Skip to content
This repository was archived by the owner on Dec 5, 2023. It is now read-only.

Commit d8cc366

Browse files
committed
remove nightly fmt options
1 parent 3635605 commit d8cc366

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+3293
-884
lines changed

tembo-operator/Cargo.lock

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

tembo-operator/Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
[package]
22
name = "controller"
33
description = "Tembo Operator for Postgres"
4-
version = "0.21.1"
4+
version = "0.21.3"
55
edition = "2021"
66
default-run = "controller"
77
license = "Apache-2.0"

tembo-operator/rustfmt.toml

Lines changed: 0 additions & 12 deletions
This file was deleted.

tembo-operator/src/apis/coredb_types.rs

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,9 @@ use k8s_openapi::{
1313
apimachinery::pkg::{api::resource::Quantity, apis::meta::v1::ObjectMeta},
1414
};
1515

16-
use crate::cloudnativepg::poolers::{PoolerPgbouncerPoolMode, PoolerTemplateSpecContainersResources};
16+
use crate::cloudnativepg::poolers::{
17+
PoolerPgbouncerPoolMode, PoolerTemplateSpecContainersResources,
18+
};
1719
use chrono::{DateTime, Utc};
1820
use kube::CustomResource;
1921
use schemars::JsonSchema;
@@ -35,7 +37,11 @@ pub struct ServiceAccountTemplate {
3537

3638
#[derive(Serialize, Deserialize, Clone, Debug, Default, JsonSchema)]
3739
pub struct S3Credentials {
38-
#[serde(default, skip_serializing_if = "Option::is_none", rename = "accessKeyId")]
40+
#[serde(
41+
default,
42+
skip_serializing_if = "Option::is_none",
43+
rename = "accessKeyId"
44+
)]
3945
pub access_key_id: Option<S3CredentialsAccessKeyId>,
4046
#[serde(
4147
default,
@@ -45,9 +51,17 @@ pub struct S3Credentials {
4551
pub inherit_from_iam_role: Option<bool>,
4652
#[serde(default, skip_serializing_if = "Option::is_none")]
4753
pub region: Option<S3CredentialsRegion>,
48-
#[serde(default, skip_serializing_if = "Option::is_none", rename = "secretAccessKey")]
54+
#[serde(
55+
default,
56+
skip_serializing_if = "Option::is_none",
57+
rename = "secretAccessKey"
58+
)]
4959
pub secret_access_key: Option<S3CredentialsSecretAccessKey>,
50-
#[serde(default, skip_serializing_if = "Option::is_none", rename = "sessionToken")]
60+
#[serde(
61+
default,
62+
skip_serializing_if = "Option::is_none",
63+
rename = "sessionToken"
64+
)]
5165
pub session_token: Option<S3CredentialsSessionToken>,
5266
}
5367

@@ -237,7 +251,8 @@ impl CoreDBSpec {
237251
}
238252
}
239253

240-
let shared_preload_from_extensions = ConfigValue::Multiple(include_with_shared_preload_libraries);
254+
let shared_preload_from_extensions =
255+
ConfigValue::Multiple(include_with_shared_preload_libraries);
241256
let extension_settings_config = vec![PgConfig {
242257
name: "shared_preload_libraries".to_string(),
243258
value: shared_preload_from_extensions,

tembo-operator/src/apis/postgres_parameters.rs

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,8 @@ pub const MULTI_VAL_CONFIGS: [&str; 5] = [
2525
// This array defines the priority order for any multi-value config
2626
// This defines any required order for shared_preload_libraries, otherwise alphabetical
2727
// TODO: move this to a trunk endpoint
28-
pub const MULTI_VAL_CONFIGS_PRIORITY_LIST: [&str; 3] = ["citus", "pg_stat_statements", "pg_stat_kcache"];
28+
pub const MULTI_VAL_CONFIGS_PRIORITY_LIST: [&str; 3] =
29+
["citus", "pg_stat_statements", "pg_stat_kcache"];
2930

3031
// configurations that are not allowed to be set by the user
3132
pub const DISALLOWED_CONFIGS: [&str; 66] = [
@@ -223,7 +224,8 @@ impl JsonSchema for ConfigValue {
223224

224225
fn json_schema(_: &mut schemars::gen::SchemaGenerator) -> schemars::schema::Schema {
225226
let mut schema_object = SchemaObject::default();
226-
schema_object.metadata().description = Some("A postgresql.conf configuration value".to_owned());
227+
schema_object.metadata().description =
228+
Some("A postgresql.conf configuration value".to_owned());
227229
schema_object.metadata().read_only = false;
228230
// overriding the enums to be a string
229231
schema_object.instance_type = Some(schemars::schema::InstanceType::String.into());
@@ -359,7 +361,8 @@ impl<'de> Deserialize<'de> for PgConfig {
359361
let raw_value = value.ok_or_else(|| M::Error::custom("key 'value' not found"))?;
360362

