open-vault/api/secret.go

49 lines
1.4 KiB
Go
Raw Normal View History

2015-03-12 00:46:25 +00:00
package api
import (
"encoding/json"
"io"
)
// Secret is the structure returned for every secret within Vault.
type Secret struct {
2015-04-14 00:40:05 +00:00
LeaseID string `json:"lease_id"`
LeaseDuration int `json:"lease_duration"`
Renewable bool `json:"renewable"`
// Data is the actual contents of the secret. The format of the data
// is arbitrary and up to the secret backend.
Data map[string]interface{} `json:"data"`
// Warnings contains any warnings related to the operation. These
// are not issues that caused the command to fail, but that the
// client should be aware of.
Warnings []string `json:"warnings"`
2015-04-14 00:40:05 +00:00
// Auth, if non-nil, means that there was authentication information
// attached to this response.
Auth *SecretAuth `json:"auth,omitempty"`
2015-04-04 22:40:41 +00:00
}
2015-09-29 07:35:16 +00:00
// SecretAuth is the structure containing auth information if we have it.
2015-04-04 22:40:41 +00:00
type SecretAuth struct {
ClientToken string `json:"client_token"`
2015-04-04 22:40:41 +00:00
Policies []string `json:"policies"`
Metadata map[string]string `json:"metadata"`
LeaseDuration int `json:"lease_duration"`
Renewable bool `json:"renewable"`
2015-03-12 00:46:25 +00:00
}
// ParseSecret is used to parse a secret value from JSON from an io.Reader.
func ParseSecret(r io.Reader) (*Secret, error) {
// First decode the JSON into a map[string]interface{}
2015-03-16 03:35:33 +00:00
var secret Secret
2015-03-12 00:46:25 +00:00
dec := json.NewDecoder(r)
2015-03-16 03:35:33 +00:00
if err := dec.Decode(&secret); err != nil {
2015-03-12 00:46:25 +00:00
return nil, err
}
2015-03-16 03:35:33 +00:00
return &secret, nil
2015-03-12 00:46:25 +00:00
}