@@ -23,7 +23,7 @@ import (
23
23
"strings"
24
24
25
25
"github.com/container-storage-interface/spec/lib/go/csi"
26
- iscsi_lib "github.com/kubernetes-csi/csi-lib-iscsi/iscsi"
26
+ iscsiLib "github.com/kubernetes-csi/csi-lib-iscsi/iscsi"
27
27
"k8s.io/kubernetes/pkg/volume/util"
28
28
"k8s.io/utils/exec"
29
29
"k8s.io/utils/mount"
@@ -98,17 +98,17 @@ func getISCSIInfo(req *csi.NodePublishVolumeRequest) (*iscsiDisk, error) {
98
98
InitiatorName : initiatorName }, nil
99
99
}
100
100
101
- func buildISCSIConnector (iscsiInfo * iscsiDisk ) * iscsi_lib .Connector {
102
- c := iscsi_lib .Connector {
101
+ func buildISCSIConnector (iscsiInfo * iscsiDisk ) * iscsiLib .Connector {
102
+ c := iscsiLib .Connector {
103
103
VolumeName : iscsiInfo .VolName ,
104
104
TargetIqn : iscsiInfo .Iqn ,
105
105
TargetPortals : iscsiInfo .Portals ,
106
106
Multipath : len (iscsiInfo .Portals ) > 1 ,
107
107
}
108
108
109
- if iscsiInfo .sessionSecret != (iscsi_lib .Secrets {}) {
109
+ if iscsiInfo .sessionSecret != (iscsiLib .Secrets {}) {
110
110
c .SessionSecrets = iscsiInfo .sessionSecret
111
- if iscsiInfo .discoverySecret != (iscsi_lib .Secrets {}) {
111
+ if iscsiInfo .discoverySecret != (iscsiLib .Secrets {}) {
112
112
c .DiscoverySecrets = iscsiInfo .discoverySecret
113
113
}
114
114
}
@@ -159,50 +159,50 @@ func parseSecret(secretParams string) map[string]string {
159
159
return secret
160
160
}
161
161
162
- func parseSessionSecret (secretParams map [string ]string ) (iscsi_lib .Secrets , error ) {
162
+ func parseSessionSecret (secretParams map [string ]string ) (iscsiLib .Secrets , error ) {
163
163
var ok bool
164
- secret := iscsi_lib .Secrets {}
164
+ secret := iscsiLib .Secrets {}
165
165
166
166
if len (secretParams ) == 0 {
167
167
return secret , nil
168
168
}
169
169
170
170
if secret .UserName , ok = secretParams ["node.session.auth.username" ]; ! ok {
171
- return iscsi_lib .Secrets {}, fmt .Errorf ("node.session.auth.username not found in secret" )
171
+ return iscsiLib .Secrets {}, fmt .Errorf ("node.session.auth.username not found in secret" )
172
172
}
173
173
if secret .Password , ok = secretParams ["node.session.auth.password" ]; ! ok {
174
- return iscsi_lib .Secrets {}, fmt .Errorf ("node.session.auth.password not found in secret" )
174
+ return iscsiLib .Secrets {}, fmt .Errorf ("node.session.auth.password not found in secret" )
175
175
}
176
176
if secret .UserNameIn , ok = secretParams ["node.session.auth.username_in" ]; ! ok {
177
- return iscsi_lib .Secrets {}, fmt .Errorf ("node.session.auth.username_in not found in secret" )
177
+ return iscsiLib .Secrets {}, fmt .Errorf ("node.session.auth.username_in not found in secret" )
178
178
}
179
179
if secret .PasswordIn , ok = secretParams ["node.session.auth.password_in" ]; ! ok {
180
- return iscsi_lib .Secrets {}, fmt .Errorf ("node.session.auth.password_in not found in secret" )
180
+ return iscsiLib .Secrets {}, fmt .Errorf ("node.session.auth.password_in not found in secret" )
181
181
}
182
182
183
183
secret .SecretsType = "chap"
184
184
return secret , nil
185
185
}
186
186
187
- func parseDiscoverySecret (secretParams map [string ]string ) (iscsi_lib .Secrets , error ) {
187
+ func parseDiscoverySecret (secretParams map [string ]string ) (iscsiLib .Secrets , error ) {
188
188
var ok bool
189
- secret := iscsi_lib .Secrets {}
189
+ secret := iscsiLib .Secrets {}
190
190
191
191
if len (secretParams ) == 0 {
192
192
return secret , nil
193
193
}
194
194
195
195
if secret .UserName , ok = secretParams ["node.sendtargets.auth.username" ]; ! ok {
196
- return iscsi_lib .Secrets {}, fmt .Errorf ("node.sendtargets.auth.username not found in secret" )
196
+ return iscsiLib .Secrets {}, fmt .Errorf ("node.sendtargets.auth.username not found in secret" )
197
197
}
198
198
if secret .Password , ok = secretParams ["node.sendtargets.auth.password" ]; ! ok {
199
- return iscsi_lib .Secrets {}, fmt .Errorf ("node.sendtargets.auth.password not found in secret" )
199
+ return iscsiLib .Secrets {}, fmt .Errorf ("node.sendtargets.auth.password not found in secret" )
200
200
}
201
201
if secret .UserNameIn , ok = secretParams ["node.sendtargets.auth.username_in" ]; ! ok {
202
- return iscsi_lib .Secrets {}, fmt .Errorf ("node.sendtargets.auth.username_in not found in secret" )
202
+ return iscsiLib .Secrets {}, fmt .Errorf ("node.sendtargets.auth.username_in not found in secret" )
203
203
}
204
204
if secret .PasswordIn , ok = secretParams ["node.sendtargets.auth.password_in" ]; ! ok {
205
- return iscsi_lib .Secrets {}, fmt .Errorf ("node.sendtargets.auth.password_in not found in secret" )
205
+ return iscsiLib .Secrets {}, fmt .Errorf ("node.sendtargets.auth.password_in not found in secret" )
206
206
}
207
207
208
208
secret .SecretsType = "chap"
@@ -217,8 +217,8 @@ type iscsiDisk struct {
217
217
chapDiscovery bool
218
218
chapSession bool
219
219
secret map [string ]string
220
- sessionSecret iscsi_lib .Secrets
221
- discoverySecret iscsi_lib .Secrets
220
+ sessionSecret iscsiLib .Secrets
221
+ discoverySecret iscsiLib .Secrets
222
222
InitiatorName string
223
223
VolName string
224
224
}
@@ -232,7 +232,7 @@ type iscsiDiskMounter struct {
232
232
exec exec.Interface
233
233
deviceUtil util.DeviceUtil
234
234
targetPath string
235
- connector * iscsi_lib .Connector
235
+ connector * iscsiLib .Connector
236
236
}
237
237
238
238
type iscsiDiskUnmounter struct {
0 commit comments