2015-03-11 19:03:28 +00:00
|
|
|
package api
|
|
|
|
|
|
|
|
import (
|
2018-07-24 22:49:55 +00:00
|
|
|
"context"
|
2018-08-14 19:29:22 +00:00
|
|
|
"errors"
|
2015-03-11 19:03:28 +00:00
|
|
|
"fmt"
|
2016-08-08 20:00:31 +00:00
|
|
|
|
|
|
|
"github.com/mitchellh/mapstructure"
|
2015-03-11 19:03:28 +00:00
|
|
|
)
|
|
|
|
|
2015-04-05 00:53:59 +00:00
|
|
|
func (c *Sys) ListAuth() (map[string]*AuthMount, error) {
|
2015-03-13 17:32:22 +00:00
|
|
|
r := c.c.NewRequest("GET", "/v1/sys/auth")
|
2018-07-24 22:49:55 +00:00
|
|
|
|
|
|
|
ctx, cancelFunc := context.WithCancel(context.Background())
|
|
|
|
defer cancelFunc()
|
|
|
|
resp, err := c.c.RawRequestWithContext(ctx, r)
|
2015-03-11 19:03:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
2018-08-14 19:29:22 +00:00
|
|
|
secret, err := ParseSecret(resp.Body)
|
2016-08-08 20:00:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2018-08-14 19:29:22 +00:00
|
|
|
if secret == nil || secret.Data == nil {
|
|
|
|
return nil, errors.New("data from server response is empty")
|
|
|
|
}
|
2016-08-08 20:00:31 +00:00
|
|
|
|
2016-08-14 18:52:45 +00:00
|
|
|
mounts := map[string]*AuthMount{}
|
2018-08-14 19:29:22 +00:00
|
|
|
err = mapstructure.Decode(secret.Data, &mounts)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2016-08-08 20:00:31 +00:00
|
|
|
}
|
|
|
|
|
2016-08-14 18:52:45 +00:00
|
|
|
return mounts, nil
|
2015-03-11 19:03:28 +00:00
|
|
|
}
|
|
|
|
|
2017-02-16 16:37:27 +00:00
|
|
|
// DEPRECATED: Use EnableAuthWithOptions instead
|
2015-04-01 03:27:55 +00:00
|
|
|
func (c *Sys) EnableAuth(path, authType, desc string) error {
|
2017-02-16 16:37:27 +00:00
|
|
|
return c.EnableAuthWithOptions(path, &EnableAuthOptions{
|
|
|
|
Type: authType,
|
|
|
|
Description: desc,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Sys) EnableAuthWithOptions(path string, options *EnableAuthOptions) error {
|
2015-04-02 00:09:11 +00:00
|
|
|
r := c.c.NewRequest("POST", fmt.Sprintf("/v1/sys/auth/%s", path))
|
2018-04-10 02:23:56 +00:00
|
|
|
if err := r.SetJSONBody(options); err != nil {
|
2015-03-11 19:03:28 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-07-24 22:49:55 +00:00
|
|
|
ctx, cancelFunc := context.WithCancel(context.Background())
|
|
|
|
defer cancelFunc()
|
|
|
|
resp, err := c.c.RawRequestWithContext(ctx, r)
|
2015-03-11 19:03:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-04-01 03:27:55 +00:00
|
|
|
func (c *Sys) DisableAuth(path string) error {
|
|
|
|
r := c.c.NewRequest("DELETE", fmt.Sprintf("/v1/sys/auth/%s", path))
|
2018-07-24 22:49:55 +00:00
|
|
|
|
|
|
|
ctx, cancelFunc := context.WithCancel(context.Background())
|
|
|
|
defer cancelFunc()
|
|
|
|
resp, err := c.c.RawRequestWithContext(ctx, r)
|
2015-04-01 03:27:55 +00:00
|
|
|
if err == nil {
|
|
|
|
defer resp.Body.Close()
|
|
|
|
}
|
2015-03-11 19:03:28 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Structures for the requests/resposne are all down here. They aren't
|
2018-03-20 18:54:10 +00:00
|
|
|
// individually documented because the map almost directly to the raw HTTP API
|
2015-03-11 19:03:28 +00:00
|
|
|
// documentation. Please refer to that documentation for more details.
