@@ -15,12 +15,10 @@ import (
1515 "github.com/flowexec/flow/internal/context"
1616 "github.com/flowexec/flow/internal/io"
1717 "github.com/flowexec/flow/internal/io/secret"
18- secretV2 "github.com/flowexec/flow/internal/io/secret/v2"
1918 "github.com/flowexec/flow/internal/logger"
2019 "github.com/flowexec/flow/internal/utils"
2120 envUtils "github.com/flowexec/flow/internal/utils/env"
2221 "github.com/flowexec/flow/internal/vault"
23- vaultV2 "github.com/flowexec/flow/internal/vault/v2"
2422 "github.com/flowexec/flow/types/config"
2523)
2624
@@ -72,22 +70,14 @@ func removeSecretFunc(ctx *context.Context, _ *cobra.Command, args []string) {
7270 return
7371 }
7472
75- if currentVault (ctx .Config ) == vaultV2 .LegacyVaultReservedName {
76- logger .Log ().Warnf ("Using deprecated vault. Consider creating a new vault with 'flow vault create' command." )
77- v := vault .NewVault ()
78- if err = v .DeleteSecret (reference ); err != nil {
79- logger .Log ().FatalErr (err )
80- }
81- } else {
82- _ , v , err := vaultV2 .VaultFromName (currentVault (ctx .Config ))
83- defer v .Close ()
73+ _ , v , err := vault .VaultFromName (currentVault (ctx .Config ))
74+ defer v .Close ()
8475
85- if err != nil {
86- logger .Log ().FatalErr (err )
87- }
88- if err = v .DeleteSecret (reference ); err != nil {
89- logger .Log ().FatalErr (err )
90- }
76+ if err != nil {
77+ logger .Log ().FatalErr (err )
78+ }
79+ if err = v .DeleteSecret (reference ); err != nil {
80+ logger .Log ().FatalErr (err )
9181 }
9282
9383 logger .Log ().PlainTextSuccess (fmt .Sprintf ("Secret '%s' deleted from vault" , reference ))
@@ -148,28 +138,15 @@ func setSecretFunc(ctx *context.Context, cmd *cobra.Command, args []string) {
148138 value = strings .Join (args [1 :], " " )
149139 }
150140
151- sv := vault .SecretValue (value )
152141 vaultName := currentVault (ctx .Config )
153- if vaultName == vaultV2 .LegacyVaultReservedName {
154- logger .Log ().Warnf (
155- "Using deprecated vault '%s'. Consider creating a new vault with 'flow vault create' command." ,
156- vaultName ,
157- )
158- v := vault .NewVault ()
159- err := v .SetSecret (reference , sv )
160- if err != nil {
161- logger .Log ().FatalErr (err )
162- }
163- } else {
164- _ , v , err := vaultV2 .VaultFromName (vaultName )
165- defer v .Close ()
142+ _ , v , err := vault .VaultFromName (vaultName )
143+ defer v .Close ()
166144
167- if err != nil {
168- logger .Log ().FatalErr (err )
169- }
170- if err = v .SetSecret (reference , vaultV2 .NewSecretValue ([]byte (value ))); err != nil {
171- logger .Log ().FatalErr (err )
172- }
145+ if err != nil {
146+ logger .Log ().FatalErr (err )
147+ }
148+ if err = v .SetSecret (reference , vault .NewSecretValue ([]byte (value ))); err != nil {
149+ logger .Log ().FatalErr (err )
173150 }
174151
175152 logger .Log ().PlainTextSuccess (fmt .Sprintf ("Secret %s set in vault" , reference ))
@@ -194,45 +171,29 @@ func listSecretFunc(ctx *context.Context, cmd *cobra.Command, _ []string) {
194171 asPlainText := flags .ValueFor [bool ](cmd , * flags .OutputSecretAsPlainTextFlag , false )
195172 outputFormat := flags .ValueFor [string ](cmd , * flags .OutputFormatFlag , false )
196173
197- //nolint:nestif
198- if currentVault (ctx .Config ) == vaultV2 .LegacyVaultReservedName {
199- v := vault .NewVault ()
200- secrets , err := v .GetAllSecrets ()
201- if err != nil {
202- logger .Log ().FatalErr (err )
203- }
204-
205- interactiveUI := TUIEnabled (ctx , cmd )
206- if interactiveUI {
207- secret .LoadSecretListView (ctx , asPlainText )
208- } else {
209- secret .PrintSecrets (ctx , secrets , outputFormat , asPlainText )
210- }
211- } else {
212- name := currentVault (ctx .Config )
213- interactiveUI := TUIEnabled (ctx , cmd )
174+ name := currentVault (ctx .Config )
175+ interactiveUI := TUIEnabled (ctx , cmd )
214176
215- _ , v , err := vaultV2 .VaultFromName (name )
216- defer func () {
217- // Don't close the vault prematurely if we're in interactive mode
218- go func () {
219- if interactiveUI {
220- ctx .TUIContainer .WaitForExit ()
