@@ -2,21 +2,20 @@ package machine
2
2
3
3
import (
4
4
"fmt"
5
+ "os"
5
6
"time"
6
7
7
8
"github.com/aws/aws-sdk-go/aws"
8
9
"github.com/aws/aws-sdk-go/service/ec2"
9
10
"github.com/aws/aws-sdk-go/service/elbv2"
10
-
11
- apiv1 "k8s.io/api/core/v1"
12
- corev1 "k8s.io/api/core/v1"
13
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
14
-
15
11
clusterv1 "github.com/openshift/cluster-api/pkg/apis/cluster/v1alpha1"
16
12
machinev1 "github.com/openshift/cluster-api/pkg/apis/machine/v1beta1"
17
13
machinecontroller "github.com/openshift/cluster-api/pkg/controller/machine"
14
+ apiv1 "k8s.io/api/core/v1"
15
+ corev1 "k8s.io/api/core/v1"
16
+ metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
18
17
providerconfigv1 "sigs.k8s.io/cluster-api-provider-aws/pkg/apis/awsproviderconfig/v1beta1"
19
- "sigs.k8s.io/cluster-api-provider-aws/test/utils "
18
+ awsclient "sigs.k8s.io/cluster-api-provider-aws/pkg/client "
20
19
)
21
20
22
21
const (
@@ -159,7 +158,21 @@ func stubUserDataSecret() *corev1.Secret {
159
158
}
160
159
161
160
func stubAwsCredentialsSecret () * corev1.Secret {
162
- return utils .GenerateAwsCredentialsSecretFromEnv (awsCredentialsSecretName , defaultNamespace )
161
+ return GenerateAwsCredentialsSecretFromEnv (awsCredentialsSecretName , defaultNamespace )
162
+ }
163
+
164
+ // GenerateAwsCredentialsSecretFromEnv generates secret with AWS credentials
165
+ func GenerateAwsCredentialsSecretFromEnv (secretName , namespace string ) * apiv1.Secret {
166
+ return & apiv1.Secret {
167
+ ObjectMeta : metav1.ObjectMeta {
168
+ Name : secretName ,
169
+ Namespace : namespace ,
170
+ },
171
+ Data : map [string ][]byte {
172
+ awsclient .AwsCredsSecretIDKey : []byte (os .Getenv ("AWS_ACCESS_KEY_ID" )),
173
+ awsclient .AwsCredsSecretAccessKey : []byte (os .Getenv ("AWS_SECRET_ACCESS_KEY" )),
174
+ },
175
+ }
163
176
}
164
177
165
178
func stubInstance (imageID , instanceID string ) * ec2.Instance {
0 commit comments