2015-03-04 07:34:32 +00:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
2015-05-21 02:43:47 +00:00
|
|
|
"bufio"
|
2016-04-20 18:38:20 +00:00
|
|
|
"encoding/json"
|
2015-03-30 17:55:41 +00:00
|
|
|
"fmt"
|
2015-05-21 02:43:47 +00:00
|
|
|
"io"
|
2015-03-30 17:55:41 +00:00
|
|
|
"os"
|
2015-04-02 00:01:10 +00:00
|
|
|
"sort"
|
2016-06-15 16:35:30 +00:00
|
|
|
"strconv"
|
2015-03-04 07:34:32 +00:00
|
|
|
"strings"
|
2015-03-30 17:55:41 +00:00
|
|
|
|
2015-04-06 16:53:43 +00:00
|
|
|
"github.com/hashicorp/vault/api"
|
2015-04-08 06:29:49 +00:00
|
|
|
"github.com/hashicorp/vault/helper/kv-builder"
|
2015-03-30 17:55:41 +00:00
|
|
|
"github.com/hashicorp/vault/helper/password"
|
2016-04-01 17:16:05 +00:00
|
|
|
"github.com/hashicorp/vault/meta"
|
2015-04-08 06:29:49 +00:00
|
|
|
"github.com/mitchellh/mapstructure"
|
2015-04-02 00:01:10 +00:00
|
|
|
"github.com/ryanuber/columnize"
|
2015-03-04 07:34:32 +00:00
|
|
|
)
|
|
|
|
|
2015-04-06 03:50:18 +00:00
|
|
|
// AuthHandler is the interface that any auth handlers must implement
|
|
|
|
// to enable auth via the CLI.
|
|
|
|
type AuthHandler interface {
|
2015-04-06 16:53:43 +00:00
|
|
|
Auth(*api.Client, map[string]string) (string, error)
|
2015-04-06 03:50:18 +00:00
|
|
|
Help() string
|
|
|
|
}
|
|
|
|
|
2015-03-04 07:34:32 +00:00
|
|
|
// AuthCommand is a Command that handles authentication.
|
|
|
|
type AuthCommand struct {
|
2016-04-01 17:16:05 +00:00
|
|
|
meta.Meta
|
2015-04-06 03:50:18 +00:00
|
|
|
|
|
|
|
Handlers map[string]AuthHandler
|
2015-05-23 18:22:35 +00:00
|
|
|
|
|
|
|
// The fields below can be overwritten for tests
|
|
|
|
testStdin io.Reader
|
2015-03-04 07:34:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *AuthCommand) Run(args []string) int {
|
2016-06-15 20:45:07 +00:00
|
|
|
var method, authPath string
|
2015-08-19 02:18:23 +00:00
|
|
|
var methods, methodHelp, noVerify bool
|
2016-04-01 17:16:05 +00:00
|
|
|
flags := c.Meta.FlagSet("auth", meta.FlagSetDefault)
|
2015-04-02 00:01:10 +00:00
|
|
|
flags.BoolVar(&methods, "methods", false, "")
|
2015-04-06 16:38:16 +00:00
|
|
|
flags.BoolVar(&methodHelp, "method-help", false, "")
|
2015-08-19 02:18:23 +00:00
|
|
|
flags.BoolVar(&noVerify, "no-verify", false, "")
|
2015-03-04 07:34:32 +00:00
|
|
|
flags.StringVar(&method, "method", "", "method")
|
2016-06-15 20:45:07 +00:00
|
|
|
flags.StringVar(&authPath, "path", "", "")
|
2015-03-04 07:34:32 +00:00
|
|
|
flags.Usage = func() { c.Ui.Error(c.Help()) }
|
|
|
|
if err := flags.Parse(args); err != nil {
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2015-04-02 00:01:10 +00:00
|
|
|
if methods {
|
|
|
|
return c.listMethods()
|
|
|
|
}
|
|
|
|
|
2015-03-29 23:42:45 +00:00
|
|
|
args = flags.Args()
|
|
|
|
|
2016-04-01 20:02:18 +00:00
|
|
|
tokenHelper, err := c.TokenHelper()
|
2015-03-30 17:55:41 +00:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error initializing token helper: %s\n\n"+
|
|
|
|
"Please verify that the token helper is available and properly\n"+
|
|
|
|
"configured for your system. Please refer to the documentation\n"+
|
|
|
|
"on token helpers for more information.",
|
|
|
|
err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
// token is where the final token will go
|
2015-04-06 03:50:18 +00:00
|
|
|
handler := c.Handlers[method]
|
2015-05-21 02:43:47 +00:00
|
|
|
|
2015-05-23 18:22:35 +00:00
|
|
|
// Read token from stdin if first arg is exactly "-"
|
|
|
|
var stdin io.Reader = os.Stdin
|
|
|
|
if c.testStdin != nil {
|
|
|
|
stdin = c.testStdin
|
|
|
|
}
|
|
|
|
|
2015-05-21 02:43:47 +00:00
|
|
|
if len(args) > 0 && args[0] == "-" {
|
2015-05-23 18:22:35 +00:00
|
|
|
