open-vault/command/lease_revoke.go

143 lines
3.6 KiB
Go
Raw Normal View History

2015-04-01 02:21:02 +00:00
package command
import (
"fmt"
"strings"
2016-04-01 17:16:05 +00:00
2017-09-05 04:04:05 +00:00
"github.com/mitchellh/cli"
"github.com/posener/complete"
2015-04-01 02:21:02 +00:00
)
2017-09-08 01:59:31 +00:00
var _ cli.Command = (*LeaseRevokeCommand)(nil)
var _ cli.CommandAutocomplete = (*LeaseRevokeCommand)(nil)
2017-09-05 04:04:05 +00:00
2017-09-08 01:59:31 +00:00
type LeaseRevokeCommand struct {
2017-09-05 04:04:05 +00:00
*BaseCommand
flagForce bool
flagPrefix bool
2015-04-01 02:21:02 +00:00
}
2017-09-08 01:59:31 +00:00
func (c *LeaseRevokeCommand) Synopsis() string {
2017-09-05 04:04:05 +00:00
return "Revokes leases and secrets"
}
2015-04-01 02:21:02 +00:00
2017-09-08 01:59:31 +00:00
func (c *LeaseRevokeCommand) Help() string {
2017-09-05 04:04:05 +00:00
helpText := `
2017-09-08 01:59:31 +00:00
Usage: vault lease revoke [options] ID
2015-04-01 02:21:02 +00:00
2017-09-05 04:04:05 +00:00
Revokes secrets by their lease ID. This command can revoke a single secret
or multiple secrets based on a path-matched prefix.
2015-04-01 02:21:02 +00:00
2017-09-05 04:04:05 +00:00
Revoke a single lease:
2017-09-08 01:59:31 +00:00
$ vault lease revoke database/creds/readonly/2f6a614c...
2017-09-05 04:04:05 +00:00
Revoke all leases for a role:
2017-09-08 01:59:31 +00:00
$ vault lease revoke -prefix aws/creds/deploy
2017-09-05 04:04:05 +00:00
2017-09-08 01:59:31 +00:00
Force delete leases from Vault even if secret engine revocation fails:
2017-09-05 04:04:05 +00:00
2017-09-08 01:59:31 +00:00
$ vault lease revoke -force -prefix consul/creds
2015-04-01 02:21:02 +00:00
2017-09-05 04:04:05 +00:00
For a full list of examples and paths, please see the documentation that
2017-09-08 01:59:31 +00:00
corresponds to the secret engine in use.
2017-09-05 04:04:05 +00:00
` + c.Flags().Help()
return strings.TrimSpace(helpText)
2015-04-01 02:21:02 +00:00
}
2017-09-08 01:59:31 +00:00
func (c *LeaseRevokeCommand) Flags() *FlagSets {
2017-09-05 04:04:05 +00:00
set := c.flagSet(FlagSetHTTP)
f := set.NewFlagSet("Command Options")
f.BoolVar(&BoolVar{
Name: "force",
Aliases: []string{"f"},
Target: &c.flagForce,
Default: false,
2017-09-08 01:59:31 +00:00
Usage: "Delete the lease from Vault even if the secret engine revocation " +
2017-09-05 04:04:05 +00:00
"fails. This is meant for recovery situations where the secret " +
2017-09-08 01:59:31 +00:00
"in the target secret engine was manually removed. If this flag is " +
"specified, -prefix is also required.",
2017-09-05 04:04:05 +00:00
})
f.BoolVar(&BoolVar{
Name: "prefix",
Target: &c.flagPrefix,
Default: false,
Usage: "Treat the ID as a prefix instead of an exact lease ID. This can " +
"revoke multiple leases simultaneously.",
})
return set
2015-04-01 02:21:02 +00:00
}
2017-09-08 01:59:31 +00:00
func (c *LeaseRevokeCommand) AutocompleteArgs() complete.Predictor {
2017-09-05 04:04:05 +00:00
return c.PredictVaultFiles()
}
2015-04-01 02:21:02 +00:00
2017-09-08 01:59:31 +00:00
func (c *LeaseRevokeCommand) AutocompleteFlags() complete.Flags {
2017-09-05 04:04:05 +00:00
return c.Flags().Completions()
}
2015-04-01 02:21:02 +00:00
2017-09-08 01:59:31 +00:00
func (c *LeaseRevokeCommand) Run(args []string) int {
2017-09-05 04:04:05 +00:00
f := c.Flags()
2017-09-05 04:04:05 +00:00
if err := f.Parse(args); err != nil {
c.UI.Error(err.Error())
return 1
}
2015-04-01 02:21:02 +00:00
2017-09-05 04:04:05 +00:00
args = f.Args()
2017-09-08 01:59:31 +00:00
switch {
case len(args) < 1:
c.UI.Error(fmt.Sprintf("Not enough arguments (expected 1, got %d)", len(args)))
2017-09-05 04:04:05 +00:00
return 1
2017-09-08 01:59:31 +00:00
case len(args) > 1:
2017-09-05 04:04:05 +00:00
c.UI.Error(fmt.Sprintf("Too many arguments (expected 1, got %d)", len(args)))
return 1
}
2015-04-01 02:21:02 +00:00
2017-09-05 04:04:05 +00:00
if c.flagForce && !c.flagPrefix {
c.UI.Error("Specifying -force requires also specifying -prefix")
return 1
}
2015-04-01 02:21:02 +00:00
2017-09-05 04:04:05 +00:00
client, err := c.Client()
if err != nil {
c.UI.Error(err.Error())
return 2
}
2017-09-08 01:59:31 +00:00
leaseID := strings.TrimSpace(args[0])
2017-09-05 04:04:05 +00:00
switch {
case c.flagForce && c.flagPrefix:
c.UI.Warn(wrapAtLength("Warning! Force-removing leases can cause Vault " +
2017-09-08 01:59:31 +00:00
"to become out of sync with secret engines!"))
2017-09-05 04:04:05 +00:00
if err := client.Sys().RevokeForce(leaseID); err != nil {
c.UI.Error(fmt.Sprintf("Error force revoking leases with prefix %s: %s", leaseID, err))
return 2
}
c.UI.Output(fmt.Sprintf("Success! Force revoked any leases with prefix: %s", leaseID))
return 0
case c.flagPrefix:
if err := client.Sys().RevokePrefix(leaseID); err != nil {
c.UI.Error(fmt.Sprintf("Error revoking leases with prefix %s: %s", leaseID, err))
return 2
}
c.UI.Output(fmt.Sprintf("Success! Revoked any leases with prefix: %s", leaseID))
return 0
default:
if err := client.Sys().Revoke(leaseID); err != nil {
c.UI.Error(fmt.Sprintf("Error revoking lease %s: %s", leaseID, err))
return 2
}
c.UI.Output(fmt.Sprintf("Success! Revoked lease: %s", leaseID))
return 0
}
2015-04-01 02:21:02 +00:00
}