@@ -51,7 +51,7 @@ func (r *InfraClusterController) ensureAzureCluster(ctx context.Context, log log
5151 // Get the Azure Bootstrap Credentials Secret.
5252 // This is created by the Cluster Credential Operator and should always exist. We expect to always find it, if not, we error.
5353 capzManagerBootstrapSecret := & corev1.Secret {}
54- if err := r .Get (ctx , client.ObjectKey {Namespace : defaultCAPINamespace , Name : capzManagerBootstrapCredentials }, capzManagerBootstrapSecret ); err != nil && ! cerrors .IsNotFound (err ) {
54+ if err := r .Get (ctx , client.ObjectKey {Namespace : r . CAPINamespace , Name : capzManagerBootstrapCredentials }, capzManagerBootstrapSecret ); err != nil && ! cerrors .IsNotFound (err ) {
5555 return nil , fmt .Errorf ("failed to get Azure Boostrap Credentials Secret: %w" , err )
5656 }
5757
@@ -65,7 +65,7 @@ func (r *InfraClusterController) ensureAzureCluster(ctx context.Context, log log
6565
6666 target := & azurev1.AzureCluster {ObjectMeta : metav1.ObjectMeta {
6767 Name : r .Infra .Status .InfrastructureName ,
68- Namespace : defaultCAPINamespace ,
68+ Namespace : r . CAPINamespace ,
6969 }}
7070
7171 if err := r .ensureAzureInfraCluster (ctx , target , log ); err != nil {
@@ -76,8 +76,8 @@ func (r *InfraClusterController) ensureAzureCluster(ctx context.Context, log log
7676}
7777
7878// getAzureMAPIProviderSpec returns a Azure Machine ProviderSpec from the the cluster.
79- func getAzureMAPIProviderSpec (ctx context.Context , cl client.Client ) (* mapiv1beta1.AzureMachineProviderSpec , error ) {
80- rawProviderSpec , err := getRawMAPIProviderSpec (ctx , cl )
79+ func ( r * InfraClusterController ) getAzureMAPIProviderSpec (ctx context.Context , cl client.Client ) (* mapiv1beta1.AzureMachineProviderSpec , error ) {
80+ rawProviderSpec , err := r . getRawMAPIProviderSpec (ctx , cl )
8181 if err != nil {
8282 return nil , fmt .Errorf ("unable to obtain MAPI ProviderSpec: %w" , err )
8383 }
@@ -93,7 +93,7 @@ func getAzureMAPIProviderSpec(ctx context.Context, cl client.Client) (*mapiv1bet
9393// getAzureLocation obtains the Azure Location.
9494func (r * InfraClusterController ) getAzureLocation (ctx context.Context ) (string , error ) {
9595 // Devise Azure location via MAPI providerSpec.
96- machineSpec , err := getAzureMAPIProviderSpec (ctx , r .Client )
96+ machineSpec , err := r . getAzureMAPIProviderSpec (ctx , r .Client )
9797 if err != nil {
9898 return "" , fmt .Errorf ("error getting azure providerSpec: %w" , err )
9999 }
@@ -111,26 +111,26 @@ func (r *InfraClusterController) ensureClusterSecret(ctx context.Context, capzMa
111111 // CAPZ controllers expect a Secret Ref with a different data structure to what the secret we get from the Cluster Credential Operator above provides.
112112 // That is why we are creating a new secret below to copy the values to.
113113 clusterSecret := & corev1.Secret {}
114- if err := r .Get (ctx , client.ObjectKey {Namespace : defaultCAPINamespace , Name : clusterSecretName }, clusterSecret ); err != nil && ! cerrors .IsNotFound (err ) {
114+ if err := r .Get (ctx , client.ObjectKey {Namespace : r . CAPINamespace , Name : clusterSecretName }, clusterSecret ); err != nil && ! cerrors .IsNotFound (err ) {
115115 return fmt .Errorf ("failed to get Azure Cluster Secret: %w" , err )
116116 } else if err == nil {
117117 // When the object already exists, there's nothing to do.
118118 return nil
119119 }
120120
121- if err := createNewAzureSecret (ctx , r .Client , capzManagerBootstrapSecret .Data ["azure_client_secret" ]); err != nil {
121+ if err := r . createNewAzureSecret (ctx , r .Client , capzManagerBootstrapSecret .Data ["azure_client_secret" ]); err != nil {
122122 return fmt .Errorf ("failed to create Azure Cluster secret: %w" , err )
123123 }
124124
125125 return nil
126126}
127127
128128// createNewAzureSecret creates a new Azure Cluster Secret.
