mirror of https://github.com/hashicorp/consul
175 lines
3.7 KiB
Go
175 lines
3.7 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package bindingrulecreate
|
|
|
|
import (
|
|
"flag"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/hashicorp/consul/api"
|
|
"github.com/hashicorp/consul/command/acl/bindingrule"
|
|
"github.com/hashicorp/consul/command/flags"
|
|
"github.com/mitchellh/cli"
|
|
)
|
|
|
|
func New(ui cli.Ui) *cmd {
|
|
c := &cmd{UI: ui}
|
|
c.init()
|
|
return c
|
|
}
|
|
|
|
type cmd struct {
|
|
UI cli.Ui
|
|
flags *flag.FlagSet
|
|
http *flags.HTTPFlags
|
|
help string
|
|
|
|
authMethodName string
|
|
description string
|
|
selector string
|
|
bindType string
|
|
bindName string
|
|
|
|
showMeta bool
|
|
format string
|
|
}
|
|
|
|
func (c *cmd) init() {
|
|
c.flags = flag.NewFlagSet("", flag.ContinueOnError)
|
|
|
|
c.flags.BoolVar(
|
|
&c.showMeta,
|
|
"meta",
|
|
false,
|
|
"Indicates that binding rule metadata such "+
|
|
"as the raft indices should be shown for each entry.",
|
|
)
|
|
|
|
c.flags.StringVar(
|
|
&c.authMethodName,
|
|
"method",
|
|
"",
|
|
"The auth method's name for which this binding rule applies. "+
|
|
"This flag is required.",
|
|
)
|
|
c.flags.StringVar(
|
|
&c.description,
|
|
"description",
|
|
"",
|
|
"A description of the binding rule.",
|
|
)
|
|
c.flags.StringVar(
|
|
&c.selector,
|
|
"selector",
|
|
"",
|
|
"Selector is an expression that matches against verified identity "+
|
|
"attributes returned from the auth method during login.",
|
|
)
|
|
c.flags.StringVar(
|
|
&c.bindType,
|
|
"bind-type",
|
|
string(api.BindingRuleBindTypeService),
|
|
"Type of binding to perform (\"service\" or \"role\").",
|
|
)
|
|
c.flags.StringVar(
|
|
&c.bindName,
|
|
"bind-name",
|
|
"",
|
|
"Name to bind on match. Can use ${var} interpolation. "+
|
|
"This flag is required.",
|
|
)
|
|
c.flags.StringVar(
|
|
&c.format,
|
|
"format",
|
|
bindingrule.PrettyFormat,
|
|
fmt.Sprintf("Output format {%s}", strings.Join(bindingrule.GetSupportedFormats(), "|")),
|
|
)
|
|
|
|
c.http = &flags.HTTPFlags{}
|
|
flags.Merge(c.flags, c.http.ClientFlags())
|
|
flags.Merge(c.flags, c.http.ServerFlags())
|
|
flags.Merge(c.flags, c.http.MultiTenancyFlags())
|
|
c.help = flags.Usage(help, c.flags)
|
|
}
|
|
|
|
func (c *cmd) Run(args []string) int {
|
|
if err := c.flags.Parse(args); err != nil {
|
|
return 1
|
|
}
|
|
|
|
if c.authMethodName == "" {
|
|
c.UI.Error(fmt.Sprintf("Missing required '-method' flag"))
|
|
c.UI.Error(c.Help())
|
|
return 1
|
|
} else if c.bindType == "" {
|
|
c.UI.Error(fmt.Sprintf("Missing required '-bind-type' flag"))
|
|
c.UI.Error(c.Help())
|
|
return 1
|
|
} else if c.bindName == "" {
|
|
c.UI.Error(fmt.Sprintf("Missing required '-bind-name' flag"))
|
|
c.UI.Error(c.Help())
|
|
return 1
|
|
}
|
|
|
|
newRule := &api.ACLBindingRule{
|
|
Description: c.description,
|
|
AuthMethod: c.authMethodName,
|
|
BindType: api.BindingRuleBindType(c.bindType),
|
|
BindName: c.bindName,
|
|
Selector: c.selector,
|
|
}
|
|
|
|
client, err := c.http.APIClient()
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Error connecting to Consul agent: %s", err))
|
|
return 1
|
|
}
|
|
|
|
rule, _, err := client.ACL().BindingRuleCreate(newRule, nil)
|
|
if err != nil {
|
|
c.UI.Error(fmt.Sprintf("Failed to create new binding rule: %v", err))
|
|
return 1
|
|
}
|
|
|
|
formatter, err := bindingrule.NewFormatter(c.format, c.showMeta)
|
|
if err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 1
|
|
}
|
|
|
|
out, err := formatter.FormatBindingRule(rule)
|
|
if err != nil {
|
|
c.UI.Error(err.Error())
|
|
return 1
|
|
}
|
|
if out != "" {
|
|
c.UI.Info(out)
|
|
}
|
|
|
|
return 0
|
|
}
|
|
|
|
func (c *cmd) Synopsis() string {
|
|
return synopsis
|
|
}
|
|
|
|
func (c *cmd) Help() string {
|
|
return flags.Usage(c.help, nil)
|
|
}
|
|
|
|
const synopsis = "Create an ACL binding rule"
|
|
|
|
const help = `
|
|
Usage: consul acl binding-rule create [options]
|
|
|
|
Create a new binding rule:
|
|
|
|
$ consul acl binding-rule create \
|
|
-method=minikube \
|
|
-bind-type=service \
|
|
-bind-name='k8s-${serviceaccount.name}' \
|
|
-selector='serviceaccount.namespace==default and serviceaccount.name==web'
|
|
`
|