6e92c8cbd2
Add a new "vault monitor" command Co-authored-by: ncabatoff <ncabatoff@hashicorp.com> Co-authored-by: Calvin Leung Huang <cleung2010@gmail.com> Co-authored-by: Jeff Mitchell <jeffrey.mitchell@gmail.com>
137 lines
3.4 KiB
Go
137 lines
3.4 KiB
Go
package api
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
|
|
"github.com/mitchellh/mapstructure"
|
|
)
|
|
|
|
func (c *Sys) AuditHash(path string, input string) (string, error) {
|
|
body := map[string]interface{}{
|
|
"input": input,
|
|
}
|
|
|
|
r := c.c.NewRequest("PUT", fmt.Sprintf("/v1/sys/audit-hash/%s", path))
|
|
if err := r.SetJSONBody(body); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
ctx, cancelFunc := context.WithCancel(context.Background())
|
|
defer cancelFunc()
|
|
resp, err := c.c.RawRequestWithContext(ctx, r)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
secret, err := ParseSecret(resp.Body)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
if secret == nil || secret.Data == nil {
|
|
return "", errors.New("data from server response is empty")
|
|
}
|
|
|
|
hash, ok := secret.Data["hash"]
|
|
if !ok {
|
|
return "", errors.New("hash not found in response data")
|
|
}
|
|
hashStr, ok := hash.(string)
|
|
if !ok {
|
|
return "", errors.New("could not parse hash in response data")
|
|
}
|
|
|
|
return hashStr, nil
|
|
}
|
|
|
|
func (c *Sys) ListAudit() (map[string]*Audit, error) {
|
|
r := c.c.NewRequest("GET", "/v1/sys/audit")
|
|
|
|
ctx, cancelFunc := context.WithCancel(context.Background())
|
|
defer cancelFunc()
|
|
resp, err := c.c.RawRequestWithContext(ctx, r)
|
|
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
secret, err := ParseSecret(resp.Body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if secret == nil || secret.Data == nil {
|
|
return nil, errors.New("data from server response is empty")
|
|
}
|
|
|
|
mounts := map[string]*Audit{}
|
|
err = mapstructure.Decode(secret.Data, &mounts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return mounts, nil
|
|
}
|
|
|
|
// DEPRECATED: Use EnableAuditWithOptions instead
|
|
func (c *Sys) EnableAudit(
|
|
path string, auditType string, desc string, opts map[string]string) error {
|
|
return c.EnableAuditWithOptions(path, &EnableAuditOptions{
|
|
Type: auditType,
|
|
Description: desc,
|
|
Options: opts,
|
|
})
|
|
}
|
|
|
|
func (c *Sys) EnableAuditWithOptions(path string, options *EnableAuditOptions) error {
|
|
r := c.c.NewRequest("PUT", fmt.Sprintf("/v1/sys/audit/%s", path))
|
|
if err := r.SetJSONBody(options); err != nil {
|
|
return err
|
|
}
|
|
|
|
ctx, cancelFunc := context.WithCancel(context.Background())
|
|
defer cancelFunc()
|
|
resp, err := c.c.RawRequestWithContext(ctx, r)
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Sys) DisableAudit(path string) error {
|
|
r := c.c.NewRequest("DELETE", fmt.Sprintf("/v1/sys/audit/%s", path))
|
|
|
|
ctx, cancelFunc := context.WithCancel(context.Background())
|
|
defer cancelFunc()
|
|
resp, err := c.c.RawRequestWithContext(ctx, r)
|
|
|
|
if err == nil {
|
|
defer resp.Body.Close()
|
|
}
|
|
return err
|
|
}
|
|
|
|
// Structures for the requests/response are all down here. They aren't
|
|
// individually documented because the map almost directly to the raw HTTP API
|
|
// documentation. Please refer to that documentation for more details.
|
|
|
|
type EnableAuditOptions struct {
|
|
Type string `json:"type" mapstructure:"type"`
|
|
Description string `json:"description" mapstructure:"description"`
|
|
Options map[string]string `json:"options" mapstructure:"options"`
|
|
Local bool `json:"local" mapstructure:"local"`
|
|
}
|
|
|
|
type Audit struct {
|
|
Type string `json:"type" mapstructure:"type"`
|
|
Description string `json:"description" mapstructure:"description"`
|
|
Options map[string]string `json:"options" mapstructure:"options"`
|
|
Local bool `json:"local" mapstructure:"local"`
|
|
Path string `json:"path" mapstructure:"path"`
|
|
}
|