mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-02 19:47:54 +00:00 
			
		
		
		
	@mitchellh suggested we fork `cli` and switch to that. Since we primarily use the interfaces in `cli`, and the new fork has not changed those, this is (mostly) a drop-in replacement. A small fix will be necessary for Vault Enterprise, I believe.
		
			
				
	
	
		
			90 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			90 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright (c) HashiCorp, Inc.
 | 
						|
// SPDX-License-Identifier: BUSL-1.1
 | 
						|
 | 
						|
package command
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/hashicorp/cli"
 | 
						|
	"github.com/posener/complete"
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	_ cli.Command             = (*OperatorSealCommand)(nil)
 | 
						|
	_ cli.CommandAutocomplete = (*OperatorSealCommand)(nil)
 | 
						|
)
 | 
						|
 | 
						|
type OperatorSealCommand struct {
 | 
						|
	*BaseCommand
 | 
						|
}
 | 
						|
 | 
						|
func (c *OperatorSealCommand) Synopsis() string {
 | 
						|
	return "Seals the Vault server"
 | 
						|
}
 | 
						|
 | 
						|
func (c *OperatorSealCommand) Help() string {
 | 
						|
	helpText := `
 | 
						|
Usage: vault operator seal [options]
 | 
						|
 | 
						|
  Seals the Vault server. Sealing tells the Vault server to stop responding
 | 
						|
  to any operations until it is unsealed. When sealed, the Vault server
 | 
						|
  discards its in-memory root key to unlock the data, so it is physically
 | 
						|
  blocked from responding to operations unsealed.
 | 
						|
 | 
						|
  If an unseal is in progress, sealing the Vault will reset the unsealing
 | 
						|
  process. Users will have to re-enter their portions of the root key again.
 | 
						|
 | 
						|
  This command does nothing if the Vault server is already sealed.
 | 
						|
 | 
						|
  Seal the Vault server:
 | 
						|
 | 
						|
      $ vault operator seal
 | 
						|
 | 
						|
` + c.Flags().Help()
 | 
						|
 | 
						|
	return strings.TrimSpace(helpText)
 | 
						|
}
 | 
						|
 | 
						|
func (c *OperatorSealCommand) Flags() *FlagSets {
 | 
						|
	return c.flagSet(FlagSetHTTP)
 | 
						|
}
 | 
						|
 | 
						|
func (c *OperatorSealCommand) AutocompleteArgs() complete.Predictor {
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func (c *OperatorSealCommand) AutocompleteFlags() complete.Flags {
 | 
						|
	return c.Flags().Completions()
 | 
						|
}
 | 
						|
 | 
						|
func (c *OperatorSealCommand) Run(args []string) int {
 | 
						|
	f := c.Flags()
 | 
						|
 | 
						|
	if err := f.Parse(args); err != nil {
 | 
						|
		c.UI.Error(err.Error())
 | 
						|
		return 1
 | 
						|
	}
 | 
						|
 | 
						|
	args = f.Args()
 | 
						|
	if len(args) > 0 {
 | 
						|
		c.UI.Error(fmt.Sprintf("Too many arguments (expected 0, got %d)", len(args)))
 | 
						|
		return 1
 | 
						|
	}
 | 
						|
 | 
						|
	client, err := c.Client()
 | 
						|
	if err != nil {
 | 
						|
		c.UI.Error(err.Error())
 | 
						|
		return 2
 | 
						|
	}
 | 
						|
 | 
						|
	if err := client.Sys().Seal(); err != nil {
 | 
						|
		c.UI.Error(fmt.Sprintf("Error sealing: %s", err))
 | 
						|
		return 2
 | 
						|
	}
 | 
						|
 | 
						|
	c.UI.Output("Success! Vault is sealed.")
 | 
						|
	return 0
 | 
						|
}
 |