open-consul/command/keyring.go

311 lines
7.9 KiB
Go
Raw Normal View History

package command
import (
"encoding/base64"
"encoding/json"
"flag"
"fmt"
"os"
"path/filepath"
"strings"
"github.com/hashicorp/consul/command/agent"
"github.com/mitchellh/cli"
"github.com/ryanuber/columnize"
)
2014-09-28 19:35:51 +00:00
const (
installKeyCommand = "install"
useKeyCommand = "use"
removeKeyCommand = "remove"
)
// KeyringCommand is a Command implementation that handles querying, installing,
// and removing gossip encryption keys from a keyring.
type KeyringCommand struct {
Ui cli.Ui
}
func (c *KeyringCommand) Run(args []string) int {
var installKey, useKey, removeKey, init, dataDir string
var listKeys, wan bool
cmdFlags := flag.NewFlagSet("keys", flag.ContinueOnError)
cmdFlags.Usage = func() { c.Ui.Output(c.Help()) }
cmdFlags.StringVar(&installKey, "install", "", "install key")
cmdFlags.StringVar(&useKey, "use", "", "use key")
cmdFlags.StringVar(&removeKey, "remove", "", "remove key")
cmdFlags.BoolVar(&listKeys, "list", false, "list keys")
cmdFlags.StringVar(&init, "init", "", "initialize keyring")
cmdFlags.StringVar(&dataDir, "data-dir", "", "data directory")
cmdFlags.BoolVar(&wan, "wan", false, "operate on wan keyring")
rpcAddr := RPCAddrFlag(cmdFlags)
if err := cmdFlags.Parse(args); err != nil {
return 1
}
c.Ui = &cli.PrefixedUi{
OutputPrefix: "",
InfoPrefix: "==> ",
ErrorPrefix: "",
Ui: c.Ui,
}
// Only accept a single argument
found := listKeys
for _, arg := range []string{installKey, useKey, removeKey, init} {
if found && len(arg) > 0 {
c.Ui.Error("Only a single action is allowed")
return 1
}
found = found || len(arg) > 0
}
// Fail fast if no actionable args were passed
if !found {
c.Ui.Error(c.Help())
return 1
}
if init != "" {
if dataDir == "" {
c.Ui.Error("Must provide -data-dir")
return 1
}
fileLAN := filepath.Join(dataDir, agent.SerfLANKeyring)
if err := initKeyring(fileLAN, init); err != nil {
c.Ui.Error(fmt.Sprintf("Error: %s", err))
return 1
}
fileWAN := filepath.Join(dataDir, agent.SerfWANKeyring)
if err := initKeyring(fileWAN, init); err != nil {
c.Ui.Error(fmt.Sprintf("Error: %s", err))
return 1
}
return 0
}
// All other operations will require a client connection
client, err := RPCClient(*rpcAddr)
if err != nil {
c.Ui.Error(fmt.Sprintf("Error connecting to Consul agent: %s", err))
return 1
}
defer client.Close()
// For all key-related operations, we must be querying a server node. It is
// probably better to enforce this even for LAN pool changes, because other-
// wise, the same exact command syntax will have different results depending
// on where it was run.
s, err := client.Stats()
if err != nil {
c.Ui.Error(fmt.Sprintf("Error: %s", err))
return 1
}
if s["consul"]["server"] != "true" {
c.Ui.Error("Error: Key modification can only be handled by a server")
return 1
}
if listKeys {
c.Ui.Info("Asking all members for installed keys...")
2014-09-28 20:33:37 +00:00
r, err := client.ListKeys()
if err != nil {
c.Ui.Error(fmt.Sprintf("error: %s", err))
return 1
}
if rval := c.handleResponse(r.Info, r.Messages, r.Keys); rval != 0 {
return rval
}
c.handleList(r.Info, r.Messages, r.Keys)
return 0
}
if installKey != "" {
c.Ui.Info("Installing new gossip encryption key...")
2014-09-28 19:35:51 +00:00
r, err := client.InstallKey(installKey)
if err != nil {
c.Ui.Error(fmt.Sprintf("error: %s", err))
return 1
2014-09-09 06:25:38 +00:00
}
2014-09-28 20:33:37 +00:00
return c.handleResponse(r.Info, r.Messages, r.Keys)
}
if useKey != "" {
c.Ui.Info("Changing primary gossip encryption key...")
2014-09-28 19:35:51 +00:00
r, err := client.UseKey(useKey)
if err != nil {
c.Ui.Error(fmt.Sprintf("error: %s", err))
return 1
}
2014-09-28 20:33:37 +00:00
return c.handleResponse(r.Info, r.Messages, r.Keys)
}
if removeKey != "" {
c.Ui.Info("Removing gossip encryption key...")
