mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-30 02:02:43 +00:00 
			
		
		
		
	 6ed8b88f5f
			
		
	
	6ed8b88f5f
	
	
	
		
			
			@mitchellh suggested we fork `cli` and switch to that. Since we primarily use the interfaces in `cli`, and the new fork has not changed those, this is (mostly) a drop-in replacement. A small fix will be necessary for Vault Enterprise, I believe.
		
			
				
	
	
		
			244 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			244 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright (c) HashiCorp, Inc.
 | |
| // SPDX-License-Identifier: BUSL-1.1
 | |
| 
 | |
| package command
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"path"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/hashicorp/cli"
 | |
| 	"github.com/posener/complete"
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	_ cli.Command             = (*KVGetCommand)(nil)
 | |
| 	_ cli.CommandAutocomplete = (*KVGetCommand)(nil)
 | |
| )
 | |
| 
 | |
| type KVGetCommand struct {
 | |
| 	*BaseCommand
 | |
| 
 | |
| 	flagVersion int
 | |
| 	flagMount   string
 | |
| }
 | |
| 
 | |
| func (c *KVGetCommand) Synopsis() string {
 | |
| 	return "Retrieves data from the KV store"
 | |
| }
 | |
| 
 | |
| func (c *KVGetCommand) Help() string {
 | |
| 	helpText := `
 | |
| Usage: vault kv get [options] KEY
 | |
| 
 | |
|   Retrieves the value from Vault's key-value store at the given key name. If no
 | |
|   key exists with that name, an error is returned. If a key exists with that
 | |
|   name but has no data, nothing is returned.
 | |
| 
 | |
|       $ vault kv get -mount=secret foo
 | |
| 
 | |
|   The deprecated path-like syntax can also be used, but this should be avoided 
 | |
|   for KV v2, as the fact that it is not actually the full API path to 
 | |
|   the secret (secret/data/foo) can cause confusion: 
 | |
|   
 | |
|       $ vault kv get secret/foo
 | |
| 
 | |
|   To view the given key name at a specific version in time, specify the "-version"
 | |
|   flag:
 | |
| 
 | |
|       $ vault kv get -mount=secret -version=1 foo
 | |
| 
 | |
|   Additional flags and more advanced use cases are detailed below.
 | |
| 
 | |
| ` + c.Flags().Help()
 | |
| 	return strings.TrimSpace(helpText)
 | |
| }
 | |
| 
 | |
| func (c *KVGetCommand) Flags() *FlagSets {
 | |
| 	set := c.flagSet(FlagSetHTTP | FlagSetOutputField | FlagSetOutputFormat)
 | |
| 
 | |
| 	// Common Options
 | |
| 	f := set.NewFlagSet("Common Options")
 | |
| 
 | |
| 	f.IntVar(&IntVar{
 | |
| 		Name:    "version",
 | |
| 		Target:  &c.flagVersion,
 | |
| 		Default: 0,
 | |
| 		Usage:   `If passed, the value at the version number will be returned.`,
 | |
| 	})
 | |
| 
 | |
| 	f.StringVar(&StringVar{
 | |
| 		Name:    "mount",
 | |
| 		Target:  &c.flagMount,
 | |
| 		Default: "", // no default, because the handling of the next arg is determined by whether this flag has a value
 | |
| 		Usage: `Specifies the path where the KV backend is mounted. If specified, 
 | |
| 		the next argument will be interpreted as the secret path. If this flag is 
 | |
| 		not specified, the next argument will be interpreted as the combined mount 
 | |
| 		path and secret path, with /data/ automatically appended between KV 
 | |
| 		v2 secrets.`,
 | |
| 	})
 | |
| 
 | |
| 	return set
 | |
| }
 | |
| 
 | |
| func (c *KVGetCommand) AutocompleteArgs() complete.Predictor {
 | |
| 	return c.PredictVaultFiles()
 | |
| }
 | |
| 
 | |
| func (c *KVGetCommand) AutocompleteFlags() complete.Flags {
 | |
| 	return c.Flags().Completions()
 | |
| }
 | |
| 
 | |
| func (c *KVGetCommand) Run(args []string) int {
 | |
| 	f := c.Flags()
 | |
| 
 | |
| 	if err := f.Parse(args); err != nil {
 | |
| 		c.UI.Error(err.Error())
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	args = f.Args()
 | |
| 	switch {
 | |
| 	case len(args) < 1:
 | |
| 		c.UI.Error(fmt.Sprintf("Not enough arguments (expected 1, got %d)", len(args)))
 | |
| 		return 1
 | |
| 	case len(args) > 1:
 | |
| 		c.UI.Error(fmt.Sprintf("Too many arguments (expected 1, got %d)", len(args)))
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	client, err := c.Client()
