pkg/tasks/share/get.go (42 lines of code) (raw):
// Licensed to Elasticsearch B.V. under one or more contributor
// license agreements. See the NOTICE file distributed with
// this work for additional information regarding copyright
// ownership. Elasticsearch B.V. licenses this file to you under
// the Apache License, Version 2.0 (the "License"); you may
// not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing,
// software distributed under the License is distributed on an
// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
// KIND, either express or implied. See the License for the
// specific language governing permissions and limitations
// under the License.
package share
import (
"context"
"fmt"
"github.com/hashicorp/vault/api"
"github.com/elastic/harp/pkg/tasks"
"github.com/elastic/harp/pkg/vault"
)
// GetTask implements secret sharing via Vault Cubbyhole.
type GetTask struct {
OutputWriter tasks.WriterProvider
BackendPrefix string
VaultNamespace string
Token string
}
// Run the task.
func (t *GetTask) Run(ctx context.Context) error {
// Initialize vault connection
client, err := api.NewClient(api.DefaultConfig())
if err != nil {
return fmt.Errorf("unable to initialize Vault connection: %w", err)
}
// If a namespace is specified
if t.VaultNamespace != "" {
client.SetNamespace(t.VaultNamespace)
}
// Verify vault connection
if _, errAuth := vault.CheckAuthentication(client); errAuth != nil {
return fmt.Errorf("vault connection verification failed: %w", errAuth)
}
// Create cubbyhole service
sf, errFactory := vault.FromVaultClient(client)
if err != nil {
return fmt.Errorf("unable to initialize service factory: %w", errFactory)
}
s, errService := sf.Cubbyhole(t.BackendPrefix)
if errService != nil {
return fmt.Errorf("unable to initialize service factory: %w", errFactory)
}
// Create output writer
writer, err := t.OutputWriter(ctx)
if err != nil {
return fmt.Errorf("unable to open output writer: %w", err)
}
// Retrieve secret
if err := s.Get(ctx, t.Token, writer); err != nil {
return fmt.Errorf("unable to retrieve secret: %w", err)
}
// No error
return nil
}