Skip to content

Commit 3bfcb01

Browse files
committed
fix: revert incorrect variable name changes
1 parent fd5c35f commit 3bfcb01

File tree

6 files changed

+19
-19
lines changed

6 files changed

+19
-19
lines changed

pkg/handlers/generic/mutation/imageregistries/credentials/credential_provider_config_files.go

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,13 @@ import (
2020
)
2121

2222
const (
23-
//nolint:gosec // Does not contain hard coded config.
24-
kubeletStaticCredentialProviderCredentialsOnRemote = "/etc/kubernetes/static-image-config.json"
23+
//nolint:gosec // Does not contain hard coded credentials.
24+
kubeletStaticCredentialProviderCredentialsOnRemote = "/etc/kubernetes/static-image-credentials.json"
2525

26-
//nolint:gosec // Does not contain hard coded config.
26+
//nolint:gosec // Does not contain hard coded credentials.
2727
kubeletImageCredentialProviderConfigOnRemote = "/etc/kubernetes/image-credential-provider-config.yaml"
2828

29-
//nolint:gosec // Does not contain hard coded config.
29+
//nolint:gosec // Does not contain hard coded credentials.
3030
kubeletDynamicCredentialProviderConfigOnRemote = "/etc/kubernetes/dynamic-credential-provider-config.yaml"
3131

3232
azureCloudConfigFilePath = "/etc/kubernetes/azure.json"
@@ -153,7 +153,7 @@ func kubeletCredentialProvider() (
153153
providerBinary string, providerArgs []string, providerAPIVersion string, err error,
154154
) {
155155
return "dynamic-credential-provider",
156-
[]string{"get-config", "-c", kubeletDynamicCredentialProviderConfigOnRemote},
156+
[]string{"get-credentials", "-c", kubeletDynamicCredentialProviderConfigOnRemote},
157157
credentialproviderv1beta1.SchemeGroupVersion.String(),
158158
nil
159159
}
@@ -162,12 +162,12 @@ func dynamicCredentialProvider(host string) (
162162
providerBinary string, providerArgs []string, providerAPIVersion string, err error,
163163
) {
164164
if matches, err := credentialprovider.URLMatchesECR(host); matches || err != nil {
165-
return "ecr-credential-provider", []string{"get-config"},
165+
return "ecr-credential-provider", []string{"get-credentials"},
166166
credentialproviderv1alpha1.SchemeGroupVersion.String(), err
167167
}
168168

169169
if matches, err := credentialprovider.URLMatchesGCR(host); matches || err != nil {
170-
return "gcr-credential-provider", []string{"get-config"},
170+
return "gcr-credential-provider", []string{"get-credentials"},
171171
credentialproviderv1alpha1.SchemeGroupVersion.String(), err
172172
}
173173

pkg/handlers/generic/mutation/imageregistries/credentials/credential_provider_config_files_test.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ kind: CredentialProviderConfig
3232
providers:
3333
- name: dynamic-credential-provider
3434
args:
35-
- get-config
35+
- get-credentials
3636
- -c
3737
- /etc/kubernetes/dynamic-credential-provider-config.yaml
3838
matchImages:
@@ -65,7 +65,7 @@ kind: CredentialProviderConfig
6565
providers:
6666
- name: dynamic-credential-provider
6767
args:
68-
- get-config
68+
- get-credentials
6969
- -c
7070
- /etc/kubernetes/dynamic-credential-provider-config.yaml
7171
matchImages:
@@ -117,7 +117,7 @@ credentialProviders:
117117
providers:
118118
- name: ecr-credential-provider
119119
args:
120-
- get-config
120+
- get-credentials
121121
matchImages:
122122
- "123456789.dkr.ecr.us-east-1.amazonaws.com"
123123
defaultCacheDuration: "0s"
@@ -126,7 +126,7 @@ credentialProviders:
126126
},
127127
},
128128
{
129-
name: "image registry with static config",
129+
name: "image registry with static credentials",
130130
credentials: providerConfig{
131131
URL: "https://myregistry.com",
132132
Username: "myuser",
@@ -156,7 +156,7 @@ credentialProviders:
156156
},
157157
},
158158
{
159-
name: "docker.io registry with static config",
159+
name: "docker.io registry with static credentials",
160160
credentials: providerConfig{
161161
URL: "https://registry-1.docker.io",
162162
Username: "myuser",
@@ -187,7 +187,7 @@ credentialProviders:
187187
},
188188
},
189189
{
190-
name: "image registry with static config",
190+
name: "error for a registry with no credentials",
191191
credentials: providerConfig{
192192
URL: "https://myregistry.com",
193193
},

pkg/handlers/generic/mutation/imageregistries/credentials/credential_provider_insall_files.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,15 @@ import (
1313
)
1414

1515
const (
16-
//nolint:gosec // Does not contain hard coded config.
16+
//nolint:gosec // Does not contain hard coded credentials.
1717
installKubeletCredentialProvidersScriptOnRemote = "/etc/konvoy/install-kubelet-credential-providers.sh"
1818

1919
installKubeletCredentialProvidersScriptOnRemoteCommand = "/bin/bash " + installKubeletCredentialProvidersScriptOnRemote
2020

21-
//nolint:gosec // Does not contain hard coded config.
21+
//nolint:gosec // Does not contain hard coded credentials.
2222
dynamicCredentialProviderImage = "ghcr.io/mesosphere/dynamic-credential-provider:v0.2.0"
2323

24-
//nolint:gosec // Does not contain hard coded config.
24+
//nolint:gosec // Does not contain hard coded credentials.
2525
credentialProviderTargetDir = "/etc/kubernetes/image-credential-provider/"
2626
)
2727

pkg/handlers/generic/mutation/imageregistries/credentials/inject.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -287,7 +287,7 @@ func createSecretIfNeeded(
287287
) error {
288288
credentialsSecret, err := generateCredentialsSecret(registryWithOptionalCredentials, clusterKey.Name, obj.GetName(), obj.GetNamespace())
289289
if err != nil {
290-
return fmt.Errorf("error generating config Secret for Image Registry Credentials variable: %w", err)
290+
return fmt.Errorf("error generating crdentials Secret for Image Registry Credentials variable: %w", err)
291291
}
292292
if credentialsSecret != nil {
293293
if err := client.ServerSideApply(ctx, c, credentialsSecret); err != nil {

pkg/handlers/generic/mutation/imageregistries/credentials/inject_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ import (
2121
)
2222

2323
const (
24-
validSecretName = "myregistry-config"
24+
validSecretName = "myregistry-credentials"
2525
)
2626

2727
func TestGeneratePatches(t *testing.T) {

pkg/handlers/generic/mutation/imageregistries/credentials/variables.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ var (
2121

2222
const (
2323
// variableName is the external patch variable name.
24-
variableName = "config"
24+
variableName = "credentials"
2525

2626
// HandlerNameVariable is the name of the variable handler.
2727
HandlerNameVariable = "ImageRegistryCredentialsVars"

0 commit comments

Comments
 (0)