package command import ( "fmt" "strings" "github.com/hashicorp/vault/api" ) // InitCommand is a Command that initializes a new Vault server. type InitCommand struct { Meta } func (c *InitCommand) Run(args []string) int { var shares, threshold int flags := c.Meta.FlagSet("init", FlagSetDefault) flags.Usage = func() { c.Ui.Error(c.Help()) } flags.IntVar(&shares, "key-shares", 5, "") flags.IntVar(&threshold, "key-threshold", 3, "") if err := flags.Parse(args); err != nil { return 1 } client, err := c.Client() if err != nil { c.Ui.Error(fmt.Sprintf( "Error initializing client: %s", err)) return 1 } resp, err := client.Sys().Init(&api.InitRequest{ SecretShares: shares, SecretThreshold: threshold, }) if err != nil { c.Ui.Error(fmt.Sprintf( "Error initializing Vault: %s", err)) return 1 } for i, key := range resp.Keys { c.Ui.Output(fmt.Sprintf("Key %d: %s", i+1, key)) } c.Ui.Output(fmt.Sprintf("Initial Root Token: %s", resp.RootToken)) c.Ui.Output(fmt.Sprintf( "\n"+ "Vault initialized with %d keys and a key threshold of %d!\n\n"+ "Please securely distribute the above keys. Whenever a Vault server\n"+ "is started, it must be unsealed with %d (the threshold) of the\n"+ "keys above (any of the keys, as long as the total number equals\n"+ "the threshold).\n\n"+ "Vault does not store the original master key. If you lose the keys\n"+ "above such that you no longer have the minimum number (the\n"+ "threshold), then your Vault will not be able to be unsealed.", shares, threshold, threshold, )) return 0 } func (c *InitCommand) Synopsis() string { return "Initialize a new Vault server" } func (c *InitCommand) Help() string { helpText := ` Usage: vault init [options] Initialize a new Vault server. This command connects to a Vault server and initializes it for the first time. This sets up the initial set of master keys and sets up the backend data store structure. This command can't be called on an already-initialized Vault. General Options: -address= The address of the Vault server. -ca-cert=path Path to a PEM encoded CA cert file to use to verify the Vault server SSL certificate. -ca-path=path Path to a directory of PEM encoded CA cert files to verify the Vault server SSL certificate. If both -ca-cert and -ca-path are specified, -ca-path is used. -insecure Do not verify TLS certificate. This is highly not recommended. This is especially not recommended for unsealing a vault. Init Options: -key-shares=5 The number of key shares to split the master key into. -key-threshold=3 The number of key shares required to reconstruct the master key. ` return strings.TrimSpace(helpText) }