1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
use crate::VaultError;
use ockam_core::compat::{collections::BTreeMap, string::String};
use ockam_core::Result;
use ockam_vault_core::{Secret, SecretAttributes, SecretKey};
use tracing::info;
#[derive(Debug)]
pub struct SoftwareVault {
pub(crate) entries: BTreeMap<usize, VaultEntry>,
pub(crate) next_id: usize,
}
impl SoftwareVault {
pub fn new() -> Self {
info!("Creating vault");
Self {
entries: Default::default(),
next_id: 0,
}
}
}
impl Default for SoftwareVault {
fn default() -> Self {
Self::new()
}
}
impl SoftwareVault {
pub(crate) fn get_entry(&self, context: &Secret) -> Result<&VaultEntry> {
self.entries
.get(&context.index())
.ok_or_else(|| VaultError::EntryNotFound.into())
}
}
#[derive(Debug, Eq, PartialEq)]
pub(crate) struct VaultEntry {
key_id: Option<String>,
key_attributes: SecretAttributes,
key: SecretKey,
}
impl VaultEntry {
pub fn key_id(&self) -> &Option<String> {
&self.key_id
}
pub fn key_attributes(&self) -> SecretAttributes {
self.key_attributes
}
pub fn key(&self) -> &SecretKey {
&self.key
}
}
impl VaultEntry {
pub fn new(key_id: Option<String>, key_attributes: SecretAttributes, key: SecretKey) -> Self {
VaultEntry {
key_id,
key_attributes,
key,
}
}
}
#[cfg(test)]
mod tests {
use crate::SoftwareVault;
#[test]
fn new_vault() {
let vault = SoftwareVault::new();
assert_eq!(vault.next_id, 0);
assert_eq!(vault.entries.len(), 0);
}
}