Compare commits
55 Commits
Author | SHA1 | Date |
---|---|---|
|
e7312f630a | |
|
3ec883d85a | |
|
6f50ebcc3b | |
|
7943a77e76 | |
|
fa7c888c1e | |
|
73f9090a5c | |
|
571d7a5c49 | |
|
6da43b2e92 | |
|
a13ecac1c0 | |
|
bbf51edf17 | |
|
9da8df0d37 | |
|
052208495d | |
|
bc5f5deafa | |
|
80803711cd | |
|
6879e44a62 | |
|
22f368c29c | |
|
fe4b7df59e | |
|
ed499a14d8 | |
|
5a94c7e59f | |
|
1df225b23d | |
|
5627fc6f30 | |
|
75d43543c1 | |
|
e8284b82bc | |
|
053e17ca09 | |
|
4bacaf4b5f | |
|
627bef8961 | |
|
2d73c0cea4 | |
|
b5fb33ad3c | |
|
1433709715 | |
|
bd50d02a9d | |
|
0a1ba6863d | |
|
50d077fec8 | |
|
570854bd99 | |
|
59174ca488 | |
|
d54056301a | |
|
f7cb455150 | |
|
68f6ca21b4 | |
|
44b9b3771c | |
|
2329d7fee8 | |
|
26308b23eb | |
|
335763b4b4 | |
|
c1ebd57c90 | |
|
b94f65e01d | |
|
a51ef1e36f | |
|
1862e854be | |
|
63c9ad76de | |
|
58e8662189 | |
|
66a7676eb5 | |
|
1feb7575eb | |
|
cafe36b8f6 | |
|
2f90c1325f | |
|
1bef34085e | |
|
110a67c829 | |
|
5e28bf4f11 | |
|
aeda8afdb6 |
119
api/api.go
119
api/api.go
|
@ -49,11 +49,12 @@ func (a *Api) Close() {
|
||||||
// to the server.
|
// to the server.
|
||||||
//
|
//
|
||||||
// The function takes the following parameters:
|
// The function takes the following parameters:
|
||||||
// - name: The name of the policy to be created
|
// - name string: The name of the policy to be created
|
||||||
// - spiffeIdPattern: The SPIFFE ID pattern that this policy will apply to
|
// - spiffeIdPattern string: The SPIFFE ID pattern that this policy will apply
|
||||||
// - pathPattern: The path pattern that this policy will match against
|
// to
|
||||||
// - permissions: A slice of PolicyPermission defining the access rights for
|
// - pathPattern string: The path pattern that this policy will match against
|
||||||
// this policy
|
// - permissions []data.PolicyPermission: A slice of PolicyPermission defining
|
||||||
|
// the access rights for this policy
|
||||||
//
|
//
|
||||||
// The function returns an error if any of the following operations fail:
|
// The function returns an error if any of the following operations fail:
|
||||||
// - Marshaling the policy creation request
|
// - Marshaling the policy creation request
|
||||||
|
@ -71,7 +72,7 @@ func (a *Api) Close() {
|
||||||
// },
|
// },
|
||||||
// }
|
// }
|
||||||
//
|
//
|
||||||
// err = CreatePolicy(
|
// err = api.CreatePolicy(
|
||||||
// "doc-reader",
|
// "doc-reader",
|
||||||
// "spiffe://example.org/service/*",
|
// "spiffe://example.org/service/*",
|
||||||
// "/api/documents/*",
|
// "/api/documents/*",
|
||||||
|
@ -89,10 +90,10 @@ func (a *Api) CreatePolicy(
|
||||||
name, spiffeIdPattern, pathPattern, permissions)
|
name, spiffeIdPattern, pathPattern, permissions)
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeletePolicy removes an existing policy from the system using its Id.
|
// DeletePolicy removes an existing policy from the system using its name.
|
||||||
//
|
//
|
||||||
// The function takes the following parameters:
|
// The function takes the following parameters:
|
||||||
// - id: The unique identifier of the policy to be deleted
|
// - name string: The name of the policy to be deleted
|
||||||
//
|
//
|
||||||
// The function returns an error if any of the following operations fail:
|
// The function returns an error if any of the following operations fail:
|
||||||
// - Marshaling the policy deletion request
|
// - Marshaling the policy deletion request
|
||||||
|
@ -103,7 +104,7 @@ func (a *Api) CreatePolicy(
|
||||||
//
|
//
|
||||||
// Example usage:
|
// Example usage:
|
||||||
//
|
//
|
||||||
// err = DeletePolicy("policy-123")
|
// err = api.DeletePolicy("doc-reader")
|
||||||
// if err != nil {
|
// if err != nil {
|
||||||
// log.Printf("Failed to delete policy: %v", err)
|
// log.Printf("Failed to delete policy: %v", err)
|
||||||
// return
|
// return
|
||||||
|
@ -112,10 +113,10 @@ func (a *Api) DeletePolicy(name string) error {
|
||||||
return acl.DeletePolicy(a.source, name)
|
return acl.DeletePolicy(a.source, name)
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetPolicy retrieves a policy from the system using its Id.
|
// GetPolicy retrieves a policy from the system using its name.
|
||||||
//
|
//
|
||||||
// The function takes the following parameters:
|
// The function takes the following parameters:
|
||||||
// - id: The unique identifier of the policy to retrieve
|
// - name string: The name of the policy to retrieve
|
||||||
//
|
//
|
||||||
// The function returns:
|
// The function returns:
|
||||||
// - (*data.Policy, nil) if the policy is found
|
// - (*data.Policy, nil) if the policy is found
|
||||||
|
@ -131,7 +132,7 @@ func (a *Api) DeletePolicy(name string) error {
|
||||||
//
|
//
|
||||||
// Example usage:
|
// Example usage:
|
||||||
//
|
//
|
||||||
// policy, err := GetPolicy("policy-123")
|
// policy, err := api.GetPolicy("doc-reader")
|
||||||
// if err != nil {
|
// if err != nil {
|
||||||
// log.Printf("Error retrieving policy: %v", err)
|
// log.Printf("Error retrieving policy: %v", err)
|
||||||
// return
|
// return
|
||||||
|
@ -166,13 +167,7 @@ func (a *Api) GetPolicy(name string) (*data.Policy, error) {
|
||||||
//
|
//
|
||||||
// Example usage:
|
// Example usage:
|
||||||
//
|
//
|
||||||
// source, err := workloadapi.NewX509Source(context.Background())
|
// result, err := api.ListPolicies()
|
||||||
// if err != nil {
|
|
||||||
// log.Fatal(err)
|
|
||||||
// }
|
|
||||||
// defer source.Close()
|
|
||||||
//
|
|
||||||
// result, err := ListPolicies(source)
|
|
||||||
// if err != nil {
|
// if err != nil {
|
||||||
// log.Printf("Error listing policies: %v", err)
|
// log.Printf("Error listing policies: %v", err)
|
||||||
// return
|
// return
|
||||||
|
@ -193,13 +188,11 @@ func (a *Api) ListPolicies() (*[]data.Policy, error) {
|
||||||
// DeleteSecretVersions deletes specified versions of a secret at the given
|
// DeleteSecretVersions deletes specified versions of a secret at the given
|
||||||
// path
|
// path
|
||||||
//
|
//
|
||||||
// It converts string version numbers to integers, constructs a delete request,
|
// It constructs a delete request and sends it to the secrets API endpoint.
|
||||||
// and sends it to the secrets API endpoint. If no versions are specified or
|
|
||||||
// conversion fails, no versions will be deleted.
|
|
||||||
//
|
//
|
||||||
// Parameters:
|
// Parameters:
|
||||||
// - path: Path to the secret to delete
|
// - path string: Path to the secret to delete
|
||||||
// - versions: String array of version numbers to delete
|
// - versions []int: Array of version numbers to delete
|
||||||
//
|
//
|
||||||
// Returns:
|
// Returns:
|
||||||
// - error: nil on success, unauthorized error if not logged in, or wrapped
|
// - error: nil on success, unauthorized error if not logged in, or wrapped
|
||||||
|
@ -207,20 +200,15 @@ func (a *Api) ListPolicies() (*[]data.Policy, error) {
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
//
|
//
|
||||||
// err := DeleteSecretVersions("secret/path", []string{"1", "2"})
|
// err := api.DeleteSecretVersions("secret/path", []int{1, 2})
|
||||||
func (a *Api) DeleteSecretVersions(path string, versions []int) error {
|
func (a *Api) DeleteSecretVersions(path string, versions []int) error {
|
||||||
return secret.Delete(a.source, path, versions)
|
return secret.Delete(a.source, path, versions)
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeleteSecret deletes specified secret at the given path
|
// DeleteSecret deletes the entire secret at the given path
|
||||||
//
|
|
||||||
// It converts string version numbers to integers, constructs a delete request,
|
|
||||||
// and sends it to the secrets API endpoint. If no versions are specified or
|
|
||||||
// conversion fails, no versions will be deleted.
|
|
||||||
//
|
//
|
||||||
// Parameters:
|
// Parameters:
|
||||||
// - path: Path to the secret to delete
|
// - path string: Path to the secret to delete
|
||||||
// - versions: String array of version numbers to delete
|
|
||||||
//
|
//
|
||||||
// Returns:
|
// Returns:
|
||||||
// - error: nil on success, unauthorized error if not logged in, or wrapped
|
// - error: nil on success, unauthorized error if not logged in, or wrapped
|
||||||
|
@ -228,7 +216,7 @@ func (a *Api) DeleteSecretVersions(path string, versions []int) error {
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
//
|
//
|
||||||
// err := Delete("secret/path")
|
// err := api.DeleteSecret("secret/path")
|
||||||
func (a *Api) DeleteSecret(path string) error {
|
func (a *Api) DeleteSecret(path string) error {
|
||||||
return secret.Delete(a.source, path, []int{})
|
return secret.Delete(a.source, path, []int{})
|
||||||
}
|
}
|
||||||
|
@ -237,36 +225,36 @@ func (a *Api) DeleteSecret(path string) error {
|
||||||
// path.
|
// path.
|
||||||
//
|
//
|
||||||
// Parameters:
|
// Parameters:
|
||||||
// - path: Path to the secret to retrieve
|
// - path string: Path to the secret to retrieve
|
||||||
// - version: Version number of the secret to retrieve
|
// - version int: Version number of the secret to retrieve
|
||||||
//
|
//
|
||||||
// Returns:
|
// Returns:
|
||||||
// - *Secret: Secret data if found, nil if secret not found
|
// - *data.Secret: Secret data if found, nil if secret not found
|
||||||
// - error: nil on success, unauthorized error if not logged in, or
|
// - error: nil on success, unauthorized error if not logged in, or
|
||||||
// wrapped error on request/parsing failure
|
// wrapped error on request/parsing failure
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
//
|
//
|
||||||
// secret, err := GetSecretVersion("secret/path", 1)
|
// secret, err := api.GetSecretVersion("secret/path", 1)
|
||||||
func (a *Api) GetSecretVersion(
|
func (a *Api) GetSecretVersion(
|
||||||
path string, version int,
|
path string, version int,
|
||||||
) (*data.Secret, error) {
|
) (*data.Secret, error) {
|
||||||
return secret.Get(a.source, path, version)
|
return secret.Get(a.source, path, version)
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetSecret retrieves the secret at the given path.
|
// GetSecret retrieves the latest version of the secret at the given path.
|
||||||
//
|
//
|
||||||
// Parameters:
|
// Parameters:
|
||||||
// - path: Path to the secret to retrieve
|
// - path string: Path to the secret to retrieve
|
||||||
//
|
//
|
||||||
// Returns:
|
// Returns:
|
||||||
// - *Secret: Secret data if found, nil if secret not found
|
// - *data.Secret: Secret data if found, nil if secret not found
|
||||||
// - error: nil on success, unauthorized error if not logged in, or
|
// - error: nil on success, unauthorized error if not logged in, or
|
||||||
// wrapped error on request/parsing failure
|
// wrapped error on request/parsing failure
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
//
|
//
|
||||||
// secret, err := Get("secret/path")
|
// secret, err := api.GetSecret("secret/path")
|
||||||
func (a *Api) GetSecret(path string) (*data.Secret, error) {
|
func (a *Api) GetSecret(path string) (*data.Secret, error) {
|
||||||
return secret.Get(a.source, path, 0)
|
return secret.Get(a.source, path, 0)
|
||||||
}
|
}
|
||||||
|
@ -274,32 +262,32 @@ func (a *Api) GetSecret(path string) (*data.Secret, error) {
|
||||||
// ListSecretKeys retrieves all secret keys.
|
// ListSecretKeys retrieves all secret keys.
|
||||||
//
|
//
|
||||||
// Returns:
|
// Returns:
|
||||||
// - []string: Array of secret keys if found, empty array if none found
|
// - *[]string: Pointer to array of secret keys if found, nil if none found
|
||||||
// - error: nil on success, unauthorized error if not logged in, or
|
// - error: nil on success, unauthorized error if not logged in, or
|
||||||
// wrapped error on request/parsing failure
|
// wrapped error on request/parsing failure
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
//
|
//
|
||||||
// keys, err := ListKeys()
|
// keys, err := api.ListSecretKeys()
|
||||||
func (a *Api) ListSecretKeys() (*[]string, error) {
|
func (a *Api) ListSecretKeys() (*[]string, error) {
|
||||||
return secret.ListKeys(a.source)
|
return secret.ListKeys(a.source)
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetSecretMetadata retrieves a specific version of a secret metadata at the
|
// GetSecretMetadata retrieves metadata for a specific version of a secret at
|
||||||
// given path.
|
// the given path.
|
||||||
//
|
//
|
||||||
// Parameters:
|
// Parameters:
|
||||||
// - path: Path to the secret to retrieve
|
// - path string: Path to the secret to retrieve metadata for
|
||||||
// - version: Version number of the secret to retrieve
|
// - version int: Version number of the secret to retrieve metadata for
|
||||||
//
|
//
|
||||||
// Returns:
|
// Returns:
|
||||||
// - *Secret: Secret metadata if found, nil if secret not found
|
// - *data.SecretMetadata: Secret metadata if found, nil if secret not found
|
||||||
// - error: nil on success, unauthorized error if not logged in, or
|
// - error: nil on success, unauthorized error if not logged in, or
|
||||||
// wrapped error on request/parsing failure
|
// wrapped error on request/parsing failure
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
//
|
//
|
||||||
// metadata, err := GetMetadata("secret/path", 1)
|
// metadata, err := api.GetSecretMetadata("secret/path", 1)
|
||||||
func (a *Api) GetSecretMetadata(
|
func (a *Api) GetSecretMetadata(
|
||||||
path string, version int,
|
path string, version int,
|
||||||
) (*data.SecretMetadata, error) {
|
) (*data.SecretMetadata, error) {
|
||||||
|
@ -310,8 +298,9 @@ func (a *Api) GetSecretMetadata(
|
||||||
// values.
|
// values.
|
||||||
//
|
//
|
||||||
// Parameters:
|
// Parameters:
|
||||||
// - path: Path where the secret should be stored
|
// - path string: Path where the secret should be stored
|
||||||
// - values: Map of key-value pairs representing the secret data
|
// - data map[string]string: Map of key-value pairs representing the secret
|
||||||
|
// data
|
||||||
//
|
//
|
||||||
// Returns:
|
// Returns:
|
||||||
// - error: nil on success, unauthorized error if not logged in, or
|
// - error: nil on success, unauthorized error if not logged in, or
|
||||||
|
@ -319,7 +308,7 @@ func (a *Api) GetSecretMetadata(
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
//
|
//
|
||||||
// err := Put("secret/path", map[string]string{"key": "value"})
|
// err := api.PutSecret("secret/path", map[string]string{"key": "value"})
|
||||||
func (a *Api) PutSecret(path string, data map[string]string) error {
|
func (a *Api) PutSecret(path string, data map[string]string) error {
|
||||||
return secret.Put(a.source, path, data)
|
return secret.Put(a.source, path, data)
|
||||||
}
|
}
|
||||||
|
@ -328,8 +317,8 @@ func (a *Api) PutSecret(path string, data map[string]string) error {
|
||||||
// specified path.
|
// specified path.
|
||||||
//
|
//
|
||||||
// Parameters:
|
// Parameters:
|
||||||
// - path: Path to the secret to restore
|
// - path string: Path to the secret to restore
|
||||||
// - versions: String array of version numbers to restore. Empty array
|
// - versions []int: Array of version numbers to restore. Empty array
|
||||||
// attempts no restoration
|
// attempts no restoration
|
||||||
//
|
//
|
||||||
// Returns:
|
// Returns:
|
||||||
|
@ -338,27 +327,27 @@ func (a *Api) PutSecret(path string, data map[string]string) error {
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
//
|
//
|
||||||
// err := Undelete("secret/path", []string{"1", "2"})
|
// err := api.UndeleteSecret("secret/path", []int{1, 2})
|
||||||
func (a *Api) UndeleteSecret(path string, versions []int) error {
|
func (a *Api) UndeleteSecret(path string, versions []int) error {
|
||||||
return secret.Undelete(a.source, path, versions)
|
return secret.Undelete(a.source, path, versions)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Recover return recovery partitions for SPIKE Nexus to be used in a
|
// Recover returns recovery partitions for SPIKE Nexus to be used in a
|
||||||
// break-the-glass recovery operation if SPIKE Nexus auto-recovery mechanism
|
// break-the-glass recovery operation if SPIKE Nexus auto-recovery mechanism
|
||||||
// isn't successful.
|
// isn't successful.
|
||||||
//
|
//
|
||||||
// The returned shared are sensitive and should be securely stored out-of-band
|
// The returned shards are sensitive and should be securely stored out-of-band
|
||||||
// in encrypted form.
|
// in encrypted form.
|
||||||
//
|
//
|
||||||
// Returns:
|
// Returns:
|
||||||
// - []string: Array of recovery shards
|
// - *[][32]byte: Pointer to array of recovery shards as 32-byte arrays
|
||||||
// - error: nil on success, unauthorized error if not authorized, or
|
// - error: nil on success, unauthorized error if not authorized, or
|
||||||
// wrapped error on request/parsing failure
|
// wrapped error on request/parsing failure
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
//
|
//
|
||||||
// shards, err := Recover()
|
// shards, err := api.Recover()
|
||||||
func (a *Api) Recover() (*[]string, error) {
|
func (a *Api) Recover() (map[int]*[32]byte, error) {
|
||||||
return operator.Recover(a.source)
|
return operator.Recover(a.source)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -369,16 +358,16 @@ func (a *Api) Recover() (*[]string, error) {
|
||||||
// SPIKE deployment should not need.
|
// SPIKE deployment should not need.
|
||||||
//
|
//
|
||||||
// Parameters:
|
// Parameters:
|
||||||
// - shard: the shared to seed.
|
// - shard *[32]byte: Pointer to a 32-byte array containing the shard to seed
|
||||||
//
|
//
|
||||||
// Returns:
|
// Returns:
|
||||||
// - *RestorationStatus: Status of the restoration process if successful
|
// - *data.RestorationStatus: Status of the restoration process if successful
|
||||||
// - error: nil on success, unauthorized error if not authorized, or
|
// - error: nil on success, unauthorized error if not authorized, or
|
||||||
// wrapped error on request/parsing failure
|
// wrapped error on request/parsing failure
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
//
|
//
|
||||||
// status, err := Restore("randomShardString")
|
// status, err := api.Restore(shardPtr)
|
||||||
func (a *Api) Restore(shard string) (*data.RestorationStatus, error) {
|
func (a *Api) Restore(index int, shard *[32]byte) (*data.RestorationStatus, error) {
|
||||||
return operator.Restore(a.source, shard)
|
return operator.Restore(a.source, index, shard)
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,21 +0,0 @@
|
||||||
// \\ SPIKE: Secure your secrets with SPIFFE.
