certs_manager.go: Rename some local variables
Signed-off-by: Margo Crawford <margaretc@vmware.com>
This commit is contained in:
parent
7a140bf63c
commit
126f9c0da3
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package apicerts
|
package apicerts
|
||||||
@ -93,14 +93,14 @@ func (c *certsManagerController) Sync(ctx controllerlib.Context) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Create a CA.
|
// Create a CA.
|
||||||
aggregatedAPIServerCA, err := certauthority.New(pkix.Name{CommonName: c.generatedCACommonName}, c.certDuration)
|
ca, err := certauthority.New(pkix.Name{CommonName: c.generatedCACommonName}, c.certDuration)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("could not initialize CA: %w", err)
|
return fmt.Errorf("could not initialize CA: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Using the CA from above, create a TLS server cert for the aggregated API server to use.
|
// Using the CA from above, create a TLS server cert.
|
||||||
serviceEndpoint := c.serviceNameForGeneratedCertCommonName + "." + c.namespace + ".svc"
|
serviceEndpoint := c.serviceNameForGeneratedCertCommonName + "." + c.namespace + ".svc"
|
||||||
aggregatedAPIServerTLSCert, err := aggregatedAPIServerCA.Issue(
|
tlsCert, err := ca.Issue(
|
||||||
pkix.Name{CommonName: serviceEndpoint},
|
pkix.Name{CommonName: serviceEndpoint},
|
||||||
[]string{serviceEndpoint},
|
[]string{serviceEndpoint},
|
||||||
nil,
|
nil,
|
||||||
@ -111,7 +111,7 @@ func (c *certsManagerController) Sync(ctx controllerlib.Context) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Write the CA's public key bundle and the serving certs to a secret.
|
// Write the CA's public key bundle and the serving certs to a secret.
|
||||||
tlsCertChainPEM, tlsPrivateKeyPEM, err := certauthority.ToPEM(aggregatedAPIServerTLSCert)
|
tlsCertChainPEM, tlsPrivateKeyPEM, err := certauthority.ToPEM(tlsCert)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("could not PEM encode serving certificate: %w", err)
|
return fmt.Errorf("could not PEM encode serving certificate: %w", err)
|
||||||
}
|
}
|
||||||
@ -123,7 +123,7 @@ func (c *certsManagerController) Sync(ctx controllerlib.Context) error {
|
|||||||
Labels: c.certsSecretLabels,
|
Labels: c.certsSecretLabels,
|
||||||
},
|
},
|
||||||
StringData: map[string]string{
|
StringData: map[string]string{
|
||||||
caCertificateSecretKey: string(aggregatedAPIServerCA.Bundle()),
|
caCertificateSecretKey: string(ca.Bundle()),
|
||||||
tlsPrivateKeySecretKey: string(tlsPrivateKeyPEM),
|
tlsPrivateKeySecretKey: string(tlsPrivateKeyPEM),
|
||||||
tlsCertificateChainSecretKey: string(tlsCertChainPEM),
|
tlsCertificateChainSecretKey: string(tlsCertChainPEM),
|
||||||
},
|
},
|
||||||
|
Loading…
Reference in New Issue
Block a user