mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-01 19:17:58 +00:00
remount cli changes (#14159)
This commit is contained in:
committed by
GitHub
parent
2d810287cb
commit
03b3041265
123
command/auth_move.go
Normal file
123
command/auth_move.go
Normal file
@@ -0,0 +1,123 @@
|
|||||||
|
package command
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/mitchellh/cli"
|
||||||
|
"github.com/posener/complete"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
_ cli.Command = (*AuthMoveCommand)(nil)
|
||||||
|
_ cli.CommandAutocomplete = (*AuthMoveCommand)(nil)
|
||||||
|
)
|
||||||
|
|
||||||
|
type AuthMoveCommand struct {
|
||||||
|
*BaseCommand
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *AuthMoveCommand) Synopsis() string {
|
||||||
|
return "Move an auth method to a new path"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *AuthMoveCommand) Help() string {
|
||||||
|
helpText := `
|
||||||
|
Usage: vault auth move [options] SOURCE DESTINATION
|
||||||
|
|
||||||
|
Moves an existing auth method to a new path. Any leases from the old
|
||||||
|
auth method are revoked, but all configuration associated with the method
|
||||||
|
is preserved. It initiates the migration and intermittently polls its status,
|
||||||
|
exiting if a final state is reached.
|
||||||
|
|
||||||
|
This command works within or across namespaces, both source and destination paths
|
||||||
|
can be prefixed with a namespace heirarchy relative to the current namespace.
|
||||||
|
|
||||||
|
WARNING! Moving an auth method will revoke any leases from the
|
||||||
|
old method.
|
||||||
|
|
||||||
|
Move the auth method at approle/ to generic/:
|
||||||
|
|
||||||
|
$ vault auth move approle/ generic/
|
||||||
|
|
||||||
|
Move the auth method at ns1/approle/ across namespaces to ns2/generic/,
|
||||||
|
where ns1 and ns2 are child namespaces of the current namespace:
|
||||||
|
|
||||||
|
$ vault auth move ns1/approle/ ns2/generic/
|
||||||
|
|
||||||
|
` + c.Flags().Help()
|
||||||
|
|
||||||
|
return strings.TrimSpace(helpText)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *AuthMoveCommand) Flags() *FlagSets {
|
||||||
|
return c.flagSet(FlagSetHTTP)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *AuthMoveCommand) AutocompleteArgs() complete.Predictor {
|
||||||
|
return c.PredictVaultMounts()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *AuthMoveCommand) AutocompleteFlags() complete.Flags {
|
||||||
|
return c.Flags().Completions()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *AuthMoveCommand) Run(args []string) int {
|
||||||
|
f := c.Flags()
|
||||||
|
|
||||||
|
if err := f.Parse(args); err != nil {
|
||||||
|
c.UI.Error(err.Error())
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
|
||||||
|
args = f.Args()
|
||||||
|
switch {
|
||||||
|
case len(args) < 2:
|
||||||
|
c.UI.Error(fmt.Sprintf("Not enough arguments (expected 2, got %d)", len(args)))
|
||||||
|
return 1
|
||||||
|
case len(args) > 2:
|
||||||
|
c.UI.Error(fmt.Sprintf("Too many arguments (expected 2, got %d)", len(args)))
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
|
||||||
|
// Grab the source and destination
|
||||||
|
source := ensureTrailingSlash(args[0])
|
||||||
|
destination := ensureTrailingSlash(args[1])
|
||||||
|
|
||||||
|
client, err := c.Client()
|
||||||
|
if err != nil {
|
||||||
|
c.UI.Error(err.Error())
|
||||||
|
return 2
|
||||||
|
}
|
||||||
|
|
||||||
|
remountResp, err := client.Sys().StartRemount(source, destination)
|
||||||
|
if err != nil {
|
||||||
|
c.UI.Error(fmt.Sprintf("Error moving auth method %s to %s: %s", source, destination, err))
|
||||||
|
return 2
|
||||||
|
}
|
||||||
|
|
||||||
|
c.UI.Output(fmt.Sprintf("Started moving auth method %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
