@@ -194,12 +194,10 @@ func (p *Provider) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result
194
194
}
195
195
196
196
// Extract and validate kubeconfig data
197
- kubeconfigData , err := p .extractKubeconfigData (secret , log )
198
- if err != nil {
199
- return ctrl.Result {}, err
200
- }
201
- if kubeconfigData == nil {
202
- return ctrl.Result {}, nil // No kubeconfig data found
197
+ kubeconfigData , ok := secret .Data [p .opts .KubeconfigSecretKey ]
198
+ if ! ok || len (kubeconfigData ) == 0 {
199
+ log .Info ("Secret does not contain kubeconfig data, skipping" , "key" , p .opts .KubeconfigSecretKey )
200
+ return ctrl.Result {}, nil
203
201
}
204
202
205
203
// Hash the kubeconfig for change detection
@@ -239,16 +237,6 @@ func (p *Provider) getSecret(ctx context.Context, namespacedName client.ObjectKe
239
237
return secret , nil
240
238
}
241
239
242
- // extractKubeconfigData extracts kubeconfig data from a secret
243
- func (p * Provider ) extractKubeconfigData (secret * corev1.Secret , log logr.Logger ) ([]byte , error ) {
244
- kubeconfigData , ok := secret .Data [p .opts .KubeconfigSecretKey ]
245
- if ! ok {
246
- log .Info ("Secret does not contain kubeconfig data" , "key" , p .opts .KubeconfigSecretKey )
247
- return nil , nil
248
- }
249
- return kubeconfigData , nil
250
- }
251
-
252
240
// hashKubeconfig creates a hash of the kubeconfig data
253
241
func (p * Provider ) hashKubeconfig (kubeconfigData []byte ) string {
254
242
hash := sha256 .New ()
0 commit comments