361363
let value = if MULTI_VAL_CONFIGS.contains(&name.as_str()) {
362-
let set: BTreeSet<String> = raw_value.split(',').map(|s| s.trim().to_string()).collect();
364+
let set: BTreeSet<String> =
365+
raw_value.split(',').map(|s| s.trim().to_string()).collect();
363366
ConfigValue::Multiple(set)
364367
} else {
365368
ConfigValue::Single(raw_value)
@@ -435,7 +438,10 @@ mod pg_param_tests {
435438
};
436439
let mut requires_load: BTreeMap<String, String> = BTreeMap::new();
437440
requires_load.insert("pg_cron".to_string(), "pg_cron".to_string());
438-
requires_load.insert("pg_stat_statements".to_string(), "pg_stat_statements".to_string());
441+
requires_load.insert(
442+
"pg_stat_statements".to_string(),
443+
"pg_stat_statements".to_string(),
444+
);
439445
let pg_configs = spec
440446
.get_pg_configs(requires_load)
441447
.expect("failed to get pg configs")
@@ -538,7 +544,8 @@ mod pg_param_tests {
538544
serialized,
539545
"{\"name\":\"shared_preload_libraries\",\"value\":\"a,b,c\"}"
540546
);
541-
let deserialized: PgConfig = serde_json::from_str(&serialized).expect("failed to deserialize");
547+
let deserialized: PgConfig =
548+
serde_json::from_str(&serialized).expect("failed to deserialize");
542549
match deserialized.value {
543550
ConfigValue::Multiple(set) => {
544551
assert_eq!(set.len(), 3);

tembo-operator/src/app_service/ingress.rs

Lines changed: 26 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
use crate::{
22
ingress_route_crd::{
33
IngressRoute, IngressRouteRoutes, IngressRouteRoutesKind, IngressRouteRoutesMiddlewares,
4-
IngressRouteRoutesServices, IngressRouteRoutesServicesKind, IngressRouteSpec, IngressRouteTls,
4+
IngressRouteRoutesServices, IngressRouteRoutesServicesKind, IngressRouteSpec,
5+
IngressRouteTls,
56
},
67
traefik::middlewares_crd::{
7-
Middleware as TraefikMiddleware, MiddlewareHeaders, MiddlewareReplacePathRegex, MiddlewareSpec,
8-
MiddlewareStripPrefix,
8+
Middleware as TraefikMiddleware, MiddlewareHeaders, MiddlewareReplacePathRegex,
9+
MiddlewareSpec, MiddlewareStripPrefix,
910
},
1011
Result,
1112
};
@@ -220,7 +221,8 @@ pub async fn reconcile_ingress(
220221
let ingress_api: Api<IngressRoute> = Api::namespaced(client.clone(), ns);
221222

222223
let middleware_api: Api<TraefikMiddleware> = Api::namespaced(client.clone(), ns);
223-
let desired_middlewares = generate_middlewares(coredb_name, ns, oref.clone(), desired_middlewares);
224+
let desired_middlewares =
225+
generate_middlewares(coredb_name, ns, oref.clone(), desired_middlewares);
224226
let actual_mw_names = get_middlewares(client.clone(), ns, coredb_name).await?;
225227
let desired_mw_names = desired_middlewares
226228
.iter()
@@ -233,15 +235,21 @@ pub async fn reconcile_ingress(
233235
debug!("ns: {}, successfully deleted Middleware: {}", ns, d);
234236
}
235237
Err(e) => {
236-
error!("ns: {}, Failed to delete Middleware: {}, error: {}", ns, d, e);
238+
error!(
239+
"ns: {}, Failed to delete Middleware: {}, error: {}",
240+
ns, d, e
241+
);
237242
}
238243
}
239244
}
240245
}
241246
for desired_mw in desired_middlewares {
242247
match apply_middleware(middleware_api.clone(), &desired_mw.name, &desired_mw.mw).await {
243248
Ok(_) => {
244-
debug!("ns: {}, successfully applied Middleware: {}", ns, desired_mw.name);
249+
debug!(
250+
"ns: {}, successfully applied Middleware: {}",
251+
ns, desired_mw.name
252+
);
245253
}
246254
Err(e) => {
247255
error!(
@@ -295,7 +303,9 @@ async fn apply_middleware(
295303
mw: &TraefikMiddleware,
296304
) -> Result<TraefikMiddleware, kube::Error> {
297305
let patch_parameters = PatchParams::apply("cntrlr").force();
298-
mw_api.patch(mw_name, &patch_parameters, &Patch::Apply(&mw)).await
306+
mw_api
307+
.patch(mw_name, &patch_parameters, &Patch::Apply(&mw))
308+
.await
299309
}
300310