|
||||||
|
|
||||||
|
// Poll the status endpoint with the returned migration ID
|
||||||
|
// Exit if a terminal status is reached, else wait and retry
|
||||||
|
for {
|
||||||
|
remountStatusResp, err := client.Sys().RemountStatus(remountResp.MigrationID)
|
||||||
|
if err != nil {
|
||||||
|
c.UI.Error(fmt.Sprintf("Error checking migration status of auth method %s to %s: %s", source, destination, err))
|
||||||
|
return 2
|
||||||
|
}
|
||||||
|
if remountStatusResp.MigrationInfo.MigrationStatus == MountMigrationStatusSuccess {
|
||||||
|
c.UI.Output(fmt.Sprintf("Success! Finished moving auth method %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
if remountStatusResp.MigrationInfo.MigrationStatus == MountMigrationStatusFailure {
|
||||||
|
c.UI.Error(fmt.Sprintf("Failure! Error encountered moving auth method %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
c.UI.Output(fmt.Sprintf("Waiting for terminal status in migration of auth method %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
|
||||||
|
time.Sleep(10 * time.Second)
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0
|
||||||
|
}
|
||||||
146
command/auth_move_test.go
Normal file
146
command/auth_move_test.go
Normal file
@@ -0,0 +1,146 @@
|
|||||||
|
package command
|
||||||
|
|
||||||
|
import (
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/hashicorp/vault/api"
|
||||||
|
"github.com/mitchellh/cli"
|
||||||
|
)
|
||||||
|
|
||||||
|
func testAuthMoveCommand(tb testing.TB) (*cli.MockUi, *AuthMoveCommand) {
|
||||||
|
tb.Helper()
|
||||||
|
|
||||||
|
ui := cli.NewMockUi()
|
||||||
|
return ui, &AuthMoveCommand{
|
||||||
|
BaseCommand: &BaseCommand{
|
||||||
|
UI: ui,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAuthMoveCommand_Run(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
cases := []struct {
|
||||||
|
name string
|
||||||
|
args []string
|
||||||
|
out string
|
||||||
|
code int
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
"not_enough_args",
|
||||||
|
[]string{},
|
||||||
|
"Not enough arguments",
|
||||||
|
1,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"too_many_args",
|
||||||
|
[]string{"foo", "bar", "baz"},
|
||||||
|
"Too many arguments",
|
||||||
|
1,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"non_existent",
|
||||||
|
[]string{"not_real", "over_here"},
|
||||||
|
"Error moving auth method not_real/ to over_here/",
|
||||||
|
2,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
t.Run("validations", func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
for _, tc := range cases {
|
||||||
|
tc := tc
|
||||||
|
|
||||||
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
client, closer := testVaultServer(t)
|
||||||
|
defer closer()
|
||||||
|
|
||||||
|
ui, cmd := testAuthMoveCommand(t)
|
||||||
|
cmd.client = client
|
||||||
|
|
||||||
|
code := cmd.Run(tc.args)
|
||||||
|
if code != tc.code {
|
||||||
|
t.Errorf("expected %d to be %d", code, tc.code)
|
||||||
|
}
|
||||||
|
|
||||||
|
combined := ui.OutputWriter.String() + ui.ErrorWriter.String()
|
||||||
|
if !strings.Contains(combined, tc.out) {
|
||||||
|
t.Errorf("expected %q to contain %q", combined, tc.out)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("integration", func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
client, closer := testVaultServer(t)
|
||||||
|
defer closer()
|
||||||
|
|
||||||
|
ui, cmd := testAuthMoveCommand(t)
|
||||||
|
cmd.client = client
|
||||||
|
|
||||||
|
if err := client.Sys().EnableAuthWithOptions("my-auth", &api.EnableAuthOptions{
|
||||||
|
Type: "userpass",
|
||||||
|
}); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
code := cmd.Run([]string{
|
||||||
|
"auth/my-auth/", "auth/my-auth-2/",
|
||||||
|
})
|
||||||
|
if exp := 0; code != exp {
|
