@@ -22,10 +22,7 @@ use super::{
2222 scope:: SecretScope ,
2323} ;
2424use crate :: {
25- crd:: {
26- ActiveDirectorySamAccountNameRules , InvalidKerberosPrincipal , KerberosKeytabBackendAdmin ,
27- KerberosPrincipal ,
28- } ,
25+ crd:: { self , KerberosPrincipal , v1alpha2} ,
2926 format:: { SecretData , WellKnownSecretData , well_known} ,
3027 utils:: Unloggable ,
3128} ;
@@ -62,7 +59,9 @@ pub enum Error {
6259 } ,
6360
6461 #[ snafu( display( "generated invalid Kerberos principal for pod" ) ) ]
65- PodPrincipal { source : InvalidKerberosPrincipal } ,
62+ PodPrincipal {
63+ source : crd:: InvalidKerberosPrincipal ,
64+ } ,
6665
6766 #[ snafu( display( "failed to read the provisioned keytab" ) ) ]
6867 ReadProvisionedKeytab { source : std:: io:: Error } ,
@@ -106,7 +105,7 @@ impl SecretBackendError for Error {
106105pub struct KerberosProfile {
107106 pub realm_name : KerberosRealmName ,
108107 pub kdc : HostName ,
109- pub admin : KerberosKeytabBackendAdmin ,
108+ pub admin : v1alpha2 :: KerberosKeytabBackendAdmin ,
110109}
111110
112111#[ derive( Debug ) ]
@@ -169,10 +168,12 @@ impl SecretBackend for KerberosKeytab {
169168 } = self ;
170169
171170 let admin_server_clause = match admin {
172- KerberosKeytabBackendAdmin :: Mit { kadmin_server } => {
171+ v1alpha2:: KerberosKeytabBackendAdmin :: Mit ( v1alpha2:: KerberosKeytabBackendMit {
172+ kadmin_server,
173+ } ) => {
173174 format ! ( " admin_server = {kadmin_server}" )
174175 }
175- KerberosKeytabBackendAdmin :: ActiveDirectory { .. } => String :: new ( ) ,
176+ v1alpha2 :: KerberosKeytabBackendAdmin :: ActiveDirectory { .. } => String :: new ( ) ,
176177 } ;
177178
178179 let tmp = tempdir ( ) . context ( TempSetupSnafu ) ?;
@@ -254,24 +255,26 @@ cluster.local = {realm_name}
254255 } )
255256 . collect ( ) ,
256257 admin_backend : match admin {
257- KerberosKeytabBackendAdmin :: Mit { .. } => {
258+ v1alpha2 :: KerberosKeytabBackendAdmin :: Mit { .. } => {
258259 stackable_krb5_provision_keytab:: AdminBackend :: Mit
259260 }
260- KerberosKeytabBackendAdmin :: ActiveDirectory {
261- ldap_server,
262- ldap_tls_ca_secret,
263- password_cache_secret,
264- user_distinguished_name,
265- schema_distinguished_name,
266- generate_sam_account_name,
267- } => stackable_krb5_provision_keytab:: AdminBackend :: ActiveDirectory {
261+ v1alpha2:: KerberosKeytabBackendAdmin :: ActiveDirectory (
262+ v1alpha2:: KerberosKeytabBackendActiveDirectory {
263+ ldap_server,
264+ ldap_tls_ca_secret,
265+ password_cache_secret,
266+ user_distinguished_name,
267+ schema_distinguished_name,
268+ generate_sam_account_name,
269+ } ,
270+ ) => stackable_krb5_provision_keytab:: AdminBackend :: ActiveDirectory {
268271 ldap_server : ldap_server. to_string ( ) ,
269272 ldap_tls_ca_secret : ldap_tls_ca_secret. clone ( ) ,
270273 password_cache_secret : password_cache_secret. clone ( ) ,
271274 user_distinguished_name : user_distinguished_name. clone ( ) ,
272275 schema_distinguished_name : schema_distinguished_name. clone ( ) ,
273276 generate_sam_account_name : generate_sam_account_name. clone ( ) . map (
274- |ActiveDirectorySamAccountNameRules {
277+ |v1alpha2 :: ActiveDirectorySamAccountNameRules {
275278 prefix,
276279 total_length,
277280 } | {
0 commit comments