// Copyright (c) HashiCorp, Inc. // SPDX-License-Identifier: MPL-2.0 package framework import ( "context" "sort" "strings" "github.com/hashicorp/vault/sdk/logical" ) // DEPRECATED: Don't use this. It's too inflexible, nearly impossible to use // with some modern Vault features, and imposes specific API designs. // // PolicyMap is a specialization of PathMap that expects the values to // be lists of policies. This assists in querying and loading policies // from the PathMap. type PolicyMap struct { PathMap DefaultKey string PolicyKey string } func (p *PolicyMap) Policies(ctx context.Context, s logical.Storage, names ...string) ([]string, error) { policyKey := "value" if p.PolicyKey != "" { policyKey = p.PolicyKey } if p.DefaultKey != "" { newNames := make([]string, len(names)+1) newNames[0] = p.DefaultKey copy(newNames[1:], names) names = newNames } set := make(map[string]struct{}) for _, name := range names { v, err := p.Get(ctx, s, name) if err != nil { return nil, err } valuesRaw, ok := v[policyKey] if !ok { continue } values, ok := valuesRaw.(string) if !ok { continue } for _, p := range strings.Split(values, ",") { if p = strings.TrimSpace(p); p != "" { set[p] = struct{}{} } } } list := make([]string, 0, len(set)) for k := range set { list = append(list, k) } sort.Strings(list) return list, nil }