Skip to content

Commit 22cd18a

Browse files
committed
dev test fix:- instead of checking on global field in secret config data while unmarshalling leverage data and defaultData fields
1 parent 9778130 commit 22cd18a

File tree

3 files changed

+16
-17
lines changed

3 files changed

+16
-17
lines changed

api/restHandler/app/configDiff/DeploymentConfigurationRestHandler.go

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,6 @@ func (handler *DeploymentConfigurationRestHandlerImpl) CompareCategoryWiseConfig
197197
common.WriteJsonResp(w, err, nil, http.StatusInternalServerError)
198198
return
199199
}
200-
//res.IsAppAdmin = handler.enforceForAppAndEnv(configDataQueryParams.AppName, configDataQueryParams.EnvName, token, casbin.ActionUpdate)
201200

202201
common.WriteJsonResp(w, nil, res, http.StatusOK)
203202
}

pkg/configDiff/bean/bean.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ type DeploymentAndCmCsConfigDto struct {
144144
SecretsData *DeploymentAndCmCsConfig `json:"secretsData"`
145145
PipelineConfigData *DeploymentAndCmCsConfig `json:"pipelineConfigData,omitempty"`
146146
IsAppAdmin bool `json:"isAppAdmin"`
147-
Index int `json:"index,omitempty"`
147+
Index int `json:"index"`
148148
}
149149

150150
func NewDeploymentAndCmCsConfigDto() *DeploymentAndCmCsConfigDto {

pkg/configDiff/utils/utils.go

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,9 @@ func GetKeyValMapForSecretConfigDataAndMaskData(configDataList []*bean.ConfigDat
4040
if secretConfigData.IsESOExternalSecretType() || secretConfigData.External {
4141
continue
4242
}
43-
secretRawData := secretConfigData.Data
44-
if secretConfigData.Global {
45-
secretRawData = secretConfigData.DefaultData
43+
secretRawData := secretConfigData.DefaultData
44+
if len(secretConfigData.Data) > 0 {
45+
secretRawData = secretConfigData.Data
4646
}
4747
var secretData map[string]string
4848
if err := json.Unmarshal(secretRawData, &secretData); err != nil {
@@ -60,10 +60,10 @@ func GetKeyValMapForSecretConfigDataAndMaskData(configDataList []*bean.ConfigDat
6060
if err != nil {
6161
return nil, err
6262
}
63-
if secretConfigData.Global {
64-
secretConfigData.DefaultData = maskedSecretJson
65-
} else {
63+
if len(secretConfigData.Data) > 0 {
6664
secretConfigData.Data = maskedSecretJson
65+
} else {
66+
secretConfigData.DefaultData = maskedSecretJson
6767
}
6868
}
6969
return keyValMapForSecretConfig, nil
@@ -80,9 +80,9 @@ func CompareAndMaskSecretValuesInConfigData(configDataList []*bean.ConfigData, k
8080
if secretConfigData.IsESOExternalSecretType() || secretConfigData.External {
8181
continue
8282
}
83-
secretConfig := secretConfigData.Data
84-
if secretConfigData.Global {
85-
secretConfig = secretConfigData.DefaultData
83+
secretConfig := secretConfigData.DefaultData
84+
if len(secretConfigData.Data) > 0 {
85+
secretConfig = secretConfigData.Data
8686
}
8787
var secretDataMap map[string]string
8888
if err := json.Unmarshal(secretConfig, &secretDataMap); err != nil {
@@ -106,10 +106,10 @@ func CompareAndMaskSecretValuesInConfigData(configDataList []*bean.ConfigData, k
106106
if err != nil {
107107
return err
108108
}
109-
if secretConfigData.Global {
110-
secretConfigData.DefaultData = maskedSecretJson
111-
} else {
109+
if len(secretConfigData.Data) > 0 {
112110
secretConfigData.Data = maskedSecretJson
111+
} else {
112+
secretConfigData.DefaultData = maskedSecretJson
113113
}
114114

115115
} else {
@@ -122,10 +122,10 @@ func CompareAndMaskSecretValuesInConfigData(configDataList []*bean.ConfigData, k
122122
if err != nil {
123123
return err
124124
}
125-
if secretConfigData.Global {
126-
secretConfigData.DefaultData = maskedSecretJson
127-
} else {
125+
if len(secretConfigData.Data) > 0 {
128126
secretConfigData.Data = maskedSecretJson
127+
} else {
128+
secretConfigData.DefaultData = maskedSecretJson
129129
}
130130

131131
}

0 commit comments

Comments
 (0)