1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
// Copyright Materialize, Inc. and contributors. All rights reserved.
//
// Use of this software is governed by the Business Source License
// included in the LICENSE file.
//
// As of the Change Date specified in that file, in accordance with
// the Business Source License, use of this software will be governed
// by the Apache License, Version 2.0.

//! Management of user secrets via the local file system.

use std::path::PathBuf;
use std::sync::Arc;

use anyhow::Context;
use async_trait::async_trait;
use mz_repr::CatalogItemId;
use mz_secrets::{SecretsController, SecretsReader};
use tokio::fs::{self, OpenOptions};
use tokio::io::AsyncWriteExt;

use crate::ProcessOrchestrator;

#[async_trait]
impl SecretsController for ProcessOrchestrator {
    async fn ensure(&self, id: CatalogItemId, contents: &[u8]) -> Result<(), anyhow::Error> {
        let file_path = self.secrets_dir.join(id.to_string());
        let mut file = OpenOptions::new()
            .mode(0o600)
            .create(true)
            .write(true)
            .truncate(true)
            .open(file_path)
            .await
            .with_context(|| format!("writing secret {id}"))?;
        file.write_all(contents)
            .await
            .with_context(|| format!("writing secret {id}"))?;
        file.sync_all()
            .await
            .with_context(|| format!("writing secret {id}"))?;
        Ok(())
    }

    async fn delete(&self, id: CatalogItemId) -> Result<(), anyhow::Error> {
        fs::remove_file(self.secrets_dir.join(id.to_string()))
            .await
            .with_context(|| format!("deleting secret {id}"))?;
        Ok(())
    }

    async fn list(&self) -> Result<Vec<CatalogItemId>, anyhow::Error> {
        let mut ids = Vec::new();
        let mut entries = fs::read_dir(&self.secrets_dir)
            .await
            .context("listing secrets")?;
        while let Some(dir) = entries.next_entry().await? {
            let id: CatalogItemId = dir.file_name().to_string_lossy().parse()?;
            ids.push(id);
        }
        Ok(ids)
    }

    fn reader(&self) -> Arc<dyn SecretsReader> {
        Arc::new(ProcessSecretsReader {
            secrets_dir: self.secrets_dir.clone(),
        })
    }
}

/// A secrets reader associated with a [`ProcessOrchestrator`].
#[derive(Debug)]
pub struct ProcessSecretsReader {
    secrets_dir: PathBuf,
}

impl ProcessSecretsReader {
    /// Constructs a new [`ProcessSecretsReader`] that reads secrets out of the
    /// specified directory.
    pub fn new(secrets_dir: PathBuf) -> ProcessSecretsReader {
        ProcessSecretsReader { secrets_dir }
    }
}

#[async_trait]
impl SecretsReader for ProcessSecretsReader {
    async fn read(&self, id: CatalogItemId) -> Result<Vec<u8>, anyhow::Error> {
        let contents = fs::read(self.secrets_dir.join(id.to_string()))
            .await
            .with_context(|| format!("reading secret {id}"))?;
        Ok(contents)
    }
}