@@ -17,6 +17,10 @@ import (
1717 "github.com/Azure/ARO-RP/pkg/util/keyvault"
1818)
1919
20+ const (
21+ OneCertPublicIssuerName = "OneCertV2-PublicCA"
22+ )
23+
2024func (m * manager ) createCertificates (ctx context.Context ) error {
2125 if m .env .FeatureIsSet (env .FeatureDisableSignedCertificates ) {
2226 return nil
@@ -36,18 +40,18 @@ func (m *manager) createCertificates(ctx context.Context) error {
3640 commonName string
3741 }{
3842 {
39- certificateName : m .doc . ID + "-apiserver" ,
43+ certificateName : m .APICertName () ,
4044 commonName : "api." + managedDomain ,
4145 },
4246 {
43- certificateName : m .doc . ID + "-ingress" ,
47+ certificateName : m .IngressCertName () ,
4448 commonName : "*.apps." + managedDomain ,
4549 },
4650 }
4751
4852 for _ , c := range certs {
4953 m .log .Printf ("creating certificate %s" , c .certificateName )
50- err = m .env .ClusterKeyvault ().CreateSignedCertificate (ctx , "OneCertV2-PublicCA" , c .certificateName , c .commonName , keyvault .EkuServerAuth )
54+ err = m .env .ClusterKeyvault ().CreateSignedCertificate (ctx , OneCertPublicIssuerName , c .certificateName , c .commonName , keyvault .EkuServerAuth )
5155 if err != nil {
5256 return err
5357 }
@@ -80,7 +84,7 @@ func (m *manager) configureAPIServerCertificate(ctx context.Context) error {
8084 }
8185
8286 for _ , namespace := range []string {"openshift-config" , "openshift-azure-operator" } {
83- err = EnsureTLSSecretFromKeyvault (ctx , m .env .ClusterKeyvault (), m .ch , types.NamespacedName {Name : m .doc . ID + "-apiserver" , Namespace : namespace }, m .doc . ID + "-apiserver" )
87+ err = EnsureTLSSecretFromKeyvault (ctx , m .env .ClusterKeyvault (), m .ch , types.NamespacedName {Name : m .APICertName () , Namespace : namespace }, m .APICertName () )
8488 if err != nil {
8589 return err
8690 }
@@ -98,7 +102,7 @@ func (m *manager) configureAPIServerCertificate(ctx context.Context) error {
98102 "api." + managedDomain ,
99103 },
100104 ServingCertificate : configv1.SecretNameReference {
101- Name : m .doc . ID + "-apiserver" ,
105+ Name : m .APICertName () ,
102106 },
103107 },
104108 }
@@ -123,7 +127,7 @@ func (m *manager) configureIngressCertificate(ctx context.Context) error {
123127 }
124128
125129 for _ , namespace := range []string {"openshift-ingress" , "openshift-azure-operator" } {
126- err = EnsureTLSSecretFromKeyvault (ctx , m .env .ClusterKeyvault (), m .ch , types.NamespacedName {Namespace : namespace , Name : m .doc . ID + "-ingress" }, m .doc . ID + "-ingress" )
130+ err = EnsureTLSSecretFromKeyvault (ctx , m .env .ClusterKeyvault (), m .ch , types.NamespacedName {Namespace : namespace , Name : m .IngressCertName () }, m .IngressCertName () )
127131 if err != nil {
128132 return err
129133 }
@@ -136,7 +140,7 @@ func (m *manager) configureIngressCertificate(ctx context.Context) error {
136140 }
137141
138142 ic .Spec .DefaultCertificate = & corev1.LocalObjectReference {
139- Name : m .doc . ID + "-ingress" ,
143+ Name : m .IngressCertName () ,
140144 }
141145
142146 _ , err = m .operatorcli .OperatorV1 ().IngressControllers ("openshift-ingress-operator" ).Update (ctx , ic , metav1.UpdateOptions {})
0 commit comments