consul/command/kv/get/kv_get.go

279 lines
7.1 KiB
Go
Raw Normal View History

// Copyright (c) HashiCorp, Inc.
[COMPLIANCE] License changes (#18443) * Adding explicit MPL license for sub-package This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Adding explicit MPL license for sub-package This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Updating the license from MPL to Business Source License Going forward, this project will be licensed under the Business Source License v1.1. Please see our blog post for more details at <Blog URL>, FAQ at www.hashicorp.com/licensing-faq, and details of the license at www.hashicorp.com/bsl. * add missing license headers * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 * Update copyright file headers to BUSL-1.1 --------- Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>
2023-08-11 13:12:13 +00:00
// SPDX-License-Identifier: BUSL-1.1
package get
2016-09-26 15:12:14 +00:00
import (
"bytes"
"encoding/base64"
"flag"
2016-09-26 15:12:14 +00:00
"fmt"
"io"
"text/tabwriter"
"github.com/hashicorp/consul/api"
"github.com/hashicorp/consul/command/flags"
"github.com/mitchellh/cli"
2016-09-26 15:12:14 +00:00
)
func New(ui cli.Ui) *cmd {
c := &cmd{UI: ui}
c.init()
return c
}
type cmd struct {
UI cli.Ui
flags *flag.FlagSet
http *flags.HTTPFlags
help string
base64encode bool
detailed bool
keys bool
recurse bool
separator string
}
func (c *cmd) init() {
c.flags = flag.NewFlagSet("", flag.ContinueOnError)
c.flags.BoolVar(&c.base64encode, "base64", false,
"Base64 encode the value. The default value is false.")
c.flags.BoolVar(&c.detailed, "detailed", false,
"Provide additional metadata about the key in addition to the value such "+
"as the ModifyIndex and any flags that may have been set on the key. "+
"The default value is false.")
c.flags.BoolVar(&c.keys, "keys", false,
"List keys which start with the given prefix, but not their values. "+
"This is especially useful if you only need the key names themselves. "+
"This option is commonly combined with the -separator option. The default "+
"value is false.")
c.flags.BoolVar(&c.recurse, "recurse", false,
"Recursively look at all keys prefixed with the given path. The default "+
"value is false.")
c.flags.StringVar(&c.separator, "separator", "/",
"String to use as a separator between keys. The default value is \"/\", "+
"but this option is only taken into account when paired with the -keys flag.")
2016-09-26 15:12:14 +00:00
c.http = &flags.HTTPFlags{}
flags.Merge(c.flags, c.http.ClientFlags())
flags.Merge(c.flags, c.http.ServerFlags())
flags.Merge(c.flags, c.http.MultiTenancyFlags())
c.help = flags.Usage(help, c.flags)
2016-09-26 15:12:14 +00:00
}
func (c *cmd) Run(args []string) int {
if err := c.flags.Parse(args); err != nil {
2016-09-26 15:12:14 +00:00
return 1
}
key := ""
// Check for arg validation
args = c.flags.Args()
2016-09-26 15:12:14 +00:00
switch len(args) {
case 0:
key = ""
case 1:
key = args[0]
default:
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Too many arguments (expected 1, got %d)", len(args)))
2016-09-26 15:12:14 +00:00
return 1
}
// This is just a "nice" thing to do. Since pairs cannot start with a /, but
// users will likely put "/" or "/foo", lets go ahead and strip that for them
// here.
if len(key) > 0 && key[0] == '/' {
key = key[1:]
}
// If the key is empty and we are not doing a recursive or key-based lookup,
// this is an error.