|
|
||||||
// \\\\\ Copyright 2024-present SPIKE contributors.
|
|
||||||
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
|
||||||
|
|
||||||
package reqres
|
|
||||||
|
|
||||||
import (
|
|
||||||
"github.com/spiffe/spike-sdk-go/api/entity/data"
|
|
||||||
)
|
|
||||||
|
|
||||||
// AdminTokenWriteRequest is to persist the admin token in memory.
|
|
||||||
// Admin token can be persisted only once. It is used to receive a
|
|
||||||
// short-lived session token.
|
|
||||||
type AdminTokenWriteRequest struct {
|
|
||||||
Data string `json:"data"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// AdminTokenWriteResponse is to persist the admin token in memory.
|
|
||||||
type AdminTokenWriteResponse struct {
|
|
||||||
Err data.ErrorCode `json:"err,omitempty"`
|
|
||||||
}
|
|
|
@ -6,18 +6,24 @@ package reqres
|
||||||
|
|
||||||
import "github.com/spiffe/spike-sdk-go/api/entity/data"
|
import "github.com/spiffe/spike-sdk-go/api/entity/data"
|
||||||
|
|
||||||
|
// RestoreRequest for disaster recovery.
|
||||||
type RestoreRequest struct {
|
type RestoreRequest struct {
|
||||||
Shard string `json:"shard"`
|
Id int `json:"id"`
|
||||||
|
Shard *[32]byte `json:"shard"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// RestoreResponse for disaster recovery.
|
||||||
type RestoreResponse struct {
|
type RestoreResponse struct {
|
||||||
data.RestorationStatus
|
data.RestorationStatus
|
||||||
Err data.ErrorCode `json:"err,omitempty"`
|
Err data.ErrorCode `json:"err,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// RecoverRequest for disaster recovery.
|
||||||
type RecoverRequest struct {
|
type RecoverRequest struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// RecoverResponse for disaster recovery.
|
||||||
type RecoverResponse struct {
|
type RecoverResponse struct {
|
||||||
Shards []string `json:"shards"`
|
Shards map[int]*[32]byte `json:"shards"`
|
||||||
Err data.ErrorCode `json:"err,omitempty"`
|
Err data.ErrorCode `json:"err,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
|
@ -8,6 +8,7 @@ import (
|
||||||
"github.com/spiffe/spike-sdk-go/api/entity/data"
|
"github.com/spiffe/spike-sdk-go/api/entity/data"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// PolicyCreateRequest for policy creation.
|
||||||
type PolicyCreateRequest struct {
|
type PolicyCreateRequest struct {
|
||||||
Name string `json:"name"`
|
Name string `json:"name"`
|
||||||
SpiffeIdPattern string `json:"spiffedPattern"`
|
SpiffeIdPattern string `json:"spiffedPattern"`
|
||||||
|
@ -15,41 +16,50 @@ type PolicyCreateRequest struct {
|
||||||
Permissions []data.PolicyPermission `json:"permissions"`
|
Permissions []data.PolicyPermission `json:"permissions"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// PolicyCreateResponse for policy creation.
|
||||||
type PolicyCreateResponse struct {
|
type PolicyCreateResponse struct {
|
||||||
Id string `json:"id,omitempty"`
|
Id string `json:"id,omitempty"`
|
||||||
Err data.ErrorCode `json:"err,omitempty"`
|
Err data.ErrorCode `json:"err,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// PolicyReadRequest to read a policy.
|
||||||
type PolicyReadRequest struct {
|
type PolicyReadRequest struct {
|
||||||
Id string `json:"id"`
|
Id string `json:"id"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// PolicyReadResponse to read a policy.
|
||||||
type PolicyReadResponse struct {
|
type PolicyReadResponse struct {
|
||||||
data.Policy
|
data.Policy
|
||||||
Err data.ErrorCode `json:"err,omitempty"`
|
Err data.ErrorCode `json:"err,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// PolicyDeleteRequest to delete a policy.
|
||||||
type PolicyDeleteRequest struct {
|
type PolicyDeleteRequest struct {
|
||||||
Id string `json:"id"`
|
Id string `json:"id"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// PolicyDeleteResponse to delete a policy.
|
||||||
type PolicyDeleteResponse struct {
|
type PolicyDeleteResponse struct {
|
||||||
Err data.ErrorCode `json:"err,omitempty"`
|
Err data.ErrorCode `json:"err,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// PolicyListRequest to list policies.
|
||||||
type PolicyListRequest struct{}
|
type PolicyListRequest struct{}
|
||||||
|
|
||||||
|
// PolicyListResponse to list policies.
|
||||||
type PolicyListResponse struct {
|
type PolicyListResponse struct {
|
||||||
Policies []data.Policy `json:"policies"`
|
Policies []data.Policy `json:"policies"`
|
||||||
Err data.ErrorCode `json:"err,omitempty"`
|
Err data.ErrorCode `json:"err,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// PolicyAccessCheckRequest to validate policy access.
|
||||||
type PolicyAccessCheckRequest struct {
|
type PolicyAccessCheckRequest struct {
|
||||||
SpiffeId string `json:"spiffeId"`
|
SpiffeId string `json:"spiffeId"`
|
||||||
Path string `json:"path"`
|
Path string `json:"path"`
|
||||||
Action string `json:"action"`
|
Action string `json:"action"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// PolicyAccessCheckResponse to validate policy access,.
|
||||||
type PolicyAccessCheckResponse struct {
|
type PolicyAccessCheckResponse struct {
|
||||||
Allowed bool `json:"allowed"`
|
Allowed bool `json:"allowed"`
|
||||||
MatchingPolicies []string `json:"matchingPolicies"`
|
MatchingPolicies []string `json:"matchingPolicies"`
|
||||||
|
|
|
@ -1,29 +0,0 @@
|
||||||
// \\ SPIKE: Secure your secrets with SPIFFE.
|
|
||||||
// \\\\\ Copyright 2024-present SPIKE contributors.
|
|
||||||
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
|
||||||
|
|
||||||
package reqres
|
|
||||||
|
|
||||||
import (
|
|
||||||
"github.com/spiffe/spike-sdk-go/api/entity/data"
|
|
||||||
)
|
|
||||||
|
|
||||||
// RootKeyCacheRequest is to cache the generated root key in SPIKE Keep.
|
|
||||||
// If the root key is lost due to a crash, it will be retrieved from SPIKE Keep.
|
|
||||||
type RootKeyCacheRequest struct {
|
|
||||||
RootKey string `json:"rootKey"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// RootKeyCacheResponse is to cache the generated root key in SPIKE Keep.
|
|
||||||
type RootKeyCacheResponse struct {
|
|
||||||
Err data.ErrorCode `json:"error,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// RootKeyReadRequest is a request to get the root key back from remote cache.
|
|
||||||
type RootKeyReadRequest struct{}
|
|
||||||
|
|
||||||
// RootKeyReadResponse is a response to get the root key back from remote cache.
|
|
||||||
type RootKeyReadResponse struct {
|
|
||||||
RootKey string `json:"rootKey"`
|
|
||||||
Err data.ErrorCode `json:"err,omitempty"`
|
|
||||||
}
|
|
|
@ -7,8 +7,7 @@ import "github.com/spiffe/spike-sdk-go/api/entity/data"
|
||||||
// Shard represents the shard data being contributed to the system.
|
// Shard represents the shard data being contributed to the system.
|
||||||
// Version optionally specifies the version of the shard being submitted.
|
// Version optionally specifies the version of the shard being submitted.
|
||||||
type ShardContributionRequest struct {
|
type ShardContributionRequest struct {
|
||||||
KeeperId string `json:"id"`
|
Shard *[32]byte `json:"shard"`
|
||||||
Shard string `json:"shard"`
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// ShardContributionResponse represents the response structure for a shard
|
// ShardContributionResponse represents the response structure for a shard
|
||||||
|
@ -24,6 +23,6 @@ type ShardRequest struct {
|
||||||
// ShardResponse represents the result of an operation on a specific data shard.
|
// ShardResponse represents the result of an operation on a specific data shard.
|
||||||
// The struct includes the shard identifier and an associated error code.
|
// The struct includes the shard identifier and an associated error code.
|
||||||
type ShardResponse struct {
|
type ShardResponse struct {
|
||||||
Shard string `json:"shard"`
|
Shard *[32]byte `json:"shard"`
|
||||||
Err data.ErrorCode
|
Err data.ErrorCode
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,3 +15,5 @@ var ErrAlreadyInitialized = errors.New("already initialized")
|
||||||
var ErrMissingRootKey = errors.New("missing root key")
|
var ErrMissingRootKey = errors.New("missing root key")
|
||||||
var ErrInvalidInput = errors.New("invalid input")
|
var ErrInvalidInput = errors.New("invalid input")
|
||||||
var ErrInvalidPermission = errors.New("invalid permission")
|
var ErrInvalidPermission = errors.New("invalid permission")
|
||||||
|
var ErrPeerConnection = errors.New("problem connecting to peer")
|
||||||
|
var ErrReadingResponseBody = errors.New("problem reading response body")
|
||||||
|
|
|
@ -30,34 +30,3 @@ func SpikeNexusDataFolder() string {
|
||||||
// The data dir is not configurable for security reasons.
|
// The data dir is not configurable for security reasons.
|
||||||
return filepath.Join(spikeDir, "/data")
|
return filepath.Join(spikeDir, "/data")
|
||||||
}
|
}
|
||||||
|
|
||||||
// SpikePilotRecoveryFolder returns the path to the directory where Pilot stores
|
|
||||||
// recovery material for its root key.
|
|
||||||
func SpikePilotRecoveryFolder() string {
|
|
||||||
homeDir, err := os.UserHomeDir()
|
|
||||||
if err != nil {
|
|
||||||
homeDir = "/tmp"
|
|
||||||
}
|
|
||||||
|
|
||||||
spikeDir := filepath.Join(homeDir, ".spike")
|
|
||||||
|
|
||||||
// Create directory if it doesn't exist
|
|
||||||
// 0700 because we want to restrict access to the directory
|
|
||||||
// but allow the user to create db files in it.
|
|
||||||
err = os.MkdirAll(spikeDir+"/recovery", 0700)
|
|
||||||
if err != nil {
|
|
||||||
panic(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// The data dir is not configurable for security reasons.
|
|
||||||
return filepath.Join(spikeDir, "/recovery")
|
|
||||||
}
|
|
||||||
|
|
||||||
// SpikePilotRootKeyRecoveryFile returns the path to the file where Pilot stores
|
|
||||||
// the root key recovery file.
|
|
||||||
func SpikePilotRootKeyRecoveryFile() string {
|
|
||||||
folder := SpikePilotRecoveryFolder()
|
|
||||||
|
|
||||||
// The file path and file name are NOT configurable for security reasons.
|
|
||||||
return filepath.Join(folder, ".root-key-recovery.spike")
|
|
||||||
}
|
|
||||||
|
|
|
@ -7,11 +7,11 @@ package operator
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
"github.com/spiffe/spike-sdk-go/api/url"
|
|
||||||
|
|
||||||
"github.com/spiffe/go-spiffe/v2/workloadapi"
|
"github.com/spiffe/go-spiffe/v2/workloadapi"
|
||||||
|
|
||||||
"github.com/spiffe/spike-sdk-go/api/entity/v1/reqres"
|
"github.com/spiffe/spike-sdk-go/api/entity/v1/reqres"
|
||||||
|
"github.com/spiffe/spike-sdk-go/api/url"
|
||||||
"github.com/spiffe/spike-sdk-go/net"
|
"github.com/spiffe/spike-sdk-go/net"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -22,8 +22,8 @@ import (
|
||||||
// - source: X509Source used for mTLS client authentication
|
// - source: X509Source used for mTLS client authentication
|
||||||
//
|
//
|
||||||
// Returns:
|
// Returns:
|
||||||
// - *[]string: Array of recovery shard identifiers if successful, nil if
|
// - map[int]*[32]byte: Map of shard indices to shard byte arrays if
|
||||||
// not found
|
// successful, nil if not found
|
||||||
// - error: nil on success, error if:
|
// - error: nil on success, error if:
|
||||||
// - Failed to marshal recover request
|
// - Failed to marshal recover request
|
||||||
// - Failed to create mTLS client
|
// - Failed to create mTLS client
|
||||||
|
@ -34,7 +34,7 @@ import (
|
||||||
// Example:
|
// Example:
|
||||||
//
|
//
|
||||||
// shards, err := Recover(x509Source)
|
// shards, err := Recover(x509Source)
|
||||||
func Recover(source *workloadapi.X509Source) (*[]string, error) {
|
func Recover(source *workloadapi.X509Source) (map[int]*[32]byte, error) {
|
||||||
r := reqres.RecoverRequest{}
|
r := reqres.RecoverRequest{}
|
||||||
|
|
||||||
mr, err := json.Marshal(r)
|
mr, err := json.Marshal(r)
|
||||||
|
@ -70,5 +70,11 @@ func Recover(source *workloadapi.X509Source) (*[]string, error) {
|
||||||
return nil, errors.New(string(res.Err))
|
return nil, errors.New(string(res.Err))
|
||||||
}
|
}
|
||||||
|
|
||||||
return &res.Shards, nil
|
result := make(map[int]*[32]byte)
|
||||||
|
|
||||||
|
for i, shard := range res.Shards {
|
||||||
|
result[i] = shard
|
||||||
|
}
|
||||||
|
|
||||||
|
return result, nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -7,24 +7,27 @@ package operator
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
"github.com/spiffe/spike-sdk-go/api/url"
|
|
||||||
|
|
||||||
"github.com/spiffe/go-spiffe/v2/workloadapi"
|
"github.com/spiffe/go-spiffe/v2/workloadapi"
|
||||||
|
|
||||||
"github.com/spiffe/spike-sdk-go/api/entity/data"
|
"github.com/spiffe/spike-sdk-go/api/entity/data"
|
||||||
"github.com/spiffe/spike-sdk-go/api/entity/v1/reqres"
|
"github.com/spiffe/spike-sdk-go/api/entity/v1/reqres"
|
||||||
|
"github.com/spiffe/spike-sdk-go/api/url"
|
||||||
"github.com/spiffe/spike-sdk-go/net"
|
"github.com/spiffe/spike-sdk-go/net"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Restore submits a recovery shard to continue the restoration process.
|
// Restore submits a recovery shard to continue the restoration process.
|
||||||
//
|
//
|
||||||
// Parameters:
|
// Parameters:
|
||||||
// - source: X509Source used for mTLS client authentication
|
// - source *workloadapi.X509Source: X509Source used for mTLS client
|
||||||
// - shard: Recovery shard identifier to submit
|
// authentication
|
||||||
|
// - shardIndex int: Index of the recovery shard
|
||||||
|
// - shardValue *[32]byte: Pointer to a 32-byte array containing the recovery
|
||||||
|
// shard
|
||||||
//
|
//
|
||||||
// Returns:
|
// Returns:
|
||||||
// - *RestorationStatus: Status containing shards collected, remaining, and
|
// - *data.RestorationStatus: Status containing shards collected, remaining,
|
||||||
// restoration state if successful, nil if not found
|
// and restoration state if successful, nil if not found
|
||||||
// - error: nil on success, error if:
|
// - error: nil on success, error if:
|
||||||
// - Failed to marshal restore request
|
// - Failed to marshal restore request
|
||||||
// - Failed to create mTLS client
|
// - Failed to create mTLS client
|
||||||
|
@ -34,13 +37,21 @@ import (
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
//
|
//
|
||||||
// status, err := Restore(x509Source, "randomshardentry")
|
// status, err := Restore(x509Source, shardIndex, shardValue)
|
||||||
func Restore(
|
func Restore(
|
||||||
source *workloadapi.X509Source, shard string,
|
source *workloadapi.X509Source, shardIndex int, shardValue *[32]byte,
|
||||||
) (*data.RestorationStatus, error) {
|
) (*data.RestorationStatus, error) {
|
||||||
r := reqres.RestoreRequest{Shard: shard}
|
r := reqres.RestoreRequest{
|
||||||
|
Id: shardIndex,
|
||||||
|
Shard: shardValue,
|
||||||
|
}
|
||||||
|
|
||||||
mr, err := json.Marshal(r)
|
mr, err := json.Marshal(r)
|
||||||
|
// Security: Zero out r.Shard as soon as we're done with it
|
||||||
|
for i := range r.Shard {
|
||||||
|
r.Shard[i] = 0
|
||||||
|
}
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.Join(
|
return nil, errors.Join(
|
||||||
errors.New("restore: failed to marshal recover request"),
|
errors.New("restore: failed to marshal recover request"),
|
||||||
|
@ -50,10 +61,19 @@ func Restore(
|
||||||
|
|
||||||
client, err := net.CreateMtlsClient(source)
|
client, err := net.CreateMtlsClient(source)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
// Security: Zero out mr before returning error
|
||||||
|
for i := range mr {
|
||||||
|
mr[i] = 0
|
||||||
|
}
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
body, err := net.Post(client, url.Restore(), mr)
|
body, err := net.Post(client, url.Restore(), mr)
|
||||||
|
// Security: Zero out mr after post request is complete
|
||||||
|
for i := range mr {
|
||||||
|
mr[i] = 0
|
||||||
|
}
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if errors.Is(err, net.ErrNotFound) {
|
if errors.Is(err, net.ErrNotFound) {
|
||||||
return nil, nil
|
return nil, nil
|
||||||
|
|
|
@ -4,21 +4,17 @@
|
||||||
|
|
||||||
package url
|
package url
|
||||||
|
|
||||||
type SpikeNexusApiAction string
|
type ApiAction string
|
||||||
|
|
||||||
const keyApiAction = "action"
|
const KeyApiAction = "action"
|
||||||
|
|
||||||
const actionNexusCheck SpikeNexusApiAction = "check"
|
const ActionCheck ApiAction = "check"
|
||||||
const actionNexusGet SpikeNexusApiAction = "get"
|
const ActionGet ApiAction = "get"
|
||||||
const actionNexusDelete SpikeNexusApiAction = "delete"
|
const ActionDelete ApiAction = "delete"
|
||||||
const actionNexusUndelete SpikeNexusApiAction = "undelete"
|
const ActionUndelete ApiAction = "undelete"
|
||||||
const actionNexusList SpikeNexusApiAction = "list"
|
const ActionList ApiAction = "list"
|
||||||
const actionNexusDefault SpikeNexusApiAction = ""
|
const ActionDefault ApiAction = ""
|
||||||
|
const ActionRead ApiAction = "read"
|
||||||
type SpikeKeeperApiAction string
|
|
||||||
|
|
||||||
const actionKeeperRead SpikeKeeperApiAction = "read"
|
|
||||||
const actionKeeperDefault SpikeKeeperApiAction = ""
|
|
||||||
|
|
||||||
type ApiUrl string
|
type ApiUrl string
|
||||||
|
|
||||||
|
@ -28,13 +24,9 @@ const SpikeNexusUrlInit ApiUrl = "/v1/auth/initialization"
|
||||||
|
|
||||||
const SpikeNexusUrlPolicy ApiUrl = "/v1/acl/policy"
|
const SpikeNexusUrlPolicy ApiUrl = "/v1/acl/policy"
|
||||||
|
|
||||||
const SpikeNexusUrlRecover ApiUrl = "/v1/operator/recover"
|
const SpikeNexusUrlOperatorRecover ApiUrl = "/v1/operator/recover"
|
||||||
const SpikeNexusUrlRestore ApiUrl = "/v1/operator/restore"
|
const SpikeNexusUrlOperatorRestore ApiUrl = "/v1/operator/restore"
|
||||||
|
|
||||||
const SpikeKeeperUrlKeep ApiUrl = "/v1/store/keep"
|
const SpikeKeeperUrlKeep ApiUrl = "/v1/store/keep"
|
||||||
|
|
||||||
const SpikeNexusUrlOperatorRestore = "/v1/operator/restore"
|
|
||||||
const SpikeNexusUrlOperatorRecover = "/v1/operator/recover"
|
|
||||||
|
|
||||||
const SpikeKeeperUrlContribute ApiUrl = "/v1/store/contribute"
|
const SpikeKeeperUrlContribute ApiUrl = "/v1/store/contribute"
|
||||||
const SpikeKeeperUrlShard ApiUrl = "/v1/store/shard"
|
const SpikeKeeperUrlShard ApiUrl = "/v1/store/shard"
|
||||||
|
|
|
@ -13,7 +13,7 @@ import (
|
||||||
func Restore() string {
|
func Restore() string {
|
||||||
u, _ := url.JoinPath(
|
u, _ := url.JoinPath(
|
||||||
env.NexusApiRoot(),
|
env.NexusApiRoot(),
|
||||||
string(SpikeNexusUrlRestore),
|
string(SpikeNexusUrlOperatorRestore),
|
||||||
)
|
)
|
||||||
return u
|
return u
|
||||||
}
|
}
|
||||||
|
@ -21,7 +21,7 @@ func Restore() string {
|
||||||
func Recover() string {
|
func Recover() string {
|
||||||
u, _ := url.JoinPath(
|
u, _ := url.JoinPath(
|
||||||
env.NexusApiRoot(),
|
env.NexusApiRoot(),
|
||||||
string(SpikeNexusUrlRecover),
|
string(SpikeNexusUrlOperatorRecover),
|
||||||
)
|
)
|
||||||
return u
|
return u
|
||||||
}
|
}
|
||||||
|
|
|
@ -26,7 +26,7 @@ func PolicyList() string {
|
||||||
string(SpikeNexusUrlPolicy),
|
string(SpikeNexusUrlPolicy),
|
||||||
)
|
)
|
||||||
params := url.Values{}
|
params := url.Values{}
|
||||||
params.Add(keyApiAction, string(actionNexusList))
|
params.Add(KeyApiAction, string(ActionList))
|
||||||
return u + "?" + params.Encode()
|
return u + "?" + params.Encode()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -37,7 +37,7 @@ func PolicyDelete() string {
|
||||||
string(SpikeNexusUrlPolicy),
|
string(SpikeNexusUrlPolicy),
|
||||||
)
|
)
|
||||||
params := url.Values{}
|
params := url.Values{}
|
||||||
params.Add(keyApiAction, string(actionNexusDelete))
|
params.Add(KeyApiAction, string(ActionDelete))
|
||||||
return u + "?" + params.Encode()
|
return u + "?" + params.Encode()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -48,6 +48,6 @@ func PolicyGet() string {
|
||||||
string(SpikeNexusUrlPolicy),
|
string(SpikeNexusUrlPolicy),
|
||||||
)
|
)
|
||||||
params := url.Values{}
|
params := url.Values{}
|
||||||
params.Add(keyApiAction, string(actionNexusGet))
|
params.Add(KeyApiAction, string(ActionGet))
|
||||||
return u + "?" + params.Encode()
|
return u + "?" + params.Encode()
|
||||||
}
|
}
|
||||||
|
|
|
@ -10,18 +10,18 @@ import (
|
||||||
"github.com/spiffe/spike-sdk-go/api/internal/env"
|
"github.com/spiffe/spike-sdk-go/api/internal/env"
|
||||||
)
|
)
|
||||||
|
|
||||||
// UrlSecretGet returns the URL for getting a secret.
