@@ -28,7 +28,6 @@ import (
2828 "k8s.io/apimachinery/pkg/types"
2929 apiserverconfigv1 "k8s.io/apiserver/pkg/apis/apiserver/v1"
3030 "k8s.io/client-go/tools/pager"
31- "k8s.io/client-go/util/retry"
3231 "k8s.io/utils/ptr"
3332)
3433
@@ -252,17 +251,12 @@ func encryptionPrepare(ctx context.Context, control *config.Control, force bool)
252251 if err := secretsencrypt .WriteEncryptionConfig (control .Runtime , curKeys , control .EncryptProvider , true ); err != nil {
253252 return err
254253 }
254+
255255 nodeName := os .Getenv ("NODE_NAME" )
256- err = retry .RetryOnConflict (retry .DefaultRetry , func () error {
257- node , err := control .Runtime .Core .Core ().V1 ().Node ().Get (nodeName , metav1.GetOptions {})
258- if err != nil {
259- return err
260- }
261- return secretsencrypt .WriteEncryptionHashAnnotation (control .Runtime , node , false , secretsencrypt .EncryptionPrepare )
262- })
263- if err != nil {
256+ if err := secretsencrypt .WriteEncryptionHashAnnotation (ctx , control .Runtime , nodeName , false , secretsencrypt .EncryptionPrepare ); err != nil {
264257 return err
265258 }
259+
266260 return cluster .Save (ctx , control , true )
267261}
268262
@@ -289,21 +283,16 @@ func encryptionRotate(ctx context.Context, control *config.Control, force bool)
289283 curKeys .SBKeys = rotatedKeys
290284 }
291285
292- if err = secretsencrypt .WriteEncryptionConfig (control .Runtime , curKeys , control .EncryptProvider , true ); err != nil {
286+ if err : = secretsencrypt .WriteEncryptionConfig (control .Runtime , curKeys , control .EncryptProvider , true ); err != nil {
293287 return err
294288 }
295289 logrus .Infof ("Encryption %s keys right rotated\n " , control .EncryptProvider )
290+
296291 nodeName := os .Getenv ("NODE_NAME" )
297- err = retry .RetryOnConflict (retry .DefaultRetry , func () error {
298- node , err := control .Runtime .Core .Core ().V1 ().Node ().Get (nodeName , metav1.GetOptions {})
299- if err != nil {
300- return err
301- }
302- return secretsencrypt .WriteEncryptionHashAnnotation (control .Runtime , node , false , secretsencrypt .EncryptionRotate )
303- })
304- if err != nil {
292+ if err := secretsencrypt .WriteEncryptionHashAnnotation (ctx , control .Runtime , nodeName , false , secretsencrypt .EncryptionRotate ); err != nil {
305293 return err
306294 }
295+
307296 return cluster .Save (ctx , control , true )
308297}
309298
@@ -318,13 +307,7 @@ func encryptionReencrypt(ctx context.Context, control *config.Control, force boo
318307 // Set the reencrypt-active annotation so other nodes know we are in the process of reencrypting.
319308 // As this stage is not persisted, we do not write the annotation to file
320309 nodeName := os .Getenv ("NODE_NAME" )
321- if err := retry .RetryOnConflict (retry .DefaultRetry , func () error {
322- node , err := control .Runtime .Core .Core ().V1 ().Node ().Get (nodeName , metav1.GetOptions {})
323- if err != nil {
324- return err
325- }
326- return secretsencrypt .WriteEncryptionHashAnnotation (control .Runtime , node , true , secretsencrypt .EncryptionReencryptActive )
327- }); err != nil {
310+ if err := secretsencrypt .WriteEncryptionHashAnnotation (ctx , control .Runtime , nodeName , true , secretsencrypt .EncryptionReencryptActive ); err != nil {
328311 return err
329312 }
330313
@@ -380,13 +363,7 @@ func encryptionRotateKeys(ctx context.Context, control *config.Control) error {
380363 // Set the reencrypt-active annotation so other nodes know we are in the process of reencrypting.
381364 // As this stage is not persisted, we do not write the annotation to file
382365 nodeName := os .Getenv ("NODE_NAME" )
383- if err = retry .RetryOnConflict (retry .DefaultRetry , func () error {
384- node , err := control .Runtime .Core .Core ().V1 ().Node ().Get (nodeName , metav1.GetOptions {})
385- if err != nil {
386- return err
387- }
388- return secretsencrypt .WriteEncryptionHashAnnotation (control .Runtime , node , true , secretsencrypt .EncryptionReencryptActive )
389- }); err != nil {
366+ if err := secretsencrypt .WriteEncryptionHashAnnotation (ctx , control .Runtime , nodeName , true , secretsencrypt .EncryptionReencryptActive ); err != nil {
390367 return err
391368 }
392369
@@ -408,16 +385,7 @@ func reencryptAndRemoveKey(ctx context.Context, control *config.Control, skip bo
408385
409386 // If skipping, revert back to the previous stage and do not remove the key
410387 if skip {
411- err := retry .RetryOnConflict (retry .DefaultRetry , func () error {
412- node , err := control .Runtime .Core .Core ().V1 ().Node ().Get (nodeName , metav1.GetOptions {})
413- if err != nil {
414- return err
415- }
416- secretsencrypt .BootstrapEncryptionHashAnnotation (node , control .Runtime )
417- _ , err = control .Runtime .Core .Core ().V1 ().Node ().Update (node )
418- return err
419- })
420- return err
388+ return secretsencrypt .BootstrapEncryptionHashAnnotation (ctx , control .Runtime , nodeName )
421389 }
422390
423391 // Remove old key. If there is only one of that key type, the cluster just
@@ -446,17 +414,11 @@ func reencryptAndRemoveKey(ctx context.Context, control *config.Control, skip bo
446414 }
447415 }
448416
449- if err = secretsencrypt .WriteEncryptionConfig (control .Runtime , curKeys , control .EncryptProvider , true ); err != nil {
417+ if err : = secretsencrypt .WriteEncryptionConfig (control .Runtime , curKeys , control .EncryptProvider , true ); err != nil {
450418 return err
451419 }
452420
453- if err = retry .RetryOnConflict (retry .DefaultRetry , func () error {
454- node , err := control .Runtime .Core .Core ().V1 ().Node ().Get (nodeName , metav1.GetOptions {})
455- if err != nil {
456- return err
457- }
458- return secretsencrypt .WriteEncryptionHashAnnotation (control .Runtime , node , false , secretsencrypt .EncryptionReencryptFinished )
459- }); err != nil {
421+ if err := secretsencrypt .WriteEncryptionHashAnnotation (ctx , control .Runtime , nodeName , false , secretsencrypt .EncryptionReencryptFinished ); err != nil {
460422 return err
461423 }
462424
0 commit comments