ockam_command 0.150.0

End-to-end encryption and mutual authentication for distributed applications.
use miette::{miette, Result};

use ockam_api::colors::color_primary;
use serde::{Deserialize, Serialize};

use crate::run::parser::building_blocks::{ArgsToCommands, ResourcesContainer};

use crate::run::parser::resource::utils::parse_cmd_from_args;

use crate::vault::CreateCommand;
use crate::{vault, Command, OckamSubcommand};

#[derive(Debug, Clone, PartialEq, Serialize, Deserialize)]
pub struct Vaults {
    #[serde(alias = "vault")]
    pub vaults: Option<ResourcesContainer>,
}

impl Vaults {
    fn get_subcommand(args: &[String]) -> Result<CreateCommand> {
        if let OckamSubcommand::Vault(cmd) = parse_cmd_from_args(CreateCommand::NAME, args)? {
            if let vault::VaultSubcommand::Create(c) = cmd.subcommand {
                return Ok(c);
            }
        }
        Err(miette!(format!(
            "Failed to parse {} command",
            color_primary(CreateCommand::NAME)
        )))
    }

    pub fn into_parsed_commands(self) -> Result<Vec<CreateCommand>> {
        match self.vaults {
            Some(c) => c.into_commands(Self::get_subcommand),
            None => Ok(vec![]),
        }
    }
}

#[cfg(test)]
mod tests {
    use miette::IntoDiagnostic;

    use super::*;

    #[test]
    fn single_vault_config() {
        let test = |c: &str| {
            let parsed: Vaults = serde_yaml::from_str(c).unwrap();
            let cmds = parsed.into_parsed_commands().unwrap();
            assert_eq!(cmds.len(), 1);
            assert_eq!(cmds[0].name.as_ref().unwrap(), "v1");
        };

        // Name only
        let config = r#"
            vaults:
              - v1
        "#;
        test(config);

        let config = r#"
            vaults: v1
        "#;
        test(config);

        // Config only
        let config = r#"
            vaults:
              v1:
                path: ./vault.path
                aws-kms: false
        "#;
        test(config);
    }

    #[test]
    fn multiple_vaults_config() {
        let test = |c: &str| {
            let parsed: Vaults = serde_yaml::from_str(c).unwrap();
            let cmds = parsed.into_parsed_commands().unwrap();
            assert_eq!(cmds.len(), 2);
            assert_eq!(cmds[0].name.as_ref().unwrap(), "v1");
            assert_eq!(cmds[1].name.as_ref().unwrap(), "v2");
        };

        // Name only
        let config = r#"
            vaults:
              - v1
              - v2
        "#;
        test(config);

        // Config only
        let config = r#"
            vaults:
              v1:
                aws-kms: true
              v2:
                path: ./vault.path
        "#;
        test(config);

        // Mixing name and args as a list
        let config = r#"
            vaults:
              - v1
              - v2:
                  aws-kms: true
        "#;
        test(config);

        // Mixing name and args as a map will fail
        let config = r#"
            vaults:
              v1:
              v2:
                aws-kms: true
        "#;
        let parsed: Result<Vaults> = serde_yaml::from_str(config).into_diagnostic();
        assert!(parsed.is_err());
    }
}