Skip to content

Commit dc8fb84

Browse files
committed
Use the same member names between CertGenerator and KatibConfig
Signed-off-by: Yuki Iwai <[email protected]>
1 parent 748cc31 commit dc8fb84

File tree

2 files changed

+30
-30
lines changed

2 files changed

+30
-30
lines changed

pkg/certgenerator/v1beta1/generator.go

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -50,11 +50,11 @@ var (
5050

5151
// CertGenerator is the manager to generate certs.
5252
type CertGenerator struct {
53-
namespace string
54-
serviceName string
55-
secretName string
56-
kubeClient client.Client
57-
certsReady chan struct{}
53+
namespace string
54+
webhookServiceName string
55+
webhookSecretName string
56+
kubeClient client.Client
57+
certsReady chan struct{}
5858

5959
certs *certificates
6060
fullServiceDomain string
@@ -79,18 +79,18 @@ func (c *CertGenerator) NeedLeaderElection() bool {
7979
// AddToManager adds the cert-generator to the manager.
8080
func AddToManager(mgr manager.Manager, config configv1beta1.CertGeneratorConfig, certsReady chan struct{}) error {
8181
return mgr.Add(&CertGenerator{
82-
namespace: consts.DefaultKatibNamespace,
83-
serviceName: config.WebhookServiceName,
84-
secretName: config.WebhookSecretName,
85-
kubeClient: mgr.GetClient(),
86-
certsReady: certsReady,
82+
namespace: consts.DefaultKatibNamespace,
83+
webhookServiceName: config.WebhookServiceName,
84+
webhookSecretName: config.WebhookSecretName,
85+
kubeClient: mgr.GetClient(),
86+
certsReady: certsReady,
8787
})
8888
}
8989

9090
// generate generates certificates for the admission webhooks.
9191
func (c *CertGenerator) generate(ctx context.Context) error {
9292
controllerService := &corev1.Service{}
93-
if err := c.kubeClient.Get(ctx, client.ObjectKey{Name: c.serviceName, Namespace: c.namespace}, controllerService); err != nil {
93+
if err := c.kubeClient.Get(ctx, client.ObjectKey{Name: c.webhookServiceName, Namespace: c.namespace}, controllerService); err != nil {
9494
return fmt.Errorf("%w: %v", errServiceNotFound, err)
9595
}
9696

@@ -99,7 +99,7 @@ func (c *CertGenerator) generate(ctx context.Context) error {
9999
return fmt.Errorf("%w: %v", errCertCheckFail, err)
100100
}
101101
if !certExist {
102-
c.fullServiceDomain = strings.Join([]string{c.serviceName, c.namespace, "svc"}, ".")
102+
c.fullServiceDomain = strings.Join([]string{c.webhookServiceName, c.namespace, "svc"}, ".")
103103

104104
if err = c.createCert(); err != nil {
105105
return fmt.Errorf("%w: %v", errCreateCertFail, err)
@@ -119,7 +119,7 @@ func (c *CertGenerator) generate(ctx context.Context) error {
119119
// since another controller pod will create the secret.
120120
func (c *CertGenerator) isCertExist(ctx context.Context) (bool, error) {
121121
secret := &corev1.Secret{}
122-
if err := c.kubeClient.Get(ctx, client.ObjectKey{Name: c.secretName, Namespace: c.namespace}, secret); err != nil {
122+
if err := c.kubeClient.Get(ctx, client.ObjectKey{Name: c.webhookSecretName, Namespace: c.namespace}, secret); err != nil {
123123
return false, err
124124
}
125125
key := secret.Data[serverKeyName]
@@ -170,7 +170,7 @@ func (c *CertGenerator) createCert() error {
170170
// updateCertSecret updates Secret embedded tls.key and tls.crt.
171171
func (c *CertGenerator) updateCertSecret(ctx context.Context) error {
172172
secret := &corev1.Secret{}
173-
if err := c.kubeClient.Get(ctx, client.ObjectKey{Name: c.secretName, Namespace: c.namespace}, secret); err != nil {
173+
if err := c.kubeClient.Get(ctx, client.ObjectKey{Name: c.webhookSecretName, Namespace: c.namespace}, secret); err != nil {
174174
return err
175175
}
176176
newSecret := &corev1.Secret{

pkg/certgenerator/v1beta1/generator_test.go

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -98,9 +98,9 @@ func TestGenerate(t *testing.T) {
9898
}{
9999
"Generate successfully": {
100100
opts: &CertGenerator{
101-
namespace: testNamespace,
102-
serviceName: "katib-controller",
103-
secretName: "katib-test-secret",
101+
namespace: testNamespace,
102+
webhookServiceName: "katib-controller",
103+
webhookSecretName: "katib-test-secret",
104104
},
105105
objects: []client.Object{
106106
emptyVWebhookConfig,
@@ -111,9 +111,9 @@ func TestGenerate(t *testing.T) {
111111
},
112112
"There is not ValidatingWebhookConfiguration": {
113113
opts: &CertGenerator{
114-
namespace: testNamespace,
115-
serviceName: "katib-controller",
116-
secretName: "katib-test-secret",
114+
namespace: testNamespace,
115+
webhookServiceName: "katib-controller",
116+
webhookSecretName: "katib-test-secret",
117117
},
118118
objects: []client.Object{
119119
emptyMWebhookConfig,
@@ -124,9 +124,9 @@ func TestGenerate(t *testing.T) {
124124
},
125125
"There is not MutatingWebhookConfiguration": {
126126
opts: &CertGenerator{
127-
namespace: testNamespace,
128-
serviceName: "katib-controller",
129-
secretName: "katib-test-secret",
127+
namespace: testNamespace,
128+
webhookServiceName: "katib-controller",
129+
webhookSecretName: "katib-test-secret",
130130
},
131131
objects: []client.Object{
132132
emptyVWebhookConfig,
@@ -137,9 +137,9 @@ func TestGenerate(t *testing.T) {
137137
},
138138
"There is not Service katib-controller": {
139139
opts: &CertGenerator{
140-
namespace: testNamespace,
141-
serviceName: "katib-controller",
142-
secretName: "katib-test-secret",
140+
namespace: testNamespace,
141+
webhookServiceName: "katib-controller",
142+
webhookSecretName: "katib-test-secret",
143143
},
144144
objects: []client.Object{
145145
emptyVWebhookConfig,
@@ -150,9 +150,9 @@ func TestGenerate(t *testing.T) {
150150
},
151151
"There is not Secret katib-webhook-cert": {
152152
opts: &CertGenerator{
153-
namespace: testNamespace,
154-
serviceName: "katib-controller",
155-
secretName: "katib-test-secret",
153+
namespace: testNamespace,
154+
webhookServiceName: "katib-controller",
155+
webhookSecretName: "katib-test-secret",
156156
},
157157
objects: []client.Object{
158158
emptyVWebhookConfig,
@@ -173,7 +173,7 @@ func TestGenerate(t *testing.T) {
173173

174174
if tc.wantError == nil {
175175
secret := &corev1.Secret{}
176-
if err = kc.Get(context.Background(), client.ObjectKey{Name: tc.opts.secretName, Namespace: testNamespace}, secret); err != nil {
176+
if err = kc.Get(context.Background(), client.ObjectKey{Name: tc.opts.webhookSecretName, Namespace: testNamespace}, secret); err != nil {
177177
t.Fatalf("Failed to get a webhookSecret: %v", err)
178178
}
179179
if len(secret.Data[serverKeyName]) == 0 {

0 commit comments

Comments
 (0)