2023-03-28 19:12:30 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
|
2018-10-19 16:04:07 +00:00
|
|
|
package tokenread
|
|
|
|
|
|
|
|
import (
|
|
|
|
"flag"
|
|
|
|
"fmt"
|
2020-02-15 15:06:05 +00:00
|
|
|
"strings"
|
2018-10-19 16:04:07 +00:00
|
|
|
|
2022-04-05 21:10:06 +00:00
|
|
|
"github.com/mitchellh/cli"
|
|
|
|
|
2018-10-24 14:24:29 +00:00
|
|
|
"github.com/hashicorp/consul/api"
|
2018-10-19 16:04:07 +00:00
|
|
|
"github.com/hashicorp/consul/command/acl"
|
2020-02-15 15:06:05 +00:00
|
|
|
"github.com/hashicorp/consul/command/acl/token"
|
2018-10-19 16:04:07 +00:00
|
|
|
"github.com/hashicorp/consul/command/flags"
|
|
|
|
)
|
|
|
|
|
|
|
|
func New(ui cli.Ui) *cmd {
|
|
|
|
c := &cmd{UI: ui}
|
|
|
|
c.init()
|
|
|
|
return c
|
|
|
|
}
|
|
|
|
|
|
|
|
type cmd struct {
|
|
|
|
UI cli.Ui
|
|
|
|
flags *flag.FlagSet
|
|
|
|
http *flags.HTTPFlags
|
|
|
|
help string
|
|
|
|
|
2023-02-07 18:26:30 +00:00
|
|
|
tokenAccessorID string
|
|
|
|
self bool
|
|
|
|
showMeta bool
|
|
|
|
format string
|
|
|
|
expanded bool
|
|
|
|
|
|
|
|
tokenID string // DEPRECATED
|
2018-10-19 16:04:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cmd) init() {
|
|
|
|
c.flags = flag.NewFlagSet("", flag.ContinueOnError)
|
2018-10-24 14:24:29 +00:00
|
|
|
c.flags.BoolVar(&c.showMeta, "meta", false, "Indicates that token metadata such "+
|
|
|
|
"as the content hash and Raft indices should be shown for each entry")
|
|
|
|
c.flags.BoolVar(&c.self, "self", false, "Indicates that the current HTTP token "+
|
2023-02-07 18:26:30 +00:00
|
|
|
"should be read by secret ID instead of expecting a -accessor-id option")
|
2022-03-31 16:49:11 +00:00
|
|
|
c.flags.BoolVar(&c.expanded, "expanded", false, "Indicates that the contents of the "+
|
|
|
|
" policies and roles affecting the token should also be shown.")
|
2023-02-07 18:26:30 +00:00
|
|
|
c.flags.StringVar(&c.tokenAccessorID, "accessor-id", "", "The Accessor ID of the token to read. "+
|
2018-10-19 16:04:07 +00:00
|
|
|
"It may be specified as a unique ID prefix but will error if the prefix "+
|
|
|
|
"matches multiple token Accessor IDs")
|
2020-02-15 15:06:05 +00:00
|
|
|
c.flags.StringVar(
|
|
|
|
&c.format,
|
|
|
|
"format",
|
|
|
|
token.PrettyFormat,
|
|
|
|
fmt.Sprintf("Output format {%s}", strings.Join(token.GetSupportedFormats(), "|")),
|
|
|
|
)
|
2018-10-19 16:04:07 +00:00
|
|
|
c.http = &flags.HTTPFlags{}
|
|
|
|
flags.Merge(c.flags, c.http.ClientFlags())
|
|
|
|
flags.Merge(c.flags, c.http.ServerFlags())
|
2021-07-21 19:45:24 +00:00
|
|
|
flags.Merge(c.flags, c.http.MultiTenancyFlags())
|
2018-10-19 16:04:07 +00:00
|
|
|
c.help = flags.Usage(help, c.flags)
|
2023-02-07 18:26:30 +00:00
|
|
|
|
|
|
|
// Deprecations
|
|
|
|
c.flags.StringVar(&c.tokenID, "id", "",
|
|
|
|
"DEPRECATED. Use -accessor-id instead.")
