27bb03bbc0
* adding copyright header * fix fmt and a test
61 lines
1.6 KiB
Go
61 lines
1.6 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
package api
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
)
|
|
|
|
type KVv1 struct {
|
|
c *Client
|
|
mountPath string
|
|
}
|
|
|
|
// Get returns a secret from the KV v1 secrets engine.
|
|
func (kv *KVv1) Get(ctx context.Context, secretPath string) (*KVSecret, error) {
|
|
pathToRead := fmt.Sprintf("%s/%s", kv.mountPath, secretPath)
|
|
|
|
secret, err := kv.c.Logical().ReadWithContext(ctx, pathToRead)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error encountered while reading secret at %s: %w", pathToRead, err)
|
|
}
|
|
if secret == nil {
|
|
return nil, fmt.Errorf("%w: at %s", ErrSecretNotFound, pathToRead)
|
|
}
|
|
|
|
return &KVSecret{
|
|
Data: secret.Data,
|
|
VersionMetadata: nil,
|
|
Raw: secret,
|
|
}, nil
|
|
}
|
|
|
|
// Put inserts a key-value secret (e.g. {"password": "Hashi123"}) into the
|
|
// KV v1 secrets engine.
|
|
//
|
|
// If the secret already exists, it will be overwritten.
|
|
func (kv *KVv1) Put(ctx context.Context, secretPath string, data map[string]interface{}) error {
|
|
pathToWriteTo := fmt.Sprintf("%s/%s", kv.mountPath, secretPath)
|
|
|
|
_, err := kv.c.Logical().WriteWithContext(ctx, pathToWriteTo, data)
|
|
if err != nil {
|
|
return fmt.Errorf("error writing secret to %s: %w", pathToWriteTo, err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Delete deletes a secret from the KV v1 secrets engine.
|
|
func (kv *KVv1) Delete(ctx context.Context, secretPath string) error {
|
|
pathToDelete := fmt.Sprintf("%s/%s", kv.mountPath, secretPath)
|
|
|
|
_, err := kv.c.Logical().DeleteWithContext(ctx, pathToDelete)
|
|
if err != nil {
|
|
return fmt.Errorf("error deleting secret at %s: %w", pathToDelete, err)
|
|
}
|
|
|
|
return nil
|
|
}
|