mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-08 07:37:01 +02:00
* Adding explicit MPL license for sub-package. This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Adding explicit MPL license for sub-package. This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Updating the license from MPL to Business Source License. Going forward, this project will be licensed under the Business Source License v1.1. Please see our blog post for more details at https://hashi.co/bsl-blog, FAQ at www.hashicorp.com/licensing-faq, and details of the license at www.hashicorp.com/bsl. * add missing license headers * Update copyright file headers to BUS-1.1 * Fix test that expected exact offset on hcl file --------- Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com> Co-authored-by: Sarah Thompson <sthompson@hashicorp.com> Co-authored-by: Brian Kassouf <bkassouf@hashicorp.com>
107 lines
2.3 KiB
Go
107 lines
2.3 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package command
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/mitchellh/cli"
|
|
"github.com/posener/complete"
|
|
)
|
|
|
|
var (
|
|
_ cli.Command = (*OperatorRotateCommand)(nil)
|
|
_ cli.CommandAutocomplete = (*OperatorRotateCommand)(nil)
|
|
)
|
|
|
|
type OperatorRotateCommand struct {
|
|
*BaseCommand
|
|
}
|
|
|
|
func (c *OperatorRotateCommand) Synopsis() string {
|
|
return "Rotates the underlying encryption key"
|
|
}
|
|
|
|
func (c *OperatorRotateCommand) Help() string {
|
|
helpText := `
|
|
Usage: vault operator rotate [options]
|
|
|
|
Rotates the underlying encryption key which is used to secure data written
|
|
to the storage backend. This installs a new key in the key ring. This new
|
|
key is used to encrypted new data, while older keys in the ring are used to
|
|
decrypt older data.
|
|
|
|
This is an online operation and does not cause downtime. This command is run
|
|
per-cluster (not per-server), since Vault servers in HA mode share the same
|
|
storage backend.
|
|
|
|
Rotate Vault's encryption key:
|
|
|
|
$ vault operator rotate
|
|
|
|
For a full list of examples, please see the documentation.
|
|
|
|
` + c.Flags().Help()
|
|
|
|
return strings.TrimSpace(helpText)
|
|
}
|
|
|
|
func (c *OperatorRotateCommand) Flags() *FlagSets {
|
|
return c.flagSet(FlagSetHTTP | FlagSetOutputFormat)
|
|
}
|
|
|
|
func (c *OperatorRotateCommand) AutocompleteArgs() complete.Predictor {
|
|
return nil
|
|
}
|
|
|
|
func (c *OperatorRotateCommand) AutocompleteFlags() complete.Flags {
|
|
return c.Flags().Completions()
|
|
}
|
|
|
|
func (c *OperatorRotateCommand) Run(args []string) int {
|
|
f := c.Flags()
|
|
|
|
if err := f.Parse(args); err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 1
|
|
}
|
|
|
|
args = f.Args()
|
|
if len(args) > 0 {
|
|
c.UI.Error(fmt.Sprintf("Too many arguments (expected 0, got %d)", len(args)))
|
|
return 1
|
|
}
|
|
|
|
client, err := c.Client()
|
|
if err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 2
|
|
}
|
|
|
|
// Rotate the key
|
|
err = client.Sys().Rotate()
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Error rotating key: %s", err))
|
|
return 2
|
|
}
|
|
|
|
// Print the key status
|
|
status, err := client.Sys().KeyStatus()
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Error reading key status: %s", err))
|
|
return 2
|
|
}
|
|
|
|
switch Format(c.UI) {
|
|
case "table":
|
|
c.UI.Output("Success! Rotated key")
|
|
c.UI.Output("")
|
|
c.UI.Output(printKeyStatus(status))
|
|
return 0
|
|
default:
|
|
return OutputData(c.UI, status)
|
|
}
|
|
}
|