if key == "" && !(c.recurse || c.keys) {
2017-04-21 00:02:42 +00:00
c.UI.Error("Error! Missing KEY argument")
2016-09-26 15:12:14 +00:00
return 1
}
// Create and test the HTTP client
client, err := c.http.APIClient()
2016-09-26 15:12:14 +00:00
if err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error connecting to Consul agent: %s", err))
2016-09-26 15:12:14 +00:00
return 1
}
switch {
case c.keys && c.recurse:
pairs, _, err := client.KV().List(key, &api.QueryOptions{
AllowStale: c.http.Stale(),
})
if err != nil {
c.UI.Error(fmt.Sprintf("Error querying Consul agent: %s", err))
return 1
}
for i, pair := range pairs {
if c.detailed {
var b bytes.Buffer
if err := prettyKVPair(&b, pair, false, true); err != nil {
c.UI.Error(fmt.Sprintf("Error rendering KV key: %s", err))
return 1
}
c.UI.Info(b.String())
if i < len(pairs)-1 {
c.UI.Info("")
}
} else {
c.UI.Info(fmt.Sprintf("%s", pair.Key))
}
}
return 0
case c.keys:
keys, _, err := client.KV().Keys(key, c.separator, &api.QueryOptions{
AllowStale: c.http.Stale(),
2016-09-26 15:12:14 +00:00
})
if err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error querying Consul agent: %s", err))
2016-09-26 15:12:14 +00:00
return 1
}
for _, k := range keys {
c.UI.Info(k)
2016-09-26 15:12:14 +00:00
}
return 0
case c.recurse:
2016-09-26 15:12:14 +00:00
pairs, _, err := client.KV().List(key, &api.QueryOptions{
AllowStale: c.http.Stale(),
2016-09-26 15:12:14 +00:00
})
if err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error querying Consul agent: %s", err))
2016-09-26 15:12:14 +00:00
return 1
}
for i, pair := range pairs {
if c.detailed {
2016-09-26 15:12:14 +00:00
var b bytes.Buffer
if err := prettyKVPair(&b, pair, c.base64encode, false); err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error rendering KV pair: %s", err))
2016-09-26 15:12:14 +00:00
return 1
}
2017-04-21 00:02:42 +00:00
c.UI.Info(b.String())
2016-09-26 15:12:14 +00:00
if i < len(pairs)-1 {
2017-04-21 00:02:42 +00:00
c.UI.Info("")
2016-09-26 15:12:14 +00:00
}
} else {
if c.base64encode {
2017-04-21 00:02:42 +00:00
c.UI.Info(fmt.Sprintf("%s:%s", pair.Key, base64.StdEncoding.EncodeToString(pair.Value)))
} else {
2017-04-21 00:02:42 +00:00
c.UI.Info(fmt.Sprintf("%s:%s", pair.Key, pair.Value))
}
2016-09-26 15:12:14 +00:00
}
}
return 0
default:
pair, _, err := client.KV().Get(key, &api.QueryOptions{
AllowStale: c.http.Stale(),
2016-09-26 15:12:14 +00:00
})
if err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error querying Consul agent: %s", err))
2016-09-26 15:12:14 +00:00
return 1
}
if pair == nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error! No key exists at: %s", key))
2016-09-26 15:12:14 +00:00
return 1
}
if c.detailed {
2016-09-26 15:12:14 +00:00
var b bytes.Buffer
if err := prettyKVPair(&b, pair, c.base64encode, false); err != nil {
2017-04-21 00:02:42 +00:00
c.UI.Error(fmt.Sprintf("Error rendering KV pair: %s", err))
2016-09-26 15:12:14 +00:00
return 1
}
2017-04-21 00:02:42 +00:00
c.UI.Info(b.String())
2016-09-26 15:12:14 +00:00
return 0
}
if c.base64encode {
c.UI.Info(base64.StdEncoding.EncodeToString(pair.Value))
} else {
c.UI.Info(string(pair.Value))
}
return 0
2016-09-26 15:12:14 +00:00
}
}
func (c *cmd) Synopsis() string {
return synopsis
2016-09-26 15:12:14 +00:00
}
func (c *cmd) Help() string {
return c.help
}
func prettyKVPair(w io.Writer, pair *api.KVPair, base64EncodeValue bool, keysOnly bool) error {
tw := tabwriter.NewWriter(w, 0, 2, 6, ' ', 0)
fmt.Fprintf(tw, "CreateIndex\t%d\n", pair.CreateIndex)
fmt.Fprintf(tw, "Flags\t%d\n", pair.Flags)
fmt.Fprintf(tw, "Key\t%s\n", pair.Key)
fmt.Fprintf(tw, "LockIndex\t%d\n", pair.LockIndex)
fmt.Fprintf(tw, "ModifyIndex\t%d\n", pair.ModifyIndex)
if pair.Session == "" {
fmt.Fprint(tw, "Session\t-\n")
} else {
fmt.Fprintf(tw, "Session\t%s\n", pair.Session)
}
if pair.Partition != "" {
fmt.Fprintf(tw, "Partition\t%s\n", pair.Partition)
}
if pair.Namespace != "" {
fmt.Fprintf(tw, "Namespace\t%s\n", pair.Namespace)
}
if !keysOnly && base64EncodeValue {
fmt.Fprintf(tw, "Value\t%s", base64.StdEncoding.EncodeToString(pair.Value))
} else if !keysOnly {
fmt.Fprintf(tw, "Value\t%s", pair.Value)
}
return tw.Flush()
}
const (
synopsis = "Retrieves or lists data from the KV store"
help = `
Usage: consul kv get [options] [KEY_OR_PREFIX]
Retrieves the value from Consul's key-value store at the given key name. If no
key exists with that name, an error is returned. If a key exists with that
name but has no data, nothing is returned. If the name or prefix is omitted,
it defaults to "" which is the root of the key-value store.
To retrieve the value for the key named "foo" in the key-value store:
$ consul kv get foo
This will return the original, raw value stored in Consul. To view detailed
information about the key, specify the "-detailed" flag. This will output all
known metadata about the key including ModifyIndex and any user-supplied
flags:
$ consul kv get -detailed foo
To treat the path as a prefix and list all keys which start with the given
prefix, specify the "-recurse" flag:
$ consul kv get -recurse foo
This will return all key-value pairs. To just list the keys which start with
the specified prefix, use the "-keys" option instead:
$ consul kv get -keys foo
For a full list of options and examples, please see the Consul documentation.
`
)