@@ -75,6 +75,9 @@ const (
75
75
oAuthServicePortName = "oauth-proxy"
76
76
ingressServicePortName = "dashboard"
77
77
logRequeueing = "requeueing"
78
+
79
+ CAPrivateKeyKey = "ca.key"
80
+ CACertKey = "ca.crt"
78
81
)
79
82
80
83
var (
@@ -169,8 +172,8 @@ func (r *RayClusterReconciler) Reconcile(ctx context.Context, req ctrl.Request)
169
172
logger .Error (err , "Failed to get CA Secret" )
170
173
return ctrl.Result {RequeueAfter : requeueTime }, err
171
174
} else {
172
- key := caSecret .Data [corev1 . TLSPrivateKeyKey ]
173
- cert := caSecret .Data [corev1 . TLSCertKey ]
175
+ key := caSecret .Data [CAPrivateKeyKey ]
176
+ cert := caSecret .Data [CACertKey ]
174
177
_ , err = r .kubeClient .CoreV1 ().Secrets (cluster .Namespace ).Apply (ctx , desiredCASecret (cluster , key , cert ), metav1.ApplyOptions {FieldManager : controllerName , Force : true })
175
178
if err != nil {
176
179
logger .Error (err , "Failed to apply CA Secret" )
@@ -404,8 +407,8 @@ func desiredCASecret(cluster *rayv1.RayCluster, key, cert []byte) *corev1ac.Secr
404
407
return corev1ac .Secret (caSecretNameFromCluster (cluster ), cluster .Namespace ).
405
408
WithLabels (map [string ]string {"ray.io/cluster-name" : cluster .Name }).
406
409
WithData (map [string ][]byte {
407
- corev1 . TLSPrivateKeyKey : key ,
408
- corev1 . TLSCertKey : cert ,
410
+ CAPrivateKeyKey : key ,
411
+ CACertKey : cert ,
409
412
}).
410
413
WithOwnerReferences (metav1ac .OwnerReference ().
411
414
WithUID (cluster .UID ).
0 commit comments