refactor
This commit is contained in:
@ -47,24 +47,24 @@ type Secret struct {
|
|||||||
RemoteName string
|
RemoteName string
|
||||||
}
|
}
|
||||||
|
|
||||||
// GeneratePasswords generates passwords.
|
// GeneratePassword generates passwords.
|
||||||
func GeneratePasswords(length uint, charset string) ([]string, error) {
|
func GeneratePassword(length uint, charset string) (string, error) {
|
||||||
passwords, err := passgen.GeneratePasswords(
|
passwords, err := passgen.GeneratePasswords(
|
||||||
1,
|
1,
|
||||||
length,
|
length,
|
||||||
charset,
|
charset,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return "", err
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debugf("generated %s", strings.Join(passwords, ", "))
|
log.Debugf("generated %s", strings.Join(passwords, ", "))
|
||||||
|
|
||||||
return passwords, nil
|
return passwords[0], nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// GeneratePassphrases generates human readable and rememberable passphrases.
|
// GeneratePassphrase generates human readable and rememberable passphrases.
|
||||||
func GeneratePassphrases() ([]string, error) {
|
func GeneratePassphrase() (string, error) {
|
||||||
passphrases, err := passgen.GeneratePassphrases(
|
passphrases, err := passgen.GeneratePassphrases(
|
||||||
1,
|
1,
|
||||||
passgen.PassphraseWordCountDefault,
|
passgen.PassphraseWordCountDefault,
|
||||||
@ -73,12 +73,12 @@ func GeneratePassphrases() ([]string, error) {
|
|||||||
passgen.WordListDefault,
|
passgen.WordListDefault,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return "", err
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debugf("generated %s", strings.Join(passphrases, ", "))
|
log.Debugf("generated %s", strings.Join(passphrases, ", "))
|
||||||
|
|
||||||
return passphrases, nil
|
return passphrases[0], nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// ReadSecretsConfig reads secret names/versions from the recipe config. The
|
// ReadSecretsConfig reads secret names/versions from the recipe config. The
|
||||||
@ -195,13 +195,13 @@ func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server
|
|||||||
log.Debugf("attempting to generate and store %s on %s", secret.RemoteName, server)
|
log.Debugf("attempting to generate and store %s on %s", secret.RemoteName, server)
|
||||||
|
|
||||||
if secret.Length > 0 {
|
if secret.Length > 0 {
|
||||||
passwords, err := GeneratePasswords(uint(secret.Length), secret.Charset)
|
password, err := GeneratePassword(uint(secret.Length), secret.Charset)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ch <- err
|
ch <- err
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := client.StoreSecret(cl, secret.RemoteName, passwords[0], server); err != nil {
|
if err := client.StoreSecret(cl, secret.RemoteName, password, server); err != nil {
|
||||||
if strings.Contains(err.Error(), "AlreadyExists") {
|
if strings.Contains(err.Error(), "AlreadyExists") {
|
||||||
log.Warnf("%s already exists", secret.RemoteName)
|
log.Warnf("%s already exists", secret.RemoteName)
|
||||||
ch <- nil
|
ch <- nil
|
||||||
@ -213,15 +213,15 @@ func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server
|
|||||||
|
|
||||||
mutex.Lock()
|
mutex.Lock()
|
||||||
defer mutex.Unlock()
|
defer mutex.Unlock()
|
||||||
secretsGenerated[secretName] = passwords[0]
|
secretsGenerated[secretName] = password
|
||||||
} else {
|
} else {
|
||||||
passphrases, err := GeneratePassphrases()
|
passphrase, err := GeneratePassphrase()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ch <- err
|
ch <- err
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := client.StoreSecret(cl, secret.RemoteName, passphrases[0], server); err != nil {
|
if err := client.StoreSecret(cl, secret.RemoteName, passphrase, server); err != nil {
|
||||||
if strings.Contains(err.Error(), "AlreadyExists") {
|
if strings.Contains(err.Error(), "AlreadyExists") {
|
||||||
log.Warnf("%s already exists", secret.RemoteName)
|
log.Warnf("%s already exists", secret.RemoteName)
|
||||||
ch <- nil
|
ch <- nil
|
||||||
@ -233,7 +233,7 @@ func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server
|
|||||||
|
|
||||||
mutex.Lock()
|
mutex.Lock()
|
||||||
defer mutex.Unlock()
|
defer mutex.Unlock()
|
||||||
secretsGenerated[secretName] = passphrases[0]
|
secretsGenerated[secretName] = passphrase
|
||||||
}
|
}
|
||||||
ch <- nil
|
ch <- nil
|
||||||
}(n, v)
|
}(n, v)
|
||||||
|
Reference in New Issue
Block a user