open-vault/command/init.go
2015-04-28 09:15:21 -07:00

108 lines
2.9 KiB
Go

package command
import (
"fmt"
"strings"
"github.com/hashicorp/vault/api"
)
// InitCommand is a Command that initializes a new Vault server.
type InitCommand struct {
Meta
}
func (c *InitCommand) Run(args []string) int {
var shares, threshold int
flags := c.Meta.FlagSet("init", FlagSetDefault)
flags.Usage = func() { c.Ui.Error(c.Help()) }
flags.IntVar(&shares, "key-shares", 5, "")
flags.IntVar(&threshold, "key-threshold", 3, "")
if err := flags.Parse(args); err != nil {
return 1
}
client, err := c.Client()
if err != nil {
c.Ui.Error(fmt.Sprintf(
"Error initializing client: %s", err))
return 1
}
resp, err := client.Sys().Init(&api.InitRequest{
SecretShares: shares,
SecretThreshold: threshold,
})
if err != nil {
c.Ui.Error(fmt.Sprintf(
"Error initializing Vault: %s", err))
return 1
}
for i, key := range resp.Keys {
c.Ui.Output(fmt.Sprintf("Key %d: %s", i+1, key))
}
c.Ui.Output(fmt.Sprintf("Initial Root Token: %s", resp.RootToken))
c.Ui.Output(fmt.Sprintf(
"\n"+
"Vault initialized with %d keys and a key threshold of %d!\n\n"+
"Please securely distribute the above keys. Whenever a Vault server\n"+
"is started, it must be unsealed with %d (the threshold) of the\n"+
"keys above (any of the keys, as long as the total number equals\n"+
"the threshold).\n\n"+
"Vault does not store the original master key. If you lose the keys\n"+
"above such that you no longer have the minimum number (the\n"+
"threshold), then your Vault will not be able to be unsealed.",
shares,
threshold,
threshold,
))
return 0
}
func (c *InitCommand) Synopsis() string {
return "Initialize a new Vault server"
}
func (c *InitCommand) Help() string {
helpText := `
Usage: vault init [options]
Initialize a new Vault server.
This command connects to a Vault server and initializes it for the
first time. This sets up the initial set of master keys and sets up the
backend data store structure.
This command can't be called on an already-initialized Vault.
General Options:
-address=addr The address of the Vault server.
-ca-cert=path Path to a PEM encoded CA cert file to use to
verify the Vault server SSL certificate.
-ca-path=path Path to a directory of PEM encoded CA cert files
to verify the Vault server SSL certificate. If both
-ca-cert and -ca-path are specified, -ca-path is used.
-insecure Do not verify TLS certificate. This is highly
not recommended. This is especially not recommended
for unsealing a vault.
Init Options:
-key-shares=5 The number of key shares to split the master key
into.
-key-threshold=3 The number of key shares required to reconstruct
the master key.
`
return strings.TrimSpace(helpText)
}