2023-03-15 16:00:52 +00:00
|
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
|
|
2018-03-21 22:02:41 +00:00
|
|
|
|
package command
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"fmt"
|
|
|
|
|
"io"
|
2022-11-01 13:57:23 +00:00
|
|
|
|
"path"
|
2018-03-21 22:02:41 +00:00
|
|
|
|
"strings"
|
2019-06-05 20:20:43 +00:00
|
|
|
|
"time"
|
2018-03-21 22:02:41 +00:00
|
|
|
|
|
|
|
|
|
"github.com/mitchellh/cli"
|
|
|
|
|
"github.com/posener/complete"
|
|
|
|
|
)
|
|
|
|
|
|
2021-04-08 16:43:39 +00:00
|
|
|
|
var (
|
|
|
|
|
_ cli.Command = (*KVMetadataPutCommand)(nil)
|
|
|
|
|
_ cli.CommandAutocomplete = (*KVMetadataPutCommand)(nil)
|
|
|
|
|
)
|
2018-03-21 22:02:41 +00:00
|
|
|
|
|
|
|
|
|
type KVMetadataPutCommand struct {
|
|
|
|
|
*BaseCommand
|
|
|
|
|
|
2019-06-05 20:20:43 +00:00
|
|
|
|
flagMaxVersions int
|
2022-01-12 17:05:27 +00:00
|
|
|
|
flagCASRequired BoolPtr
|
2019-06-05 20:20:43 +00:00
|
|
|
|
flagDeleteVersionAfter time.Duration
|
2021-08-23 19:49:09 +00:00
|
|
|
|
flagCustomMetadata map[string]string
|
2022-04-06 20:58:06 +00:00
|
|
|
|
flagMount string
|
2019-06-05 20:20:43 +00:00
|
|
|
|
testStdin io.Reader // for tests
|
2018-03-21 22:02:41 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *KVMetadataPutCommand) Synopsis() string {
|
|
|
|
|
return "Sets or updates key settings in the KV store"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *KVMetadataPutCommand) Help() string {
|
|
|
|
|
helpText := `
|
2022-10-18 19:08:25 +00:00
|
|
|
|
Usage: vault kv metadata put [options] KEY
|
2018-03-21 22:02:41 +00:00
|
|
|
|
|
|
|
|
|
This command can be used to create a blank key in the key-value store or to
|
|
|
|
|
update key configuration for a specified key.
|
2019-06-05 20:20:43 +00:00
|
|
|
|
|
|
|
|
|
Create a key in the key-value store with no data:
|
2018-03-21 22:02:41 +00:00
|
|
|
|
|
2022-04-06 20:58:06 +00:00
|
|
|
|
$ vault kv metadata put -mount=secret foo
|
|
|
|
|
|
|
|
|
|
The deprecated path-like syntax can also be used, but this should be avoided
|
|
|
|
|
for KV v2, as the fact that it is not actually the full API path to
|
|
|
|
|
the secret (secret/metadata/foo) can cause confusion:
|
|
|
|
|
|
2018-03-21 22:02:41 +00:00
|
|
|
|
$ vault kv metadata put secret/foo
|
|
|
|
|
|
2019-06-05 20:20:43 +00:00
|
|
|
|
Set a max versions setting on the key:
|
2018-03-21 22:02:41 +00:00
|
|
|
|
|
2022-04-06 20:58:06 +00:00
|
|
|
|
$ vault kv metadata put -mount=secret -max-versions=5 foo
|
2018-03-21 22:02:41 +00:00
|
|
|
|
|
2019-06-05 20:20:43 +00:00
|
|
|
|
Set delete-version-after on the key:
|
|
|
|
|
|
2022-04-06 20:58:06 +00:00
|
|
|
|
$ vault kv metadata put -mount=secret -delete-version-after=3h25m19s foo
|
2019-06-05 20:20:43 +00:00
|
|
|
|
|
|
|
|
|
Require Check-and-Set for this key:
|
2018-03-21 22:02:41 +00:00
|
|
|
|
|
2022-04-06 20:58:06 +00:00
|
|
|
|
$ vault kv metadata put -mount=secret -cas-required foo
|
2018-03-21 22:02:41 +00:00
|
|
|
|
|
2021-08-23 19:49:09 +00:00
|
|
|
|
Set custom metadata on the key:
|
|
|
|
|
|
2022-04-06 20:58:06 +00:00
|
|
|
|
$ vault kv metadata put -mount=secret -custom-metadata=foo=abc -custom-metadata=bar=123 foo
|
2021-08-23 19:49:09 +00:00
|
|
|
|
|
2018-03-21 22:02:41 +00:00
|
|
|
|
Additional flags and more advanced use cases are detailed below.
