@@ -141,7 +141,7 @@ func (r *RepoManagerReconciler) setStatusConditions(ctx context.Context, pulp *p
141141 Message : "All tasks ran successfully" ,
142142 })
143143
144- if err := r .Status ().Update (context . Background () , pulp ); err != nil && errors .IsConflict (err ) {
144+ if err := r .Status ().Update (ctx , pulp ); err != nil && errors .IsConflict (err ) {
145145 log .V (1 ).Info ("Failed to update pulp status" , "error" , err )
146146 return & ctrl.Result {Requeue : true }
147147 }
@@ -236,7 +236,7 @@ func objS3SecretCondition() func(*pulpv1.Pulp) bool {
236236// dbFieldsEncrSecretCondition returns the function to verify if a new pulp.Status.DBFieldsEncryptionSecret should be set
237237func dbFieldsEncrSecretCondition () func (* pulpv1.Pulp ) bool {
238238 return func (pulp * pulpv1.Pulp ) bool {
239- return len (pulp .Status .DBFieldsEncryptionSecret ) == 0 && len ( pulp .Spec .DBFieldsEncryptionSecret ) > 0
239+ return len (pulp .Status .DBFieldsEncryptionSecret ) == 0 || pulp .Spec .DBFieldsEncryptionSecret != pulp . Status . DBFieldsEncryptionSecret
240240 }
241241}
242242
@@ -248,21 +248,21 @@ func ingressTypeCondition() func(*pulpv1.Pulp) bool {
248248// containerTokenSecretCondition returns the function to verify if a new pulp.Status.ContainerTokenSecret should be set
249249func containerTokenSecretCondition () func (* pulpv1.Pulp ) bool {
250250 return func (pulp * pulpv1.Pulp ) bool {
251- return len (pulp .Status .ContainerTokenSecret ) == 0 && len ( pulp .Spec .ContainerTokenSecret ) > 0
251+ return len (pulp .Status .ContainerTokenSecret ) == 0 || pulp .Spec .ContainerTokenSecret != pulp . Status . ContainerTokenSecret
252252 }
253253}
254254
255255// adminPwdSecretCondition returns the function to verify if a new pulp.Status.AdminPasswordSecret should be set
256256func adminPwdSecretCondition () func (* pulpv1.Pulp ) bool {
257257 return func (pulp * pulpv1.Pulp ) bool {
258- return len (pulp .Status .AdminPasswordSecret ) == 0 && len ( pulp .Spec .AdminPasswordSecret ) > 0
258+ return len (pulp .Status .AdminPasswordSecret ) == 0 || pulp .Spec .AdminPasswordSecret != pulp . Status . AdminPasswordSecret
259259 }
260260}
261261
262262// externalCacheSecretCondition returns the function to verify if a new pulp.Status.ExternalCacheSecret should be set
263263func externalCacheSecretCondition () func (* pulpv1.Pulp ) bool {
264264 return func (pulp * pulpv1.Pulp ) bool {
265- return len (pulp .Status .ExternalCacheSecret ) == 0 && len ( pulp .Spec .Cache .ExternalCacheSecret ) > 0
265+ return len (pulp .Status .ExternalCacheSecret ) == 0 || pulp .Spec .Cache .ExternalCacheSecret != pulp . Status . ExternalCacheSecret
266266 }
267267}
268268
@@ -283,7 +283,7 @@ func telemetryEnabledCondition() func(*pulpv1.Pulp) bool {
283283// pulpSecretKeyCondition returns the function to verify if a new pulp.Status.PulpSecretKey should be set
284284func pulpSecretKeyCondition () func (* pulpv1.Pulp ) bool {
285285 return func (pulp * pulpv1.Pulp ) bool {
286- return len (pulp .Status .PulpSecretKey ) == 0 && len ( pulp .Spec .PulpSecretKey ) > 0
286+ return len (pulp .Status .PulpSecretKey ) == 0 || pulp .Spec .PulpSecretKey != pulp . Status . PulpSecretKey
287287 }
288288}
289289
0 commit comments