Skip to content

Commit 145e46b

Browse files
committed
Define secrets store credential format
Signed-off-by: Alano Terblanche <18033717+Benehiko@users.noreply.github.com>
1 parent e652fcf commit 145e46b

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+24308
-0
lines changed

store/examples/secret.go

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
package examples
2+
3+
import (
4+
"bytes"
5+
"errors"
6+
7+
"github.com/docker/secrets-engine/pkg/secrets"
8+
)
9+
10+
type secret struct {
11+
AccessToken string
12+
RefreshToken string
13+
}
14+
15+
var _ secrets.Secret = &secret{}
16+
17+
func (s *secret) Marshal() ([]byte, error) {
18+
return []byte(s.AccessToken + ":" + s.RefreshToken), nil
19+
}
20+
21+
func (s *secret) Unmarshal(data []byte) error {
22+
tokens := bytes.Split(data, []byte(":"))
23+
if len(tokens) != 2 {
24+
return errors.New("invalid secret format")
25+
}
26+
27+
s.AccessToken, s.RefreshToken = string(tokens[0]), string(tokens[1])
28+
return nil
29+
}

store/examples/secrets_test.go

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
package examples
2+
3+
import (
4+
"testing"
5+
6+
"github.com/stretchr/testify/require"
7+
)
8+
9+
func TestSecretExample(t *testing.T) {
10+
s := &secret{
11+
AccessToken: "access_token",
12+
RefreshToken: "refresh_token",
13+
}
14+
data, err := s.Marshal()
15+
require.NoError(t, err)
16+
require.Equal(t, string(data), "access_token:refresh_token")
17+
18+
anotherSecret := &secret{}
19+
require.NoError(t, anotherSecret.Unmarshal(data))
20+
require.EqualValues(t, s, anotherSecret)
21+
}

store/go.mod

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
module github.com/docker/secrets-engine/store
2+
3+
go 1.24.3
4+
5+
replace github.com/docker/secrets-engine => ../
6+
7+
require (
8+
github.com/docker/secrets-engine v0.0.0-00010101000000-000000000000
9+
github.com/stretchr/testify v1.10.0
10+
)
11+
12+
require (
13+
github.com/davecgh/go-spew v1.1.1 // indirect
14+
github.com/pmezard/go-difflib v1.0.0 // indirect
15+
gopkg.in/yaml.v3 v3.0.1 // indirect
16+
)

store/go.sum

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
2+
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
3+
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
4+
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
5+
github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=
6+
github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
7+
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405 h1:yhCVgyC4o1eVCa2tZl7eS0r+SDo693bJlVdllGtEeKM=
8+
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
9+
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
10+
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=

store/store.go

Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
package secrets
2+
3+
import "context"
4+
5+
// Secret is a generic type that represents the actual secret values
6+
//
7+
// The implementer is responsible for defining the data structure of their secrets.
8+
//
9+
// Example:
10+
//
11+
// type secret struct {
12+
// AccessToken string
13+
// RefreshToken string
14+
// }
15+
//
16+
// func (s *secret) Marshal() ([]byte, error) {
17+
// return []byte(s.AccessToken+":"+s.RefreshToken), nil
18+
// }
19+
//
20+
// func (s *secret) Unmarshal(data []byte) error {
21+
// tokens := bytes.Split(data, []byte(":"))
22+
// if len(tokens) != 2 {
23+
// return errors.New("invalid secret format")
24+
// }
25+
//
26+
// s.AccessToken, s.RefreshToken = string(tokens[0]), string(tokens[1])
27+
// return nil
28+
// }
29+
type Secret interface {
30+
// Marshal the secret into a slice of bytes
31+
Marshal() ([]byte, error)
32+
// Unmarshal the secret from a slice of bytes into its structured format
33+
Unmarshal(data []byte) error
34+
}
35+
36+
// Store defines a strict format for secrets to conform to when interacting
37+
// with the secrets engine
38+
type Store interface {
39+
// Erase removes credentials from the store for a given ID.
40+
Erase(ctx context.Context, id ID) error
41+
// Get retrieves credentials from the store for a given ID.
42+
Get(ctx context.Context, id ID) (Secret, error)
43+
// GetAll retrieves all the credentials from the store.
44+
GetAll(ctx context.Context) (map[ID]Secret, error)
45+
// Store saves credentials in the store.
46+
Store(ctx context.Context, id ID, secret Secret) error
47+
}

store/vendor/github.com/davecgh/go-spew/LICENSE

Lines changed: 15 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

store/vendor/github.com/davecgh/go-spew/spew/bypass.go

Lines changed: 145 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

store/vendor/github.com/davecgh/go-spew/spew/bypasssafe.go

Lines changed: 38 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)