPECT().CleanupSecrets(
968+
gomock.Any(),
968969
cfg, names.NewUserTag("foo"),
969970
provider.SecretRevisions{uri.ID: set.NewStrings("rev-666")},
970971
).Return(nil)
@@ -1043,6 +1044,7 @@ func (s *secretsSuite) TestRemoveSecretsForModelAdmin(c *gc.C) {
10431044
mockprovider.EXPECT().NewBackend(cfg).Return(backend, nil)
10441045
backend.EXPECT().DeleteContent(gomock.Any(), "rev-666").Return(nil)
10451046
mockprovider.EXPECT().CleanupSecrets(
1047+
gomock.Any(),
10461048
cfg, names.NewUserTag("foo"),
10471049
provider.SecretRevisions{uri.ID: set.NewStrings("rev-666")},
10481050
).Return(nil)

0 commit comments

Comments
 (0)