2015-04-05 00:53:59 +00:00
|
|
|
package api
|
|
|
|
|
|
|
|
// TokenAuth is used to perform token backend operations on Vault.
|
|
|
|
type TokenAuth struct {
|
|
|
|
c *Client
|
|
|
|
}
|
|
|
|
|
2015-09-29 07:35:16 +00:00
|
|
|
// Token is used to return the client for logical-backend API calls.
|
2015-04-05 00:54:16 +00:00
|
|
|
func (a *Auth) Token() *TokenAuth {
|
2015-04-05 00:53:59 +00:00
|
|
|
return &TokenAuth{c: a.c}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *TokenAuth) Create(opts *TokenCreateRequest) (*Secret, error) {
|
|
|
|
r := c.c.NewRequest("POST", "/v1/auth/token/create")
|
|
|
|
if err := r.SetJSONBody(opts); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
return ParseSecret(resp.Body)
|
|
|
|
}
|
|
|
|
|
2016-02-29 18:27:31 +00:00
|
|
|
func (c *TokenAuth) CreateWithRole(opts *TokenCreateRequest, roleName string) (*Secret, error) {
|
|
|
|
r := c.c.NewRequest("POST", "/v1/auth/token/create/"+roleName)
|
|
|
|
if err := r.SetJSONBody(opts); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
return ParseSecret(resp.Body)
|
|
|
|
}
|
|
|
|
|
2015-12-29 20:18:59 +00:00
|
|
|
func (c *TokenAuth) Lookup(token string) (*Secret, error) {
|
|
|
|
r := c.c.NewRequest("GET", "/v1/auth/token/lookup/"+token)
|
|
|
|
|
2016-03-10 20:09:16 +00:00
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
return ParseSecret(resp.Body)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *TokenAuth) LookupAccessor(accessor string) (*Secret, error) {
|
|
|
|
r := c.c.NewRequest("POST", "/v1/auth/token/lookup-accessor/"+accessor)
|
|
|
|
|
2015-12-29 20:18:59 +00:00
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
return ParseSecret(resp.Body)
|
|
|
|
}
|
|
|
|
|
2015-10-30 21:27:33 +00:00
|
|
|
func (c *TokenAuth) LookupSelf() (*Secret, error) {
|
2015-12-28 00:05:15 +00:00
|
|
|
r := c.c.NewRequest("GET", "/v1/auth/token/lookup-self")
|
2015-10-30 21:27:33 +00:00
|
|
|
|
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
return ParseSecret(resp.Body)
|
|
|
|
}
|
|
|
|
|
2015-04-20 01:04:01 +00:00
|
|
|
func (c *TokenAuth) Renew(token string, increment int) (*Secret, error) {
|
2015-04-05 00:53:59 +00:00
|
|
|
r := c.c.NewRequest("PUT", "/v1/auth/token/renew/"+token)
|
2015-04-20 01:04:01 +00:00
|
|
|
|
|
|
|
body := map[string]interface{}{"increment": increment}
|
|
|
|
if err := r.SetJSONBody(body); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-04-05 00:53:59 +00:00
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err != nil {
|
2015-04-20 01:04:01 +00:00
|
|
|
return nil, err
|
2015-04-05 00:53:59 +00:00
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
2015-04-20 01:04:01 +00:00
|
|
|
return ParseSecret(resp.Body)
|
2015-04-05 00:53:59 +00:00
|
|
|
}
|
|
|
|
|
2015-10-30 21:27:33 +00:00
|
|
|
func (c *TokenAuth) RenewSelf(increment int) (*Secret, error) {
|
|
|
|
r := c.c.NewRequest("PUT", "/v1/auth/token/renew-self")
|
|
|
|
|
|
|
|
body := map[string]interface{}{"increment": increment}
|
|
|
|
if err := r.SetJSONBody(body); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
return ParseSecret(resp.Body)
|
|
|
|
}
|
|
|
|
|
2016-03-10 22:04:04 +00:00
|
|
|
// RevokeAccessor revokes a token associated with the given accessor
|
|
|
|
// along with all the child tokens.
|
|
|
|
func (c *TokenAuth) RevokeAccessor(accessor string) error {
|
|
|
|
r := c.c.NewRequest("POST", "/v1/auth/token/revoke-accessor/"+accessor)
|
2015-04-05 00:53:59 +00:00
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-03-10 22:04:04 +00:00
|
|
|
// RevokeOrphan revokes a token without revoking the tree underneath it (so
|
|
|
|
// child tokens are orphaned rather than revoked)
|
|
|
|
func (c *TokenAuth) RevokeOrphan(token string) error {
|
|
|
|
r := c.c.NewRequest("PUT", "/v1/auth/token/revoke-orphan/"+token)
|
2015-04-05 00:53:59 +00:00
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-03-10 22:04:04 +00:00
|
|
|
// RevokePrefix revokes a token based on a prefix, which can be used to revoke
|
|
|
|
// e.g. all tokens issued by a certain credential mount
|
|
|
|
func (c *TokenAuth) RevokePrefix(token string) error {
|
|
|
|
r := c.c.NewRequest("PUT", "/v1/auth/token/revoke-prefix/"+token)
|
2015-10-30 21:27:33 +00:00
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-02-03 16:42:13 +00:00
|
|
|
// RevokeTree is the "normal" revoke operation that revokes the given token and
|
|
|
|
// the entire tree underneath -- all of its child tokens, their child tokens,
|
|
|
|
// etc.
|
2015-04-05 00:53:59 +00:00
|
|
|
func (c *TokenAuth) RevokeTree(token string) error {
|
|
|
|
r := c.c.NewRequest("PUT", "/v1/auth/token/revoke/"+token)
|
|
|
|
resp, err := c.c.RawRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// TokenCreateRequest is the options structure for creating a token.
|
|
|
|
type TokenCreateRequest struct {
|
2015-11-09 22:30:50 +00:00
|
|
|
ID string `json:"id,omitempty"`
|
|
|
|
Policies []string `json:"policies,omitempty"`
|
|
|
|
Metadata map[string]string `json:"meta,omitempty"`
|
|
|
|
Lease string `json:"lease,omitempty"`
|
|
|
|
TTL string `json:"ttl,omitempty"`
|
|
|
|
NoParent bool `json:"no_parent,omitempty"`
|
|
|
|
NoDefaultPolicy bool `json:"no_default_policy,omitempty"`
|
|
|
|
DisplayName string `json:"display_name"`
|
|
|
|
NumUses int `json:"num_uses"`
|
2015-04-05 00:53:59 +00:00
|
|
|
}
|