File tree Expand file tree Collapse file tree 7 files changed +15
-15
lines changed
deploy/helm/secret-operator/crds
templates/kuttl/tls-truststore Expand file tree Collapse file tree 7 files changed +15
-15
lines changed Original file line number Diff line number Diff line change @@ -392,7 +392,10 @@ spec:
392
392
- kerberos
393
393
nullable : true
394
394
type : string
395
- outputResource :
395
+ secretClassName :
396
+ description : The name of the SecretClass that the request concerns.
397
+ type : string
398
+ targetKind :
396
399
default : ConfigMap
397
400
description : |-
398
401
Which Kubernetes resource should be used to output the requested information to.
@@ -404,9 +407,6 @@ spec:
404
407
- Secret
405
408
- ConfigMap
406
409
type : string
407
- secretClassName :
408
- description : The name of the SecretClass that the request concerns.
409
- type : string
410
410
required :
411
411
- secretClassName
412
412
type : object
Original file line number Diff line number Diff line change @@ -526,7 +526,7 @@ pub struct TrustStoreSpec {
526
526
///
527
527
/// Can be either `ConfigMap` or `Secret`, defaults to `ConfigMap`.
528
528
#[ serde( default ) ]
529
- pub output_resource : TrustStoreOutputType ,
529
+ pub target_kind : TrustStoreOutputType ,
530
530
531
531
/// The [format](DOCS_BASE_URL_PLACEHOLDER/secret-operator/secretclass#format) that the data should be converted into.
532
532
pub format : Option < SecretFormat > ,
Original file line number Diff line number Diff line change @@ -305,7 +305,7 @@ async fn reconcile(
305
305
. context ( BuildOwnerReferenceSnafu ) ?
306
306
. build ( ) ;
307
307
308
- match truststore. spec . output_resource {
308
+ match truststore. spec . target_kind {
309
309
TrustStoreOutputType :: ConfigMap => {
310
310
let trust_cm = ConfigMap {
311
311
metadata : trust_metadata,
Original file line number Diff line number Diff line change @@ -4,18 +4,18 @@ kind: TestAssert
4
4
timeout: 5
5
5
---
6
6
apiVersion: v1
7
- kind: {{ test_scenario['values'] ['truststore-output-resource '] }}
7
+ kind: {{ test_scenario['values'] ['truststore-target-kind '] }}
8
8
metadata:
9
9
name: truststore-pem
10
10
# data is validated in 03-assert.yaml
11
11
---
12
12
apiVersion: v1
13
- kind: {{ test_scenario['values'] ['truststore-output-resource '] }}
13
+ kind: {{ test_scenario['values'] ['truststore-target-kind '] }}
14
14
metadata:
15
15
name: truststore-pkcs12
16
16
# data is validated in 03-assert.yaml
17
17
---
18
- {% if test_scenario ['values' ]['truststore-output-resource ' ] == 'ConfigMap' %}
18
+ {% if test_scenario ['values' ]['truststore-target-kind ' ] == 'ConfigMap' %}
19
19
apiVersion: v1
20
20
kind: ConfigMap
21
21
metadata:
Original file line number Diff line number Diff line change @@ -7,7 +7,7 @@ metadata:
7
7
spec:
8
8
secretClassName: tls-$NAMESPACE
9
9
format: tls-pem
10
- outputResource : {{ test_scenario['values'] ['truststore-output-resource '] }}
10
+ targetKind : {{ test_scenario['values'] ['truststore-target-kind '] }}
11
11
---
12
12
apiVersion: secrets.stackable.tech/v1alpha1
13
13
kind: TrustStore
@@ -16,12 +16,12 @@ metadata:
16
16
spec:
17
17
secretClassName: tls-$NAMESPACE
18
18
format: tls-pkcs12
19
- outputResource : {{ test_scenario['values'] ['truststore-output-resource '] }}
19
+ targetKind : {{ test_scenario['values'] ['truststore-target-kind '] }}
20
20
---
21
21
apiVersion: secrets.stackable.tech/v1alpha1
22
22
kind: TrustStore
23
23
metadata:
24
24
name: truststore-k8ssearch
25
25
spec:
26
26
secretClassName: k8ssearch-$NAMESPACE
27
- outputResource : {{ test_scenario['values'] ['truststore-output-resource '] }}
27
+ targetKind : {{ test_scenario['values'] ['truststore-target-kind '] }}
Original file line number Diff line number Diff line change @@ -4,7 +4,7 @@ apiVersion: kuttl.dev/v1beta1
4
4
kind: TestAssert
5
5
timeout: 10
6
6
commands:
7
- {% if test_scenario ['values' ]['truststore-output-resource ' ] == 'ConfigMap' %}
7
+ {% if test_scenario ['values' ]['truststore-target-kind ' ] == 'ConfigMap' %}
8
8
- script: kubectl --namespace=$NAMESPACE get configmap/truststore-pem --output=jsonpath='{.data.ca\.crt}' | openssl x509 -noout
9
9
- script: kubectl --namespace=$NAMESPACE get configmap/truststore-pkcs12 --output=jsonpath='{.binaryData.truststore\.p12}' | base64 --decode | openssl pkcs12 -noout -passin 'pass:' -legacy
10
10
{% else %}
Original file line number Diff line number Diff line change @@ -19,7 +19,7 @@ dimensions:
19
19
values :
20
20
- false
21
21
- true
22
- - name : truststore-output-resource
22
+ - name : truststore-target-kind
23
23
values :
24
24
- ConfigMap
25
25
- Secret
44
44
- name : tls-truststore
45
45
dimensions :
46
46
- openshift
47
- - truststore-output-resource
47
+ - truststore-target-kind
48
48
- name : cert-manager-tls
49
49
dimensions :
50
50
- openshift
You can’t perform that action at this time.
0 commit comments