|
|
|
|
|
|
|
|
|
|
` + c.Flags().Help()
|
|
|
|
|
return strings.TrimSpace(helpText)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *KVMetadataPutCommand) Flags() *FlagSets {
|
|
|
|
|
set := c.flagSet(FlagSetHTTP | FlagSetOutputFormat)
|
|
|
|
|
|
|
|
|
|
// Common Options
|
|
|
|
|
f := set.NewFlagSet("Common Options")
|
|
|
|
|
|
|
|
|
|
f.IntVar(&IntVar{
|
|
|
|
|
Name: "max-versions",
|
|
|
|
|
Target: &c.flagMaxVersions,
|
2022-01-12 17:05:27 +00:00
|
|
|
|
Default: -1,
|
2018-03-21 22:02:41 +00:00
|
|
|
|
Usage: `The number of versions to keep. If not set, the backend’s configured max version is used.`,
|
|
|
|
|
})
|
|
|
|
|
|
2022-01-12 17:05:27 +00:00
|
|
|
|
f.BoolPtrVar(&BoolPtrVar{
|
2022-01-27 18:06:34 +00:00
|
|
|
|
Name: "cas-required",
|
|
|
|
|
Target: &c.flagCASRequired,
|
|
|
|
|
Usage: `If true the key will require the cas parameter to be set on all write requests. If false, the backend’s configuration will be used.`,
|
2018-03-21 22:02:41 +00:00
|
|
|
|
})
|
|
|
|
|
|
2019-06-05 20:20:43 +00:00
|
|
|
|
f.DurationVar(&DurationVar{
|
|
|
|
|
Name: "delete-version-after",
|
|
|
|
|
Target: &c.flagDeleteVersionAfter,
|
2020-03-30 23:19:44 +00:00
|
|
|
|
Default: -1,
|
2019-06-05 20:20:43 +00:00
|
|
|
|
EnvVar: "",
|
|
|
|
|
Completion: complete.PredictAnything,
|
|
|
|
|
Usage: `Specifies the length of time before a version is deleted.
|
|
|
|
|
If not set, the backend's configured delete-version-after is used. Cannot be
|
|
|
|
|
greater than the backend's delete-version-after. The delete-version-after is
|
|
|
|
|
specified as a numeric string with a suffix like "30s" or
|
|
|
|
|
"3h25m19s".`,
|
|
|
|
|
})
|
|
|
|
|
|
2021-08-23 19:49:09 +00:00
|
|
|
|
f.StringMapVar(&StringMapVar{
|
2022-01-27 18:06:34 +00:00
|
|
|
|
Name: "custom-metadata",
|
|
|
|
|
Target: &c.flagCustomMetadata,
|
2021-08-23 19:49:09 +00:00
|
|
|
|
Default: map[string]string{},
|
|
|
|
|
Usage: "Specifies arbitrary version-agnostic key=value metadata meant to describe a secret." +
|
|
|
|
|
"This can be specified multiple times to add multiple pieces of metadata.",
|
|
|
|
|
})
|
|
|
|
|
|
2022-04-06 20:58:06 +00:00
|
|
|
|
f.StringVar(&StringVar{
|
|
|
|
|
Name: "mount",
|
|
|
|
|
Target: &c.flagMount,
|
|
|
|
|
Default: "", // no default, because the handling of the next arg is determined by whether this flag has a value
|
|
|
|
|
Usage: `Specifies the path where the KV backend is mounted. If specified,
|
|
|
|
|
the next argument will be interpreted as the secret path. If this flag is
|
|
|
|
|
not specified, the next argument will be interpreted as the combined mount
|
|
|
|
|
path and secret path, with /metadata/ automatically appended between KV
|
|
|
|
|
v2 secrets.`,
|
|
|
|
|
})
|
|
|
|
|
|
2018-03-21 22:02:41 +00:00
|
|
|
|
return set
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *KVMetadataPutCommand) AutocompleteArgs() complete.Predictor {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *KVMetadataPutCommand) AutocompleteFlags() complete.Flags {
|
|
|
|
|
return c.Flags().Completions()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *KVMetadataPutCommand) Run(args []string) int {
|
|
|
|
|
f := c.Flags()
|
|
|
|
|
|
|
|
|
|
if err := f.Parse(args); err != nil {
|
|
|
|
|
c.UI.Error(err.Error())
|
|
|
|
|
return 1
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
args = f.Args()
|
|
|
|
|
|
|
|
|
|
switch {
|
|
|
|
|
case len(args) < 1:
|
|
|
|
|
c.UI.Error(fmt.Sprintf("Not enough arguments (expected 1, got %d)", len(args)))
|
|
|
|
|
return 1
|
|
|
|
|
case len(args) > 1:
|
|
|
|
|
c.UI.Error(fmt.Sprintf("Too many arguments (expected 1, got %d)", len(args)))
|
|
|
|
|
return 1
|
|
|
|
|
}
|
|
|
|
|
|
2018-04-23 22:00:02 +00:00
|
|
|
|
client, err := c.Client()
|
|
|
|
|
if err != nil {
|
|
|
|
|
c.UI.Error(err.Error())
|
|
|
|
|
return 2
|
|
|
|
|
}
|
|
|
|
|
|
2022-04-06 20:58:06 +00:00
|
|
|
|
// If true, we're working with "-mount=secret foo" syntax.
