2014-09-06 18:12:45 +00:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"strings"
|
2014-09-09 01:09:51 +00:00
|
|
|
|
2017-02-08 23:25:47 +00:00
|
|
|
consulapi "github.com/hashicorp/consul/api"
|
2014-09-13 00:18:10 +00:00
|
|
|
"github.com/hashicorp/consul/command/agent"
|
2017-02-08 23:25:47 +00:00
|
|
|
"github.com/hashicorp/consul/command/base"
|
2014-09-09 01:09:51 +00:00
|
|
|
"github.com/mitchellh/cli"
|
2014-09-06 18:12:45 +00:00
|
|
|
)
|
|
|
|
|
2014-09-13 03:08:54 +00:00
|
|
|
// KeyringCommand is a Command implementation that handles querying, installing,
|
2014-09-06 18:12:45 +00:00
|
|
|
// and removing gossip encryption keys from a keyring.
|
2014-09-13 03:08:54 +00:00
|
|
|
type KeyringCommand struct {
|
2017-02-08 23:25:47 +00:00
|
|
|
base.Command
|
2014-09-06 18:12:45 +00:00
|
|
|
}
|
|
|
|
|
2014-09-13 03:08:54 +00:00
|
|
|
func (c *KeyringCommand) Run(args []string) int {
|
2017-02-08 23:25:47 +00:00
|
|
|
var installKey, useKey, removeKey string
|
2014-09-29 19:35:15 +00:00
|
|
|
var listKeys bool
|
2017-02-02 02:42:41 +00:00
|
|
|
var relay int
|
2014-09-06 18:12:45 +00:00
|
|
|
|
2017-02-08 23:25:47 +00:00
|
|
|
f := c.Command.NewFlagSet(c)
|
|
|
|
|
|
|
|
f.StringVar(&installKey, "install", "",
|
|
|
|
"Install a new encryption key. This will broadcast the new key to "+
|
|
|
|
"all members in the cluster.")
|
|
|
|
f.StringVar(&useKey, "use", "",
|
|
|
|
"Change the primary encryption key, which is used to encrypt "+
|
|
|
|
"messages. The key must already be installed before this operation "+
|
|
|
|
"can succeed.")
|
|
|
|
f.StringVar(&removeKey, "remove", "",
|
|
|
|
"Remove the given key from the cluster. This operation may only be "+
|
|
|
|
"performed on keys which are not currently the primary key.")
|
|
|
|
f.BoolVar(&listKeys, "list", false,
|
|
|
|
"List all keys currently in use within the cluster.")
|
|
|
|
f.IntVar(&relay, "relay-factor", 0,
|
|
|
|
"Added in Consul 0.7.4, setting this to a non-zero value will cause nodes "+
|
|
|
|
"to relay their response to the operation through this many randomly-chosen "+
|
|
|
|
"other nodes in the cluster. The maximum allowed value is 5.")
|
|
|
|
|
|
|
|
if err := c.Command.Parse(args); err != nil {
|
2014-09-06 18:12:45 +00:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2014-09-09 05:27:17 +00:00
|
|
|
c.Ui = &cli.PrefixedUi{
|
|
|
|
OutputPrefix: "",
|
|
|
|
InfoPrefix: "==> ",
|
|
|
|
ErrorPrefix: "",
|
|
|
|
Ui: c.Ui,
|
|
|
|
}
|
|
|
|
|
2014-09-06 18:12:45 +00:00
|
|
|
// Only accept a single argument
|
|
|
|
found := listKeys
|
2014-10-03 05:05:00 +00:00
|
|
|
for _, arg := range []string{installKey, useKey, removeKey} {
|
2014-09-06 18:12:45 +00:00
|
|
|
if found && len(arg) > 0 {
|
2014-09-13 00:18:10 +00:00
|
|
|
c.Ui.Error("Only a single action is allowed")
|
2014-09-06 18:12:45 +00:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
found = found || len(arg) > 0
|
|
|
|
}
|
|
|
|
|
2014-09-09 04:45:15 +00:00
|
|
|
// Fail fast if no actionable args were passed
|
|
|
|
if !found {
|
|
|
|
c.Ui.Error(c.Help())
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-02-02 02:42:41 +00:00
|
|
|
// Validate the relay factor
|
|
|
|
relayFactor, err := agent.ParseRelayFactor(relay)
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error parsing relay factor: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2014-09-13 00:18:10 +00:00
|
|
|
// All other operations will require a client connection
|
2017-02-08 23:25:47 +00:00
|
|
|
client, err := c.Command.HTTPClient()
|
2014-09-09 04:45:15 +00:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error connecting to Consul agent: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2014-09-13 01:13:49 +00:00
|
|
|
if listKeys {
|
2014-09-29 22:49:47 +00:00
|
|
|
c.Ui.Info("Gathering installed encryption keys...")