stdinR := bufio.NewReader(stdin)
|
|
|
|
args[0], err = stdinR.ReadString('\n')
|
2015-05-21 02:43:47 +00:00
|
|
|
if err != nil && err != io.EOF {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error reading from stdin: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
args[0] = strings.TrimSpace(args[0])
|
|
|
|
}
|
|
|
|
|
2015-03-30 17:55:41 +00:00
|
|
|
if method == "" {
|
2015-04-06 03:50:18 +00:00
|
|
|
token := ""
|
2015-03-30 17:55:41 +00:00
|
|
|
if len(args) > 0 {
|
|
|
|
token = args[0]
|
|
|
|
}
|
|
|
|
|
2015-04-06 03:50:18 +00:00
|
|
|
handler = &tokenAuthHandler{Token: token}
|
2015-04-08 06:29:49 +00:00
|
|
|
args = nil
|
2015-04-06 03:50:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if handler == nil {
|
|
|
|
methods := make([]string, 0, len(c.Handlers))
|
2015-09-18 18:01:28 +00:00
|
|
|
for k := range c.Handlers {
|
2015-04-06 03:50:18 +00:00
|
|
|
methods = append(methods, k)
|
2015-03-30 17:55:41 +00:00
|
|
|
}
|
2015-04-06 03:50:18 +00:00
|
|
|
sort.Strings(methods)
|
|
|
|
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Unknown authentication method: %s\n\n"+
|
|
|
|
"Please use a supported authentication method. The list of supported\n"+
|
|
|
|
"authentication methods is shown below. Note that this list may not\n"+
|
|
|
|
"be exhaustive: Vault may support other auth methods. For auth methods\n"+
|
|
|
|
"unsupported by the CLI, please use the HTTP API.\n\n"+
|
|
|
|
"%s",
|
|
|
|
method,
|
|
|
|
strings.Join(methods, ", ")))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2015-04-06 16:38:16 +00:00
|
|
|
if methodHelp {
|
|
|
|
c.Ui.Output(handler.Help())
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2015-06-18 20:48:04 +00:00
|
|
|
// Warn if the VAULT_TOKEN environment variable is set, as that will take
|
|
|
|
// precedence
|
|
|
|
if os.Getenv("VAULT_TOKEN") != "" {
|
|
|
|
c.Ui.Output("==> WARNING: VAULT_TOKEN environment variable set!\n")
|
|
|
|
c.Ui.Output(" The environment variable takes precedence over the value")
|
|
|
|
c.Ui.Output(" set by the auth command. Either update the value of the")
|
|
|
|
c.Ui.Output(" environment variable or unset it to use the new token.\n")
|
|
|
|
}
|
|
|
|
|
2015-04-08 06:29:49 +00:00
|
|
|
var vars map[string]string
|
|
|
|
if len(args) > 0 {
|
|
|
|
builder := kvbuilder.Builder{Stdin: os.Stdin}
|
|
|
|
if err := builder.Add(args...); err != nil {
|
|
|
|
c.Ui.Error(err.Error())
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := mapstructure.Decode(builder.Map(), &vars); err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error parsing options: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-06 16:53:43 +00:00
|
|
|
// Build the client so we can auth
|
|
|
|
client, err := c.Client()
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error initializing client to auth: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2016-06-15 20:45:07 +00:00
|
|
|
if authPath != "" {
|
|
|
|
vars["mount"] = authPath
|
|
|
|
}
|
|
|
|
|
2015-04-06 16:53:43 +00:00
|
|
|
// Authenticate
|
|
|
|
token, err := handler.Auth(client, vars)
|
2015-04-06 03:50:18 +00:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(err.Error())
|
|
|
|
return 1
|
2015-03-30 17:55:41 +00:00
|
|
|
}
|
|
|
|
|
2016-03-18 18:41:22 +00:00
|
|
|
// Cache the previous token so that it can be restored if authentication fails
|
|
|
|
var previousToken string
|
|
|
|
if previousToken, err = tokenHelper.Get(); err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error caching the previous token: %s\n\n", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2015-03-30 17:55:41 +00:00
|
|
|
// Store the token!