|
|
|
|
|
2017-02-16 16:37:27 +00:00
|
|
|
type EnableAuthOptions struct {
|
2018-04-10 02:23:56 +00:00
|
|
|
Type string `json:"type"`
|
|
|
|
Description string `json:"description"`
|
|
|
|
Config AuthConfigInput `json:"config"`
|
|
|
|
Local bool `json:"local"`
|
|
|
|
PluginName string `json:"plugin_name,omitempty"`
|
|
|
|
SealWrap bool `json:"seal_wrap" mapstructure:"seal_wrap"`
|
|
|
|
Options map[string]string `json:"options" mapstructure:"options"`
|
2017-08-31 16:16:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type AuthConfigInput struct {
|
2018-04-10 02:23:56 +00:00
|
|
|
DefaultLeaseTTL string `json:"default_lease_ttl" mapstructure:"default_lease_ttl"`
|
|
|
|
MaxLeaseTTL string `json:"max_lease_ttl" mapstructure:"max_lease_ttl"`
|
|
|
|
PluginName string `json:"plugin_name,omitempty" mapstructure:"plugin_name"`
|
|
|
|
AuditNonHMACRequestKeys []string `json:"audit_non_hmac_request_keys,omitempty" mapstructure:"audit_non_hmac_request_keys"`
|
|
|
|
AuditNonHMACResponseKeys []string `json:"audit_non_hmac_response_keys,omitempty" mapstructure:"audit_non_hmac_response_keys"`
|
|
|
|
ListingVisibility string `json:"listing_visibility,omitempty" mapstructure:"listing_visibility"`
|
|
|
|
PassthroughRequestHeaders []string `json:"passthrough_request_headers,omitempty" mapstructure:"passthrough_request_headers"`
|
2017-02-16 16:37:27 +00:00
|
|
|
}
|
|
|
|
|
2015-04-05 00:53:59 +00:00
|
|
|
type AuthMount struct {
|
2018-04-10 02:23:56 +00:00
|
|
|
Type string `json:"type" mapstructure:"type"`
|
|
|
|
Description string `json:"description" mapstructure:"description"`
|
|
|
|
Accessor string `json:"accessor" mapstructure:"accessor"`
|
|
|
|
Config AuthConfigOutput `json:"config" mapstructure:"config"`
|
|
|
|
Local bool `json:"local" mapstructure:"local"`
|
|
|
|
SealWrap bool `json:"seal_wrap" mapstructure:"seal_wrap"`
|
|
|
|
Options map[string]string `json:"options" mapstructure:"options"`
|
2016-06-15 16:35:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type AuthConfigOutput struct {
|
2018-04-10 02:23:56 +00:00
|
|
|
DefaultLeaseTTL int `json:"default_lease_ttl" mapstructure:"default_lease_ttl"`
|
|
|
|
MaxLeaseTTL int `json:"max_lease_ttl" mapstructure:"max_lease_ttl"`
|
|
|
|
PluginName string `json:"plugin_name,omitempty" mapstructure:"plugin_name"`
|
|
|
|
AuditNonHMACRequestKeys []string `json:"audit_non_hmac_request_keys,omitempty" mapstructure:"audit_non_hmac_request_keys"`
|
|
|
|
AuditNonHMACResponseKeys []string `json:"audit_non_hmac_response_keys,omitempty" mapstructure:"audit_non_hmac_response_keys"`
|
|
|
|
ListingVisibility string `json:"listing_visibility,omitempty" mapstructure:"listing_visibility"`
|
|
|
|
PassthroughRequestHeaders []string `json:"passthrough_request_headers,omitempty" mapstructure:"passthrough_request_headers"`
|
2015-03-11 19:03:28 +00:00
|
|
|
}
|