|
// SecretGet returns the URL for getting a secret.
|
||||||
func SecretGet() string {
|
func SecretGet() string {
|
||||||
u, _ := url.JoinPath(
|
u, _ := url.JoinPath(
|
||||||
env.NexusApiRoot(),
|
env.NexusApiRoot(),
|
||||||
string(SpikeNexusUrlSecrets),
|
string(SpikeNexusUrlSecrets),
|
||||||
)
|
)
|
||||||
params := url.Values{}
|
params := url.Values{}
|
||||||
params.Add(keyApiAction, string(actionNexusGet))
|
params.Add(KeyApiAction, string(ActionGet))
|
||||||
return u + "?" + params.Encode()
|
return u + "?" + params.Encode()
|
||||||
}
|
}
|
||||||
|
|
||||||
// UrlSecretPut returns the URL for putting a secret.
|
// SecretPut returns the URL for putting a secret.
|
||||||
func SecretPut() string {
|
func SecretPut() string {
|
||||||
u, _ := url.JoinPath(
|
u, _ := url.JoinPath(
|
||||||
env.NexusApiRoot(),
|
env.NexusApiRoot(),
|
||||||
|
@ -30,46 +30,46 @@ func SecretPut() string {
|
||||||
return u
|
return u
|
||||||
}
|
}
|
||||||
|
|
||||||
// UrlSecretDelete returns the URL for deleting a secret.
|
// SecretDelete returns the URL for deleting a secret.
|
||||||
func SecretDelete() string {
|
func SecretDelete() string {
|
||||||
u, _ := url.JoinPath(
|
u, _ := url.JoinPath(
|
||||||
env.NexusApiRoot(),
|
env.NexusApiRoot(),
|
||||||
string(SpikeNexusUrlSecrets),
|
string(SpikeNexusUrlSecrets),
|
||||||
)
|
)
|
||||||
params := url.Values{}
|
params := url.Values{}
|
||||||
params.Add(keyApiAction, string(actionNexusDelete))
|
params.Add(KeyApiAction, string(ActionDelete))
|
||||||
return u + "?" + params.Encode()
|
return u + "?" + params.Encode()
|
||||||
}
|
}
|
||||||
|
|
||||||
// UrlSecretUndelete returns the URL for undeleting a secret.
|
// SecretUndelete returns the URL for undeleting a secret.
|
||||||
func SecretUndelete() string {
|
func SecretUndelete() string {
|
||||||
u, _ := url.JoinPath(
|
u, _ := url.JoinPath(
|
||||||
env.NexusApiRoot(),
|
env.NexusApiRoot(),
|
||||||
string(SpikeNexusUrlSecrets),
|
string(SpikeNexusUrlSecrets),
|
||||||
)
|
)
|
||||||
params := url.Values{}
|
params := url.Values{}
|
||||||
params.Add(keyApiAction, string(actionNexusUndelete))
|
params.Add(KeyApiAction, string(ActionUndelete))
|
||||||
return u + "?" + params.Encode()
|
return u + "?" + params.Encode()
|
||||||
}
|
}
|
||||||
|
|
||||||
// UrlSecretList returns the URL for listing secrets.
|
// SecretList returns the URL for listing secrets.
|
||||||
func SecretList() string {
|
func SecretList() string {
|
||||||
u, _ := url.JoinPath(
|
u, _ := url.JoinPath(
|
||||||
env.NexusApiRoot(),
|
env.NexusApiRoot(),
|
||||||
string(SpikeNexusUrlSecrets),
|
string(SpikeNexusUrlSecrets),
|
||||||
)
|
)
|
||||||
params := url.Values{}
|
params := url.Values{}
|
||||||
params.Add(keyApiAction, string(actionNexusList))
|
params.Add(KeyApiAction, string(ActionList))
|
||||||
return u + "?" + params.Encode()
|
return u + "?" + params.Encode()
|
||||||
}
|
}
|
||||||
|
|
||||||
// UrlSecretMetadataGet returns the URL for getting a secret metadata.
|
// SecretMetadataGet returns the URL for getting a secret metadata.
|
||||||
func SecretMetadataGet() string {
|
func SecretMetadataGet() string {
|
||||||
u, _ := url.JoinPath(
|
u, _ := url.JoinPath(
|
||||||
env.NexusApiRoot(),
|
env.NexusApiRoot(),
|
||||||
string(SpikeNexusUrlSecretsMetadata),
|
string(SpikeNexusUrlSecretsMetadata),
|
||||||
)
|
)
|
||||||
params := url.Values{}
|
params := url.Values{}
|
||||||
params.Add(keyApiAction, string(actionNexusGet))
|
params.Add(KeyApiAction, string(ActionGet))
|
||||||
return u + "?" + params.Encode()
|
return u + "?" + params.Encode()
|
||||||
}
|
}
|
||||||
|
|
|
@ -10,7 +10,7 @@ import (
|
||||||
"github.com/spiffe/spike-sdk-go/api/internal/env"
|
"github.com/spiffe/spike-sdk-go/api/internal/env"
|
||||||
)
|
)
|
||||||
|
|
||||||
// UrlInit returns the URL for initializing SPIKE Nexus.
|
// Init returns the URL for initializing SPIKE Nexus.
|
||||||
func Init() string {
|
func Init() string {
|
||||||
u, _ := url.JoinPath(
|
u, _ := url.JoinPath(
|
||||||
env.NexusApiRoot(),
|
env.NexusApiRoot(),
|
||||||
|
@ -19,7 +19,7 @@ func Init() string {
|
||||||
return u
|
return u
|
||||||
}
|
}
|
||||||
|
|
||||||
// UrlInitState returns the URL for checking the initialization state of
|
// InitState returns the URL for checking the initialization state of
|
||||||
// SPIKE Nexus.
|
// SPIKE Nexus.
|
||||||
func InitState() string {
|
func InitState() string {
|
||||||
u, _ := url.JoinPath(
|
u, _ := url.JoinPath(
|
||||||
|
@ -27,6 +27,6 @@ func InitState() string {
|
||||||
string(SpikeNexusUrlInit),
|
string(SpikeNexusUrlInit),
|
||||||
)
|
)
|
||||||
params := url.Values{}
|
params := url.Values{}
|
||||||
params.Add(keyApiAction, string(actionNexusCheck))
|
params.Add(KeyApiAction, string(ActionCheck))
|
||||||
return u + "?" + params.Encode()
|
return u + "?" + params.Encode()
|
||||||
}
|
}
|
||||||
|
|
25
go.mod
25
go.mod
|
@ -1,27 +1,28 @@
|
||||||
module github.com/spiffe/spike-sdk-go
|
module github.com/spiffe/spike-sdk-go
|
||||||
|
|
||||||
go 1.23.3
|
go 1.24
|
||||||
|
|
||||||
|
toolchain go1.24.1
|
||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/cenkalti/backoff/v4 v4.3.0
|
github.com/cenkalti/backoff/v4 v4.3.0
|
||||||
github.com/google/uuid v1.6.0
|
github.com/google/uuid v1.6.0
|
||||||
github.com/spiffe/go-spiffe/v2 v2.4.0
|
github.com/spiffe/go-spiffe/v2 v2.5.0
|
||||||
github.com/stretchr/testify v1.9.0
|
github.com/stretchr/testify v1.10.0
|
||||||
)
|
)
|
||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/Microsoft/go-winio v0.6.2 // indirect
|
github.com/Microsoft/go-winio v0.6.2 // indirect
|
||||||
github.com/davecgh/go-spew v1.1.1 // indirect
|
github.com/davecgh/go-spew v1.1.1 // indirect
|
||||||
github.com/go-jose/go-jose/v4 v4.0.4 // indirect
|
github.com/go-jose/go-jose/v4 v4.1.0 // indirect
|
||||||
github.com/kr/text v0.2.0 // indirect
|
github.com/kr/text v0.2.0 // indirect
|
||||||
github.com/pmezard/go-difflib v1.0.0 // indirect
|
github.com/pmezard/go-difflib v1.0.0 // indirect
|
||||||
github.com/zeebo/errs v1.3.0 // indirect
|
github.com/zeebo/errs v1.4.0 // indirect
|
||||||
golang.org/x/crypto v0.26.0 // indirect
|
golang.org/x/net v0.39.0 // indirect
|
||||||
golang.org/x/net v0.28.0 // indirect
|
golang.org/x/sys v0.32.0 // indirect
|
||||||
golang.org/x/sys v0.24.0 // indirect
|
golang.org/x/text v0.24.0 // indirect
|
||||||
golang.org/x/text v0.17.0 // indirect
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20250428153025-10db94c68c34 // indirect
|
||||||
google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142 // indirect
|
google.golang.org/grpc v1.72.0 // indirect
|
||||||
google.golang.org/grpc v1.67.1 // indirect
|
google.golang.org/protobuf v1.36.6 // indirect
|
||||||
google.golang.org/protobuf v1.34.2 // indirect
|
|
||||||
gopkg.in/yaml.v3 v3.0.1 // indirect
|
gopkg.in/yaml.v3 v3.0.1 // indirect
|
||||||
)
|
)
|
||||||
|
|
151
go.sum
151
go.sum
|
@ -1,42 +1,169 @@
|
||||||
|
cel.dev/expr v0.16.0 h1:yloc84fytn4zmJX2GU3TkXGsaieaV7dQ057Qs4sIG2Y=
|
||||||
|
cel.dev/expr v0.16.0/go.mod h1:TRSuuV7DlVCE/uwv5QbAiW/v8l5O8C4eEPHeu7gf7Sg=
|
||||||
|
cel.dev/expr v0.19.0 h1:lXuo+nDhpyJSpWxpPVi5cPUwzKb+dsdOiw6IreM5yt0=
|
||||||
|
cel.dev/expr v0.19.0/go.mod h1:MrpN08Q+lEBs+bGYdLxxHkZoUSsCp0nSKTs0nTymJgw=
|
||||||
|
cel.dev/expr v0.20.0 h1:OunBvVCfvpWlt4dN7zg3FM6TDkzOePe1+foGJ9AXeeI=
|
||||||
|
cloud.google.com/go/compute/metadata v0.5.0 h1:Zr0eK8JbFv6+Wi4ilXAR8FJ3wyNdpxHKJNPos6LTZOY=
|
||||||
|
cloud.google.com/go/compute/metadata v0.5.0/go.mod h1:aHnloV2TPI38yx4s9+wAZhHykWvVCfu7hQbF+9CWoiY=
|
||||||
|
cloud.google.com/go/compute/metadata v0.5.2 h1:UxK4uu/Tn+I3p2dYWTfiX4wva7aYlKixAHn3fyqngqo=
|
||||||
|
cloud.google.com/go/compute/metadata v0.5.2/go.mod h1:C66sj2AluDcIqakBq/M8lw8/ybHgOZqin2obFxa/E5k=
|
||||||
|
cloud.google.com/go/compute/metadata v0.6.0 h1:A6hENjEsCDtC1k8byVsgwvVcioamEHvZ4j01OwKxG9I=
|
||||||
|
github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.25.0 h1:3c8yed4lgqTt+oTQ+JNMDo+F4xprBf+O/il4ZC0nRLw=
|
||||||
|
github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.25.0/go.mod h1:obipzmGjfSjam60XLwGfqUkJsfiheAl+TUjG+4yzyPM=
|
||||||
|
github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.26.0 h1:f2Qw/Ehhimh5uO1fayV0QIW7DShEQqhtUfhYc+cBPlw=
|
||||||
github.com/Microsoft/go-winio v0.6.2 h1:F2VQgta7ecxGYO8k3ZZz3RS8fVIXVxONVUPlNERoyfY=
|
github.com/Microsoft/go-winio v0.6.2 h1:F2VQgta7ecxGYO8k3ZZz3RS8fVIXVxONVUPlNERoyfY=
|
||||||
github.com/Microsoft/go-winio v0.6.2/go.mod h1:yd8OoFMLzJbo9gZq8j5qaps8bJ9aShtEA8Ipt1oGCvU=
|
github.com/Microsoft/go-winio v0.6.2/go.mod h1:yd8OoFMLzJbo9gZq8j5qaps8bJ9aShtEA8Ipt1oGCvU=
|
||||||
github.com/cenkalti/backoff/v4 v4.3.0 h1:MyRJ/UdXutAwSAT+s3wNd7MfTIcy71VQueUuFK343L8=
|
github.com/cenkalti/backoff/v4 v4.3.0 h1:MyRJ/UdXutAwSAT+s3wNd7MfTIcy71VQueUuFK343L8=
|
||||||
github.com/cenkalti/backoff/v4 v4.3.0/go.mod h1:Y3VNntkOUPxTVeUxJ/G5vcM//AlwfmyYozVcomhLiZE=
|
github.com/cenkalti/backoff/v4 v4.3.0/go.mod h1:Y3VNntkOUPxTVeUxJ/G5vcM//AlwfmyYozVcomhLiZE=
|
||||||
|
github.com/census-instrumentation/opencensus-proto v0.4.1 h1:iKLQ0xPNFxR/2hzXZMrBo8f1j86j5WHzznCCQxV/b8g=
|
||||||
|
github.com/census-instrumentation/opencensus-proto v0.4.1/go.mod h1:4T9NM4+4Vw91VeyqjLS6ao50K5bOcLKN6Q42XnYaRYw=
|
||||||
|
github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs=
|
||||||
|
github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
|
||||||
|
github.com/cncf/xds/go v0.0.0-20240723142845-024c85f92f20 h1:N+3sFI5GUjRKBi+i0TxYVST9h4Ie192jJWpHvthBBgg=
|
||||||
|
github.com/cncf/xds/go v0.0.0-20240723142845-024c85f92f20/go.mod h1:W+zGtBO5Y1IgJhy4+A9GOqVhqLpfZi+vwmdNXUehLA8=
|
||||||
|
github.com/cncf/xds/go v0.0.0-20240905190251-b4127c9b8d78 h1:QVw89YDxXxEe+l8gU8ETbOasdwEV+avkR75ZzsVV9WI=
|
||||||
|
github.com/cncf/xds/go v0.0.0-20240905190251-b4127c9b8d78/go.mod h1:W+zGtBO5Y1IgJhy4+A9GOqVhqLpfZi+vwmdNXUehLA8=
|
||||||
|
github.com/cncf/xds/go v0.0.0-20250121191232-2f005788dc42 h1:Om6kYQYDUk5wWbT0t0q6pvyM49i9XZAv9dDrkDA7gjk=
|
||||||
|
github.com/creack/pty v1.1.9 h1:uDmaGzcdjhF4i/plgjmEsriH11Y0o7RKapEf/LDaM3w=
|
||||||
github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E=
|
github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E=
|
||||||
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
||||||
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
github.com/go-jose/go-jose/v4 v4.0.4 h1:VsjPI33J0SB9vQM6PLmNjoHqMQNGPiZ0rHL7Ni7Q6/E=
|
github.com/envoyproxy/go-control-plane v0.13.0 h1:HzkeUz1Knt+3bK+8LG1bxOO/jzWZmdxpwC51i202les=
|
||||||
github.com/go-jose/go-jose/v4 v4.0.4/go.mod h1:NKb5HO1EZccyMpiZNbdUw/14tiXNyUJh188dfnMCAfc=
|
github.com/envoyproxy/go-control-plane v0.13.0/go.mod h1:GRaKG3dwvFoTg4nj7aXdZnvMg4d7nvT/wl9WgVXn3Q8=
|
||||||
|
github.com/envoyproxy/go-control-plane v0.13.1 h1:vPfJZCkob6yTMEgS+0TwfTUfbHjfy/6vOJ8hUWX/uXE=
|
||||||
|
github.com/envoyproxy/go-control-plane v0.13.1/go.mod h1:X45hY0mufo6Fd0KW3rqsGvQMw58jvjymeCzBU3mWyHw=
|
||||||
|
github.com/envoyproxy/go-control-plane v0.13.4 h1:zEqyPVyku6IvWCFwux4x9RxkLOMUL+1vC9xUFv5l2/M=
|
||||||
|
github.com/envoyproxy/protoc-gen-validate v1.1.0 h1:tntQDh69XqOCOZsDz0lVJQez/2L6Uu2PdjCQwWCJ3bM=
|
||||||
|
github.com/envoyproxy/protoc-gen-validate v1.1.0/go.mod h1:sXRDRVmzEbkM7CVcM06s9shE/m23dg3wzjl0UWqJ2q4=
|
||||||
|
github.com/envoyproxy/protoc-gen-validate v1.2.1 h1:DEo3O99U8j4hBFwbJfrz9VtgcDfUKS7KJ7spH3d86P8=
|
||||||
|
github.com/go-jose/go-jose/v4 v4.0.5 h1:M6T8+mKZl/+fNNuFHvGIzDz7BTLQPIounk/b9dw3AaE=
|
||||||
|
github.com/go-jose/go-jose/v4 v4.0.5/go.mod h1:s3P1lRrkT8igV8D9OjyL4WRyHvjB6a4JSllnOrmmBOA=
|
||||||
|
github.com/go-jose/go-jose/v4 v4.1.0 h1:cYSYxd3pw5zd2FSXk2vGdn9igQU2PS8MuxrCOCl0FdY=
|
||||||
|
github.com/go-jose/go-jose/v4 v4.1.0/go.mod h1:GG/vqmYm3Von2nYiB2vGTXzdoNKE5tix5tuc6iAd+sw=
|
||||||
|
github.com/go-logr/logr v1.4.2 h1:6pFjapn8bFcIbiKo3XT4j/BhANplGihG6tvd+8rYgrY=
|
||||||
|
github.com/go-logr/logr v1.4.2/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
|
||||||
|
github.com/go-logr/stdr v1.2.2 h1:hSWxHoqTgW2S2qGc0LTAI563KZ5YKYRhT3MFKZMbjag=
|
||||||
|
github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre4VKE=
|
||||||
|
github.com/golang/glog v1.2.2 h1:1+mZ9upx1Dh6FmUTFR1naJ77miKiXgALjWOZ3NVFPmY=
|
||||||
|
github.com/golang/glog v1.2.2/go.mod h1:6AhwSGph0fcJtXVM/PEHPqZlFeoLxhs7/t5UDAwmO+w=
|
||||||
|
github.com/golang/glog v1.2.3 h1:oDTdz9f5VGVVNGu/Q7UXKWYsD0873HXLHdJUNBsSEKM=
|
||||||
|
github.com/golang/glog v1.2.3/go.mod h1:6AhwSGph0fcJtXVM/PEHPqZlFeoLxhs7/t5UDAwmO+w=
|
||||||
|
github.com/golang/glog v1.2.4 h1:CNNw5U8lSiiBk7druxtSHHTsRWcxKoac6kZKm2peBBc=
|
||||||
|
github.com/golang/protobuf v1.5.0 h1:LUVKkCeviFUMKqHa4tXIIij/lbhnMbP7Fn5wKdKkRh4=
|
||||||
|
github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
|
||||||
|
github.com/golang/protobuf v1.5.4 h1:i7eJL8qZTpSEXOPTxNKhASYpMn+8e5Q6AdndVa1dWek=
|
||||||
|
github.com/golang/protobuf v1.5.4/go.mod h1:lnTiLA8Wa4RWRcIUkrtSVa5nRhsEGBg48fD6rSs7xps=
|
||||||
github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
|
github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
|
||||||
github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
|
github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
|
||||||
|
github.com/google/go-cmp v0.7.0 h1:wk8382ETsv4JYUZwIsn6YpYiWiBsYLSJiTsyBybVuN8=
|
||||||
|
github.com/google/go-cmp v0.7.0/go.mod h1:pXiqmnSA92OHEEa9HXL2W4E7lf9JzCmGVUdgjX3N/iU=
|
||||||
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
|
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
|
||||||
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
||||||
github.com/kr/pretty v0.1.0 h1:L/CwN0zerZDmRFUapSPitk6f+Q3+0za1rQkzVuMiMFI=
|
github.com/kr/pretty v0.1.0 h1:L/CwN0zerZDmRFUapSPitk6f+Q3+0za1rQkzVuMiMFI=
|
||||||
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
|
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
|
||||||
github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
|
github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
|
||||||
github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
|
github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
|
||||||
|
github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10 h1:GFCKgmp0tecUJ0sJuv4pzYCqS9+RGSn52M3FUwPs+uo=
|
||||||
|
github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10/go.mod h1:t/avpk3KcrXxUnYOhZhMXJlSEyie6gQbtLq5NM3loB8=
|
||||||
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||||
