2020-02-15 15:06:05 +00:00
package token
import (
"bytes"
"encoding/json"
"fmt"
"strings"
2022-03-31 16:49:11 +00:00
"github.com/hashicorp/consul/agent/structs"
2020-02-15 15:06:05 +00:00
"github.com/hashicorp/consul/api"
)
const (
PrettyFormat string = "pretty"
JSONFormat string = "json"
2022-03-31 16:49:11 +00:00
WHITESPACE_2 string = "\t"
WHITESPACE_4 string = "\t\t"
2020-02-15 15:06:05 +00:00
)
// Formatter defines methods provided by token command output formatter
type Formatter interface {
FormatToken ( token * api . ACLToken ) ( string , error )
2022-03-31 16:49:11 +00:00
FormatTokenExpanded ( token * api . ACLTokenExpanded ) ( string , error )
2020-02-15 15:06:05 +00:00
FormatTokenList ( tokens [ ] * api . ACLTokenListEntry ) ( string , error )
}
// GetSupportedFormats returns supported formats
func GetSupportedFormats ( ) [ ] string {
return [ ] string { PrettyFormat , JSONFormat }
}
// NewFormatter returns Formatter implementation
func NewFormatter ( format string , showMeta bool ) ( formatter Formatter , err error ) {
switch format {
case PrettyFormat :
formatter = newPrettyFormatter ( showMeta )
case JSONFormat :
formatter = newJSONFormatter ( showMeta )
default :
err = fmt . Errorf ( "Unknown format: %s" , format )
}
return formatter , err
}
func newPrettyFormatter ( showMeta bool ) Formatter {
return & prettyFormatter { showMeta }
}
type prettyFormatter struct {
showMeta bool
}
func ( f * prettyFormatter ) FormatToken ( token * api . ACLToken ) ( string , error ) {
var buffer bytes . Buffer
buffer . WriteString ( fmt . Sprintf ( "AccessorID: %s\n" , token . AccessorID ) )
buffer . WriteString ( fmt . Sprintf ( "SecretID: %s\n" , token . SecretID ) )
2021-12-09 20:58:45 +00:00
if token . Partition != "" {
buffer . WriteString ( fmt . Sprintf ( "Partition: %s\n" , token . Partition ) )
}
2020-02-15 15:06:05 +00:00
if token . Namespace != "" {
buffer . WriteString ( fmt . Sprintf ( "Namespace: %s\n" , token . Namespace ) )
}
buffer . WriteString ( fmt . Sprintf ( "Description: %s\n" , token . Description ) )
buffer . WriteString ( fmt . Sprintf ( "Local: %t\n" , token . Local ) )
2020-05-04 20:18:25 +00:00
if token . AuthMethod != "" {
2021-07-15 17:38:52 +00:00
buffer . WriteString ( fmt . Sprintf ( "Auth Method: %s (Namespace: %s)\n" , token . AuthMethod , token . AuthMethodNamespace ) )
2020-05-04 20:18:25 +00:00
}
2020-02-15 15:06:05 +00:00
buffer . WriteString ( fmt . Sprintf ( "Create Time: %v\n" , token . CreateTime ) )
if token . ExpirationTime != nil && ! token . ExpirationTime . IsZero ( ) {
buffer . WriteString ( fmt . Sprintf ( "Expiration Time: %v\n" , * token . ExpirationTime ) )
}
if f . showMeta {
buffer . WriteString ( fmt . Sprintf ( "Hash: %x\n" , token . Hash ) )
buffer . WriteString ( fmt . Sprintf ( "Create Index: %d\n" , token . CreateIndex ) )
buffer . WriteString ( fmt . Sprintf ( "Modify Index: %d\n" , token . ModifyIndex ) )
}
if len ( token . Policies ) > 0 {
buffer . WriteString ( fmt . Sprintln ( "Policies:" ) )
for _ , policy := range token . Policies {
buffer . WriteString ( fmt . Sprintf ( " %s - %s\n" , policy . ID , policy . Name ) )
}
}
if len ( token . Roles ) > 0 {
buffer . WriteString ( fmt . Sprintln ( "Roles:" ) )
