2022-05-04 16:38:45 +00:00
|
|
|
package acl
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
|
|
|
|
"google.golang.org/grpc"
|
|
|
|
"google.golang.org/grpc/codes"
|
|
|
|
"google.golang.org/grpc/status"
|
|
|
|
|
|
|
|
"github.com/hashicorp/consul/acl"
|
|
|
|
"github.com/hashicorp/consul/agent/consul/auth"
|
2022-07-13 15:33:48 +00:00
|
|
|
external "github.com/hashicorp/consul/agent/grpc-external"
|
2022-05-04 16:38:45 +00:00
|
|
|
"github.com/hashicorp/consul/proto-public/pbacl"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Logout destroys the given ACL token once the caller is done with it.
|
2022-05-23 14:37:52 +00:00
|
|
|
func (s *Server) Logout(ctx context.Context, req *pbacl.LogoutRequest) (*pbacl.LogoutResponse, error) {
|
2022-07-13 15:33:48 +00:00
|
|
|
logger := s.Logger.Named("logout").With("request_id", external.TraceID())
|
2022-05-04 16:38:45 +00:00
|
|
|
logger.Trace("request received")
|
|
|
|
|
|
|
|
if err := s.requireACLsEnabled(logger); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if req.Token == "" {
|
|
|
|
return nil, status.Error(codes.InvalidArgument, "token is required")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Forward request to leader in the requested datacenter.
|
2022-05-23 14:37:52 +00:00
|
|
|
var rsp *pbacl.LogoutResponse
|
2022-05-04 16:38:45 +00:00
|
|
|
handled, err := s.forwardWriteDC(req.Datacenter, func(conn *grpc.ClientConn) error {
|
|
|
|
var err error
|
|
|
|
rsp, err = pbacl.NewACLServiceClient(conn).Logout(ctx, req)
|
|
|
|
return err
|
|
|
|
}, logger)
|
|
|
|
if handled || err != nil {
|
|
|
|
return rsp, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := s.requireLocalTokens(logger); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = s.NewTokenWriter().Delete(req.Token, true)
|
|
|
|
switch {
|
|
|
|
case errors.Is(err, auth.ErrCannotWriteGlobalToken):
|
|
|
|
// Writes to global tokens must be forwarded to the primary DC.
|
|
|
|
req.Datacenter = s.PrimaryDatacenter
|
|
|
|
|
|
|
|
_, err = s.forwardWriteDC(s.PrimaryDatacenter, func(conn *grpc.ClientConn) error {
|
|
|
|
var err error
|
|
|
|
rsp, err = pbacl.NewACLServiceClient(conn).Logout(ctx, req)
|
|
|
|
return err
|
|
|
|
}, logger)
|
|
|
|
return rsp, err
|
|
|
|
case errors.Is(err, acl.ErrNotFound):
|
|
|
|
// No token? Pretend the delete was successful (for idempotency).
|
2022-05-23 14:37:52 +00:00
|
|
|
return &pbacl.LogoutResponse{}, nil
|
2022-05-04 16:38:45 +00:00
|
|
|
case errors.Is(err, acl.ErrPermissionDenied):
|
|
|
|
return nil, status.Error(codes.PermissionDenied, err.Error())
|
|
|
|
case err != nil:
|
|
|
|
logger.Error("failed to delete token", "error", err.Error())
|
|
|
|
return nil, status.Error(codes.Internal, "failed to delete token")
|
|
|
|
}
|
|
|
|
|
2022-05-23 14:37:52 +00:00
|
|
|
return &pbacl.LogoutResponse{}, nil
|
2022-05-04 16:38:45 +00:00
|
|
|
}
|