@@ -149,10 +149,10 @@ func newCmd() *cobra.Command {
149
149
if tlsCert , err = verifyCertAndKey (certPath , keyPath ); err != nil {
150
150
logrus .Infof ("error verifying provided cert and key: %v" , err )
151
151
logrus .Info ("generating a new cert and key" )
152
- if tlsCert , err = populateServingCert ( cmd . Context (), cfg . Client ); err != nil {
153
- return err
154
- }
155
- // Continue with new certificate/keypair
152
+
153
+ // Skip the rest of the process. The certificate needs some
154
+ // time to propagate to the server in the olm-operator pod.
155
+ return populateServingCert ( cmd . Context (), cfg . Client )
156
156
}
157
157
158
158
httpClient := & http.Client {
@@ -330,30 +330,21 @@ func requestURLBody(httpClient *http.Client, u *url.URL) ([]byte, error) {
330
330
return b .Bytes (), nil
331
331
}
332
332
333
- func populateServingCert (ctx context.Context , client client.Client ) ( * tls. Certificate , error ) {
333
+ func populateServingCert (ctx context.Context , client client.Client ) error {
334
334
secret := & corev1.Secret {}
335
335
err := client .Get (ctx , types.NamespacedName {Namespace : namespace , Name : pprofSecretName }, secret )
336
336
if err != nil {
337
- return nil , err
337
+ return err
338
338
}
339
339
340
340
certPEMBytes , privKeyPEMBytes , err := generateCertAndKey ()
341
341
if err != nil {
342
- return nil , err
342
+ return err
343
343
}
344
344
345
345
secret .Data [corev1 .TLSCertKey ] = certPEMBytes
346
346
secret .Data [corev1 .TLSPrivateKeyKey ] = privKeyPEMBytes
347
-
348
- if err = client .Update (ctx , secret ); err != nil {
349
- return nil , err
350
- }
351
- // Create tlsCert for client use
352
- tlsCert , err := tls .X509KeyPair (certPEMBytes , privKeyPEMBytes )
353
- if err != nil {
354
- return nil , err
355
- }
356
- return & tlsCert , nil
347
+ return client .Update (ctx , secret )
357
348
}
358
349
359
350
func generateCertAndKey () ([]byte , []byte , error ) {
0 commit comments