You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: hack/tls-cert-gen/certs.go
+69-29Lines changed: 69 additions & 29 deletions
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,25 @@
1
1
package main
2
2
3
+
// yamlSecret encapsulates all the data that we need to create the tls secrets
4
+
// that kubernetes needs as tls files.
5
+
//
6
+
// secretName - this is what virtualservers and other objects reference
7
+
// fileName - every secret needs to have an actual file on the disk. This is going to be the name of the file that's placed in the ./common-secrets directory
8
+
// symlinks - a slice of paths that will symlink to the actual file. These paths are relative to the project root. For example: []string{"examples/custom-resources/oidc/tls-secret.yaml"}
9
+
// valid - whether the generated kubernetes secret file should be valid. An invalid secret will not have the data["tls.key"] property set in the yaml file.
10
+
// templateData - has information about issuer, subject, common name (main domain), and dnsNames (subject alternate names).
11
+
// secretType - if left empty, it will be the default v1.SecretTypeTLS value. The type is "k8s.io/api/core/v1".SecretType, which is an alias for strings.
12
+
// usedIn - not used in the generation, it's only so we can keep track on which py tests used the specific certs
13
+
typeyamlSecretstruct {
14
+
secretNamestring
15
+
fileNamestring
16
+
symlinks []string
17
+
validbool
18
+
templateDatatemplateData
19
+
secretTypestring
20
+
usedIn []string
21
+
}
22
+
3
23
varyamlSecrets= []yamlSecret{
4
24
{
5
25
secretName: "tls-secret",
@@ -70,47 +90,54 @@ var yamlSecrets = []yamlSecret{
70
90
},
71
91
},
72
92
93
+
// ==== the below ones are needed for specific pytests ===
Copy file name to clipboardExpand all lines: hack/tls-cert-gen/tls-cert-gen.go
-18Lines changed: 0 additions & 18 deletions
Original file line number
Diff line number
Diff line change
@@ -60,24 +60,6 @@ type templateData struct {
60
60
dnsNames []string
61
61
}
62
62
63
-
// yamlSecret encapsulates all the data that we need to create the tls secrets
64
-
// that kubernetes needs as tls files.
65
-
//
66
-
// secretName - this is what virtualservers and other objects reference
67
-
// fileName - every secret needs to have an actual file on the disk. This is going to be the name of the file that's placed in the ./common-secrets directory
68
-
// symlinks - a slice of paths that will symlink to the actual file. These paths are relative to the project root. For example: []string{"examples/custom-resources/oidc/tls-secret.yaml"}
69
-
// valid - whether the generated kubernetes secret file should be valid. An invalid secret will not have the data["tls.key"] property set in the yaml file.
70
-
// templateData - has information about issuer, subject, common name (main domain), and dnsNames (subject alternate names).
71
-
// secretType - if left empty, it will be the default v1.SecretTypeTLS value. The type is "k8s.io/api/core/v1".SecretType, which is an alias for strings.
0 commit comments