open-vault/command/status.go

117 lines
3 KiB
Go
Raw Normal View History

2015-03-13 18:33:17 +00:00
package command
import (
"fmt"
"strings"
"github.com/hashicorp/vault/api"
2015-03-13 18:33:17 +00:00
)
2015-04-20 19:11:21 +00:00
// StatusCommand is a Command that outputs the status of whether
// Vault is sealed or not as well as HA information.
type StatusCommand struct {
2015-03-13 18:33:17 +00:00
Meta
}
2015-04-20 19:11:21 +00:00
func (c *StatusCommand) Run(args []string) int {
flags := c.Meta.FlagSet("status", FlagSetDefault)
2015-03-13 18:33:17 +00:00
flags.Usage = func() { c.Ui.Error(c.Help()) }
if err := flags.Parse(args); err != nil {
return 1
}
client, err := c.Client()
if err != nil {
c.Ui.Error(fmt.Sprintf(
"Error initializing client: %s", err))
return 2
}
2015-04-20 19:08:54 +00:00
sealStatus, err := client.Sys().SealStatus()
2015-03-13 18:33:17 +00:00
if err != nil {
c.Ui.Error(fmt.Sprintf(
"Error checking seal status: %s", err))
return 2
}
c.Ui.Output(fmt.Sprintf(
"Sealed: %v\n"+
2015-04-21 18:11:15 +00:00
"Key Shares: %d\n"+
"Key Threshold: %d\n"+
"Unseal Progress: %d",
sealStatus.Sealed,
sealStatus.N,
sealStatus.T,
sealStatus.Progress))
2015-03-13 18:33:17 +00:00
// Mask the 'Vault is sealed' error, since this means HA is enabled,
// but that we cannot query for the leader since we are sealed.
2015-04-20 19:08:54 +00:00
leaderStatus, err := client.Sys().Leader()
if err != nil && strings.Contains(err.Error(), "Vault is sealed") {
leaderStatus = &api.LeaderResponse{HAEnabled: true}
err = nil
}
2015-04-20 19:08:54 +00:00
if err != nil {
c.Ui.Error(fmt.Sprintf(
"Error checking leader status: %s", err))
return 2
}
// Output if HA is enabled
2015-04-21 18:11:15 +00:00
c.Ui.Output("")
c.Ui.Output(fmt.Sprintf("High-Availability Enabled: %v", leaderStatus.HAEnabled))
if leaderStatus.HAEnabled {
if sealStatus.Sealed {
c.Ui.Output("\tMode: sealed")
} else {
mode := "standby"
if leaderStatus.IsSelf {
mode = "active"
}
c.Ui.Output(fmt.Sprintf("\tMode: %s", mode))
if leaderStatus.LeaderAddress == "" {
leaderStatus.LeaderAddress = "<none>"
}
c.Ui.Output(fmt.Sprintf("\tLeader: %s", leaderStatus.LeaderAddress))
}
}
2015-03-13 18:33:17 +00:00
2015-04-20 19:08:54 +00:00
if sealStatus.Sealed {
2015-03-13 18:33:17 +00:00
return 1
} else {
return 0
}
}
2015-04-20 19:11:21 +00:00
func (c *StatusCommand) Synopsis() string {
return "Outputs status of whether Vault is sealed and if HA mode is enabled"
2015-03-13 18:33:17 +00:00
}
2015-04-20 19:11:21 +00:00
func (c *StatusCommand) Help() string {
2015-03-13 18:33:17 +00:00
helpText := `
2015-04-20 19:11:21 +00:00
Usage: vault status [options]
2015-03-13 18:33:17 +00:00
2015-04-20 19:11:21 +00:00
Outputs the state of the Vault, sealed or unsealed and if HA is enabled.
2015-03-13 18:33:17 +00:00
This command outputs whether or not the Vault is sealed. The exit
code also reflects the seal status (0 unsealed, 1 sealed, 2+ error).
General Options:
2015-04-28 16:15:38 +00:00
-address=addr The address of the Vault server.
2015-03-13 18:33:17 +00:00
-ca-cert=path Path to a PEM encoded CA cert file to use to
verify the Vault server SSL certificate.
-ca-path=path Path to a directory of PEM encoded CA cert files
to verify the Vault server SSL certificate. If both
-ca-cert and -ca-path are specified, -ca-path is used.
-insecure Do not verify TLS certificate. This is highly
not recommended. This is especially not recommended
for unsealing a vault.
`
return strings.TrimSpace(helpText)
}