@hyperledger/cactus-plugin-keychain-aws-sm
TypeScript icon, indicating that this package has built-in type declarations

2.0.0-alpha.2 • Public • Published

@hyperledger/cactus-plugin-keychain-aws-sm

1. Usage

This plugin provides a way to interact with the AWS Secrets Manager. Using this one can perform:

  • Set key,value pair
  • Get value for a particular key
  • Check if a certain key exists
  • Delete a certain key,value pair

The above functionality can either be accessed by importing hte plugin directly as a library (embedding) or by hosting it as a REST API through the Cactus API server

We also publish the Cactus API server as a container image to the Github Container Registry that you can run easily with a one liner. The API server is also embeddable in your own NodeJS project if you choose to do so.

1.1. Installation

npm

npm install @hyperledger/cactus-plugin-keychain-aws-sm

yarn

yarn add @hyperledger/cactus-plugin-keychain-aws-sm

1.2. Using as a Library

import {
  PluginKeychainAwsSm,
  AwsCredentialType,
} from "@hyperledger/cactus-plugin-keychain-aws-sm";

const plugin = new PluginKeychainAwsSm({
    // See test cases for exact details on what parameters are needed
});

const res = await plugin.get(
    // See function definition for exact details on what parameters are needed and the corresponding output
);

1.3. Using via the API Client

Prerequisites

  • An AWS account with access to AWS Secrets Manager
  • You have a running Cactus API server on $HOST:$PORT with the AWS Secrets Manager connector plugin installed on it (and the latter configured to have access to the AWS Secrets manager from point 1)
import {
  PluginKeychainAwsSm,
  AwsCredentialType,
  DefaultApi as KeychainAwsSmApi,
} from "@hyperledger/cactus-plugin-keychain-aws-sm";

// Step zero is to deploy the Cactus API server
const apiUrl = `https://${HOST}:${PORT}`;

const config = new Configuration({ basePath: apiUrl });

const apiClient = new KeychainAwsSmApi(config);

// Example: To set a key,value pair 
const res = await apiClient.setKeychainEntryV1({
      key: key,
      value: value,
});

2. Architecture

The sequence diagrams for various endpoints are mentioned below

2.1. set-keychain-entry-endpoint

set-keychain-entry-endpoint sequence diagram

2.2. get-keychain-entry-endpoint

get-keychain-entry-endpoint sequence diagram

2.3. has-keychain-entry-endpoint

has-keychain-entry-endpoint sequence diagram

2.4. delete-keychain-entry-endpoint

delete-keychain-entry-endpoint sequence diagram

3. Monitoring

This section explains various monitoring tools used

3.1. Prometheus Exporter

This creates a prometheus exporter, which scraps the transactions (total transaction count) for the use cases incorporating the use of AWS Secret Manager connector plugin.

3.1.1. Usage Prometheus

The prometheus exporter object is initialized in the PluginKeychainAwsSm class constructor itself, so instantiating the object of the PluginKeychainAwsSm class, gives access to the exporter object. You can also initialize the prometheus exporter object seperately and then pass it to the IPluginKeychainAwsSmOptions interface for PluginKeychainAwsSm constructor.

getPrometheusExporterMetricsEndpointV1 function returns the prometheus exporter metrics, currently displaying the total transaction count, which currently increments everytime the set() method of the PluginKeychainAwsSm class is called and decreases everytime the delete() method of the PluginKeychainAwsSm class is called.

3.1.2. Prometheus Integration

To use Prometheus with this exporter make sure to install Prometheus main component. Once Prometheus is setup, the corresponding scrape_config needs to be added to the prometheus.yml

- job_name: 'aws_sm_exporter'
  metrics_path: 'api/v1/plugins/@hyperledger/cactus-plugin-keychain-aws-sm/get-prometheus-exporter-metrics'
  scrape_interval: 5s
  static_configs:
    - targets: ['{host}:{port}']

Here the host:port is where the prometheus exporter metrics are exposed. The test cases (For example, packages/cactus-plugin-keychain-aws-sm/src/test/typescript/integration/plugin-keychain-aws-sm.test.ts) exposes it over 0.0.0.0 and a random port(). The random port can be found in the running logs of the test case and looks like (42379 in the below mentioned URL) Metrics URL: http://0.0.0.0:42379/api/v1/plugins/@hyperledger/cactus-plugin-keychain-aws-sm/get-prometheus-exporter-metrics

Once edited, you can start the prometheus service by referencing the above edited prometheus.yml file. On the prometheus graphical interface (defaulted to http://localhost:9090), choose Graph from the menu bar, then select the Console tab. From the Insert metric at cursor drop down, select cactus_keychain_awssm_managed_key_count and click execute

3.1.3. Helper code

3.1.3.1. response.type.ts

This file contains the various responses of the metrics.

3.1.3.2. data-fetcher.ts

This file contains functions encasing the logic to process the data points

3.1.3.3. metrics.ts

This file lists all the prometheus metrics and what they are used for.

4. Contributing

We welcome contributions to Hyperledger Cactus in many forms, and there’s always plenty to do!

Please review CONTIRBUTING.md to get started.

5. License

This distribution is published under the Apache License Version 2.0 found in the LICENSE file.

6. Acknowledgments

Package Sidebar

Install

npm i @hyperledger/cactus-plugin-keychain-aws-sm

Weekly Downloads

2

Version

2.0.0-alpha.2

License

Apache-2.0

Unpacked Size

941 kB

Total Files

51

Last publish

Collaborators

  • peter.somogyvari
  • hyperledger-ghci
  • hyperledger-lf