@@ -42,7 +42,7 @@ def is_operationally_valid(self) -> bool:
4242 return self .is_valid and not self .is_close_to_expiration
4343
4444 def get_status_description (self ) -> str :
45- cert_source = 'user-made' if self .user_made else 'self -signed'
45+ cert_source = 'user-made' if self .user_made else 'cephadm -signed'
4646 cert_target = f' ({ self .target } )' if self .target else ''
4747 cert_details = f"'{ self .cert_name } { cert_target } ' ({ cert_source } )"
4848 if not self .is_valid :
@@ -66,7 +66,7 @@ class CertMgr:
6666 It tracks known certificates and private keys, associates them with services, and ensures
6767 their validity. If certificates are close to expiration or invalid, depending on the configuration
6868 (governed by the mgr/cephadm/certificate_automated_rotation_enabled parameter), CertMgr generates
69- warnings or attempts renewal for self -signed certificates.
69+ warnings or attempts renewal for cephadm -signed certificates.
7070
7171 Additionally, CertMgr provides methods for certificate management, including retrieving, saving,
7272 and removing certificates and keys, as well as reporting certificate health status in case of issues.
@@ -385,8 +385,8 @@ def prepare_certificate(self,
385385 f'error: { cert_info .error_info } ' )
386386
387387 # Reaching this point means either certificates are not present or they are
388- # invalid self -signed certificates. Either way, we will just generate new ones.
389- logger .info (f'Generating cephadm self -signed certificates for { cert_name } /{ key_name } ' )
388+ # invalid cephadm -signed certificates. Either way, we will just generate new ones.
389+ logger .info (f'Generating cephadm-signed certificates for { cert_name } /{ key_name } ' )
390390 cert , pkey = self .generate_cert (host_fqdns , host_ips )
391391 self .mgr .cert_mgr .save_cert (cert_name , cert , host = target_host , service_name = target_service )
392392 self .mgr .cert_mgr .save_key (key_name , pkey , host = target_host , service_name = target_service )
@@ -434,15 +434,15 @@ def get_key(cert_name: str, key_name: str, target: Optional[str]) -> Optional[Pr
434434
435435 def _renew_self_signed_certificate (self , cert_info : CertInfo , cert_obj : Cert ) -> bool :
436436 try :
437- logger .info (f'Renewing self -signed certificate for { cert_info .cert_name } ' )
437+ logger .info (f'Renewing cephadm -signed certificate for { cert_info .cert_name } ' )
438438 new_cert , new_key = self .ssl_certs .renew_cert (cert_obj .cert , self .mgr .certificate_duration_days )
439439 service_name , host = self .cert_store .determine_tlsobject_target (cert_info .cert_name , cert_info .target )
440440 self .cert_store .save_tlsobject (cert_info .cert_name , new_cert , service_name = service_name , host = host )
441441 key_name = cert_info .cert_name .replace ('_cert' , '_key' )
442442 self .key_store .save_tlsobject (key_name , new_key , service_name = service_name , host = host )
443443 return True
444444 except SSLConfigException as e :
445- logger .error (f'Error while trying to renew self -signed certificate for { cert_info .cert_name } : { e } ' )
445+ logger .error (f'Error while trying to renew cephadm -signed certificate for { cert_info .cert_name } : { e } ' )
446446 return False
447447
448448 def check_services_certificates (self , fix_issues : bool = False ) -> Tuple [List [str ], List [CertInfo ]]:
@@ -466,7 +466,7 @@ def trigger_auto_fix(cert_info: CertInfo, cert_obj: Cert) -> bool:
466466 if not self .mgr .certificate_automated_rotation_enabled or cert_obj .user_made :
467467 return False
468468
469- # This is a self -signed certificate, let's try to fix it
469+ # This is a cephadm -signed certificate, let's try to fix it
470470 if not cert_info .is_valid :
471471 # Remove the invalid certificate to force regeneration
472472 service_name , host = self .cert_store .determine_tlsobject_target (cert_info .cert_name , cert_info .target )
0 commit comments