mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-03 20:17:59 +00:00 
			
		
		
		
	Its use provides no value (in the current code, not generally) and has already caused one bug (#4325).
		
			
				
	
	
		
			120 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			120 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package api
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
 | 
						|
	"github.com/mitchellh/mapstructure"
 | 
						|
)
 | 
						|
 | 
						|
func (c *Sys) ListAuth() (map[string]*AuthMount, error) {
 | 
						|
	r := c.c.NewRequest("GET", "/v1/sys/auth")
 | 
						|
	resp, err := c.c.RawRequest(r)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	defer resp.Body.Close()
 | 
						|
 | 
						|
	var result map[string]interface{}
 | 
						|
	err = resp.DecodeJSON(&result)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	mounts := map[string]*AuthMount{}
 | 
						|
	for k, v := range result {
 | 
						|
		switch v.(type) {
 | 
						|
		case map[string]interface{}:
 | 
						|
		default:
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		var res AuthMount
 | 
						|
		err = mapstructure.Decode(v, &res)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		// Not a mount, some other api.Secret data
 | 
						|
		if res.Type == "" {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		mounts[k] = &res
 | 
						|
	}
 | 
						|
 | 
						|
	return mounts, nil
 | 
						|
}
 | 
						|
 | 
						|
// DEPRECATED: Use EnableAuthWithOptions instead
 | 
						|
func (c *Sys) EnableAuth(path, authType, desc string) error {
 | 
						|
	return c.EnableAuthWithOptions(path, &EnableAuthOptions{
 | 
						|
		Type:        authType,
 | 
						|
		Description: desc,
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
func (c *Sys) EnableAuthWithOptions(path string, options *EnableAuthOptions) error {
 | 
						|
	r := c.c.NewRequest("POST", fmt.Sprintf("/v1/sys/auth/%s", path))
 | 
						|
	if err := r.SetJSONBody(options); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	resp, err := c.c.RawRequest(r)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	defer resp.Body.Close()
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func (c *Sys) DisableAuth(path string) error {
 | 
						|
	r := c.c.NewRequest("DELETE", fmt.Sprintf("/v1/sys/auth/%s", path))
 | 
						|
	resp, err := c.c.RawRequest(r)
 | 
						|
	if err == nil {
 | 
						|
		defer resp.Body.Close()
 | 
						|
	}
 | 
						|
	return err
 | 
						|
}
 | 
						|
 | 
						|
// Structures for the requests/resposne are all down here. They aren't
 | 
						|
// individually documented because the map almost directly to the raw HTTP API
 | 
						|
// documentation. Please refer to that documentation for more details.
 | 
						|
 | 
						|
type EnableAuthOptions struct {
 | 
						|
	Type        string            `json:"type"`
 | 
						|
	Description string            `json:"description"`
 | 
						|
	Config      AuthConfigInput   `json:"config"`
 | 
						|
	Local       bool              `json:"local"`
 | 
						|
	PluginName  string            `json:"plugin_name,omitempty"`
 | 
						|
	SealWrap    bool              `json:"seal_wrap" mapstructure:"seal_wrap"`
 | 
						|
	Options     map[string]string `json:"options" mapstructure:"options"`
 | 
						|
}
 | 
						|
 | 
						|
type AuthConfigInput struct {
 | 
						|
	DefaultLeaseTTL           string   `json:"default_lease_ttl" mapstructure:"default_lease_ttl"`
 | 
						|
	MaxLeaseTTL               string   `json:"max_lease_ttl" mapstructure:"max_lease_ttl"`
 | 
						|
	PluginName                string   `json:"plugin_name,omitempty" mapstructure:"plugin_name"`
 | 
						|
	AuditNonHMACRequestKeys   []string `json:"audit_non_hmac_request_keys,omitempty" mapstructure:"audit_non_hmac_request_keys"`
 | 
						|
	AuditNonHMACResponseKeys  []string `json:"audit_non_hmac_response_keys,omitempty" mapstructure:"audit_non_hmac_response_keys"`
 | 
						|
	ListingVisibility         string   `json:"listing_visibility,omitempty" mapstructure:"listing_visibility"`
 | 
						|
	PassthroughRequestHeaders []string `json:"passthrough_request_headers,omitempty" mapstructure:"passthrough_request_headers"`
 | 
						|
}
 | 
						|
 | 
						|
type AuthMount struct {
 | 
						|
	Type        string            `json:"type" mapstructure:"type"`
 | 
						|
	Description string            `json:"description" mapstructure:"description"`
 | 
						|
	Accessor    string            `json:"accessor" mapstructure:"accessor"`
 | 
						|
	Config      AuthConfigOutput  `json:"config" mapstructure:"config"`
 | 
						|
	Local       bool              `json:"local" mapstructure:"local"`
 | 
						|
	SealWrap    bool              `json:"seal_wrap" mapstructure:"seal_wrap"`
 | 
						|
	Options     map[string]string `json:"options" mapstructure:"options"`
 | 
						|
}
 | 
						|
 | 
						|
type AuthConfigOutput struct {
 | 
						|
	DefaultLeaseTTL           int      `json:"default_lease_ttl" mapstructure:"default_lease_ttl"`
 | 
						|
	MaxLeaseTTL               int      `json:"max_lease_ttl" mapstructure:"max_lease_ttl"`
 | 
						|
	PluginName                string   `json:"plugin_name,omitempty" mapstructure:"plugin_name"`
 | 
						|
	AuditNonHMACRequestKeys   []string `json:"audit_non_hmac_request_keys,omitempty" mapstructure:"audit_non_hmac_request_keys"`
 | 
						|
	AuditNonHMACResponseKeys  []string `json:"audit_non_hmac_response_keys,omitempty" mapstructure:"audit_non_hmac_response_keys"`
 | 
						|
	ListingVisibility         string   `json:"listing_visibility,omitempty" mapstructure:"listing_visibility"`
 | 
						|
	PassthroughRequestHeaders []string `json:"passthrough_request_headers,omitempty" mapstructure:"passthrough_request_headers"`
 | 
						|
}
 |