2023-03-15 12:00:52 -04:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
2023-08-10 21:14:03 -04:00
|
|
|
// SPDX-License-Identifier: BUSL-1.1
|
2023-03-15 12:00:52 -04:00
|
|
|
|
2015-03-04 14:08:13 -05:00
|
|
|
package command
|
|
|
|
|
|
|
|
|
|
import (
|
2023-01-17 15:41:59 -05:00
|
|
|
"context"
|
2015-03-15 23:52:28 -04:00
|
|
|
"fmt"
|
2018-08-13 22:00:26 -04:00
|
|
|
"io"
|
|
|
|
|
"os"
|
2015-03-04 14:08:13 -05:00
|
|
|
"strings"
|
2015-09-14 15:42:12 -04:00
|
|
|
|
2023-12-04 14:05:02 -05:00
|
|
|
"github.com/hashicorp/cli"
|
2017-08-24 18:23:40 -04:00
|
|
|
"github.com/posener/complete"
|
2015-03-04 14:08:13 -05:00
|
|
|
)
|
|
|
|
|
|
2021-04-08 12:43:39 -04:00
|
|
|
var (
|
|
|
|
|
_ cli.Command = (*ReadCommand)(nil)
|
|
|
|
|
_ cli.CommandAutocomplete = (*ReadCommand)(nil)
|
|
|
|
|
)
|
2017-09-05 00:03:36 -04:00
|
|
|
|
2015-03-15 23:35:33 -04:00
|
|
|
type ReadCommand struct {
|
2017-09-05 00:03:36 -04:00
|
|
|
*BaseCommand
|
2018-08-13 22:00:26 -04:00
|
|
|
|
|
|
|
|
testStdin io.Reader // for tests
|
2017-09-05 00:03:36 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *ReadCommand) Synopsis() string {
|
2017-09-07 22:00:30 -04:00
|
|
|
return "Read data and retrieves secrets"
|
2017-09-05 00:03:36 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *ReadCommand) Help() string {
|
|
|
|
|
helpText := `
|
|
|
|
|
Usage: vault read [options] PATH
|
|
|
|
|
|
|
|
|
|
Reads data from Vault at the given path. This can be used to read secrets,
|
|
|
|
|
generate dynamic credentials, get configuration details, and more.
|
|
|
|
|
|
2024-08-09 11:48:21 -04:00
|
|
|
Read details of your own token:
|
2017-09-05 00:03:36 -04:00
|
|
|
|
2024-08-09 11:48:21 -04:00
|
|
|
$ vault read auth/token/lookup-self
|
|
|
|
|
|
|
|
|
|
Read entity details of a given ID:
|
|
|
|
|
|
|
|
|
|
$ vault read identity/entity/id/2f09126d-d161-abb8-2241-555886491d97
|
|
|
|
|
|
|
|
|
|
Generate credentials for my-role in an AWS secrets engine:
|
|
|
|
|
|
|
|
|
|
$ vault read aws/creds/my-role
|
2017-09-05 00:03:36 -04:00
|
|
|
|
|
|
|
|
For a full list of examples and paths, please see the documentation that
|
2017-09-07 22:00:30 -04:00
|
|
|
corresponds to the secrets engine in use.
