Skip to content

Commit b95a49c

Browse files
committed
Renames and documentaitons
1 parent 4b6ad31 commit b95a49c

File tree

10 files changed

+34
-32
lines changed

10 files changed

+34
-32
lines changed

cmd/state/state.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ type GlobalState struct {
5858
Logger *logrus.Logger //nolint:forbidigo //TODO:change to FieldLogger
5959
FallbackLogger logrus.FieldLogger
6060

61-
SecretsManager *secretsource.SecretsManager
61+
SecretsManager *secretsource.Manager
6262
Usage *usage.Usage
6363
}
6464

internal/cmd/root.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,7 @@ func (c *rootCommand) setupLoggers(stop <-chan struct{}) error {
272272
// it is important that we add this hook first as hooks are executed in order of addition
273273
// and this means no other hook will get secrets
274274
var secretsHook logrus.Hook
275-
c.globalState.SecretsManager, secretsHook, err = secretsource.NewSecretsManager(secretsources)
275+
c.globalState.SecretsManager, secretsHook, err = secretsource.NewManager(secretsources)
276276
if err != nil {
277277
return err
278278
}
@@ -314,15 +314,15 @@ func (c *rootCommand) setLoggerHook(ctx context.Context, h log.AsyncHook) {
314314
c.globalState.Logger.SetOutput(io.Discard) // don't output to anywhere else
315315
}
316316

317-
func createSecretSources(gs *state.GlobalState) (map[string]secretsource.SecretSource, error) {
317+
func createSecretSources(gs *state.GlobalState) (map[string]secretsource.Source, error) {
318318
baseParams := secretsource.Params{
319319
Logger: gs.Logger,
320320
Environment: gs.Env,
321321
FS: gs.FS,
322322
Usage: gs.Usage,
323323
}
324324

325-
result := make(map[string]secretsource.SecretSource)
325+
result := make(map[string]secretsource.Source)
326326
for _, line := range gs.Flags.SecretSource {
327327
t, config, ok := strings.Cut(line, "=")
328328
if !ok {

internal/js/modules/k6/secrets/secrets.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ type (
1717
// Secrets represents an instance of the k6 module.
1818
Secrets struct {
1919
vu modules.VU
20-
secretsManager *secretsource.SecretsManager
20+
secretsManager *secretsource.Manager
2121
}
2222
)
2323

@@ -66,7 +66,7 @@ func (mi *Secrets) secrets() (*sobek.Object, error) {
6666
}
6767

6868
func secretSourceObjectForSourceName(
69-
rt *sobek.Runtime, manager *secretsource.SecretsManager, sourceName string,
69+
rt *sobek.Runtime, manager *secretsource.Manager, sourceName string,
7070
) (*sobek.Object, error) {
7171
obj := rt.NewObject()
7272
err := obj.Set("get", func(key string) (string, error) {

internal/js/modules/k6/secrets/secrets_test.go

+10-10
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,10 @@ import (
1111
"go.k6.io/k6/secretsource"
1212
)
1313

14-
func testRuntimeWithSecrets(t testing.TB, secretSources map[string]secretsource.SecretSource) *modulestest.Runtime {
14+
func testRuntimeWithSecrets(t testing.TB, secretSources map[string]secretsource.Source) *modulestest.Runtime {
1515
testRuntime := modulestest.NewRuntime(t)
1616
var err error
17-
testRuntime.VU.InitEnvField.SecretsManager, _, err = secretsource.NewSecretsManager(secretSources)
17+
testRuntime.VU.InitEnvField.SecretsManager, _, err = secretsource.NewManager(secretSources)
1818
require.NoError(t, err)
1919

2020
m, ok := New().NewModuleInstance(testRuntime.VU).(*Secrets)
@@ -28,15 +28,15 @@ func TestSecrets(t *testing.T) {
2828
t.Parallel()
2929

3030
type secretsTest struct {
31-
secretsources map[string]secretsource.SecretSource
31+
secretsources map[string]secretsource.Source
3232
script string
3333
expectedValue any
3434
expectedError string
3535
}
3636

3737
cases := map[string]secretsTest{
3838
"simple": {
39-
secretsources: map[string]secretsource.SecretSource{
39+
secretsources: map[string]secretsource.Source{
4040
"default": mock.NewMockSecretSource("some", map[string]string{
4141
"secret": "value",
4242
}),
@@ -45,7 +45,7 @@ func TestSecrets(t *testing.T) {
4545
expectedValue: "value",
4646
},
4747
"error": {
48-
secretsources: map[string]secretsource.SecretSource{
48+
secretsources: map[string]secretsource.Source{
4949
"default": mock.NewMockSecretSource("some", map[string]string{
5050
"secret": "value",
5151
}),
@@ -54,7 +54,7 @@ func TestSecrets(t *testing.T) {
5454
expectedError: "no value",
5555
},
5656
"multiple": {
57-
secretsources: map[string]secretsource.SecretSource{
57+
secretsources: map[string]secretsource.Source{
5858
"default": mock.NewMockSecretSource("some", map[string]string{
5959
"secret": "value",
6060
}),
@@ -66,7 +66,7 @@ func TestSecrets(t *testing.T) {
6666
expectedValue: "value",
6767
},
6868
"multiple get default": {
69-
secretsources: map[string]secretsource.SecretSource{
69+
secretsources: map[string]secretsource.Source{
7070
"default": mock.NewMockSecretSource("some", map[string]string{
7171
"secret": "value",
7272
}),
@@ -78,7 +78,7 @@ func TestSecrets(t *testing.T) {
7878
expectedValue: "value",
7979
},
8080
"multiple get not default": {
81-
secretsources: map[string]secretsource.SecretSource{
81+
secretsources: map[string]secretsource.Source{
8282
"default": mock.NewMockSecretSource("some", map[string]string{
8383
"secret": "value",
8484
}),
@@ -90,12 +90,12 @@ func TestSecrets(t *testing.T) {
9090
expectedValue: "value2",
9191
},
9292
"get secret without source": {
93-
secretsources: map[string]secretsource.SecretSource{},
93+
secretsources: map[string]secretsource.Source{},
9494
script: "secrets.get('secret')",
9595
expectedError: "no source with name default",
9696
},
9797
"get none existing source": {
98-
secretsources: map[string]secretsource.SecretSource{
98+
secretsources: map[string]secretsource.Source{
9999
"default": mock.NewMockSecretSource("some", map[string]string{
100100
"secret": "value",
101101
}),

