63a2ed296b
* Full secret path in table output of get and put * Add path output to KV patch and metadata get * Add changelog * Don't print secret path for kv-v1 * Make more readable * Switch around logic to not swallow error * Add test for secret path * Fix metadata test * Add unit test for padequalsigns * Remove wonky kv get tests
187 lines
4 KiB
Go
187 lines
4 KiB
Go
package command
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/mitchellh/cli"
|
|
"github.com/posener/complete"
|
|
)
|
|
|
|
var (
|
|
_ cli.Command = (*KVGetCommand)(nil)
|
|
_ cli.CommandAutocomplete = (*KVGetCommand)(nil)
|
|
)
|
|
|
|
type KVGetCommand struct {
|
|
*BaseCommand
|
|
|
|
flagVersion int
|
|
}
|
|
|
|
func (c *KVGetCommand) Synopsis() string {
|
|
return "Retrieves data from the KV store"
|
|
}
|
|
|
|
func (c *KVGetCommand) Help() string {
|
|
helpText := `
|
|
Usage: vault kv get [options] KEY
|
|
|
|
Retrieves the value from Vault's key-value store at the given key name. If no
|
|
key exists with that name, an error is returned. If a key exists with that
|
|
name but has no data, nothing is returned.
|
|
|
|
$ vault kv get secret/foo
|
|
|
|
To view the given key name at a specific version in time, specify the "-version"
|
|
flag:
|
|
|
|
$ vault kv get -version=1 secret/foo
|
|
|
|
Additional flags and more advanced use cases are detailed below.
|
|
|
|
` + c.Flags().Help()
|
|
return strings.TrimSpace(helpText)
|
|
}
|
|
|
|
func (c *KVGetCommand) Flags() *FlagSets {
|
|
set := c.flagSet(FlagSetHTTP | FlagSetOutputField | FlagSetOutputFormat)
|
|
|
|
// Common Options
|
|
f := set.NewFlagSet("Common Options")
|
|
|
|
f.IntVar(&IntVar{
|
|
Name: "version",
|
|
Target: &c.flagVersion,
|
|
Default: 0,
|
|
Usage: `If passed, the value at the version number will be returned.`,
|
|
})
|
|
|
|
return set
|
|
}
|
|
|
|
func (c *KVGetCommand) AutocompleteArgs() complete.Predictor {
|
|
return nil
|
|
}
|
|
|
|
func (c *KVGetCommand) AutocompleteFlags() complete.Flags {
|
|
return c.Flags().Completions()
|
|
}
|
|
|
|
func (c *KVGetCommand) Run(args []string) int {
|
|
f := c.Flags()
|
|
|
|
if err := f.Parse(args); err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 1
|
|
}
|
|
|
|
args = f.Args()
|
|
switch {
|
|
case len(args) < 1:
|
|
c.UI.Error(fmt.Sprintf("Not enough arguments (expected 1, got %d)", len(args)))
|
|
return 1
|
|
case len(args) > 1:
|
|
c.UI.Error(fmt.Sprintf("Too many arguments (expected 1, got %d)", len(args)))
|
|
return 1
|
|
}
|
|
|
|
client, err := c.Client()
|
|
if err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 2
|
|
}
|
|
|
|
path := sanitizePath(args[0])
|
|
mountPath, v2, err := isKVv2(path, client)
|
|
if err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 2
|
|
}
|
|
|
|
var versionParam map[string]string
|
|
|
|
if v2 {
|
|
path = addPrefixToKVPath(path, mountPath, "data")
|
|
|
|
if c.flagVersion > 0 {
|
|
versionParam = map[string]string{
|
|
"version": fmt.Sprintf("%d", c.flagVersion),
|
|
}
|
|
}
|
|
}
|
|
|
|
secret, err := kvReadRequest(client, path, versionParam)
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Error reading %s: %s", path, err))
|
|
if secret != nil {
|
|
OutputSecret(c.UI, secret)
|
|
}
|
|
return 2
|
|
}
|
|
if secret == nil {
|
|
c.UI.Error(fmt.Sprintf("No value found at %s", path))
|
|
return 2
|
|
}
|
|
|
|
if c.flagField != "" {
|
|
if v2 {
|
|
// This is a v2, pass in the data field
|
|
if data, ok := secret.Data["data"]; ok && data != nil {
|
|
// If they requested a literal "data" see if they meant actual
|
|
// value or the data block itself
|
|
if c.flagField == "data" {
|
|
if dataMap, ok := data.(map[string]interface{}); ok {
|
|
if _, ok := dataMap["data"]; ok {
|
|
return PrintRawField(c.UI, dataMap, c.flagField)
|
|
}
|
|
}
|
|
return PrintRawField(c.UI, secret, c.flagField)
|
|
}
|
|
return PrintRawField(c.UI, data, c.flagField)
|
|
} else {
|
|
c.UI.Error(fmt.Sprintf("No data found at %s", path))
|
|
return 2
|
|
}
|
|
} else {
|
|
return PrintRawField(c.UI, secret, c.flagField)
|
|
}
|
|
}
|
|
|
|
// If we have wrap info print the secret normally.
|
|
if secret.WrapInfo != nil || c.flagFormat != "table" {
|
|
return OutputSecret(c.UI, secret)
|
|
}
|
|
|
|
if len(secret.Warnings) > 0 {
|
|
tf := TableFormatter{}
|
|
tf.printWarnings(c.UI, secret)
|
|
}
|
|
|
|
if v2 {
|
|
outputPath(c.UI, path, "Secret Path")
|
|
}
|
|
|
|
if metadata, ok := secret.Data["metadata"]; ok && metadata != nil {
|
|
c.UI.Info(getHeaderForMap("Metadata", metadata.(map[string]interface{})))
|
|
OutputData(c.UI, metadata)
|
|
c.UI.Info("")
|
|
}
|
|
|
|
data := secret.Data
|
|
if v2 && data != nil {
|
|
data = nil
|
|
dataRaw := secret.Data["data"]
|
|
if dataRaw != nil {
|
|
data = dataRaw.(map[string]interface{})
|
|
}
|
|
}
|
|
|
|
if data != nil {
|
|
c.UI.Info(getHeaderForMap("Data", data))
|
|
OutputData(c.UI, data)
|
|
}
|
|
|
|
return 0
|
|
}
|