mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-30 18:17:55 +00:00 
			
		
		
		
	 4b67fd139f
			
		
	
	4b67fd139f
	
	
	
		
			
			backends for the moment. This is pretty simple; it just adds the actual capability to make a list call into both the CLI and the HTTP handler. The real meat was already in those backends.
		
			
				
	
	
		
			316 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			316 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package cli
 | |
| 
 | |
| import (
 | |
| 	"os"
 | |
| 	"os/signal"
 | |
| 	"syscall"
 | |
| 
 | |
| 	auditFile "github.com/hashicorp/vault/builtin/audit/file"
 | |
| 	auditSyslog "github.com/hashicorp/vault/builtin/audit/syslog"
 | |
| 	"github.com/hashicorp/vault/version"
 | |
| 
 | |
| 	credAppId "github.com/hashicorp/vault/builtin/credential/app-id"
 | |
| 	credCert "github.com/hashicorp/vault/builtin/credential/cert"
 | |
| 	credGitHub "github.com/hashicorp/vault/builtin/credential/github"
 | |
| 	credLdap "github.com/hashicorp/vault/builtin/credential/ldap"
 | |
| 	credUserpass "github.com/hashicorp/vault/builtin/credential/userpass"
 | |
| 
 | |
| 	"github.com/hashicorp/vault/builtin/logical/aws"
 | |
| 	"github.com/hashicorp/vault/builtin/logical/cassandra"
 | |
| 	"github.com/hashicorp/vault/builtin/logical/consul"
 | |
| 	"github.com/hashicorp/vault/builtin/logical/mysql"
 | |
| 	"github.com/hashicorp/vault/builtin/logical/pki"
 | |
| 	"github.com/hashicorp/vault/builtin/logical/postgresql"
 | |
| 	"github.com/hashicorp/vault/builtin/logical/ssh"
 | |
| 	"github.com/hashicorp/vault/builtin/logical/transit"
 | |
| 
 | |
| 	"github.com/hashicorp/vault/audit"
 | |
| 	"github.com/hashicorp/vault/command"
 | |
| 	"github.com/hashicorp/vault/logical"
 | |
| 	"github.com/mitchellh/cli"
 | |
| )
 | |
| 
 | |
| // Commands returns the mapping of CLI commands for Vault. The meta
 | |
| // parameter lets you set meta options for all commands.
 | |
| func Commands(metaPtr *command.Meta) map[string]cli.CommandFactory {
 | |
| 	if metaPtr == nil {
 | |
| 		metaPtr = new(command.Meta)
 | |
| 	}
 | |
| 
 | |
| 	meta := *metaPtr
 | |
| 	if meta.Ui == nil {
 | |
| 		meta.Ui = &cli.BasicUi{
 | |
| 			Writer:      os.Stdout,
 | |
| 			ErrorWriter: os.Stderr,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return map[string]cli.CommandFactory{
 | |
| 		"init": func() (cli.Command, error) {
 | |
| 			return &command.InitCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"server": func() (cli.Command, error) {
 | |
| 			return &command.ServerCommand{
 | |
| 				Meta: meta,
 | |
| 				AuditBackends: map[string]audit.Factory{
 | |
| 					"file":   auditFile.Factory,
 | |
| 					"syslog": auditSyslog.Factory,
 | |
| 				},
 | |
| 				CredentialBackends: map[string]logical.Factory{
 | |
| 					"cert":     credCert.Factory,
 | |
| 					"app-id":   credAppId.Factory,
 | |
| 					"github":   credGitHub.Factory,
 | |
| 					"userpass": credUserpass.Factory,
 | |
| 					"ldap":     credLdap.Factory,
 | |
| 				},
 | |
| 				LogicalBackends: map[string]logical.Factory{
 | |
| 					"aws":        aws.Factory,
 | |
| 					"consul":     consul.Factory,
 | |
| 					"postgresql": postgresql.Factory,
 | |
| 					"cassandra":  cassandra.Factory,
 | |
| 					"pki":        pki.Factory,
 | |
| 					"transit":    transit.Factory,
 | |
| 					"mysql":      mysql.Factory,
 | |
| 					"ssh":        ssh.Factory,
 | |
| 				},
 | |
| 				ShutdownCh: makeShutdownCh(),
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"ssh": func() (cli.Command, error) {
 | |
| 			return &command.SSHCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"path-help": func() (cli.Command, error) {
 | |
| 			return &command.PathHelpCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"auth": func() (cli.Command, error) {
 | |
| 			return &command.AuthCommand{
 | |
| 				Meta: meta,
 | |
| 				Handlers: map[string]command.AuthHandler{
 | |
| 					"github":   &credGitHub.CLIHandler{},
 | |
| 					"userpass": &credUserpass.CLIHandler{},
 | |
| 					"ldap":     &credLdap.CLIHandler{},
 | |
| 					"cert":     &credCert.CLIHandler{},
 | |
| 				},
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"auth-enable": func() (cli.Command, error) {
 | |
| 			return &command.AuthEnableCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"auth-disable": func() (cli.Command, error) {
 | |
| 			return &command.AuthDisableCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"audit-list": func() (cli.Command, error) {
 | |
