Skip to content

Commit 8b95a09

Browse files
committed
Migrate sourcesecret package to runtime/secrets APIs
The sourcesecret package now uses pkg/runtime/secrets factory functions instead of the previous monolithic approach. This provides standardized secret generation with consistent validation and error handling across all authentication types. Signed-off-by: cappyzawa <[email protected]>
1 parent 8176d88 commit 8b95a09

19 files changed

+210
-83
lines changed

cmd/flux/create_secret_git.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ func createSecretGitCmdRun(cmd *cobra.Command, args []string) error {
172172
return fmt.Errorf("git URL scheme '%s' not supported, can be: ssh, http and https", u.Scheme)
173173
}
174174

175-
secret, err := sourcesecret.Generate(opts)
175+
secret, err := sourcesecret.GenerateGit(opts)
176176
if err != nil {
177177
return err
178178
}

cmd/flux/create_secret_github_app.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ func createSecretGitHubAppCmdRun(cmd *cobra.Command, args []string) error {
9999
opts.GitHubAppBaseURL = secretGitHubAppArgs.baseURL
100100
}
101101

102-
secret, err := sourcesecret.Generate(opts)
102+
secret, err := sourcesecret.GenerateGitHubApp(opts)
103103
if err != nil {
104104
return err
105105
}

cmd/flux/create_secret_helm.go

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,10 +83,12 @@ func createSecretHelmCmdRun(cmd *cobra.Command, args []string) error {
8383
}
8484

8585
var certFile, keyFile []byte
86-
if secretHelmArgs.tlsCrtFile != "" && secretHelmArgs.tlsKeyFile != "" {
86+
if secretHelmArgs.tlsCrtFile != "" {
8787
if certFile, err = os.ReadFile(secretHelmArgs.tlsCrtFile); err != nil {
8888
return fmt.Errorf("failed to read cert file: %w", err)
8989
}
90+
}
91+
if secretHelmArgs.tlsKeyFile != "" {
9092
if keyFile, err = os.ReadFile(secretHelmArgs.tlsKeyFile); err != nil {
9193
return fmt.Errorf("failed to read key file: %w", err)
9294
}
@@ -102,7 +104,7 @@ func createSecretHelmCmdRun(cmd *cobra.Command, args []string) error {
102104
TLSCrt: certFile,
103105
TLSKey: keyFile,
104106
}
105-
secret, err := sourcesecret.Generate(opts)
107+
secret, err := sourcesecret.GenerateHelm(opts)
106108
if err != nil {
107109
return err
108110
}

cmd/flux/create_secret_notation.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ func createSecretNotationCmdRun(cmd *cobra.Command, args []string) error {
132132
VerificationCrts: caCerts,
133133
TrustPolicy: policy,
134134
}
135-
secret, err := sourcesecret.Generate(opts)
135+
secret, err := sourcesecret.GenerateNotation(opts)
136136
if err != nil {
137137
return err
138138
}

cmd/flux/create_secret_oci.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ func createSecretOCICmdRun(cmd *cobra.Command, args []string) error {
9292
Username: secretOCIArgs.username,
9393
}
9494

95-
secret, err := sourcesecret.Generate(opts)
95+
secret, err := sourcesecret.GenerateOCI(opts)
9696
if err != nil {
9797
return err
9898
}

cmd/flux/create_secret_proxy.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ func createSecretProxyCmdRun(cmd *cobra.Command, args []string) error {
8383
Username: secretProxyArgs.username,
8484
Password: secretProxyArgs.password,
8585
}
86-
secret, err := sourcesecret.Generate(opts)
86+
secret, err := sourcesecret.GenerateProxy(opts)
8787
if err != nil {
8888
return err
8989
}

cmd/flux/create_secret_tls.go

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,16 +84,18 @@ func createSecretTLSCmdRun(cmd *cobra.Command, args []string) error {
8484
}
8585
}
8686

87-
if secretTLSArgs.tlsCrtFile != "" && secretTLSArgs.tlsKeyFile != "" {
87+
if secretTLSArgs.tlsCrtFile != "" {
8888
if opts.TLSCrt, err = os.ReadFile(secretTLSArgs.tlsCrtFile); err != nil {
8989
return fmt.Errorf("failed to read cert file: %w", err)
9090
}
91+
}
92+
if secretTLSArgs.tlsKeyFile != "" {
9193
if opts.TLSKey, err = os.ReadFile(secretTLSArgs.tlsKeyFile); err != nil {
9294
return fmt.Errorf("failed to read key file: %w", err)
9395
}
9496
}
9597

96-
secret, err := sourcesecret.Generate(opts)
98+
secret, err := sourcesecret.GenerateTLS(opts)
9799
if err != nil {
98100
return err
99101
}

cmd/flux/create_source_git.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -305,7 +305,7 @@ func createSourceGitCmdRun(cmd *cobra.Command, args []string) error {
305305
secretOpts.Username = sourceGitArgs.username
306306
secretOpts.Password = sourceGitArgs.password
307307
}
308-
secret, err := sourcesecret.Generate(secretOpts)
308+
secret, err := sourcesecret.GenerateGit(secretOpts)
309309
if err != nil {
310310
return err
311311
}

cmd/flux/create_source_helm.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@ func createSourceHelmCmdRun(cmd *cobra.Command, args []string) error {
202202
TLSKey: keyFile,
203203
ManifestFile: sourcesecret.MakeDefaultOptions().ManifestFile,
204204
}
205-
secret, err := sourcesecret.Generate(secretOpts)
205+
secret, err := sourcesecret.GenerateHelm(secretOpts)
206206
if err != nil {
207207
return err
208208
}

cmd/flux/install.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,7 @@ func installCmdRun(cmd *cobra.Command, args []string) error {
250250
Username: credentials[0],
251251
Password: credentials[1],
252252
}
253-
imagePullSecret, err := sourcesecret.Generate(secretOpts)
253+
imagePullSecret, err := sourcesecret.GenerateOCI(secretOpts)
254254
if err != nil {
255255
return fmt.Errorf("install failed: %w", err)
256256
}

0 commit comments

Comments
 (0)