@@ -22,7 +22,7 @@ use super::{
22
22
scope:: SecretScope ,
23
23
} ;
24
24
use crate :: {
25
- crd:: { KerberosPrincipal , v1alpha1 } ,
25
+ crd:: { self , KerberosPrincipal , v1alpha2 } ,
26
26
format:: { SecretData , WellKnownSecretData , well_known} ,
27
27
utils:: Unloggable ,
28
28
} ;
@@ -60,7 +60,7 @@ pub enum Error {
60
60
61
61
#[ snafu( display( "generated invalid Kerberos principal for pod" ) ) ]
62
62
PodPrincipal {
63
- source : v1alpha1 :: InvalidKerberosPrincipal ,
63
+ source : crd :: InvalidKerberosPrincipal ,
64
64
} ,
65
65
66
66
#[ snafu( display( "failed to read the provisioned keytab" ) ) ]
@@ -105,7 +105,7 @@ impl SecretBackendError for Error {
105
105
pub struct KerberosProfile {
106
106
pub realm_name : KerberosRealmName ,
107
107
pub kdc : HostName ,
108
- pub admin : v1alpha1 :: KerberosKeytabBackendAdmin ,
108
+ pub admin : v1alpha2 :: KerberosKeytabBackendAdmin ,
109
109
}
110
110
111
111
#[ derive( Debug ) ]
@@ -168,10 +168,12 @@ impl SecretBackend for KerberosKeytab {
168
168
} = self ;
169
169
170
170
let admin_server_clause = match admin {
171
- v1alpha1:: KerberosKeytabBackendAdmin :: Mit { kadmin_server } => {
171
+ v1alpha2:: KerberosKeytabBackendAdmin :: Mit ( v1alpha2:: KerberosKeytabBackendMit {
172
+ kadmin_server,
173
+ } ) => {
172
174
format ! ( " admin_server = {kadmin_server}" )
173
175
}
174
- v1alpha1 :: KerberosKeytabBackendAdmin :: ActiveDirectory { .. } => String :: new ( ) ,
176
+ v1alpha2 :: KerberosKeytabBackendAdmin :: ActiveDirectory { .. } => String :: new ( ) ,
175
177
} ;
176
178
177
179
let tmp = tempdir ( ) . context ( TempSetupSnafu ) ?;
@@ -253,24 +255,26 @@ cluster.local = {realm_name}
253
255
} )
254
256
. collect ( ) ,
255
257
admin_backend : match admin {
256
- v1alpha1 :: KerberosKeytabBackendAdmin :: Mit { .. } => {
258
+ v1alpha2 :: KerberosKeytabBackendAdmin :: Mit { .. } => {
257
259
stackable_krb5_provision_keytab:: AdminBackend :: Mit
258
260
}
259
- v1alpha1:: KerberosKeytabBackendAdmin :: ActiveDirectory {
260
- ldap_server,
261
- ldap_tls_ca_secret,
262
- password_cache_secret,
263
- user_distinguished_name,
264
- schema_distinguished_name,
265
- generate_sam_account_name,
266
- } => stackable_krb5_provision_keytab:: AdminBackend :: ActiveDirectory {
261
+ v1alpha2:: KerberosKeytabBackendAdmin :: ActiveDirectory (
262
+ v1alpha2:: KerberosKeytabBackendActiveDirectory {
263
+ ldap_server,
264
+ ldap_tls_ca_secret,
265
+ password_cache_secret,
266
+ user_distinguished_name,
267
+ schema_distinguished_name,
268
+ generate_sam_account_name,
269
+ } ,
270
+ ) => stackable_krb5_provision_keytab:: AdminBackend :: ActiveDirectory {
267
271
ldap_server : ldap_server. to_string ( ) ,
268
272
ldap_tls_ca_secret : ldap_tls_ca_secret. clone ( ) ,
269
273
password_cache_secret : password_cache_secret. clone ( ) ,
270
274
user_distinguished_name : user_distinguished_name. clone ( ) ,
271
275
schema_distinguished_name : schema_distinguished_name. clone ( ) ,
272
276
generate_sam_account_name : generate_sam_account_name. clone ( ) . map (
273
- |v1alpha1 :: ActiveDirectorySamAccountNameRules {
277
+ |v1alpha2 :: ActiveDirectorySamAccountNameRules {
274
278
prefix,
275
279
total_length,
276
280
} | {
0 commit comments