A Golang API and examples for Delinea Secret Server.
The API requires a Configuration
object containing a Username
, Password
and either a Tenant
for Secret Server Cloud or a ServerURL
of Secret Server/Platform:
type UserCredential struct {
Username, Password string
}
type Configuration struct {
Credentials UserCredential
ServerURL, TLD, Tenant, apiPathURI, tokenPathURI string
}
Define a Configuration
, use it to create an instance of Server
for Secret Server:
tss := server.New(server.Configuration{
Credentials: UserCredential{
Username: os.Getenv("TSS_USERNAME"),
Password: os.Getenv("TSS_PASSWORD"),
},
// Expecting either the tenant or URL to be set
Tenant: os.Getenv("TSS_API_TENANT"),
ServerURL: os.Getenv("TSS_SERVER_URL"),
})
OR
Define a Configuration
, use it to create an instance of Server
for Platform:
tss := server.New(server.Configuration{
Credentials: UserCredential{
Username: os.Getenv("TSS_PLATFORM_USERNAME"),
Password: os.Getenv("TSS_PLATFORM_PASSWORD"),
},
ServerURL: os.Getenv("TSS_PLATFORM_URL"),
})
Get a secret by its numeric ID:
s, err := tss.Secret(1)
if err != nil {
log.Fatal("failure calling server.Secret", err)
}
if pw, ok := secret.Field("password"); ok {
fmt.Print("the password is", pw)
}
Create a Secret:
secretModel := new(Secret)
secretModel.Name = "New Secret"
secretModel.SiteID = 1
secretModel.FolderID = 6
secretModel.SecretTemplateID = 8
secretModel.Fields = make([]SecretField, 1)
secretModel.Fields[0].FieldID = 270
secretModel.Fields[0].ItemValue = somePassword
newSecret, err := tss.CreateSecret(*secretModel)
Update the Secret:
secretModel.ID = newSecret.ID
secretModel.Fields[0].ItemValue = someNewPassword
updatedSecret, err := tss.UpdateSecret(*secretModel)
Delete the Secret:
err := tss.DeleteSecret(newSecret.ID)
The tests populate a Configuration
from JSON:
config := new(Configuration)
if cj, err := ioutil.ReadFile("../test_config.json"); err == nil {
json.Unmarshal(cj, &config)
}
tss := New(*config)
../test_config.json
:
{
"credentials": {
"username": "my_app_user",
"password": "Passw0rd."
},
"serverURL": "http://example.local/SecretServer"
}
The necessary configuration may also be configured from environment variables:
Env Var Name | Description |
---|---|
TSS_USERNAME | The user name for the Secret Server |
TSS_PASSWORD | The password for the user of Secret Server |
TSS_TENANT | Name for tenants hosted in the Secret Server Cloud. This is prepended to the *.secretservercloud.com domain to determine the server URL. |
TSS_SERVER_URL | URL for secret servers not hosted in the cloud, eg: https://delinea.mycompany.com/SecretServer or platform URL |
TSS_PLATFORM_USERNAME | The user name for the Platform user |
TSS_PLATFORM_PASSWORD | The password for the Platform user |
TSS_PLATFORM_URL | URL for Platform, eg: https://delinea.secureplatform.com/ |
Reads the secret with ID 1
or the ID passed in the TSS_SECRET_ID
environment variable
and extracts the password
field from it.
Creates a secret with a fixed password using the values passed in the environment variables below. It then reads the secret from the server, validates its values, updates it, and deletes it.
Env Var Name | Description |
---|---|
TSS_SITE_ID | The numeric ID of the distributed engine site |
TSS_FOLDER_ID | The numeric ID of the folder where the secret will be created |
TSS_TEMPLATE_ID | The numeric ID of the template that defines the secret's fields |
TSS_TEST_PASSWORD | The password to set for testing |
Creates a secret with generated SSH keys using the values passed in the environment variables below. It then reads the secret from the server, validates its values, updates it, and deletes it.
Env Var Name | Description |
---|---|
TSS_SITE_ID | The numeric ID of the distributed engine site |
TSS_FOLDER_ID | The numeric ID of the folder where the secret will be created |
TSS_SSH_KEY_TEMPLATE_ID | The numeric ID of the template that defines the secret's fields. This template must have extended mappings that support SSH keys. |
TSS_TEST_PASSWORD | The password to set for testing |
Searches for secrets with a field value using the values passed in the environment variables below.
Env Var Name | Description |
---|---|
TSS_SEARCH_FIELD | The secret field to be searched |
TSS_SEARCH_TEXT | The text to search |
Searches for secrets containing text using the values passed in the environment variables below.
Env Var Name | Description |
---|---|
TSS_SEARCH_TEXT | The text to search |
Retrieves the template indicated in the environment variable below, iterates its fields, and validates that we can generate a password value for every field that is a password field.
Env Var Name | Description |
---|---|
TSS_TEMPLATE_ID | The numeric ID of the template that defines the secret's fields |