Skip to content

Commit c96b645

Browse files
committed
Remove owned VPCEs when deleting VPC.
1 parent 8d7cb44 commit c96b645

File tree

3 files changed

+14
-11
lines changed

3 files changed

+14
-11
lines changed

controllers/awscluster_controller_test.go

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1476,6 +1476,18 @@ func mockedDeleteVPCCallsForNonExistentVPC(m *mocks.MockEC2APIMockRecorder) {
14761476
}
14771477

14781478
func mockedDeleteVPCCalls(m *mocks.MockEC2APIMockRecorder) {
1479+
m.DescribeVpcEndpointsPages(gomock.Eq(&ec2.DescribeVpcEndpointsInput{
1480+
Filters: []*ec2.Filter{
1481+
{
1482+
Name: aws.String("tag-key"),
1483+
Values: []*string{aws.String("sigs.k8s.io/cluster-api-provider-aws/cluster/test-cluster")},
1484+
},
1485+
{
1486+
Name: aws.String("vpc-id"),
1487+
Values: []*string{aws.String("vpc-exists")},
1488+
},
1489+
},
1490+
}), gomock.Any()).Return(nil).AnyTimes()
14791491
m.DescribeSubnetsWithContext(context.TODO(), gomock.Eq(&ec2.DescribeSubnetsInput{
14801492
Filters: []*ec2.Filter{
14811493
{

pkg/cloud/services/network/vpc.go

Lines changed: 1 addition & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -276,17 +276,8 @@ func (s *Service) deleteVPCEndpoints() error {
276276
return nil
277277
}
278278

279-
// Gather all services that might have been enabled.
280-
services := sets.New[string]()
281-
if s.scope.Bucket() != nil {
282-
services.Insert(fmt.Sprintf("com.amazonaws.%s.s3", s.scope.Region()))
283-
}
284-
if services.Len() == 0 {
285-
return nil
286-
}
287-
288279
// Get all existing endpoints.
289-
endpoints, err := s.describeVPCEndpoints()
280+
endpoints, err := s.describeVPCEndpoints(filter.EC2.Cluster(s.scope.Name()))
290281
if err != nil {
291282
return errors.Wrap(err, "failed to describe vpc endpoints")
292283
}

test/e2e/shared/suite.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ func Node1BeforeSuite(e2eCtx *E2EContext) []byte {
145145
success = false
146146
}
147147
return success
148-
}, 10*time.Minute, 5*time.Second).Should(BeTrue(), "Should've eventually succeeded creating an AWS CloudFormation stack")
148+
}, 30*time.Minute, 15*time.Second).Should(BeTrue(), "Should've eventually succeeded creating an AWS CloudFormation stack")
149149
}
150150

151151
ensureStackTags(e2eCtx.AWSSession, bootstrapTemplate.Spec.StackName, bootstrapTags)

0 commit comments

Comments
 (0)