@@ -25,9 +25,6 @@ import (
2525 apiErrors "k8s.io/apimachinery/pkg/api/errors"
2626 metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
2727 "k8s.io/apimachinery/pkg/util/rand"
28- applycorev1 "k8s.io/client-go/applyconfigurations/core/v1"
29- applymetav1 "k8s.io/client-go/applyconfigurations/meta/v1"
30- "k8s.io/utils/ptr"
3128 ctrl "sigs.k8s.io/controller-runtime"
3229 "sigs.k8s.io/controller-runtime/pkg/client"
3330 "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
@@ -243,29 +240,8 @@ func (r *ConnectionSecretReconciler) ensureSecret(
243240 return err
244241 }
245242
246- // Build OwnerReferenceApplyConfigurations
247- ownerReferences := make ([]* applymetav1.OwnerReferenceApplyConfiguration , len (secret .OwnerReferences ))
248- for i , ref := range secret .OwnerReferences {
249- ownerReferences [i ] = applymetav1 .OwnerReference ().
250- WithAPIVersion (ref .APIVersion ).
251- WithKind (ref .Kind ).
252- WithName (ref .Name ).
253- WithUID (ref .UID ).
254- WithBlockOwnerDeletion (ptr .Deref (ref .BlockOwnerDeletion , false )).
255- WithController (ptr .Deref (ref .Controller , false ))
256- }
257-
258- // Create SecretApplyConfiguration
259- secretApplyConfig := applycorev1 .Secret (name , namespace ).
260- WithKind ("Secret" ).
261- WithAPIVersion ("v1" ).
262- WithData (secret .Data ).
263- WithAnnotations (secret .Annotations ).
264- WithLabels (secret .Labels ).
265- WithOwnerReferences (ownerReferences ... )
266-
267- // Apply the secret to the cluster
268- if err := r .Client .Apply (ctx , secretApplyConfig , client .ForceOwnership , ConnectionSecretGoFieldOwner ); err != nil {
243+ // Apply the secret
244+ if err := r .Client .Patch (ctx , secret , client .Apply , client .ForceOwnership , ConnectionSecretGoFieldOwner ); err != nil {
269245 log .Errorw ("failed to create/update secret via apply" , "error" , err )
270246 return err
271247 }
0 commit comments