mirror of https://github.com/status-im/consul.git
341 lines
8.6 KiB
Go
341 lines
8.6 KiB
Go
package authmethodupdate
|
|
|
|
import (
|
|
"encoding/json"
|
|
"flag"
|
|
"fmt"
|
|
"io"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/hashicorp/consul/api"
|
|
"github.com/hashicorp/consul/command/acl/authmethod"
|
|
"github.com/hashicorp/consul/command/flags"
|
|
"github.com/hashicorp/consul/command/helpers"
|
|
"github.com/mitchellh/cli"
|
|
)
|
|
|
|
func New(ui cli.Ui) *cmd {
|
|
c := &cmd{UI: ui}
|
|
c.init()
|
|
return c
|
|
}
|
|
|
|
type cmd struct {
|
|
UI cli.Ui
|
|
flags *flag.FlagSet
|
|
http *flags.HTTPFlags
|
|
help string
|
|
|
|
name string
|
|
|
|
displayName string
|
|
description string
|
|
maxTokenTTL time.Duration
|
|
tokenLocality string
|
|
config string
|
|
|
|
k8sHost string
|
|
k8sCACert string
|
|
k8sServiceAccountJWT string
|
|
|
|
noMerge bool
|
|
showMeta bool
|
|
format string
|
|
|
|
testStdin io.Reader
|
|
|
|
enterpriseCmd
|
|
}
|
|
|
|
func (c *cmd) init() {
|
|
c.flags = flag.NewFlagSet("", flag.ContinueOnError)
|
|
|
|
c.flags.BoolVar(
|
|
&c.showMeta,
|
|
"meta",
|
|
false,
|
|
"Indicates that auth method metadata such "+
|
|
"as the raft indices should be shown for each entry.",
|
|
)
|
|
|
|
c.flags.StringVar(
|
|
&c.name,
|
|
"name",
|
|
"",
|
|
"The auth method name.",
|
|
)
|
|
|
|
c.flags.StringVar(
|
|
&c.displayName,
|
|
"display-name",
|
|
"",
|
|
"An optional name to use instead of the name when displaying this auth method in a UI.",
|
|
)
|
|
|
|
c.flags.StringVar(
|
|
&c.description,
|
|
"description",
|
|
"",
|
|
"A description of the auth method.",
|
|
)
|
|
|
|
c.flags.DurationVar(
|
|
&c.maxTokenTTL,
|
|
"max-token-ttl",
|
|
0,
|
|
"Duration of time all tokens created by this auth method should be valid for",
|
|
)
|
|
c.flags.StringVar(
|
|
&c.tokenLocality,
|
|
"token-locality",
|
|
"",
|
|
"Defines the kind of token that this auth method should produce. "+
|
|
"This can be either 'local' or 'global'. If empty the value of 'local' is assumed.",
|
|
)
|
|
|
|
c.flags.StringVar(
|
|
&c.config,
|
|
"config",
|
|
"",
|
|
"The configuration for the auth method. Must be JSON. The config is updated as one field"+
|
|
"May be prefixed with '@' to indicate that the value is a file path to load the config from. "+
|
|
"'-' may also be given to indicate that the config are available on stdin. ",
|
|
)
|
|
|
|
c.flags.StringVar(
|
|
&c.k8sHost,
|
|
"kubernetes-host",
|
|
"",
|
|
"Address of the Kubernetes API server. This flag is required for type=kubernetes.",
|
|
)
|
|
c.flags.StringVar(
|
|
&c.k8sCACert,
|
|
"kubernetes-ca-cert",
|
|
"",
|
|
"PEM encoded CA cert for use by the TLS client used to talk with the "+
|
|
"Kubernetes API. May be prefixed with '@' to indicate that the "+
|
|
"value is a file path to load the cert from. "+
|
|
"This flag is required for type=kubernetes.",
|
|
)
|
|
c.flags.StringVar(
|
|
&c.k8sServiceAccountJWT,
|
|
"kubernetes-service-account-jwt",
|
|
"",
|
|
"A Kubernetes service account JWT used to access the TokenReview API to "+
|
|
"validate other JWTs during login. "+
|
|
"This flag is required for type=kubernetes.",
|
|
)
|
|
|
|
c.flags.BoolVar(&c.noMerge, "no-merge", false, "Do not merge the current auth method "+
|
|
"information with what is provided to the command. Instead overwrite all fields "+
|
|
"with the exception of the name which is immutable.")
