package command import ( "fmt" "strings" "time" "github.com/hashicorp/vault/api" "github.com/mitchellh/cli" "github.com/posener/complete" ) var ( _ cli.Command = (*TokenRenewCommand)(nil) _ cli.CommandAutocomplete = (*TokenRenewCommand)(nil) ) type TokenRenewCommand struct { *BaseCommand flagAccessor bool flagIncrement time.Duration } func (c *TokenRenewCommand) Synopsis() string { return "Renew a token lease" } func (c *TokenRenewCommand) Help() string { helpText := ` Usage: vault token renew [options] [TOKEN] Renews a token's lease, extending the amount of time it can be used. If a TOKEN is not provided, the locally authenticated token is used. A token accessor can be used as well. Lease renewal will fail if the token is not renewable, the token has already been revoked, or if the token has already reached its maximum TTL. Renew a token (this uses the /auth/token/renew endpoint and permission): $ vault token renew 96ddf4bc-d217-f3ba-f9bd-017055595017 Renew the currently authenticated token (this uses the /auth/token/renew-self endpoint and permission): $ vault token renew Renew a token requesting a specific increment value: $ vault token renew -increment=30m 96ddf4bc-d217-f3ba-f9bd-017055595017 For a full list of examples, please see the documentation. ` + c.Flags().Help() return strings.TrimSpace(helpText) } func (c *TokenRenewCommand) Flags() *FlagSets { set := c.flagSet(FlagSetHTTP | FlagSetOutputFormat) f := set.NewFlagSet("Command Options") f.BoolVar(&BoolVar{ Name: "accessor", Target: &c.flagAccessor, Default: false, EnvVar: "", Completion: complete.PredictNothing, Usage: "Treat the argument as an accessor instead of a token. When " + "this option is selected, the output will NOT include the token.", }) f.DurationVar(&DurationVar{ Name: "increment", Aliases: []string{"i"}, Target: &c.flagIncrement, Default: 0, EnvVar: "", Completion: complete.PredictAnything, Usage: "Request a specific increment for renewal. This increment may " + "not be honored, for instance in the case of periodic tokens. If not " + "supplied, Vault will use the default TTL. This is specified as a " + "numeric string with suffix like \"30s\" or \"5m\".", }) return set } func (c *TokenRenewCommand) AutocompleteArgs() complete.Predictor { return c.PredictVaultFiles() } func (c *TokenRenewCommand) AutocompleteFlags() complete.Flags { return c.Flags().Completions() } func (c *TokenRenewCommand) Run(args []string) int { f := c.Flags() if err := f.Parse(args); err != nil { c.UI.Error(err.Error()) return 1 } token := "" increment := c.flagIncrement args = f.Args() switch len(args) { case 0: // Use the local token case 1: token = strings.TrimSpace(args[0]) default: c.UI.Error(fmt.Sprintf("Too many arguments (expected 1, got %d)", len(args))) return 1 } client, err := c.Client() if err != nil { c.UI.Error(err.Error()) return 2 } var secret *api.Secret inc := truncateToSeconds(increment) switch { case token == "": secret, err = client.Auth().Token().RenewSelf(inc) case c.flagAccessor: secret, err = client.Auth().Token().RenewAccessor(token, inc) default: secret, err = client.Auth().Token().Renew(token, inc) } if err != nil { c.UI.Error(fmt.Sprintf("Error renewing token: %s", err)) return 2 } return OutputSecret(c.UI, secret) }