open-vault/command/operator_seal.go

90 lines
1.9 KiB
Go
Raw Normal View History

// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
2015-03-04 16:56:10 +00:00
package command
import (
2015-03-31 06:39:56 +00:00
"fmt"
2015-03-04 16:56:10 +00:00
"strings"
2016-04-01 17:16:05 +00:00
2017-09-05 04:04:19 +00:00
"github.com/mitchellh/cli"
"github.com/posener/complete"
2015-03-04 16:56:10 +00:00
)
var (
_ cli.Command = (*OperatorSealCommand)(nil)
_ cli.CommandAutocomplete = (*OperatorSealCommand)(nil)
)
2017-09-05 04:04:19 +00:00
2017-09-08 02:03:12 +00:00
type OperatorSealCommand struct {
2017-09-05 04:04:19 +00:00
*BaseCommand
2015-03-04 16:56:10 +00:00
}
2017-09-08 02:03:12 +00:00
func (c *OperatorSealCommand) Synopsis() string {
return "Seals the Vault server"
2015-03-04 16:56:10 +00:00
}
2017-09-08 02:03:12 +00:00
func (c *OperatorSealCommand) Help() string {
2015-03-04 16:56:10 +00:00
helpText := `
Usage: vault operator seal [options]
2015-03-04 16:56:10 +00:00
2017-09-05 04:04:19 +00:00
Seals the Vault server. Sealing tells the Vault server to stop responding
to any operations until it is unsealed. When sealed, the Vault server
discards its in-memory root key to unlock the data, so it is physically
2017-09-05 04:04:19 +00:00
blocked from responding to operations unsealed.
If an unseal is in progress, sealing the Vault will reset the unsealing
process. Users will have to re-enter their portions of the root key again.
2015-03-04 16:56:10 +00:00
2017-09-05 04:04:19 +00:00
This command does nothing if the Vault server is already sealed.
2015-03-04 16:56:10 +00:00
2017-09-05 04:04:19 +00:00
Seal the Vault server:
2015-03-04 16:56:10 +00:00
2017-09-08 02:03:12 +00:00
$ vault operator seal
2017-09-05 04:04:19 +00:00
` + c.Flags().Help()
2015-03-04 16:56:10 +00:00
return strings.TrimSpace(helpText)
}
2017-09-05 04:04:19 +00:00
2017-09-08 02:03:12 +00:00
func (c *OperatorSealCommand) Flags() *FlagSets {
2017-09-05 04:04:19 +00:00
return c.flagSet(FlagSetHTTP)
}
2017-09-08 02:03:12 +00:00
func (c *OperatorSealCommand) AutocompleteArgs() complete.Predictor {
2017-09-05 04:04:19 +00:00
return nil
}
2017-09-08 02:03:12 +00:00
func (c *OperatorSealCommand) AutocompleteFlags() complete.Flags {
2017-09-05 04:04:19 +00:00
return c.Flags().Completions()
}
2017-09-08 02:03:12 +00:00
func (c *OperatorSealCommand) Run(args []string) int {
2017-09-05 04:04:19 +00:00
f := c.Flags()
if err := f.Parse(args); err != nil {
c.UI.Error(err.Error())
return 1
}
args = f.Args()
if len(args) > 0 {
c.UI.Error(fmt.Sprintf("Too many arguments (expected 0, got %d)", len(args)))
return 1
}
client, err := c.Client()
if err != nil {
c.UI.Error(err.Error())
return 2
}
if err := client.Sys().Seal(); err != nil {
c.UI.Error(fmt.Sprintf("Error sealing: %s", err))
return 2
}
c.UI.Output("Success! Vault is sealed.")
return 0
}