mirror of
https://github.com/coreos/prometheus-operator.git
synced 2026-02-05 06:45:27 +01:00
chore: make TLSConfig fields optional
This commit changes the `serverName` and `insecureSkipVerify` fields of TLS configuration to pointers instead of values. Signed-off-by: Simon Pasquier <spasquie@redhat.com>
This commit is contained in:
@@ -141,7 +141,7 @@ func deployInstrumentedApplicationWithTLS(name, ns string) error {
|
||||
Scheme: "https",
|
||||
TLSConfig: &monitoringv1.TLSConfig{
|
||||
SafeTLSConfig: monitoringv1.SafeTLSConfig{
|
||||
ServerName: "caandserver.com",
|
||||
ServerName: ptr.To("caandserver.com"),
|
||||
CA: monitoringv1.SecretOrConfigMap{
|
||||
Secret: &v1.SecretKeySelector{
|
||||
LocalObjectReference: v1.LocalObjectReference{
|
||||
@@ -3039,7 +3039,7 @@ func testPromArbitraryFSAcc(t *testing.T) {
|
||||
Port: "web",
|
||||
TLSConfig: &monitoringv1.TLSConfig{
|
||||
SafeTLSConfig: monitoringv1.SafeTLSConfig{
|
||||
InsecureSkipVerify: true,
|
||||
InsecureSkipVerify: ptr.To(true),
|
||||
CA: monitoringv1.SecretOrConfigMap{
|
||||
Secret: &v1.SecretKeySelector{
|
||||
LocalObjectReference: v1.LocalObjectReference{
|
||||
@@ -3076,7 +3076,7 @@ func testPromArbitraryFSAcc(t *testing.T) {
|
||||
Port: "web",
|
||||
TLSConfig: &monitoringv1.TLSConfig{
|
||||
SafeTLSConfig: monitoringv1.SafeTLSConfig{
|
||||
InsecureSkipVerify: true,
|
||||
InsecureSkipVerify: ptr.To(true),
|
||||
CA: monitoringv1.SecretOrConfigMap{
|
||||
ConfigMap: &v1.ConfigMapKeySelector{
|
||||
LocalObjectReference: v1.LocalObjectReference{
|
||||
@@ -3333,7 +3333,7 @@ func testPromTLSConfigViaSecret(t *testing.T) {
|
||||
Scheme: "https",
|
||||
TLSConfig: &monitoringv1.TLSConfig{
|
||||
SafeTLSConfig: monitoringv1.SafeTLSConfig{
|
||||
InsecureSkipVerify: true,
|
||||
InsecureSkipVerify: ptr.To(true),
|
||||
Cert: monitoringv1.SecretOrConfigMap{
|
||||
Secret: &v1.SecretKeySelector{
|
||||
LocalObjectReference: v1.LocalObjectReference{
|
||||
@@ -3533,7 +3533,7 @@ func testPromSecurePodMonitor(t *testing.T) {
|
||||
Port: "mtls",
|
||||
Scheme: "https",
|
||||
TLSConfig: &monitoringv1.SafeTLSConfig{
|
||||
InsecureSkipVerify: true,
|
||||
InsecureSkipVerify: ptr.To(true),
|
||||
CA: monitoringv1.SecretOrConfigMap{
|
||||
Secret: &v1.SecretKeySelector{
|
||||
LocalObjectReference: v1.LocalObjectReference{
|
||||
@@ -3566,7 +3566,7 @@ func testPromSecurePodMonitor(t *testing.T) {
|
||||
Port: "mtls",
|
||||
Scheme: "https",
|
||||
TLSConfig: &monitoringv1.SafeTLSConfig{
|
||||
InsecureSkipVerify: true,
|
||||
InsecureSkipVerify: ptr.To(true),
|
||||
CA: monitoringv1.SecretOrConfigMap{
|
||||
ConfigMap: &v1.ConfigMapKeySelector{
|
||||
LocalObjectReference: v1.LocalObjectReference{
|
||||
|
||||
@@ -390,7 +390,7 @@ func testScrapeConfigKubernetesNodeRole(t *testing.T) {
|
||||
}
|
||||
sc.Spec.TLSConfig = &monitoringv1.SafeTLSConfig{
|
||||
// since we cannot validate server name in cert
|
||||
InsecureSkipVerify: true,
|
||||
InsecureSkipVerify: ptr.To(true),
|
||||
CA: monitoringv1.SecretOrConfigMap{
|
||||
Secret: &v1.SecretKeySelector{
|
||||
LocalObjectReference: v1.LocalObjectReference{
|
||||
|
||||
@@ -229,7 +229,7 @@ func (prwtc PromRemoteWriteTestConfig) AddRemoteWriteWithTLSToPrometheus(p *moni
|
||||
|
||||
p.Spec.RemoteWrite[0].TLSConfig = &monitoringv1.TLSConfig{
|
||||
SafeTLSConfig: monitoringv1.SafeTLSConfig{
|
||||
ServerName: "caandserver.com",
|
||||
ServerName: ptr.To("caandserver.com"),
|
||||
},
|
||||
}
|
||||
|
||||
@@ -280,7 +280,7 @@ func (prwtc PromRemoteWriteTestConfig) AddRemoteWriteWithTLSToPrometheus(p *moni
|
||||
}
|
||||
|
||||
case prwtc.InsecureSkipVerify:
|
||||
p.Spec.RemoteWrite[0].TLSConfig.InsecureSkipVerify = true
|
||||
p.Spec.RemoteWrite[0].TLSConfig.InsecureSkipVerify = ptr.To(true)
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user