|
|
|
|
if err := tokenHelper.Store(token); err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error storing token: %s\n\n"+
|
|
|
|
"Authentication was not successful and did not persist.\n"+
|
|
|
|
"Please reauthenticate, or fix the issue above if possible.",
|
|
|
|
err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2015-08-19 02:18:23 +00:00
|
|
|
if noVerify {
|
|
|
|
c.Ui.Output(fmt.Sprintf(
|
|
|
|
"Authenticated - no token verification has been performed.",
|
|
|
|
))
|
|
|
|
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2016-03-18 18:41:22 +00:00
|
|
|
// Build the client again so it can read the token we just wrote
|
|
|
|
client, err = c.Client()
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error initializing client to verify the token: %s", err))
|
|
|
|
if err := tokenHelper.Store(previousToken); err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error restoring the previous token: %s\n\n"+
|
|
|
|
"Please reauthenticate with a valid token.",
|
|
|
|
err))
|
|
|
|
}
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2015-03-31 22:15:08 +00:00
|
|
|
// Verify the token
|
2015-12-28 01:38:00 +00:00
|
|
|
secret, err := client.Auth().Token().LookupSelf()
|
2015-03-31 22:15:08 +00:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error validating token: %s", err))
|
2016-03-18 18:41:22 +00:00
|
|
|
if err := tokenHelper.Store(previousToken); err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error restoring the previous token: %s\n\n"+
|
|
|
|
"Please reauthenticate with a valid token.",
|
|
|
|
err))
|
|
|
|
}
|
2015-03-31 22:15:08 +00:00
|
|
|
return 1
|
|
|
|
}
|
2015-04-29 02:23:26 +00:00
|
|
|
if secret == nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error: Invalid token"))
|
2016-03-18 18:41:22 +00:00
|
|
|
if err := tokenHelper.Store(previousToken); err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error restoring the previous token: %s\n\n"+
|
|
|
|
"Please reauthenticate with a valid token.",
|
|
|
|
err))
|
|
|
|
}
|
2015-04-29 02:23:26 +00:00
|
|
|
return 1
|
|
|
|
}
|
2015-03-31 22:15:08 +00:00
|
|
|
|
|
|
|
// Get the policies we have
|
|
|
|
policiesRaw, ok := secret.Data["policies"]
|
|
|
|
if !ok {
|
|
|
|
policiesRaw = []string{"unknown"}
|
|
|
|
}
|
|
|
|
var policies []string
|
|
|
|
for _, v := range policiesRaw.([]interface{}) {
|
|
|
|
policies = append(policies, v.(string))
|
|
|
|
}
|
|
|
|
|
2016-04-13 18:45:48 +00:00
|
|
|
output := "Successfully authenticated! You are now logged in."
|
|
|
|
if method != "" {
|
|
|
|
output += "\nThe token below is already saved in the session. You do not"
|
|
|
|
output += "\nneed to \"vault auth\" again with the token."