|
|
|
|
c.flags.StringVar(
|
|
&c.format,
|
|
"format",
|
|
authmethod.PrettyFormat,
|
|
fmt.Sprintf("Output format {%s}", strings.Join(authmethod.GetSupportedFormats(), "|")),
|
|
)
|
|
|
|
c.initEnterpriseFlags()
|
|
|
|
c.http = &flags.HTTPFlags{}
|
|
flags.Merge(c.flags, c.http.ClientFlags())
|
|
flags.Merge(c.flags, c.http.ServerFlags())
|
|
flags.Merge(c.flags, c.http.MultiTenancyFlags())
|
|
c.help = flags.Usage(help, c.flags)
|
|
}
|
|
|
|
func (c *cmd) Run(args []string) int {
|
|
if err := c.flags.Parse(args); err != nil {
|
|
return 1
|
|
}
|
|
|
|
if c.name == "" {
|
|
c.UI.Error(fmt.Sprintf("Cannot update an auth method without specifying the -name parameter"))
|
|
return 1
|
|
}
|
|
|
|
client, err := c.http.APIClient()
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Error connecting to Consul agent: %s", err))
|
|
return 1
|
|
}
|
|
|
|
// Regardless of merge, we need to fetch the prior immutable fields first.
|
|
currentAuthMethod, _, err := client.ACL().AuthMethodRead(c.name, nil)
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Error when retrieving current auth method: %v", err))
|
|
return 1
|
|
} else if currentAuthMethod == nil {
|
|
c.UI.Error(fmt.Sprintf("Auth method not found with name %q", c.name))
|
|
return 1
|
|
}
|
|
|
|
if c.k8sCACert != "" {
|
|
c.k8sCACert, err = helpers.LoadDataSource(c.k8sCACert, c.testStdin)
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Invalid '-kubernetes-ca-cert' value: %v", err))
|
|
return 1
|
|
} else if c.k8sCACert == "" {
|
|
c.UI.Error(fmt.Sprintf("Kubernetes CA Cert is empty"))
|
|
return 1
|
|
}
|
|
}
|
|
|
|
var method *api.ACLAuthMethod
|
|
if c.noMerge {
|
|
method = &api.ACLAuthMethod{
|
|
Name: currentAuthMethod.Name,
|
|
Type: currentAuthMethod.Type,
|
|
DisplayName: c.displayName,
|
|
Description: c.description,
|
|
TokenLocality: c.tokenLocality,
|
|
}
|
|
if c.maxTokenTTL > 0 {
|
|
method.MaxTokenTTL = c.maxTokenTTL
|
|
}
|
|
|
|
if err := c.enterprisePopulateAuthMethod(method); err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 1
|
|
}
|
|
|
|
if c.config != "" {
|
|
if c.k8sHost != "" || c.k8sCACert != "" || c.k8sServiceAccountJWT != "" {
|
|
c.UI.Error(fmt.Sprintf("Cannot use command line arguments with '-config' flag"))
|
|
return 1
|
|
}
|
|
data, err := helpers.LoadDataSource(c.config, c.testStdin)
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Error loading configuration file: %v", err))
|
|
return 1
|
|
}
|
|
if err := json.Unmarshal([]byte(data), &method.Config); err != nil {
|
|
c.UI.Error(fmt.Sprintf("Error parsing JSON for auth method config: %v", err))
|
|
return 1
|
|
}
|
|
}
|
|
|
|
if currentAuthMethod.Type == "kubernetes" {
|
|
if c.k8sHost == "" {
|
|
c.UI.Error(fmt.Sprintf("Missing required '-kubernetes-host' flag"))
|
|
return 1
|
|
} else if c.k8sCACert == "" {
|
|
c.UI.Error(fmt.Sprintf("Missing required '-kubernetes-ca-cert' flag"))
|
|
return 1
|
|
} else if c.k8sServiceAccountJWT == "" {
|
|
c.UI.Error(fmt.Sprintf("Missing required '-kubernetes-service-account-jwt' flag"))
|
|
return 1
|
