consul/command/kv/put/kv_put.go

240 lines
6.3 KiB
Go
Raw Normal View History

// Copyright (c) HashiCorp, Inc.
[COMPLIANCE] License changes (#18443) * Adding explicit MPL license for sub-package This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Adding explicit MPL license for sub-package This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Updating the license from MPL to Business Source License Going forward, this project will be licensed under the Business Source License v1.1. Please see our blog post for more details at <Blog URL>, FAQ at www.hashicorp.com/licensing-faq, and details of the license at www.hashicorp.com/bsl. * add missing license headers * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 --------- Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>
2023-08-11 13:12:13 +00:00
// SPDX-License-Identifier: BUSL-1.1
package put
2016-09-26 15:12:29 +00:00
import (
"encoding/base64"
"flag"
2016-09-26 15:12:29 +00:00
"fmt"
"io"
"github.com/hashicorp/consul/api"
"github.com/hashicorp/consul/command/flags"
"github.com/hashicorp/consul/command/helpers"
"github.com/mitchellh/cli"
2016-09-26 15:12:29 +00:00
)
func New(ui cli.Ui) *cmd {
c := &cmd{UI: ui}
c.init()
return c
}
2016-09-26 15:12:29 +00:00
type cmd struct {
UI cli.Ui
flags *flag.FlagSet
http *flags.HTTPFlags
help string
// flags
cas bool
kvflags uint64
base64encoded bool
modifyIndex uint64
session string
acquire bool
release bool
// testStdin is the input for testing.
testStdin io.Reader
}
func (c *cmd) init() {
c.flags = flag.NewFlagSet("", flag.ContinueOnError)
c.flags.BoolVar(&c.cas, "cas", false,
"Perform a Check-And-Set operation. Specifying this value also "+
"requires the -modify-index flag to be set. The default value "+
"is false.")
c.flags.Uint64Var(&c.kvflags, "flags", 0,
"Unsigned integer value to assign to this key-value pair. This "+
"value is not read by Consul, so clients can use this value however "+
"makes sense for their use case. The default value is 0 (no flags).")
c.flags.BoolVar(&c.base64encoded, "base64", false,
"Treat the data as base 64 encoded. The default value is false.")
c.flags.Uint64Var(&c.modifyIndex, "modify-index", 0,
"Unsigned integer representing the ModifyIndex of the key. This is "+
"used in combination with the -cas flag.")
c.flags.StringVar(&c.session, "session", "",
"User-defined identifer for this session as a string. This is commonly "+
"used with the -acquire and -release operations to build robust locking, "+
"but it can be set on any key. The default value is empty (no session).")
c.flags.BoolVar(&c.acquire, "acquire", false,
"Obtain a lock on the key. If the key does not exist, this operation "+
"will create the key and obtain the lock. The session must already "+
"exist and be specified via the -session flag. The default value is false.")
c.flags.BoolVar(&c.release, "release", false,
"Forfeit the lock on the key at the given path. This requires the "+
"-session flag to be set. The key must be held by the session in order to "+
"be unlocked. The default value is false.")
