2018-03-17 04:20:54 +00:00
|
|
|
package structs
|
|
|
|
|
2018-03-20 04:00:01 +00:00
|
|
|
import (
|
2018-07-20 23:04:04 +00:00
|
|
|
"fmt"
|
2018-09-13 14:43:00 +00:00
|
|
|
"reflect"
|
2018-03-21 17:55:39 +00:00
|
|
|
"time"
|
2018-07-20 23:04:04 +00:00
|
|
|
|
|
|
|
"github.com/mitchellh/mapstructure"
|
2018-03-20 04:00:01 +00:00
|
|
|
)
|
|
|
|
|
2018-03-17 04:20:54 +00:00
|
|
|
// IndexedCARoots is the list of currently trusted CA Roots.
|
|
|
|
type IndexedCARoots struct {
|
|
|
|
// ActiveRootID is the ID of a root in Roots that is the active CA root.
|
|
|
|
// Other roots are still valid if they're in the Roots list but are in
|
|
|
|
// the process of being rotated out.
|
|
|
|
ActiveRootID string
|
|
|
|
|
2018-05-08 13:23:44 +00:00
|
|
|
// TrustDomain is the identification root for this Consul cluster. All
|
|
|
|
// certificates signed by the cluster's CA must have their identifying URI in
|
|
|
|
// this domain.
|
|
|
|
//
|
|
|
|
// This does not include the protocol (currently spiffe://) since we may
|
|
|
|
// implement other protocols in future with equivalent semantics. It should be
|
|
|
|
// compared against the "authority" section of a URI (i.e. host:port).
|
|
|
|
//
|
2018-11-12 20:20:12 +00:00
|
|
|
// We need to support migrating a cluster between trust domains to support
|
|
|
|
// Multi-DC migration in Enterprise. In this case the current trust domain is
|
|
|
|
// here but entries in Roots may also have ExternalTrustDomain set to a
|
|
|
|
// non-empty value implying they were previous roots that are still trusted
|
|
|
|
// but under a different trust domain.
|
|
|
|
//
|
|
|
|
// Note that we DON'T validate trust domain during AuthZ since it causes
|
|
|
|
// issues of loss of connectivity during migration between trust domains. The
|
|
|
|
// only time the additional validation adds value is where the cluster shares
|
|
|
|
// an external root (e.g. organization-wide root) with another distinct Consul
|
|
|
|
// cluster or PKI system. In this case, x509 Name Constraints can be added to
|
|
|
|
// enforce that Consul's CA can only validly sign or trust certs within the
|
|
|
|
// same trust-domain. Name constraints as enforced by TLS handshake also allow
|
|
|
|
// seamless rotation between trust domains thanks to cross-signing.
|
2018-05-08 13:23:44 +00:00
|
|
|
TrustDomain string
|
|
|
|
|
2018-03-17 04:20:54 +00:00
|
|
|
// Roots is a list of root CA certs to trust.
|
|
|
|
Roots []*CARoot
|
|
|
|
|
2018-03-19 05:07:52 +00:00
|
|
|
// QueryMeta contains the meta sent via a header. We ignore for JSON
|
|
|
|
// so this whole structure can be returned.
|
|
|
|
QueryMeta `json:"-"`
|
2018-03-17 04:20:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// CARoot represents a root CA certificate that is trusted.
|
|
|
|
type CARoot struct {
|
|
|
|
// ID is a globally unique ID (UUID) representing this CA root.
|
|
|
|
ID string
|
|
|
|
|
|
|
|
// Name is a human-friendly name for this CA root. This value is
|
|
|
|
// opaque to Consul and is not used for anything internally.
|
|
|
|
Name string
|
|
|
|
|
2018-05-04 23:01:54 +00:00
|
|
|
// SerialNumber is the x509 serial number of the certificate.
|
|
|
|
SerialNumber uint64
|
|
|
|
|
|
|
|
// SigningKeyID is the ID of the public key that corresponds to the
|
|
|
|
// private key used to sign the certificate.
|
|
|
|
SigningKeyID string
|
|
|
|
|
2018-11-12 20:20:12 +00:00
|
|
|
// ExternalTrustDomain is the trust domain this root was generated under. It
|
|
|
|
// is usually empty implying "the current cluster trust-domain". It is set
|
|
|
|
// only in the case that a cluster changes trust domain and then all old roots
|
|
|
|
// that are still trusted have the old trust domain set here.
|
|
|
|
//
|
|
|
|
// We currently DON'T validate these trust domains explicitly anywhere, see
|
|
|
|
// IndexedRoots.TrustDomain doc. We retain this information for debugging and
|
|
|
|
// future flexibility.
