Skip to content

Commit

Permalink
refactor(sdk): remove deprecated StoreSecret code
Browse files Browse the repository at this point in the history
BREAKING CHANGE: remove deprecated StoreSecret code, use SecretProvider

Closes: #1224

Signed-off-by: Marc-Philippe Fuller <[email protected]>
  • Loading branch information
marcpfuller committed Jan 9, 2023
1 parent e59d3cb commit dcbe784
Show file tree
Hide file tree
Showing 3 changed files with 0 additions and 27 deletions.
6 changes: 0 additions & 6 deletions internal/app/service.go
Original file line number Diff line number Diff line change
Expand Up @@ -575,12 +575,6 @@ func (svc *Service) ListenForCustomConfigChanges(configToWatch interface{}, sect
return nil
}

// StoreSecret stores the secret data to a secret store at the specified path.
func (svc *Service) StoreSecret(path string, secretData map[string]string) error {
secretProvider := bootstrapContainer.SecretProviderFrom(svc.dic.Get)
return secretProvider.StoreSecret(path, secretData)
}

// SecretProvider returns the SecretProvider instance
func (svc *Service) SecretProvider() bootstrapInterfaces.SecretProvider {
secretProvider := bootstrapContainer.SecretProviderFrom(svc.dic.Get)
Expand Down
14 changes: 0 additions & 14 deletions pkg/interfaces/mocks/ApplicationService.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

7 changes: 0 additions & 7 deletions pkg/interfaces/service.go
Original file line number Diff line number Diff line change
Expand Up @@ -124,13 +124,6 @@ type ApplicationService interface {
// asynchronously to the Edgex MessageBus on the specified topic.
// Not valid for use with the HTTP or External MQTT triggers
AddBackgroundPublisherWithTopic(capacity int, topic string) (BackgroundPublisher, error)
// StoreSecret stores the specified secret data into the secret store (secure only) for the specified path
// An error is returned if:
// - Specified secret data is empty
// - Not using the secure secret store, i.e. not valid with InsecureSecrets configuration
// - Secure secret provider is not properly initialized
// - Connection issues with Secret Store service.
StoreSecret(path string, secretData map[string]string) error // LoggingClient returns the Logger client
// SecretProvider returns the SecretProvider instance
SecretProvider() bootstrapInterfaces.SecretProvider
// LoggingClient returns the Logger client
Expand Down

0 comments on commit dcbe784

Please sign in to comment.