Skip to content

Commit 2dd730b

Browse files
author
Sergey Novikov
committed
Update aws-sdk-go-v2
1 parent aaeda21 commit 2dd730b

File tree

7 files changed

+28
-25
lines changed

7 files changed

+28
-25
lines changed

Dockerfile

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
FROM amazonlinux:2
22

3-
COPY secure-exec-linux-amd64 /usr/local/bin/secure-exec
3+
COPY ./bin/exec-with-secrets-linux-amd64 /usr/local/bin/exec-with-secrets
44

5-
CMD secure-exec
5+
CMD exec-with-secrets

go.mod

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
1-
module github.com/s12v/secure-exec
1+
module github.com/s12v/exec-with-secrets
22

3-
require github.com/aws/aws-sdk-go-v2 v0.7.0
3+
require github.com/aws/aws-sdk-go-v2 v0.8.0

go.sum

+2-4
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,14 @@
1-
github.com/aws/aws-sdk-go-v2 v0.7.0 h1:a5xRI/tBmUFKuAA0SOyEY2P1YhQb+jVOEI9P/7KfrP0=
2-
github.com/aws/aws-sdk-go-v2 v0.7.0/go.mod h1:17MaCZ9g0q5BIMxwzRQeiv8M3c8+W7iuBnlWAEprcxE=
1+
github.com/aws/aws-sdk-go-v2 v0.8.0 h1:IyCzxvwRVe2ehXfi7YMsVxaVU6JvaH58ZO7uPFS3HlY=
2+
github.com/aws/aws-sdk-go-v2 v0.8.0/go.mod h1:sa1GePZ/LfBGI4dSq30f6uR4Tthll8axxtEPvlpXZ8U=
33
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
44
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
55
github.com/go-sql-driver/mysql v1.4.0/go.mod h1:zAC/RDZ24gD3HViQzih4MyKcchzm+sOG5ZlKdlhCg5w=
66
github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
7-
github.com/gucumber/gucumber v0.0.0-20180127021336-7d5c79e832a2/go.mod h1:YbdHRK9ViqwGMS0rtRY+1I6faHvVyyurKPIPwifihxI=
87
github.com/jmespath/go-jmespath v0.0.0-20180206201540-c2b33e8439af h1:pmfjZENx5imkbgOkpRUYLnmbU7UEFbjtDA2hxJ1ichM=
98
github.com/jmespath/go-jmespath v0.0.0-20180206201540-c2b33e8439af/go.mod h1:Nht3zPeWKUH0NzdCt2Blrr5ys8VGpn0CEB0cQHVjt7k=
109
github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
1110
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
1211
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
13-
github.com/shiena/ansicolor v0.0.0-20151119151921-a422bbe96644/go.mod h1:nkxAfR/5quYxwPZhyDxgasBMnRtBZd0FCEpawpjMUFg=
1412
github.com/stretchr/testify v1.2.2 h1:bSDNvY7ZPG5RlJ8otE/7V6gMiyenm9RtJ7IUVIAoJ1w=
1513
github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
1614
golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=

main.go

+6-7
Original file line numberDiff line numberDiff line change
@@ -2,23 +2,22 @@ package main
22

33
import (
44
"fmt"
5-
"github.com/s12v/secure-exec/provider"
6-
_ "github.com/s12v/secure-exec/provider/awskms"
7-
_ "github.com/s12v/secure-exec/provider/awssecretsmanager"
8-
_ "github.com/s12v/secure-exec/provider/awssecretsmanager"
9-
_ "github.com/s12v/secure-exec/provider/awsssm"
5+
"github.com/s12v/exec-with-secrets/provider"
6+
_ "github.com/s12v/exec-with-secrets/provider/awskms"
7+
_ "github.com/s12v/exec-with-secrets/provider/awssecretsmanager"
8+
_ "github.com/s12v/exec-with-secrets/provider/awsssm"
109
"os"
1110
"syscall"
1211
)
1312

1413
func main() {
1514
if len(os.Args) < 2 {
16-
fmt.Println("Usage: secure-exec program [args]")
15+
fmt.Println("Usage: exec-with-secrets program [args]")
1716
os.Exit(0)
1817
}
1918

2019
env := provider.Populate(os.Environ())
21-
syscall.Exec(os.Args[1], os.Args[1:], env);
20+
syscall.Exec(os.Args[1], os.Args[1:], env)
2221

2322
fmt.Printf("Unable to start %v", os.Args[1])
2423
os.Exit(1)

provider/awskms/awskms.go

+6-4
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,13 @@
33
package awskms
44

