Skip to content

Commit 5414e8c

Browse files
Merge pull request #317 from shiftstack/OSPRH-7546
🐛 OSPRH-7546 - return a fatal error if server CA pass secret isn't found
2 parents 3b6b876 + cc02722 commit 5414e8c

File tree

2 files changed

+4
-7
lines changed

2 files changed

+4
-7
lines changed

controllers/octavia_controller.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -508,7 +508,7 @@ func (r *OctaviaReconciler) reconcileNormal(ctx context.Context, instance *octav
508508
condition.RabbitMqTransportURLReadyMessage)
509509
instance.Status.Conditions.MarkTrue(condition.InputReadyCondition, condition.InputReadyMessage)
510510

511-
err = octavia.EnsureAmphoraCerts(ctx, instance, helper, &Log)
511+
err = octavia.EnsureAmphoraCerts(ctx, instance, helper)
512512
if err != nil {
513513
instance.Status.Conditions.Set(condition.FalseCondition(
514514
octaviav1.OctaviaAmphoraCertsReadyCondition,

pkg/octavia/amphora_certs.go

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@ import (
2626
"math/big"
2727
"time"
2828

29-
"github.com/go-logr/logr"
3029
"github.com/openstack-k8s-operators/lib-common/modules/common/helper"
3130
"github.com/openstack-k8s-operators/lib-common/modules/common/secret"
3231
octaviav1 "github.com/openstack-k8s-operators/octavia-operator/api/v1beta1"
@@ -149,8 +148,7 @@ func generateClientCert(caTemplate *x509.Certificate, certPrivKey *rsa.PrivateKe
149148
func EnsureAmphoraCerts(
150149
ctx context.Context,
151150
instance *octaviav1.Octavia,
152-
h *helper.Helper,
153-
log *logr.Logger) error {
151+
h *helper.Helper) error {
154152
var oAmpSecret *corev1.Secret
155153
var serverCAPass []byte
156154

@@ -165,10 +163,9 @@ func EnsureAmphoraCerts(
165163
cAPassSecret, _, err := secret.GetSecret(
166164
ctx, h, serverCAPassSecretName, instance.Namespace)
167165
if err != nil {
168-
log.Info("Could not read server CA passphrase. No encryption will be applied to the generated key.")
169-
} else {
170-
serverCAPass = cAPassSecret.Data["server-ca-passphrase"]
166+
return fmt.Errorf("Error retrieving secret %s needed to encrypt the generated key - %w", serverCAPassSecretName, err)
171167
}
168+
serverCAPass = cAPassSecret.Data["server-ca-passphrase"]
172169

173170
serverCAKey, serverCAKeyPEM, err := generateKey(serverCAPass)
174171
if err != nil {

0 commit comments

Comments
 (0)