open-vault/command/token_renew.go

145 lines
3.5 KiB
Go

// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
package command
import (
"fmt"
"strings"
"time"
"github.com/hashicorp/vault/api"
"github.com/mitchellh/cli"
"github.com/posener/complete"
)
var (
_ cli.Command = (*TokenRenewCommand)(nil)
_ cli.CommandAutocomplete = (*TokenRenewCommand)(nil)
)
type TokenRenewCommand struct {
*BaseCommand
flagAccessor bool
flagIncrement time.Duration
}
func (c *TokenRenewCommand) Synopsis() string {
return "Renew a token lease"
}
func (c *TokenRenewCommand) Help() string {
helpText := `
Usage: vault token renew [options] [TOKEN]
Renews a token's lease, extending the amount of time it can be used. If a
TOKEN is not provided, the locally authenticated token is used. A token
accessor can be used as well. Lease renewal will fail if the token is not
renewable, the token has already been revoked, or if the token has already
reached its maximum TTL.
Renew a token (this uses the /auth/token/renew endpoint and permission):
$ vault token renew 96ddf4bc-d217-f3ba-f9bd-017055595017
Renew the currently authenticated token (this uses the /auth/token/renew-self
endpoint and permission):
$ vault token renew
Renew a token requesting a specific increment value:
$ vault token renew -increment=30m 96ddf4bc-d217-f3ba-f9bd-017055595017
For a full list of examples, please see the documentation.
` + c.Flags().Help()
return strings.TrimSpace(helpText)
}
func (c *TokenRenewCommand) Flags() *FlagSets {
set := c.flagSet(FlagSetHTTP | FlagSetOutputFormat)
f := set.NewFlagSet("Command Options")
f.BoolVar(&BoolVar{
Name: "accessor",
Target: &c.flagAccessor,
Default: false,
EnvVar: "",
Completion: complete.PredictNothing,
Usage: "Treat the argument as an accessor instead of a token. When " +
"this option is selected, the output will NOT include the token.",
})
f.DurationVar(&DurationVar{
Name: "increment",
Aliases: []string{"i"},
Target: &c.flagIncrement,
Default: 0,
EnvVar: "",
Completion: complete.PredictAnything,
Usage: "Request a specific increment for renewal. This increment may " +
"not be honored, for instance in the case of periodic tokens. If not " +
"supplied, Vault will use the default TTL. This is specified as a " +
"numeric string with suffix like \"30s\" or \"5m\".",
})
return set
}
func (c *TokenRenewCommand) AutocompleteArgs() complete.Predictor {
return c.PredictVaultFiles()
}
func (c *TokenRenewCommand) AutocompleteFlags() complete.Flags {
return c.Flags().Completions()
}
func (c *TokenRenewCommand) Run(args []string) int {
f := c.Flags()
if err := f.Parse(args); err != nil {
c.UI.Error(err.Error())
return 1
}
token := ""
increment := c.flagIncrement
args = f.Args()
switch len(args) {
case 0:
// Use the local token
case 1:
token = strings.TrimSpace(args[0])
default:
c.UI.Error(fmt.Sprintf("Too many arguments (expected 1, got %d)", len(args)))
return 1
}
client, err := c.Client()
if err != nil {
c.UI.Error(err.Error())
return 2
}
var secret *api.Secret
inc := truncateToSeconds(increment)
switch {
case token == "":
secret, err = client.Auth().Token().RenewSelf(inc)
case c.flagAccessor:
secret, err = client.Auth().Token().RenewAccessor(token, inc)
default:
secret, err = client.Auth().Token().Renew(token, inc)
}
if err != nil {
c.UI.Error(fmt.Sprintf("Error renewing token: %s", err))
return 2
}
return OutputSecret(c.UI, secret)
}