fixup! Omit scm-username annotation from the PAT secret
parent
6a1daa41a7
commit
ea736d1b21
|
|
@ -196,7 +196,7 @@ public class KubernetesPersonalAccessTokenManager implements PersonalAccessToken
|
|||
String tokenId = annotations.get(ANNOTATION_SCM_PERSONAL_ACCESS_TOKEN_ID);
|
||||
String organization = annotations.get(ANNOTATION_SCM_ORGANIZATION);
|
||||
String scmUsername =
|
||||
scmPersonalAccessTokenFetcher.isValid(
|
||||
scmPersonalAccessTokenFetcher.getScmUsername(
|
||||
new PersonalAccessTokenParams(
|
||||
trimmedUrl, providerName, tokenId, token, organization));
|
||||
if (!isNullOrEmpty(scmUsername)) {
|
||||
|
|
|
|||
|
|
@ -96,7 +96,7 @@ public class KubernetesPersonalAccessTokenManagerTest {
|
|||
KubernetesSecrets secrets = Mockito.mock(KubernetesSecrets.class);
|
||||
when(namespaceFactory.access(eq(null), eq(meta.getName()))).thenReturn(kubernetesnamespace);
|
||||
when(kubernetesnamespace.secrets()).thenReturn(secrets);
|
||||
when(scmPersonalAccessTokenFetcher.isValid(any(PersonalAccessTokenParams.class)))
|
||||
when(scmPersonalAccessTokenFetcher.getScmUsername(any(PersonalAccessTokenParams.class)))
|
||||
.thenReturn("user");
|
||||
|
||||
Map<String, String> data =
|
||||
|
|
@ -163,7 +163,7 @@ public class KubernetesPersonalAccessTokenManagerTest {
|
|||
KubernetesSecrets secrets = Mockito.mock(KubernetesSecrets.class);
|
||||
when(namespaceFactory.access(eq(null), eq(meta.getName()))).thenReturn(kubernetesnamespace);
|
||||
when(kubernetesnamespace.secrets()).thenReturn(secrets);
|
||||
when(scmPersonalAccessTokenFetcher.isValid(any(PersonalAccessTokenParams.class)))
|
||||
when(scmPersonalAccessTokenFetcher.getScmUsername(any(PersonalAccessTokenParams.class)))
|
||||
.thenReturn("user");
|
||||
|
||||
Map<String, String> data1 =
|
||||
|
|
@ -217,7 +217,7 @@ public class KubernetesPersonalAccessTokenManagerTest {
|
|||
KubernetesSecrets secrets = Mockito.mock(KubernetesSecrets.class);
|
||||
when(namespaceFactory.access(eq(null), eq(meta.getName()))).thenReturn(kubernetesnamespace);
|
||||
when(kubernetesnamespace.secrets()).thenReturn(secrets);
|
||||
when(scmPersonalAccessTokenFetcher.isValid(any(PersonalAccessTokenParams.class)))
|
||||
when(scmPersonalAccessTokenFetcher.getScmUsername(any(PersonalAccessTokenParams.class)))
|
||||
.thenReturn("user");
|
||||
|
||||
Map<String, String> data =
|
||||
|
|
@ -260,7 +260,7 @@ public class KubernetesPersonalAccessTokenManagerTest {
|
|||
KubernetesSecrets secrets = Mockito.mock(KubernetesSecrets.class);
|
||||
when(namespaceFactory.access(eq(null), eq(meta.getName()))).thenReturn(kubernetesnamespace);
|
||||
when(kubernetesnamespace.secrets()).thenReturn(secrets);
|
||||
when(scmPersonalAccessTokenFetcher.isValid(any(PersonalAccessTokenParams.class)))
|
||||
when(scmPersonalAccessTokenFetcher.getScmUsername(any(PersonalAccessTokenParams.class)))
|
||||
.thenReturn("user");
|
||||
|
||||
Map<String, String> data =
|
||||
|
|