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||||
|
github.com/sirupsen/logrus v1.9.3 h1:dueUQJ1C2q9oE3F7wvmSGAaVtTmUizReu6fjN8uqzbQ=
|
||||||
|
github.com/sirupsen/logrus v1.9.3/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ=
|
||||||
github.com/spiffe/go-spiffe/v2 v2.4.0 h1:j/FynG7hi2azrBG5cvjRcnQ4sux/VNj8FAVc99Fl66c=
|
github.com/spiffe/go-spiffe/v2 v2.4.0 h1:j/FynG7hi2azrBG5cvjRcnQ4sux/VNj8FAVc99Fl66c=
|
||||||
github.com/spiffe/go-spiffe/v2 v2.4.0/go.mod h1:m5qJ1hGzjxjtrkGHZupoXHo/FDWwCB1MdSyBzfHugx0=
|
github.com/spiffe/go-spiffe/v2 v2.4.0/go.mod h1:m5qJ1hGzjxjtrkGHZupoXHo/FDWwCB1MdSyBzfHugx0=
|
||||||
github.com/stretchr/testify v1.9.0 h1:HtqpIVDClZ4nwg75+f6Lvsy/wHu+3BoSGCbBAcpTsTg=
|
github.com/spiffe/go-spiffe/v2 v2.5.0 h1:N2I01KCUkv1FAjZXJMwh95KK1ZIQLYbPfhaxw8WS0hE=
|
||||||
github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
|
github.com/spiffe/go-spiffe/v2 v2.5.0/go.mod h1:P+NxobPc6wXhVtINNtFjNWGBTreew1GBUCwT2wPmb7g=
|
||||||
|
github.com/stretchr/objx v0.5.2 h1:xuMeJ0Sdp5ZMRXx/aWO6RZxdr3beISkG5/G/aIRr3pY=
|
||||||
|
github.com/stretchr/objx v0.5.2/go.mod h1:FRsXN1f5AsAjCGJKqEizvkpNtU+EGNCLh3NxZ/8L+MA=
|
||||||
|
github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=
|
||||||
|
github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
|
||||||
github.com/zeebo/errs v1.3.0 h1:hmiaKqgYZzcVgRL1Vkc1Mn2914BbzB0IBxs+ebeutGs=
|
github.com/zeebo/errs v1.3.0 h1:hmiaKqgYZzcVgRL1Vkc1Mn2914BbzB0IBxs+ebeutGs=
|
||||||
github.com/zeebo/errs v1.3.0/go.mod h1:sgbWHsvVuTPHcqJJGQ1WhI5KbWlHYz+2+2C/LSEtCw4=
|
github.com/zeebo/errs v1.3.0/go.mod h1:sgbWHsvVuTPHcqJJGQ1WhI5KbWlHYz+2+2C/LSEtCw4=
|
||||||
golang.org/x/crypto v0.26.0 h1:RrRspgV4mU+YwB4FYnuBoKsUapNIL5cohGAmSH3azsw=
|
github.com/zeebo/errs v1.4.0 h1:XNdoD/RRMKP7HD0UhJnIzUy74ISdGGxURlYG8HSWSfM=
|
||||||
golang.org/x/crypto v0.26.0/go.mod h1:GY7jblb9wI+FOo5y8/S2oY4zWP07AkOJ4+jxCqdqn54=
|
github.com/zeebo/errs v1.4.0/go.mod h1:sgbWHsvVuTPHcqJJGQ1WhI5KbWlHYz+2+2C/LSEtCw4=
|
||||||
golang.org/x/net v0.28.0 h1:a9JDOJc5GMUJ0+UDqmLT86WiEy7iWyIhz8gz8E4e5hE=
|
go.opentelemetry.io/contrib/detectors/gcp v1.32.0 h1:P78qWqkLSShicHmAzfECaTgvslqHxblNE9j62Ws1NK8=
|
||||||
golang.org/x/net v0.28.0/go.mod h1:yqtgsTWOOnlGLG9GFRrK3++bGOUEkNBoHZc8MEDWPNg=
|
go.opentelemetry.io/contrib/detectors/gcp v1.32.0/go.mod h1:TVqo0Sda4Cv8gCIixd7LuLwW4EylumVWfhjZJjDD4DU=
|
||||||
golang.org/x/sys v0.24.0 h1:Twjiwq9dn6R1fQcyiK+wQyHWfaz/BJB+YIpzU/Cv3Xg=
|
go.opentelemetry.io/contrib/detectors/gcp v1.34.0 h1:JRxssobiPg23otYU5SbWtQC//snGVIM3Tx6QRzlQBao=
|
||||||
golang.org/x/sys v0.24.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
|
go.opentelemetry.io/otel v1.32.0 h1:WnBN+Xjcteh0zdk01SVqV55d/m62NJLJdIyb4y/WO5U=
|
||||||
golang.org/x/text v0.17.0 h1:XtiM5bkSOt+ewxlOE/aE/AKEHibwj/6gvWMl9Rsh0Qc=
|
go.opentelemetry.io/otel v1.32.0/go.mod h1:00DCVSB0RQcnzlwyTfqtxSm+DRr9hpYrHjNGiBHVQIg=
|
||||||
golang.org/x/text v0.17.0/go.mod h1:BuEKDfySbSR4drPmRPG/7iBdf8hvFMuRexcpahXilzY=
|
go.opentelemetry.io/otel v1.34.0 h1:zRLXxLCgL1WyKsPVrgbSdMN4c0FMkDAskSTQP+0hdUY=
|
||||||
|
go.opentelemetry.io/otel/metric v1.32.0 h1:xV2umtmNcThh2/a/aCP+h64Xx5wsj8qqnkYZktzNa0M=
|
||||||
|
go.opentelemetry.io/otel/metric v1.32.0/go.mod h1:jH7CIbbK6SH2V2wE16W05BHCtIDzauciCRLoc/SyMv8=
|
||||||
|
go.opentelemetry.io/otel/metric v1.34.0 h1:+eTR3U0MyfWjRDhmFMxe2SsW64QrZ84AOhvqS7Y+PoQ=
|
||||||
|
go.opentelemetry.io/otel/sdk v1.32.0 h1:RNxepc9vK59A8XsgZQouW8ue8Gkb4jpWtJm9ge5lEG4=
|
||||||
|
go.opentelemetry.io/otel/sdk v1.32.0/go.mod h1:LqgegDBjKMmb2GC6/PrTnteJG39I8/vJCAP9LlJXEjU=
|
||||||
|
go.opentelemetry.io/otel/sdk v1.34.0 h1:95zS4k/2GOy069d321O8jWgYsW3MzVV+KuSPKp7Wr1A=
|
||||||
|
go.opentelemetry.io/otel/sdk/metric v1.32.0 h1:rZvFnvmvawYb0alrYkjraqJq0Z4ZUJAiyYCU9snn1CU=
|
||||||
|
go.opentelemetry.io/otel/sdk/metric v1.32.0/go.mod h1:PWeZlq0zt9YkYAp3gjKZ0eicRYvOh1Gd+X99x6GHpCQ=
|
||||||
|
go.opentelemetry.io/otel/sdk/metric v1.34.0 h1:5CeK9ujjbFVL5c1PhLuStg1wxA7vQv7ce1EK0Gyvahk=
|
||||||
|
go.opentelemetry.io/otel/trace v1.32.0 h1:WIC9mYrXf8TmY/EXuULKc8hR17vE+Hjv2cssQDe03fM=
|
||||||
|
go.opentelemetry.io/otel/trace v1.32.0/go.mod h1:+i4rkvCraA+tG6AzwloGaCtkx53Fa+L+V8e9a7YvhT8=
|
||||||
|
go.opentelemetry.io/otel/trace v1.34.0 h1:+ouXS2V8Rd4hp4580a8q23bg0azF2nI8cqLYnC8mh/k=
|
||||||
|
golang.org/x/crypto v0.32.0 h1:euUpcYgM8WcP71gNpTqQCn6rC2t6ULUPiOzfWaXVVfc=
|
||||||
|
golang.org/x/crypto v0.32.0/go.mod h1:ZnnJkOaASj8g0AjIduWNlq2NRxL0PlBrbKVyZ6V/Ugc=
|
||||||
|
golang.org/x/crypto v0.36.0 h1:AnAEvhDddvBdpY+uR+MyHmuZzzNqXSe/GvuDeob5L34=
|
||||||
|
golang.org/x/crypto v0.36.0/go.mod h1:Y4J0ReaxCR1IMaabaSMugxJES1EpwhBHhv2bDHklZvc=
|
||||||
|
golang.org/x/crypto v0.37.0 h1:kJNSjF/Xp7kU0iB2Z+9viTPMW4EqqsrywMXLJOOsXSE=
|
||||||
|
golang.org/x/mod v0.17.0 h1:zY54UmvipHiNd+pm+m0x9KhZ9hl1/7QNMyxXbc6ICqA=
|
||||||
|
golang.org/x/mod v0.17.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
|
||||||
|
golang.org/x/net v0.33.0 h1:74SYHlV8BIgHIFC/LrYkOGIwL19eTYXQ5wc6TBuO36I=
|
||||||
|
golang.org/x/net v0.33.0/go.mod h1:HXLR5J+9DxmrqMwG9qjGCxZ+zKXxBru04zlTvWlWuN4=
|
||||||
|
golang.org/x/net v0.38.0 h1:vRMAPTMaeGqVhG5QyLJHqNDwecKTomGeqbnfZyKlBI8=
|
||||||
|
golang.org/x/net v0.38.0/go.mod h1:ivrbrMbzFq5J41QOQh0siUuly180yBYtLp+CKbEaFx8=
|
||||||
|
golang.org/x/net v0.39.0 h1:ZCu7HMWDxpXpaiKdhzIfaltL9Lp31x/3fCP11bc6/fY=
|
||||||
|
golang.org/x/net v0.39.0/go.mod h1:X7NRbYVEA+ewNkCNyJ513WmMdQ3BineSwVtN2zD/d+E=
|
||||||
|
golang.org/x/oauth2 v0.22.0 h1:BzDx2FehcG7jJwgWLELCdmLuxk2i+x9UDpSiss2u0ZA=
|
||||||
|
golang.org/x/oauth2 v0.22.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
|
||||||
|
golang.org/x/oauth2 v0.24.0 h1:KTBBxWqUa0ykRPLtV69rRto9TLXcqYkeswu48x/gvNE=
|
||||||
|
golang.org/x/oauth2 v0.24.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
|
||||||
|
golang.org/x/oauth2 v0.26.0 h1:afQXWNNaeC4nvZ0Ed9XvCCzXM6UHJG7iCg0W4fPqSBE=
|
||||||
|
golang.org/x/sync v0.12.0 h1:MHc5BpPuC30uJk597Ri8TV3CNZcTLu6B6z4lJy+g6Jw=
|
||||||
|
golang.org/x/sync v0.12.0/go.mod h1:1dzgHSNfp02xaA81J2MS99Qcpr2w7fw1gpm99rleRqA=
|
||||||
|
golang.org/x/sync v0.13.0 h1:AauUjRAJ9OSnvULf/ARrrVywoJDy0YS2AwQ98I37610=
|
||||||
|
golang.org/x/sys v0.29.0 h1:TPYlXGxvx1MGTn2GiZDhnjPA9wZzZeGKHHmKhHYvgaU=
|
||||||
|
golang.org/x/sys v0.29.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
|
||||||
|
golang.org/x/sys v0.31.0 h1:ioabZlmFYtWhL+TRYpcnNlLwhyxaM9kWTDEmfnprqik=
|
||||||
|
golang.org/x/sys v0.31.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k=
|
||||||
|
golang.org/x/sys v0.32.0 h1:s77OFDvIQeibCmezSnk/q6iAfkdiQaJi4VzroCFrN20=
|
||||||
|
golang.org/x/sys v0.32.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k=
|
||||||
|
golang.org/x/term v0.30.0 h1:PQ39fJZ+mfadBm0y5WlL4vlM7Sx1Hgf13sMIY2+QS9Y=
|
||||||
|
golang.org/x/term v0.30.0/go.mod h1:NYYFdzHoI5wRh/h5tDMdMqCqPJZEuNqVR5xJLd/n67g=
|
||||||
|
golang.org/x/term v0.31.0 h1:erwDkOK1Msy6offm1mOgvspSkslFnIGsFnxOKoufg3o=
|
||||||
|
golang.org/x/text v0.21.0 h1:zyQAAkrwaneQ066sspRyJaG9VNi/YJ1NfzcGB3hZ/qo=
|
||||||
|
golang.org/x/text v0.21.0/go.mod h1:4IBbMaMmOPCJ8SecivzSH54+73PCFmPWxNTLm+vZkEQ=
|
||||||
|
golang.org/x/text v0.23.0 h1:D71I7dUrlY+VX0gQShAThNGHFxZ13dGLBHQLVl1mJlY=
|
||||||
|
golang.org/x/text v0.23.0/go.mod h1:/BLNzu4aZCJ1+kcD0DNRotWKage4q2rGVAg4o22unh4=
|
||||||
|
golang.org/x/text v0.24.0 h1:dd5Bzh4yt5KYA8f9CJHCP4FB4D51c2c6JvN37xJJkJ0=
|
||||||
|
golang.org/x/text v0.24.0/go.mod h1:L8rBsPeo2pSS+xqN0d5u2ikmjtmoJbDBT1b7nHvFCdU=
|
||||||
|
golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d h1:vU5i/LfpvrRCpgM/VPfJLg5KjxD3E+hfT1SH+d9zLwg=
|
||||||
|
golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d/go.mod h1:aiJjzUbINMkxbQROHiO6hDPo2LHcIPhhQsa9DLh0yGk=
|
||||||
|
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543 h1:E7g+9GITq07hpfrRu66IVDexMakfv52eLZ2CXBWiKr4=
|
||||||
|
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
|
google.golang.org/genproto/googleapis/api v0.0.0-20240814211410-ddb44dafa142 h1:wKguEg1hsxI2/L3hUYrpo1RVi48K+uTyzKqprwLXsb8=
|
||||||
|
google.golang.org/genproto/googleapis/api v0.0.0-20240814211410-ddb44dafa142/go.mod h1:d6be+8HhtEtucleCbxpPW9PA9XwISACu8nvpPqF0BVo=
|
||||||
|
google.golang.org/genproto/googleapis/api v0.0.0-20241202173237-19429a94021a h1:OAiGFfOiA0v9MRYsSidp3ubZaBnteRUyn3xB2ZQ5G/E=
|
||||||
|
google.golang.org/genproto/googleapis/api v0.0.0-20241202173237-19429a94021a/go.mod h1:jehYqy3+AhJU9ve55aNOaSml7wUXjF9x6z2LcCfpAhY=
|
||||||
|
google.golang.org/genproto/googleapis/api v0.0.0-20250218202821-56aae31c358a h1:nwKuGPlUAt+aR+pcrkfFRrTU1BVrSmYyYMxYbUIVHr0=
|
||||||
google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142 h1:e7S5W7MGGLaSu8j3YjdezkZ+m1/Nm0uRVRMEMGk26Xs=
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142 h1:e7S5W7MGGLaSu8j3YjdezkZ+m1/Nm0uRVRMEMGk26Xs=
|
||||||
google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142/go.mod h1:UqMtugtsSgubUsoxbuAoiCXvqvErP7Gf0so0mK9tHxU=
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20240814211410-ddb44dafa142/go.mod h1:UqMtugtsSgubUsoxbuAoiCXvqvErP7Gf0so0mK9tHxU=
|
||||||
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20241202173237-19429a94021a h1:hgh8P4EuoxpsuKMXX/To36nOFD7vixReXgn8lPGnt+o=
|
||||||
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20241202173237-19429a94021a/go.mod h1:5uTbfoYQed2U9p3KIj2/Zzm02PYhndfdmML0qC3q3FU=
|
||||||
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20250428153025-10db94c68c34 h1:h6p3mQqrmT1XkHVTfzLdNz1u7IhINeZkz67/xTbOuWs=
|
||||||
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20250428153025-10db94c68c34/go.mod h1:qQ0YXyHHx3XkvlzUtpXDkS29lDSafHMZBAZDc03LQ3A=
|
||||||
google.golang.org/grpc v1.67.1 h1:zWnc1Vrcno+lHZCOofnIMvycFcc0QRGIzm9dhnDX68E=
|
google.golang.org/grpc v1.67.1 h1:zWnc1Vrcno+lHZCOofnIMvycFcc0QRGIzm9dhnDX68E=
|
||||||
google.golang.org/grpc v1.67.1/go.mod h1:1gLDyUQU7CTLJI90u3nXZ9ekeghjeM7pTDZlqFNg2AA=
|
google.golang.org/grpc v1.67.1/go.mod h1:1gLDyUQU7CTLJI90u3nXZ9ekeghjeM7pTDZlqFNg2AA=
|
||||||
|
google.golang.org/grpc v1.70.0 h1:pWFv03aZoHzlRKHWicjsZytKAiYCtNS0dHbXnIdq7jQ=
|
||||||
|
google.golang.org/grpc v1.70.0/go.mod h1:ofIJqVKDXx/JiXrwr2IG4/zwdH9txy3IlF40RmcJSQw=
|
||||||
|
google.golang.org/grpc v1.72.0 h1:S7UkcVa60b5AAQTaO6ZKamFp1zMZSU0fGDK2WZLbBnM=
|
||||||
|
google.golang.org/grpc v1.72.0/go.mod h1:wH5Aktxcg25y1I3w7H69nHfXdOG3UiadoBtjh3izSDM=
|
||||||
|
google.golang.org/grpc/examples v0.0.0-20230224211313-3775f633ce20 h1:MLBCGN1O7GzIx+cBiwfYPwtmZ41U3Mn/cotLJciaArI=
|
||||||
|
google.golang.org/grpc/examples v0.0.0-20230224211313-3775f633ce20/go.mod h1:Nr5H8+MlGWr5+xX/STzdoEqJrO+YteqFbMyCsrb6mH0=
|
||||||
google.golang.org/protobuf v1.34.2 h1:6xV6lTsCfpGD21XK49h7MhtcApnLqkfYgPcdHftf6hg=
|
google.golang.org/protobuf v1.34.2 h1:6xV6lTsCfpGD21XK49h7MhtcApnLqkfYgPcdHftf6hg=
|
||||||
google.golang.org/protobuf v1.34.2/go.mod h1:qYOHts0dSfpeUzUFpOMr/WGzszTmLH+DiWniOlNbLDw=
|
google.golang.org/protobuf v1.34.2/go.mod h1:qYOHts0dSfpeUzUFpOMr/WGzszTmLH+DiWniOlNbLDw=
|
||||||
|
google.golang.org/protobuf v1.36.1 h1:yBPeRvTftaleIgM3PZ/WBIZ7XM/eEYAaEyCwvyjq/gk=
|
||||||
|
google.golang.org/protobuf v1.36.1/go.mod h1:9fA7Ob0pmnwhb644+1+CVWFRbNajQ6iRojtC/QF5bRE=
|
||||||
|
google.golang.org/protobuf v1.36.6 h1:z1NpPI8ku2WgiWnf+t9wTPsn6eP1L7ksHUlkfLvd9xY=
|
||||||
|
google.golang.org/protobuf v1.36.6/go.mod h1:jduwjTPXsFjZGTmRluh+L6NjiWu7pchiJ2/5YcXBHnY=
|
||||||
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 h1:qIbj1fsPNlZgppZ+VLlY7N33q108Sa+fhmuc+sWQYwY=
|
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 h1:qIbj1fsPNlZgppZ+VLlY7N33q108Sa+fhmuc+sWQYwY=
|
||||||
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
|
|
|
@ -0,0 +1,10 @@
|
||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
# \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
# \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
# \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
VERSION="v0.5.13"
|
||||||
|
|
||||||
|
git tag -s "$VERSION" -m "$VERSION"
|
||||||
|
git push origin --tags
|
|
@ -0,0 +1,54 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package kv
|
||||||
|
|
||||||
|
import (
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Delete marks secret versions as deleted for a given path. If no versions are
|
||||||
|
// specified, it marks only the current version as deleted. If specific versions
|
||||||
|
// are provided, it marks each existing version in the list as deleted. The
|
||||||
|
// deletion is performed by setting the DeletedTime to the current time. If the
|
||||||
|
// path doesn't exist, the function returns without making any changes.
|
||||||
|
func (kv *KV) Delete(path string, versions []int) error {
|
||||||
|
secret, exists := kv.data[path]
|
||||||
|
if !exists {
|
||||||
|
return ErrItemNotFound
|
||||||
|
}
|
||||||
|
|
||||||
|
now := time.Now()
|
||||||
|
cv := secret.Metadata.CurrentVersion
|
||||||
|
|
||||||
|
// If no versions specified, mark the latest version as deleted
|
||||||
|
if len(versions) == 0 {
|
||||||
|
|
||||||
|
if v, exists := secret.Versions[cv]; exists {
|
||||||
|
v.DeletedTime = &now // Mark as deleted.
|
||||||
|
secret.Versions[cv] = v
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete specific versions
|
||||||
|
for _, version := range versions {
|
||||||
|
if version == 0 {
|
||||||
|
v, exists := secret.Versions[cv]
|
||||||
|
if !exists {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
v.DeletedTime = &now // Mark as deleted.
|
||||||
|
secret.Versions[cv] = v
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if v, exists := secret.Versions[version]; exists {
|
||||||
|
v.DeletedTime = &now // Mark as deleted.
|
||||||
|
secret.Versions[version] = v
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
|
@ -0,0 +1,120 @@
|
||||||
|
package kv
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestKV_Delete(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
setup func() *KV
|
||||||
|
path string
|
||||||
|
versions []int
|
||||||
|
wantErr error
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "non_existent_path",
|
||||||
|
setup: func() *KV {
|
||||||
|
return &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
},
|
||||||
|
path: "non/existent/path",
|
||||||
|
versions: nil,
|
||||||
|
wantErr: ErrItemNotFound,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "delete_current_version_no_versions_specified",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
kv.data["test/path"] = &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 1,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{