for _ , role := range token . Roles {
buffer . WriteString ( fmt . Sprintf ( " %s - %s\n" , role . ID , role . Name ) )
}
}
if len ( token . ServiceIdentities ) > 0 {
buffer . WriteString ( fmt . Sprintln ( "Service Identities:" ) )
for _ , svcid := range token . ServiceIdentities {
if len ( svcid . Datacenters ) > 0 {
buffer . WriteString ( fmt . Sprintf ( " %s (Datacenters: %s)\n" , svcid . ServiceName , strings . Join ( svcid . Datacenters , ", " ) ) )
} else {
buffer . WriteString ( fmt . Sprintf ( " %s (Datacenters: all)\n" , svcid . ServiceName ) )
}
}
}
2020-06-16 16:54:27 +00:00
if len ( token . NodeIdentities ) > 0 {
buffer . WriteString ( fmt . Sprintln ( "Node Identities:" ) )
for _ , nodeid := range token . NodeIdentities {
buffer . WriteString ( fmt . Sprintf ( " %s (Datacenter: %s)\n" , nodeid . NodeName , nodeid . Datacenter ) )
}
}
2020-02-15 15:06:05 +00:00
if token . Rules != "" {
buffer . WriteString ( fmt . Sprintln ( "Rules:" ) )
buffer . WriteString ( fmt . Sprintln ( token . Rules ) )
}
return buffer . String ( ) , nil
}
2022-03-31 16:49:11 +00:00
func ( f * prettyFormatter ) FormatTokenExpanded ( token * api . ACLTokenExpanded ) ( string , error ) {
var buffer bytes . Buffer
buffer . WriteString ( fmt . Sprintf ( "AccessorID: %s\n" , token . AccessorID ) )
buffer . WriteString ( fmt . Sprintf ( "SecretID: %s\n" , token . SecretID ) )
if token . Partition != "" {
buffer . WriteString ( fmt . Sprintf ( "Partition: %s\n" , token . Partition ) )
}
if token . Namespace != "" {
buffer . WriteString ( fmt . Sprintf ( "Namespace: %s\n" , token . Namespace ) )
}
buffer . WriteString ( fmt . Sprintf ( "Description: %s\n" , token . Description ) )
buffer . WriteString ( fmt . Sprintf ( "Local: %t\n" , token . Local ) )
if token . AuthMethod != "" {
buffer . WriteString ( fmt . Sprintf ( "Auth Method: %s (Namespace: %s)\n" , token . AuthMethod , token . AuthMethodNamespace ) )
}
buffer . WriteString ( fmt . Sprintf ( "Create Time: %v\n" , token . CreateTime ) )
if token . ExpirationTime != nil && ! token . ExpirationTime . IsZero ( ) {
buffer . WriteString ( fmt . Sprintf ( "Expiration Time: %v\n" , * token . ExpirationTime ) )
}
if f . showMeta {
buffer . WriteString ( fmt . Sprintf ( "Hash: %x\n" , token . Hash ) )
buffer . WriteString ( fmt . Sprintf ( "Create Index: %d\n" , token . CreateIndex ) )
buffer . WriteString ( fmt . Sprintf ( "Modify Index: %d\n" , token . ModifyIndex ) )
}
policies := make ( map [ string ] api . ACLPolicy )
roles := make ( map [ string ] api . ACLRole )
for _ , policy := range token . ExpandedPolicies {
policies [ policy . ID ] = policy
}
for _ , role := range token . ExpandedRoles {
roles [ role . ID ] = role
}
formatPolicy := func ( policy api . ACLPolicy , indent string ) {
buffer . WriteString ( fmt . Sprintf ( indent + "Policy Name: %s\n" , policy . Name ) )
buffer . WriteString ( fmt . Sprintf ( indent + WHITESPACE_2 + "ID: %s\n" , policy . ID ) )
buffer . WriteString ( fmt . Sprintf ( indent + WHITESPACE_2 + "Description: %s\n" , policy . Description ) )
buffer . WriteString ( indent + WHITESPACE_2 + "Rules:\n" )
buffer . WriteString ( indent + WHITESPACE_4 )
