Skip to content

Commit 92600d5

Browse files
authored
Merge pull request #3400 from dlmather/dmather/issue-3394/invalid-secret-backend
Only attempt to delete bootstrap data secret if InsecureSkipSecretsManager isn't set
2 parents f32e98d + d15f9bc commit 92600d5

File tree

2 files changed

+18
-2
lines changed

2 files changed

+18
-2
lines changed

controllers/awsmachine_controller.go

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -733,8 +733,10 @@ func (r *AWSMachineReconciler) ignitionUserData(scope *scope.MachineScope, objec
733733
}
734734

735735
func (r *AWSMachineReconciler) deleteBootstrapData(machineScope *scope.MachineScope, clusterScope cloud.ClusterScoper, objectStoreScope scope.S3Scope) error {
736-
if err := r.deleteEncryptedBootstrapDataSecret(machineScope, clusterScope); err != nil {
737-
return err
736+
if !machineScope.AWSMachine.Spec.CloudInit.InsecureSkipSecretsManager {
737+
if err := r.deleteEncryptedBootstrapDataSecret(machineScope, clusterScope); err != nil {
738+
return err
739+
}
738740
}
739741

740742
if objectStoreScope != nil {

controllers/awsmachine_controller_unit_test.go

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1079,6 +1079,20 @@ func TestAWSMachineReconciler(t *testing.T) {
10791079
ec2Svc.EXPECT().TerminateInstanceAndWait(gomock.Any()).Return(nil).AnyTimes()
10801080
_, _ = reconciler.reconcileDelete(ms, cs, cs, cs, cs)
10811081
})
1082+
t.Run("should not attempt to delete the secret if InsecureSkipSecretsManager is set on CloudInit", func(t *testing.T) {
1083+
g := NewWithT(t)
1084+
awsMachine := getAWSMachine()
1085+
setup(t, g, awsMachine)
1086+
defer teardown(t, g)
1087+
setNodeRef(t, g)
1088+
1089+
ms.AWSMachine.Spec.CloudInit.InsecureSkipSecretsManager = true
1090+
1091+
secretSvc.EXPECT().Delete(gomock.Any()).Return(nil).Times(0)
1092+
ec2Svc.EXPECT().TerminateInstanceAndWait(gomock.Any()).Return(nil).AnyTimes()
1093+
1094+
_, _ = reconciler.reconcileDelete(ms, cs, cs, cs, cs)
1095+
})
10821096
})
10831097

10841098
t.Run("Secrets management lifecycle when there's only a secret ARN and no node ref", func(t *testing.T) {

0 commit comments

Comments
 (0)