Skip to content

Commit e8c8cc2

Browse files
committed
ESO-155: incorporate review comments
1 parent 5527bde commit e8c8cc2

File tree

5 files changed

+37
-23
lines changed

5 files changed

+37
-23
lines changed

bundle/manifests/external-secrets-operator.clusterserviceversion.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -218,9 +218,9 @@ metadata:
218218
]
219219
capabilities: Basic Install
220220
categories: Security
221-
console.openshift.io/disable-operand-delete: "false"
221+
console.openshift.io/disable-operand-delete: "true"
222222
containerImage: openshift.io/external-secrets-operator:latest
223-
createdAt: "2025-10-08T08:59:22Z"
223+
createdAt: "2025-10-09T14:41:51Z"
224224
features.operators.openshift.io/cnf: "false"
225225
features.operators.openshift.io/cni: "false"
226226
features.operators.openshift.io/csi: "false"

cmd/external-secrets-operator/main.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -156,8 +156,8 @@ func main() {
156156
metricsTLSOpts = append(metricsTLSOpts, func(c *tls.Config) {
157157
certPool, err := x509.SystemCertPool()
158158
if err != nil {
159-
setupLog.Error(err, "failed to load system certificate pool")
160-
os.Exit(1)
159+
setupLog.Info("unable to load system certificate pool", "error", err)
160+
certPool = x509.NewCertPool()
161161
}
162162
openshiftCACert, err := os.ReadFile(openshiftCACertificateFile)
163163
if err != nil {

config/manifests/bases/external-secrets-operator.clusterserviceversion.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
alm-examples: '[]'
66
capabilities: Basic Install
77
categories: Security
8-
console.openshift.io/disable-operand-delete: "false"
8+
console.openshift.io/disable-operand-delete: "true"
99
containerImage: openshift.io/external-secrets-operator:latest
1010
createdAt: 2023-03-03T00:00:00
1111
features.operators.openshift.io/cnf: "false"

pkg/controller/common/utils.go

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -212,11 +212,13 @@ func deploymentSpecModified(desired, fetched *appsv1.Deployment) bool {
212212
for _, desiredVolume := range desired.Spec.Template.Spec.Volumes {
213213
if desiredVolume.Secret != nil {
214214
for _, fetchedVolume := range fetched.Spec.Template.Spec.Volumes {
215-
if !reflect.DeepEqual(desiredVolume.Secret.Items, fetchedVolume.Secret.Items) {
216-
return true
217-
}
218-
if desiredVolume.Secret.SecretName != fetchedVolume.Secret.SecretName {
219-
return true
215+
if desiredVolume.Name == fetchedVolume.Name {
216+
if !reflect.DeepEqual(desiredVolume.Secret.Items, fetchedVolume.Secret.Items) {
217+
return true
218+
}
219+
if !reflect.DeepEqual(desiredVolume.Secret.SecretName, fetchedVolume.Secret.SecretName) {
220+
return true
221+
}
220222
}
221223
}
222224
}

pkg/controller/external_secrets/deployments.go

Lines changed: 25 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -403,20 +403,32 @@ func updateBitwardenServerContainerSpec(deployment *appsv1.Deployment, image str
403403
}
404404

405405
func updateWebhookVolumeConfig(deployment *appsv1.Deployment, esc *operatorv1alpha1.ExternalSecretsConfig) {
406-
if isCertManagerConfigEnabled(esc) {
407-
const certsVolumeName = "certs"
408-
if deployment.Spec.Template.Spec.Volumes == nil {
409-
deployment.Spec.Template.Spec.Volumes = append(deployment.Spec.Template.Spec.Volumes, corev1.Volume{
410-
Name: certsVolumeName,
411-
})
412-
}
413-
for i := range deployment.Spec.Template.Spec.Volumes {
414-
if deployment.Spec.Template.Spec.Volumes[i].Name == certsVolumeName {
415-
if deployment.Spec.Template.Spec.Volumes[i].Secret == nil {
416-
deployment.Spec.Template.Spec.Volumes[i].Secret = &corev1.SecretVolumeSource{}
417-
}
418-
deployment.Spec.Template.Spec.Volumes[i].Secret.SecretName = certmanagerTLSSecretWebhook
406+
const certsVolumeName = "certs"
407+
408+
if !isCertManagerConfigEnabled(esc) {
409+
return
410+
}
411+
412+
certsVolumeExists := false
413+
for i := range deployment.Spec.Template.Spec.Volumes {
414+
if deployment.Spec.Template.Spec.Volumes[i].Name == certsVolumeName {
415+
certsVolumeExists = true
416+
if deployment.Spec.Template.Spec.Volumes[i].Secret == nil {
417+
deployment.Spec.Template.Spec.Volumes[i].Secret = &corev1.SecretVolumeSource{}
419418
}
419+
deployment.Spec.Template.Spec.Volumes[i].Secret.SecretName = certmanagerTLSSecretWebhook
420+
break
420421
}
421422
}
423+
424+
if !certsVolumeExists {
425+
deployment.Spec.Template.Spec.Volumes = append(deployment.Spec.Template.Spec.Volumes, corev1.Volume{
426+
Name: certsVolumeName,
427+
VolumeSource: corev1.VolumeSource{
428+
Secret: &corev1.SecretVolumeSource{
429+
SecretName: certmanagerTLSSecretWebhook,
430+
},
431+
},
432+
})
433+
}
422434
}

0 commit comments

Comments
 (0)