137 lines
3.3 KiB
Go
137 lines
3.3 KiB
Go
package command
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/hashicorp/vault/api"
|
|
"github.com/mitchellh/cli"
|
|
"github.com/posener/complete"
|
|
)
|
|
|
|
var _ cli.Command = (*TokenRenewCommand)(nil)
|
|
var _ cli.CommandAutocomplete = (*TokenRenewCommand)(nil)
|
|
|
|
type TokenRenewCommand struct {
|
|
*BaseCommand
|
|
|
|
flagIncrement time.Duration
|
|
}
|
|
|
|
func (c *TokenRenewCommand) Synopsis() string {
|
|
return "Renew a token lease"
|
|
}
|
|
|
|
func (c *TokenRenewCommand) Help() string {
|
|
helpText := `
|
|
Usage: vault token renew [options] [TOKEN]
|
|
|
|
Renews a token's lease, extending the amount of time it can be used. If a
|
|
TOKEN is not provided, the locally authenticated token is used. Lease renewal
|
|
will fail if the token is not renewable, the token has already been revoked,
|
|
or if the token has already reached its maximum TTL.
|
|
|
|
Renew a token (this uses the /auth/token/renew endpoint and permission):
|
|
|
|
$ vault token renew 96ddf4bc-d217-f3ba-f9bd-017055595017
|
|
|
|
Renew the currently authenticated token (this uses the /auth/token/renew-self
|
|
endpoint and permission):
|
|
|
|
$ vault token renew
|
|
|
|
Renew a token requesting a specific increment value:
|
|
|
|
$ vault token renew -increment=30m 96ddf4bc-d217-f3ba-f9bd-017055595017
|
|
|
|
For a full list of examples, please see the documentation.
|
|
|
|
` + c.Flags().Help()
|
|
|
|
return strings.TrimSpace(helpText)
|
|
}
|
|
|
|
func (c *TokenRenewCommand) Flags() *FlagSets {
|
|
set := c.flagSet(FlagSetHTTP | FlagSetOutputFormat)
|
|
f := set.NewFlagSet("Command Options")
|
|
|
|
f.DurationVar(&DurationVar{
|
|
Name: "increment",
|
|
Aliases: []string{"i"},
|
|
Target: &c.flagIncrement,
|
|
Default: 0,
|
|
EnvVar: "",
|
|
Completion: complete.PredictAnything,
|
|
Usage: "Request a specific increment for renewal. Vault is not required " +
|
|
"to honor this request. If not supplied, Vault will use the default " +
|
|
"TTL. This is specified as a numeric string with suffix like \"30s\" " +
|
|
"or \"5m\".",
|
|
})
|
|
|
|
return set
|
|
}
|
|
|
|
func (c *TokenRenewCommand) AutocompleteArgs() complete.Predictor {
|
|
return c.PredictVaultFiles()
|
|
}
|
|
|
|
func (c *TokenRenewCommand) AutocompleteFlags() complete.Flags {
|
|
return c.Flags().Completions()
|
|
}
|
|
|
|
func (c *TokenRenewCommand) Run(args []string) int {
|
|
f := c.Flags()
|
|
|
|
if err := f.Parse(args); err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 1
|
|
}
|
|
|
|
token := ""
|
|
increment := c.flagIncrement
|
|
|
|
args = f.Args()
|
|
switch len(args) {
|
|
case 0:
|
|
// Use the local token
|
|
case 1:
|
|
token = strings.TrimSpace(args[0])
|
|
case 2:
|
|
// TODO: remove in 0.9.0 - backwards compat
|
|
c.UI.Warn("Specifying increment as a second argument is deprecated. " +
|
|
"Please use -increment instead.")
|
|
|
|
token = strings.TrimSpace(args[0])
|
|
parsed, err := time.ParseDuration(appendDurationSuffix(args[1]))
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Invalid increment: %s", err))
|
|
return 1
|
|
}
|
|
increment = parsed
|
|
default:
|
|
c.UI.Error(fmt.Sprintf("Too many arguments (expected 1, got %d)", len(args)))
|
|
return 1
|
|
}
|
|
|
|
client, err := c.Client()
|
|
if err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 2
|
|
}
|
|
|
|
var secret *api.Secret
|
|
inc := truncateToSeconds(increment)
|
|
if token == "" {
|
|
secret, err = client.Auth().Token().RenewSelf(inc)
|
|
} else {
|
|
secret, err = client.Auth().Token().Renew(token, inc)
|
|
}
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Error renewing token: %s", err))
|
|
return 2
|
|
}
|
|
|
|
return OutputSecret(c.UI, secret)
|
|
}
|