@@ -212,8 +212,8 @@ func formatCondition(expr, title string) string {
212212}
213213
214214func ListUsers (ctx context.Context , appName string , cluster flag.Context , namespace flag.Namespace , out * naistrix.OutputWriter ) error {
215- // Ensure we have elevated access to read the database secret (hardcoded reason for administrative operation )
216- if err := EnsureSecretAccess (ctx , appName , namespace , cluster , ReasonListUsers , out ); err != nil {
215+ // Get secret values ( access is logged for audit purposes )
216+ if _ , err := GetSecretValues (ctx , appName , namespace , cluster , ReasonListUsers , out ); err != nil {
217217 return err
218218 }
219219
@@ -261,8 +261,8 @@ func AddUser(ctx context.Context, appName, username, password string, cluster fl
261261 return err
262262 }
263263
264- // Ensure we have elevated access to read the database secret (hardcoded reason for administrative operation )
265- if err := EnsureSecretAccess (ctx , appName , namespace , cluster , ReasonAddUser , out ); err != nil {
264+ // Get secret values ( access is logged for audit purposes )
265+ if _ , err := GetSecretValues (ctx , appName , namespace , cluster , ReasonAddUser , out ); err != nil {
266266 return err
267267 }
268268
@@ -301,8 +301,8 @@ func AddUser(ctx context.Context, appName, username, password string, cluster fl
301301}
302302
303303func DropUser (ctx context.Context , appName string , username string , cluster flag.Context , namespace flag.Namespace , out * naistrix.OutputWriter ) error {
304- // Ensure we have elevated access to read the database secret (hardcoded reason for administrative operation )
305- if err := EnsureSecretAccess (ctx , appName , namespace , cluster , ReasonDropUser , out ); err != nil {
304+ // Get secret values ( access is logged for audit purposes )
305+ if _ , err := GetSecretValues (ctx , appName , namespace , cluster , ReasonDropUser , out ); err != nil {
306306 return err
307307 }
308308
0 commit comments