Skip to content

Commit ab7c75f

Browse files
authored
Merge pull request kubernetes#88763 from p0lyn0mial/dynamiccertificates-cleanup
cleans up dynamiccertificates package
2 parents 318918c + 413960e commit ab7c75f

File tree

4 files changed

+3
-61
lines changed

4 files changed

+3
-61
lines changed

staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -97,10 +97,7 @@ func NewDynamicCAFromConfigMapController(purpose, namespace, name, key string, k
9797
queue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), fmt.Sprintf("DynamicConfigMapCABundle-%s", purpose)),
9898
preRunCaches: []cache.InformerSynced{uncastConfigmapInformer.HasSynced},
9999
}
100-
if err := c.loadCABundle(); err != nil {
101-
// don't fail, but do print out a message
102-
klog.Warningf("unable to load initial CA bundle for: %q due to: %s", c.name, err)
103-
}
100+
104101
uncastConfigmapInformer.AddEventHandler(cache.FilteringResourceEventHandler{
105102
FilterFunc: func(obj interface{}) bool {
106103
if cast, ok := obj.(*corev1.ConfigMap); ok {

staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/dynamic_cafile_content.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -126,6 +126,7 @@ func (c *DynamicFileCAContent) loadCABundle() error {
126126
return err
127127
}
128128
c.caBundle.Store(caBundleAndVerifier)
129+
klog.V(2).Infof("Loaded a new CA Bundle and Verifier for %q", c.Name())
129130

130131
for _, listener := range c.listeners {
131132
listener.Enqueue()

staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/dynamic_serving_content.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,7 @@ func (c *DynamicCertKeyPairContent) loadCertKeyPair() error {
108108
}
109109

110110
c.certKeyPair.Store(newCertKey)
111+
klog.V(2).Infof("Loaded a new cert/key pair for %q", c.Name())
111112

112113
for _, listener := range c.listeners {
113114
listener.Enqueue()

staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/static_content.go

Lines changed: 0 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,6 @@ package dynamiccertificates
1919
import (
2020
"crypto/tls"
2121
"crypto/x509"
22-
"fmt"
23-
"io/ioutil"
2422
)
2523

2624
type staticCAContent struct {
@@ -30,19 +28,6 @@ type staticCAContent struct {
3028

3129
var _ CAContentProvider = &staticCAContent{}
3230

33-
// NewStaticCAContentFromFile returns a CAContentProvider based on a filename
34-
func NewStaticCAContentFromFile(filename string) (CAContentProvider, error) {
35-
if len(filename) == 0 {
36-
return nil, fmt.Errorf("missing filename for ca bundle")
37-
}
38-
39-
caBundle, err := ioutil.ReadFile(filename)
40-
if err != nil {
41-
return nil, err
42-
}
43-
return NewStaticCAContent(filename, caBundle)
44-
}
45-
4631
// NewStaticCAContent returns a CAContentProvider that always returns the same value
4732
func NewStaticCAContent(name string, caBundle []byte) (CAContentProvider, error) {
4833
caBundleAndVerifier, err := newCABundleAndVerifier(name, caBundle)
@@ -81,48 +66,6 @@ type staticSNICertKeyContent struct {
8166
sniNames []string
8267
}
8368

84-
// NewStaticCertKeyContentFromFiles returns a CertKeyContentProvider based on a filename
85-
func NewStaticCertKeyContentFromFiles(certFile, keyFile string) (CertKeyContentProvider, error) {
86-
if len(certFile) == 0 {
87-
return nil, fmt.Errorf("missing filename for certificate")
88-
}
89-
if len(keyFile) == 0 {
90-
return nil, fmt.Errorf("missing filename for key")
91-
}
92-
93-
certPEMBlock, err := ioutil.ReadFile(certFile)
94-
if err != nil {
95-
return nil, err
96-
}
97-
keyPEMBlock, err := ioutil.ReadFile(keyFile)
98-
if err != nil {
99-
return nil, err
100-
}
101-
102-
return NewStaticCertKeyContent(fmt.Sprintf("cert: %s, key: %s", certFile, keyFile), certPEMBlock, keyPEMBlock)
103-
}
104-
105-
// NewStaticSNICertKeyContentFromFiles returns a SNICertKeyContentProvider based on a filename
106-
func NewStaticSNICertKeyContentFromFiles(certFile, keyFile string, sniNames ...string) (SNICertKeyContentProvider, error) {
107-
if len(certFile) == 0 {
108-
return nil, fmt.Errorf("missing filename for certificate")
109-
}
110-
if len(keyFile) == 0 {
111-
return nil, fmt.Errorf("missing filename for key")
112-
}
113-
114-
certPEMBlock, err := ioutil.ReadFile(certFile)
115-
if err != nil {
116-
return nil, err
117-
}
118-
keyPEMBlock, err := ioutil.ReadFile(keyFile)
119-
if err != nil {
120-
return nil, err
121-
}
122-
123-
return NewStaticSNICertKeyContent(fmt.Sprintf("cert: %s, key: %s", certFile, keyFile), certPEMBlock, keyPEMBlock, sniNames...)
124-
}
125-
12669
// NewStaticCertKeyContent returns a CertKeyContentProvider that always returns the same value
12770
func NewStaticCertKeyContent(name string, cert, key []byte) (CertKeyContentProvider, error) {
12871
// Ensure that the key matches the cert and both are valid

0 commit comments

Comments
 (0)