 | |
| 	if err != nil {
 | |
| 		c.UI.Error(err.Error())
 | |
| 		return 2
 | |
| 	}
 | |
| 
 | |
| 	// If true, we're working with "-mount=secret foo" syntax.
 | |
| 	// If false, we're using "secret/foo" syntax.
 | |
| 	mountFlagSyntax := c.flagMount != ""
 | |
| 
 | |
| 	var (
 | |
| 		mountPath string
 | |
| 		v2        bool
 | |
| 	)
 | |
| 
 | |
| 	// Ignore leading slash
 | |
| 	partialPath := strings.TrimPrefix(args[0], "/")
 | |
| 
 | |
| 	// Parse the paths and grab the KV version
 | |
| 	if mountFlagSyntax {
 | |
| 		// In this case, this arg is the secret path (e.g. "foo").
 | |
| 		mountPath, v2, err = isKVv2(sanitizePath(c.flagMount), client)
 | |
| 		if err != nil {
 | |
| 			c.UI.Error(err.Error())
 | |
| 			return 2
 | |
| 		}
 | |
| 
 | |
| 		if v2 {
 | |
| 			partialPath = path.Join(mountPath, partialPath)
 | |
| 		}
 | |
| 	} else {
 | |
| 		// In this case, this arg is a path-like combination of mountPath/secretPath.
 | |
| 		// (e.g. "secret/foo")
 | |
| 		mountPath, v2, err = isKVv2(partialPath, client)
 | |
| 		if err != nil {
 | |
| 			c.UI.Error(err.Error())
 | |
| 			return 2
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	var versionParam map[string]string
 | |
| 	var fullPath string
 | |
| 	// Add /data to v2 paths only
 | |
| 	if v2 {
 | |
| 		fullPath = addPrefixToKVPath(partialPath, mountPath, "data", false)
 | |
| 
 | |
| 		if c.flagVersion > 0 {
 | |
| 			versionParam = map[string]string{
 | |
| 				"version": fmt.Sprintf("%d", c.flagVersion),
 | |
| 			}
 | |
| 		}
 | |
| 	} else {
 | |
| 		// v1
 | |
| 		if mountFlagSyntax {
 | |
| 			fullPath = path.Join(mountPath, partialPath)
 | |
| 		} else {
 | |
| 			fullPath = partialPath
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	secret, err := kvReadRequest(client, fullPath, versionParam)
 | |
| 	if err != nil {
 | |
| 		c.UI.Error(fmt.Sprintf("Error reading %s: %s", fullPath, err))
 | |
| 		if secret != nil {
 | |
| 			OutputSecret(c.UI, secret)
 | |
| 		}
 | |
| 		return 2
 | |
| 	}
 | |
| 	if secret == nil {
 | |
| 		c.UI.Error(fmt.Sprintf("No value found at %s", fullPath))
 | |
| 		return 2
 | |
| 	}
 | |
| 
 | |
| 	if c.flagField != "" {
 | |
| 		if v2 {
 | |
| 			// This is a v2, pass in the data field
 | |
| 			if data, ok := secret.Data["data"]; ok && data != nil {
 | |
| 				// If they requested a literal "data" see if they meant actual
 | |
| 				// value or the data block itself
 | |
| 				if c.flagField == "data" {
 | |
| 					if dataMap, ok := data.(map[string]interface{}); ok {
 | |
| 						if _, ok := dataMap["data"]; ok {
 | |
| 							return PrintRawField(c.UI, dataMap, c.flagField)
 | |
| 						}
 | |
| 					}
 | |
| 					return PrintRawField(c.UI, secret, c.flagField)
 | |
| 				}
 | |
| 				return PrintRawField(c.UI, data, c.flagField)
 | |
| 			} else {
 | |
| 				c.UI.Error(fmt.Sprintf("No data found at %s", fullPath))
 | |
| 				return 2
 | |
| 			}
 | |
| 		} else {
 | |
| 			return PrintRawField(c.UI, secret, c.flagField)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// If we have wrap info print the secret normally.
 | |
| 	if secret.WrapInfo != nil || c.flagFormat != "table" {
 | |
| 		return OutputSecret(c.UI, secret)
 | |
| 	}
 | |
| 
 | |
| 	if len(secret.Warnings) > 0 {
 | |
| 		tf := TableFormatter{}
 | |
| 		tf.printWarnings(c.UI, secret)
 | |
| 	}
 | |
| 
 | |
| 	if v2 {
 | |
| 		outputPath(c.UI, fullPath, "Secret Path")
 | |
| 	}
 | |
| 
 | |
| 	if metadata, ok := secret.Data["metadata"]; ok && metadata != nil {
 | |
| 		c.UI.Info(getHeaderForMap("Metadata", metadata.(map[string]interface{})))
 | |
| 		OutputData(c.UI, metadata)
 | |
| 		c.UI.Info("")
 | |
| 	}
 | |
| 
 | |
| 	data := secret.Data
 | |
| 	if v2 && data != nil {
 | |
| 		data = nil
 | |
| 		dataRaw := secret.Data["data"]
 | |
| 		if dataRaw != nil {
 | |
| 			data = dataRaw.(map[string]interface{})
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if data != nil {
 | |
| 		c.UI.Info(getHeaderForMap("Data", data))
 | |
| 		OutputData(c.UI, data)
 | |
| 	}
 | |
| 
 | |
| 	return 0
 | |
| }
 |