1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56
use crate::{VaultRequestMessage, VaultResponseMessage, VaultSync, VaultSyncCoreError}; use ockam_core::Result; use ockam_node::block_future; use ockam_vault_core::{KeyId, KeyIdVault, PublicKey, Secret}; impl KeyIdVault for VaultSync { fn get_secret_by_key_id(&mut self, key_id: &str) -> Result<Secret> { block_future(&self.ctx.runtime(), async move { self.send_message(VaultRequestMessage::GetSecretByKeyId { key_id: key_id.to_string(), }) .await?; let resp = self.receive_message().await?; if let VaultResponseMessage::GetSecretByKeyId(s) = resp { Ok(s) } else { Err(VaultSyncCoreError::InvalidResponseType.into()) } }) } fn compute_key_id_for_public_key(&mut self, public_key: &PublicKey) -> Result<KeyId> { block_future(&self.ctx.runtime(), async move { self.send_message(VaultRequestMessage::ComputeKeyIdForPublicKey { public_key: public_key.clone(), }) .await?; let resp = self.receive_message().await?; if let VaultResponseMessage::ComputeKeyIdForPublicKey(s) = resp { Ok(s) } else { Err(VaultSyncCoreError::InvalidResponseType.into()) } }) } } #[cfg(test)] mod tests { use ockam_vault::SoftwareVault; use ockam_vault_test_attribute::*; fn new_vault() -> SoftwareVault { SoftwareVault::default() } #[vault_test_sync] fn compute_key_id_for_public_key() {} #[vault_test_sync] fn get_secret_by_key_id() {} }