bb54e9c131
* Add backend plugin changes * Fix totp backend plugin tests * Fix logical/plugin InvalidateKey test * Fix plugin catalog CRUD test, fix NoopBackend * Clean up commented code block * Fix system backend mount test * Set plugin_name to omitempty, fix handleMountTable config parsing * Clean up comments, keep shim connections alive until cleanup * Include pluginClient, disallow LookupPlugin call from within a plugin * Add wrapper around backendPluginClient for proper cleanup * Add logger shim tests * Add logger, storage, and system shim tests * Use pointer receivers for system view shim * Use plugin name if no path is provided on mount * Enable plugins for auth backends * Add backend type attribute, move builtin/plugin/package * Fix merge conflict * Fix missing plugin name in mount config * Add integration tests on enabling auth backend plugins * Remove dependency cycle on mock-plugin * Add passthrough backend plugin, use logical.BackendType to determine lease generation * Remove vault package dependency on passthrough package * Add basic impl test for passthrough plugin * Incorporate feedback; set b.backend after shims creation on backendPluginServer * Fix totp plugin test * Add plugin backends docs * Fix tests * Fix builtin/plugin tests * Remove flatten from PluginRunner fields * Move mock plugin to logical/plugin, remove totp and passthrough plugins * Move pluginMap into newPluginClient * Do not create storage RPC connection on HandleRequest and HandleExistenceCheck * Change shim logger's Fatal to no-op * Change BackendType to uint32, match UX backend types * Change framework.Backend Setup signature * Add Setup func to logical.Backend interface * Move OptionallyEnableMlock call into plugin.Serve, update docs and comments * Remove commented var in plugin package * RegisterLicense on logical.Backend interface (#3017) * Add RegisterLicense to logical.Backend interface * Update RegisterLicense to use callback func on framework.Backend * Refactor framework.Backend.RegisterLicense * plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs * plugin: Revert BackendType to remove TypePassthrough and related references * Fix typo in plugin backends docs
101 lines
2.4 KiB
Go
101 lines
2.4 KiB
Go
package command
|
|
|
|
import (
|
|
"fmt"
|
|
"sort"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/hashicorp/vault/meta"
|
|
"github.com/ryanuber/columnize"
|
|
)
|
|
|
|
// MountsCommand is a Command that lists the mounts.
|
|
type MountsCommand struct {
|
|
meta.Meta
|
|
}
|
|
|
|
func (c *MountsCommand) Run(args []string) int {
|
|
flags := c.Meta.FlagSet("mounts", meta.FlagSetDefault)
|
|
flags.Usage = func() { c.Ui.Error(c.Help()) }
|
|
if err := flags.Parse(args); err != nil {
|
|
return 1
|
|
}
|
|
|
|
client, err := c.Client()
|
|
if err != nil {
|
|
c.Ui.Error(fmt.Sprintf(
|
|
"Error initializing client: %s", err))
|
|
return 2
|
|
}
|
|
|
|
mounts, err := client.Sys().ListMounts()
|
|
if err != nil {
|
|
c.Ui.Error(fmt.Sprintf(
|
|
"Error reading mounts: %s", err))
|
|
return 2
|
|
}
|
|
|
|
paths := make([]string, 0, len(mounts))
|
|
for path := range mounts {
|
|
paths = append(paths, path)
|
|
}
|
|
sort.Strings(paths)
|
|
|
|
columns := []string{"Path | Type | Accessor | Plugin | Default TTL | Max TTL | Force No Cache | Replication Behavior | Description"}
|
|
for _, path := range paths {
|
|
mount := mounts[path]
|
|
pluginName := "n/a"
|
|
if mount.Config.PluginName != "" {
|
|
pluginName = mount.Config.PluginName
|
|
}
|
|
defTTL := "system"
|
|
switch {
|
|
case mount.Type == "system":
|
|
defTTL = "n/a"
|
|
case mount.Type == "cubbyhole":
|
|
defTTL = "n/a"
|
|
case mount.Config.DefaultLeaseTTL != 0:
|
|
defTTL = strconv.Itoa(mount.Config.DefaultLeaseTTL)
|
|
}
|
|
maxTTL := "system"
|
|
switch {
|
|
case mount.Type == "system":
|
|
maxTTL = "n/a"
|
|
case mount.Type == "cubbyhole":
|
|
maxTTL = "n/a"
|
|
case mount.Config.MaxLeaseTTL != 0:
|
|
maxTTL = strconv.Itoa(mount.Config.MaxLeaseTTL)
|
|
}
|
|
replicatedBehavior := "replicated"
|
|
if mount.Local {
|
|
replicatedBehavior = "local"
|
|
}
|
|
columns = append(columns, fmt.Sprintf(
|
|
"%s | %s | %s | %s | %s | %s | %v | %s | %s", path, mount.Type, mount.Accessor, pluginName, defTTL, maxTTL,
|
|
mount.Config.ForceNoCache, replicatedBehavior, mount.Description))
|
|
}
|
|
|
|
c.Ui.Output(columnize.SimpleFormat(columns))
|
|
return 0
|
|
}
|
|
|
|
func (c *MountsCommand) Synopsis() string {
|
|
return "Lists mounted backends in Vault"
|
|
}
|
|
|
|
func (c *MountsCommand) Help() string {
|
|
helpText := `
|
|
Usage: vault mounts [options]
|
|
|
|
Outputs information about the mounted backends.
|
|
|
|
This command lists the mounted backends, their mount points, the
|
|
configured TTLs, and a human-friendly description of the mount point.
|
|
A TTL of 'system' indicates that the system default is being used.
|
|
|
|
General Options:
|
|
` + meta.GeneralOptionsUsage()
|
|
return strings.TrimSpace(helpText)
|
|
}
|