301311
async fn apply_ingress_route(
@@ -305,7 +315,11 @@ async fn apply_ingress_route(
305315
) -> Result<IngressRoute, kube::Error> {
306316
let patch_parameters = PatchParams::apply("cntrlr").force();
307317
ingress_api
308-
.patch(ingress_name, &patch_parameters, &Patch::Apply(&ingress_route))
318+
.patch(
319+
ingress_name,
320+
&patch_parameters,
321+
&Patch::Apply(&ingress_route),
322+
)
309323
.await
310324
}
311325

@@ -314,7 +328,10 @@ async fn get_middlewares(
314328
namespace: &str,
315329
coredb_name: &str,
316330
) -> Result<Vec<String>, kube::Error> {
317-
let label_selector = format!("component={},coredb.io/name={}", COMPONENT_NAME, coredb_name);
331+
let label_selector = format!(
332+
"component={},coredb.io/name={}",
333+
COMPONENT_NAME, coredb_name
334+
);
318335
let deployent_api: Api<TraefikMiddleware> = Api::namespaced(client, namespace);
319336
let lp = ListParams::default().labels(&label_selector).timeout(10);
320337
let deployments = deployent_api.list(&lp).await?;

tembo-operator/src/app_service/manager.rs

Lines changed: 21 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,13 @@
1-
use crate::{apis::coredb_types::CoreDB, ingress_route_crd::IngressRouteRoutes, Context, Error, Result};
1+
use crate::{
2+
apis::coredb_types::CoreDB, ingress_route_crd::IngressRouteRoutes, Context, Error, Result,
3+
};
24
use k8s_openapi::{
35
api::{
46
apps::v1::{Deployment, DeploymentSpec},
57
core::v1::{
68
Capabilities, Container, ContainerPort, EnvVar, EnvVarSource, HTTPGetAction, PodSpec,
7-
PodTemplateSpec, Probe, SecretKeySelector, SecurityContext, Service, ServicePort, ServiceSpec,
9+
PodTemplateSpec, Probe, SecretKeySelector, SecurityContext, Service, ServicePort,
10+
ServiceSpec,
811
},
912
},
1013
apimachinery::pkg::{
@@ -352,7 +355,10 @@ async fn get_appservice_deployments(
352355
namespace: &str,
353356
coredb_name: &str,
354357
) -> Result<Vec<String>, Error> {
355-
let label_selector = format!("component={},coredb.io/name={}", COMPONENT_NAME, coredb_name);
358+
let label_selector = format!(
359+
"component={},coredb.io/name={}",
360+
COMPONENT_NAME, coredb_name
361+
);
356362
let deployent_api: Api<Deployment> = Api::namespaced(client.clone(), namespace);
357363
let lp = ListParams::default().labels(&label_selector).timeout(10);
358364
let deployments = deployent_api.list(&lp).await.map_err(Error::KubeError)?;
@@ -370,7 +376,10 @@ async fn get_appservice_services(
370376
namespace: &str,
371377
coredb_name: &str,
372378
) -> Result<Vec<String>, Error> {
373-
let label_selector = format!("component={},coredb.io/name={}", COMPONENT_NAME, coredb_name);
379+
let label_selector = format!(
380+
"component={},coredb.io/name={}",
381+
COMPONENT_NAME, coredb_name
382+
);
374383
let deployent_api: Api<Service> = Api::namespaced(client.clone(), namespace);
375384
let lp = ListParams::default().labels(&label_selector).timeout(10);
376385
let services = deployent_api.list(&lp).await.map_err(Error::KubeError)?;
@@ -516,7 +525,10 @@ pub async fn reconcile_app_services(cdb: &CoreDB, ctx: Arc<Context>) -> Result<(
516525
}
517526
Err(e) => {
518527
has_errors = true;
519-
error!("ns: {}, Failed to delete AppService: {}, error: {}", ns, d, e);
528+
error!(
529+
"ns: {}, Failed to delete AppService: {}, error: {}",
530+
ns, d, e
531+
);
520532
}
521533
}
522534
}
@@ -531,7 +543,10 @@ pub async fn reconcile_app_services(cdb: &CoreDB, ctx: Arc<Context>) -> Result<(
531543
}
532544
Err(e) => {
533545
has_errors = true;
534-
error!("ns: {}, Failed to delete AppService: {}, error: {}", ns, d, e);
546+
error!(
547+
"ns: {}, Failed to delete AppService: {}, error: {}",
548+
ns, d, e
549+
);
535550
}
536551
}
537552
}

0 commit comments

Comments
 (0)