Skip to content

Commit

Permalink
Move "Name" field to "ControlPlaneSecretConfig"
Browse files Browse the repository at this point in the history
  • Loading branch information
NotTheEvilOne committed Apr 5, 2022
1 parent 7de9e47 commit 4d857da
Showing 1 changed file with 6 additions and 6 deletions.
12 changes: 6 additions & 6 deletions pkg/controller/controlplane/valuesprovider.go
Original file line number Diff line number Diff line change
Expand Up @@ -59,8 +59,8 @@ func getSecretConfigsFuncs(useTokenRequestor bool) secrets.Interface {
SecretConfigsFunc: func(cas map[string]*secrets.Certificate, clusterName string) []secrets.ConfigInterface {
out := []secrets.ConfigInterface{
&secrets.ControlPlaneSecretConfig{
Name: ionos.CloudControllerManagerServerName,
CertificateSecretConfig: &secrets.CertificateSecretConfig{
Name: ionos.CloudControllerManagerServerName,
CommonName: ionos.CloudControllerManagerName,
DNSNames: k8sutils.DNSNamesForService(ionos.CloudControllerManagerName, clusterName),
CertType: secrets.ServerCert,
Expand All @@ -73,8 +73,8 @@ func getSecretConfigsFuncs(useTokenRequestor bool) secrets.Interface {
out = append(
out,
&secrets.ControlPlaneSecretConfig{
Name: ionos.CloudControllerManagerName,
CertificateSecretConfig: &secrets.CertificateSecretConfig{
Name: ionos.CloudControllerManagerName,
CommonName: "system:cloud-controller-manager",
Organization: []string{user.SystemPrivilegedGroup},
CertType: secrets.ClientCert,
Expand All @@ -88,8 +88,8 @@ func getSecretConfigsFuncs(useTokenRequestor bool) secrets.Interface {
},
},
&secrets.ControlPlaneSecretConfig{
Name: ionos.CSIAttacherName,
CertificateSecretConfig: &secrets.CertificateSecretConfig{
Name: ionos.CSIAttacherName,
CommonName: ionos.UsernamePrefix + ionos.CSIAttacherName,
Organization: []string{user.SystemPrivilegedGroup},
CertType: secrets.ClientCert,
Expand All @@ -103,8 +103,8 @@ func getSecretConfigsFuncs(useTokenRequestor bool) secrets.Interface {
},
},
&secrets.ControlPlaneSecretConfig{
Name: ionos.CSIProvisionerName,
CertificateSecretConfig: &secrets.CertificateSecretConfig{
Name: ionos.CSIProvisionerName,
CommonName: ionos.UsernamePrefix + ionos.CSIProvisionerName,
Organization: []string{user.SystemPrivilegedGroup},
CertType: secrets.ClientCert,
Expand All @@ -118,8 +118,8 @@ func getSecretConfigsFuncs(useTokenRequestor bool) secrets.Interface {
},
},
&secrets.ControlPlaneSecretConfig{
Name: ionos.CSIControllerName,
CertificateSecretConfig: &secrets.CertificateSecretConfig{
Name: ionos.CSIControllerName,
CommonName: ionos.UsernamePrefix + ionos.CSIControllerName,
Organization: []string{user.SystemPrivilegedGroup},
CertType: secrets.ClientCert,
Expand All @@ -133,8 +133,8 @@ func getSecretConfigsFuncs(useTokenRequestor bool) secrets.Interface {
},
},
&secrets.ControlPlaneSecretConfig{
Name: ionos.CSIResizerName,
CertificateSecretConfig: &secrets.CertificateSecretConfig{
Name: ionos.CSIResizerName,
CommonName: ionos.UsernamePrefix + ionos.CSIResizerName,
Organization: []string{user.SystemPrivilegedGroup},
CertType: secrets.ClientCert,
Expand Down

0 comments on commit 4d857da

Please sign in to comment.