Skip to content

Commit 2ef3098

Browse files
committed
secrets: address feedback from review
1 parent ebae003 commit 2ef3098

File tree

4 files changed

+12
-16
lines changed

4 files changed

+12
-16
lines changed

internal/graph/secrets.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ import (
77
"github.com/nais/api/internal/graph/model"
88
)
99

10-
func convertSecretDataToTuple(data map[string]string) []*model.Variable {
10+
func convertSecretDataToVariables(data map[string]string) []*model.Variable {
1111
ret := make([]*model.Variable, 0, len(data))
1212
for key, value := range data {
1313
ret = append(ret, &model.Variable{

internal/graph/secrets.resolvers.go

+1-1
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

internal/k8s/k8s.go

+1-10
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ import (
1010
"github.com/google/uuid"
1111
"github.com/nais/api/internal/auth/authz"
1212
"github.com/nais/api/internal/database"
13-
"github.com/nais/api/internal/database/gensql"
1413
"github.com/nais/api/internal/graph/model"
1514
"github.com/nais/api/internal/search"
1615
"github.com/nais/api/internal/slug"
@@ -117,16 +116,8 @@ func New(tenant string, cfg Config, db Database, log logrus.FieldLogger, opts ..
117116
return nil, err
118117
}
119118

120-
memberOfTeams := make([]*gensql.Team, 0)
121-
// filter out other roles (such as global roles)
122-
for _, team := range teams {
123-
if team.RoleName == gensql.RoleNameTeammember || team.RoleName == gensql.RoleNameTeamowner {
124-
memberOfTeams = append(memberOfTeams, team.Team)
125-
}
126-
}
127-
128119
groups := make([]string, 0)
129-
for _, team := range memberOfTeams {
120+
for _, team := range teams {
130121
if team.GoogleGroupEmail != nil {
131122
groups = append(groups, *team.GoogleGroupEmail)
132123
}

internal/k8s/secrets.go

+9-4
Original file line numberDiff line numberDiff line change
@@ -236,14 +236,19 @@ func (c *Client) DeleteSecret(ctx context.Context, name string, team slug.Slug,
236236
}
237237

238238
func secretIsManagedByConsole(secret corev1.Secret) bool {
239-
secretLabel, ok := secret.GetLabels()[secretLabelManagedByKey]
239+
labels := secret.GetLabels()
240+
if labels == nil {
241+
labels = make(map[string]string)
242+
}
243+
244+
secretLabel, ok := labels[secretLabelManagedByKey]
240245
hasConsoleLabel := ok && secretLabel == secretLabelManagedByVal
241246

242247
isOpaque := secret.Type == corev1.SecretTypeOpaque || secret.Type == "kubernetes.io/Opaque"
243248
hasOwnerReferences := len(secret.GetOwnerReferences()) > 0
244249
hasFinalizers := len(secret.GetFinalizers()) > 0
245250

246-
typeLabel, ok := secret.GetLabels()["type"]
251+
typeLabel, ok := labels["type"]
247252
isJwker := ok && typeLabel == "jwker.nais.io"
248253

249254
return hasConsoleLabel && isOpaque && !hasOwnerReferences && !hasFinalizers && !isJwker
@@ -317,11 +322,11 @@ func makeSecretIdent(env, namespace, name string) scalar.Ident {
317322
return scalar.SecretIdent("secret_" + env + "_" + namespace + "_" + name)
318323
}
319324

320-
const envVarNameFmtErrMsg = "must consist of alphabetic characters, digits, '_', and must not start with a digit"
321-
322325
var envVarNameRegexp = regexp.MustCompile("^[_a-zA-Z][_a-zA-Z0-9]*$")
323326

324327
func validateSecretData(data []*model.VariableInput) error {
328+
const envVarNameFmtErrMsg = "must consist of alphabetic characters, digits, '_', and must not start with a digit"
329+
325330
seen := make(map[string]bool)
326331

327332
for _, d := range data {

0 commit comments

Comments
 (0)