|
2018-10-15 16:17:48 +00:00
|
|
|
ExternalTrustDomain string
|
|
|
|
|
2018-05-04 23:01:54 +00:00
|
|
|
// Time validity bounds.
|
|
|
|
NotBefore time.Time
|
|
|
|
NotAfter time.Time
|
|
|
|
|
2018-03-17 04:20:54 +00:00
|
|
|
// RootCert is the PEM-encoded public certificate.
|
|
|
|
RootCert string
|
|
|
|
|
2018-04-24 18:50:31 +00:00
|
|
|
// IntermediateCerts is a list of PEM-encoded intermediate certs to
|
2018-04-21 03:39:51 +00:00
|
|
|
// attach to any leaf certs signed by this CA.
|
2018-04-24 18:50:31 +00:00
|
|
|
IntermediateCerts []string
|
2018-04-21 03:39:51 +00:00
|
|
|
|
2018-03-17 04:20:54 +00:00
|
|
|
// SigningCert is the PEM-encoded signing certificate and SigningKey
|
2018-03-19 21:36:17 +00:00
|
|
|
// is the PEM-encoded private key for the signing certificate. These
|
|
|
|
// may actually be empty if the CA plugin in use manages these for us.
|
2018-03-21 19:55:43 +00:00
|
|
|
SigningCert string `json:",omitempty"`
|
|
|
|
SigningKey string `json:",omitempty"`
|
2018-03-17 04:20:54 +00:00
|
|
|
|
2018-03-20 03:29:14 +00:00
|
|
|
// Active is true if this is the current active CA. This must only
|
|
|
|
// be true for exactly one CA. For any method that modifies roots in the
|
|
|
|
// state store, tests should be written to verify that multiple roots
|
|
|
|
// cannot be active.
|
|
|
|
Active bool
|
|
|
|
|
2018-07-06 23:05:25 +00:00
|
|
|
// RotatedOutAt is the time at which this CA was removed from the state.
|
2018-06-21 22:42:28 +00:00
|
|
|
// This will only be set on roots that have been rotated out from being the
|
2018-07-06 23:05:25 +00:00
|
|
|
// active root.
|
|
|
|
RotatedOutAt time.Time `json:"-"`
|
2018-06-21 22:42:28 +00:00
|
|
|
|
2018-03-17 04:20:54 +00:00
|
|
|
RaftIndex
|
|
|
|
}
|
|
|
|
|
|
|
|
// CARoots is a list of CARoot structures.
|
|
|
|
type CARoots []*CARoot
|
2018-03-19 21:36:17 +00:00
|
|
|
|
|
|
|
// CASignRequest is the request for signing a service certificate.
|
|
|
|
type CASignRequest struct {
|
|
|
|
// Datacenter is the target for this request.
|
|
|
|
Datacenter string
|
|
|
|
|
|
|
|
// CSR is the PEM-encoded CSR.
|
|
|
|
CSR string
|
|
|
|
|
|
|
|
// WriteRequest is a common struct containing ACL tokens and other
|
|
|
|
// write-related common elements for requests.
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
// RequestDatacenter returns the datacenter for a given request.
|
|
|
|
func (q *CASignRequest) RequestDatacenter() string {
|
|
|
|
return q.Datacenter
|
|
|
|
}
|
2018-03-20 04:00:01 +00:00
|
|
|
|
|
|
|
// IssuedCert is a certificate that has been issued by a Connect CA.
|
|
|
|
type IssuedCert struct {
|
|
|
|
// SerialNumber is the unique serial number for this certificate.
|
2018-03-21 22:54:51 +00:00
|
|
|
// This is encoded in standard hex separated by :.
|
|
|
|
SerialNumber string
|
2018-03-20 04:00:01 +00:00
|
|
|
|
2018-03-21 17:55:39 +00:00
|
|
|
// CertPEM and PrivateKeyPEM are the PEM-encoded certificate and private
|
|
|
|
// key for that cert, respectively. This should not be stored in the
|
2018-03-20 04:00:01 +00:00
|
|
|
// state store, but is present in the sign API response.
|
2018-03-21 17:55:39 +00:00
|
|
|
CertPEM string `json:",omitempty"`
|
2018-03-21 19:55:43 +00:00
|
|
|
PrivateKeyPEM string `json:",omitempty"`
|
2018-03-21 17:55:39 +00:00
|
|
|
|
|
|
|
// Service is the name of the service for which the cert was issued.
|
|
|
|
// ServiceURI is the cert URI value.
