Skip to content
This repository was archived by the owner on May 13, 2025. It is now read-only.

Commit e09dcc6

Browse files
Zetia/fix ssl secret flag (#224)
* fix bug: update operation doesn't respect sslSecret parameter * fix bug: update operation doesn't respect sslSecret parameter * fix typo
1 parent 03d9b63 commit e09dcc6

File tree

2 files changed

+15
-8
lines changed

2 files changed

+15
-8
lines changed

src/k8s-extension/HISTORY.rst

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,10 @@
33
Release History
44
===============
55

6+
1.4.1
7+
++++++++++++++++++
8+
* microsoft.azureml.kubernetes: Fix sslSecret parameter in update operation
9+
610
1.4.0
711
++++++++++++++++++
812
* microsoft.dapr: Update version comparison logic to use semver based comparison

src/k8s-extension/azext_k8s_extension/partner_extensions/AzureMLKubernetes.py

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -366,14 +366,17 @@ def Update(self, cmd, resource_group_name, cluster_name, auto_upgrade_minor_vers
366366

367367
configuration_protected_settings = _dereference(self.reference_mapping, configuration_protected_settings)
368368

369-
if self.sslKeyPemFile in configuration_protected_settings and \
370-
self.sslCertPemFile in configuration_protected_settings:
371-
logger.info(f"Both {self.sslKeyPemFile} and {self.sslCertPemFile} are set, update ssl key.")
372-
fe_ssl_cert_file = configuration_protected_settings.get(self.sslCertPemFile)
373-
fe_ssl_key_file = configuration_protected_settings.get(self.sslKeyPemFile)
374-
375-
if fe_ssl_cert_file and fe_ssl_key_file:
376-
self.__set_inference_ssl_from_file(configuration_protected_settings, fe_ssl_cert_file, fe_ssl_key_file)
369+
fe_ssl_secret = _get_value_from_config_protected_config(
370+
self.SSL_SECRET, configuration_settings, configuration_protected_settings)
371+
fe_ssl_cert_file = configuration_protected_settings.get(self.sslCertPemFile)
372+
fe_ssl_key_file = configuration_protected_settings.get(self.sslKeyPemFile)
373+
# always take ssl key/cert first, then secret if key/cert file is not provided
374+
if fe_ssl_cert_file and fe_ssl_key_file:
375+
logger.info(f"Both {self.sslKeyPemFile} and {self.sslCertPemFile} are set, updating ssl key.")
376+
self.__set_inference_ssl_from_file(configuration_protected_settings, fe_ssl_cert_file, fe_ssl_key_file)
377+
elif fe_ssl_secret:
378+
logger.info(f"{self.SSL_SECRET} is set, updating ssl secret.")
379+
self.__set_inference_ssl_from_secret(configuration_settings, fe_ssl_secret)
377380

378381
# if no entries are existed in configuration_protected_settings, configuration_settings, return whatever passed
379382
# in the Update function(empty dict or None).

0 commit comments

Comments
 (0)