Skip to content

Commit f171fc4

Browse files
authored
fix: Use a global tenant ID when retrieving secrets information (#1260)
We have several places that need a global tenant ID. We usually communicate this by using models.GlobalTenantID instead of just int64, but the GetTenant function takes a structure that doesn't make a distinction, because it would require updating the protocol buffer definition in a way that would be hard to handle. Fix the various locations that are using a local ID instead of a global ID. Signed-off-by: Marcelo E. Magallon <[email protected]>
1 parent 18b6df0 commit f171fc4

File tree

10 files changed

+15
-13
lines changed

10 files changed

+15
-13
lines changed

internal/prober/browser/browser.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ func NewProber(ctx context.Context, check model.Check, logger zerolog.Logger, ru
3636
return p, errUnsupportedCheck
3737
}
3838

39-
secretStore, err := store.GetSecretCredentials(ctx, check.TenantId)
39+
secretStore, err := store.GetSecretCredentials(ctx, check.GlobalTenantID())
4040
if err != nil {
4141
return p, err
4242
}

internal/prober/browser/browser_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,6 @@ func (noopRunner) Run(ctx context.Context, script k6runner.Script) (*k6runner.Ru
8686

8787
type noopSecretStore struct{}
8888

89-
func (n noopSecretStore) GetSecretCredentials(ctx context.Context, tenantID int64) (*sm.SecretStore, error) {
89+
func (n noopSecretStore) GetSecretCredentials(ctx context.Context, tenantID model.GlobalID) (*sm.SecretStore, error) {
9090
return &sm.SecretStore{}, nil
9191
}

internal/prober/multihttp/multihttp.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ func NewProber(ctx context.Context, check model.Check, logger zerolog.Logger, ru
4646
augmentHttpHeaders(&check.Check, reservedHeaders)
4747
}
4848

49-
secretStore, err := store.GetSecretCredentials(ctx, check.TenantId)
49+
secretStore, err := store.GetSecretCredentials(ctx, check.GlobalTenantID())
5050
if err != nil {
5151
return p, err
5252
}

internal/prober/multihttp/multihttp_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,6 @@ func (noopRunner) Run(ctx context.Context, script k6runner.Script) (*k6runner.Ru
161161

162162
type noopSecretStore struct{}
163163

164-
func (n noopSecretStore) GetSecretCredentials(ctx context.Context, tenantID int64) (*sm.SecretStore, error) {
164+
func (n noopSecretStore) GetSecretCredentials(ctx context.Context, tenantID model.GlobalID) (*sm.SecretStore, error) {
165165
return &sm.SecretStore{}, nil
166166
}

internal/prober/prober_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,6 @@ func TestProberFactoryCoverage(t *testing.T) {
3131

3232
type noopSecretStore struct{}
3333

34-
func (n noopSecretStore) GetSecretCredentials(ctx context.Context, tenantID int64) (*sm.SecretStore, error) {
34+
func (n noopSecretStore) GetSecretCredentials(ctx context.Context, tenantID model.GlobalID) (*sm.SecretStore, error) {
3535
return &sm.SecretStore{}, nil
3636
}

internal/prober/scripted/scripted.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ func NewProber(ctx context.Context, check model.Check, logger zerolog.Logger, ru
3636
return p, errUnsupportedCheck
3737
}
3838

39-
secretStore, err := store.GetSecretCredentials(ctx, check.TenantId)
39+
secretStore, err := store.GetSecretCredentials(ctx, check.GlobalTenantID())
4040
if err != nil {
4141
return p, err
4242
}

internal/prober/scripted/scripted_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ func (noopRunner) Run(ctx context.Context, script k6runner.Script) (*k6runner.Ru
8585

8686
type noopSecretStore struct{}
8787

88-
func (n noopSecretStore) GetSecretCredentials(ctx context.Context, tenantID int64) (*sm.SecretStore, error) {
88+
func (n noopSecretStore) GetSecretCredentials(ctx context.Context, tenantID model.GlobalID) (*sm.SecretStore, error) {
8989
return &sm.SecretStore{}, nil
9090
}
9191

internal/scraper/scraper_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -2028,6 +2028,6 @@ func TestTickWithOffset(t *testing.T) {
20282028

20292029
type noopSecretStore struct{}
20302030

2031-
func (n noopSecretStore) GetSecretCredentials(ctx context.Context, tenantID int64) (*sm.SecretStore, error) {
2031+
func (n noopSecretStore) GetSecretCredentials(ctx context.Context, tenantID model.GlobalID) (*sm.SecretStore, error) {
20322032
return &sm.SecretStore{}, nil
20332033
}

internal/secrets/tenant.go

+4-3
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,12 @@ import (
55

66
"github.com/rs/zerolog"
77

8+
"github.com/grafana/synthetic-monitoring-agent/internal/model"
89
sm "github.com/grafana/synthetic-monitoring-agent/pkg/pb/synthetic_monitoring"
910
)
1011

1112
type SecretProvider interface {
12-
GetSecretCredentials(ctx context.Context, tenantID int64) (*sm.SecretStore, error)
13+
GetSecretCredentials(ctx context.Context, tenantID model.GlobalID) (*sm.SecretStore, error)
1314
}
1415

1516
type TenantProvider interface {
@@ -28,9 +29,9 @@ func NewTenantSecrets(tp TenantProvider, logger zerolog.Logger) *TenantSecrets {
2829
}
2930
}
3031

31-
func (ts *TenantSecrets) GetSecretCredentials(ctx context.Context, tenantID int64) (*sm.SecretStore, error) {
32+
func (ts *TenantSecrets) GetSecretCredentials(ctx context.Context, tenantID model.GlobalID) (*sm.SecretStore, error) {
3233
tenant, err := ts.tp.GetTenant(ctx, &sm.TenantInfo{
33-
Id: tenantID,
34+
Id: int64(tenantID),
3435
})
3536
if err != nil {
3637
return nil, err

internal/secrets/tenant_test.go

+3-2
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ import (
77

88
"github.com/rs/zerolog"
99

10+
"github.com/grafana/synthetic-monitoring-agent/internal/model"
1011
sm "github.com/grafana/synthetic-monitoring-agent/pkg/pb/synthetic_monitoring"
1112
"github.com/stretchr/testify/assert"
1213
)
@@ -26,7 +27,7 @@ func TestGetSecretCredentials_Success(t *testing.T) {
2627
mockTenantProvider := &tenantProvider{tenant: mockTenant}
2728
ts := NewTenantSecrets(mockTenantProvider, zerolog.Nop())
2829
ctx := context.Background()
29-
tenantID := int64(1234)
30+
tenantID := model.GlobalID(1234)
3031

3132
secretStore, err := ts.GetSecretCredentials(ctx, tenantID)
3233

@@ -39,7 +40,7 @@ func TestGetSecretCredentials_Error(t *testing.T) {
3940
mockTenantProvider := &tenantProvider{err: getTenantErr}
4041
ts := NewTenantSecrets(mockTenantProvider, zerolog.Nop())
4142
ctx := context.Background()
42-
tenantID := int64(1234)
43+
tenantID := model.GlobalID(1234)
4344

4445
secretStore, err := ts.GetSecretCredentials(ctx, tenantID)
4546

0 commit comments

Comments
 (0)