||||||
|
t.Errorf("expected %d to be %d", code, exp)
|
||||||
|
}
|
||||||
|
|
||||||
|
expected := "Success! Finished moving auth method auth/my-auth/ to auth/my-auth-2/"
|
||||||
|
combined := ui.OutputWriter.String() + ui.ErrorWriter.String()
|
||||||
|
if !strings.Contains(combined, expected) {
|
||||||
|
t.Errorf("expected %q to contain %q", combined, expected)
|
||||||
|
}
|
||||||
|
|
||||||
|
mounts, err := client.Sys().ListAuth()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, ok := mounts["my-auth-2/"]; !ok {
|
||||||
|
t.Errorf("expected mount at my-auth-2/: %#v", mounts)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("communication_failure", func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
client, closer := testVaultServerBad(t)
|
||||||
|
defer closer()
|
||||||
|
|
||||||
|
ui, cmd := testAuthMoveCommand(t)
|
||||||
|
cmd.client = client
|
||||||
|
|
||||||
|
code := cmd.Run([]string{
|
||||||
|
"auth/my-auth/", "auth/my-auth-2/",
|
||||||
|
})
|
||||||
|
if exp := 2; code != exp {
|
||||||
|
t.Errorf("expected %d to be %d", code, exp)
|
||||||
|
}
|
||||||
|
|
||||||
|
expected := "Error moving auth method auth/my-auth/ to auth/my-auth-2/:"
|
||||||
|
combined := ui.OutputWriter.String() + ui.ErrorWriter.String()
|
||||||
|
if !strings.Contains(combined, expected) {
|
||||||
|
t.Errorf("expected %q to contain %q", combined, expected)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("no_tabs", func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
_, cmd := testAuthMoveCommand(t)
|
||||||
|
assertNoTabs(t, cmd)
|
||||||
|
})
|
||||||
|
}
|
||||||
@@ -278,6 +278,11 @@ func initCommands(ui, serverCmdUi cli.Ui, runOpts *RunOptions) {
|
|||||||
BaseCommand: getBaseCommand(),
|
BaseCommand: getBaseCommand(),
|
||||||
}, nil
|
}, nil
|
||||||
},
|
},
|
||||||
|
"auth move": func() (cli.Command, error) {
|
||||||
|
return &AuthMoveCommand{
|
||||||
|
BaseCommand: getBaseCommand(),
|
||||||
|
}, nil
|
||||||
|
},
|
||||||
"debug": func() (cli.Command, error) {
|
"debug": func() (cli.Command, error) {
|
||||||
return &DebugCommand{
|
return &DebugCommand{
|
||||||
BaseCommand: getBaseCommand(),
|
BaseCommand: getBaseCommand(),
|
||||||
|
|||||||
@@ -3,6 +3,7 @@ package command
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"strings"
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/mitchellh/cli"
|
"github.com/mitchellh/cli"
|
||||||
"github.com/posener/complete"
|
"github.com/posener/complete"
|
||||||
@@ -13,6 +14,11 @@ var (
|
|||||||
_ cli.CommandAutocomplete = (*SecretsMoveCommand)(nil)
|
_ cli.CommandAutocomplete = (*SecretsMoveCommand)(nil)
|
||||||
)
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
MountMigrationStatusSuccess = "success"
|
||||||
|
MountMigrationStatusFailure = "failure"
|
||||||
|
)
|
||||||
|
|
||||||
type SecretsMoveCommand struct {
|
type SecretsMoveCommand struct {
|
||||||
*BaseCommand
|
*BaseCommand
|
||||||
}
|
}
|
||||||
@@ -27,19 +33,20 @@ Usage: vault secrets move [options] SOURCE DESTINATION
|
|||||||
|
|
||||||
Moves an existing secrets engine to a new path. Any leases from the old
|
Moves an existing secrets engine to a new path. Any leases from the old
|
||||||
secrets engine are revoked, but all configuration associated with the engine
|
secrets engine are revoked, but all configuration associated with the engine
|
||||||
is preserved.
|
is preserved. It initiates the migration and intermittently polls its status,
|
||||||
|
exiting if a final state is reached.
|
||||||
|
|
||||||
This command works within or across namespaces, both source and destination paths
|
This command works within or across namespaces, both source and destination paths
|
||||||
can be prefixed with a namespace heirarchy relative to the current namespace.
