Skip to content

Commit 8a2f3dd

Browse files
authored
Merge pull request Azure#3929 from Azure/bvesel/refactor-clean-up
Use constant / function names everywhere possible
2 parents 27c26e1 + 122ac0f commit 8a2f3dd

File tree

3 files changed

+15
-15
lines changed

3 files changed

+15
-15
lines changed

pkg/cluster/correct_cert_issuer.go

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,6 @@ import (
1313
"github.com/Azure/ARO-RP/pkg/util/keyvault"
1414
)
1515

16-
const (
17-
OneCertIssuerName = "OneCertV2-PublicCA"
18-
)
19-
2016
// if the cluster is using a managed domain and has a DigiCert-issued
2117
// certificate, replace the certificate with one issued by OneCert. This
2218
// ensures that clusters upgrading to 4.16 aren't blocked due to the SHA-1
@@ -33,13 +29,13 @@ func (m *manager) correctCertificateIssuer(ctx context.Context) error {
3329

3430
if domain != "" {
3531
apiHostname := strings.Split(strings.TrimPrefix(m.doc.OpenShiftCluster.Properties.APIServerProfile.URL, "https://"), ":")[0]
36-
err := m.ensureCertificateIssuer(ctx, m.APICertName(), apiHostname, OneCertIssuerName)
32+
err := m.ensureCertificateIssuer(ctx, m.APICertName(), apiHostname, OneCertPublicIssuerName)
3733
if err != nil {
3834
return err
3935
}
4036

4137
ingressHostname := "*" + strings.TrimSuffix(strings.TrimPrefix(m.doc.OpenShiftCluster.Properties.ConsoleProfile.URL, "https://console-openshift-console"), "/")
42-
err = m.ensureCertificateIssuer(ctx, m.IngressCertName(), ingressHostname, OneCertIssuerName)
38+
err = m.ensureCertificateIssuer(ctx, m.IngressCertName(), ingressHostname, OneCertPublicIssuerName)
4339
if err != nil {
4440
return err
4541
}

pkg/cluster/delete.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -566,13 +566,13 @@ func (m *manager) Delete(ctx context.Context) error {
566566

567567
if managedDomain != "" {
568568
m.log.Print("deleting signed apiserver certificate")
569-
err = m.env.ClusterKeyvault().EnsureCertificateDeleted(ctx, m.doc.ID+"-apiserver")
569+
err = m.env.ClusterKeyvault().EnsureCertificateDeleted(ctx, m.APICertName())
570570
if err != nil {
571571
return err
572572
}
573573

574574
m.log.Print("deleting signed ingress certificate")
575-
err = m.env.ClusterKeyvault().EnsureCertificateDeleted(ctx, m.doc.ID+"-ingress")
575+
err = m.env.ClusterKeyvault().EnsureCertificateDeleted(ctx, m.IngressCertName())
576576
if err != nil {
577577
return err
578578
}

pkg/cluster/tls.go

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,10 @@ import (
1717
"github.com/Azure/ARO-RP/pkg/util/keyvault"
1818
)
1919

20+
const (
21+
OneCertPublicIssuerName = "OneCertV2-PublicCA"
22+
)
23+
2024
func (m *manager) createCertificates(ctx context.Context) error {
2125
if m.env.FeatureIsSet(env.FeatureDisableSignedCertificates) {
2226
return nil
@@ -36,18 +40,18 @@ func (m *manager) createCertificates(ctx context.Context) error {
3640
commonName string
3741
}{
3842
{
39-
certificateName: m.doc.ID + "-apiserver",
43+
certificateName: m.APICertName(),
4044
commonName: "api." + managedDomain,
4145
},
4246
{
43-
certificateName: m.doc.ID + "-ingress",
47+
certificateName: m.IngressCertName(),
4448
commonName: "*.apps." + managedDomain,
4549
},
4650
}
4751

4852
for _, c := range certs {
4953
m.log.Printf("creating certificate %s", c.certificateName)
50-
err = m.env.ClusterKeyvault().CreateSignedCertificate(ctx, "OneCertV2-PublicCA", c.certificateName, c.commonName, keyvault.EkuServerAuth)
54+
err = m.env.ClusterKeyvault().CreateSignedCertificate(ctx, OneCertPublicIssuerName, c.certificateName, c.commonName, keyvault.EkuServerAuth)
5155
if err != nil {
5256
return err
5357
}
@@ -80,7 +84,7 @@ func (m *manager) configureAPIServerCertificate(ctx context.Context) error {
8084
}
8185

8286
for _, namespace := range []string{"openshift-config", "openshift-azure-operator"} {
83-
err = EnsureTLSSecretFromKeyvault(ctx, m.env.ClusterKeyvault(), m.ch, types.NamespacedName{Name: m.doc.ID + "-apiserver", Namespace: namespace}, m.doc.ID+"-apiserver")
87+
err = EnsureTLSSecretFromKeyvault(ctx, m.env.ClusterKeyvault(), m.ch, types.NamespacedName{Name: m.APICertName(), Namespace: namespace}, m.APICertName())
8488
if err != nil {
8589
return err
8690
}
@@ -98,7 +102,7 @@ func (m *manager) configureAPIServerCertificate(ctx context.Context) error {
98102
"api." + managedDomain,
99103
},
100104
ServingCertificate: configv1.SecretNameReference{
101-
Name: m.doc.ID + "-apiserver",
105+
Name: m.APICertName(),
102106
},
103107
},
104108
}
@@ -123,7 +127,7 @@ func (m *manager) configureIngressCertificate(ctx context.Context) error {
123127
}
124128

125129
for _, namespace := range []string{"openshift-ingress", "openshift-azure-operator"} {
126-
err = EnsureTLSSecretFromKeyvault(ctx, m.env.ClusterKeyvault(), m.ch, types.NamespacedName{Namespace: namespace, Name: m.doc.ID + "-ingress"}, m.doc.ID+"-ingress")
130+
err = EnsureTLSSecretFromKeyvault(ctx, m.env.ClusterKeyvault(), m.ch, types.NamespacedName{Namespace: namespace, Name: m.IngressCertName()}, m.IngressCertName())
127131
if err != nil {
128132
return err
129133
}
@@ -136,7 +140,7 @@ func (m *manager) configureIngressCertificate(ctx context.Context) error {
136140
}
137141

138142
ic.Spec.DefaultCertificate = &corev1.LocalObjectReference{
139-
Name: m.doc.ID + "-ingress",
143+
Name: m.IngressCertName(),
140144
}
141145

142146
_, err = m.operatorcli.OperatorV1().IngressControllers("openshift-ingress-operator").Update(ctx, ic, metav1.UpdateOptions{})

0 commit comments

Comments
 (0)