@@ -258,9 +258,6 @@ func (r *ReconcilePerconaServerMongoDBBackup) getPBMStorage(ctx context.Context,
258258 }
259259 return azure .New (azureConf , nil )
260260 case cr .Status .S3 != nil :
261- if cr .Status .S3 .CredentialsSecret == "" {
262- return nil , errors .New ("no s3 credentials specified for the secret name" )
263- }
264261 s3Conf := s3.Conf {
265262 Region : cr .Status .S3 .Region ,
266263 EndpointURL : cr .Status .S3 .EndpointURL ,
@@ -271,9 +268,16 @@ func (r *ReconcilePerconaServerMongoDBBackup) getPBMStorage(ctx context.Context,
271268 StorageClass : cr .Status .S3 .StorageClass ,
272269 InsecureSkipTLSVerify : cr .Status .S3 .InsecureSkipTLSVerify ,
273270 }
274- s3secret , err := secret (ctx , r .client , cr .Namespace , cr .Status .S3 .CredentialsSecret )
275- if err != nil {
276- return nil , errors .Wrap (err , "getting s3 credentials secret name" )
271+
272+ if cr .Status .S3 .CredentialsSecret != "" {
273+ s3secret , err := secret (ctx , r .client , cr .Namespace , cr .Status .S3 .CredentialsSecret )
274+ if err != nil {
275+ return nil , errors .Wrap (err , "getting s3 credentials secret name" )
276+ }
277+ s3Conf .Credentials = s3.Credentials {
278+ AccessKeyID : string (s3secret .Data [backup .AWSAccessKeySecretKey ]),
279+ SecretAccessKey : string (s3secret .Data [backup .AWSSecretAccessKeySecretKey ]),
280+ }
277281 }
278282
279283 if len (cr .Status .S3 .ServerSideEncryption .SSECustomerAlgorithm ) != 0 {
@@ -319,10 +323,6 @@ func (r *ReconcilePerconaServerMongoDBBackup) getPBMStorage(ctx context.Context,
319323 }
320324 }
321325
322- s3Conf .Credentials = s3.Credentials {
323- AccessKeyID : string (s3secret .Data [backup .AWSAccessKeySecretKey ]),
324- SecretAccessKey : string (s3secret .Data [backup .AWSSecretAccessKeySecretKey ]),
325- }
326326 return s3 .New (s3Conf , nil )
327327 default :
328328 return nil , errors .New ("no storage info in backup status" )
0 commit comments