129- func createNewAzureSecret (ctx context.Context , cl client.Client , azureClientSecret []byte ) error {
129+ func ( r * InfraClusterController ) createNewAzureSecret (ctx context.Context , cl client.Client , azureClientSecret []byte ) error {
130130 azureSecret := & corev1.Secret {
131131 ObjectMeta : metav1.ObjectMeta {
132132 Name : clusterSecretName ,
133- Namespace : defaultCAPINamespace ,
133+ Namespace : r . CAPINamespace ,
134134 },
135135 Immutable : ptr .To (true ),
136136 Data : map [string ][]byte {
@@ -149,7 +149,7 @@ func createNewAzureSecret(ctx context.Context, cl client.Client, azureClientSecr
149149func (r * InfraClusterController ) ensureClusterIdentity (ctx context.Context , capzManagerBootstrapSecret corev1.Secret ) error {
150150 azureClusterIdentity := & azurev1.AzureClusterIdentity {}
151151 // Get the Azure Cluster Identity.
152- if err := r .Get (ctx , client.ObjectKey {Namespace : defaultCAPINamespace , Name : r .Infra .Status .InfrastructureName }, azureClusterIdentity ); err != nil && ! cerrors .IsNotFound (err ) {
152+ if err := r .Get (ctx , client.ObjectKey {Namespace : r . CAPINamespace , Name : r .Infra .Status .InfrastructureName }, azureClusterIdentity ); err != nil && ! cerrors .IsNotFound (err ) {
153153 return fmt .Errorf ("failed to get Azure Cluster Identity: %w" , err )
154154 } else if err == nil {
155155 // When the object already exists, there's nothing to do.
@@ -178,7 +178,7 @@ func (r *InfraClusterController) createAzureClusterIdentity(ctx context.Context,
178178 azureClusterIdentity := & azurev1.AzureClusterIdentity {
179179 ObjectMeta : metav1.ObjectMeta {
180180 Name : r .Infra .Status .InfrastructureName ,
181- Namespace : defaultCAPINamespace ,
181+ Namespace : r . CAPINamespace ,
182182 Annotations : map [string ]string {
183183 // The ManagedBy Annotation is set so CAPI infra providers ignore the InfraCluster object,
184184 // as that's managed externally, in this case by the cluster-capi-operator's infracluster controller.
@@ -228,7 +228,7 @@ func (r *InfraClusterController) ensureAzureInfraCluster(ctx context.Context, ta
228228 return fmt .Errorf ("failed to parse apiUrl port: %w" , err )
229229 }
230230
231- providerSpec , err := getAzureMAPIProviderSpec (ctx , r .Client )
231+ providerSpec , err := r . getAzureMAPIProviderSpec (ctx , r .Client )
232232 if err != nil {
233233 return fmt .Errorf ("error obtaining Azure Provider Spec: %w" , err )
234234 }
@@ -243,7 +243,7 @@ func (r *InfraClusterController) ensureAzureInfraCluster(ctx context.Context, ta
243243 return fmt .Errorf ("error creating New Azure Cluster: %w" , err )
244244 }
245245
246- log .Info (fmt .Sprintf ("InfraCluster '%s/%s' successfully created" , defaultCAPINamespace , r .Infra .Status .InfrastructureName ))
246+ log .Info (fmt .Sprintf ("InfraCluster '%s/%s' successfully created" , r . CAPINamespace , r .Infra .Status .InfrastructureName ))
247247
248248 return nil
249249}
@@ -253,7 +253,7 @@ func (r *InfraClusterController) newAzureCluster(providerSpec *mapiv1beta1.Azure
253253 return & azurev1.AzureCluster {
254254 ObjectMeta : metav1.ObjectMeta {
255255 Name : r .Infra .Status .InfrastructureName ,
256- Namespace : defaultCAPINamespace ,
256+ Namespace : r . CAPINamespace ,
257257 // The ManagedBy Annotation is set so CAPI infra providers ignore the InfraCluster object,
258258 // as that's managed externally, in this case by this controller.
259259 Annotations : map [string ]string {
@@ -267,7 +267,7 @@ func (r *InfraClusterController) newAzureCluster(providerSpec *mapiv1beta1.Azure
267267 AzureEnvironment : "AzurePublicCloud" ,
268268 IdentityRef : & corev1.ObjectReference {
269269 Name : r .Infra .Status .InfrastructureName ,
270- Namespace : defaultCAPINamespace ,
270+ Namespace : r . CAPINamespace ,
271271 Kind : "AzureClusterIdentity" ,
272272 },
273273 },
0 commit comments