221- }
222- _ = v .Close ()
223- }()
177+ _ , v , err := vault .VaultFromName (name )
178+ defer func () {
179+ // Don't close the vault prematurely if we're in interactive mode
180+ go func () {
181+ if interactiveUI {
182+ ctx .TUIContainer .WaitForExit ()
183+ }
184+ _ = v .Close ()
224185 }()
186+ }()
225187
226- if err != nil {
227- logger .Log ().FatalErr (err )
228- }
188+ if err != nil {
189+ logger .Log ().FatalErr (err )
190+ }
229191
230- if interactiveUI {
231- view := secretV2 .NewSecretListView (ctx , v , asPlainText )
232- SetView (ctx , cmd , view )
233- } else {
234- secretV2 .PrintSecrets (ctx , name , v , outputFormat , asPlainText )
235- }
192+ if interactiveUI {
193+ view := secret .NewSecretListView (ctx , v , asPlainText )
194+ SetView (ctx , cmd , view )
195+ } else {
196+ secret .PrintSecrets (ctx , name , v , outputFormat , asPlainText )
236197 }
237198}
238199
@@ -254,65 +215,41 @@ func getSecretFunc(ctx *context.Context, cmd *cobra.Command, args []string) {
254215 asPlainText := flags .ValueFor [bool ](cmd , * flags .OutputSecretAsPlainTextFlag , false )
255216 copyValue := flags .ValueFor [bool ](cmd , * flags .CopyFlag , false )
256217
257- //nolint:nestif
258- if currentVault (ctx .Config ) == vaultV2 .LegacyVaultReservedName {
259- logger .Log ().Warnf ("Using deprecated vault. Consider creating a new vault with 'flow vault create' command." )
260- v := vault .NewVault ()
261- s , err := v .GetSecret (reference )
262- if err != nil {
263- logger .Log ().FatalErr (err )
264- }
218+ rVault , key , err := vault .RefToParts (vault .SecretRef (reference ))
219+ if err != nil {
220+ logger .Log ().FatalErr (err )
221+ }
222+ if rVault == "" {
223+ rVault = currentVault (ctx .Config )
224+ }
225+ _ , v , err := vault .VaultFromName (rVault )
226+ defer v .Close ()
265227
266- if asPlainText {
267- logger .Log ().PlainTextInfo (s .PlainTextString ())
268- } else {
269- logger .Log ().PlainTextInfo (s .String ())
270- }
228+ if err != nil {
229+ logger .Log ().FatalErr (err )
230+ }
231+ s , err := v .GetSecret (key )
232+ if err != nil {
233+ logger .Log ().FatalErr (err )
234+ }
271235
272- if copyValue {
273- if err := clipboard .WriteAll (s .PlainTextString ()); err != nil {
274- logger .Log ().Error (err , "\n unable to copy secret value to clipboard" )
275- } else {
276- logger .Log ().PlainTextSuccess ("\n copied secret value to clipboard" )
277- }
278- }
236+ if asPlainText {
237+ logger .Log ().PlainTextInfo (s .PlainTextString ())
279238 } else {
280- rVault , key , err := vaultV2 .RefToParts (vaultV2 .SecretRef (reference ))
281- if err != nil {
282- logger .Log ().FatalErr (err )
283- }
284- if rVault == "" {
285- rVault = currentVault (ctx .Config )
286- }
287- _ , v , err := vaultV2 .VaultFromName (rVault )
288- defer v .Close ()
289-
290- if err != nil {
291- logger .Log ().FatalErr (err )
292- }
293- s , err := v .GetSecret (key )
294- if err != nil {
295- logger .Log ().FatalErr (err )
296- }
297-
298- if asPlainText {
299- logger .Log ().PlainTextInfo (s .PlainTextString ())
239+ logger .Log ().PlainTextInfo (s .String ())
240+ }
241+ if copyValue {
242+ if err := clipboard .WriteAll (s .PlainTextString ()); err != nil {
243+ logger .Log ().Error (err , "\n unable to copy secret value to clipboard" )
300244 } else {
301- logger .Log ().PlainTextInfo (s .String ())
302- }
303- if copyValue {
304- if err := clipboard .WriteAll (s .PlainTextString ()); err != nil {
305- logger .Log ().Error (err , "\n unable to copy secret value to clipboard" )
306- } else {
307- logger .Log ().PlainTextSuccess ("\n copied secret value to clipboard" )
308- }
245+ logger .Log ().PlainTextSuccess ("\n copied secret value to clipboard" )
309246 }
310247 }
311248}
312249
313250func currentVault (cfg * config.Config ) string {
314- if cfg .CurrentVault == nil || * cfg . CurrentVault == "" {
315- return vaultV2 . LegacyVaultReservedName
251+ if cfg .CurrentVault == nil {
252+ return ""
316253 }
317254 return * cfg .CurrentVault
318255}
0 commit comments