|
|
|
|
|
// If false, we're using "secret/foo" syntax.
|
2022-11-01 13:57:23 +00:00
|
|
|
|
mountFlagSyntax := c.flagMount != ""
|
2022-04-06 20:58:06 +00:00
|
|
|
|
|
|
|
|
|
var (
|
|
|
|
|
mountPath string
|
|
|
|
|
partialPath string
|
|
|
|
|
v2 bool
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
// Parse the paths and grab the KV version
|
|
|
|
|
if mountFlagSyntax {
|
|
|
|
|
// In this case, this arg is the secret path (e.g. "foo").
|
|
|
|
|
partialPath = sanitizePath(args[0])
|
2022-11-01 13:57:23 +00:00
|
|
|
|
mountPath, v2, err = isKVv2(sanitizePath(c.flagMount), client)
|
2022-04-06 20:58:06 +00:00
|
|
|
|
if err != nil {
|
|
|
|
|
c.UI.Error(err.Error())
|
|
|
|
|
return 2
|
|
|
|
|
}
|
2022-11-01 13:57:23 +00:00
|
|
|
|
|
|
|
|
|
if v2 {
|
|
|
|
|
partialPath = path.Join(mountPath, partialPath)
|
|
|
|
|
}
|
2022-04-06 20:58:06 +00:00
|
|
|
|
} else {
|
|
|
|
|
// In this case, this arg is a path-like combination of mountPath/secretPath.
|
|
|
|
|
// (e.g. "secret/foo")
|
|
|
|
|
partialPath = sanitizePath(args[0])
|
|
|
|
|
mountPath, v2, err = isKVv2(partialPath, client)
|
|
|
|
|
if err != nil {
|
|
|
|
|
c.UI.Error(err.Error())
|
|
|
|
|
return 2
|
|
|
|
|
}
|
2018-03-21 22:02:41 +00:00
|
|
|
|
}
|
2022-04-06 20:58:06 +00:00
|
|
|
|
|
2018-04-23 22:00:02 +00:00
|
|
|
|
if !v2 {
|
|
|
|
|
c.UI.Error("Metadata not supported on KV Version 1")
|
|
|
|
|
return 1
|
|
|
|
|
}
|
2018-03-21 22:02:41 +00:00
|
|
|
|
|
2023-05-03 17:10:55 +00:00
|
|
|
|
fullPath := addPrefixToKVPath(partialPath, mountPath, "metadata", false)
|
2022-01-12 17:05:27 +00:00
|
|
|
|
data := map[string]interface{}{}
|
|
|
|
|
|
|
|
|
|
if c.flagMaxVersions >= 0 {
|
|
|
|
|
data["max_versions"] = c.flagMaxVersions
|
2018-03-21 22:02:41 +00:00
|
|
|
|
}
|
|
|
|
|
|
2020-03-30 23:19:44 +00:00
|
|
|
|
if c.flagDeleteVersionAfter >= 0 {
|
2019-06-05 20:20:43 +00:00
|
|
|
|
data["delete_version_after"] = c.flagDeleteVersionAfter.String()
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-12 17:05:27 +00:00
|
|
|
|
if c.flagCASRequired.IsSet() {
|
|
|
|
|
data["cas_required"] = c.flagCASRequired.Get()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if len(c.flagCustomMetadata) > 0 {
|
|
|
|
|
data["custom_metadata"] = c.flagCustomMetadata
|
|
|
|
|
}
|
|
|
|
|
|
2022-04-06 20:58:06 +00:00
|
|
|
|
secret, err := client.Logical().Write(fullPath, data)
|
2018-03-21 22:02:41 +00:00
|
|
|
|
if err != nil {
|
2022-04-06 20:58:06 +00:00
|
|
|
|
c.UI.Error(fmt.Sprintf("Error writing data to %s: %s", fullPath, err))
|
2018-06-08 17:45:47 +00:00
|
|
|
|
if secret != nil {
|
|
|
|
|
OutputSecret(c.UI, secret)
|
|
|
|
|
}
|
2018-03-21 22:02:41 +00:00
|
|
|
|
return 2
|
|
|
|
|
}
|
|
|
|
|
if secret == nil {
|
|
|
|
|
// Don't output anything unless using the "table" format
|
|
|
|
|
if Format(c.UI) == "table" {
|
2022-04-06 20:58:06 +00:00
|
|
|
|
c.UI.Info(fmt.Sprintf("Success! Data written to: %s", fullPath))
|
2018-03-21 22:02:41 +00:00
|
|
|
|
}
|
|
|
|
|
return 0
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return OutputSecret(c.UI, secret)
|
|
|
|
|
}
|