Skip to content

Commit 827ea04

Browse files
authored
fix(sonic): rename vault secret store func call (#81)
1 parent 5891fa5 commit 827ea04

File tree

3 files changed

+43
-19
lines changed

3 files changed

+43
-19
lines changed

.drone.yml

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,35 @@ kind: pipeline
33
type: docker
44
name: default
55

6+
services:
7+
- name: vault
8+
image: vault:1.5.3
9+
ports:
10+
- 8200
11+
environment:
12+
VAULT_DEV_ROOT_TOKEN_ID: "changeme"
13+
614
steps:
15+
- name: Wait for services
16+
image: jwilder/dockerize
17+
pull: if-not-exists
18+
commands:
19+
- dockerize -wait tcp://vault:8200 -timeout 1m
20+
21+
- name: Enable Vault Transit
22+
image: vault:1.5.3
23+
environment:
24+
VAULT_ADDR: "http://vault:8200"
25+
VAULT_TOKEN: "changeme"
26+
commands:
27+
- vault secrets enable transit
28+
729
- name: Test & vet
830
image: golang:1.18
931
environment:
1032
GO111MODULE: on
33+
KAIGARA_VAULT_ADDR: "http://vault:8200"
34+
KAIGARA_VAULT_TOKEN: "changeme"
1135
commands:
1236
- ./run_tests.sh
1337

sonic/handlers/admin.go

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,16 @@ import (
44
"bytes"
55
"encoding/json"
66
"fmt"
7-
"github.com/openware/pkg/vault"
8-
sonic "github.com/openware/pkg/sonic/config"
97
"io/ioutil"
108
"log"
119
"net/http"
1210
"net/url"
1311
"path"
1412
"time"
1513

14+
sonic "github.com/openware/pkg/sonic/config"
15+
"github.com/openware/pkg/vault"
16+
1617
"github.com/gin-gonic/gin"
1718
"github.com/openware/pkg/jwt"
1819
"github.com/openware/pkg/mngapi/peatio"
@@ -62,22 +63,22 @@ func SetSecret(ctx *gin.Context) {
6263

6364
appName := ctx.Param("component")
6465

65-
if err := vaultService.LoadSecrets(appName, params.Scope); err != nil {
66-
log.Printf("ERR: LoadSecrets: %s", err)
66+
if err := vaultService.Read(appName, params.Scope); err != nil {
67+
log.Printf("ERR: Read: %s", err)
6768
ctx.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
6869
return
6970
}
7071

71-
err = vaultService.SetSecret(appName, params.Key, params.Value, params.Scope)
72+
err = vaultService.SetEntry(appName, params.Scope, params.Key, params.Value)
7273
if err != nil {
73-
log.Printf("ERR: SetSecret: %s", err)
74+
log.Printf("ERR: SetEntry: %s", err)
7475
ctx.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
7576
return
7677
}
7778

78-
err = vaultService.SaveSecrets(appName, params.Scope)
79+
err = vaultService.Write(appName, params.Scope)
7980
if err != nil {
80-
log.Printf("ERR: SaveSecrets: %s", err)
81+
log.Printf("ERR: Write: %s", err)
8182
ctx.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
8283
return
8384
}
@@ -108,15 +109,15 @@ func GetSecrets(ctx *gin.Context) {
108109
result[app] = make(map[string]interface{})
109110

110111
for _, scope := range scopes {
111-
if err := vaultService.LoadSecrets(app, scope); err != nil {
112+
if err := vaultService.Read(app, scope); err != nil {
112113
ctx.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
113114
return
114115
}
115116

116117
result[app][scope] = make(map[string]interface{})
117118

118119
if scope == "secret" {
119-
secretsKeys, err := vaultService.ListSecrets(app, scope)
120+
secretsKeys, err := vaultService.ListEntries(app, scope)
120121
if err != nil {
121122
ctx.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
122123
return
@@ -126,7 +127,7 @@ func GetSecrets(ctx *gin.Context) {
126127
result[app][scope].(map[string]interface{})[key] = "******"
127128
}
128129
} else {
129-
secrets, err := vaultService.GetSecrets(app, scope)
130+
secrets, err := vaultService.GetEntries(app, scope)
130131
if err != nil {
131132
ctx.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
132133
return
@@ -272,7 +273,6 @@ func updateMarkets(sc *SonicContext, engineID string) error {
272273
return nil
273274
}
274275

275-
276276
// CreatePlatform to handler '/api/v2/admin/platforms/new'
277277
func CreatePlatform(ctx *gin.Context, licenseCreator LicenseCreator, fetchConfig FetchConfigFunction) gin.HandlerFunc {
278278
return func(context *gin.Context) {
@@ -374,18 +374,18 @@ func createPlatform(ctx *gin.Context, creator LicenseCreator, fetchConfig FetchC
374374
scope := "private"
375375
key := "platform_id"
376376
// Load secret
377-
vaultService.LoadSecrets(app, scope)
377+
vaultService.Read(app, scope)
378378

379379
// Set Platform ID to secret
380-
err = vaultService.SetSecret(app, key, platform.PID, scope)
380+
err = vaultService.SetEntry(app, scope, key, platform.PID)
381381
if err != nil {
382382
log.Printf("ERROR: Failed to store Platform ID in vault: %s", err.Error())
383383
ctx.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
384384
return
385385
}
386386

387387
// Save secret to vault
388-
err = vaultService.SaveSecrets(app, scope)
388+
err = vaultService.Write(app, scope)
389389
if err != nil {
390390
log.Printf("ERROR: Failed to store secrets: %s", err.Error())
391391
ctx.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})

sonic/handlers/helpers.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ import (
66
"sync"
77

88
"github.com/gin-gonic/gin"
9-
"github.com/openware/pkg/vault"
109
"github.com/openware/pkg/jwt"
1110
"github.com/openware/pkg/sonic/config"
11+
"github.com/openware/pkg/vault"
1212
)
1313

1414
type cache struct {
@@ -59,7 +59,7 @@ func GetVaultService(ctx *gin.Context) (*vault.Service, error) {
5959
// 'firstRun' variable will help to run writing to cache on first system start
6060
// as on the start latest and current versions are the same
6161
func WriteCache(vaultService *vault.Service, scope string, firstRun bool) {
62-
err := vaultService.LoadSecrets("global", scope)
62+
err := vaultService.Read("global", scope)
6363
if err != nil {
6464
panic(err)
6565
}
@@ -80,13 +80,13 @@ func WriteCache(vaultService *vault.Service, scope string, firstRun bool) {
8080

8181
if current != latest || firstRun {
8282
log.Println("Writing to cache")
83-
keys, err := vaultService.ListSecrets("global", scope)
83+
keys, err := vaultService.ListEntries("global", scope)
8484
if err != nil {
8585
panic(err)
8686
}
8787

8888
for _, key := range keys {
89-
val, err := vaultService.GetSecret("global", key, scope)
89+
val, err := vaultService.GetEntry("global", key, scope)
9090
if err != nil {
9191
panic(err)
9292
}

0 commit comments

Comments
 (0)