pkg/cso/v1/interpreter.go (52 lines of code) (raw):

// Licensed to Elasticsearch B.V. under one or more contributor // license agreements. See the NOTICE file distributed with // this work for additional information regarding copyright // ownership. Elasticsearch B.V. licenses this file to you under // the Apache License, Version 2.0 (the "License"); you may // not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. package v1 import ( "fmt" "io" "text/template" csov1 "github.com/elastic/harp/api/gen/go/cso/v1" ) // Text returns english text templates. func Text() map[csov1.RingLevel]string { return map[csov1.RingLevel]string{ csov1.RingLevel_RING_LEVEL_META: `Give me a secret named "{{ .Key }}"`, csov1.RingLevel_RING_LEVEL_INFRASTRUCTURE: `Give me an infrastructure secret named "{{ .Key }}", for "{{ .CloudProvider }}" cloud provider, concerning account "{{ .AccountId }}", located in region "{{ .Region }}", for service "{{ .ServiceName }}".`, csov1.RingLevel_RING_LEVEL_PLATFORM: `Give me a platform secret named "{{ .Key }}", for a service named "{{ .ServiceName }}", located in region "{{ .Region }}", part of a "{{ .Stage }}" platform named "{{ .Name }}".`, csov1.RingLevel_RING_LEVEL_PRODUCT: `Give me a product secret named "{{ .Key }}", concerning the component "{{ .ComponentName }}", for a product named "{{ .Name }}", in version "{{ .Version }}".`, csov1.RingLevel_RING_LEVEL_APPLICATION: `Give me an application secret named "{{ .Key }}", concerning the component "{{ .ComponentName }}", for a product named "{{ .ProductName }}", in version "{{ .ProductVersion }}", running on a "{{ .Stage }}" platform named "{{.PlatformName}}".`, csov1.RingLevel_RING_LEVEL_ARTIFACT: `Give me an artifact secret named "{{ .Key }}", concerning the "{{ .Type }}" artifact with ID "{{ .Id }}".`, } } // Interpret returns the cso secret interpretation. func Interpret(secret *csov1.Secret, templates map[csov1.RingLevel]string, w io.Writer) error { // Check arguments if secret == nil { return fmt.Errorf("unable to interpret nil secret") } // Retrieve template according to ring level tBody, ok := templates[secret.RingLevel] if !ok { return fmt.Errorf("unable to retrieve temlate") } // Compile template t, err := template.New("interpret").Parse(tBody) if err != nil { return fmt.Errorf("unable to compile template: %w", err) } // Merge data switch secret.RingLevel { case csov1.RingLevel_RING_LEVEL_META: err = t.Execute(w, secret.GetMeta()) case csov1.RingLevel_RING_LEVEL_INFRASTRUCTURE: err = t.Execute(w, secret.GetInfrastructure()) case csov1.RingLevel_RING_LEVEL_PLATFORM: err = t.Execute(w, secret.GetPlatform()) case csov1.RingLevel_RING_LEVEL_PRODUCT: err = t.Execute(w, secret.GetProduct()) case csov1.RingLevel_RING_LEVEL_APPLICATION: err = t.Execute(w, secret.GetApplication()) case csov1.RingLevel_RING_LEVEL_ARTIFACT: err = t.Execute(w, secret.GetArtifact()) case csov1.RingLevel_RING_LEVEL_INVALID, csov1.RingLevel_RING_LEVEL_UNKNOWN: err = fmt.Errorf("invalid secret ring %v", secret.RingLevel) default: err = fmt.Errorf("invalid secret ring %v", secret.RingLevel) } // Return error if err != nil { return fmt.Errorf("unable to interpret CSO path: %w", err) } // No error return nil }