Compare commits
6 Commits
v0.2.2-dev
...
v0.3.1-mai
Author | SHA1 | Date | |
---|---|---|---|
3cd42dab6b | |||
e2c83b5219 | |||
b414031af0 | |||
d73fba9899 | |||
3ee8c1e573 | |||
9aa16a3f2e |
1
.env
1
.env
@@ -1,5 +1,6 @@
|
|||||||
SECRET_MAIN_KEY=Somesupersecretpassword!!!45345435
|
SECRET_MAIN_KEY=Somesupersecretpassword!!!45345435
|
||||||
SECRET_KEY=AmIGoodEnoughForYou?
|
SECRET_KEY=AmIGoodEnoughForYou?
|
||||||
|
SERVICE_PASSPHRASE=T5OCHDHadAtuOWIqRAS7u8XHDDkzKT1Uvvw7mGMkNzKjVdlHA8xGdILf2adDHspO
|
||||||
ROOT_DIRECTORY=/path/to/root
|
ROOT_DIRECTORY=/path/to/root
|
||||||
POSTGRES_MAIN_USER=myuser
|
POSTGRES_MAIN_USER=myuser
|
||||||
POSTGRES_MAIN_PASSWORD=password
|
POSTGRES_MAIN_PASSWORD=password
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
SECRET_MAIN_KEY=Somesupersecretpassword!!!45345435
|
SECRET_MAIN_KEY=Somesupersecretpassword!!!45345435
|
||||||
SECRET_KEY=AmIGoodEnoughForYou?
|
SECRET_KEY=AmIGoodEnoughForYou?
|
||||||
|
SERVICE_PASSPHRASE=T5OCHDHadAtuOWIqRAS7u8XHDDkzKT1Uvvw7mGMkNzKjVdlHA8xGdILf2adDHspO
|
||||||
ROOT_DIRECTORY=/path/to/root
|
ROOT_DIRECTORY=/path/to/root
|
||||||
POSTGRES_MAIN_USER=myuser
|
POSTGRES_MAIN_USER=myuser
|
||||||
POSTGRES_MAIN_PASSWORD=password
|
POSTGRES_MAIN_PASSWORD=password
|
||||||
|
@@ -3,7 +3,7 @@ name: Release Tagging
|
|||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
branches:
|
branches:
|
||||||
- devel
|
- main
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
release:
|
release:
|
||||||
|
@@ -4,11 +4,9 @@ on:
|
|||||||
push:
|
push:
|
||||||
branches:
|
branches:
|
||||||
- main
|
- main
|
||||||
- devel
|
|
||||||
pull_request:
|
pull_request:
|
||||||
branches:
|
branches:
|
||||||
- main
|
- main
|
||||||
- devel
|
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
check:
|
check:
|
||||||
@@ -62,4 +60,3 @@ jobs:
|
|||||||
with:
|
with:
|
||||||
toolchain: 1.88.0
|
toolchain: 1.88.0
|
||||||
- run: cargo build
|
- run: cargo build
|
||||||
|
|
||||||
|
2
Cargo.lock
generated
2
Cargo.lock
generated
@@ -297,7 +297,7 @@ checksum = "f154ce46856750ed433c8649605bf7ed2de3bc35fd9d2a9f30cddd873c80cb08"
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "icarus_envy"
|
name = "icarus_envy"
|
||||||
version = "0.2.2"
|
version = "0.3.1"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"async-std",
|
"async-std",
|
||||||
"const_format",
|
"const_format",
|
||||||
|
@@ -1,6 +1,6 @@
|
|||||||
[package]
|
[package]
|
||||||
name = "icarus_envy"
|
name = "icarus_envy"
|
||||||
version = "0.2.2"
|
version = "0.3.1"
|
||||||
edition = "2024"
|
edition = "2024"
|
||||||
rust-version = "1.88"
|
rust-version = "1.88"
|
||||||
|
|
||||||
|
@@ -8,6 +8,11 @@ pub async fn get_secret_main_key() -> String {
|
|||||||
std::env::var(crate::keys::SECRET_MAIN_KEY).expect(crate::keys::error::SECRET_MAIN_KEY)
|
std::env::var(crate::keys::SECRET_MAIN_KEY).expect(crate::keys::error::SECRET_MAIN_KEY)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub async fn get_service_passphrase() -> String {
|
||||||
|
dotenvy::dotenv().ok();
|
||||||
|
