From 0cbd340a6ced679f1d39fba4317ce5809ff14096 Mon Sep 17 00:00:00 2001 From: Vara Date: Thu, 19 Dec 2024 17:15:41 -0800 Subject: [PATCH] Include dex secrets when oidc is non tigera or nil --- pkg/render/dex.go | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/pkg/render/dex.go b/pkg/render/dex.go index 10ae62bbda..7d16a75b1f 100644 --- a/pkg/render/dex.go +++ b/pkg/render/dex.go @@ -138,11 +138,10 @@ func (c *dexComponent) Objects() ([]client.Object, []client.Object) { // TODO the RequiredSecrets in the dex condig to not pass back secrets of this type. if !c.cfg.DeleteDex { objs = append(objs, secret.ToRuntimeObjects(c.cfg.DexConfig.RequiredSecrets(common.OperatorNamespace())...)...) + objs = append(objs, secret.ToRuntimeObjects(c.cfg.DexConfig.RequiredSecrets(DexNamespace)...)...) + objs = append(objs, secret.ToRuntimeObjects(secret.CopyToNamespace(DexNamespace, c.cfg.PullSecrets...)...)...) } - objs = append(objs, secret.ToRuntimeObjects(c.cfg.DexConfig.RequiredSecrets(DexNamespace)...)...) - objs = append(objs, secret.ToRuntimeObjects(secret.CopyToNamespace(DexNamespace, c.cfg.PullSecrets...)...)...) - if c.cfg.Installation.CertificateManagement != nil { objs = append(objs, certificatemanagement.CSRClusterRoleBinding(DexObjectName, DexNamespace)) }