mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-03 20:17:59 +00:00 
			
		
		
		
	@mitchellh suggested we fork `cli` and switch to that. Since we primarily use the interfaces in `cli`, and the new fork has not changed those, this is (mostly) a drop-in replacement. A small fix will be necessary for Vault Enterprise, I believe.
		
			
				
	
	
		
			132 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			132 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright (c) HashiCorp, Inc.
 | 
						|
// SPDX-License-Identifier: BUSL-1.1
 | 
						|
 | 
						|
package command
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"strings"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/hashicorp/cli"
 | 
						|
	"github.com/posener/complete"
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	_ cli.Command             = (*SecretsMoveCommand)(nil)
 | 
						|
	_ cli.CommandAutocomplete = (*SecretsMoveCommand)(nil)
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	MountMigrationStatusSuccess = "success"
 | 
						|
	MountMigrationStatusFailure = "failure"
 | 
						|
)
 | 
						|
 | 
						|
type SecretsMoveCommand struct {
 | 
						|
	*BaseCommand
 | 
						|
}
 | 
						|
 | 
						|
func (c *SecretsMoveCommand) Synopsis() string {
 | 
						|
	return "Move a secrets engine to a new path"
 | 
						|
}
 | 
						|
 | 
						|
func (c *SecretsMoveCommand) Help() string {
 | 
						|
	helpText := `
 | 
						|
Usage: vault secrets move [options] SOURCE DESTINATION
 | 
						|
 | 
						|
  Moves an existing secrets engine to a new path. Any leases from the old
 | 
						|
  secrets engine are revoked, but all configuration associated with the engine
 | 
						|
  is preserved. It initiates the migration and intermittently polls its status,
 | 
						|
  exiting if a final state is reached.
 | 
						|
 | 
						|
  This command works within or across namespaces, both source and destination paths
 | 
						|
  can be prefixed with a namespace heirarchy relative to the current namespace.
 | 
						|
 | 
						|
  WARNING! Moving a secrets engine will revoke any leases from the
 | 
						|
  old engine.
 | 
						|
 | 
						|
  Move the secrets engine at secret/ to generic/:
 | 
						|
 | 
						|
      $ vault secrets move secret/ generic/
 | 
						|
 | 
						|
  Move the secrets engine at ns1/secret/ across namespaces to ns2/generic/, 
 | 
						|
  where ns1 and ns2 are child namespaces of the current namespace:
 | 
						|
 | 
						|
      $ vault secrets move ns1/secret/ ns2/generic/
 | 
						|
 | 
						|
` + c.Flags().Help()
 | 
						|
 | 
						|
	return strings.TrimSpace(helpText)
 | 
						|
}
 | 
						|
 | 
						|
func (c *SecretsMoveCommand) Flags() *FlagSets {
 | 
						|
	return c.flagSet(FlagSetHTTP)
 | 
						|
}
 | 
						|
 | 
						|
func (c *SecretsMoveCommand) AutocompleteArgs() complete.Predictor {
 | 
						|
	return c.PredictVaultMounts()
 | 
						|
}
 | 
						|
 | 
						|
func (c *SecretsMoveCommand) AutocompleteFlags() complete.Flags {
 | 
						|
	return c.Flags().Completions()
 | 
						|
}
 | 
						|
 | 
						|
func (c *SecretsMoveCommand) Run(args []string) int {
 | 
						|
	f := c.Flags()
 | 
						|
 | 
						|
	if err := f.Parse(args); err != nil {
 | 
						|
		c.UI.Error(err.Error())
 | 
						|
		return 1
 | 
						|
	}
 | 
						|
 | 
						|
	args = f.Args()
 | 
						|
	switch {
 | 
						|
	case len(args) < 2:
 | 
						|
		c.UI.Error(fmt.Sprintf("Not enough arguments (expected 2, got %d)", len(args)))
 | 
						|
		return 1
 | 
						|
	case len(args) > 2:
 | 
						|
		c.UI.Error(fmt.Sprintf("Too many arguments (expected 2, got %d)", len(args)))
 | 
						|
		return 1
 | 
						|
	}
 | 
						|
 | 
						|
	// Grab the source and destination
 | 
						|
	source := ensureTrailingSlash(args[0])
 | 
						|
	destination := ensureTrailingSlash(args[1])
 | 
						|
 | 
						|
	client, err := c.Client()
 | 
						|
	if err != nil {
 | 
						|
		c.UI.Error(err.Error())
 | 
						|
		return 2
 | 
						|
	}
 | 
						|
 | 
						|
	remountResp, err := client.Sys().StartRemount(source, destination)
 | 
						|
	if err != nil {
 | 
						|
		c.UI.Error(fmt.Sprintf("Error moving secrets engine %s to %s: %s", source, destination, err))
 | 
						|
		return 2
 | 
						|
	}
 | 
						|
 | 
						|
	c.UI.Output(fmt.Sprintf("Started moving secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
 | 
						|
 | 
						|
	// Poll the status endpoint with the returned migration ID
 | 
						|
	// Exit if a terminal status is reached, else wait and retry
 | 
						|
	for {
 | 
						|
		remountStatusResp, err := client.Sys().RemountStatus(remountResp.MigrationID)
 | 
						|
		if err != nil {
 | 
						|
			c.UI.Error(fmt.Sprintf("Error checking migration status of secrets engine %s to %s: %s", source, destination, err))
 | 
						|
			return 2
 | 
						|
		}
 | 
						|
		if remountStatusResp.MigrationInfo.MigrationStatus == MountMigrationStatusSuccess {
 | 
						|
			c.UI.Output(fmt.Sprintf("Success! Finished moving secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
 | 
						|
			return 0
 | 
						|
		}
 | 
						|
		if remountStatusResp.MigrationInfo.MigrationStatus == MountMigrationStatusFailure {
 | 
						|
			c.UI.Error(fmt.Sprintf("Failure! Error encountered moving secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
 | 
						|
			return 0
 | 
						|
		}
 | 
						|
		c.UI.Output(fmt.Sprintf("Waiting for terminal status in migration of secrets engine %s to %s, with migration ID %s", source, destination, remountResp.MigrationID))
 | 
						|
		time.Sleep(10 * time.Second)
 | 
						|
	}
 | 
						|
 | 
						|
	return 0
 | 
						|
}
 |