internal/secretsource/file/file.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ import (
1111
)
1212

1313
func init() {
14-
secretsource.RegisterExtension("file", func(params secretsource.Params) (secretsource.SecretSource, error) {
14+
secretsource.RegisterExtension("file", func(params secretsource.Params) (secretsource.Source, error) {
1515
fss := &fileSecretSource{}
1616
err := fss.parseArg(params.ConfigArgument)
1717
if err != nil {

internal/secretsource/mock/mock.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ import (
1010
)
1111

1212
func init() {
13-
secretsource.RegisterExtension("mock", func(params secretsource.Params) (secretsource.SecretSource, error) {
13+
secretsource.RegisterExtension("mock", func(params secretsource.Params) (secretsource.Source, error) {
1414
list := strings.Split(params.ConfigArgument, ",")
1515
secrets := make(map[string]string, len(list))
1616
name := "mock"
@@ -31,7 +31,7 @@ func init() {
3131
}
3232

3333
// NewMockSecretSource returns a new secret source mock with the provided name and map of secrets
34-
func NewMockSecretSource(name string, secrets map[string]string) secretsource.SecretSource {
34+
func NewMockSecretSource(name string, secrets map[string]string) secretsource.Source {
3535
return &mockSecretSource{
3636
internal: secrets,
3737
name: name,

lib/test_state.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ type TestPreInitState struct {
2525
Logger logrus.FieldLogger
2626
TracerProvider *trace.TracerProvider
2727
Usage *usage.Usage
28-
SecretsManager *secretsource.SecretsManager
28+
SecretsManager *secretsource.Manager
2929
}
3030

3131
// TestRunState contains the pre-init state as well as all of the state and

secretsource/extension.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ import (
88
)
99

1010
// Constructor returns an instance of an output extension module.
11-
type Constructor func(Params) (SecretSource, error)
11+
type Constructor func(Params) (Source, error)
1212

1313
// Params contains all possible constructor parameters an output may need.
1414
type Params struct {
15-
ConfigArgument string
15+
ConfigArgument string // the string on the cli
1616

1717
Logger logrus.FieldLogger
1818
Environment map[string]string

secretsource/interface.go

+4-2
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
11
package secretsource
22

3-
// SecretSource is the interface a secret source needs to implement
4-
type SecretSource interface {
3+
// Source is the interface a secret source needs to implement
4+
type Source interface {
5+
// A name to be used when k6 has multiple sources
56
Name() string
7+
// Human readable description to be printed on the cli
68
Description() string
79
Get(key string) (value string, err error)
810
}

secretsource/manager.go

+8-8
Original file line numberDiff line numberDiff line change
@@ -10,19 +10,19 @@ import (
1010
// DefaultSourceName is the name for the default secret source
1111
const DefaultSourceName = "default"
1212

13-
// SecretsManager manages secrets making certain for them to be redacted from logs
14-
type SecretsManager struct {
13+
// Manager manages secrets making certain for them to be redacted from logs
14+
type Manager struct {
1515
hook *secretsHook
16-
sources map[string]SecretSource
16+
sources map[string]Source
1717
cache map[string]*sync.Map
1818
}
1919

20-
// NewSecretsManager returns a new NewSecretsManager with the provided secretsHook and will redact secrets from the hook
21-
func NewSecretsManager(sources map[string]SecretSource) (*SecretsManager, logrus.Hook, error) {
20+
// NewManager returns a new NewManager with the provided secretsHook and will redact secrets from the hook
21+
func NewManager(sources map[string]Source) (*Manager, logrus.Hook, error) {
2222
cache := make(map[string]*sync.Map, len(sources)-1)
2323
hook := &secretsHook{}
2424
if len(sources) == 0 {
25-
return &SecretsManager{
25+
return &Manager{
2626
hook: hook,
2727
cache: cache,
2828
}, hook, nil
@@ -39,7 +39,7 @@ func NewSecretsManager(sources map[string]SecretSource) (*SecretsManager, logrus
3939
}
4040
cache[k] = new(sync.Map)
4141
}
42-
sm := &SecretsManager{
42+
sm := &Manager{
4343
hook: hook,
4444
sources: sources,
4545
cache: cache,
@@ -50,7 +50,7 @@ func NewSecretsManager(sources map[string]SecretSource) (*SecretsManager, logrus
5050
// Get is the way to get a secret for the provided source name and key of the secret.
5151
// It can be used with the [DefaultSourceName].
5252
// This automatically starts redacting the secret before returning it.
53-
func (sm *SecretsManager) Get(sourceName, key string) (string, error) {
53+
func (sm *Manager) Get(sourceName, key string) (string, error) {
5454
sourceCache, ok := sm.cache[sourceName]
5555
if !ok {
5656
return "", fmt.Errorf("no source with name %s", sourceName)

0 commit comments

Comments
 (0)