mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-30 18:17:55 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			129 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			129 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright (c) HashiCorp, Inc.
 | |
| // SPDX-License-Identifier: MPL-2.0
 | |
| 
 | |
| package command
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"os"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/mitchellh/cli"
 | |
| 	"github.com/posener/complete"
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	_ cli.Command             = (*DeleteCommand)(nil)
 | |
| 	_ cli.CommandAutocomplete = (*DeleteCommand)(nil)
 | |
| )
 | |
| 
 | |
| type DeleteCommand struct {
 | |
| 	*BaseCommand
 | |
| 
 | |
| 	testStdin io.Reader // for tests
 | |
| }
 | |
| 
 | |
| func (c *DeleteCommand) Synopsis() string {
 | |
| 	return "Delete secrets and configuration"
 | |
| }
 | |
| 
 | |
| func (c *DeleteCommand) Help() string {
 | |
| 	helpText := `
 | |
| Usage: vault delete [options] PATH
 | |
| 
 | |
|   Deletes secrets and configuration from Vault at the given path. The behavior
 | |
|   of "delete" is delegated to the backend corresponding to the given path.
 | |
| 
 | |
|   Remove data in the status secret backend:
 | |
| 
 | |
|       $ vault delete secret/my-secret
 | |
| 
 | |
|   Uninstall an encryption key in the transit backend:
 | |
| 
 | |
|       $ vault delete transit/keys/my-key
 | |
| 
 | |
|   Delete an IAM role:
 | |
| 
 | |
|       $ vault delete aws/roles/ops
 | |
| 
 | |
|   For a full list of examples and paths, please see the documentation that
 | |
|   corresponds to the secret backend in use.
 | |
| 
 | |
| ` + c.Flags().Help()
 | |
| 
 | |
| 	return strings.TrimSpace(helpText)
 | |
| }
 | |
| 
 | |
| func (c *DeleteCommand) Flags() *FlagSets {
 | |
| 	return c.flagSet(FlagSetHTTP | FlagSetOutputField | FlagSetOutputFormat)
 | |
| }
 | |
| 
 | |
| func (c *DeleteCommand) AutocompleteArgs() complete.Predictor {
 | |
| 	return c.PredictVaultFiles()
 | |
| }
 | |
| 
 | |
| func (c *DeleteCommand) AutocompleteFlags() complete.Flags {
 | |
| 	return c.Flags().Completions()
 | |
| }
 | |
| 
 | |
| func (c *DeleteCommand) Run(args []string) int {
 | |
| 	f := c.Flags()
 | |
| 
 | |
| 	if err := f.Parse(args); err != nil {
 | |
| 		c.UI.Error(err.Error())
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	args = f.Args()
 | |
| 	switch {
 | |
| 	case len(args) < 1:
 | |
| 		c.UI.Error(fmt.Sprintf("Not enough arguments (expected at least 1, got %d)", len(args)))
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	client, err := c.Client()
 | |
| 	if err != nil {
 | |
| 		c.UI.Error(err.Error())
 | |
| 		return 2
 | |
| 	}
 | |
| 
 | |
| 	// Pull our fake stdin if needed
 | |
| 	stdin := (io.Reader)(os.Stdin)
 | |
| 	if c.testStdin != nil {
 | |
| 		stdin = c.testStdin
 | |
| 	}
 | |
| 
 | |
| 	path := sanitizePath(args[0])
 | |
| 
 | |
| 	data, err := parseArgsDataStringLists(stdin, args[1:])
 | |
| 	if err != nil {
 | |
| 		c.UI.Error(fmt.Sprintf("Failed to parse string list data: %s", err))
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	secret, err := client.Logical().DeleteWithData(path, data)
 | |
| 	if err != nil {
 | |
| 		c.UI.Error(fmt.Sprintf("Error deleting %s: %s", path, err))
 | |
| 		if secret != nil {
 | |
| 			OutputSecret(c.UI, secret)
 | |
| 		}
 | |
| 		return 2
 | |
| 	}
 | |
| 
 | |
| 	if secret == nil {
 | |
| 		// Don't output anything unless using the "table" format
 | |
| 		if Format(c.UI) == "table" {
 | |
| 			c.UI.Info(fmt.Sprintf("Success! Data deleted (if it existed) at: %s", path))
 | |
| 		}
 | |
| 		return 0
 | |
| 	}
 | |
| 
 | |
| 	// Handle single field output
 | |
| 	if c.flagField != "" {
 | |
| 		return PrintRawField(c.UI, secret, c.flagField)
 | |
| 	}
 | |
| 
 | |
| 	return OutputSecret(c.UI, secret)
 | |
| }
 | 