buffer . WriteString ( strings . ReplaceAll ( policy . Rules , "\n" , "\n" + indent + WHITESPACE_4 ) )
buffer . WriteString ( "\n\n" )
}
if len ( token . ACLToken . Policies ) > 0 {
buffer . WriteString ( "Policies:\n" )
for _ , policyLink := range token . ACLToken . Policies {
formatPolicy ( policies [ policyLink . ID ] , WHITESPACE_2 )
}
}
entMeta := structs . NewEnterpriseMetaWithPartition ( token . Partition , token . Namespace )
formatServiceIdentity := func ( svcIdentity * api . ACLServiceIdentity , indent string ) {
if len ( svcIdentity . Datacenters ) > 0 {
buffer . WriteString ( fmt . Sprintf ( indent + "Name: %s (Datacenters: %s)\n" , svcIdentity . ServiceName , strings . Join ( svcIdentity . Datacenters , ", " ) ) )
} else {
buffer . WriteString ( fmt . Sprintf ( indent + "Name: %s (Datacenters: all)\n" , svcIdentity . ServiceName ) )
}
identity := structs . ACLServiceIdentity { ServiceName : svcIdentity . ServiceName , Datacenters : svcIdentity . Datacenters }
policy := identity . SyntheticPolicy ( & entMeta )
buffer . WriteString ( fmt . Sprintf ( indent + WHITESPACE_2 + "Description: %s\n" , policy . Description ) )
buffer . WriteString ( indent + WHITESPACE_2 + "Rules:" )
buffer . WriteString ( strings . ReplaceAll ( policy . Rules , "\n" , "\n" + indent + WHITESPACE_4 ) )
buffer . WriteString ( "\n\n" )
}
if len ( token . ACLToken . ServiceIdentities ) > 0 {
buffer . WriteString ( "Service Identities:\n" )
for _ , svcIdentity := range token . ACLToken . ServiceIdentities {
formatServiceIdentity ( svcIdentity , WHITESPACE_2 )
}
}
formatNodeIdentity := func ( nodeIdentity * api . ACLNodeIdentity , indent string ) {
buffer . WriteString ( fmt . Sprintf ( indent + "Name: %s (Datacenter: %s)\n" , nodeIdentity . NodeName , nodeIdentity . Datacenter ) )
identity := structs . ACLNodeIdentity { NodeName : nodeIdentity . NodeName , Datacenter : nodeIdentity . Datacenter }
policy := identity . SyntheticPolicy ( & entMeta )
buffer . WriteString ( fmt . Sprintf ( indent + WHITESPACE_2 + "Description: %s\n" , policy . Description ) )
buffer . WriteString ( indent + WHITESPACE_2 + "Rules:" )
buffer . WriteString ( strings . ReplaceAll ( policy . Rules , "\n" , "\n" + indent + WHITESPACE_4 ) )
buffer . WriteString ( "\n\n" )
}
if len ( token . ACLToken . NodeIdentities ) > 0 {
buffer . WriteString ( "Node Identities:\n" )
for _ , nodeIdentity := range token . ACLToken . NodeIdentities {
formatNodeIdentity ( nodeIdentity , WHITESPACE_2 )
}
}
formatRole := func ( role api . ACLRole , indent string ) {
buffer . WriteString ( fmt . Sprintf ( indent + "Role Name: %s\n" , role . Name ) )
buffer . WriteString ( fmt . Sprintf ( indent + WHITESPACE_2 + "ID: %s\n" , role . ID ) )
buffer . WriteString ( fmt . Sprintf ( indent + WHITESPACE_2 + "Description: %s\n" , role . Description ) )
if len ( role . Policies ) > 0 {
buffer . WriteString ( indent + WHITESPACE_2 + "Policies:\n" )
for _ , policyLink := range role . Policies {
formatPolicy ( policies [ policyLink . ID ] , indent + WHITESPACE_4 )
}
}
if len ( role . ServiceIdentities ) > 0 {
buffer . WriteString ( indent + WHITESPACE_2 + "Service Identities:\n" )
for _ , svcIdentity := range role . ServiceIdentities {
formatServiceIdentity ( svcIdentity , indent + WHITESPACE_4 )