|
|
|
|
}
|
2015-10-02 17:33:19 +00:00
|
|
|
output += fmt.Sprintf("\ntoken: %s", secret.Data["id"])
|
2016-04-20 18:38:20 +00:00
|
|
|
output += fmt.Sprintf("\ntoken_duration: %s", secret.Data["ttl"].(json.Number).String())
|
2015-09-18 18:01:28 +00:00
|
|
|
if len(policies) > 0 {
|
2015-10-02 17:33:19 +00:00
|
|
|
output += fmt.Sprintf("\ntoken_policies: [%s]", strings.Join(policies, ", "))
|
2015-09-18 18:01:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
c.Ui.Output(output)
|
2015-03-31 06:10:59 +00:00
|
|
|
|
2015-03-04 07:34:32 +00:00
|
|
|
return 0
|
2016-03-18 18:41:22 +00:00
|
|
|
|
2015-03-04 07:34:32 +00:00
|
|
|
}
|
|
|
|
|
2015-04-02 00:01:10 +00:00
|
|
|
func (c *AuthCommand) listMethods() int {
|
|
|
|
client, err := c.Client()
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error initializing client: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
auth, err := client.Sys().ListAuth()
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error reading auth table: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
paths := make([]string, 0, len(auth))
|
2015-09-18 18:01:28 +00:00
|
|
|
for path := range auth {
|
2015-04-02 00:01:10 +00:00
|
|
|
paths = append(paths, path)
|
|
|
|
}
|
|
|
|
sort.Strings(paths)
|
|
|
|
|
2016-06-15 16:35:30 +00:00
|
|
|
columns := []string{"Path | Type | Default TTL | Max TTL | Description"}
|
|
|
|
for _, path := range paths {
|
|
|
|
auth := auth[path]
|
|
|
|
defTTL := "system"
|
|
|
|
if auth.Config.DefaultLeaseTTL != 0 {
|
|
|
|
defTTL = strconv.Itoa(auth.Config.DefaultLeaseTTL)
|
|
|
|
}
|
|
|
|
maxTTL := "system"
|
|
|
|
if auth.Config.MaxLeaseTTL != 0 {
|
|
|
|
maxTTL = strconv.Itoa(auth.Config.MaxLeaseTTL)
|
|
|
|
}
|
2015-04-02 00:01:10 +00:00
|
|
|
columns = append(columns, fmt.Sprintf(
|
2016-06-15 16:35:30 +00:00
|
|
|
"%s | %s | %s | %s | %s", path, auth.Type, defTTL, maxTTL, auth.Description))
|
2015-04-02 00:01:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
c.Ui.Output(columnize.SimpleFormat(columns))
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2015-03-04 07:34:32 +00:00
|
|
|
func (c *AuthCommand) Synopsis() string {
|
|
|
|
return "Prints information about how to authenticate with Vault"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *AuthCommand) Help() string {
|
|
|
|
helpText := `
|
2015-04-08 06:29:49 +00:00
|
|
|
Usage: vault auth [options] [token or config...]
|
2015-03-29 23:42:45 +00:00
|
|
|
|
|
|
|
Authenticate with Vault with the given token or via any supported
|
|
|
|
authentication backend.
|
2015-03-04 07:34:32 +00:00
|
|
|
|
2015-03-29 23:42:45 +00:00
|
|
|
If no -method is specified, then the token is expected. If it is not
|
|
|
|
given on the command-line, it will be asked via user input. If the
|
|
|
|
token is "-", it will be read from stdin.
|
2015-03-04 07:34:32 +00:00
|
|
|
|
2015-03-29 23:42:45 +00:00
|
|
|
By specifying -method, alternate authentication methods can be used
|
2015-04-08 06:29:49 +00:00
|
|
|
such as OAuth or TLS certificates. For these, additional values for
|
|
|
|
configuration can be specified with "key=value" pairs just like
|
2015-06-16 17:05:11 +00:00
|
|
|
"vault write". Specify the "-method-help" flag to get help for a specific
|
|
|
|
method.
|
|
|
|
|
2016-06-15 20:45:07 +00:00
|
|
|
If an auth backend is enabled at a different path, such as enabling
|
|
|
|
"github" at "github-private", the "method" flag should still be "github".
