pkg/tasks/from/vault.go (46 lines of code) (raw):

// Licensed to Elasticsearch B.V. under one or more contributor // license agreements. See the NOTICE file distributed with // this work for additional information regarding copyright // ownership. Elasticsearch B.V. licenses this file to you under // the Apache License, Version 2.0 (the "License"); you may // not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. package from import ( "context" "fmt" "github.com/hashicorp/vault/api" "github.com/elastic/harp/pkg/bundle" bundlevault "github.com/elastic/harp/pkg/bundle/vault" "github.com/elastic/harp/pkg/tasks" "github.com/elastic/harp/pkg/vault" ) // VaultTask implements secret-container building from Vault K/V. type VaultTask struct { OutputWriter tasks.WriterProvider SecretPaths []string VaultNamespace string AsVaultMetadata bool WithMetadata bool MaxWorkerCount int64 } // Run the task. func (t *VaultTask) Run(ctx context.Context) error { // Initialize vault connection client, err := api.NewClient(api.DefaultConfig()) if err != nil { return fmt.Errorf("unable to initialize Vault connection: %w", err) } // If a namespace is specified if t.VaultNamespace != "" { client.SetNamespace(t.VaultNamespace) } // Verify vault connection if _, errAuth := vault.CheckAuthentication(client); errAuth != nil { return fmt.Errorf("vault connection verification failed: %w", errAuth) } // Call exporter b, err := bundlevault.Pull(ctx, client, t.SecretPaths, bundlevault.WithVaultMetadata(t.AsVaultMetadata), bundlevault.WithSecretMetadata(t.WithMetadata), bundlevault.WithMaxWorkerCount(t.MaxWorkerCount), ) if err != nil { return fmt.Errorf("error occurs during vault export: %w", err) } // Create output writer writer, err := t.OutputWriter(ctx) if err != nil { return fmt.Errorf("unable to open output bundle: %w", err) } // Dump bundle if err = bundle.ToContainerWriter(writer, b); err != nil { return fmt.Errorf("unable to produce exported bundle: %w", err) } // No error return nil }