Skip to content

Commit

Permalink
Revert "⏪ reverted userAssignedIdenties logic based pn PR #2214"
Browse files Browse the repository at this point in the history
This reverts commit 48768e4.
  • Loading branch information
mboersma committed Oct 2, 2023
1 parent 337e5d5 commit d75fb0a
Show file tree
Hide file tree
Showing 3 changed files with 24 additions and 3 deletions.
9 changes: 8 additions & 1 deletion controllers/azurejson_machine_controller.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,7 @@ import (
"k8s.io/utils/ptr"
infrav1 "sigs.k8s.io/cluster-api-provider-azure/api/v1beta1"
"sigs.k8s.io/cluster-api-provider-azure/azure/scope"
"sigs.k8s.io/cluster-api-provider-azure/azure/services/identities"
"sigs.k8s.io/cluster-api-provider-azure/util/reconciler"
"sigs.k8s.io/cluster-api-provider-azure/util/tele"
clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1"
Expand Down Expand Up @@ -214,7 +215,13 @@ func (r *AzureJSONMachineReconciler) Reconcile(ctx context.Context, req ctrl.Req
// Construct secret for this machine
userAssignedIdentityIfExists := ""
if len(azureMachine.Spec.UserAssignedIdentities) > 0 {
userAssignedIdentityIfExists = azureMachine.Spec.UserAssignedIdentities[0].ProviderID
// TODO: remove this ClientID lookup code when the fixed cloud-provider-azure is default
idsClient := identities.NewClient(clusterScope)

Check failure on line 219 in controllers/azurejson_machine_controller.go

View workflow job for this annotation

GitHub Actions / coverage

assignment mismatch: 1 variable but identities.NewClient returns 2 values

Check failure on line 219 in controllers/azurejson_machine_controller.go

View workflow job for this annotation

GitHub Actions / coverage

assignment mismatch: 1 variable but identities.NewClient returns 2 values

Check failure on line 219 in controllers/azurejson_machine_controller.go

View workflow job for this annotation

GitHub Actions / coverage

assignment mismatch: 1 variable but identities.NewClient returns 2 values
userAssignedIdentityIfExists, err = idsClient.GetClientID(
ctx, azureMachine.Spec.UserAssignedIdentities[0].ProviderID)
if err != nil {
return reconcile.Result{}, errors.Wrap(err, "failed to get user-assigned identity ClientID")
}
}

if azureMachine.Spec.Identity == infrav1.VMIdentityNone {
Expand Down
9 changes: 8 additions & 1 deletion controllers/azurejson_machinepool_controller.go
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,7 @@ import (
"k8s.io/utils/ptr"
infrav1 "sigs.k8s.io/cluster-api-provider-azure/api/v1beta1"
"sigs.k8s.io/cluster-api-provider-azure/azure/scope"
"sigs.k8s.io/cluster-api-provider-azure/azure/services/identities"
infrav1exp "sigs.k8s.io/cluster-api-provider-azure/exp/api/v1beta1"
"sigs.k8s.io/cluster-api-provider-azure/util/reconciler"
"sigs.k8s.io/cluster-api-provider-azure/util/tele"
Expand Down Expand Up @@ -174,7 +175,13 @@ func (r *AzureJSONMachinePoolReconciler) Reconcile(ctx context.Context, req ctrl
// Construct secret for this machine
userAssignedIdentityIfExists := ""
if len(azureMachinePool.Spec.UserAssignedIdentities) > 0 {
userAssignedIdentityIfExists = azureMachinePool.Spec.UserAssignedIdentities[0].ProviderID
// TODO: remove this ClientID lookup code when the fixed cloud-provider-azure is default
idsClient := identities.NewClient(clusterScope)

Check failure on line 179 in controllers/azurejson_machinepool_controller.go

View workflow job for this annotation

GitHub Actions / coverage

assignment mismatch: 1 variable but identities.NewClient returns 2 values

Check failure on line 179 in controllers/azurejson_machinepool_controller.go

View workflow job for this annotation

GitHub Actions / coverage

assignment mismatch: 1 variable but identities.NewClient returns 2 values

Check failure on line 179 in controllers/azurejson_machinepool_controller.go

View workflow job for this annotation

GitHub Actions / coverage

assignment mismatch: 1 variable but identities.NewClient returns 2 values
userAssignedIdentityIfExists, err = idsClient.GetClientID(
ctx, azureMachinePool.Spec.UserAssignedIdentities[0].ProviderID)
if err != nil {
return reconcile.Result{}, errors.Wrap(err, "failed to get user-assigned identity ClientID")
}
}

apiVersion, kind := infrav1.GroupVersion.WithKind("AzureMachinePool").ToAPIVersionAndKind()
Expand Down
9 changes: 8 additions & 1 deletion controllers/azurejson_machinetemplate_controller.go
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,7 @@ import (
"k8s.io/utils/ptr"
infrav1 "sigs.k8s.io/cluster-api-provider-azure/api/v1beta1"
"sigs.k8s.io/cluster-api-provider-azure/azure/scope"
"sigs.k8s.io/cluster-api-provider-azure/azure/services/identities"
"sigs.k8s.io/cluster-api-provider-azure/util/reconciler"
"sigs.k8s.io/cluster-api-provider-azure/util/tele"
clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1"
Expand Down Expand Up @@ -174,7 +175,13 @@ func (r *AzureJSONTemplateReconciler) Reconcile(ctx context.Context, req ctrl.Re
// Construct secret for this machine template
userAssignedIdentityIfExists := ""
if len(azureMachineTemplate.Spec.Template.Spec.UserAssignedIdentities) > 0 {
userAssignedIdentityIfExists = azureMachineTemplate.Spec.Template.Spec.UserAssignedIdentities[0].ProviderID
// TODO: remove this ClientID lookup code when the fixed cloud-provider-azure is default
idsClient := identities.NewClient(clusterScope)

Check failure on line 179 in controllers/azurejson_machinetemplate_controller.go

View workflow job for this annotation

GitHub Actions / coverage

assignment mismatch: 1 variable but identities.NewClient returns 2 values) (typecheck)

Check failure on line 179 in controllers/azurejson_machinetemplate_controller.go

View workflow job for this annotation

GitHub Actions / coverage

assignment mismatch: 1 variable but identities.NewClient returns 2 values (typecheck)
userAssignedIdentityIfExists, err = idsClient.GetClientID(
ctx, azureMachineTemplate.Spec.Template.Spec.UserAssignedIdentities[0].ProviderID)
if err != nil {
return reconcile.Result{}, errors.Wrap(err, "failed to get user-assigned identity ClientID")
}
}

if azureMachineTemplate.Spec.Template.Spec.Identity == infrav1.VMIdentityNone {
Expand Down

0 comments on commit d75fb0a

Please sign in to comment.