Skip to content

Commit d533556

Browse files
committed
fix: rename package to encryptionatrest
1 parent 6fab227 commit d533556

File tree

5 files changed

+16
-18
lines changed

5 files changed

+16
-18
lines changed

pkg/handlers/generic/mutation/encryption/encryptionprovider_test.go renamed to pkg/handlers/generic/mutation/encryptionatrest/encryptionprovider_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
// Copyright 2024 Nutanix. All rights reserved.
22
// SPDX-License-Identifier: Apache-2.0
33

4-
package encryption
4+
package encryptionatrest
55

66
import (
77
"encoding/base64"
@@ -77,7 +77,7 @@ func Test_encryptionConfigForSecretsAndConfigMaps(t *testing.T) {
7777

7878
for _, tt := range testcases {
7979
t.Run(tt.name, func(t *testing.T) {
80-
got, gErr := encryptionConfigForSecretsAndConfigMaps(
80+
got, gErr := defaultEncryptionConfiguration(
8181
tt.providers,
8282
testTokenGenerator)
8383
assert.Equal(t, tt.wantErr, gErr)

pkg/handlers/generic/mutation/encryption/inject.go renamed to pkg/handlers/generic/mutation/encryptionatrest/inject.go

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
// Copyright 2024 Nutanix. All rights reserved.
22
// SPDX-License-Identifier: Apache-2.0
33

4-
package encryption
4+
package encryptionatrest
55

66
import (
77
"context"
@@ -100,7 +100,7 @@ func (h *encryptionPatchHandler) Mutate(
100100
return err
101101
}
102102

103-
found, err := h.DefaultEncryptionSecretExists(ctx, cluster)
103+
found, err := h.defaultEncryptionSecretExists(ctx, cluster)
104104
if err != nil {
105105
log.WithValues(
106106
"defaultEncryptionSecret", defaultEncryptionSecretName(cluster.Name),
@@ -110,11 +110,13 @@ func (h *encryptionPatchHandler) Mutate(
110110

111111
// we do not rotate or override the secret keys for encryption configuration
112112
if !found {
113-
encConfig, err := h.generateEncryptionConfiguration(encryptionVariable.Providers)
113+
encryptionConfig, err := h.generateEncryptionConfiguration(
114+
encryptionVariable.Providers,
115+
)
114116
if err != nil {
115117
return err
116118
}
117-
if err := h.CreateEncryptionConfigurationSecret(ctx, encConfig, cluster); err != nil {
119+
if err := h.createEncryptionConfigurationSecret(ctx, encryptionConfig, cluster); err != nil {
118120
return err
119121
}
120122
}
@@ -163,7 +165,7 @@ func (h *encryptionPatchHandler) generateEncryptionConfiguration(
163165
resourceConfigs := []apiserverv1.ResourceConfiguration{}
164166
for _, encProvider := range providers {
165167
provider := encProvider
166-
resourceConfig, err := encryptionConfigForSecretsAndConfigMaps(
168+
resourceConfig, err := defaultEncryptionConfiguration(
167169
&provider,
168170
h.keyGenerator,
169171
)
@@ -183,7 +185,7 @@ func (h *encryptionPatchHandler) generateEncryptionConfiguration(
183185
}, nil
184186
}
185187

186-
func (h *encryptionPatchHandler) DefaultEncryptionSecretExists(
188+
func (h *encryptionPatchHandler) defaultEncryptionSecretExists(
187189
ctx context.Context,
188190
cluster *clusterv1.Cluster,
189191
) (bool, error) {
@@ -208,7 +210,7 @@ func (h *encryptionPatchHandler) DefaultEncryptionSecretExists(
208210
return true, nil
209211
}
210212

211-
func (h *encryptionPatchHandler) CreateEncryptionConfigurationSecret(
213+
func (h *encryptionPatchHandler) createEncryptionConfigurationSecret(
212214
ctx context.Context,
213215
encryptionConfig *apiserverv1.EncryptionConfiguration,
214216
cluster *clusterv1.Cluster,
@@ -251,7 +253,7 @@ func (h *encryptionPatchHandler) CreateEncryptionConfigurationSecret(
251253
}
252254

253255
// We only support encryption for "secrets" and "configmaps".
254-
func encryptionConfigForSecretsAndConfigMaps(
256+
func defaultEncryptionConfiguration(
255257
providers *carenv1.EncryptionProviders,
256258
secretGenerator TokenGenerator,
257259
) (*apiserverv1.ResourceConfiguration, error) {

pkg/handlers/generic/mutation/encryption/inject_test.go renamed to pkg/handlers/generic/mutation/encryptionatrest/inject_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
// Copyright 2024 Nutanix. All rights reserved.
22
// SPDX-License-Identifier: Apache-2.0
33

4-
package encryption
4+
package encryptionatrest
55

66
import (
77
"testing"

pkg/handlers/generic/mutation/encryption/tokengenerator.go renamed to pkg/handlers/generic/mutation/encryptionatrest/tokengenerator.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
// Copyright 2024 Nutanix. All rights reserved.
22
// SPDX-License-Identifier: Apache-2.0
33

4-
package encryption
4+
package encryptionatrest
55

66
import "crypto/rand"
77

pkg/handlers/generic/mutation/handlers.go

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ import (
1212
"github.com/nutanix-cloud-native/cluster-api-runtime-extensions-nutanix/pkg/handlers/generic/mutation/containerdapplypatchesandrestart"
1313
"github.com/nutanix-cloud-native/cluster-api-runtime-extensions-nutanix/pkg/handlers/generic/mutation/containerdmetrics"
1414
"github.com/nutanix-cloud-native/cluster-api-runtime-extensions-nutanix/pkg/handlers/generic/mutation/containerdunprivilegedports"
15-
"github.com/nutanix-cloud-native/cluster-api-runtime-extensions-nutanix/pkg/handlers/generic/mutation/encryption"
15+
"github.com/nutanix-cloud-native/cluster-api-runtime-extensions-nutanix/pkg/handlers/generic/mutation/encryptionatrest"
1616
"github.com/nutanix-cloud-native/cluster-api-runtime-extensions-nutanix/pkg/handlers/generic/mutation/etcd"
1717
"github.com/nutanix-cloud-native/cluster-api-runtime-extensions-nutanix/pkg/handlers/generic/mutation/extraapiservercertsans"
1818
"github.com/nutanix-cloud-native/cluster-api-runtime-extensions-nutanix/pkg/handlers/generic/mutation/httpproxy"
@@ -36,11 +36,7 @@ func MetaMutators(mgr manager.Manager) []mutation.MetaMutator {
3636
users.NewPatch(),
3737
containerdmetrics.NewPatch(),
3838
containerdunprivilegedports.NewPatch(),
39-
encryption.NewPatch(&encryption.Config{
40-
Client: mgr.GetClient(),
41-
AESSecretKeyGenerator: encryption.RandomTokenGenerator,
42-
}),
43-
encryption.NewPatch(mgr.GetClient(), encryption.RandomTokenGenerator),
39+
encryptionatrest.NewPatch(mgr.GetClient(), encryptionatrest.RandomTokenGenerator),
4440

4541
// Some patches may have changed containerd configuration.
4642
// We write the configuration changes to disk, and must run a command

0 commit comments

Comments
 (0)