@@ -176,8 +176,8 @@ func setupAuthSecret(ctx context.Context, c client.Client, obj *sourcev1.HelmRep
176176
177177	var  deprecatedTLS  bool 
178178
179- 	_ , hasUsername  :=  authSecret .Data [secrets .UsernameKey ]
180- 	_ , hasPassword  :=  authSecret .Data [secrets .PasswordKey ]
179+ 	_ , hasUsername  :=  authSecret .Data [secrets .KeyUsername ]
180+ 	_ , hasPassword  :=  authSecret .Data [secrets .KeyPassword ]
181181
182182	if  hasUsername  ||  hasPassword  {
183183		username , password , err  :=  secrets .BasicAuthFromSecret (ctx , authSecret )
@@ -288,8 +288,8 @@ func storeTLSCertificateFilesForOCI(ctx context.Context, certSecret, authSecret
288288	}
289289
290290	if  tlsSecret  !=  nil  {
291- 		if  certData , exists  :=  tlsSecret .Data [secrets .TLSCertKey ]; exists  {
292- 			if  keyData , keyExists  :=  tlsSecret .Data [secrets .TLSPrivateKeyKey ]; keyExists  {
291+ 		if  certData , exists  :=  tlsSecret .Data [secrets .KeyTLSCert ]; exists  {
292+ 			if  keyData , keyExists  :=  tlsSecret .Data [secrets .KeyTLSPrivateKey ]; keyExists  {
293293				certFile , err  =  writeToFile (certData , certFileName , path )
294294				if  err  !=  nil  {
295295					return  "" , "" , "" , err 
@@ -301,7 +301,7 @@ func storeTLSCertificateFilesForOCI(ctx context.Context, certSecret, authSecret
301301			}
302302		}
303303
304- 		if  caData , exists  :=  tlsSecret .Data [secrets .CACertKey ]; exists  {
304+ 		if  caData , exists  :=  tlsSecret .Data [secrets .KeyCACert ]; exists  {
305305			caFile , err  =  writeToFile (caData , caFileName , path )
306306			if  err  !=  nil  {
307307				return  "" , "" , "" , err 
0 commit comments