Skip to content

Commit 300b803

Browse files
committed
Add more checks around dataplaneKeySecretName
1 parent 0d20f68 commit 300b803

File tree

3 files changed

+12
-6
lines changed

3 files changed

+12
-6
lines changed

internal/controller/provisioner/eventloop.go

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,10 @@ func newEventLoop(
4040
secretsToWatch := make([]string, 0, len(dockerSecrets)+5)
4141
secretsToWatch = append(secretsToWatch, agentTLSSecret)
4242
secretsToWatch = append(secretsToWatch, dockerSecrets...)
43-
secretsToWatch = append(secretsToWatch, dataplaneKeySecret)
43+
44+
if dataplaneKeySecret != "" {
45+
secretsToWatch = append(secretsToWatch, dataplaneKeySecret)
46+
}
4447

4548
if usageConfig != nil {
4649
if usageConfig.SecretName != "" {

internal/controller/provisioner/handler.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,12 +124,10 @@ func (h *eventHandler) HandleEventBatch(ctx context.Context, logger logr.Logger,
124124
}
125125
case *corev1.Secret:
126126
if h.provisioner.isUserSecret(e.NamespacedName.Name) {
127-
fmt.Println("This should be a user secret")
128127
if err := h.deprovisionSecretsForAllGateways(ctx, e.NamespacedName.Name); err != nil {
129128
logger.Error(err, "error removing secrets")
130129
}
131130
} else {
132-
fmt.Println("aparently we are reprovisioning")
133131
if err := h.reprovisionResources(ctx, e); err != nil {
134132
logger.Error(err, "error re-provisioning nginx resources")
135133
}

internal/controller/provisioner/provisioner.go

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -106,13 +106,18 @@ func NewNginxProvisioner(
106106
clientSSLSecretName = cfg.PlusUsageConfig.ClientSSLSecretName
107107
}
108108

109+
var dataplaneKeySecretName string
110+
if cfg.NginxOneConsoleTelemetryConfig.DataplaneKeySecretName != "" {
111+
dataplaneKeySecretName = cfg.NginxOneConsoleTelemetryConfig.DataplaneKeySecretName
112+
}
113+
109114
store := newStore(
110115
cfg.NginxDockerSecretNames,
111116
cfg.AgentTLSSecretName,
112117
jwtSecretName,
113118
caSecretName,
114119
clientSSLSecretName,
115-
cfg.NginxOneConsoleTelemetryConfig.DataplaneKeySecretName,
120+
dataplaneKeySecretName,
116121
)
117122

118123
selector := metav1.LabelSelector{
@@ -133,7 +138,7 @@ func NewNginxProvisioner(
133138
agentLabelCollector := labelCollectorFactory(mgr, cfg)
134139
agentLabels, err := agentLabelCollector.Collect(ctx)
135140
if err != nil {
136-
return nil, nil, fmt.Errorf("failed to collect agent labels: %w", err)
141+
cfg.Logger.Error(err, "failed to collect agent labels")
137142
}
138143
cfg.AgentLabels = agentLabels
139144

@@ -160,7 +165,7 @@ func NewNginxProvisioner(
160165
cfg.GatewayPodConfig.Namespace,
161166
cfg.NginxDockerSecretNames,
162167
cfg.AgentTLSSecretName,
163-
cfg.NginxOneConsoleTelemetryConfig.DataplaneKeySecretName,
168+
dataplaneKeySecretName,
164169
cfg.PlusUsageConfig,
165170
isOpenshift,
166171
)

0 commit comments

Comments
 (0)