Documentation
¶
Index ¶
- Constants
- Variables
- type Application
- type Applications
- type Auth
- type AuthConfig
- type AuthRole
- type Config
- type ConsulKV
- type ConsulKVs
- type ConsulService
- type ConsulServices
- type Environment
- type Environments
- func (e *Environments) Add(environment *Environment)
- func (e *Environments) Contains(environmentName string) bool
- func (e *Environments) Exists(environment *Environment) bool
- func (e *Environments) Get(environment *Environment) *Environment
- func (e *Environments) GetOrSet(environment *Environment) *Environment
- type Mount
- type MountConfig
- type MountRole
- type MountRoles
- type PathCapabilities
- type Permissions
- type Policy
- type Secret
- type VaultAuths
- type VaultMounts
- type VaultPolicies
- type VaultSecrets
Constants ¶
View Source
const ( DenyCapability = "deny" CreateCapability = "create" ReadCapability = "read" UpdateCapability = "update" DeleteCapability = "delete" ListCapability = "list" SudoCapability = "sudo" RootCapability = "root" // Backwards compatibility OldDenyPathPolicy = "deny" OldReadPathPolicy = "read" OldWritePathPolicy = "write" OldSudoPathPolicy = "sudo" )
View Source
const ( DenyCapabilityInt uint32 = 1 << iota CreateCapabilityInt ReadCapabilityInt UpdateCapabilityInt DeleteCapabilityInt ListCapabilityInt SudoCapabilityInt )
Variables ¶
View Source
var DefaultConcurrency int
DefaultConcurrency ...
View Source
var TargetApplication string
TargetApplication ...
View Source
var TargetEnvironment string
TargetEnvironment ...
Functions ¶
This section is empty.
Types ¶
type Applications ¶
type Applications []*Application
Applications ...
func (*Applications) Exists ¶
func (a *Applications) Exists(application *Application) bool
Exists ...
func (*Applications) Get ¶
func (a *Applications) Get(application *Application) *Application
Get ...
func (*Applications) GetOrSet ¶
func (a *Applications) GetOrSet(application *Application) *Application
GetOrSet ...
type Auth ¶
type Auth struct { Environment *Environment Name string Type string Description string DefaultLeaseTTL string MaxLeaseTTL string Config []*AuthConfig Roles []*AuthRole }
Auth struct ...
type Config ¶
type Config struct { Applications Applications Environments Environments VaultMounts VaultMounts VaultPolicies VaultPolicies VaultSecrets VaultSecrets VaultAuths VaultAuths ConsulServices ConsulServices ConsulKVs ConsulKVs }
Config ...
func NewConfigFromCLI ¶
NewConfigFromCLI will take a CLI context and create config from it
func (*Config) ScanDirectory ¶
ScanDirectory ...
type ConsulKV ¶
type ConsulKV struct { Application *Application Environment *Environment Key string Value []byte }
ConsulKV ...
type ConsulService ¶
type ConsulService api.CatalogRegistration
ConsulService ...
func (*ConsulService) ToConsulService ¶
func (c *ConsulService) ToConsulService() *api.CatalogRegistration
ToConsulService ...
type Environment ¶
type Environment struct { Name string Applications Applications }
Environment struct
type Environments ¶
type Environments []*Environment
Environments struct
func (*Environments) Contains ¶
func (e *Environments) Contains(environmentName string) bool
Containts ...
func (*Environments) Exists ¶
func (e *Environments) Exists(environment *Environment) bool
Exists ...
func (*Environments) Get ¶
func (e *Environments) Get(environment *Environment) *Environment
Get ...
func (*Environments) GetOrSet ¶
func (e *Environments) GetOrSet(environment *Environment) *Environment
GetOrSet ...
type Mount ¶
type Mount struct { Environment *Environment Name string Type string Description string DefaultLeaseTTL string MaxLeaseTTL string ForceNoCache bool Config []*MountConfig Roles MountRoles }
Mount struct ...
type MountConfig ¶
MountConfig ...
type PathCapabilities ¶
type PathCapabilities struct { Prefix string Policy string Permissions *Permissions Glob bool Capabilities []string // These keys are used at the top level to make the HCL nicer; we store in // the Permissions object though MinWrappingTTLHCL interface{} `hcl:"min_wrapping_ttl"` MaxWrappingTTLHCL interface{} `hcl:"max_wrapping_ttl"` AllowedParametersHCL map[string][]interface{} `hcl:"allowed_parameters"` DeniedParametersHCL map[string][]interface{} `hcl:"denied_parameters"` }
PathCapabilities represents a policy for a path in the namespace.
type Permissions ¶
type Policy ¶
type Policy struct { Environment *Environment Application *Application Name string `hcl:"name"` Paths []*PathCapabilities `hcl:"-"` Raw string }
Policy is used to represent the policy specified by an ACL configuration.
type Secret ¶
type Secret struct { Application *Application Environment *Environment Path string Key string Secret *api.Secret // contains filtered or unexported fields }
Secret ...
type VaultSecrets ¶
type VaultSecrets []*Secret
VaultSecrets struct
environment -> application
func (*VaultSecrets) GetOrSet ¶
func (e *VaultSecrets) GetOrSet(secret *Secret) *Secret
GetOrSet ...
Source Files
¶
- config.go
- parse_application.go
- parse_consul_kv.go
- parse_consul_service.go
- parse_environment.go
- parse_vault_auth.go
- parse_vault_mount.go
- parse_vault_policy.go
- parse_vault_secret.go
- parser.go
- type_application.go
- type_config.go
- type_consul_kv.go
- type_consul_service.go
- type_environment.go
- type_vault_auth.go
- type_vault_mount.go
- type_vault_policy.go
- type_vault_secret.go
- vault_policy.go
Click to show internal directories.
Click to hide internal directories.