|
2017-09-05 00:03:36 -04:00
|
|
|
|
|
|
|
|
` + c.Flags().Help()
|
|
|
|
|
|
|
|
|
|
return strings.TrimSpace(helpText)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *ReadCommand) Flags() *FlagSets {
|
|
|
|
|
return c.flagSet(FlagSetHTTP | FlagSetOutputField | FlagSetOutputFormat)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *ReadCommand) AutocompleteArgs() complete.Predictor {
|
|
|
|
|
return c.PredictVaultFiles()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *ReadCommand) AutocompleteFlags() complete.Flags {
|
|
|
|
|
return c.Flags().Completions()
|
2015-03-04 14:08:13 -05:00
|
|
|
}
|
|
|
|
|
|
2015-03-15 23:35:33 -04:00
|
|
|
func (c *ReadCommand) Run(args []string) int {
|
2017-09-05 00:03:36 -04:00
|
|
|
f := c.Flags()
|
|
|
|
|
|
2022-10-28 12:53:23 -04:00
|
|
|
if err := f.Parse(args, ParseOptionAllowRawFormat(true)); err != nil {
|
2017-09-05 00:03:36 -04:00
|
|
|
c.UI.Error(err.Error())
|
2015-03-04 14:08:13 -05:00
|
|
|
return 1
|
|
|
|
|
}
|
|
|
|
|
|
2017-09-05 00:03:36 -04:00
|
|
|
args = f.Args()
|
2017-09-07 22:00:30 -04:00
|
|
|
switch {
|
|
|
|
|
case len(args) < 1:
|
|
|
|
|
c.UI.Error(fmt.Sprintf("Not enough arguments (expected 1, got %d)", len(args)))
|
2015-03-15 23:52:28 -04:00
|
|
|
return 1
|
2015-06-17 21:33:15 -04:00
|
|
|
}
|
2015-03-15 23:52:28 -04:00
|
|
|
|
|
|
|
|
client, err := c.Client()
|
|
|
|
|
if err != nil {
|
2017-09-05 00:03:36 -04:00
|
|
|
c.UI.Error(err.Error())
|
2015-03-15 23:52:28 -04:00
|
|
|
return 2
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-17 15:41:59 -05:00
|
|
|
// client.ReadRaw* methods require a manual timeout override
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), client.ClientTimeout())
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
2018-08-13 22:00:26 -04:00
|
|
|
// Pull our fake stdin if needed
|
|
|
|
|
stdin := (io.Reader)(os.Stdin)
|
|
|
|
|
if c.testStdin != nil {
|
|
|
|
|
stdin = c.testStdin
|
|
|
|
|
}
|
|
|
|
|
|
2017-09-07 22:00:30 -04:00
|
|
|
path := sanitizePath(args[0])
|
|
|
|
|
|
2018-08-13 22:00:26 -04:00
|
|
|
data, err := parseArgsDataStringLists(stdin, args[1:])
|
|
|
|
|
if err != nil {
|
|
|
|
|
c.UI.Error(fmt.Sprintf("Failed to parse K=V data: %s", err))
|
|
|
|
|
return 1
|
|
|
|
|
}
|
|
|
|
|
|
Vault Raw Read Support (CLI & Client) (#14945)
* Expose raw request from client.Logical()
Not all Vault API endpoints return well-formatted JSON objects.
Sometimes, in the case of the PKI secrets engine, they're not even
printable (/pki/ca returns a binary (DER-encoded) certificate). While
this endpoint isn't authenticated, in general the API caller would
either need to use Client.RawRequestWithContext(...) directly (which
the docs advise against), or setup their own net/http client and
re-create much of Client and/or Client.Logical.
Instead, exposing the raw Request (via the new ReadRawWithData(...))
allows callers to directly consume these non-JSON endpoints like they
would nearly any other endpoint.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add raw formatter for direct []byte data
As mentioned in the previous commit, some API endpoints return non-JSON
data. We get as far as fetching this data (via client.Logical().Read),
but parsing it as an api.Secret fails (as in this case, it is non-JSON).
Given that we intend to update `vault read` to support such endpoints,
we'll need a "raw" formatter that accepts []byte-encoded data and simply
writes it to the UI.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add support for reading raw API endpoints
Some endpoints, such as `pki/ca` and `pki/ca/pem` return non-JSON
objects. When calling `vault read` on these endpoints, an error
is returned because they cannot be parsed as api.Secret instances:
> Error reading pki/ca/pem: invalid character '-' in numeric literal
Indeed, we go to all the trouble of (successfully) fetching this value,
only to be unable to Unmarshal into a Secrets value. Instead, add
support for a new -format=raw option, allowing these endpoints to be
consumed by callers of `vault read` directly.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add changelog entry
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Remove panic
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-10-28 09:45:32 -04:00
|
|
|
if Format(c.UI) != "raw" {
|
2023-01-17 15:41:59 -05:00
|
|
|
secret, err := client.Logical().ReadWithDataWithContext(ctx, path, data)
|
Vault Raw Read Support (CLI & Client) (#14945)
* Expose raw request from client.Logical()
Not all Vault API endpoints return well-formatted JSON objects.
