diff --git a/cmd/containerboot/kube.go b/cmd/containerboot/kube.go index 72e8ef068..3487d3c3f 100644 --- a/cmd/containerboot/kube.go +++ b/cmd/containerboot/kube.go @@ -69,6 +69,23 @@ func findKeyInKubeSecret(ctx context.Context, secretName string) (string, error) // the kube secret secretName. func storeDeviceID(ctx context.Context, secretName, deviceID string) error { kubeOnce.Do(initKube) + + // First check if the secret exists at all. Even if running on + // kubernetes, we do not necessarily store state in a k8s secret. + req, err := http.NewRequest("GET", fmt.Sprintf("/api/v1/namespaces/%s/secrets/%s", kubeNamespace, secretName), nil) + if err != nil { + return err + } + resp, err := doKubeRequest(ctx, req) + if err != nil { + if resp != nil && resp.StatusCode >= 400 && resp.StatusCode <= 499 { + // Assume the secret doesn't exist, or we don't have + // permission to access it. + return nil + } + return err + } + m := map[string]map[string]string{ "stringData": map[string]string{ "device_id": deviceID, @@ -78,7 +95,7 @@ func storeDeviceID(ctx context.Context, secretName, deviceID string) error { if err := json.NewEncoder(&b).Encode(m); err != nil { return err } - req, err := http.NewRequest("PATCH", fmt.Sprintf("/api/v1/namespaces/%s/secrets/%s?fieldManager=tailscale-container", kubeNamespace, secretName), &b) + req, err = http.NewRequest("PATCH", fmt.Sprintf("/api/v1/namespaces/%s/secrets/%s?fieldManager=tailscale-container", kubeNamespace, secretName), &b) if err != nil { return err }