Documentation
¶
Index ¶
- Constants
- type Application
- type Applications
- type Auth
- type AuthConfig
- type AuthRole
- type Config
- type ConsulKV
- type ConsulKVs
- type ConsulService
- type ConsulServices
- type Environment
- type Environments
- type Mount
- type MountConfig
- type MountRole
- type MountRoles
- type PathCapabilities
- type Permissions
- type Policy
- type Scratch
- func (s *Scratch) Get(k string) interface{}
- func (s *Scratch) Key(k string) bool
- func (s *Scratch) MapGet(k, mk string) (interface{}, error)
- func (s *Scratch) MapSet(k, mk string, v interface{}) (string, error)
- func (s *Scratch) MapSetX(k, mk string, v interface{}) (string, error)
- func (s *Scratch) MapValues(k string) ([]interface{}, error)
- func (s *Scratch) Set(k string, v interface{}) string
- func (s *Scratch) SetX(k string, v interface{}) string
- type Secret
- type VaultAuths
- type VaultMounts
- type VaultPolicies
- type VaultSecrets
Constants ¶
View Source
const ( DenyCapability = "deny" CreateCapability = "create" ReadCapability = "read" UpdateCapability = "update" DeleteCapability = "delete" ListCapability = "list" SudoCapability = "sudo" RootCapability = "root" // Backwards compatibility OldDenyPathPolicy = "deny" OldReadPathPolicy = "read" OldWritePathPolicy = "write" OldSudoPathPolicy = "sudo" )
View Source
const ( DenyCapabilityInt uint32 = 1 << iota CreateCapabilityInt ReadCapabilityInt UpdateCapabilityInt DeleteCapabilityInt ListCapabilityInt SudoCapabilityInt )
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type Auth ¶
type Auth struct { Environment *Environment Name string Type string Description string DefaultLeaseTTL string MaxLeaseTTL string Config []*AuthConfig Roles []*AuthRole }
Auth struct ...
type Config ¶
type Config struct { Applications Applications ConsulKVs ConsulKVs ConsulServices ConsulServices Environments Environments VaultAuths VaultAuths VaultMounts VaultMounts VaultPolicies VaultPolicies VaultSecrets VaultSecrets // contains filtered or unexported fields }
Config ...
func NewConfigFromCLI ¶
NewConfigFromCLI will take a CLI context and create config from it
type ConsulKV ¶
type ConsulKV struct { Application *Application Environment *Environment Key string Value []byte }
ConsulKV ...
type ConsulService ¶
type ConsulService api.CatalogRegistration
ConsulService ...
func (*ConsulService) ToConsulService ¶
func (c *ConsulService) ToConsulService() *api.CatalogRegistration
ToConsulService ...
type Environment ¶
type Environment struct { Name string Applications Applications }
Environment struct
type Environments ¶
type Environments []*Environment
Environments struct
func (*Environments) Contains ¶
func (e *Environments) Contains(environmentName string) bool
Containts ...
type Mount ¶
type Mount struct { Environment *Environment Name string Type string Description string DefaultLeaseTTL string MaxLeaseTTL string ForceNoCache bool Config []*MountConfig Roles MountRoles }
Mount struct ...
type MountConfig ¶
MountConfig ...
type PathCapabilities ¶
type PathCapabilities struct { Prefix string Policy string Permissions *Permissions Glob bool Capabilities []string // These keys are used at the top level to make the HCL nicer; we store in // the Permissions object though MinWrappingTTLHCL interface{} `hcl:"min_wrapping_ttl"` MaxWrappingTTLHCL interface{} `hcl:"max_wrapping_ttl"` AllowedParametersHCL map[string][]interface{} `hcl:"allowed_parameters"` DeniedParametersHCL map[string][]interface{} `hcl:"denied_parameters"` }
PathCapabilities represents a policy for a path in the namespace.
type Permissions ¶
type Policy ¶
type Policy struct { Environment *Environment Application *Application Name string `hcl:"name"` Paths []*PathCapabilities `hcl:"-"` Raw string }
Policy is used to represent the policy specified by an ACL configuration.
type Scratch ¶
Scratch is a wrapper around a map which is used by the template.
func (*Scratch) MapSetX ¶
MapSetX behaves the same as MapSet, except it will not overwrite the map key if it already exists.
type Secret ¶
type Secret struct { Application *Application Environment *Environment Path string Key string VaultSecret *vault.Secret // contains filtered or unexported fields }
Secret ...
type VaultSecrets ¶
type VaultSecrets []*Secret
VaultSecrets struct
environment -> application
func (*VaultSecrets) GetOrSet ¶
func (e *VaultSecrets) GetOrSet(secret *Secret) *Secret
GetOrSet ...
func (*VaultSecrets) List ¶
func (e *VaultSecrets) List() []string
Click to show internal directories.
Click to hide internal directories.