|
}
|
|
|
|
method.Config = map[string]interface{}{
|
|
"Host": c.k8sHost,
|
|
"CACert": c.k8sCACert,
|
|
"ServiceAccountJWT": c.k8sServiceAccountJWT,
|
|
}
|
|
}
|
|
} else {
|
|
methodCopy := *currentAuthMethod
|
|
method = &methodCopy
|
|
if c.description != "" {
|
|
method.Description = c.description
|
|
}
|
|
if c.displayName != "" {
|
|
method.DisplayName = c.displayName
|
|
}
|
|
if c.maxTokenTTL > 0 {
|
|
method.MaxTokenTTL = c.maxTokenTTL
|
|
}
|
|
if c.tokenLocality != "" {
|
|
method.TokenLocality = c.tokenLocality
|
|
}
|
|
if err := c.enterprisePopulateAuthMethod(method); err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 1
|
|
}
|
|
if c.config != "" {
|
|
if c.k8sHost != "" || c.k8sCACert != "" || c.k8sServiceAccountJWT != "" {
|
|
c.UI.Error(fmt.Sprintf("Cannot use command line arguments with '-config' flag"))
|
|
return 1
|
|
}
|
|
data, err := helpers.LoadDataSource(c.config, c.testStdin)
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Error loading configuration file: %v", err))
|
|
return 1
|
|
}
|
|
// Don't attempt a deep merge.
|
|
method.Config = make(map[string]interface{})
|
|
if err := json.Unmarshal([]byte(data), &method.Config); err != nil {
|
|
c.UI.Error(fmt.Sprintf("Error parsing JSON for auth method config: %v", err))
|
|
return 1
|
|
}
|
|
}
|
|
if method.Config == nil {
|
|
method.Config = make(map[string]interface{})
|
|
}
|
|
if currentAuthMethod.Type == "kubernetes" {
|
|
if c.k8sHost != "" {
|
|
method.Config["Host"] = c.k8sHost
|
|
}
|
|
if c.k8sCACert != "" {
|
|
method.Config["CACert"] = c.k8sCACert
|
|
}
|
|
if c.k8sServiceAccountJWT != "" {
|
|
method.Config["ServiceAccountJWT"] = c.k8sServiceAccountJWT
|
|
}
|
|
}
|
|
}
|
|
|
|
method, _, err = client.ACL().AuthMethodUpdate(method, nil)
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Error updating auth method %q: %v", c.name, err))
|
|
return 1
|
|
}
|
|
|
|
formatter, err := authmethod.NewFormatter(c.format, c.showMeta)
|
|
if err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 1
|
|
}
|
|
|
|
out, err := formatter.FormatAuthMethod(method)
|
|
if err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 1
|
|
}
|
|
if out != "" {
|
|
c.UI.Info(out)
|
|
}
|
|
|
|
return 0
|
|
}
|
|
|
|
func (c *cmd) Synopsis() string {
|
|
return synopsis
|
|
}
|
|
|
|
func (c *cmd) Help() string {
|
|
return flags.Usage(c.help, nil)
|
|
}
|
|
|
|
const (
|
|
synopsis = "Update an ACL auth method"
|
|
help = `
|
|
Usage: consul acl auth-method update -name NAME [options]
|
|
|
|
Updates an auth method. By default it will merge the auth method
|
|
information with its current state so that you do not have to provide all
|
|
parameters. This behavior can be disabled by passing -no-merge.
|
|
|
|
Update all editable fields of the auth method:
|
|
|
|
$ consul acl auth-method update -name "my-k8s" \
|
|
-description "new description" \
|
|
-kubernetes-host "https://new-apiserver.example.com:8443" \
|
|
-kubernetes-ca-cert @/path/to/new-kube.ca.crt \
|
|
-kubernetes-service-account-jwt "NEW_JWT_CONTENTS"
|
|
`
|
|
)
|