|
2017-02-08 23:25:47 +00:00
|
|
|
responses, err := client.Operator().KeyringList(&consulapi.QueryOptions{RelayFactor: relayFactor})
|
2014-09-28 20:33:37 +00:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("error: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
2017-02-08 23:25:47 +00:00
|
|
|
c.handleList(responses)
|
2014-09-28 20:33:37 +00:00
|
|
|
return 0
|
2014-09-06 18:12:45 +00:00
|
|
|
}
|
|
|
|
|
2017-02-08 23:25:47 +00:00
|
|
|
opts := &consulapi.WriteOptions{RelayFactor: relayFactor}
|
2014-09-06 18:12:45 +00:00
|
|
|
if installKey != "" {
|
2014-09-24 23:39:14 +00:00
|
|
|
c.Ui.Info("Installing new gossip encryption key...")
|
2017-02-08 23:25:47 +00:00
|
|
|
err := client.Operator().KeyringInstall(installKey, opts)
|
2014-09-28 19:35:51 +00:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("error: %s", err))
|
|
|
|
return 1
|
2014-09-09 06:25:38 +00:00
|
|
|
}
|
2017-02-08 23:25:47 +00:00
|
|
|
return 0
|
2014-09-06 18:12:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if useKey != "" {
|
2014-09-24 23:39:14 +00:00
|
|
|
c.Ui.Info("Changing primary gossip encryption key...")
|
2017-02-08 23:25:47 +00:00
|
|
|
err := client.Operator().KeyringUse(useKey, opts)
|
2014-09-28 19:35:51 +00:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("error: %s", err))
|
|
|
|
return 1
|
2014-09-09 06:55:02 +00:00
|
|
|
}
|
2017-02-08 23:25:47 +00:00
|
|
|
return 0
|
2014-09-06 18:12:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if removeKey != "" {
|
2014-09-24 23:39:14 +00:00
|
|
|
c.Ui.Info("Removing gossip encryption key...")
|
2017-02-08 23:25:47 +00:00
|
|
|
err := client.Operator().KeyringRemove(removeKey, opts)
|
2014-09-28 19:35:51 +00:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("error: %s", err))
|
|
|
|
return 1
|
2014-09-09 07:08:38 +00:00
|
|
|
}
|
2017-02-08 23:25:47 +00:00
|
|
|
return 0
|
2014-09-06 18:12:45 +00:00
|
|
|
}
|
|
|
|
|
2014-09-09 04:45:15 +00:00
|
|
|
// Should never make it here
|
|
|
|
return 0
|
2014-09-06 18:12:45 +00:00
|
|
|
}
|
|
|
|
|
2017-02-08 23:25:47 +00:00
|
|
|
func (c *KeyringCommand) handleList(responses []*consulapi.KeyringResponse) {
|
|
|
|
for _, response := range responses {
|
|
|
|
pool := response.Datacenter + " (LAN)"
|
|
|
|
if response.WAN {
|
|
|
|
pool = "WAN"
|
2014-09-13 01:13:49 +00:00
|
|
|
}
|
|
|
|
|
2014-09-28 20:33:37 +00:00
|
|
|
c.Ui.Output("")
|
|
|
|
c.Ui.Output(pool + ":")
|
2017-02-08 23:25:47 +00:00
|
|
|
for key, num := range response.Keys {
|
|
|
|
c.Ui.Output(fmt.Sprintf(" %s [%d/%d]", key, num, response.NumNodes))
|
2014-09-28 19:35:51 +00:00
|
|
|
}
|
2014-09-13 01:13:49 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-09-13 03:08:54 +00:00
|
|
|
func (c *KeyringCommand) Help() string {
|
2014-09-06 18:12:45 +00:00
|
|
|
helpText := `
|
2014-09-13 03:08:54 +00:00
|
|
|
Usage: consul keyring [options]
|
2014-09-06 18:12:45 +00:00
|
|
|
|
|
|
|
Manages encryption keys used for gossip messages. Gossip encryption is
|
|
|
|
optional. When enabled, this command may be used to examine active encryption
|
|
|
|
keys in the cluster, add new keys, and remove old ones. When combined, this
|
|
|
|
functionality provides the ability to perform key rotation cluster-wide,
|
|
|
|
without disrupting the cluster.
|
|
|
|
|
2014-10-05 20:43:56 +00:00
|
|
|
All operations performed by this command can only be run against server nodes,
|
|
|
|
and affect both the LAN and WAN keyrings in lock-step.
|
|
|
|
|
|
|
|
All variations of the keyring command return 0 if all nodes reply and there
|
|
|
|
are no errors. If any node fails to reply or reports failure, the exit code
|
|
|
|
will be 1.
|
2014-09-13 03:08:54 +00:00
|
|
|
|
2017-02-08 23:25:47 +00:00
|
|
|
` + c.Command.Help()
|
|
|
|
|
2014-09-06 18:12:45 +00:00
|
|
|
return strings.TrimSpace(helpText)
|
|
|
|
}
|
|
|
|
|
2014-09-13 03:08:54 +00:00
|
|
|
func (c *KeyringCommand) Synopsis() string {
|
2014-09-06 18:12:45 +00:00
|
|
|
return "Manages gossip layer encryption keys"
|
|
|
|
}
|