Skip to content

Commit 6f8b4fb

Browse files
committed
fix: skip adding image registry CA file when not set
1 parent d43bbc5 commit 6f8b4fb

File tree

2 files changed

+16
-6
lines changed

2 files changed

+16
-6
lines changed

pkg/handlers/generic/mutation/mirrors/containerd_files.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ import (
1919

2020
const (
2121
containerdHostsConfigurationOnRemote = "/etc/containerd/certs.d/_default/hosts.toml"
22-
secretKeyForMirrorCACert = "ca.crt"
22+
secretKeyForCACert = "ca.crt"
2323
)
2424

2525
var (
@@ -159,7 +159,7 @@ func generateRegistryCACertFiles(
159159
ContentFrom: &cabpkv1.FileSource{
160160
Secret: cabpkv1.SecretFileSource{
161161
Name: config.CASecretName,
162-
Key: secretKeyForMirrorCACert,
162+
Key: secretKeyForCACert,
163163
},
164164
},
165165
})

pkg/handlers/generic/mutation/mirrors/inject.go

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ import (
77
"context"
88
"fmt"
99

10+
corev1 "k8s.io/api/core/v1"
1011
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
1112
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
1213
"k8s.io/apimachinery/pkg/runtime"
@@ -193,9 +194,9 @@ func containerdConfigFromGlobalMirror(
193194
)
194195
}
195196

196-
if secret != nil {
197+
if secretHasCACert(secret) {
197198
configWithOptionalCACert.CASecretName = secret.Name
198-
configWithOptionalCACert.CACert = string(secret.Data[secretKeyForMirrorCACert])
199+
configWithOptionalCACert.CACert = string(secret.Data[secretKeyForCACert])
199200
}
200201

201202
return configWithOptionalCACert, nil
@@ -225,9 +226,9 @@ func containerdConfigFromImageRegistry(
225226
)
226227
}
227228

228-
if secret != nil {
229+
if secretHasCACert(secret) {
229230
configWithOptionalCACert.CASecretName = secret.Name
230-
configWithOptionalCACert.CACert = string(secret.Data[secretKeyForMirrorCACert])
231+
configWithOptionalCACert.CACert = string(secret.Data[secretKeyForCACert])
231232
}
232233

233234
return configWithOptionalCACert, nil
@@ -271,3 +272,12 @@ func needContainerdConfiguration(configs []containerdConfig) bool {
271272

272273
return false
273274
}
275+
276+
func secretHasCACert(secret *corev1.Secret) bool {
277+
if secret == nil {
278+
return false
279+
}
280+
281+
_, ok := secret.Data[secretKeyForCACert]
282+
return ok
283+
}

0 commit comments

Comments
 (0)