open-vault/command/secrets_move.go

132 lines
3.8 KiB
Go
Raw Permalink Normal View History

// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
package command
import (
"fmt"
"strings"
2022-02-18 16:50:05 +00:00
"time"
"github.com/mitchellh/cli"
"github.com/posener/complete"
)
var (
_ cli.Command = (*SecretsMoveCommand)(nil)
_ cli.CommandAutocomplete = (*SecretsMoveCommand)(nil)
)
2022-02-18 16:50:05 +00:00
const (
MountMigrationStatusSuccess = "success"
MountMigrationStatusFailure = "failure"
)
type SecretsMoveCommand struct {
*BaseCommand
}
func (c *SecretsMoveCommand) Synopsis() string {
return "Move a secrets engine to a new path"
}
func (c *SecretsMoveCommand) Help() string {
helpText := `
Usage: vault secrets move [options] SOURCE DESTINATION
Moves an existing secrets engine to a new path. Any leases from the old
secrets engine are revoked, but all configuration associated with the engine
2022-02-18 16:50:05 +00:00
is preserved. It initiates the migration and intermittently polls its status,
exiting if a final state is reached.
This command works within or across namespaces, both source and destination paths
can be prefixed with a namespace heirarchy relative to the current namespace.
2022-02-18 16:50:05 +00:00
WARNING! Moving a secrets engine will revoke any leases from the
old engine.
2022-02-18 16:50:05 +00:00
Move the secrets engine at secret/ to generic/:
$ vault secrets move secret/ generic/
2022-02-18 16:50:05 +00:00
Move the secrets engine at ns1/secret/ across namespaces to ns2/generic/,
where ns1 and ns2 are child namespaces of the current namespace:
$ vault secrets move ns1/secret/ ns2/generic/
` + c.Flags().Help()
return strings.TrimSpace(helpText)
}
func (c *SecretsMoveCommand) Flags() *FlagSets {
return c.flagSet(FlagSetHTTP)
}
func (c *SecretsMoveCommand) AutocompleteArgs() complete.Predictor {
return c.PredictVaultMounts()
}
func (c *SecretsMoveCommand) AutocompleteFlags() complete.Flags {
return c.Flags().Completions()
}
func (c *SecretsMoveCommand) Run(args []string) int {
f := c.Flags()
if err := f.Parse(args); err != nil {
c.UI.Error(err.Error())
return 1
}
args = f.Args()
switch {
case len(args) < 2:
c.UI.Error(fmt.Sprintf("Not enough arguments (expected 2, got %d)", len(args)))
return 1
case len(args) > 2:
c.UI.Error(fmt.Sprintf("Too many arguments (expected 2, got %d)", len(args)))
return 1
}
// Grab the source and destination
source := ensureTrailingSlash(args[0])
destination := ensureTrailingSlash(args[1])
client, err := c.Client()
if err != nil {
c.UI.Error(err.Error())
return 2
}
remountResp, err := client.Sys().StartRemount(source, destination)
if err != nil {
c.UI.Error(fmt.Sprintf("Error moving secrets engine %s to %s: %s", source, destination, err))
return 2
}
2022-02-18 16:50:05 +00:00
c.UI.Output(fmt.Sprintf("Started moving secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
// Poll the status endpoint with the returned migration ID
// Exit if a terminal status is reached, else wait and retry
for {
remountStatusResp, err := client.Sys().RemountStatus(remountResp.MigrationID)
if err != nil {
c.UI.Error(fmt.Sprintf("Error checking migration status of secrets engine %s to %s: %s", source, destination, err))
return 2
}
if remountStatusResp.MigrationInfo.MigrationStatus == MountMigrationStatusSuccess {
c.UI.Output(fmt.Sprintf("Success! Finished moving secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
return 0
}
if remountStatusResp.MigrationInfo.MigrationStatus == MountMigrationStatusFailure {
c.UI.Error(fmt.Sprintf("Failure! Error encountered moving secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
return 0
}
c.UI.Output(fmt.Sprintf("Waiting for terminal status in migration of secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
time.Sleep(10 * time.Second)
}
return 0
}