@ -297,7 +297,7 @@ public class KubernetesPersonalAccessTokenManagerTest {
|
|||
KubernetesSecrets secrets = Mockito.mock(KubernetesSecrets.class);
|
||||
when(namespaceFactory.access(eq(null), eq(meta.getName()))).thenReturn(kubernetesnamespace);
|
||||
when(kubernetesnamespace.secrets()).thenReturn(secrets);
|
||||
when(scmPersonalAccessTokenFetcher.isValid(any(PersonalAccessTokenParams.class)))
|
||||
when(scmPersonalAccessTokenFetcher.getScmUsername(any(PersonalAccessTokenParams.class)))
|
||||
.thenReturn("user");
|
||||
|
||||
Map<String, String> data1 =
|
||||
|
|
@ -345,7 +345,7 @@ public class KubernetesPersonalAccessTokenManagerTest {
|
|||
KubernetesSecrets secrets = Mockito.mock(KubernetesSecrets.class);
|
||||
when(namespaceFactory.access(eq(null), eq(meta.getName()))).thenReturn(kubernetesnamespace);
|
||||
when(kubernetesnamespace.secrets()).thenReturn(secrets);
|
||||
when(scmPersonalAccessTokenFetcher.isValid(any(PersonalAccessTokenParams.class)))
|
||||
when(scmPersonalAccessTokenFetcher.getScmUsername(any(PersonalAccessTokenParams.class)))
|
||||
.thenReturn(null);
|
||||
when(cheServerKubernetesClientFactory.create()).thenReturn(kubeClient);
|
||||
when(kubeClient.secrets()).thenReturn(secretsMixedOperation);
|
||||
|
|
@ -377,7 +377,7 @@ public class KubernetesPersonalAccessTokenManagerTest {
|
|||
KubernetesSecrets secrets = Mockito.mock(KubernetesSecrets.class);
|
||||
when(namespaceFactory.access(eq(null), eq(meta.getName()))).thenReturn(kubernetesnamespace);
|
||||
when(kubernetesnamespace.secrets()).thenReturn(secrets);
|
||||
when(scmPersonalAccessTokenFetcher.isValid(any(PersonalAccessTokenParams.class)))
|
||||
when(scmPersonalAccessTokenFetcher.getScmUsername(any(PersonalAccessTokenParams.class)))
|
||||
.thenAnswer(
|
||||
(Answer<String>)
|
||||
invocation -> {
|
||||
|
|
|
|||
|
|
@ -57,7 +57,7 @@ public class ScmPersonalAccessTokenFetcher {
|
|||
* Iterate over the Set<PersonalAccessTokenFetcher> declared in container and sequentially invoke
|
||||
* {@link PersonalAccessTokenFetcher#isValid(PersonalAccessToken)} method.
|
||||
*
|
||||
* @deprecated use {@link #isValid(PersonalAccessTokenParams)} instead.
|
||||
* @deprecated use {@link #getScmUsername(PersonalAccessTokenParams)} instead.
|
||||
* @throws UnknownScmProviderException - if none of PersonalAccessTokenFetchers return a
|
||||
* meaningful result.
|
||||
*/
|
||||
|
|
@ -82,7 +82,7 @@ public class ScmPersonalAccessTokenFetcher {
|
|||
* fetchers return an scm username, return it. Otherwise, return null.
|
||||
*/
|
||||
@Nullable
|
||||
public String isValid(PersonalAccessTokenParams params)
|
||||
public String getScmUsername(PersonalAccessTokenParams params)
|
||||
throws UnknownScmProviderException, ScmUnauthorizedException, ScmCommunicationException {
|
||||
for (PersonalAccessTokenFetcher fetcher : personalAccessTokenFetchers) {
|
||||
Optional<Pair<Boolean, String>> isValid = fetcher.isValid(params);
|
||||
|
|
|
|||
Loading…
Reference in New Issue