std::env::var(crate::keys::SERVICE_PASSPHRASE).expect(crate::keys::error::SERVICE_LOGIN)
|
||||||
|
}
|
||||||
|
|
||||||
pub async fn get_secret_key() -> String {
|
pub async fn get_secret_key() -> String {
|
||||||
dotenvy::dotenv().ok();
|
dotenvy::dotenv().ok();
|
||||||
std::env::var(crate::keys::SECRET_KEY).expect(crate::keys::error::SECRET_KEY)
|
std::env::var(crate::keys::SECRET_KEY).expect(crate::keys::error::SECRET_KEY)
|
||||||
|
@@ -5,6 +5,9 @@ pub const DB_URL: &str = "DATABASE_URL";
|
|||||||
// Used for the icarus app
|
// Used for the icarus app
|
||||||
pub const SECRET_MAIN_KEY: &str = "SECRET_MAIN_KEY";
|
pub const SECRET_MAIN_KEY: &str = "SECRET_MAIN_KEY";
|
||||||
|
|
||||||
|
// Environment key for service logins
|
||||||
|
pub const SERVICE_PASSPHRASE: &str = "SERVICE_PASSPHRASE";
|
||||||
|
|
||||||
// Environment key for secret key
|
// Environment key for secret key
|
||||||
// Generic use of secret key that could be found in various apps
|
// Generic use of secret key that could be found in various apps
|
||||||
pub const SECRET_KEY: &str = "SECRET_KEY";
|
pub const SECRET_KEY: &str = "SECRET_KEY";
|
||||||
@@ -20,8 +23,9 @@ pub mod error {
|
|||||||
|
|
||||||
pub const GENERAL_ERROR: &str = "must not be set in enviornment file";
|
pub const GENERAL_ERROR: &str = "must not be set in enviornment file";
|
||||||
pub const DB_URL: &str = concatcp!(super::DB_URL, " ", GENERAL_ERROR);
|
pub const DB_URL: &str = concatcp!(super::DB_URL, " ", GENERAL_ERROR);
|
||||||
pub const SECRET_KEY: &str = concatcp!(super::SECRET_KEY, " ", GENERAL_ERROR);
|
|
||||||
pub const SECRET_MAIN_KEY: &str = concatcp!(super::SECRET_MAIN_KEY, " ", GENERAL_ERROR);
|
pub const SECRET_MAIN_KEY: &str = concatcp!(super::SECRET_MAIN_KEY, " ", GENERAL_ERROR);
|
||||||
|
pub const SERVICE_LOGIN: &str = concatcp!(super::SERVICE_PASSPHRASE, " ", GENERAL_ERROR);
|
||||||
|
pub const SECRET_KEY: &str = concatcp!(super::SECRET_KEY, " ", GENERAL_ERROR);
|
||||||
pub const ROOT_DIRECTORY: &str = concatcp!(super::ROOT_DIRECTORY, " ", GENERAL_ERROR);
|
pub const ROOT_DIRECTORY: &str = concatcp!(super::ROOT_DIRECTORY, " ", GENERAL_ERROR);
|
||||||
pub const ICARUS_BASE_API_URL: &str = concatcp!(super::ICARUS_BASE_API_URL, " ", GENERAL_ERROR);
|
pub const ICARUS_BASE_API_URL: &str = concatcp!(super::ICARUS_BASE_API_URL, " ", GENERAL_ERROR);
|
||||||
}
|
}
|
||||||
|
@@ -20,6 +20,16 @@ mod tests {
|
|||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn test_get_service_passphrase() {
|
||||||
|
let result = async_std::task::block_on(icarus_envy::environment::get_service_passphrase());
|
||||||
|
assert_eq!(
|
||||||
|
result, "T5OCHDHadAtuOWIqRAS7u8XHDDkzKT1Uvvw7mGMkNzKjVdlHA8xGdILf2adDHspO",
|
||||||
|
"SERVICE_PASSPHRASE does not match {:?}",
|
||||||
|
result
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn test_get_secret_key() {
|
fn test_get_secret_key() {
|
||||||
let result = async_std::task::block_on(icarus_envy::environment::get_secret_key());
|
let result = async_std::task::block_on(icarus_envy::environment::get_secret_key());
|
||||||
|
Reference in New Issue
Block a user