Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: makes default knative secret local for serverless #1067

Merged

Conversation

bartoszmajsak
Copy link
Contributor

@bartoszmajsak bartoszmajsak commented Jun 20, 2024

Description

PR #1022 promoted knative default secret name as the default for the entire platform as part of the cert.go move. This can be confusing, therefore this change makes it local to kserve again.

JIRA issue:

Follow-up to #1022

ref: https://issues.redhat.com/browse/RHOAIENG-4221

How Has This Been Tested?

Screenshot or short clip:

Merge criteria:

  • Have a meaningful commit messages.
  • Testing instructions have been added in the PR body (for PRs involving changes that are not immediately obvious).
  • The developer has manually tested the changes and verified that the changes work

PR opendatahub-io#1022 promoted knative default secret name as the default for entire platform. This can be confusing, therefore this change makes it local to kserve again.
Comment on lines -174 to -177
// Get default name if newSecretName is empty
if newSecretName == "" {
newSecretName = DefaultCertificateSecretName
}
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am not sure we need to default this to anything. I would assume the caller does due diligence.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If line 142 is the only usage, I think it is always going to be populated...

// GetDefaultIngressCertificate copies ingress cert secrets from openshift-ingress ns to given namespace.
func GetDefaultIngressCertificate(ctx context.Context, c client.Client, knativeSecret, namespace string) error {
// PropagateDefaultIngressCertificate copies ingress cert secrets from openshift-ingress ns to given namespace.
func PropagateDefaultIngressCertificate(ctx context.Context, c client.Client, secretName, namespace string) error {
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this reflects the effect of this function a bit more accurately.

Copy link

openshift-ci bot commented Jun 20, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: zdtsw

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@zdtsw zdtsw removed the request for review from MarianMacik June 20, 2024 12:24
@openshift-merge-bot openshift-merge-bot bot merged commit 686b195 into opendatahub-io:incubation Jun 20, 2024
8 checks passed
@bartoszmajsak bartoszmajsak deleted the knative-secret branch June 20, 2024 13:50
Copy link
Contributor

@israel-hdez israel-hdez left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Well... I also approve :-)

zdtsw pushed a commit to zdtsw-forking/rhods-operator that referenced this pull request Jun 26, 2024
…#1067)

PR opendatahub-io#1022 promoted knative default secret name as the default for entire platform. This can be confusing, therefore this change makes it local to kserve again.
openshift-merge-bot bot pushed a commit to red-hat-data-services/rhods-operator that referenced this pull request Jun 26, 2024
…#1067)

PR opendatahub-io#1022 promoted knative default secret name as the default for entire platform. This can be confusing, therefore this change makes it local to kserve again.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

3 participants