|
|
|
|
Service string
|
|
|
|
ServiceURI string
|
|
|
|
|
|
|
|
// ValidAfter and ValidBefore are the validity periods for the
|
|
|
|
// certificate.
|
|
|
|
ValidAfter time.Time
|
|
|
|
ValidBefore time.Time
|
|
|
|
|
|
|
|
RaftIndex
|
2018-03-20 04:00:01 +00:00
|
|
|
}
|
2018-03-21 17:10:53 +00:00
|
|
|
|
|
|
|
// CAOp is the operation for a request related to intentions.
|
|
|
|
type CAOp string
|
|
|
|
|
|
|
|
const (
|
2018-04-21 01:46:02 +00:00
|
|
|
CAOpSetRoots CAOp = "set-roots"
|
|
|
|
CAOpSetConfig CAOp = "set-config"
|
|
|
|
CAOpSetProviderState CAOp = "set-provider-state"
|
|
|
|
CAOpDeleteProviderState CAOp = "delete-provider-state"
|
|
|
|
CAOpSetRootsAndConfig CAOp = "set-roots-config"
|
2018-03-21 17:10:53 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// CARequest is used to modify connect CA data. This is used by the
|
|
|
|
// FSM (agent/consul/fsm) to apply changes.
|
|
|
|
type CARequest struct {
|
|
|
|
// Op is the type of operation being requested. This determines what
|
|
|
|
// other fields are required.
|
|
|
|
Op CAOp
|
|
|
|
|
2018-04-09 04:58:31 +00:00
|
|
|
// Datacenter is the target for this request.
|
|
|
|
Datacenter string
|
|
|
|
|
2018-04-20 08:30:34 +00:00
|
|
|
// Index is used by CAOpSetRoots and CAOpSetConfig for a CAS operation.
|
2018-03-21 17:10:53 +00:00
|
|
|
Index uint64
|
|
|
|
|
|
|
|
// Roots is a list of roots. This is used for CAOpSet. One root must
|
|
|
|
// always be active.
|
|
|
|
Roots []*CARoot
|
2018-04-09 04:58:31 +00:00
|
|
|
|
|
|
|
// Config is the configuration for the current CA plugin.
|
|
|
|
Config *CAConfiguration
|
|
|
|
|
2018-04-20 08:30:34 +00:00
|
|
|
// ProviderState is the state for the builtin CA provider.
|
|
|
|
ProviderState *CAConsulProviderState
|
|
|
|
|
2018-04-09 04:58:31 +00:00
|
|
|
// WriteRequest is a common struct containing ACL tokens and other
|
|
|
|
// write-related common elements for requests.
|
|
|
|
WriteRequest
|
2018-03-21 17:10:53 +00:00
|
|
|
}
|
2018-03-21 19:42:42 +00:00
|
|
|
|
2018-04-09 04:58:31 +00:00
|
|
|
// RequestDatacenter returns the datacenter for a given request.
|
|
|
|
func (q *CARequest) RequestDatacenter() string {
|
|
|
|
return q.Datacenter
|
|
|
|
}
|
|
|
|
|
|
|
|
const (
|
|
|
|
ConsulCAProvider = "consul"
|
2018-06-13 08:40:03 +00:00
|
|
|
VaultCAProvider = "vault"
|
2018-04-09 04:58:31 +00:00
|
|
|
)
|
|
|
|
|
2018-03-21 19:42:42 +00:00
|
|
|
// CAConfiguration is the configuration for the current CA plugin.
|
|
|
|
type CAConfiguration struct {
|
2018-04-24 18:50:31 +00:00
|
|
|
// ClusterID is a unique identifier for the cluster
|
|
|
|
ClusterID string `json:"-"`
|
2018-04-20 08:30:34 +00:00
|
|
|
|
2018-03-21 19:42:42 +00:00
|
|
|
// Provider is the CA provider implementation to use.
|
|
|
|
Provider string
|
|
|
|
|
|
|
|
// Configuration is arbitrary configuration for the provider. This
|
|
|
|
// should only contain primitive values and containers (such as lists
|
|
|
|
// and maps).
