trigger-controller: PR comment: rephrase log about skipping issuance
The log message:
multiple CertificateRequests found for the 'next' revision 2,
skipping issuance until no more duplicate.
can be better phrased as:
multiple CertificateRequests are found for the 'next' revision 2,
issuance is skipped until there are no more duplicates.
Signed-off-by: Maël Valais <mael@vls.dev>
Co-authored-by: Josh Soref <jsoref@users.noreply.github.com>
This commit is contained in:
parent
05c1fb9fc2
commit
85128f26ce
@ -56,7 +56,7 @@ func TestDataForCertificate(t *testing.T) {
|
||||
builder: &testpkg.Builder{},
|
||||
wantSecret: nil,
|
||||
},
|
||||
"when no current or next CR exists, the returned cur and next CRs are nil": {
|
||||
"when neither current nor next CRs exist, the returned cur and next CRs should be nil": {
|
||||
givenCert: gen.Certificate("cert-1", gen.SetCertificateNamespace("default-unit-test-ns"),
|
||||
gen.SetCertificateSecretName("secret-1"),
|
||||
gen.SetCertificateUID("uid-1"),
|
||||
|
||||
@ -199,12 +199,12 @@ func (c *controller) ProcessItem(ctx context.Context, key string) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
// shouldBackoffReissuingOnFailure tells us if this certificate's
|
||||
// re-issuance should be backed off and for how much time.
|
||||
// shouldBackoffReissuingOnFailure tells us if we should back off
|
||||
// re-issuing for this certificate and for how much time.
|
||||
//
|
||||
// The request can be left nil, in which case no back off is required. When
|
||||
// the certificate doesn't match the request, no back off is required
|
||||
// either since it means the request will have to be re-issued.
|
||||
// The request can be left nil, in which case no back off is required.
|
||||
// Additionally, if the certificate doesn't match the request, no back
|
||||
// off is required because it means the request will have to be re-issued.
|
||||
func shouldBackoffReissuingOnFailure(log logr.Logger, c clock.Clock, crt *cmapi.Certificate, nextCR *cmapi.CertificateRequest) (backoff bool, delay time.Duration) {
|
||||
if crt.Status.LastFailureTime == nil {
|
||||
return false, 0
|
||||
|
||||
@ -279,7 +279,7 @@ var _ = framework.CertManagerDescribe("ACME Certificate (HTTP01)", func() {
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
})
|
||||
|
||||
It("should allow updating the dns name of a failing certificate that had a wrong dns name", func() {
|
||||
It("should allow updating the dns name of a failing certificate that had an incorrect dns name", func() {
|
||||
certClient := f.CertManagerClientSet.CertmanagerV1().Certificates(f.Namespace.Name)
|
||||
|
||||
By("Creating a failing Certificate")
|
||||
|
||||
@ -231,7 +231,7 @@ func AddCertificateLabels(labels map[string]string) CertificateModifier {
|
||||
// give the full certificate. Only use this function for testing purposes.
|
||||
//
|
||||
// Note that the only "important" field that must be filled in ownerReference
|
||||
// [1] is the UID. Must notably, the IsControlledBy function [2] only cares
|
||||
// [1] is the UID. Most notably, the IsControlledBy function [2] only cares
|
||||
// about the UID. The apiVersion, kind and name are only used for information
|
||||
// purposes.
|
||||
//
|
||||
|
||||
Loading…
Reference in New Issue
Block a user