|
2018-10-19 16:04:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cmd) Run(args []string) int {
|
|
|
|
if err := c.flags.Parse(args); err != nil {
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
client, err := c.http.APIClient()
|
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Error connecting to Consul agent: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2020-02-15 15:06:05 +00:00
|
|
|
var t *api.ACLToken
|
2022-03-31 16:49:11 +00:00
|
|
|
var expanded *api.ACLTokenExpanded
|
2018-10-24 14:24:29 +00:00
|
|
|
if !c.self {
|
2023-02-28 16:58:29 +00:00
|
|
|
tokenAccessor := c.tokenAccessorID
|
|
|
|
if tokenAccessor == "" {
|
|
|
|
if c.tokenID == "" {
|
|
|
|
c.UI.Error("Must specify the -accessor-id parameter")
|
|
|
|
return 1
|
|
|
|
} else {
|
|
|
|
tokenAccessor = c.tokenID
|
|
|
|
c.UI.Warn("Use the -accessor-id parameter to specify token by Accessor ID")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-02-07 18:26:30 +00:00
|
|
|
tok, err := acl.GetTokenAccessorIDFromPartial(client, tokenAccessor)
|
2018-10-24 14:24:29 +00:00
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Error determining token ID: %v", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2022-03-31 16:49:11 +00:00
|
|
|
if !c.expanded {
|
2023-02-07 18:26:30 +00:00
|
|
|
t, _, err = client.ACL().TokenRead(tok, nil)
|
2022-03-31 16:49:11 +00:00
|
|
|
} else {
|
2023-02-07 18:26:30 +00:00
|
|
|
expanded, _, err = client.ACL().TokenReadExpanded(tok, nil)
|
2022-03-31 16:49:11 +00:00
|
|
|
}
|
|
|
|
|
2018-10-24 14:24:29 +00:00
|
|
|
if err != nil {
|
2023-02-07 18:26:30 +00:00
|
|
|
c.UI.Error(fmt.Sprintf("Error reading token %q: %v", tok, err))
|
2018-10-24 14:24:29 +00:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
} else {
|
2022-07-15 23:05:53 +00:00
|
|
|
// TODO: consider updating this CLI command and underlying HTTP API endpoint
|
|
|
|
// to support expanded read of a "self" token, which is a much better user workflow.
|
|
|
|
if c.expanded {
|
2023-02-07 18:26:30 +00:00
|
|
|
c.UI.Error("Cannot use both -expanded and -self. Instead, use -expanded and -accessor-id=<accessor id>.")
|
2022-07-15 23:05:53 +00:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2020-02-15 15:06:05 +00:00
|
|
|
t, _, err = client.ACL().TokenReadSelf(nil)
|
2018-10-24 14:24:29 +00:00
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Error reading token: %v", err))
|
|
|
|
return 1
|
|
|
|
}
|
2018-10-19 16:04:07 +00:00
|
|
|
}
|
|
|
|
|
2020-02-15 15:06:05 +00:00
|
|
|
formatter, err := token.NewFormatter(c.format, c.showMeta)
|
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(err.Error())
|
|
|
|
return 1
|
|
|
|
}
|
2022-03-31 16:49:11 +00:00
|
|
|
var out string
|
|
|
|
if !c.expanded {
|
|
|
|
out, err = formatter.FormatToken(t)
|
|
|
|
} else {
|
|
|
|
out, err = formatter.FormatTokenExpanded(expanded)
|
|
|
|
}
|
2020-02-15 15:06:05 +00:00
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(err.Error())
|
2020-03-26 15:24:21 +00:00
|
|
|
return 1
|
2020-02-15 15:06:05 +00:00
|
|
|
}
|
|
|
|
if out != "" {
|
|
|
|
c.UI.Info(out)
|
|
|
|
}
|
|
|
|
|
2018-10-19 16:04:07 +00:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cmd) Synopsis() string {
|
|
|
|
return synopsis
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cmd) Help() string {
|
|
|
|
return flags.Usage(c.help, nil)
|
|
|
|
}
|
|
|
|
|
2021-07-21 19:45:24 +00:00
|
|
|
const (
|
|
|
|
synopsis = "Read an ACL token"
|
|
|
|
help = `
|
2023-02-07 18:26:30 +00:00
|
|
|
Usage: consul acl token read [options] -accessor-id TOKENID
|
2018-10-19 16:04:07 +00:00
|
|
|
|
|
|
|
This command will retrieve and print out the details of
|
|
|
|
a single token.
|
|
|
|
|
|
|
|
Using a partial ID:
|
|
|
|
|
2023-02-07 18:26:30 +00:00
|
|
|
$ consul acl token read -accessor-id 4be56c77-82
|
2018-10-19 16:04:07 +00:00
|
|
|
|
|
|
|
Using the full ID:
|
|
|
|
|
2023-02-07 18:26:30 +00:00
|
|
|
$ consul acl token read -accessor-id 4be56c77-8244-4c7d-b08c-667b8c71baed
|
2018-10-19 16:04:07 +00:00
|
|
|
`
|
2021-07-21 19:45:24 +00:00
|
|
|
)
|