mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 02:28:09 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			137 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			137 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package command
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/hashicorp/vault/api"
 | |
| 	"github.com/mitchellh/cli"
 | |
| 	"github.com/posener/complete"
 | |
| )
 | |
| 
 | |
| var _ cli.Command = (*TokenRenewCommand)(nil)
 | |
| var _ cli.CommandAutocomplete = (*TokenRenewCommand)(nil)
 | |
| 
 | |
| type TokenRenewCommand struct {
 | |
| 	*BaseCommand
 | |
| 
 | |
| 	flagIncrement time.Duration
 | |
| }
 | |
| 
 | |
| func (c *TokenRenewCommand) Synopsis() string {
 | |
| 	return "Renew a token lease"
 | |
| }
 | |
| 
 | |
| func (c *TokenRenewCommand) Help() string {
 | |
| 	helpText := `
 | |
| Usage: vault token renew [options] [TOKEN]
 | |
| 
 | |
|   Renews a token's lease, extending the amount of time it can be used. If a
 | |
|   TOKEN is not provided, the locally authenticated token is used. Lease renewal
 | |
|   will fail if the token is not renewable, the token has already been revoked,
 | |
|   or if the token has already reached its maximum TTL.
 | |
| 
 | |
|   Renew a token (this uses the /auth/token/renew endpoint and permission):
 | |
| 
 | |
|       $ vault token renew 96ddf4bc-d217-f3ba-f9bd-017055595017
 | |
| 
 | |
|   Renew the currently authenticated token (this uses the /auth/token/renew-self
 | |
|   endpoint and permission):
 | |
| 
 | |
|       $ vault token renew
 | |
| 
 | |
|   Renew a token requesting a specific increment value:
 | |
| 
 | |
|       $ vault token renew -increment=30m 96ddf4bc-d217-f3ba-f9bd-017055595017
 | |
| 
 | |
|   For a full list of examples, please see the documentation.
 | |
| 
 | |
| ` + c.Flags().Help()
 | |
| 
 | |
| 	return strings.TrimSpace(helpText)
 | |
| }
 | |
| 
 | |
| func (c *TokenRenewCommand) Flags() *FlagSets {
 | |
| 	set := c.flagSet(FlagSetHTTP | FlagSetOutputFormat)
 | |
| 	f := set.NewFlagSet("Command Options")
 | |
| 
 | |
| 	f.DurationVar(&DurationVar{
 | |
| 		Name:       "increment",
 | |
| 		Aliases:    []string{"i"},
 | |
| 		Target:     &c.flagIncrement,
 | |
| 		Default:    0,
 | |
| 		EnvVar:     "",
 | |
| 		Completion: complete.PredictAnything,
 | |
| 		Usage: "Request a specific increment for renewal. Vault is not required " +
 | |
| 			"to honor this request. If not supplied, Vault will use the default " +
 | |
| 			"TTL. This is specified as a numeric string with suffix like \"30s\" " +
 | |
| 			"or \"5m\".",
 | |
| 	})
 | |
| 
 | |
| 	return set
 | |
| }
 | |
| 
 | |
| func (c *TokenRenewCommand) AutocompleteArgs() complete.Predictor {
 | |
| 	return c.PredictVaultFiles()
 | |
| }
 | |
| 
 | |
| func (c *TokenRenewCommand) AutocompleteFlags() complete.Flags {
 | |
| 	return c.Flags().Completions()
 | |
| }
 | |
| 
 | |
| func (c *TokenRenewCommand) Run(args []string) int {
 | |
| 	f := c.Flags()
 | |
| 
 | |
| 	if err := f.Parse(args); err != nil {
 | |
| 		c.UI.Error(err.Error())
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	token := ""
 | |
| 	increment := c.flagIncrement
 | |
| 
 | |
| 	args = f.Args()
 | |
| 	switch len(args) {
 | |
| 	case 0:
 | |
| 		// Use the local token
 | |
| 	case 1:
 | |
| 		token = strings.TrimSpace(args[0])
 | |
| 	case 2:
 | |
| 		// TODO: remove in 0.9.0 - backwards compat
 | |
| 		c.UI.Warn("Specifying increment as a second argument is deprecated. " +
 | |
| 			"Please use -increment instead.")
 | |
| 
 | |
| 		token = strings.TrimSpace(args[0])
 | |
| 		parsed, err := time.ParseDuration(appendDurationSuffix(args[1]))
 | |
| 		if err != nil {
 | |
| 			c.UI.Error(fmt.Sprintf("Invalid increment: %s", err))
 | |
| 			return 1
 | |
| 		}
 | |
| 		increment = parsed
 | |
| 	default:
 | |
| 		c.UI.Error(fmt.Sprintf("Too many arguments (expected 1, got %d)", len(args)))
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	client, err := c.Client()
 | |
| 	if err != nil {
 | |
| 		c.UI.Error(err.Error())
 | |
| 		return 2
 | |
| 	}
 | |
| 
 | |
| 	var secret *api.Secret
 | |
| 	inc := truncateToSeconds(increment)
 | |
| 	if token == "" {
 | |
| 		secret, err = client.Auth().Token().RenewSelf(inc)
 | |
| 	} else {
 | |
| 		secret, err = client.Auth().Token().Renew(token, inc)
 | |
| 	}
 | |
| 	if err != nil {
 | |
| 		c.UI.Error(fmt.Sprintf("Error renewing token: %s", err))
 | |
| 		return 2
 | |
| 	}
 | |
| 
 | |
| 	return OutputSecret(c.UI, c.flagFormat, secret)
 | |
| }
 | 