2014-09-28 19:35:51 +00:00
r, err := client.RemoveKey(removeKey)
if err != nil {
c.Ui.Error(fmt.Sprintf("error: %s", err))
return 1
}
2014-09-28 20:33:37 +00:00
return c.handleResponse(r.Info, r.Messages, r.Keys)
}
// Should never make it here
return 0
}
2014-09-28 19:35:51 +00:00
func (c *KeyringCommand) handleResponse(
info []agent.KeyringInfo,
messages []agent.KeyringMessage,
2014-09-28 20:33:37 +00:00
keys []agent.KeyringEntry) int {
2014-09-28 19:35:51 +00:00
var rval int
2014-09-28 19:35:51 +00:00
for _, i := range info {
if i.Error != "" {
pool := i.Pool
if pool != "WAN" {
pool = i.Datacenter + " (LAN)"
}
2014-09-28 19:35:51 +00:00
c.Ui.Error("")
c.Ui.Error(fmt.Sprintf("%s error: %s", pool, i.Error))
var errors []string
for _, msg := range messages {
if msg.Datacenter != i.Datacenter || msg.Pool != i.Pool {
continue
}
errors = append(errors, fmt.Sprintf(
"failed: %s | %s",
msg.Node,
msg.Message))
}
2014-09-28 19:35:51 +00:00
c.Ui.Error(columnize.SimpleFormat(errors))
rval = 1
}
}
2014-09-28 20:33:37 +00:00
if rval == 0 {
c.Ui.Info("Done!")
}
2014-09-28 19:35:51 +00:00
return rval
}
2014-09-28 20:33:37 +00:00
func (c *KeyringCommand) handleList(
info []agent.KeyringInfo,
messages []agent.KeyringMessage,
keys []agent.KeyringEntry) {
installed := make(map[string]map[string][]int)
for _, key := range keys {
var nodes int
for _, i := range info {
if i.Datacenter == key.Datacenter && i.Pool == key.Pool {
nodes = i.NumNodes
}
}
2014-09-28 19:35:51 +00:00
2014-09-28 20:33:37 +00:00
pool := key.Pool
if pool != "WAN" {
pool = key.Datacenter + " (LAN)"
2014-09-28 19:35:51 +00:00
}
2014-09-28 20:33:37 +00:00
if _, ok := installed[pool]; !ok {
installed[pool] = map[string][]int{key.Key: []int{key.Count, nodes}}
} else {
installed[pool][key.Key] = []int{key.Count, nodes}
2014-09-28 19:35:51 +00:00
}
}
2014-09-28 20:33:37 +00:00
for pool, keys := range installed {
c.Ui.Output("")
c.Ui.Output(pool + ":")
var out []string
for key, num := range keys {
out = append(out, fmt.Sprintf(
"%s | [%d/%d]",
key, num[0], num[1]))
2014-09-28 19:35:51 +00:00
}
2014-09-28 20:33:37 +00:00
c.Ui.Output(columnize.SimpleFormat(out))
}
}
// initKeyring will create a keyring file at a given path.
func initKeyring(path, key string) error {
if _, err := base64.StdEncoding.DecodeString(key); err != nil {
return fmt.Errorf("Invalid key: %s", err)
}
keys := []string{key}
keyringBytes, err := json.Marshal(keys)
if err != nil {
return err
}
if err := os.MkdirAll(filepath.Dir(path), 0700); err != nil {
return err
}
if _, err := os.Stat(path); err == nil {
return fmt.Errorf("File already exists: %s", path)
}
fh, err := os.OpenFile(path, os.O_CREATE|os.O_WRONLY|os.O_TRUNC, 0600)
if err != nil {
return err
}
defer fh.Close()
if _, err := fh.Write(keyringBytes); err != nil {
os.Remove(path)
return err
}
return nil
}
func (c *KeyringCommand) Help() string {
helpText := `
Usage: consul keyring [options]
Manages encryption keys used for gossip messages. Gossip encryption is
optional. When enabled, this command may be used to examine active encryption
keys in the cluster, add new keys, and remove old ones. When combined, this
functionality provides the ability to perform key rotation cluster-wide,
without disrupting the cluster.
With the exception of the -init argument, all operations performed by this
command can only be run against server nodes. All operations default to the
LAN gossip pool.
Options:
-install=<key> Install a new encryption key. This will broadcast
the new key to all members in the cluster.
-use=<key> Change the primary encryption key, which is used to
encrypt messages. The key must already be installed
before this operation can succeed.
-remove=<key> Remove the given key from the cluster. This
operation may only be performed on keys which are
not currently the primary key.
-list List all keys currently in use within the cluster.
-init=<key> Create the initial keyring files for Consul to use
containing the provided key. The -data-dir argument
is required with this option.
-wan Operate on the WAN keyring instead of the LAN
keyring (default).
-rpc-addr=127.0.0.1:8400 RPC address of the Consul agent.
`
return strings.TrimSpace(helpText)
}
func (c *KeyringCommand) Synopsis() string {
return "Manages gossip layer encryption keys"
}