Sometimes, in the case of the PKI secrets engine, they're not even
printable (/pki/ca returns a binary (DER-encoded) certificate). While
this endpoint isn't authenticated, in general the API caller would
either need to use Client.RawRequestWithContext(...) directly (which
the docs advise against), or setup their own net/http client and
re-create much of Client and/or Client.Logical.
Instead, exposing the raw Request (via the new ReadRawWithData(...))
allows callers to directly consume these non-JSON endpoints like they
would nearly any other endpoint.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add raw formatter for direct []byte data
As mentioned in the previous commit, some API endpoints return non-JSON
data. We get as far as fetching this data (via client.Logical().Read),
but parsing it as an api.Secret fails (as in this case, it is non-JSON).
Given that we intend to update `vault read` to support such endpoints,
we'll need a "raw" formatter that accepts []byte-encoded data and simply
writes it to the UI.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add support for reading raw API endpoints
Some endpoints, such as `pki/ca` and `pki/ca/pem` return non-JSON
objects. When calling `vault read` on these endpoints, an error
is returned because they cannot be parsed as api.Secret instances:
> Error reading pki/ca/pem: invalid character '-' in numeric literal
Indeed, we go to all the trouble of (successfully) fetching this value,
only to be unable to Unmarshal into a Secrets value. Instead, add
support for a new -format=raw option, allowing these endpoints to be
consumed by callers of `vault read` directly.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add changelog entry
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Remove panic
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-10-28 09:45:32 -04:00
|
|
|
if err != nil {
|
|
|
|
|
c.UI.Error(fmt.Sprintf("Error reading %s: %s", path, err))
|
|
|
|
|
return 2
|
|
|
|
|
}
|
|
|
|
|
if secret == nil {
|
|
|
|
|
c.UI.Error(fmt.Sprintf("No value found at %s", path))
|
|
|
|
|
return 2
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if c.flagField != "" {
|
|
|
|
|
return PrintRawField(c.UI, secret, c.flagField)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return OutputSecret(c.UI, secret)
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-17 15:41:59 -05:00
|
|
|
resp, err := client.Logical().ReadRawWithDataWithContext(ctx, path, data)
|
2015-03-15 23:52:28 -04:00
|
|
|
if err != nil {
|
Vault Raw Read Support (CLI & Client) (#14945)
* Expose raw request from client.Logical()
Not all Vault API endpoints return well-formatted JSON objects.
Sometimes, in the case of the PKI secrets engine, they're not even
printable (/pki/ca returns a binary (DER-encoded) certificate). While
this endpoint isn't authenticated, in general the API caller would
either need to use Client.RawRequestWithContext(...) directly (which
the docs advise against), or setup their own net/http client and
re-create much of Client and/or Client.Logical.
Instead, exposing the raw Request (via the new ReadRawWithData(...))
allows callers to directly consume these non-JSON endpoints like they
would nearly any other endpoint.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add raw formatter for direct []byte data
As mentioned in the previous commit, some API endpoints return non-JSON
data. We get as far as fetching this data (via client.Logical().Read),
but parsing it as an api.Secret fails (as in this case, it is non-JSON).
