Skip to content

Commit

Permalink
Cleanup
Browse files Browse the repository at this point in the history
  • Loading branch information
Joe Klein committed Jan 22, 2025
1 parent 8c7f38e commit 7c144a1
Show file tree
Hide file tree
Showing 2 changed files with 12 additions and 7 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ credential has either:
1. a `login`, `apiKey`, `account`, `applianceUrl`, and `safe`

The ENV vars (or .env file) will be injected
as a credential with the name `default` (or `default_cyberark`) if you don't override `default` (or `default_cyberark` within your config file.
as a credential with the name `default` (or `default_cyberark`) if you don't override `default` (or `default_cyberark`) within your config file.

## Resources

Expand Down
17 changes: 11 additions & 6 deletions client/cyberarkclient.go
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,14 @@ package client

import (
"fmt"
"strings"
"strconv"
"strings"

"github.com/covermymeds/azure-key-vault-agent/certs"
"github.com/covermymeds/azure-key-vault-agent/config"
"github.com/covermymeds/azure-key-vault-agent/keys"
"github.com/covermymeds/azure-key-vault-agent/secrets"
log "github.com/sirupsen/logrus"

"github.com/cyberark/conjur-api-go/conjurapi"
"github.com/cyberark/conjur-api-go/conjurapi/authn"
Expand All @@ -32,7 +33,7 @@ func NewCyberarkClient(cred config.CyberarkCredentialConfig) CyberarkClient {
},
)
if err != nil {
panic(err)
panic(fmt.Sprintf("Error creating Cyberark client: %v", err.Error()))
}
return CyberarkClient{Client: cyberarkClient, Safe: cred.Safe}
}
Expand All @@ -53,15 +54,16 @@ func (c CyberarkClient) GetSecret(vaultBaseURL string, secretName string, secret

if secretVersion == "" {
secretValue, err = c.Client.RetrieveSecret(secretPath)
} else {
} else {
secretVersionInt, convErr := strconv.Atoi(secretVersion)
if convErr != nil {
return secrets.Secret{}, fmt.Errorf("failed to convert secret version to integer: %s", secretVersion)
}
secretValue, err = c.Client.RetrieveSecretWithVersion(secretPath, secretVersionInt)
}
if err != nil {
panic(err)
log.Printf("Error getting secret: %v", err.Error())
return secrets.Secret{}, err
}

secretValueString := string(secretValue)
Expand All @@ -76,11 +78,14 @@ func (c CyberarkClient) GetSecret(vaultBaseURL string, secretName string, secret
func (c CyberarkClient) GetSecrets(vaultBaseURL string) (results map[string]secrets.Secret, err error) {
resources, err := c.Client.ResourceIDs(&conjurapi.ResourceFilter{Kind: "variable"})
if err != nil {
panic(err)
log.Printf("Error getting secrets: %v", err.Error())
return map[string]secrets.Secret{}, err
}

secretValues, err := c.Client.RetrieveBatchSecrets(resources)
if err != nil {
panic(err)
log.Printf("Error getting secrets: %v", err.Error())
return map[string]secrets.Secret{}, err
}

results = make(map[string]secrets.Secret)
Expand Down

0 comments on commit 7c144a1

Please sign in to comment.