|
|
|
|
Config map[string]interface{}
|
2018-04-09 04:58:31 +00:00
|
|
|
|
2018-04-20 08:30:34 +00:00
|
|
|
RaftIndex
|
|
|
|
}
|
|
|
|
|
2018-07-20 23:04:04 +00:00
|
|
|
func (c *CAConfiguration) GetCommonConfig() (*CommonCAProviderConfig, error) {
|
|
|
|
if c == nil {
|
|
|
|
return nil, fmt.Errorf("config map was nil")
|
|
|
|
}
|
|
|
|
|
|
|
|
var config CommonCAProviderConfig
|
|
|
|
decodeConf := &mapstructure.DecoderConfig{
|
2018-09-13 14:43:00 +00:00
|
|
|
DecodeHook: ParseDurationFunc(),
|
|
|
|
Result: &config,
|
|
|
|
WeaklyTypedInput: true,
|
2018-07-20 23:04:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
decoder, err := mapstructure.NewDecoder(decodeConf)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := decoder.Decode(c.Config); err != nil {
|
|
|
|
return nil, fmt.Errorf("error decoding config: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &config, nil
|
|
|
|
}
|
|
|
|
|
2018-07-16 09:46:10 +00:00
|
|
|
type CommonCAProviderConfig struct {
|
|
|
|
LeafCertTTL time.Duration
|
2018-07-20 23:04:04 +00:00
|
|
|
|
|
|
|
SkipValidate bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c CommonCAProviderConfig) Validate() error {
|
|
|
|
if c.SkipValidate {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.LeafCertTTL < time.Hour {
|
|
|
|
return fmt.Errorf("leaf cert TTL must be greater than 1h")
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.LeafCertTTL > 365*24*time.Hour {
|
|
|
|
return fmt.Errorf("leaf cert TTL must be less than 1 year")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
2018-07-16 09:46:10 +00:00
|
|
|
}
|
|
|
|
|
2018-04-25 00:14:30 +00:00
|
|
|
type ConsulCAProviderConfig struct {
|
2018-07-16 09:46:10 +00:00
|
|
|
CommonCAProviderConfig `mapstructure:",squash"`
|
|
|
|
|
2018-04-25 00:14:30 +00:00
|
|
|
PrivateKey string
|
|
|
|
RootCert string
|
|
|
|
RotationPeriod time.Duration
|
|
|
|
}
|
|
|
|
|
2018-04-20 08:30:34 +00:00
|
|
|
// CAConsulProviderState is used to track the built-in Consul CA provider's state.
|
|
|
|
type CAConsulProviderState struct {
|
2018-09-07 02:18:54 +00:00
|
|
|
ID string
|
|
|
|
PrivateKey string
|
|
|
|
RootCert string
|
|
|
|
IntermediateCert string
|
2018-04-20 08:30:34 +00:00
|
|
|
|
|
|
|
RaftIndex
|
2018-03-21 19:42:42 +00:00
|
|
|
}
|
2018-06-13 08:40:03 +00:00
|
|
|
|
|
|
|
type VaultCAProviderConfig struct {
|
2018-07-16 09:46:10 +00:00
|
|
|
CommonCAProviderConfig `mapstructure:",squash"`
|
|
|
|
|
2018-06-13 08:40:03 +00:00
|
|
|
Address string
|
|
|
|
Token string
|
|
|
|
RootPKIPath string
|
|
|
|
IntermediatePKIPath string
|
|
|
|
}
|
2018-09-13 14:43:00 +00:00
|
|
|
|
|
|
|
// ParseDurationFunc is a mapstructure hook for decoding a string or
|
|
|
|
// []uint8 into a time.Duration value.
|
|
|
|
func ParseDurationFunc() mapstructure.DecodeHookFunc {
|
|
|
|
return func(
|
|
|
|
f reflect.Type,
|
|
|
|
t reflect.Type,
|
|
|
|
data interface{}) (interface{}, error) {
|
|
|
|
var v time.Duration
|
|
|
|
if t != reflect.TypeOf(v) {
|
|
|
|
return data, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case f.Kind() == reflect.String:
|
|
|
|
if dur, err := time.ParseDuration(data.(string)); err != nil {
|
|
|
|
return nil, err
|
|
|
|
} else {
|
|
|
|
v = dur
|
|
|
|
}
|
|
|
|
return v, nil
|
|
|
|
case f == reflect.SliceOf(reflect.TypeOf(uint8(0))):
|
|
|
|
s := Uint8ToString(data.([]uint8))
|
|
|
|
if dur, err := time.ParseDuration(s); err != nil {
|
|
|
|
return nil, err
|
|
|
|
} else {
|
|
|
|
v = dur
|
|
|
|
}
|
|
|
|
return v, nil
|
|
|
|
default:
|
|
|
|
return data, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func Uint8ToString(bs []uint8) string {
|
|
|
|
b := make([]byte, len(bs))
|
|
|
|
for i, v := range bs {
|
|
|
|
b[i] = byte(v)
|
|
|
|
}
|
|
|
|
return string(b)
|
|
|
|
}
|