55
import (
6+
"context"
67
"encoding/base64"
78
"errors"
89
"fmt"
910
"github.com/aws/aws-sdk-go-v2/aws/external"
1011
"github.com/aws/aws-sdk-go-v2/service/kms"
11-
"github.com/s12v/secure-exec/provider"
12+
"github.com/s12v/exec-with-secrets/provider"
1213
"strings"
1314
)
1415

@@ -18,7 +19,7 @@ type KmsProvider struct {
1819

1920
const prefix = "{aws-kms}"
2021

21-
var decrypt func (awsKmsClient *kms.KMS, input *kms.DecryptInput) (*kms.DecryptOutput, error)
22+
var decrypt func(awsKmsClient *kms.KMS, input *kms.DecryptInput) (*kms.DecryptOutput, error)
2223

2324
func init() {
2425
cfg, err := external.LoadDefaultAWSConfig()
@@ -30,8 +31,9 @@ func init() {
3031
provider.Register(&KmsProvider{kms.New(cfg)})
3132
}
3233

33-
func awsDecrypt (awsKmsClient *kms.KMS, input *kms.DecryptInput) (*kms.DecryptOutput, error) {
34-
if resp, err := awsKmsClient.DecryptRequest(input).Send(); err != nil {
34+
func awsDecrypt(awsKmsClient *kms.KMS, input *kms.DecryptInput) (*kms.DecryptOutput, error) {
35+
ctx := context.Background()
36+
if resp, err := awsKmsClient.DecryptRequest(input).Send(ctx); err != nil {
3537
return nil, errors.New(fmt.Sprintf("KMS error: %v", err))
3638
} else {
3739
return resp, nil

provider/awssecretsmanager/awsecretsmanager.go

+5-3
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,14 @@
33
package awssecretsmanager
44

55
import (
6+
"context"
67
"encoding/json"
78
"errors"
89
"fmt"
910
"github.com/aws/aws-sdk-go-v2/aws"
1011
"github.com/aws/aws-sdk-go-v2/aws/external"
1112
"github.com/aws/aws-sdk-go-v2/service/secretsmanager"
12-
"github.com/s12v/secure-exec/provider"
13+
"github.com/s12v/exec-with-secrets/provider"
1314
"regexp"
1415
"strings"
1516
)
@@ -39,7 +40,8 @@ func init() {
3940
func awsFetch(
4041
awsClient *secretsmanager.SecretsManager,
4142
input *secretsmanager.GetSecretValueInput) (*secretsmanager.GetSecretValueOutput, error) {
42-
if resp, err := awsClient.GetSecretValueRequest(input).Send(); err != nil {
43+
ctx := context.Background()
44+
if resp, err := awsClient.GetSecretValueRequest(input).Send(ctx); err != nil {
4345
return nil, errors.New(fmt.Sprintf("AWS SecretsManager error: %v", err))
4446
} else {
4547
return resp, nil
@@ -60,7 +62,7 @@ func (p *SecretsManagerProvider) Decode(val string) (string, error) {
6062
}
6163

6264
func (p *SecretsManagerProvider) decodeJson(val string, property string) (string, error) {
63-
name := val[:len(val)-len(property) - 2]
65+
name := val[:len(val)-len(property)-2]
6466
jsobj, err := p.fetchString(name)
6567
if err != nil {
6668
return "", err

provider/awsssm/awsssm.go

+5-3
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,12 @@
33
package awsssm
44

55
import (
6+
"context"
67
"errors"
78
"fmt"
89
"github.com/aws/aws-sdk-go-v2/aws/external"
910
"github.com/aws/aws-sdk-go-v2/service/ssm"
10-
"github.com/s12v/secure-exec/provider"
11+
"github.com/s12v/exec-with-secrets/provider"
1112
"strings"
1213
)
1314

@@ -17,7 +18,7 @@ type SsmProvider struct {
1718

1819
const prefix = "{aws-ssm}"
1920

20-
var fetch func (awsSsmClient *ssm.SSM, input *ssm.GetParameterInput) (*ssm.GetParameterOutput, error)
21+
var fetch func(awsSsmClient *ssm.SSM, input *ssm.GetParameterInput) (*ssm.GetParameterOutput, error)
2122

2223
func init() {
2324
cfg, err := external.LoadDefaultAWSConfig()
@@ -30,7 +31,8 @@ func init() {
3031
}
3132

3233
func awsFetch(awsSsmClient *ssm.SSM, input *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
33-
if resp, err := awsSsmClient.GetParameterRequest(input).Send(); err != nil {
34+
ctx := context.Background()
35+
if resp, err := awsSsmClient.GetParameterRequest(input).Send(ctx); err != nil {
3436
return nil, errors.New(fmt.Sprintf("SSM error: %v", err))
3537
} else {
3638
return resp, nil

0 commit comments

Comments
 (0)