mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 18:48:08 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			91 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			91 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package command
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/hashicorp/vault/api"
 | |
| )
 | |
| 
 | |
| // InitCommand is a Command that initializes a new Vault server.
 | |
| type InitCommand struct {
 | |
| 	Meta
 | |
| }
 | |
| 
 | |
| func (c *InitCommand) Run(args []string) int {
 | |
| 	var shares, threshold int
 | |
| 	flags := c.Meta.FlagSet("init", FlagSetDefault)
 | |
| 	flags.Usage = func() { c.Ui.Error(c.Help()) }
 | |
| 	flags.IntVar(&shares, "key-shares", 5, "")
 | |
| 	flags.IntVar(&threshold, "key-threshold", 3, "")
 | |
| 	if err := flags.Parse(args); err != nil {
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	client, err := c.Client()
 | |
| 	if err != nil {
 | |
| 		c.Ui.Error(fmt.Sprintf(
 | |
| 			"Error initializing client: %s", err))
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	resp, err := client.Sys().Init(&api.InitRequest{
 | |
| 		SecretShares:    shares,
 | |
| 		SecretThreshold: threshold,
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		c.Ui.Error(fmt.Sprintf(
 | |
| 			"Error initializing Vault: %s", err))
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	for _, key := range resp.Keys {
 | |
| 		c.Ui.Output(fmt.Sprintf("Key: %s", key))
 | |
| 	}
 | |
| 
 | |
| 	return 0
 | |
| }
 | |
| 
 | |
| func (c *InitCommand) Synopsis() string {
 | |
| 	return "Initialize a new Vault server"
 | |
| }
 | |
| 
 | |
| func (c *InitCommand) Help() string {
 | |
| 	helpText := `
 | |
| Usage: vault init [options]
 | |
| 
 | |
|   Initialize a new Vault server.
 | |
| 
 | |
|   This command connects to a Vault server and initializes it for the
 | |
|   first time. This sets up the initial set of master keys and sets up the
 | |
|   backend data store structure.
 | |
| 
 | |
|   This command can't be called on an already-initialized Vault.
 | |
| 
 | |
| General Options:
 | |
| 
 | |
|   -address=TODO           The address of the Vault server.
 | |
| 
 | |
|   -ca-cert=path           Path to a PEM encoded CA cert file to use to
 | |
|                           verify the Vault server SSL certificate.
 | |
| 
 | |
|   -ca-path=path           Path to a directory of PEM encoded CA cert files
 | |
|                           to verify the Vault server SSL certificate. If both
 | |
|                           -ca-cert and -ca-path are specified, -ca-path is used.
 | |
| 
 | |
|   -insecure               Do not verify TLS certificate. This is highly
 | |
|                           not recommended. This is especially not recommended
 | |
|                           for unsealing a vault.
 | |
| 
 | |
| Init Options:
 | |
| 
 | |
|   -key-shares=5           The number of key shares to split the master key
 | |
|                           into.
 | |
| 
 | |
|   -key-threshold=3        The number of key shares required to reconstruct
 | |
|                           the master key.
 | |
| 
 | |
| `
 | |
| 	return strings.TrimSpace(helpText)
 | |
| }
 | 