|
||||||
|
"key": "test_value",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "test/path",
|
||||||
|
versions: nil,
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "delete_specific_versions",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
kv.data["test/path"] = &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 2,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{
|
||||||
|
"key": "value1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
2: {
|
||||||
|
Data: map[string]string{
|
||||||
|
"key": "value2",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "test/path",
|
||||||
|
versions: []int{1, 2},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
kv := tt.setup()
|
||||||
|
err := kv.Delete(tt.path, tt.versions)
|
||||||
|
|
||||||
|
if err != tt.wantErr {
|
||||||
|
t.Errorf("Delete() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if tt.wantErr == nil {
|
||||||
|
secret, exists := kv.data[tt.path]
|
||||||
|
if !exists {
|
||||||
|
t.Errorf("Value should still exist after deletion")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(tt.versions) == 0 {
|
||||||
|
cv := secret.Metadata.CurrentVersion
|
||||||
|
if v, exists := secret.Versions[cv]; exists {
|
||||||
|
if v.DeletedTime == nil {
|
||||||
|
t.Errorf("Current version should be marked as deleted")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
for _, version := range tt.versions {
|
||||||
|
if version == 0 {
|
||||||
|
version = secret.Metadata.CurrentVersion
|
||||||
|
}
|
||||||
|
if v, exists := secret.Versions[version]; exists {
|
||||||
|
if v.DeletedTime == nil {
|
||||||
|
t.Errorf("Version %d should be marked as deleted", version)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,9 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Package kv provides a secure in-memory key-value store for managing secret
|
||||||
|
// data. The store supports versioning of secrets, allowing operations on
|
||||||
|
// specific versions and tracking deleted versions. It is designed for scenarios
|
||||||
|
// where secrets need to be securely managed, updated, and deleted.
|
||||||
|
package kv
|
|
@ -0,0 +1,56 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package kv
|
||||||
|
|
||||||
|
import "time"
|
||||||
|
|
||||||
|
// Version represents a single version of a secret's data along with its
|
||||||
|
// metadata. Each version maintains its own set of key-value pairs and tracking
|
||||||
|
// information.
|
||||||
|
type Version struct {
|
||||||
|
// Data contains the actual key-value pairs stored in this version
|
||||||
|
Data map[string]string
|
||||||
|
|
||||||
|
// CreatedTime is when this version was created
|
||||||
|
CreatedTime time.Time
|
||||||
|
|
||||||
|
// Version is the numeric identifier for this version
|
||||||
|
Version int
|
||||||
|
|
||||||
|
// DeletedTime indicates when this version was marked as deleted
|
||||||
|
// A nil value means the version is active/not deleted
|
||||||
|
DeletedTime *time.Time
|
||||||
|
}
|
||||||
|
|
||||||
|
// Metadata tracks control information for a secret and its versions.
|
||||||
|
// It maintains version boundaries and timestamps for the overall secret.
|
||||||
|
type Metadata struct {
|
||||||
|
// CurrentVersion is the newest/latest version number of the secret
|
||||||
|
CurrentVersion int
|
||||||
|
|
||||||
|
// OldestVersion is the oldest available version number of the secret
|
||||||
|
OldestVersion int
|
||||||
|
|
||||||
|
// CreatedTime is when the secret was first created
|
||||||
|
CreatedTime time.Time
|
||||||
|
|
||||||
|
// UpdatedTime is when the secret was last modified
|
||||||
|
UpdatedTime time.Time
|
||||||
|
|
||||||
|
// MaxVersions is the maximum number of versions to retain
|
||||||
|
// When exceeded, older versions are automatically pruned
|
||||||
|
MaxVersions int
|
||||||
|
}
|
||||||
|
|
||||||
|
// Value represents a versioned collection of key-value pairs stored at a
|
||||||
|
// specific path. It maintains both the version history and metadata about the
|
||||||
|
// collection as a whole.
|
||||||
|
type Value struct {
|
||||||
|
// Versions maps version numbers to their corresponding Version objects
|
||||||
|
Versions map[int]Version
|
||||||
|
|
||||||
|
// Metadata contains control information about this secret
|
||||||
|
Metadata Metadata
|
||||||
|
}
|
|
@ -0,0 +1,14 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package kv
|
||||||
|
|
||||||
|
import "errors"
|
||||||
|
|
||||||
|
var (
|
||||||
|
ErrVersionNotFound = errors.New("version not found")
|
||||||
|
ErrItemNotFound = errors.New("item not found")
|
||||||
|
ErrItemSoftDeleted = errors.New("item marked as deleted")
|
||||||
|
ErrInvalidVersion = errors.New("invalid version")
|
||||||
|
)
|
|
@ -0,0 +1,80 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package kv
|
||||||
|
|
||||||
|
// Get retrieves a versioned key-value data map from the store at the specified
|
||||||
|
// path.
|
||||||
|
//
|
||||||
|
// The function supports versioned data retrieval with the following behavior:
|
||||||
|
// - If version is 0, returns the current version of the data
|
||||||
|
// - If version is specified, returns that specific version if it exists
|
||||||
|
// - Returns nil and false if the path doesn't exist
|
||||||
|
// - Returns nil and false if the specified version doesn't exist
|
||||||
|
// - Returns nil and false if the version has been deleted
|
||||||
|
// (DeletedTime is set)
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - path: The path to retrieve data from
|
||||||
|
// - version: The specific version to retrieve (0 for current version)
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - map[string]string: The key-value data at the specified path and version
|
||||||
|
// - bool: true if data was found and is valid, false otherwise
|
||||||
|
//
|
||||||
|
// Example usage:
|
||||||
|
//
|
||||||
|
// kv := &KV{}
|
||||||
|
// // Get current version
|
||||||
|
// data, exists := kv.Get("secret/myapp", 0)
|
||||||
|
//
|
||||||
|
// // Get specific version
|
||||||
|
// historicalData, exists := kv.Get("secret/myapp", 2)
|
||||||
|
func (kv *KV) Get(path string, version int) (map[string]string, error) {
|
||||||
|
secret, exists := kv.data[path]
|
||||||
|
if !exists {
|
||||||
|
return nil, ErrItemNotFound
|
||||||
|
}
|
||||||
|
|
||||||
|
// #region debug
|
||||||
|
// fmt.Println("########")
|
||||||
|
// vv := secret.Versions
|
||||||
|
// for i, v := range vv {
|
||||||
|
// fmt.Println("version", i, "version:", v.Version, "created:",
|
||||||
|
// v.CreatedTime, "deleted:", v.DeletedTime, "data:", v.Data)
|
||||||
|
// }
|
||||||
|
// fmt.Println("########")
|
||||||
|
// #endregion
|
||||||
|
|
||||||
|
// If version not specified, use current version
|
||||||
|
if version == 0 {
|
||||||
|
version = secret.Metadata.CurrentVersion
|
||||||
|
}
|
||||||
|
|
||||||
|
v, exists := secret.Versions[version]
|
||||||
|
if !exists || v.DeletedTime != nil {
|
||||||
|
return nil, ErrItemSoftDeleted
|
||||||
|
}
|
||||||
|
|
||||||
|
return v.Data, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetRawSecret retrieves a raw secret from the store at the specified path.
|
||||||
|
// This function is similar to Get, but it returns the raw Value object instead
|
||||||
|
// of the key-value data map.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - path: The path to retrieve the secret from
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - *Value: The secret at the specified path, or nil if it doesn't exist
|
||||||
|
// or has been deleted.
|
||||||
|
func (kv *KV) GetRawSecret(path string) (*Value, error) {
|
||||||
|
secret, exists := kv.data[path]
|
||||||
|
if !exists {
|
||||||
|
return nil, ErrItemNotFound
|
||||||
|
}
|
||||||
|
|
||||||
|
return secret, nil
|
||||||
|
}
|
|
@ -0,0 +1,281 @@
|
||||||
|
package kv
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestKV_Get(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
setup func() *KV
|
||||||
|
path string
|
||||||
|
version int
|
||||||
|
want map[string]string
|
||||||
|
wantErr error
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "non_existent_path",
|
||||||
|
setup: func() *KV {
|
||||||
|
return &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
},
|
||||||
|
path: "non/existent/path",
|
||||||
|
version: 0,
|
||||||
|
want: nil,
|
||||||
|
wantErr: ErrItemNotFound,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "get_current_version",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
kv.data["test/path"] = &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 1,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{
|
||||||
|
"key": "current_value",
|
||||||
|
},
|
||||||
|
Version: 1,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "test/path",
|
||||||
|
version: 0,
|
||||||
|
want: map[string]string{
|
||||||
|
"key": "current_value",
|
||||||
|
},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "get_specific_version",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
kv.data["test/path"] = &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 2,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{
|
||||||
|
"key": "old_value",
|
||||||
|
},
|
||||||
|
Version: 1,
|
||||||
|
},
|
||||||
|
2: {
|
||||||
|
Data: map[string]string{
|
||||||
|
"key": "current_value",
|
||||||
|
},
|
||||||
|
Version: 2,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "test/path",
|
||||||
|
version: 1,
|
||||||
|
want: map[string]string{
|
||||||
|
"key": "old_value",
|
||||||
|
},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "get_deleted_version",
|
||||||
|
setup: func() *KV {
|
||||||
|
deletedTime := time.Now()
|
||||||
|
kv := &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
kv.data["test/path"] = &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 1,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{
|
||||||
|
"key": "deleted_value",
|
||||||
|
},
|
||||||
|
Version: 1,
|
||||||
|
DeletedTime: &deletedTime,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "test/path",
|
||||||
|
version: 1,
|
||||||
|
want: nil,
|
||||||
|
wantErr: ErrItemSoftDeleted,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "non_existent_version",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
kv.data["test/path"] = &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 1,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{
|
||||||
|
"key": "value",
|
||||||
|
},
|
||||||
|
Version: 1,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "test/path",
|
||||||
|
version: 999,
|
||||||
|
want: nil,
|
||||||
|
wantErr: ErrItemSoftDeleted,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
kv := tt.setup()
|
||||||
|
got, err := kv.Get(tt.path, tt.version)
|
||||||
|
|
||||||
|
if err != tt.wantErr {
|
||||||
|
t.Errorf("Get() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if tt.wantErr == nil {
|
||||||
|
if len(got) != len(tt.want) {
|
||||||
|
t.Errorf("Get() got = %v, want %v", got, tt.want)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
for k, v := range got {
|
||||||
|
if tt.want[k] != v {
|
||||||
|
t.Errorf("Get() got[%s] = %v, want[%s] = %v", k, v, k, tt.want[k])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestKV_GetRawSecret(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
setup func() *KV
|
||||||
|
path string
|
||||||
|
want *Value
|
||||||
|
wantErr error
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "non_existent_path",
|
||||||
|
setup: func() *KV {
|
||||||
|
return &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
},
|
||||||
|
path: "non/existent/path",
|
||||||
|
want: nil,
|
||||||
|
wantErr: ErrItemNotFound,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "existing_secret",
|
||||||
|
setup: func() *KV {
|
||||||
|
secret := &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 1,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{
|
||||||
|
"key": "value",
|
||||||
|
},
|
||||||
|
Version: 1,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
kv := &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
kv.data["test/path"] = secret
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "test/path",
|
||||||
|
want: &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 1,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{
|
||||||
|
"key": "value",
|
||||||
|
},
|
||||||
|
Version: 1,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
kv := tt.setup()
|
||||||
|
got, err := kv.GetRawSecret(tt.path)
|
||||||
|
|
||||||
|
if err != tt.wantErr {
|
||||||
|
t.Errorf("GetRawSecret() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if tt.wantErr == nil {
|
||||||
|
if got.Metadata.CurrentVersion != tt.want.Metadata.CurrentVersion {
|
||||||
|
t.Errorf("GetRawSecret() got CurrentVersion = %v, want %v",
|
||||||
|
got.Metadata.CurrentVersion, tt.want.Metadata.CurrentVersion)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(got.Versions) != len(tt.want.Versions) {
|
||||||
|
t.Errorf("GetRawSecret() got Versions length = %v, want %v",
|
||||||
|
len(got.Versions), len(tt.want.Versions))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
for version, gotV := range got.Versions {
|
||||||
|
wantV, exists := tt.want.Versions[version]
|
||||||
|
if !exists {
|
||||||
|
t.Errorf("GetRawSecret() unexpected version %v in result", version)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if gotV.Version != wantV.Version {
|
||||||
|
t.Errorf("GetRawSecret() version %v: got Version = %v, want %v",
|
||||||
|
version, gotV.Version, wantV.Version)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(gotV.Data) != len(wantV.Data) {
|
||||||
|
t.Errorf("GetRawSecret() version %v: got Data length = %v, want %v",
|
||||||
|
version, len(gotV.Data), len(wantV.Data))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
for k, v := range gotV.Data {
|
||||||
|
if wantV.Data[k] != v {
|
||||||
|
t.Errorf("GetRawSecret() version %v: got Data[%s] = %v, want %v",
|
||||||
|
version, k, v, wantV.Data[k])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,64 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package kv
|
||||||
|
|
||||||
|
// ImportSecrets hydrates the key-value store with secrets loaded from
|
||||||
|
// persistent storage or a similar medium. It takes a map of path to secret
|
||||||
|
// values and adds them to the in-memory store. This is typically used during
|
||||||
|
// initialization or recovery after a system crash.