|
can be prefixed with a namespace heirarchy relative to the current namespace.
|
||||||
|
|
||||||
WARNING! Moving an existing secrets engine will revoke any leases from the
|
WARNING! Moving a secrets engine will revoke any leases from the
|
||||||
old engine.
|
old engine.
|
||||||
|
|
||||||
Move the existing secrets engine at secret/ to generic/:
|
Move the secrets engine at secret/ to generic/:
|
||||||
|
|
||||||
$ vault secrets move secret/ generic/
|
$ vault secrets move secret/ generic/
|
||||||
|
|
||||||
Move the existing secrets engine at ns1/secret/ across namespaces to ns2/generic/,
|
Move the secrets engine at ns1/secret/ across namespaces to ns2/generic/,
|
||||||
where ns1 and ns2 are child namespaces of the current namespace:
|
where ns1 and ns2 are child namespaces of the current namespace:
|
||||||
|
|
||||||
$ vault secrets move ns1/secret/ ns2/generic/
|
$ vault secrets move ns1/secret/ ns2/generic/
|
||||||
@@ -95,6 +102,27 @@ func (c *SecretsMoveCommand) Run(args []string) int {
|
|||||||
return 2
|
return 2
|
||||||
}
|
}
|
||||||
|
|
||||||
c.UI.Output(fmt.Sprintf("Success! Started moving secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
|
c.UI.Output(fmt.Sprintf("Started moving secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
|
||||||
|
|
||||||
|
// Poll the status endpoint with the returned migration ID
|
||||||
|
// Exit if a terminal status is reached, else wait and retry
|
||||||
|
for {
|
||||||
|
remountStatusResp, err := client.Sys().RemountStatus(remountResp.MigrationID)
|
||||||
|
if err != nil {
|
||||||
|
c.UI.Error(fmt.Sprintf("Error checking migration status of secrets engine %s to %s: %s", source, destination, err))
|
||||||
|
return 2
|
||||||
|
}
|
||||||
|
if remountStatusResp.MigrationInfo.MigrationStatus == MountMigrationStatusSuccess {
|
||||||
|
c.UI.Output(fmt.Sprintf("Success! Finished moving secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
if remountStatusResp.MigrationInfo.MigrationStatus == MountMigrationStatusFailure {
|
||||||
|
c.UI.Error(fmt.Sprintf("Failure! Error encountered moving secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
c.UI.Output(fmt.Sprintf("Waiting for terminal status in migration of secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
|
||||||
|
time.Sleep(10 * time.Second)
|
||||||
|
}
|
||||||
|
|
||||||
return 0
|
return 0
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,7 +3,6 @@ package command
|
|||||||
import (
|
import (
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
|
||||||
|
|
||||||
"github.com/mitchellh/cli"
|
"github.com/mitchellh/cli"
|
||||||
)
|
)
|
||||||
@@ -92,16 +91,12 @@ func TestSecretsMoveCommand_Run(t *testing.T) {
|
|||||||
t.Errorf("expected %d to be %d", code, exp)
|
t.Errorf("expected %d to be %d", code, exp)
|
||||||
}
|
}
|
||||||
|
|
||||||
expected := "Success! Started moving secrets engine secret/ to generic/"
|
expected := "Success! Finished moving secrets engine secret/ to generic/"
|
||||||
combined := ui.OutputWriter.String() + ui.ErrorWriter.String()
|
combined := ui.OutputWriter.String() + ui.ErrorWriter.String()
|
||||||
if !strings.Contains(combined, expected) {
|
if !strings.Contains(combined, expected) {
|
||||||
t.Errorf("expected %q to contain %q", combined, expected)
|
t.Errorf("expected %q to contain %q", combined, expected)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Wait for the move command to complete. Ideally we'd check remount status
|
|
||||||
// explicitly but we don't have migration id here
|
|
||||||
time.Sleep(1 * time.Second)
|
|
||||||
|
|
||||||
mounts, err := client.Sys().ListMounts()
|
mounts, err := client.Sys().ListMounts()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
|
|||||||
Reference in New Issue
Block a user