Skip to content

Commit

Permalink
Put back in.
Browse files Browse the repository at this point in the history
  • Loading branch information
Gerrit91 committed Aug 2, 2024
1 parent a9e08fc commit 5b8d142
Show file tree
Hide file tree
Showing 4 changed files with 7 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -78,6 +78,10 @@ spec:
value: {{ $value | quote }}
{{- end }}
{{- end }}
{{- if .Values.global.virtualGarden.enabled }}
- name: SOURCE_CLUSTER
value: enabled
{{- end }}
ports:
- name: webhook-server
containerPort: {{ .Values.global.webhookConfig.serverPort }}
Expand Down
2 changes: 1 addition & 1 deletion pkg/admission/validator/secretbinding.go
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ func NewSecretBindingValidator(mgr manager.Manager) extensionswebhook.Validator
}
}

// Validate checks whether the given SecretBinding refers to a Secret with valid AWS credentials.
// Validate checks whether the given SecretBinding refers to a Secret with valid metal-api credentials.
func (sb *secretBinding) Validate(ctx context.Context, newObj, oldObj client.Object) error {
secretBinding, ok := newObj.(*core.SecretBinding)
if !ok {
Expand Down
2 changes: 1 addition & 1 deletion pkg/admission/validator/secrets.go
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ func NewSecretValidator() extensionswebhook.Validator {
return &secret{}
}

// Validate checks whether the given new secret contains valid AWS credentials.
// Validate checks whether the given new secret contains valid metal-api credentials.
func (s *secret) Validate(_ context.Context, newObj, oldObj client.Object) error {
secret, ok := newObj.(*corev1.Secret)
if !ok {
Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/metal/validation/secrets.go
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ import (
"github.com/metal-stack/gardener-extension-provider-metal/pkg/metal"
)

// ValidateCloudProviderSecret checks whether the given secret contains a valid AWS access keys.
// ValidateCloudProviderSecret checks whether the given secret contains a valid metal-api credentials.
func ValidateCloudProviderSecret(secret *corev1.Secret) error {
creds, err := metal.ReadCredentialsSecret(secret)
if err != nil {
Expand Down

0 comments on commit 5b8d142

Please sign in to comment.