|
||||||
|
//
|
||||||
|
// If a secret already exists in the store, it will be overwritten with the
|
||||||
|
// imported value. The method preserves all version history and metadata from
|
||||||
|
// the imported secrets.
|
||||||
|
//
|
||||||
|
// Example usage:
|
||||||
|
//
|
||||||
|
// secrets, err := persistentStore.LoadAllSecrets(context.Background())
|
||||||
|
// if err != nil {
|
||||||
|
// log.Fatalf("Failed to load secrets: %v", err)
|
||||||
|
// }
|
||||||
|
// kvStore.ImportSecrets(secrets)
|
||||||
|
func (kv *KV) ImportSecrets(secrets map[string]*Value) {
|
||||||
|
for path, secret := range secrets {
|
||||||
|
// Create a deep copy of the secret to avoid sharing memory
|
||||||
|
newSecret := &Value{
|
||||||
|
Versions: make(map[int]Version, len(secret.Versions)),
|
||||||
|
Metadata: Metadata{
|
||||||
|
CreatedTime: secret.Metadata.CreatedTime,
|
||||||
|
UpdatedTime: secret.Metadata.UpdatedTime,
|
||||||
|
MaxVersions: kv.maxSecretVersions, // Use the KV store's setting
|
||||||
|
CurrentVersion: secret.Metadata.CurrentVersion,
|
||||||
|
OldestVersion: secret.Metadata.OldestVersion,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
// Copy all versions
|
||||||
|
for versionNum, version := range secret.Versions {
|
||||||
|
// Deep copy the data map
|
||||||
|
dataCopy := make(map[string]string, len(version.Data))
|
||||||
|
for k, v := range version.Data {
|
||||||
|
dataCopy[k] = v
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create the version copy
|
||||||
|
versionCopy := Version{
|
||||||
|
Data: dataCopy,
|
||||||
|
CreatedTime: version.CreatedTime,
|
||||||
|
Version: versionNum,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Copy deleted time if set
|
||||||
|
if version.DeletedTime != nil {
|
||||||
|
deletedTime := *version.DeletedTime
|
||||||
|
versionCopy.DeletedTime = &deletedTime
|
||||||
|
}
|
||||||
|
|
||||||
|
newSecret.Versions[versionNum] = versionCopy
|
||||||
|
}
|
||||||
|
|
||||||
|
// Store the copied secret
|
||||||
|
kv.data[path] = newSecret
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,24 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package kv
|
||||||
|
|
||||||
|
// KV represents an in-memory key-value store with versioning
|
||||||
|
type KV struct {
|
||||||
|
maxSecretVersions int
|
||||||
|
data map[string]*Value
|
||||||
|
}
|
||||||
|
|
||||||
|
// Config represents the configuration for a KV instance
|
||||||
|
type Config struct {
|
||||||
|
MaxSecretVersions int
|
||||||
|
}
|
||||||
|
|
||||||
|
// New creates a new KV instance
|
||||||
|
func New(config Config) *KV {
|
||||||
|
return &KV{
|
||||||
|
maxSecretVersions: config.MaxSecretVersions,
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,21 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package kv
|
||||||
|
|
||||||
|
// List returns a slice containing all keys stored in the key-value store.
|
||||||
|
// The order of keys in the returned slice is not guaranteed to be stable
|
||||||
|
// between calls.
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - []string: A slice containing all keys present in the store
|
||||||
|
func (kv *KV) List() []string {
|
||||||
|
keys := make([]string, 0, len(kv.data))
|
||||||
|
|
||||||
|
for k := range kv.data {
|
||||||
|
keys = append(keys, k)
|
||||||
|
}
|
||||||
|
|
||||||
|
return keys
|
||||||
|
}
|
|
@ -0,0 +1,61 @@
|
||||||
|
package kv
|
||||||
|
|
||||||
|
import "testing"
|
||||||
|
|
||||||
|
func TestKV_List(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
setup func() *KV
|
||||||
|
want []string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "empty_store",
|
||||||
|
setup: func() *KV {
|
||||||
|
return &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
},
|
||||||
|
want: []string{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "non_empty_store",
|
||||||
|
setup: func() *KV {
|
||||||
|
return &KV{
|
||||||
|
data: map[string]*Value{
|
||||||
|
"test/path": {
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 1,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{
|
||||||
|
"key": "value",
|
||||||
|
},
|
||||||
|
Version: 1,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
},
|
||||||
|
want: []string{"test/path"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
kv := tt.setup()
|
||||||
|
got := kv.List()
|
||||||
|
|
||||||
|
if len(got) != len(tt.want) {
|
||||||
|
t.Errorf("got %v want %v", got, tt.want)
|
||||||
|
}
|
||||||
|
|
||||||
|
for i := range got {
|
||||||
|
if got[i] != tt.want[i] {
|
||||||
|
t.Errorf("got %v want %v", got, tt.want)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,85 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package kv
|
||||||
|
|
||||||
|
import (
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Put stores a new version of key-value pairs at the specified path in the
|
||||||
|
// store. It implements automatic versioning with a maximum of 3 versions per
|
||||||
|
// path.
|
||||||
|
//
|
||||||
|
// When storing values:
|
||||||
|
// - If the path doesn't exist, it creates a new secret with initial metadata
|
||||||
|
// - Each put operation creates a new version with an incremented version
|
||||||
|
// number
|
||||||
|
// - Old versions are automatically pruned when exceeding MaxVersions
|
||||||
|
// (default: 10)
|
||||||
|
// - Timestamps are updated for both creation and modification times
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - path: The location where the secret will be stored
|
||||||
|
// - values: A map of key-value pairs to store at this path
|
||||||
|
//
|
||||||
|
// The function maintains metadata including:
|
||||||
|
// - CreatedTime: When the secret was first created
|
||||||
|
// - UpdatedTime: When the most recent version was added
|
||||||
|
// - CurrentVersion: The latest version number
|
||||||
|
// - OldestVersion: The oldest available version number
|
||||||
|
// - MaxVersions: Maximum number of versions to keep (fixed at 10)
|
||||||
|
func (kv *KV) Put(path string, values map[string]string) {
|
||||||
|
rightNow := time.Now()
|
||||||
|
|
||||||
|
secret, exists := kv.data[path]
|
||||||
|
if !exists {
|
||||||
|
secret = &Value{
|
||||||
|
Versions: make(map[int]Version),
|
||||||
|
Metadata: Metadata{
|
||||||
|
CreatedTime: rightNow,
|
||||||
|
UpdatedTime: rightNow,
|
||||||
|
MaxVersions: kv.maxSecretVersions,
|
||||||
|
// Versions start at 1, so that passing 0 as version will
|
||||||
|
// default to the current version.
|
||||||
|
CurrentVersion: 1,
|
||||||
|
OldestVersion: 1,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
kv.data[path] = secret
|
||||||
|
} else {
|
||||||
|
secret.Metadata.CurrentVersion++
|
||||||
|
}
|
||||||
|
|
||||||
|
newVersion := secret.Metadata.CurrentVersion
|
||||||
|
|
||||||
|
// Add new version
|
||||||
|
secret.Versions[newVersion] = Version{
|
||||||
|
Data: values,
|
||||||
|
CreatedTime: rightNow,
|
||||||
|
Version: newVersion,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update metadata
|
||||||
|
secret.Metadata.UpdatedTime = rightNow
|
||||||
|
|
||||||
|
// Cleanup old versions if exceeding MaxVersions
|
||||||
|
var deletedAny bool
|
||||||
|
for version := range secret.Versions {
|
||||||
|
if newVersion-version >= secret.Metadata.MaxVersions {
|
||||||
|
delete(secret.Versions, version)
|
||||||
|
deletedAny = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if deletedAny {
|
||||||
|
oldestVersion := secret.Metadata.CurrentVersion
|
||||||
|
for version := range secret.Versions {
|
||||||
|
if version < oldestVersion {
|
||||||
|
oldestVersion = version
|
||||||
|
}
|
||||||
|
}
|
||||||
|
secret.Metadata.OldestVersion = oldestVersion
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,94 @@
|
||||||
|
package kv
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestKV_Put(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
setup func() *KV
|
||||||
|
path string
|
||||||
|
values map[string]string
|
||||||
|
versions []int
|
||||||
|
wantErr error
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
setup: func() *KV {
|
||||||
|
return &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
maxSecretVersions: 10,
|
||||||
|
}
|
||||||
|
},
|
||||||
|
name: "it creates a new secret with initial metadata if the path doesn't exist",
|
||||||
|
path: "new/secret/path",
|
||||||
|
versions: []int{1},
|
||||||
|
values: map[string]string{"key": "value"},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "it creates a new version with an incremented version number",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{data: make(map[string]*Value), maxSecretVersions: 10}
|
||||||
|
kv.Put("existing/secret/path", map[string]string{"key": "value1"})
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "existing/secret/path",
|
||||||
|
versions: []int{1, 2},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "it automatically prunes old versions when exceeding MaxVersions",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{data: make(map[string]*Value), maxSecretVersions: 2}
|
||||||
|
kv.Put("prune/old/versions", map[string]string{"key": "value1"})
|
||||||
|
kv.Put("prune/old/versions", map[string]string{"key": "value2"})
|
||||||
|
kv.Put("prune/old/versions", map[string]string{"key": "value3"})
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "prune/old/versions",
|
||||||
|
versions: []int{4, 3},
|
||||||
|
values: map[string]string{
|
||||||
|
"key": "value4",
|
||||||
|
},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "it updates timestamps for both creation and modification times",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{data: make(map[string]*Value), maxSecretVersions: 10}
|
||||||
|
kv.Put("update/timestamps", map[string]string{"key": "value1"})
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
versions: []int{1, 2},
|
||||||
|
path: "update/timestamps",
|
||||||
|
values: map[string]string{"key": "value2"},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
kv := tt.setup()
|
||||||
|
kv.Put(tt.path, tt.values)
|
||||||
|
|
||||||
|
secret, exists := kv.data[tt.path]
|
||||||
|
if !exists {
|
||||||
|
t.Fatalf("expected secret to exist at path %q", tt.path)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(secret.Versions) != len(tt.versions) {
|
||||||
|
t.Fatalf("expected %d versions, got %d", len(tt.versions), len(secret.Versions))
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, version := range tt.versions {
|
||||||
|
if _, exists := secret.Versions[version]; !exists {
|
||||||
|
t.Fatalf("expected version %d to exist", version)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if tt.wantErr != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", tt.wantErr)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,57 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package kv
|
||||||
|
|
||||||
|
// Undelete restores previously deleted versions of a secret at the specified
|
||||||
|
// path. It sets the DeletedTime to nil for each specified version that exists.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - path: The location of the secret in the store
|
||||||
|
// - versions: A slice of version numbers to undelete
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - error: ErrItemNotFound if the path doesn't exist, nil on success
|
||||||
|
//
|
||||||
|
// If a version number in the versions slice doesn't exist, it is silently
|
||||||
|
// skipped without returning an error. Only existing versions are modified.
|
||||||
|
func (kv *KV) Undelete(path string, versions []int) error {
|
||||||
|
secret, exists := kv.data[path]
|
||||||
|
if !exists {
|
||||||
|
return ErrItemNotFound
|
||||||
|
}
|
||||||
|
|
||||||
|
cv := secret.Metadata.CurrentVersion
|
||||||
|
|
||||||
|
// If no versions specified, mark the latest version as undeleted
|
||||||
|
if len(versions) == 0 {
|
||||||
|
if v, exists := secret.Versions[cv]; exists {
|
||||||
|
v.DeletedTime = nil // Mark as undeleted.
|
||||||
|
secret.Versions[cv] = v
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete specific versions
|
||||||
|
for _, version := range versions {
|
||||||
|
if version == 0 {
|
||||||
|
v, exists := secret.Versions[cv]
|
||||||
|
if !exists {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
v.DeletedTime = nil // Mark as undeleted.
|
||||||
|
secret.Versions[cv] = v
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if v, exists := secret.Versions[version]; exists {
|
||||||
|
v.DeletedTime = nil // Mark as undeleted.
|
||||||
|
secret.Versions[version] = v
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
|
@ -0,0 +1,182 @@
|
||||||
|
package kv
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestKV_Undelete(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
setup func() *KV
|
||||||
|
path string
|
||||||
|
values map[string]string
|
||||||
|
versions []int
|
||||||
|
wantErr error
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "undelete latest version if no versions specified",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
kv.data["test/path"] = &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 1,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{"key": "value"},
|
||||||
|
Version: 1,
|
||||||
|
DeletedTime: &time.Time{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "test/path",
|
||||||
|
versions: []int{},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "undelete spesific versions",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
kv.data["test/path"] = &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 2,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{"key": "value1"},
|
||||||
|
Version: 1,
|
||||||
|
DeletedTime: &time.Time{},
|
||||||
|
},
|
||||||
|
2: {
|
||||||
|
Data: map[string]string{"key": "value2"},
|
||||||
|
Version: 2,
|
||||||
|
DeletedTime: &time.Time{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "test/path",
|
||||||
|
versions: []int{1, 2},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "if secret does not exist",
|
||||||
|
setup: func() *KV {
|
||||||
|
return &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
maxSecretVersions: 10,
|
||||||
|
}
|
||||||
|
},
|
||||||
|
path: "path/undelete/notExist",
|
||||||
|
versions: []int{1},
|
||||||
|
values: map[string]string{"key": "value"},
|
||||||
|
wantErr: ErrItemNotFound,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "skip non-existent versions",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
kv.data["test/path"] = &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 1,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{"key": "value"},
|
||||||
|
Version: 1,
|
||||||
|
DeletedTime: &time.Time{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "test/path",
|
||||||
|
versions: []int{1, 2},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "skip non-existent versions",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
kv.data["test/path"] = &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 2,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{"key": "value"},
|
||||||
|
Version: 1,
|
||||||
|
DeletedTime: &time.Time{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "test/path",
|
||||||
|
versions: []int{0},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "if version is 0 undelete current version",
|
||||||
|
setup: func() *KV {
|
||||||
|
kv := &KV{
|
||||||
|
data: make(map[string]*Value),
|
||||||
|
}
|
||||||
|
kv.data["test/path"] = &Value{
|
||||||
|
Metadata: Metadata{
|
||||||
|
CurrentVersion: 1,
|
||||||
|
},
|
||||||
|
Versions: map[int]Version{
|
||||||
|
1: {
|
||||||
|
Data: map[string]string{"key": "value"},
|
||||||
|
Version: 1,
|
||||||
|
DeletedTime: &time.Time{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return kv
|
||||||
|
},
|
||||||
|
path: "test/path",
|
||||||
|
values: map[string]string{"key": "value"},
|
||||||
|
versions: []int{0},
|
||||||
|
wantErr: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
kv := tt.setup()
|
||||||
|
err := kv.Undelete(tt.path, tt.versions)
|
||||||
|
assert.Equal(t, tt.wantErr, err)
|
||||||
|
|
||||||
|
if err == nil {
|
||||||
|
secret, exist := kv.data[tt.path]
|
||||||
|
assert.True(t, exist)
|
||||||
|
|
||||||
|
for _, version := range tt.versions {
|
||||||
|
if version == 0 {
|
||||||
|
version = secret.Metadata.CurrentVersion
|
||||||
|
}
|
||||||
|
if v, exist := secret.Versions[version]; exist {
|
||||||
|
assert.True(t, exist)
|
||||||
|
assert.Nil(t, v.DeletedTime)
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
31
net/net.go
31
net/net.go
|
@ -7,13 +7,32 @@ package net
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/spiffe/go-spiffe/v2/spiffeid"
|
"github.com/spiffe/go-spiffe/v2/spiffeid"
|
||||||
"github.com/spiffe/go-spiffe/v2/spiffetls/tlsconfig"
|
"github.com/spiffe/go-spiffe/v2/spiffetls/tlsconfig"
|
||||||
"github.com/spiffe/go-spiffe/v2/workloadapi"
|
"github.com/spiffe/go-spiffe/v2/workloadapi"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func RequestBody(r *http.Request) (bod []byte, err error) {
|
||||||
|
body, err := io.ReadAll(r.Body)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
defer func(b io.ReadCloser) {
|
||||||
|
if b == nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = errors.Join(err, b.Close())
|
||||||
|
}(r.Body)
|
||||||
|
|
||||||
|
return body, err
|
||||||
|
}
|
||||||
|
|
||||||
// CreateMtlsServer creates an HTTP server configured for mutual TLS (mTLS)
|
// CreateMtlsServer creates an HTTP server configured for mutual TLS (mTLS)
|
||||||
// authentication using SPIFFE X.509 certificates. It sets up the server with a
|
// authentication using SPIFFE X.509 certificates. It sets up the server with a
|
||||||
// custom authorizer that validates client SPIFFE IDs against a provided
|
// custom authorizer that validates client SPIFFE IDs against a provided
|
||||||
|
@ -95,7 +114,19 @@ func CreateMtlsClientWithPredicate(
|
||||||
client := &http.Client{
|
client := &http.Client{
|
||||||
Transport: &http.Transport{
|
Transport: &http.Transport{
|
||||||
TLSClientConfig: tlsConfig,
|
TLSClientConfig: tlsConfig,
|
||||||
|
IdleConnTimeout: 30 * time.Second,
|
||||||
|
MaxIdleConns: 100,
|
||||||
|
MaxConnsPerHost: 10,
|
||||||
|
MaxIdleConnsPerHost: 10,
|
||||||
|
DialContext: (&net.Dialer{
|
||||||
|
Timeout: 30 * time.Second,
|
||||||
|
KeepAlive: 30 * time.Second,
|
||||||
|
}).DialContext,
|
||||||
|
TLSHandshakeTimeout: 10 * time.Second,
|
||||||
|
ResponseHeaderTimeout: 10 * time.Second,
|
||||||
|
ExpectContinueTimeout: 5 * time.Second,
|
||||||
},
|
},
|
||||||
|
Timeout: 60 * time.Second,
|
||||||
}
|
}
|
||||||
|
|
||||||
return client, nil
|
return client, nil
|
||||||
|
|
11
net/post.go
11
net/post.go
|
@ -13,6 +13,8 @@ import (
|
||||||
|
|
||||||
var ErrNotFound = errors.New("not found")
|
var ErrNotFound = errors.New("not found")
|
||||||
var ErrUnauthorized = errors.New("unauthorized")
|
var ErrUnauthorized = errors.New("unauthorized")
|
||||||
|
var ErrBadRequest = errors.New("bad request")
|
||||||
|
var ErrNotReady = errors.New("not ready")
|
||||||
|
|
||||||
func body(r *http.Response) (bod []byte, err error) {
|
func body(r *http.Response) (bod []byte, err error) {
|
||||||
body, err := io.ReadAll(r.Body)
|
body, err := io.ReadAll(r.Body)
|
||||||
|
@ -84,6 +86,15 @@ func Post(client *http.Client, path string, mr []byte) ([]byte, error) {
|
||||||
return []byte{}, ErrUnauthorized
|
return []byte{}, ErrUnauthorized
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if r.StatusCode == http.StatusBadRequest {
|
||||||
|
return []byte{}, ErrBadRequest
|
||||||
|
}
|
||||||
|
|
||||||
|
// SPIKE Nexus is likely not initialized or in bad shape:
|
||||||
|
if r.StatusCode == http.StatusServiceUnavailable {
|
||||||
|
return []byte{}, ErrNotReady
|
||||||
|
}
|
||||||
|
|
||||||
return []byte{}, errors.New("post: Problem connecting to peer")
|
return []byte{}, errors.New("post: Problem connecting to peer")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,29 @@
|
||||||
|
#-------------------------------------------------------------------------------#
|
||||||
|
# Qodana analysis is configured by qodana.yaml file #
|
||||||
|
# https://www.jetbrains.com/help/qodana/qodana-yaml.html #
|
||||||
|
#-------------------------------------------------------------------------------#
|
||||||
|
version: "1.0"
|
||||||
|
|
||||||
|
#Specify inspection profile for code analysis
|
||||||
|
profile:
|
||||||
|
name: qodana.starter
|
||||||
|
|
||||||
|
#Enable inspections
|
||||||
|
#include:
|
||||||
|
# - name: <SomeEnabledInspectionId>
|
||||||
|
|
||||||
|
#Disable inspections
|
||||||
|
#exclude:
|
||||||
|
# - name: <SomeDisabledInspectionId>
|
||||||
|
# paths:
|
||||||
|
# - <path/where/not/run/inspection>
|
||||||
|
|
||||||
|
#Execute shell command before Qodana execution (Applied in CI/CD pipeline)
|
||||||
|
#bootstrap: sh ./prepare-qodana.sh
|
||||||
|
|
||||||
|
#Install IDE plugins before Qodana execution (Applied in CI/CD pipeline)
|
||||||
|
#plugins:
|
||||||
|
# - id: <plugin.id> #(plugin id can be found at https://plugins.jetbrains.com)
|
||||||
|
|
||||||
|
#Specify Qodana linter for analysis (Applied in CI/CD pipeline)
|
||||||
|
linter: jetbrains/qodana-go:2024.3
|
|
@ -231,7 +231,8 @@ func WithNotify(fn NotifyFn) RetrierOption {
|
||||||
// It's used with the Do helper function for simple retry operations.
