@@ -366,14 +366,17 @@ def Update(self, cmd, resource_group_name, cluster_name, auto_upgrade_minor_vers
366366
367367 configuration_protected_settings = _dereference (self .reference_mapping , configuration_protected_settings )
368368
369- if self .sslKeyPemFile in configuration_protected_settings and \
370- self .sslCertPemFile in configuration_protected_settings :
371- logger .info (f"Both { self .sslKeyPemFile } and { self .sslCertPemFile } are set, update ssl key." )
372- fe_ssl_cert_file = configuration_protected_settings .get (self .sslCertPemFile )
373- fe_ssl_key_file = configuration_protected_settings .get (self .sslKeyPemFile )
374-
375- if fe_ssl_cert_file and fe_ssl_key_file :
376- self .__set_inference_ssl_from_file (configuration_protected_settings , fe_ssl_cert_file , fe_ssl_key_file )
369+ fe_ssl_secret = _get_value_from_config_protected_config (
370+ self .SSL_SECRET , configuration_settings , configuration_protected_settings )
371+ fe_ssl_cert_file = configuration_protected_settings .get (self .sslCertPemFile )
372+ fe_ssl_key_file = configuration_protected_settings .get (self .sslKeyPemFile )
373+ # always take ssl key/cert first, then secret if key/cert file is not provided
374+ if fe_ssl_cert_file and fe_ssl_key_file :
375+ logger .info (f"Both { self .sslKeyPemFile } and { self .sslCertPemFile } are set, updating ssl key." )
376+ self .__set_inference_ssl_from_file (configuration_protected_settings , fe_ssl_cert_file , fe_ssl_key_file )
377+ elif fe_ssl_secret :
378+ logger .info (f"{ self .SSL_SECRET } is set, updating ssl secret." )
379+ self .__set_inference_ssl_from_secret (configuration_settings , fe_ssl_secret )
377380
378381 # if no entries are existed in configuration_protected_settings, configuration_settings, return whatever passed
379382 # in the Update function(empty dict or None).
0 commit comments