| 			return &command.AuditListCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"audit-disable": func() (cli.Command, error) {
 | |
| 			return &command.AuditDisableCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"audit-enable": func() (cli.Command, error) {
 | |
| 			return &command.AuditEnableCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"key-status": func() (cli.Command, error) {
 | |
| 			return &command.KeyStatusCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"policies": func() (cli.Command, error) {
 | |
| 			return &command.PolicyListCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"policy-delete": func() (cli.Command, error) {
 | |
| 			return &command.PolicyDeleteCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"policy-write": func() (cli.Command, error) {
 | |
| 			return &command.PolicyWriteCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"read": func() (cli.Command, error) {
 | |
| 			return &command.ReadCommand{
 | |
| 				Meta: meta,
 | |
| 				List: false,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"write": func() (cli.Command, error) {
 | |
| 			return &command.WriteCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"delete": func() (cli.Command, error) {
 | |
| 			return &command.DeleteCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"list": func() (cli.Command, error) {
 | |
| 			return &command.ReadCommand{
 | |
| 				Meta: meta,
 | |
| 				List: true,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"rekey": func() (cli.Command, error) {
 | |
| 			return &command.RekeyCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"generate-root": func() (cli.Command, error) {
 | |
| 			return &command.GenerateRootCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"renew": func() (cli.Command, error) {
 | |
| 			return &command.RenewCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"revoke": func() (cli.Command, error) {
 | |
| 			return &command.RevokeCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"seal": func() (cli.Command, error) {
 | |
| 			return &command.SealCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"status": func() (cli.Command, error) {
 | |
| 			return &command.StatusCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"unseal": func() (cli.Command, error) {
 | |
| 			return &command.UnsealCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"mount": func() (cli.Command, error) {
 | |
| 			return &command.MountCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"mounts": func() (cli.Command, error) {
 | |
| 			return &command.MountsCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"mount-tune": func() (cli.Command, error) {
 | |
| 			return &command.MountTuneCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"remount": func() (cli.Command, error) {
 | |
| 			return &command.RemountCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"rotate": func() (cli.Command, error) {
 | |
| 			return &command.RotateCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"unmount": func() (cli.Command, error) {
 | |
| 			return &command.UnmountCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"token-create": func() (cli.Command, error) {
 | |
| 			return &command.TokenCreateCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"token-lookup": func() (cli.Command, error) {
 | |
| 			return &command.TokenLookupCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"token-renew": func() (cli.Command, error) {
 | |
| 			return &command.TokenRenewCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"token-revoke": func() (cli.Command, error) {
 | |
| 			return &command.TokenRevokeCommand{
 | |
| 				Meta: meta,
 | |
| 			}, nil
 | |
| 		},
 | |
| 
 | |
| 		"version": func() (cli.Command, error) {
 | |
| 			versionInfo := version.GetVersion()
 | |
| 
 | |
| 			return &command.VersionCommand{
 | |
| 				VersionInfo: versionInfo,
 | |
| 				Ui:          meta.Ui,
 | |
| 			}, nil
 | |
| 		},
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // makeShutdownCh returns a channel that can be used for shutdown
 | |
| // notifications for commands. This channel will send a message for every
 | |
| // interrupt or SIGTERM received.
 | |
| func makeShutdownCh() <-chan struct{} {
 | |
| 	resultCh := make(chan struct{})
 | |
| 
 | |
| 	signalCh := make(chan os.Signal, 4)
 | |
| 	signal.Notify(signalCh, os.Interrupt, syscall.SIGTERM)
 | |
| 	go func() {
 | |
| 		for {
 | |
| 			<-signalCh
 | |
| 			resultCh <- struct{}{}
 | |
| 		}
 | |
| 	}()
 | |
| 	return resultCh
 | |
| }
 |