|
// It's used with the Do helper function for simple retry operations.
|
||||||
type Handler[T any] func() (T, error)
|
type Handler[T any] func() (T, error)
|
||||||
|
|
||||||
// Do provides a simplified way to retry a typed operation with default settings.
|
// Do provides a simplified way to retry a typed operation with default
|
||||||
|
// settings.
|
||||||
// It creates a TypedRetrier with default exponential backoff configuration.
|
// It creates a TypedRetrier with default exponential backoff configuration.
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
|
@ -239,8 +240,12 @@ type Handler[T any] func() (T, error)
|
||||||
// result, err := Do(ctx, func() (string, error) {
|
// result, err := Do(ctx, func() (string, error) {
|
||||||
// return fetchData()
|
// return fetchData()
|
||||||
// })
|
// })
|
||||||
func Do[T any](ctx context.Context, handler Handler[T]) (T, error) {
|
func Do[T any](
|
||||||
|
ctx context.Context,
|
||||||
|
handler Handler[T],
|
||||||
|
options ...RetrierOption,
|
||||||
|
) (T, error) {
|
||||||
return NewTypedRetrier[T](
|
return NewTypedRetrier[T](
|
||||||
NewExponentialRetrier(),
|
NewExponentialRetrier(options...),
|
||||||
).RetryWithBackoff(ctx, handler)
|
).RetryWithBackoff(ctx, handler)
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,195 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Package mem provides utilities for secure mem operations.
|
||||||
|
package mem
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/rand"
|
||||||
|
"runtime"
|
||||||
|
"syscall"
|
||||||
|
"unsafe"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ClearRawBytes securely erases all bytes in the provided value by overwriting
|
||||||
|
// its mem with zeros. This ensures sensitive data like root keys and
|
||||||
|
// Shamir shards are properly cleaned from mem before garbage collection.
|
||||||
|
//
|
||||||
|
// According to NIST SP 800-88 Rev. 1 (Guidelines for Media Sanitization),
|
||||||
|
// a single overwrite pass with zeros is sufficient for modern storage
|
||||||
|
// devices, including RAM.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - s: A pointer to any type of data that should be securely erased
|
||||||
|
//
|
||||||
|
// Usage:
|
||||||
|
//
|
||||||
|
// type SensitiveData struct {
|
||||||
|
// Key [32]byte
|
||||||
|
// Token string
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// data := &SensitiveData{...}
|
||||||
|
// defer mem.Clear(data)
|
||||||
|
// // Use data...
|
||||||
|
func ClearRawBytes[T any](s *T) {
|
||||||
|
if s == nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
p := unsafe.Pointer(s)
|
||||||
|
size := unsafe.Sizeof(*s)
|
||||||
|
b := (*[1 << 30]byte)(p)[:size:size]
|
||||||
|
|
||||||
|
// Zero out all bytes in mem
|
||||||
|
for i := range b {
|
||||||
|
b[i] = 0
|
||||||
|
}
|
||||||
|
|
||||||
|
// Make sure the data is actually wiped before gc has time to interfere
|
||||||
|
runtime.KeepAlive(s)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ClearRawBytesParanoid provides a more thorough memory wiping method for
|
||||||
|
// highly-sensitive data.
|
||||||
|
//
|
||||||
|
// It performs multiple passes using different patterns (zeros, ones,
|
||||||
|
// random data, and alternating bits) to minimize potential data remanence
|
||||||
|
// concerns from sophisticated physical memory attacks.
|
||||||
|
//
|
||||||
|
// This method is designed for extremely security-sensitive applications where:
|
||||||
|
// 1. An attacker might have physical access to RAM
|
||||||
|
// 2. Cold boot attacks or specialized memory forensics equipment might be
|
||||||
|
// employed
|
||||||
|
// 3. The data being protected is critically sensitive (e.g., high-value
|
||||||
|
// encryption keys)
|
||||||
|
//
|
||||||
|
// For most applications, the standard Clear() method is sufficient as:
|
||||||
|
// - Modern RAM technologies (DDR4/DDR5) make data remanence attacks
|
||||||
|
// increasingly difficult
|
||||||
|
// - Successful attacks typically require specialized equipment and immediate
|
||||||
|
// (sub-second) physical access.
|
||||||
|
// - The time window for such attacks is extremely short after power loss
|
||||||
|
// - The detectable signal from previous memory states diminishes rapidly with
|
||||||
|
// a single overwrite
|
||||||
|
//
|
||||||
|
// This method is provided for users with extreme security requirements or in
|
||||||
|
// regulated environments where multiple-pass overwrite policies are mandated.
|
||||||
|
func ClearRawBytesParanoid[T any](s *T) {
|
||||||
|
if s == nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
p := unsafe.Pointer(s)
|
||||||
|
size := unsafe.Sizeof(*s)
|
||||||
|
b := (*[1 << 30]byte)(p)[:size:size]
|
||||||
|
|
||||||
|
// Pattern overwrite cycles:
|
||||||
|
// 1. All zeros
|
||||||
|
// 2. All ones (0xFF)
|
||||||
|
// 3. Random data
|
||||||
|
// 4. Alternating 0x55/0xAA (01010101/10101010)
|
||||||
|
// 5. Final zero out
|
||||||
|
|
||||||
|
// Zero out all bytes (first pass)
|
||||||
|
for i := range b {
|
||||||
|
b[i] = 0
|
||||||
|
}
|
||||||
|
runtime.KeepAlive(s)
|
||||||
|
|
||||||
|
// Fill with ones (second pass)
|
||||||
|
for i := range b {
|
||||||
|
b[i] = 0xFF
|
||||||
|
}
|
||||||
|
runtime.KeepAlive(s)
|
||||||
|
|
||||||
|
// Fill with random data (third pass)
|
||||||
|
_, err := rand.Read(b)
|
||||||
|
if err != nil {
|
||||||
|
panic("")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
runtime.KeepAlive(s)
|
||||||
|
|
||||||
|
// Alternating bit pattern (fourth pass)
|
||||||
|
for i := range b {
|
||||||
|
if i%2 == 0 {
|
||||||
|
b[i] = 0x55 // 01010101
|
||||||
|
} else {
|
||||||
|
b[i] = 0xAA // 10101010
|
||||||
|
}
|
||||||
|
}
|
||||||
|
runtime.KeepAlive(s)
|
||||||
|
|
||||||
|
// Final zero out (fifth pass)
|
||||||
|
for i := range b {
|
||||||
|
b[i] = 0
|
||||||
|
}
|
||||||
|
runtime.KeepAlive(s)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Zeroed32 checks if a 32-byte array contains only zero values.
|
||||||
|
// Returns true if all bytes are zero, false otherwise.
|
||||||
|
func Zeroed32(ar *[32]byte) bool {
|
||||||
|
for _, v := range ar {
|
||||||
|
if v != 0 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// ClearBytes securely erases a byte slice by overwriting all bytes with zeros.
|
||||||
|
// This is a convenience wrapper around Clear for byte slices.
|
||||||
|
//
|
||||||
|
// This is especially important for slices because executing `mem.Clear` on
|
||||||
|
// a slice it will only zero out the slice header structure itself, NOT the
|
||||||
|
// underlying array data that the slice points to.
|
||||||
|
//
|
||||||
|
// When we pass a byte slice s to the function Clear[T any](s *T),
|
||||||
|
// we are passing a pointer to the slice header, not a pointer to the
|
||||||
|
// underlying array. The slice header contains three fields:
|
||||||
|
// - A pointer to the underlying array
|
||||||
|
// - The length of the slice
|
||||||
|
// - The capacity of the slice
|
||||||
|
//
|
||||||
|
// mem.Clear(s) will zero out this slice header structure, but not the
|
||||||
|
// actual array data the slice points to
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - b: A byte slice that should be securely erased
|
||||||
|
//
|
||||||
|
// Usage:
|
||||||
|
//
|
||||||
|
// key := []byte{...} // Sensitive cryptographic key
|
||||||
|
// defer mem.ClearBytes(key)
|
||||||
|
// // Use key...
|
||||||
|
func ClearBytes(b []byte) {
|
||||||
|
if len(b) == 0 {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
for i := range b {
|
||||||
|
b[i] = 0
|
||||||
|
}
|
||||||
|
|
||||||
|
// Make sure the data is actually wiped before gc has time to interfere
|
||||||
|
runtime.KeepAlive(b)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Lock attempts to lock the process memory to prevent swapping.
|
||||||
|
// Returns true if successful, false if not supported or failed.
|
||||||
|
func Lock() bool {
|
||||||
|
// `mlock` is only available on Unix-like systems
|
||||||
|
if runtime.GOOS == "windows" {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Attempt to lock all current and future memory
|
||||||
|
if err := syscall.Mlockall(syscall.MCL_CURRENT | syscall.MCL_FUTURE); err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
return true
|
||||||
|
}
|
|
@ -0,0 +1,76 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package mem
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestClear(t *testing.T) {
|
||||||
|
type testStruct struct {
|
||||||
|
Key [32]byte
|
||||||
|
Token string
|
||||||
|
UserId int64
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create test data with non-zero values
|
||||||
|
key := [32]byte{}
|
||||||
|
for i := range key {
|
||||||
|
key[i] = byte(i + 1)
|
||||||
|
}
|
||||||
|
|
||||||
|
data := &testStruct{
|
||||||
|
Key: key,
|
||||||
|
Token: "secret-token-value",
|
||||||
|
UserId: 12345,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Call Clear on the data
|
||||||
|
Clear(data)
|
||||||
|
|
||||||
|
// Verify all fields are zeroed
|
||||||
|
for i, b := range data.Key {
|
||||||
|
if b != 0 {
|
||||||
|
t.Errorf("Expected byte at index %d to be 0, got %d", i, b)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Note: String contents won't be zeroed directly as strings are immutable in Go
|
||||||
|
// The string header will point to the same backing array
|
||||||
|
// In a real application, sensitive strings should be stored as byte slices
|
||||||
|
|
||||||
|
if data.UserId != 0 {
|
||||||
|
t.Errorf("Expected UserId to be 0, got %d", data.UserId)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestClearBytes(t *testing.T) {
|
||||||
|
// Create a non-zero byte slice
|
||||||
|
bytes := make([]byte, 64)
|
||||||
|
for i := range bytes {
|
||||||
|
bytes[i] = byte(i + 1)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Make a copy to verify later
|
||||||
|
original := make([]byte, len(bytes))
|
||||||
|
copy(original, bytes)
|
||||||
|
|
||||||
|
// Verify bytes are non-zero initially
|
||||||
|
for i, b := range bytes {
|
||||||
|
if b != original[i] {
|
||||||
|
t.Fatalf("Test setup issue: bytes changed before ClearBytes call")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Call ClearBytes
|
||||||
|
ClearBytes(bytes)
|
||||||
|
|
||||||
|
// Verify all bytes are zeroed
|
||||||
|
for i, b := range bytes {
|
||||||
|
if b != 0 {
|
||||||
|
t.Errorf("Expected byte at index %d to be 0, got %d", i, b)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,272 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package spiffeid
|
||||||
|
|
||||||
|
import "strings"
|
||||||
|
|
||||||
|
// IsPilot checks if a given SPIFFE ID matches the SPIKE Pilot's SPIFFE ID pattern.
|
||||||
|
//
|
||||||
|
// This function is used for identity verification to determine if the provided
|
||||||
|
// SPIFFE ID belongs to a SPIKE pilot instance. It compares the input against
|
||||||
|
// the expected pilot SPIFFE ID pattern.
|
||||||
|
//
|
||||||
|
// The function supports two formats:
|
||||||
|
// - Exact match: "spiffe://<trustRoot>/spike/pilot"
|
||||||
|
// - Extended match with metadata: "spiffe://<trustRoot>/spike/pilot/<metadata>"
|
||||||
|
//
|
||||||
|
// This allows for instance-specific identifiers while maintaining compatibility
|
||||||
|
// with the base pilot identity.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - trustRoots: Comma-delimited list of trust domain roots
|
||||||
|
// (e.g., "example.org,other.org")
|
||||||
|
// - id: The SPIFFE ID string to check
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - bool: true if the provided SPIFFE ID matches either the exact pilot ID
|
||||||
|
// or an extended ID with additional path segments for any of the trust roots,
|
||||||
|
// false otherwise
|
||||||
|
//
|
||||||
|
// Example usage:
|
||||||
|
//
|
||||||
|
// baseId := "spiffe://example.org/spike/pilot"
|
||||||
|
// extendedId := "spiffe://example.org/spike/pilot/instance-0"
|
||||||
|
//
|
||||||
|
// // Both will return true
|
||||||
|
// if IsPilot("example.org,other.org", baseId) {
|
||||||
|
// // Handle pilot-specific logic
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// if IsPilot("example.org,other.org", extendedId) {
|
||||||
|
// // Also recognized as a pilot, with instance metadata
|
||||||
|
// }
|
||||||
|
func IsPilot(trustRoots, id string) bool {
|
||||||
|
for _, root := range strings.Split(trustRoots, ",") {
|
||||||
|
baseId := SpikePilot(strings.TrimSpace(root))
|
||||||
|
// Check if the ID is either exactly the base ID or starts with the base ID
|
||||||
|
// followed by "/"
|
||||||
|
if id == baseId || strings.HasPrefix(id, baseId+"/") {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsPilotRecover checks if a given SPIFFE ID matches the SPIKE Pilot's
|
||||||
|
// recovery SPIFFE ID pattern.
|
||||||
|
//
|
||||||
|
// This function verifies if the provided SPIFFE ID corresponds to a SPIKE Pilot
|
||||||
|
// instance with recovery capabilities by comparing it against the expected
|
||||||
|
// recovery SPIFFE ID pattern.
|
||||||
|
//
|
||||||
|
// The function supports two formats:
|
||||||
|
// - Exact match: "spiffe://<trustRoot>/spike/pilot/recover"
|
||||||
|
// - Extended match with metadata: "spiffe://<trustRoot>/spike/pilot/recover/<metadata>"
|
||||||
|
//
|
||||||
|
// This allows for instance-specific identifiers while maintaining compatibility
|
||||||
|
// with the base pilot recovery identity.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - trustRoots: Comma-delimited list of trust domain roots
|
||||||
|
// (e.g., "example.org,other.org")
|
||||||
|
// - id: The SPIFFE ID string to check
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - bool: true if the provided SPIFFE ID matches either the exact pilot recovery ID
|
||||||
|
// or an extended ID with additional path segments for any of the trust roots,
|
||||||
|
// false otherwise
|
||||||
|
//
|
||||||
|
// Example usage:
|
||||||
|
//
|
||||||
|
// baseId := "spiffe://example.org/spike/pilot/recover"
|
||||||
|
// extendedId := "spiffe://example.org/spike/pilot/recover/instance-0"
|
||||||
|
//
|
||||||
|
// // Both will return true
|
||||||
|
// if IsPilotRecover("example.org,other.org", baseId) {
|
||||||
|
// // Handle recovery-specific logic
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// if IsPilotRecover("example.org,other.org", extendedId) {
|
||||||
|
// // Also recognized as a pilot recovery, with instance metadata
|
||||||
|
// }
|
||||||
|
func IsPilotRecover(trustRoots, id string) bool {
|
||||||
|
for _, root := range strings.Split(trustRoots, ",") {
|
||||||
|
baseId := SpikePilotRecover(strings.TrimSpace(root))
|
||||||
|
// Check if the ID is either exactly the base ID or starts with the base ID
|
||||||
|
// followed by "/"
|
||||||
|
if id == baseId || strings.HasPrefix(id, baseId+"/") {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsPilotRestore checks if a given SPIFFE ID matches the SPIKE Pilot's restore
|
||||||
|
// SPIFFE ID pattern.
|
||||||
|
//
|
||||||
|
// This function verifies if the provided SPIFFE ID corresponds to a pilot
|
||||||
|
// instance with restore capabilities by comparing it against the expected
|
||||||
|
// restore SPIFFE ID pattern.
