From ad032bb89c5c4c5d510b156ade4022d1cb739b07 Mon Sep 17 00:00:00 2001 From: Apfelwurm Date: Fri, 21 Mar 2025 09:25:39 +0100 Subject: [PATCH] refactor --- pkg/secret/secret.go | 28 ++++++++++++++-------------- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/pkg/secret/secret.go b/pkg/secret/secret.go index 2d70f3ab..2d03772f 100644 --- a/pkg/secret/secret.go +++ b/pkg/secret/secret.go @@ -47,24 +47,24 @@ type Secret struct { RemoteName string } -// GeneratePasswords generates passwords. -func GeneratePasswords(length uint, charset string) ([]string, error) { +// GeneratePassword generates passwords. +func GeneratePassword(length uint, charset string) (string, error) { passwords, err := passgen.GeneratePasswords( 1, length, charset, ) if err != nil { - return nil, err + return "", err } log.Debugf("generated %s", strings.Join(passwords, ", ")) - return passwords, nil + return passwords[0], nil } -// GeneratePassphrases generates human readable and rememberable passphrases. -func GeneratePassphrases() ([]string, error) { +// GeneratePassphrase generates human readable and rememberable passphrases. +func GeneratePassphrase() (string, error) { passphrases, err := passgen.GeneratePassphrases( 1, passgen.PassphraseWordCountDefault, @@ -73,12 +73,12 @@ func GeneratePassphrases() ([]string, error) { passgen.WordListDefault, ) if err != nil { - return nil, err + return "", err } log.Debugf("generated %s", strings.Join(passphrases, ", ")) - return passphrases, nil + return passphrases[0], nil } // ReadSecretsConfig reads secret names/versions from the recipe config. The @@ -195,13 +195,13 @@ func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server log.Debugf("attempting to generate and store %s on %s", secret.RemoteName, server) if secret.Length > 0 { - passwords, err := GeneratePasswords(uint(secret.Length), secret.Charset) + password, err := GeneratePassword(uint(secret.Length), secret.Charset) if err != nil { ch <- err return } - if err := client.StoreSecret(cl, secret.RemoteName, passwords[0], server); err != nil { + if err := client.StoreSecret(cl, secret.RemoteName, password, server); err != nil { if strings.Contains(err.Error(), "AlreadyExists") { log.Warnf("%s already exists", secret.RemoteName) ch <- nil @@ -213,15 +213,15 @@ func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server mutex.Lock() defer mutex.Unlock() - secretsGenerated[secretName] = passwords[0] + secretsGenerated[secretName] = password } else { - passphrases, err := GeneratePassphrases() + passphrase, err := GeneratePassphrase() if err != nil { ch <- err return } - if err := client.StoreSecret(cl, secret.RemoteName, passphrases[0], server); err != nil { + if err := client.StoreSecret(cl, secret.RemoteName, passphrase, server); err != nil { if strings.Contains(err.Error(), "AlreadyExists") { log.Warnf("%s already exists", secret.RemoteName) ch <- nil @@ -233,7 +233,7 @@ func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server mutex.Lock() defer mutex.Unlock() - secretsGenerated[secretName] = passphrases[0] + secretsGenerated[secretName] = passphrase } ch <- nil }(n, v)