|
|
|
|
The flag "-path" should be used to specify the path at which the auth
|
|
|
|
backend is enabled. For example:
|
|
|
|
"vault auth -method=github -path=github-private token=<github_token>"
|
|
|
|
The value of the "path" flag will be supplied to auth providers
|
|
|
|
as the "mount" option in the payload to specify the mount point.
|
|
|
|
See the "-method-help" for more info.
|
2015-03-04 07:34:32 +00:00
|
|
|
|
2015-03-04 07:52:54 +00:00
|
|
|
General Options:
|
|
|
|
|
2016-04-01 17:16:05 +00:00
|
|
|
` + meta.GeneralOptionsUsage() + `
|
2015-03-04 07:52:54 +00:00
|
|
|
|
|
|
|
Auth Options:
|
2015-03-04 07:34:32 +00:00
|
|
|
|
2015-04-06 03:50:18 +00:00
|
|
|
-method=name Outputs help for the authentication method with the given
|
|
|
|
name for the remote server. If this authentication method
|
|
|
|
is not available, exit with code 1.
|
2015-04-02 00:01:10 +00:00
|
|
|
|
2015-04-06 16:38:16 +00:00
|
|
|
-method-help If set, the help for the selected method will be shown.
|
|
|
|
|
2015-04-06 03:50:18 +00:00
|
|
|
-methods List the available auth methods.
|
|
|
|
|
2015-08-19 02:18:23 +00:00
|
|
|
-no-verify Do not verify the token after creation; avoids a use count
|
|
|
|
decrement.
|
|
|
|
|
2016-06-20 20:24:49 +00:00
|
|
|
-path The path at which the auth backend is enabled. If an auth
|
|
|
|
backend is mounted at multiple paths, this option can be
|
|
|
|
used to authenticate against specific paths.
|
2015-03-04 07:34:32 +00:00
|
|
|
`
|
|
|
|
return strings.TrimSpace(helpText)
|
|
|
|
}
|
2015-04-06 03:50:18 +00:00
|
|
|
|
|
|
|
// tokenAuthHandler handles retrieving the token from the command-line.
|
|
|
|
type tokenAuthHandler struct {
|
|
|
|
Token string
|
|
|
|
}
|
|
|
|
|
2015-04-06 16:53:43 +00:00
|
|
|
func (h *tokenAuthHandler) Auth(*api.Client, map[string]string) (string, error) {
|
2015-04-06 03:50:18 +00:00
|
|
|
token := h.Token
|
|
|
|
if token == "" {
|
|
|
|
var err error
|
|
|
|
|
|
|
|
// No arguments given, read the token from user input
|
|
|
|
fmt.Printf("Token (will be hidden): ")
|
|
|
|
token, err = password.Read(os.Stdin)
|
|
|
|
fmt.Printf("\n")
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf(
|
|
|
|
"Error attempting to ask for token. The raw error message\n"+
|
|
|
|
"is shown below, but the most common reason for this error is\n"+
|
|
|
|
"that you attempted to pipe a value into auth. If you want to\n"+
|
|
|
|
"pipe the token, please pass '-' as the token argument.\n\n"+
|
|
|
|
"Raw error: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if token == "" {
|
|
|
|
return "", fmt.Errorf(
|
|
|
|
"A token must be passed to auth. Please view the help\n" +
|
|
|
|
"for more information.")
|
|
|
|
}
|
|
|
|
|
|
|
|
return token, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *tokenAuthHandler) Help() string {
|
2015-04-06 16:38:16 +00:00
|
|
|
help := `
|
|
|
|
No method selected with the "-method" flag, so the "auth" command assumes
|
|
|
|
you'll be using raw token authentication. For this, specify the token to
|
|
|
|
authenticate as as the parameter to "vault auth". Example:
|
|
|
|
|
|
|
|
vault auth 123456
|
|
|
|
|
|
|
|
The token used to authenticate must come from some other source. A root
|
|
|
|
token is created when Vault is first initialized. After that, subsequent
|
|
|
|
tokens are created via the API or command line interface (with the
|
|
|
|
"token"-prefixed commands).
|
|
|
|
`
|
|
|
|
|
|
|
|
return strings.TrimSpace(help)
|
2015-04-06 03:50:18 +00:00
|
|
|
}
|