|
||||||
|
//
|
||||||
|
// The function supports two formats:
|
||||||
|
// - Exact match: "spiffe://<trustRoot>/spike/pilot/restore"
|
||||||
|
// - Extended match with metadata: "spiffe://<trustRoot>/spike/pilot/restore/<metadata>"
|
||||||
|
//
|
||||||
|
// This allows for instance-specific identifiers while maintaining compatibility
|
||||||
|
// with the base pilot restore identity.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - trustRoots: Comma-delimited list of trust domain roots
|
||||||
|
// (e.g., "example.org,other.org")
|
||||||
|
// - id: The SPIFFE ID string to check
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - bool: true if the provided SPIFFE ID matches either the exact pilot restore ID
|
||||||
|
// or an extended ID with additional path segments for any of the trust roots,
|
||||||
|
// false otherwise
|
||||||
|
//
|
||||||
|
// Example usage:
|
||||||
|
//
|
||||||
|
// baseId := "spiffe://example.org/spike/pilot/restore"
|
||||||
|
// extendedId := "spiffe://example.org/spike/pilot/restore/instance-0"
|
||||||
|
//
|
||||||
|
// // Both will return true
|
||||||
|
// if IsPilotRestore("example.org,other.org", baseId) {
|
||||||
|
// // Handle restore-specific logic
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// if IsPilotRestore("example.org,other.org", extendedId) {
|
||||||
|
// // Also recognized as a pilot restore, with instance metadata
|
||||||
|
// }
|
||||||
|
func IsPilotRestore(trustRoots, id string) bool {
|
||||||
|
for _, root := range strings.Split(trustRoots, ",") {
|
||||||
|
baseId := SpikePilotRestore(strings.TrimSpace(root))
|
||||||
|
// Check if the ID is either exactly the base ID or starts with the base ID
|
||||||
|
// followed by "/"
|
||||||
|
if id == baseId || strings.HasPrefix(id, baseId+"/") {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsKeeper checks if a given SPIFFE ID matches the SPIKE Keeper's SPIFFE ID.
|
||||||
|
//
|
||||||
|
// This function is used for identity verification to determine if the provided
|
||||||
|
// SPIFFE ID belongs to a SPIKE Keeper instance. It compares the input against
|
||||||
|
// the expected keeper SPIFFE ID pattern.
|
||||||
|
//
|
||||||
|
// The function supports two formats:
|
||||||
|
// - Exact match: "spiffe://<trustRoot>/spike/keeper"
|
||||||
|
// - Extended match with metadata: "spiffe://<trustRoot>/spike/keeper/<metadata>"
|
||||||
|
//
|
||||||
|
// This allows for instance-specific identifiers while maintaining compatibility
|
||||||
|
// with the base keeper identity.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - trustRoots: Comma-delimited list of trust domain roots
|
||||||
|
// (e.g., "example.org,other.org")
|
||||||
|
// - id: The SPIFFE ID string to check
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - bool: true if the provided SPIFFE ID matches either the exact
|
||||||
|
// SPIKE Keeper's ID or an extended ID with additional path segments for any
|
||||||
|
// of the trust roots, false otherwise
|
||||||
|
//
|
||||||
|
// Example usage:
|
||||||
|
//
|
||||||
|
// baseId := "spiffe://example.org/spike/keeper"
|
||||||
|
// extendedId := "spiffe://example.org/spike/keeper/instance-0"
|
||||||
|
//
|
||||||
|
// // Both will return true
|
||||||
|
// if IsKeeper("example.org", baseId) {
|
||||||
|
// // Handle keeper-specific logic
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// if IsKeeper("example.org", extendedId) {
|
||||||
|
// // Also recognized as a keeper, with instance metadata
|
||||||
|
// }
|
||||||
|
func IsKeeper(trustRoots, id string) bool {
|
||||||
|
for _, root := range strings.Split(trustRoots, ",") {
|
||||||
|
baseId := SpikeKeeper(strings.TrimSpace(root))
|
||||||
|
// Check if the ID is either exactly the base ID or starts with the base ID
|
||||||
|
// followed by "/"
|
||||||
|
if id == baseId || strings.HasPrefix(id, baseId+"/") {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsNexus checks if the provided SPIFFE ID matches the SPIKE Nexus SPIFFE ID.
|
||||||
|
//
|
||||||
|
// The function compares the input SPIFFE ID against the configured Spike Nexus
|
||||||
|
// SPIFFE ID pattern. This is typically used for validating whether a given
|
||||||
|
// identity represents the Nexus service.
|
||||||
|
//
|
||||||
|
// The function supports two formats:
|
||||||
|
// - Exact match: "spiffe://<trustRoot>/spike/nexus"
|
||||||
|
// - Extended match with metadata: "spiffe://<trustRoot>/spike/nexus/<metadata>"
|
||||||
|
//
|
||||||
|
// This allows for instance-specific identifiers while maintaining compatibility
|
||||||
|
// with the base Nexus identity.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - trustRoots: Comma-delimited list of trust domain roots
|
||||||
|
// (e.g., "example.org,other.org")
|
||||||
|
// - id: The SPIFFE ID string to check
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - bool: true if the SPIFFE ID matches either the exact Nexus SPIFFE ID
|
||||||
|
// or an extended ID with additional path segments for any of the
|
||||||
|
// trust roots, false otherwise
|
||||||
|
//
|
||||||
|
// Example usage:
|
||||||
|
//
|
||||||
|
// baseId := "spiffe://example.org/spike/nexus"
|
||||||
|
// extendedId := "spiffe://example.org/spike/nexus/instance-0"
|
||||||
|
//
|
||||||
|
// // Both will return true
|
||||||
|
// if IsNexus("example.org", baseId) {
|
||||||
|
// // Handle Nexus-specific logic
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// if IsNexus("example.org", extendedId) {
|
||||||
|
// // Also recognized as a Nexus, with instance metadata
|
||||||
|
// }
|
||||||
|
func IsNexus(trustRoots, id string) bool {
|
||||||
|
for _, root := range strings.Split(trustRoots, ",") {
|
||||||
|
baseId := SpikeNexus(strings.TrimSpace(root))
|
||||||
|
// Check if the ID is either exactly the base ID or starts with the base ID
|
||||||
|
// followed by "/"
|
||||||
|
if id == baseId || strings.HasPrefix(id, baseId+"/") {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// PeerCanTalkToAnyone is used for debugging purposes
|
||||||
|
func PeerCanTalkToAnyone(_, _ string) bool {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// PeerCanTalkToKeeper checks if the provided SPIFFE ID matches the SPIKE Nexus
|
||||||
|
// SPIFFE ID.
|
||||||
|
//
|
||||||
|
// This is used as a validator in SPIKE Keeper because currently only SPIKE
|
||||||
|
// Nexus can talk to SPIKE Keeper.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - trustRoots: Comma-delimited list of trust domain roots
|
||||||
|
// (e.g., "example.org,other.org")
|
||||||
|
// - peerSpiffeId: The SPIFFE ID string to check
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - bool: true if the SPIFFE ID matches SPIKE Nexus' SPIFFE ID for any of
|
||||||
|
// the trust roots, false otherwise
|
||||||
|
func PeerCanTalkToKeeper(trustRoots, peerSpiffeId string) bool {
|
||||||
|
return IsNexus(trustRoots, peerSpiffeId)
|
||||||
|
}
|
|
@ -0,0 +1,259 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package spiffeid
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestIsPilot(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
beforeTest func()
|
||||||
|
spiffeid string
|
||||||
|
want bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "default valid spiffeid",
|
||||||
|
beforeTest: nil,
|
||||||
|
spiffeid: "spiffe://spike.ist/spike/pilot/role/superuser",
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "default invalid spiffeid",
|
||||||
|
beforeTest: nil,
|
||||||
|
spiffeid: "spiffe://test/spike/pilot/role/superuser",
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "custom valid spiffeid",
|
||||||
|
beforeTest: func() {
|
||||||
|
if err := os.Setenv("SPIKE_TRUST_ROOT", "corp.com"); err != nil {
|
||||||
|
panic("failed to set env SPIKE_TRUST_ROOT")
|
||||||
|
}
|
||||||
|
},
|
||||||
|
spiffeid: "spiffe://corp.com/spike/pilot/role/superuser",
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "custom invalid spiffeid",
|
||||||
|
beforeTest: func() {
|
||||||
|
if err := os.Setenv("SPIKE_TRUST_ROOT", "corp.com"); err != nil {
|
||||||
|
panic("failed to set env SPIKE_TRUST_ROOT")
|
||||||
|
}
|
||||||
|
},
|
||||||
|
spiffeid: "spiffe://invalid/spike/pilot/role/superuser",
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if tt.beforeTest != nil {
|
||||||
|
tt.beforeTest()
|
||||||
|
}
|
||||||
|
if got := IsPilot(tt.spiffeid); got != tt.want {
|
||||||
|
t.Errorf("IsPilot() = %v, want %v", got, tt.want)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
if err := os.Unsetenv("SPIKE_TRUST_ROOT"); err != nil {
|
||||||
|
panic("failed to unset env SPIKE_TRUST_ROOT")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIsKeeper(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
beforeTest func()
|
||||||
|
spiffeid string
|
||||||
|
want bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "default valid spiffeid",
|
||||||
|
beforeTest: nil,
|
||||||
|
spiffeid: "spiffe://spike.ist/spike/keeper",
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "default invalid spiffeid",
|
||||||
|
beforeTest: nil,
|
||||||
|
spiffeid: "spiffe://test/spike/keeper",
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "custom valid spiffeid",
|
||||||
|
beforeTest: func() {
|
||||||
|
if err := os.Setenv("SPIKE_TRUST_ROOT", "corp.com"); err != nil {
|
||||||
|
panic("failed to set env SPIKE_TRUST_ROOT")
|
||||||
|
}
|
||||||
|
},
|
||||||
|
spiffeid: "spiffe://corp.com/spike/keeper",
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "custom invalid spiffeid",
|
||||||
|
beforeTest: func() {
|
||||||
|
if err := os.Setenv("SPIKE_TRUST_ROOT", "corp.com"); err != nil {
|
||||||
|
panic("failed to set env SPIKE_TRUST_ROOT")
|
||||||
|
}
|
||||||
|
},
|
||||||
|
spiffeid: "spiffe://invalid/spike/keeper",
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if tt.beforeTest != nil {
|
||||||
|
tt.beforeTest()
|
||||||
|
}
|
||||||
|
if got := IsKeeper(tt.spiffeid); got != tt.want {
|
||||||
|
t.Errorf("IsKeeper() = %v, want %v", got, tt.want)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
if err := os.Unsetenv("SPIKE_TRUST_ROOT"); err != nil {
|
||||||
|
panic("failed to unset env SPIKE_TRUST_ROOT")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIsNexus(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
beforeTest func()
|
||||||
|
spiffeid string
|
||||||
|
want bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "default valid spiffeid",
|
||||||
|
beforeTest: nil,
|
||||||
|
spiffeid: "spiffe://spike.ist/spike/nexus",
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "default invalid spiffeid",
|
||||||
|
beforeTest: nil,
|
||||||
|
spiffeid: "spiffe://test/spike/nexus",
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "custom valid spiffeid",
|
||||||
|
beforeTest: func() {
|
||||||
|
if err := os.Setenv("SPIKE_TRUST_ROOT", "corp.com"); err != nil {
|
||||||
|
panic("failed to set env SPIKE_TRUST_ROOT")
|
||||||
|
}
|
||||||
|
},
|
||||||
|
spiffeid: "spiffe://corp.com/spike/nexus",
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "custom invalid spiffeid",
|
||||||
|
beforeTest: func() {
|
||||||
|
if err := os.Setenv("SPIKE_TRUST_ROOT", "corp.com"); err != nil {
|
||||||
|
panic("failed to set env SPIKE_TRUST_ROOT")
|
||||||
|
}
|
||||||
|
},
|
||||||
|
spiffeid: "spiffe://invalid/spike/nexus",
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if tt.beforeTest != nil {
|
||||||
|
tt.beforeTest()
|
||||||
|
}
|
||||||
|
if got := IsNexus(tt.spiffeid); got != tt.want {
|
||||||
|
t.Errorf("IsNexus() = %v, want %v", got, tt.want)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
if err := os.Unsetenv("SPIKE_TRUST_ROOT"); err != nil {
|
||||||
|
panic("failed to unset env SPIKE_TRUST_ROOT")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCanTalkToAnyone(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
in string
|
||||||
|
want bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "default",
|
||||||
|
in: "",
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if got := PeerCanTalkToAnyone(tt.in); got != tt.want {
|
||||||
|
t.Errorf("PeerCanTalkToAnyone() = %v, want %v", got, tt.want)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCanTalkToKeeper(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
beforeTest func()
|
||||||
|
spiffeid string
|
||||||
|
want bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "default nexus spiffe id",
|
||||||
|
beforeTest: nil,
|
||||||
|
spiffeid: "spiffe://spike.ist/spike/nexus",
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "default keeper spiffe id",
|
||||||
|
beforeTest: nil,
|
||||||
|
spiffeid: "spiffe://spike.ist/spike/keeper",
|
||||||
|
// Keepers cannot talk to keepers.
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "custom nexus spiffe id",
|
||||||
|
beforeTest: func() {
|
||||||
|
if err := os.Setenv("SPIKE_TRUST_ROOT", "corp.com"); err != nil {
|
||||||
|
panic("failed to set env SPIKE_TRUST_ROOT")
|
||||||
|
}
|
||||||
|
},
|
||||||
|
spiffeid: "spiffe://corp.com/spike/nexus",
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "custom keeper spiffe id",
|
||||||
|
beforeTest: func() {
|
||||||
|
if err := os.Setenv("SPIKE_TRUST_ROOT", "corp.com"); err != nil {
|
||||||
|
panic("failed to set env SPIKE_TRUST_ROOT")
|
||||||
|
}
|
||||||
|
},
|
||||||
|
spiffeid: "spiffe://corp.com/spike/keeper",
|
||||||
|
// Keepers cannot talk to keepers; only Nexus can talk to Keepers.
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "pilot spiffe id",
|
||||||
|
beforeTest: nil,
|
||||||
|
spiffeid: "spiffe://spike.ist/spike/pilot/role/superuser",
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if tt.beforeTest != nil {
|
||||||
|
tt.beforeTest()
|
||||||
|
}
|
||||||
|
if got := PeerCanTalkToKeeper(tt.spiffeid); got != tt.want {
|
||||||
|
t.Errorf("PeerCanTalkToKeeper() = %v, want %v", got, tt.want)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
if err := os.Unsetenv("SPIKE_TRUST_ROOT"); err != nil {
|
||||||
|
panic("failed to unset env SPIKE_TRUST_ROOT")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,15 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package env
|
||||||
|
|
||||||
|
import "os"
|
||||||
|
|
||||||
|
func TrustRoot() string {
|
||||||
|
tr := os.Getenv("SPIKE_TRUST_ROOT")
|
||||||
|
if tr == "" {
|
||||||
|
return "spike.ist"
|
||||||
|
}
|
||||||
|
return tr
|
||||||
|
}
|
|
@ -0,0 +1,96 @@
|
||||||
|
// \\ SPIKE: Secure your secrets with SPIFFE.
|
||||||
|
// \\\\\ Copyright 2024-present SPIKE contributors.
|
||||||
|
// \\\\\\\ SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package spiffeid
|
||||||
|
|
||||||
|
import (
|
||||||
|
"path"
|
||||||
|
|
||||||
|
"github.com/spiffe/spike-sdk-go/spiffeid/internal/env"
|
||||||
|
)
|
||||||
|
|
||||||
|
// SpikeKeeper constructs and returns the SPIKE Keeper's SPIFFE ID string.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - trustRoot: The trust domain for the SPIFFE ID. If empty, the value is
|
||||||
|
// obtained from the environment.
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - string: The complete SPIFFE ID in the format:
|
||||||
|
// "spiffe://<trustRoot>/spike/keeper"
|
||||||
|
func SpikeKeeper(trustRoot string) string {
|
||||||
|
if trustRoot == "" {
|
||||||
|
trustRoot = env.TrustRoot()
|
||||||
|
}
|
||||||
|
|
||||||
|
return "spiffe://" + path.Join(trustRoot, "spike", "keeper")
|
||||||
|
}
|
||||||
|
|
||||||
|
// SpikeNexus constructs and returns the SPIFFE ID for SPIKE Nexus.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - trustRoot: The trust domain for the SPIFFE ID. If empty, the value is
|
||||||
|
// obtained from the environment.
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - string: The complete SPIFFE ID in the format:
|
||||||
|
// "spiffe://<trustRoot>/spike/nexus"
|
||||||
|
func SpikeNexus(trustRoot string) string {
|
||||||
|
if trustRoot == "" {
|
||||||
|
trustRoot = env.TrustRoot()
|
||||||
|
}
|
||||||
|
|
||||||
|
return "spiffe://" + path.Join(trustRoot, "spike", "nexus")
|
||||||
|
}
|
||||||
|
|
||||||
|
// SpikePilot generates the SPIFFE ID for a SPIKE Pilot superuser role.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - trustRoot: The trust domain for the SPIFFE ID. If empty, the value is
|
||||||
|
// obtained from the environment.
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - string: The complete SPIFFE ID in the format:
|
||||||
|
// "spiffe://<trustRoot>/spike/pilot/role/superuser"
|
||||||
|
func SpikePilot(trustRoot string) string {
|
||||||
|
if trustRoot == "" {
|
||||||
|
trustRoot = env.TrustRoot()
|
||||||
|
}
|
||||||
|
|
||||||
|
return "spiffe://" + path.Join(trustRoot, "spike", "pilot", "role", "superuser")
|
||||||
|
}
|
||||||
|
|
||||||
|
// SpikePilotRecover generates the SPIFFE ID for a SPIKE Pilot recovery role.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - trustRoot: The trust domain for the SPIFFE ID. If empty, the value is
|
||||||
|
// obtained from the environment.
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - string: The complete SPIFFE ID in the format:
|
||||||
|
// "spiffe://<trustRoot>/spike/pilot/role/recover"
|
||||||
|
func SpikePilotRecover(trustRoot string) string {
|
||||||
|
if trustRoot == "" {
|
||||||
|
trustRoot = env.TrustRoot()
|
||||||
|
}
|
||||||
|
|
||||||
|
return "spiffe://" + path.Join(trustRoot, "spike", "pilot", "role", "recover")
|
||||||
|
}
|
||||||
|
|
||||||
|
// SpikePilotRestore generates the SPIFFE ID for a SPIKE Pilot restore role.
|
||||||
|
//
|
||||||
|
// Parameters:
|
||||||
|
// - trustRoot: The trust domain for the SPIFFE ID. If empty, the value is
|
||||||
|
// obtained from the environment.
|
||||||
|
//
|
||||||
|
// Returns:
|
||||||
|
// - string: The complete SPIFFE ID in the format:
|
||||||
|
// "spiffe://<trustRoot>/spike/pilot/role/restore"
|
||||||
|
func SpikePilotRestore(trustRoot string) string {
|
||||||
|
if trustRoot == "" {
|
||||||
|
trustRoot = env.TrustRoot()
|
||||||
|
}
|
||||||
|
|
||||||
|
return "spiffe://" + path.Join(trustRoot, "spike", "pilot", "role", "restore")
|
||||||
|
}
|
Loading…
Reference in New Issue