Given that we intend to update `vault read` to support such endpoints,
we'll need a "raw" formatter that accepts []byte-encoded data and simply
writes it to the UI.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add support for reading raw API endpoints
Some endpoints, such as `pki/ca` and `pki/ca/pem` return non-JSON
objects. When calling `vault read` on these endpoints, an error
is returned because they cannot be parsed as api.Secret instances:
> Error reading pki/ca/pem: invalid character '-' in numeric literal
Indeed, we go to all the trouble of (successfully) fetching this value,
only to be unable to Unmarshal into a Secrets value. Instead, add
support for a new -format=raw option, allowing these endpoints to be
consumed by callers of `vault read` directly.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add changelog entry
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Remove panic
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-10-28 09:45:32 -04:00
|
|
|
c.UI.Error(fmt.Sprintf("Error reading: %s: %s", path, err))
|
2017-09-05 00:03:36 -04:00
|
|
|
return 2
|
2015-03-15 23:52:28 -04:00
|
|
|
}
|
Vault Raw Read Support (CLI & Client) (#14945)
* Expose raw request from client.Logical()
Not all Vault API endpoints return well-formatted JSON objects.
Sometimes, in the case of the PKI secrets engine, they're not even
printable (/pki/ca returns a binary (DER-encoded) certificate). While
this endpoint isn't authenticated, in general the API caller would
either need to use Client.RawRequestWithContext(...) directly (which
the docs advise against), or setup their own net/http client and
re-create much of Client and/or Client.Logical.
Instead, exposing the raw Request (via the new ReadRawWithData(...))
allows callers to directly consume these non-JSON endpoints like they
would nearly any other endpoint.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add raw formatter for direct []byte data
As mentioned in the previous commit, some API endpoints return non-JSON
data. We get as far as fetching this data (via client.Logical().Read),
but parsing it as an api.Secret fails (as in this case, it is non-JSON).
Given that we intend to update `vault read` to support such endpoints,
we'll need a "raw" formatter that accepts []byte-encoded data and simply
writes it to the UI.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add support for reading raw API endpoints
Some endpoints, such as `pki/ca` and `pki/ca/pem` return non-JSON
objects. When calling `vault read` on these endpoints, an error
is returned because they cannot be parsed as api.Secret instances:
> Error reading pki/ca/pem: invalid character '-' in numeric literal
Indeed, we go to all the trouble of (successfully) fetching this value,
only to be unable to Unmarshal into a Secrets value. Instead, add
support for a new -format=raw option, allowing these endpoints to be
consumed by callers of `vault read` directly.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add changelog entry
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Remove panic
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-10-28 09:45:32 -04:00
|
|
|
if resp == nil || resp.Body == nil {
|
2017-09-05 00:03:36 -04:00
|
|
|
c.UI.Error(fmt.Sprintf("No value found at %s", path))
|
|
|
|
|
return 2
|
2015-04-19 01:05:08 -04:00
|
|
|
}
|
Vault Raw Read Support (CLI & Client) (#14945)
* Expose raw request from client.Logical()
Not all Vault API endpoints return well-formatted JSON objects.
Sometimes, in the case of the PKI secrets engine, they're not even
printable (/pki/ca returns a binary (DER-encoded) certificate). While
this endpoint isn't authenticated, in general the API caller would
either need to use Client.RawRequestWithContext(...) directly (which
the docs advise against), or setup their own net/http client and
re-create much of Client and/or Client.Logical.
Instead, exposing the raw Request (via the new ReadRawWithData(...))
allows callers to directly consume these non-JSON endpoints like they
would nearly any other endpoint.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add raw formatter for direct []byte data
As mentioned in the previous commit, some API endpoints return non-JSON
data. We get as far as fetching this data (via client.Logical().Read),
but parsing it as an api.Secret fails (as in this case, it is non-JSON).
Given that we intend to update `vault read` to support such endpoints,
we'll need a "raw" formatter that accepts []byte-encoded data and simply
writes it to the UI.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add support for reading raw API endpoints
Some endpoints, such as `pki/ca` and `pki/ca/pem` return non-JSON
objects. When calling `vault read` on these endpoints, an error
is returned because they cannot be parsed as api.Secret instances:
> Error reading pki/ca/pem: invalid character '-' in numeric literal
Indeed, we go to all the trouble of (successfully) fetching this value,
only to be unable to Unmarshal into a Secrets value. Instead, add
support for a new -format=raw option, allowing these endpoints to be
consumed by callers of `vault read` directly.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add changelog entry
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Remove panic
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-10-28 09:45:32 -04:00
|
|
|
defer resp.Body.Close()
|
2015-03-15 23:52:28 -04:00
|
|
|
|
Vault Raw Read Support (CLI & Client) (#14945)
* Expose raw request from client.Logical()
Not all Vault API endpoints return well-formatted JSON objects.
