Skip to content

Commit ee602b3

Browse files
authored
rename TLSSecretFileMode to ReadWriteOnlyFileMode (nginx#6854)
1 parent a57f673 commit ee602b3

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

cmd/nginx-ingress/main.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -572,7 +572,7 @@ func processDefaultServerSecret(ctx context.Context, kubeClient *kubernetes.Clie
572572
}
573573

574574
bytes := configs.GenerateCertAndKeyFileContent(secret)
575-
nginxManager.CreateSecret(configs.DefaultServerSecretFileName, bytes, nginx.TLSSecretFileMode)
575+
nginxManager.CreateSecret(configs.DefaultServerSecretFileName, bytes, nginx.ReadWriteOnlyFileMode)
576576
} else {
577577
_, err := os.Stat(configs.DefaultServerSecretPath)
578578
if err != nil {
@@ -596,7 +596,7 @@ func processWildcardSecret(ctx context.Context, kubeClient *kubernetes.Clientset
596596
}
597597

598598
bytes := configs.GenerateCertAndKeyFileContent(secret)
599-
nginxManager.CreateSecret(configs.WildcardSecretFileName, bytes, nginx.TLSSecretFileMode)
599+
nginxManager.CreateSecret(configs.WildcardSecretFileName, bytes, nginx.ReadWriteOnlyFileMode)
600600
}
601601
return *wildcardTLSSecret != ""
602602
}

internal/configs/configurator.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -823,8 +823,8 @@ func (cnf *Configurator) addOrUpdateCASecret(secret *api_v1.Secret) string {
823823
crtData, crlData := GenerateCAFileContent(secret)
824824
crtSecretName := fmt.Sprintf("%s-%s", name, CACrtKey)
825825
crlSecretName := fmt.Sprintf("%s-%s", name, CACrlKey)
826-
crtFileName := cnf.nginxManager.CreateSecret(crtSecretName, crtData, nginx.TLSSecretFileMode)
827-
crlFileName := cnf.nginxManager.CreateSecret(crlSecretName, crlData, nginx.TLSSecretFileMode)
826+
crtFileName := cnf.nginxManager.CreateSecret(crtSecretName, crtData, nginx.ReadWriteOnlyFileMode)
827+
crlFileName := cnf.nginxManager.CreateSecret(crlSecretName, crlData, nginx.ReadWriteOnlyFileMode)
828828
return fmt.Sprintf("%s %s", crtFileName, crlFileName)
829829
}
830830

@@ -919,7 +919,7 @@ func (cnf *Configurator) AddOrUpdateResources(resources ExtendedResources, reloa
919919
func (cnf *Configurator) addOrUpdateTLSSecret(secret *api_v1.Secret) string {
920920
name := objectMetaToFileName(&secret.ObjectMeta)
921921
data := GenerateCertAndKeyFileContent(secret)
922-
return cnf.nginxManager.CreateSecret(name, data, nginx.TLSSecretFileMode)
922+
return cnf.nginxManager.CreateSecret(name, data, nginx.ReadWriteOnlyFileMode)
923923
}
924924

925925
// AddOrUpdateSpecialTLSSecrets adds or updates a file with a TLS cert and a key from a Special TLS Secret (eg. DefaultServerSecret, WildcardTLSSecret).
@@ -929,7 +929,7 @@ func (cnf *Configurator) AddOrUpdateSpecialTLSSecrets(secret *api_v1.Secret, sec
929929
data := GenerateCertAndKeyFileContent(secret)
930930

931931
for _, secretName := range secretNames {
932-
cnf.nginxManager.CreateSecret(secretName, data, nginx.TLSSecretFileMode)
932+
cnf.nginxManager.CreateSecret(secretName, data, nginx.ReadWriteOnlyFileMode)
933933
}
934934

935935
if !cnf.DynamicSSLReloadEnabled() {

internal/nginx/manager.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ const (
2626
ReloadForEndpointsUpdate = true
2727
// ReloadForOtherUpdate means that a reload is caused by an update for a resource(s) other than endpoints.
2828
ReloadForOtherUpdate = false
29-
// TLSSecretFileMode defines the default filemode for files with TLS Secrets.
30-
TLSSecretFileMode = 0o600
29+
// ReadWriteOnlyFileMode defines the default filemode for files with Secrets.
30+
ReadWriteOnlyFileMode = 0o600
3131
// JWKSecretFileMode defines the default filemode for files with JWK Secrets.
3232
JWKSecretFileMode = 0o644
3333
// HtpasswdSecretFileMode defines the default filemode for HTTP basic auth user files.

0 commit comments

Comments
 (0)