}
}
if len ( role . NodeIdentities ) > 0 {
buffer . WriteString ( indent + WHITESPACE_2 + "Node Identities:\n" )
for _ , nodeIdentity := range role . NodeIdentities {
formatNodeIdentity ( nodeIdentity , indent + WHITESPACE_4 )
}
}
}
if len ( token . ACLToken . Roles ) > 0 {
buffer . WriteString ( "Roles:\n" )
for _ , roleLink := range token . ACLToken . Roles {
role := roles [ roleLink . ID ]
formatRole ( role , WHITESPACE_2 )
}
}
buffer . WriteString ( "=== End of Authorizer Layer 0: Token ===\n" )
if len ( token . NamespaceDefaultPolicies ) > 0 || len ( token . NamespaceDefaultRoles ) > 0 {
buffer . WriteString ( "=== Start of Authorizer Layer 1: Token Namespace’ s Defaults (Inherited) ===\n" )
buffer . WriteString ( fmt . Sprintf ( "Description: ACL Roles inherited by all Tokens in Namespace %q\n\n" , token . Namespace ) )
buffer . WriteString ( "Namespace Policy Defaults:\n" )
for _ , policyID := range token . NamespaceDefaultPolicies {
formatPolicy ( policies [ policyID ] , WHITESPACE_2 )
}
buffer . WriteString ( "Namespace Role Defaults:\n" )
for _ , roleID := range token . NamespaceDefaultRoles {
formatRole ( roles [ roleID ] , WHITESPACE_2 )
}
buffer . WriteString ( "=== End of Authorizer Layer 1: Token Namespace’ s Defaults (Inherited) ===\n" )
}
buffer . WriteString ( "=== Start of Authorizer Layer 2: Agent Configuration Defaults (Inherited) ===\n" )
buffer . WriteString ( "Description: Defined at request-time by the agent that resolves the ACL token; other agents may have different configuration defaults\n" )
buffer . WriteString ( fmt . Sprintf ( "Resolved By Agent: %q\n\n" , token . ResolvedByAgent ) )
buffer . WriteString ( fmt . Sprintf ( "Default Policy: %s\n" , token . AgentACLDefaultPolicy ) )
buffer . WriteString ( WHITESPACE_2 + "Description: Backstop rule used if no preceding layer has a matching rule (refer to default_policy option in agent configuration)\n\n" )
buffer . WriteString ( fmt . Sprintf ( "Down Policy: %s\n" , token . AgentACLDownPolicy ) )
buffer . WriteString ( WHITESPACE_2 + "Description: Defines what to do if this Token's information cannot be read from the primary_datacenter (refer to down_policy option in agent configuration)\n\n" )
return buffer . String ( ) , nil
}
2020-02-15 15:06:05 +00:00
func ( f * prettyFormatter ) FormatTokenList ( tokens [ ] * api . ACLTokenListEntry ) ( string , error ) {
var buffer bytes . Buffer
first := true
for _ , token := range tokens {
if first {
first = false
} else {
buffer . WriteString ( "\n" )
}
buffer . WriteString ( f . formatTokenListEntry ( token ) )
}
return buffer . String ( ) , nil
}
func ( f * prettyFormatter ) formatTokenListEntry ( token * api . ACLTokenListEntry ) string {
var buffer bytes . Buffer
buffer . WriteString ( fmt . Sprintf ( "AccessorID: %s\n" , token . AccessorID ) )
2021-07-08 22:13:08 +00:00
buffer . WriteString ( fmt . Sprintf ( "SecretID: %s\n" , token . SecretID ) )
2021-12-09 20:58:45 +00:00
if token . Partition != "" {
buffer . WriteString ( fmt . Sprintf ( "Partition: %s\n" , token . Partition ) )
}
2020-02-15 15:06:05 +00:00
if token . Namespace != "" {
buffer . WriteString ( fmt . Sprintf ( "Namespace: %s\n" , token . Namespace ) )
}
