Documentation ¶
Index ¶
- Constants
- func IsSecurityEnabled() bool
- func NewSecretProvider(configuration interfaces.Configuration, ctx context.Context, ...) (interfaces.SecretProvider, error)
- type InsecureProvider
- func (p *InsecureProvider) GetAccessToken(_ string, _ string) (string, error)
- func (p *InsecureProvider) GetSecret(path string, keys ...string) (map[string]string, error)
- func (p *InsecureProvider) SecretsLastUpdated() time.Time
- func (p *InsecureProvider) SecretsUpdated()
- func (p *InsecureProvider) StoreSecret(_ string, _ map[string]string) error
- type SecureProvider
- func (p *SecureProvider) DefaultTokenExpiredCallback(expiredToken string) (replacementToken string, retry bool)
- func (p *SecureProvider) GetAccessToken(tokenType string, serviceKey string) (string, error)
- func (p *SecureProvider) GetSecret(path string, keys ...string) (map[string]string, error)
- func (p *SecureProvider) SecretsLastUpdated() time.Time
- func (p *SecureProvider) SecretsUpdated()
- func (p *SecureProvider) SetClient(client secrets.SecretClient)
- func (p *SecureProvider) StoreSecret(path string, secrets map[string]string) error
Constants ¶
const ( EnvSecretStore = "EDGEX_SECURITY_SECRET_STORE" UsernameKey = "username" PasswordKey = "password" )
const TokenTypeConsul = "consul"
Variables ¶
This section is empty.
Functions ¶
func IsSecurityEnabled ¶
func IsSecurityEnabled() bool
IsSecurityEnabled determines if security has been enabled.
func NewSecretProvider ¶
func NewSecretProvider( configuration interfaces.Configuration, ctx context.Context, startupTimer startup.Timer, dic *di.Container) (interfaces.SecretProvider, error)
NewSecretProvider creates a new fully initialized the Secret Provider.
Types ¶
type InsecureProvider ¶
type InsecureProvider struct {
// contains filtered or unexported fields
}
InsecureProvider implements the SecretProvider interface for insecure secrets
func NewInsecureProvider ¶
func NewInsecureProvider(config interfaces.Configuration, lc logger.LoggingClient) *InsecureProvider
NewInsecureProvider creates, initializes Provider for insecure secrets.
func (*InsecureProvider) GetAccessToken ¶
func (p *InsecureProvider) GetAccessToken(_ string, _ string) (string, error)
GetAccessToken returns the AccessToken for the specified type, which in insecure mode is not need so just returning an empty token.
func (*InsecureProvider) GetSecret ¶
GetSecret retrieves secrets from a Insecure Secrets secret store. path specifies the type or location of the secrets to retrieve. keys specifies the secrets which to retrieve. If no keys are provided then all the keys associated with the specified path will be returned.
func (*InsecureProvider) SecretsLastUpdated ¶
func (p *InsecureProvider) SecretsLastUpdated() time.Time
SecretsLastUpdated returns the last time insecure secrets were updated
func (*InsecureProvider) SecretsUpdated ¶
func (p *InsecureProvider) SecretsUpdated()
SecretsUpdated resets LastUpdate time for the Insecure Secrets.
func (*InsecureProvider) StoreSecret ¶
func (p *InsecureProvider) StoreSecret(_ string, _ map[string]string) error
StoreSecret stores the secrets, but is not supported for Insecure Secrets
type SecureProvider ¶
type SecureProvider struct {
// contains filtered or unexported fields
}
SecureProvider implements the SecretProvider interface
func NewSecureProvider ¶
func NewSecureProvider(config interfaces.Configuration, lc logger.LoggingClient, loader authtokenloader.AuthTokenLoader) *SecureProvider
NewSecureProvider creates & initializes Provider instance for secure secrets.
func (*SecureProvider) DefaultTokenExpiredCallback ¶
func (p *SecureProvider) DefaultTokenExpiredCallback(expiredToken string) (replacementToken string, retry bool)
defaultTokenExpiredCallback is the default implementation of tokenExpiredCallback function It utilizes the tokenFile to re-read the token and enable retry if any update from the expired token
func (*SecureProvider) GetAccessToken ¶
func (p *SecureProvider) GetAccessToken(tokenType string, serviceKey string) (string, error)
GetAccessToken returns the access token for the requested token type.
func (*SecureProvider) GetSecret ¶
GetSecret retrieves secrets from a secret store. path specifies the type or location of the secrets to retrieve. keys specifies the secrets which to retrieve. If no keys are provided then all the keys associated with the specified path will be returned.
func (*SecureProvider) SecretsLastUpdated ¶
func (p *SecureProvider) SecretsLastUpdated() time.Time
SecretsLastUpdated returns the last time secure secrets were updated
func (*SecureProvider) SecretsUpdated ¶
func (p *SecureProvider) SecretsUpdated()
SecretsUpdated is not need for secure secrets as this is handled when secrets are stored.
func (*SecureProvider) SetClient ¶
func (p *SecureProvider) SetClient(client secrets.SecretClient)
SetClient sets the secret client that is used to access the secure secrets
func (*SecureProvider) StoreSecret ¶
func (p *SecureProvider) StoreSecret(path string, secrets map[string]string) error
StoreSecret stores the secrets to a secret store. it sets the values requested at provided keys path specifies the type or location of the secrets to store secrets map specifies the "key": "value" pairs of secrets to store