package command import ( "fmt" "strings" ) // MountCommand is a Command that mounts a new mount. type MountCommand struct { Meta } func (c *MountCommand) Run(args []string) int { var description, path string flags := c.Meta.FlagSet("mount", FlagSetDefault) flags.StringVar(&description, "description", "", "") flags.StringVar(&path, "path", "", "") flags.Usage = func() { c.Ui.Error(c.Help()) } if err := flags.Parse(args); err != nil { return 1 } args = flags.Args() if len(args) != 1 { flags.Usage() c.Ui.Error(fmt.Sprintf( "\nMount expects one argument: the type to mount.")) return 1 } mountType := args[0] // If no path is specified, we default the path to the backend type if path == "" { path = mountType } client, err := c.Client() if err != nil { c.Ui.Error(fmt.Sprintf( "Error initializing client: %s", err)) return 2 } if err := client.Sys().Mount(path, mountType, description); err != nil { c.Ui.Error(fmt.Sprintf( "Mount error: %s", err)) return 2 } c.Ui.Output(fmt.Sprintf( "Successfully mounted '%s' at '%s'!", mountType, path)) return 0 } func (c *MountCommand) Synopsis() string { return "Mount a logical backend" } func (c *MountCommand) Help() string { helpText := ` Usage: vault mount [options] type Mount a logical backend. This command mounts a logical backend for storing and/or generating secrets. General Options: -address=TODO The address of the Vault server. -ca-cert=path Path to a PEM encoded CA cert file to use to verify the Vault server SSL certificate. -ca-path=path Path to a directory of PEM encoded CA cert files to verify the Vault server SSL certificate. If both -ca-cert and -ca-path are specified, -ca-path is used. -insecure Do not verify TLS certificate. This is highly not recommended. This is especially not recommended for unsealing a vault. Mount Options: -description= Human-friendly description of the purpose for the mount. This shows up in the mounts command. -path= Mount point for the logical backend. This defaults to the type of the mount. ` return strings.TrimSpace(helpText) }