buffer . WriteString ( fmt . Sprintf ( "Description: %s\n" , token . Description ) )
buffer . WriteString ( fmt . Sprintf ( "Local: %t\n" , token . Local ) )
2020-05-04 20:18:25 +00:00
if token . AuthMethod != "" {
2021-07-15 17:38:52 +00:00
buffer . WriteString ( fmt . Sprintf ( "Auth Method: %s (Namespace: %s)\n" , token . AuthMethod , token . AuthMethodNamespace ) )
2020-05-04 20:18:25 +00:00
}
2020-02-15 15:06:05 +00:00
buffer . WriteString ( fmt . Sprintf ( "Create Time: %v\n" , token . CreateTime ) )
if token . ExpirationTime != nil && ! token . ExpirationTime . IsZero ( ) {
buffer . WriteString ( fmt . Sprintf ( "Expiration Time: %v\n" , * token . ExpirationTime ) )
}
buffer . WriteString ( fmt . Sprintf ( "Legacy: %t\n" , token . Legacy ) )
if f . showMeta {
buffer . WriteString ( fmt . Sprintf ( "Hash: %x\n" , token . Hash ) )
buffer . WriteString ( fmt . Sprintf ( "Create Index: %d\n" , token . CreateIndex ) )
buffer . WriteString ( fmt . Sprintf ( "Modify Index: %d\n" , token . ModifyIndex ) )
}
if len ( token . Policies ) > 0 {
buffer . WriteString ( fmt . Sprintln ( "Policies:" ) )
for _ , policy := range token . Policies {
buffer . WriteString ( fmt . Sprintf ( " %s - %s\n" , policy . ID , policy . Name ) )
}
}
if len ( token . Roles ) > 0 {
buffer . WriteString ( fmt . Sprintln ( "Roles:" ) )
for _ , role := range token . Roles {
buffer . WriteString ( fmt . Sprintf ( " %s - %s\n" , role . ID , role . Name ) )
}
}
if len ( token . ServiceIdentities ) > 0 {
2020-06-16 16:54:27 +00:00
buffer . WriteString ( fmt . Sprintln ( "Service Identities:" ) )
for _ , svcid := range token . ServiceIdentities {
if len ( svcid . Datacenters ) > 0 {
buffer . WriteString ( fmt . Sprintf ( " %s (Datacenters: %s)\n" , svcid . ServiceName , strings . Join ( svcid . Datacenters , ", " ) ) )
} else {
buffer . WriteString ( fmt . Sprintf ( " %s (Datacenters: all)\n" , svcid . ServiceName ) )
}
}
}
if len ( token . NodeIdentities ) > 0 {
2022-01-04 20:44:43 +00:00
buffer . WriteString ( fmt . Sprintln ( "Node Identities:" ) )
for _ , nodeid := range token . NodeIdentities {
buffer . WriteString ( fmt . Sprintf ( " %s (Datacenter: %s)\n" , nodeid . NodeName , nodeid . Datacenter ) )
2020-02-15 15:06:05 +00:00
}
}
return buffer . String ( )
}
func newJSONFormatter ( showMeta bool ) Formatter {
return & jsonFormatter { showMeta }
}
type jsonFormatter struct {
showMeta bool
}
func ( f * jsonFormatter ) FormatTokenList ( tokens [ ] * api . ACLTokenListEntry ) ( string , error ) {
b , err := json . MarshalIndent ( tokens , "" , " " )
if err != nil {
return "" , fmt . Errorf ( "Failed to marshal tokens: %v" , err )
}
return string ( b ) , nil
}
func ( f * jsonFormatter ) FormatToken ( token * api . ACLToken ) ( string , error ) {
b , err := json . MarshalIndent ( token , "" , " " )
if err != nil {
return "" , fmt . Errorf ( "Failed to marshal token: %v" , err )
}
return string ( b ) , nil
}
2022-03-31 16:49:11 +00:00
func ( f * jsonFormatter ) FormatTokenExpanded ( token * api . ACLTokenExpanded ) ( string , error ) {
b , err := json . MarshalIndent ( token , "" , " " )
if err != nil {
return "" , fmt . Errorf ( "Failed to marshal token: %v" , err )
}
return string ( b ) , nil
}