2018-10-19 16:04:07 +00:00
|
|
|
package policycreate
|
|
|
|
|
|
|
|
import (
|
|
|
|
"flag"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
2020-02-15 15:06:05 +00:00
|
|
|
"strings"
|
2018-10-19 16:04:07 +00:00
|
|
|
|
2022-04-05 21:10:06 +00:00
|
|
|
"github.com/mitchellh/cli"
|
|
|
|
|
2018-10-19 16:04:07 +00:00
|
|
|
"github.com/hashicorp/consul/api"
|
2020-02-15 15:06:05 +00:00
|
|
|
"github.com/hashicorp/consul/command/acl/policy"
|
2018-10-19 16:04:07 +00:00
|
|
|
"github.com/hashicorp/consul/command/flags"
|
|
|
|
"github.com/hashicorp/consul/command/helpers"
|
|
|
|
)
|
|
|
|
|
|
|
|
func New(ui cli.Ui) *cmd {
|
|
|
|
c := &cmd{UI: ui}
|
|
|
|
c.init()
|
|
|
|
return c
|
|
|
|
}
|
|
|
|
|
|
|
|
type cmd struct {
|
|
|
|
UI cli.Ui
|
|
|
|
flags *flag.FlagSet
|
|
|
|
http *flags.HTTPFlags
|
|
|
|
help string
|
|
|
|
|
|
|
|
name string
|
|
|
|
description string
|
|
|
|
datacenters []string
|
|
|
|
rules string
|
|
|
|
|
2023-01-27 15:17:07 +00:00
|
|
|
showMeta bool
|
|
|
|
format string
|
2018-10-19 16:04:07 +00:00
|
|
|
|
|
|
|
testStdin io.Reader
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cmd) init() {
|
|
|
|
c.flags = flag.NewFlagSet("", flag.ContinueOnError)
|
2018-10-24 14:24:29 +00:00
|
|
|
c.flags.BoolVar(&c.showMeta, "meta", false, "Indicates that policy metadata such "+
|
2018-11-02 17:00:39 +00:00
|
|
|
"as the content hash and raft indices should be shown for each entry")
|
2019-02-13 17:57:29 +00:00
|
|
|
c.flags.StringVar(&c.name, "name", "", "The new policy's name. This flag is required.")
|
2018-10-19 16:04:07 +00:00
|
|
|
c.flags.StringVar(&c.description, "description", "", "A description of the policy")
|
|
|
|
c.flags.Var((*flags.AppendSliceValue)(&c.datacenters), "valid-datacenter", "Datacenter "+
|
|
|
|
"that the policy should be valid within. This flag may be specified multiple times")
|
|
|
|
c.flags.StringVar(&c.rules, "rules", "", "The policy rules. May be prefixed with '@' "+
|
|
|
|
"to indicate that the value is a file path to load the rules from. '-' may also be "+
|
|
|
|
"given to indicate that the rules are available on stdin")
|
2020-02-15 15:06:05 +00:00
|
|
|
c.flags.StringVar(
|
|
|
|
&c.format,
|
|
|
|
"format",
|
|
|
|
policy.PrettyFormat,
|
|
|
|
fmt.Sprintf("Output format {%s}", strings.Join(policy.GetSupportedFormats(), "|")),
|
|
|
|
)
|
2018-10-19 16:04:07 +00:00
|
|
|
|
|
|
|
c.http = &flags.HTTPFlags{}
|
|
|
|
flags.Merge(c.flags, c.http.ClientFlags())
|
|
|
|
flags.Merge(c.flags, c.http.ServerFlags())
|
2021-07-21 19:45:24 +00:00
|
|
|
flags.Merge(c.flags, c.http.MultiTenancyFlags())
|
2018-10-19 16:04:07 +00:00
|
|
|
c.help = flags.Usage(help, c.flags)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cmd) Run(args []string) int {
|
|
|
|
if err := c.flags.Parse(args); err != nil {
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.name == "" {
|
|
|
|
c.UI.Error(fmt.Sprintf("Missing require '-name' flag"))
|
|
|
|
c.UI.Error(c.Help())
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
client, err := c.http.APIClient()
|
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Error connecting to Consul agent: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2023-01-27 15:17:07 +00:00
|
|
|
rules, err := helpers.LoadDataSource(c.rules, c.testStdin)
|
2018-10-19 16:04:07 +00:00
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Error loading rules: %v", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
newPolicy := &api.ACLPolicy{
|
|
|
|
Name: c.name,
|
|
|
|
Description: c.description,
|
|
|
|
Datacenters: c.datacenters,
|
|
|
|
Rules: rules,
|
|
|
|
}
|
|
|
|
|
2020-02-15 15:06:05 +00:00
|
|
|
p, _, err := client.ACL().PolicyCreate(newPolicy, nil)
|
2018-10-19 16:04:07 +00:00
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Failed to create new policy: %v", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2020-02-15 15:06:05 +00:00
|
|
|
formatter, err := policy.NewFormatter(c.format, c.showMeta)
|
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(err.Error())
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
out, err := formatter.FormatPolicy(p)
|
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(err.Error())
|
2020-03-26 15:24:21 +00:00
|
|
|
return 1
|
2020-02-15 15:06:05 +00:00
|
|
|
}
|
|
|
|
if out != "" {
|
|
|
|
c.UI.Info(out)
|
|
|
|
}
|
|
|
|
|
2018-10-19 16:04:07 +00:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cmd) Synopsis() string {
|
|
|
|
return synopsis
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cmd) Help() string {
|
|
|
|
return flags.Usage(c.help, nil)
|
|
|
|
}
|
|
|
|
|
2021-07-21 19:45:24 +00:00
|
|
|
const (
|
|
|
|
synopsis = "Create an ACL policy"
|
|
|
|
help = `
|
2018-10-19 16:04:07 +00:00
|
|
|
Usage: consul acl policy create -name NAME [options]
|
|
|
|
|
2023-01-27 15:17:07 +00:00
|
|
|
The -rules option values allows loading the value from stdin, a file
|
|
|
|
or the raw value. To use stdin pass '-' as the value. To load the value
|
|
|
|
from a file prefix the value with an '@'. Any other values will be used
|
|
|
|
directly.
|
2018-10-19 16:04:07 +00:00
|
|
|
|
|
|
|
Create a new policy:
|
|
|
|
|
2018-11-02 17:00:39 +00:00
|
|
|
$ consul acl policy create -name "new-policy" \
|
|
|
|
-description "This is an example policy" \
|
|
|
|
-datacenter "dc1" \
|
|
|
|
-datacenter "dc2" \
|
2018-10-24 14:24:29 +00:00
|
|
|
-rules @rules.hcl
|
2018-10-19 16:04:07 +00:00
|
|
|
`
|
2021-07-21 19:45:24 +00:00
|
|
|
)
|