Sometimes, in the case of the PKI secrets engine, they're not even
printable (/pki/ca returns a binary (DER-encoded) certificate). While
this endpoint isn't authenticated, in general the API caller would
either need to use Client.RawRequestWithContext(...) directly (which
the docs advise against), or setup their own net/http client and
re-create much of Client and/or Client.Logical.
Instead, exposing the raw Request (via the new ReadRawWithData(...))
allows callers to directly consume these non-JSON endpoints like they
would nearly any other endpoint.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add raw formatter for direct []byte data
As mentioned in the previous commit, some API endpoints return non-JSON
data. We get as far as fetching this data (via client.Logical().Read),
but parsing it as an api.Secret fails (as in this case, it is non-JSON).
Given that we intend to update `vault read` to support such endpoints,
we'll need a "raw" formatter that accepts []byte-encoded data and simply
writes it to the UI.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add support for reading raw API endpoints
Some endpoints, such as `pki/ca` and `pki/ca/pem` return non-JSON
objects. When calling `vault read` on these endpoints, an error
is returned because they cannot be parsed as api.Secret instances:
> Error reading pki/ca/pem: invalid character '-' in numeric literal
Indeed, we go to all the trouble of (successfully) fetching this value,
only to be unable to Unmarshal into a Secrets value. Instead, add
support for a new -format=raw option, allowing these endpoints to be
consumed by callers of `vault read` directly.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add changelog entry
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Remove panic
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-10-28 09:45:32 -04:00
|
|
|
contents, err := io.ReadAll(resp.Body)
|
|
|
|
|
if err != nil {
|
|
|
|
|
c.UI.Error(fmt.Sprintf("Error reading: %s: %s", path, err))
|
|
|
|
|
return 2
|
2015-05-22 14:28:23 -04:00
|
|
|
}
|
|
|
|
|
|
Vault Raw Read Support (CLI & Client) (#14945)
* Expose raw request from client.Logical()
Not all Vault API endpoints return well-formatted JSON objects.
Sometimes, in the case of the PKI secrets engine, they're not even
printable (/pki/ca returns a binary (DER-encoded) certificate). While
this endpoint isn't authenticated, in general the API caller would
either need to use Client.RawRequestWithContext(...) directly (which
the docs advise against), or setup their own net/http client and
re-create much of Client and/or Client.Logical.
Instead, exposing the raw Request (via the new ReadRawWithData(...))
allows callers to directly consume these non-JSON endpoints like they
would nearly any other endpoint.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add raw formatter for direct []byte data
As mentioned in the previous commit, some API endpoints return non-JSON
data. We get as far as fetching this data (via client.Logical().Read),
but parsing it as an api.Secret fails (as in this case, it is non-JSON).
Given that we intend to update `vault read` to support such endpoints,
we'll need a "raw" formatter that accepts []byte-encoded data and simply
writes it to the UI.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add support for reading raw API endpoints
Some endpoints, such as `pki/ca` and `pki/ca/pem` return non-JSON
objects. When calling `vault read` on these endpoints, an error
is returned because they cannot be parsed as api.Secret instances:
> Error reading pki/ca/pem: invalid character '-' in numeric literal
Indeed, we go to all the trouble of (successfully) fetching this value,
only to be unable to Unmarshal into a Secrets value. Instead, add
support for a new -format=raw option, allowing these endpoints to be
consumed by callers of `vault read` directly.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add changelog entry
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Remove panic
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-10-28 09:45:32 -04:00
|
|
|
return OutputData(c.UI, contents)
|
2017-08-24 18:23:40 -04:00
|
|
|
}
|