2016-09-26 15:12:29 +00:00
c.http = &flags.HTTPFlags{}
flags.Merge(c.flags, c.http.ClientFlags())
flags.Merge(c.flags, c.http.ServerFlags())
flags.Merge(c.flags, c.http.MultiTenancyFlags())
c.help = flags.Usage(help, c.flags)
2016-09-26 15:12:29 +00:00
}
func (c *cmd) Run(args []string) int {
if err := c.flags.Parse(args); err != nil {
2016-09-26 15:12:29 +00:00
return 1
}
// Check for arg validation
args = c.flags.Args()
2016-09-26 15:12:29 +00:00
key, data, err := c.dataFromArgs(args)
if err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error! %s", err))
2016-09-26 15:12:29 +00:00
return 1
}
dataBytes := []byte(data)
if c.base64encoded {
dataBytes, err = base64.StdEncoding.DecodeString(data)
if err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error! Cannot base 64 decode data: %s", err))
}
}
// Session is required for release or acquire
if (c.release || c.acquire) && c.session == "" {
2017-04-21 00:02:42 +00:00
c.UI.Error("Error! Missing -session (required with -acquire and -release)")
2016-09-26 15:12:29 +00:00
return 1
}
// Create and test the HTTP client
client, err := c.http.APIClient()
2016-09-26 15:12:29 +00:00
if err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error connecting to Consul agent: %s", err))
2016-09-26 15:12:29 +00:00
return 1
}
pair := &api.KVPair{
Key: key,
ModifyIndex: c.modifyIndex,
Flags: c.kvflags,
Value: dataBytes,
Session: c.session,
2016-09-26 15:12:29 +00:00
}
switch {
case c.cas:
ok, _, err := client.KV().CAS(pair, nil)
2016-09-26 15:12:29 +00:00
if err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error! Did not write to %s: %s", key, err))
2016-09-26 15:12:29 +00:00
return 1
}
if !ok && c.modifyIndex == 0 {
c.UI.Error(fmt.Sprintf("Error! Did not write to %s: CAS performed with index=0 and key already exists.", key))
return 1
}
2016-09-26 15:12:29 +00:00
if !ok {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error! Did not write to %s: CAS failed", key))
2016-09-26 15:12:29 +00:00
return 1
}
2017-04-21 00:02:42 +00:00
c.UI.Info(fmt.Sprintf("Success! Data written to: %s", key))
2016-09-26 15:12:29 +00:00
return 0
case c.acquire:
ok, _, err := client.KV().Acquire(pair, nil)
2016-09-26 15:12:29 +00:00
if err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error! Failed writing data: %s", err))
2016-09-26 15:12:29 +00:00
return 1
}
if !ok {
2017-04-21 00:02:42 +00:00
c.UI.Error("Error! Did not acquire lock")
2016-09-26 15:12:29 +00:00
return 1
}
2017-04-21 00:02:42 +00:00
c.UI.Info(fmt.Sprintf("Success! Lock acquired on: %s", key))
2016-09-26 15:12:29 +00:00
return 0
case c.release:
ok, _, err := client.KV().Release(pair, nil)
2016-09-26 15:12:29 +00:00
if err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error! Failed writing data: %s", key))
2016-09-26 15:12:29 +00:00
return 1
}
if !ok {
2017-04-21 00:02:42 +00:00
c.UI.Error("Error! Did not release lock")
2016-09-26 15:12:29 +00:00
return 1
}
2017-04-21 00:02:42 +00:00
c.UI.Info(fmt.Sprintf("Success! Lock released on: %s", key))
2016-09-26 15:12:29 +00:00
return 0
default:
if _, err := client.KV().Put(pair, nil); err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error! Failed writing data: %s", err))
2016-09-26 15:12:29 +00:00
return 1
}
2017-04-21 00:02:42 +00:00
c.UI.Info(fmt.Sprintf("Success! Data written to: %s", key))
2016-09-26 15:12:29 +00:00
return 0
}
}
func (c *cmd) dataFromArgs(args []string) (string, string, error) {
2016-09-26 15:12:29 +00:00
switch len(args) {
case 0:
return "", "", fmt.Errorf("Missing KEY argument")
case 1:
return args[0], "", nil
case 2:
default:
return "", "", fmt.Errorf("Too many arguments (expected 1 or 2, got %d)", len(args))
}
key := args[0]
data, err := helpers.LoadDataSource(args[1], c.testStdin)
2016-09-26 15:12:29 +00:00
if err != nil {
return "", "", err
} else {
2016-09-26 15:12:29 +00:00
return key, data, nil
}
}
func (c *cmd) Synopsis() string {
return synopsis
}
func (c *cmd) Help() string {
return c.help
}
const (
synopsis = "Sets or updates data in the KV store"
help = `
Usage: consul kv put [options] KEY [DATA]
Writes the data to the given path in the key-value store. The data can be of
any type.
$ consul kv put config/redis/maxconns 5
The data can also be consumed from a file on disk by prefixing with the "@"
symbol. For example:
$ consul kv put config/program/license @license.lic
Or it can be read from stdin using the "-" symbol:
$ echo "abcd1234" | consul kv put config/program/license -
The DATA argument itself is optional. If omitted, this will create an empty
key-value pair at the specified path:
$ consul kv put webapp/beta/active
If the -base64 flag is specified, the data will be treated as base 64
encoded.
To perform a Check-And-Set operation, specify the -cas flag with the
appropriate -modify-index flag corresponding to the key you want to perform
the CAS operation on:
$ consul kv put -cas -modify-index=844 config/redis/maxconns 5
Additional flags and more advanced use cases are detailed below.
`
)