-
Notifications
You must be signed in to change notification settings - Fork 4.7k
/
secrets.go
79 lines (64 loc) · 2.15 KB
/
secrets.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
/*
Copyright 2019 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package fi
import (
"context"
crypto_rand "crypto/rand"
"encoding/base64"
"fmt"
"strings"
"k8s.io/kops/util/pkg/vfs"
)
type SecretStoreReader interface {
// Secret returns a secret. Returns an error if not found
Secret(id string) (*Secret, error)
// FindSecret finds a secret, if exists. Returns nil,nil if not found
FindSecret(id string) (*Secret, error)
}
type SecretStore interface {
SecretStoreReader
// DeleteSecret deletes the specified secret
DeleteSecret(id string) error
// GetOrCreateSecret creates a secret
GetOrCreateSecret(ctx context.Context, id string, secret *Secret) (current *Secret, created bool, err error)
// ReplaceSecret will forcefully update an existing secret if it exists
ReplaceSecret(id string, secret *Secret) (current *Secret, err error)
// ListSecrets lists the ids of all known secrets
ListSecrets() ([]string, error)
// MirrorTo will copy secrets to a vfs.Path, which is often easier for a machine to read
MirrorTo(ctx context.Context, basedir vfs.Path) error
}
type Secret struct {
Data []byte
}
func (s *Secret) AsString() (string, error) {
// Nicer behaviour because this is called from templates
if s == nil {
return "", fmt.Errorf("AsString called on nil Secret")
}
return string(s.Data), nil
}
func CreateSecret() (*Secret, error) {
data := make([]byte, 128)
_, err := crypto_rand.Read(data)
if err != nil {
return nil, fmt.Errorf("error reading crypto_rand: %v", err)
}
s := base64.StdEncoding.EncodeToString(data)
r := strings.NewReplacer("+", "", "=", "", "/", "")
s = r.Replace(s)
s = s[:32]
return &Secret{
Data: []byte(s),
}, nil
}