@@ -121,7 +121,7 @@ func (c RotatedSelfSignedCertKeySecret) EnsureTargetCertKeyPair(ctx context.Cont
121
121
122
122
if reason := c .CertCreator .NeedNewTargetCertKeyPair (targetCertKeyPairSecret , signingCertKeyPair , caBundleCerts , c .Refresh , c .RefreshOnlyWhenExpired , creationRequired ); len (reason ) > 0 {
123
123
c .EventRecorder .Eventf ("TargetUpdateRequired" , "%q in %q requires a new target cert/key pair: %v" , c .Name , c .Namespace , reason )
124
- if err = setTargetCertKeyPairSecretAndTLSAnnotations (targetCertKeyPairSecret , c .Validity , signingCertKeyPair , c .CertCreator , c .AdditionalAnnotations ); err != nil {
124
+ if err = setTargetCertKeyPairSecretAndTLSAnnotations (targetCertKeyPairSecret , c .Validity , c . Refresh , signingCertKeyPair , c .CertCreator , c .AdditionalAnnotations ); err != nil {
125
125
return nil , err
126
126
}
127
127
@@ -234,13 +234,13 @@ func needNewTargetCertKeyPairForTime(annotations map[string]string, signer *cryp
234
234
235
235
// setTargetCertKeyPairSecretAndTLSAnnotations generates a new cert/key pair,
236
236
// stores them in the specified secret, and adds predefined TLS annotations to that secret.
237
- func setTargetCertKeyPairSecretAndTLSAnnotations (targetCertKeyPairSecret * corev1.Secret , validity time.Duration , signer * crypto.CA , certCreator TargetCertCreator , tlsAnnotations AdditionalAnnotations ) error {
237
+ func setTargetCertKeyPairSecretAndTLSAnnotations (targetCertKeyPairSecret * corev1.Secret , validity , refresh time.Duration , signer * crypto.CA , certCreator TargetCertCreator , tlsAnnotations AdditionalAnnotations ) error {
238
238
certKeyPair , err := setTargetCertKeyPairSecret (targetCertKeyPairSecret , validity , signer , certCreator )
239
239
if err != nil {
240
240
return err
241
241
}
242
242
243
- setTLSAnnotationsOnTargetCertKeyPairSecret (targetCertKeyPairSecret , certKeyPair , certCreator , tlsAnnotations )
243
+ setTLSAnnotationsOnTargetCertKeyPairSecret (targetCertKeyPairSecret , certKeyPair , certCreator , refresh , tlsAnnotations )
244
244
return nil
245
245
}
246
246
@@ -277,11 +277,12 @@ func setTargetCertKeyPairSecret(targetCertKeyPairSecret *corev1.Secret, validity
277
277
//
278
278
// These assumptions are safe because this function is only called after the secret
279
279
// has been initialized in setTargetCertKeyPairSecret.
280
- func setTLSAnnotationsOnTargetCertKeyPairSecret (targetCertKeyPairSecret * corev1.Secret , certKeyPair * crypto.TLSCertificateConfig , certCreator TargetCertCreator , tlsAnnotations AdditionalAnnotations ) {
280
+ func setTLSAnnotationsOnTargetCertKeyPairSecret (targetCertKeyPairSecret * corev1.Secret , certKeyPair * crypto.TLSCertificateConfig , certCreator TargetCertCreator , refresh time. Duration , tlsAnnotations AdditionalAnnotations ) {
281
281
targetCertKeyPairSecret .Annotations [CertificateIssuer ] = certKeyPair .Certs [0 ].Issuer .CommonName
282
282
283
283
tlsAnnotations .NotBefore = certKeyPair .Certs [0 ].NotBefore .Format (time .RFC3339 )
284
284
tlsAnnotations .NotAfter = certKeyPair .Certs [0 ].NotAfter .Format (time .RFC3339 )
285
+ tlsAnnotations .RefreshPeriod = refresh .String ()
285
286
_ = tlsAnnotations .EnsureTLSMetadataUpdate (& targetCertKeyPairSecret .ObjectMeta )
286
287
287
288
certCreator .SetAnnotations (certKeyPair , targetCertKeyPairSecret .Annotations )
0 commit comments