Skip to content

Commit f436cd9

Browse files
authored
Fix EOF errors when using SASL_SSL PLAIN (#4125)
The consumergroup reconciler was using the legacy secret format resolver to configure the Sarama client even in the Kafka Broker case. We can't really add a E2E regression test as strimzi doesn't support `SASL/PLAIN`: see `strimzi/strimzi-kafka-operator/issues/2221` Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>
1 parent 755c8bb commit f436cd9

File tree

2 files changed

+8
-13
lines changed

2 files changed

+8
-13
lines changed

control-plane/pkg/reconciler/consumergroup/auth.go

Lines changed: 6 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -27,32 +27,27 @@ import (
2727
)
2828

2929
func (r *Reconciler) newAuthSecret(ctx context.Context, cg *kafkainternals.ConsumerGroup) (*corev1.Secret, error) {
30-
var secret *corev1.Secret
31-
3230
if hasSecretSpecConfig(cg.Spec.Template.Spec.Auth) {
3331
secret, err := security.Secret(ctx, &SecretSpecSecretLocator{cg}, security.DefaultSecretProviderFunc(r.SecretLister, r.KubeClient))
3432
if err != nil {
3533
return nil, err
3634
}
35+
return secret, nil
36+
}
3737

38-
authContext, err := security.ResolveAuthContextFromLegacySecret(secret)
39-
if err != nil {
40-
return nil, err
41-
}
42-
return authContext.VirtualSecret, nil
43-
44-
} else if hasNetSpecAuthConfig(cg.Spec.Template.Spec.Auth) {
38+
if hasNetSpecAuthConfig(cg.Spec.Template.Spec.Auth) {
4539
auth, err := security.ResolveAuthContextFromNetSpec(r.SecretLister, cg.GetNamespace(), *cg.Spec.Template.Spec.Auth.NetSpec)
4640
if err != nil {
4741
return nil, err
4842
}
49-
secret, err = security.Secret(ctx, &NetSpecSecretLocator{cg}, security.NetSpecSecretProviderFunc(auth))
43+
secret, err := security.Secret(ctx, &NetSpecSecretLocator{cg}, security.NetSpecSecretProviderFunc(auth))
5044
if err != nil {
5145
return nil, fmt.Errorf("failed to get secret: %w", err)
5246
}
47+
return secret, nil
5348
}
5449

55-
return secret, nil
50+
return nil, nil
5651
}
5752

5853
type NetSpecSecretLocator struct {

control-plane/pkg/reconciler/consumergroup/consumergroup.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -293,14 +293,14 @@ func (r *Reconciler) reconcileStatusSelector(cg *kafkainternals.ConsumerGroup) {
293293
}
294294

295295
func (r *Reconciler) deleteConsumerGroupMetadata(ctx context.Context, cg *kafkainternals.ConsumerGroup) error {
296-
kafakSecret, err := r.newAuthSecret(ctx, cg)
296+
kafkaSecret, err := r.newAuthSecret(ctx, cg)
297297
if err != nil {
298298
return fmt.Errorf("failed to get secret for Kafka cluster auth: %w", err)
299299
}
300300

301301
bootstrapServers := kafka.BootstrapServersArray(cg.Spec.Template.Spec.Configs.Configs["bootstrap.servers"])
302302

303-
kafkaClusterAdminClient, err := r.GetKafkaClusterAdmin(ctx, bootstrapServers, kafakSecret)
303+
kafkaClusterAdminClient, err := r.GetKafkaClusterAdmin(ctx, bootstrapServers, kafkaSecret)
304304
if err != nil {
305305
return fmt.Errorf("cannot obtain Kafka cluster admin, %w", err)
306306
}

0 commit comments

Comments
 (0)