2015-03-12 00:46:25 +00:00
|
|
|
package api
|
|
|
|
|
2015-04-14 00:37:39 +00:00
|
|
|
func (c *Sys) Renew(id string, increment int) (*Secret, error) {
|
2017-06-14 14:38:15 +00:00
|
|
|
r := c.c.NewRequest("PUT", "/v1/sys/leases/renew")
|
2015-04-14 00:37:39 +00:00
|
|
|
|
2016-08-08 22:00:44 +00:00
|
|
|
body := map[string]interface{}{
|
|
|
|
"increment": increment,
|
|
|
|
"lease_id": id,
|
|
|
|
}
|
2015-04-14 00:37:39 +00:00
|
|
|
if err := r.SetJSONBody(body); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-03-12 00:46:25 +00:00
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
2015-03-12 00:47:47 +00:00
|
|
|
return ParseSecret(resp.Body)
|
2015-03-12 00:46:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Sys) Revoke(id string) error {
|
2017-06-14 14:38:15 +00:00
|
|
|
r := c.c.NewRequest("PUT", "/v1/sys/leases/revoke/"+id)
|
2015-03-12 00:46:25 +00:00
|
|
|
resp, err := c.c.RawRequest(r)
|
2015-04-01 02:21:02 +00:00
|
|
|
if err == nil {
|
|
|
|
defer resp.Body.Close()
|
|
|
|
}
|
2015-03-12 00:46:25 +00:00
|
|
|
return err
|
|
|
|
}
|
2015-04-01 02:23:52 +00:00
|
|
|
|
|
|
|
func (c *Sys) RevokePrefix(id string) error {
|
2017-06-14 14:38:15 +00:00
|
|
|
r := c.c.NewRequest("PUT", "/v1/sys/leases/revoke-prefix/"+id)
|
2015-04-01 02:23:52 +00:00
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err == nil {
|
|
|
|
defer resp.Body.Close()
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
|
|
|
|
|
|
|
func (c *Sys) RevokeForce(id string) error {
|
2017-06-14 14:38:15 +00:00
|
|
|
r := c.c.NewRequest("PUT", "/v1/sys/leases/revoke-force/"+id)
|
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err == nil {
|
|
|
|
defer resp.Body.Close()
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|