mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 02:28:09 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			121 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			121 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package command
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"os"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/hashicorp/vault/helper/kv-builder"
 | |
| )
 | |
| 
 | |
| // WriteCommand is a Command that puts data into the Vault.
 | |
| type WriteCommand struct {
 | |
| 	Meta
 | |
| 
 | |
| 	// The fields below can be overwritten for tests
 | |
| 	testStdin io.Reader
 | |
| }
 | |
| 
 | |
| func (c *WriteCommand) Run(args []string) int {
 | |
| 	var format string
 | |
| 	var force bool
 | |
| 	flags := c.Meta.FlagSet("write", FlagSetDefault)
 | |
| 	flags.StringVar(&format, "format", "table", "")
 | |
| 	flags.BoolVar(&force, "force", false, "")
 | |
| 	flags.BoolVar(&force, "f", false, "")
 | |
| 	flags.Usage = func() { c.Ui.Error(c.Help()) }
 | |
| 	if err := flags.Parse(args); err != nil {
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	args = flags.Args()
 | |
| 	if len(args) < 2 && !force {
 | |
| 		c.Ui.Error("write expects at least two arguments")
 | |
| 		flags.Usage()
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	path := args[0]
 | |
| 	if path[0] == '/' {
 | |
| 		path = path[1:]
 | |
| 	}
 | |
| 
 | |
| 	data, err := c.parseData(args[1:])
 | |
| 	if err != nil {
 | |
| 		c.Ui.Error(fmt.Sprintf(
 | |
| 			"Error loading data: %s", err))
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	client, err := c.Client()
 | |
| 	if err != nil {
 | |
| 		c.Ui.Error(fmt.Sprintf(
 | |
| 			"Error initializing client: %s", err))
 | |
| 		return 2
 | |
| 	}
 | |
| 
 | |
| 	secret, err := client.Logical().Write(path, data)
 | |
| 	if err != nil {
 | |
| 		c.Ui.Error(fmt.Sprintf(
 | |
| 			"Error writing data to %s: %s", path, err))
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	if secret == nil {
 | |
| 		c.Ui.Output(fmt.Sprintf("Success! Data written to: %s", path))
 | |
| 		return 0
 | |
| 	}
 | |
| 
 | |
| 	return OutputSecret(c.Ui, format, secret)
 | |
| }
 | |
| 
 | |
| func (c *WriteCommand) parseData(args []string) (map[string]interface{}, error) {
 | |
| 	var stdin io.Reader = os.Stdin
 | |
| 	if c.testStdin != nil {
 | |
| 		stdin = c.testStdin
 | |
| 	}
 | |
| 
 | |
| 	builder := &kvbuilder.Builder{Stdin: stdin}
 | |
| 	if err := builder.Add(args...); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	return builder.Map(), nil
 | |
| }
 | |
| 
 | |
| func (c *WriteCommand) Synopsis() string {
 | |
| 	return "Write secrets or configuration into Vault"
 | |
| }
 | |
| 
 | |
| func (c *WriteCommand) Help() string {
 | |
| 	helpText := `
 | |
| Usage: vault write [options] path [data]
 | |
| 
 | |
|   Write data (secrets or configuration) into Vault.
 | |
| 
 | |
|   Write sends data into Vault at the given path. The behavior of the write
 | |
|   is determined by the backend at the given path. For example, writing
 | |
|   to "aws/policy/ops" will create an "ops" IAM policy for the AWS backend
 | |
|   (configuration), but writing to "consul/foo" will write a value directly
 | |
|   into Consul at that key. Check the documentation of the logical backend
 | |
|   you're using for more information on key structure.
 | |
| 
 | |
|   Data is sent via additional arguments in "key=value" pairs. If value
 | |
|   begins with an "@", then it is loaded from a file. If you want to start
 | |
|   the value with a literal "@", then prefix the "@" with a slash: "\@".
 | |
| 
 | |
| General Options:
 | |
| 
 | |
|   ` + generalOptionsUsage() + `
 | |
| 
 | |
| Write Options:
 | |
| 
 | |
|   -f | -force             Force the write to continue without any data values
 | |
|                           specified. This allows writing to keys that do not
 | |
|                           need or expect any fields to be specified.
 | |
| 
 | |
| `
 | |
| 	return strings.TrimSpace(helpText)
 | |
| }
 | 
