File tree 5 files changed +7
-7
lines changed
mutation/imageregistries/credentials
5 files changed +7
-7
lines changed Original file line number Diff line number Diff line change @@ -98,7 +98,7 @@ func (p *provider) Apply(
98
98
// However, that would leave the credentials visible in the HelmChartProxy.
99
99
// Instead, we'll create the Secret on the remote cluster and reference it in the Helm values.
100
100
if clusterConfig .Addons .CCM .Credentials != nil {
101
- err = handlersutils .EnsureOwnerRefForSecret (
101
+ err = handlersutils .EnsureOwnerReferenceForSecret (
102
102
ctx ,
103
103
p .client ,
104
104
clusterConfig .Addons .CCM .Credentials .SecretRef .Name ,
Original file line number Diff line number Diff line change @@ -97,7 +97,7 @@ func (n *NutanixCSI) Apply(
97
97
}
98
98
99
99
if provider .Credentials != nil {
100
- err := handlersutils .EnsureOwnerRefForSecret (
100
+ err := handlersutils .EnsureOwnerReferenceForSecret (
101
101
ctx ,
102
102
n .client ,
103
103
provider .Credentials .SecretRef .Name ,
Original file line number Diff line number Diff line change @@ -129,7 +129,7 @@ func (h *imageRegistriesPatchHandler) Mutate(
129
129
if secretName := secretNameForImageRegistryCredentials (imageRegistry .Credentials ); secretName != "" {
130
130
// Ensure the Secret is owned by the Cluster so it is correctly moved and deleted with the Cluster.
131
131
// This code assumes that Secret exists and that was validated before calling this function.
132
- err := handlersutils .EnsureOwnerRefForSecret (
132
+ err := handlersutils .EnsureOwnerReferenceForSecret (
133
133
ctx ,
134
134
h .client ,
135
135
secretName ,
@@ -162,7 +162,7 @@ func (h *imageRegistriesPatchHandler) Mutate(
162
162
if secretName := secretNameForImageRegistryCredentials (globalMirror .Credentials ); secretName != "" {
163
163
// Ensure the Secret is owned by the Cluster so it is correctly moved and deleted with the Cluster.
164
164
// This code assumes that Secret exists and that was validated before calling this function.
165
- err := handlersutils .EnsureOwnerRefForSecret (
165
+ err := handlersutils .EnsureOwnerReferenceForSecret (
166
166
ctx ,
167
167
h .client ,
168
168
secretName ,
Original file line number Diff line number Diff line change @@ -63,8 +63,8 @@ func CopySecretToRemoteCluster(
63
63
return nil
64
64
}
65
65
66
- // EnsureOwnerRefForSecret will ensure that the secretName Secret has an OwnerReference of the cluster.
67
- func EnsureOwnerRefForSecret (
66
+ // EnsureOwnerReferenceForSecret will ensure that the secretName Secret has an OwnerReference of the cluster.
67
+ func EnsureOwnerReferenceForSecret (
68
68
ctx context.Context ,
69
69
cl ctrlclient.Client ,
70
70
secretName string ,
Original file line number Diff line number Diff line change @@ -104,7 +104,7 @@ func Test_EnsureOwnerRefForSecret(t *testing.T) {
104
104
t .Run (tt .name , func (t * testing.T ) {
105
105
t .Parallel ()
106
106
107
- err := EnsureOwnerRefForSecret (
107
+ err := EnsureOwnerReferenceForSecret (
108
108
context .Background (),
109
109
tt .client ,
110
110
tt .secretName ,
You can’t perform that action at this time.
0 commit comments