e502be8c6e
* feat: initial grpc blocking queries * changelog and docs update
2158 lines
61 KiB
Go
2158 lines
61 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
package consul
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"time"
|
|
|
|
"github.com/armon/go-metrics"
|
|
"github.com/armon/go-metrics/prometheus"
|
|
"github.com/hashicorp/go-bexpr"
|
|
"github.com/hashicorp/go-hclog"
|
|
"github.com/hashicorp/go-memdb"
|
|
"github.com/hashicorp/go-uuid"
|
|
|
|
"github.com/hashicorp/consul/acl"
|
|
"github.com/hashicorp/consul/acl/resolver"
|
|
"github.com/hashicorp/consul/agent/consul/auth"
|
|
"github.com/hashicorp/consul/agent/consul/authmethod"
|
|
"github.com/hashicorp/consul/agent/consul/state"
|
|
"github.com/hashicorp/consul/agent/structs"
|
|
"github.com/hashicorp/consul/agent/structs/aclfilter"
|
|
"github.com/hashicorp/consul/lib"
|
|
)
|
|
|
|
const (
|
|
// aclBootstrapReset is the file name to create in the data dir. It's only contents
|
|
// should be the reset index
|
|
aclBootstrapReset = "acl-bootstrap-reset"
|
|
)
|
|
|
|
var ACLEndpointSummaries = []prometheus.SummaryDefinition{
|
|
{
|
|
Name: []string{"acl", "token", "clone"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "token", "upsert"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "token", "delete"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "policy", "upsert"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "policy", "delete"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "policy", "delete"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "role", "upsert"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "role", "delete"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "bindingrule", "upsert"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "bindingrule", "delete"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "authmethod", "upsert"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "authmethod", "delete"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "login"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "login"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "logout"},
|
|
Help: "",
|
|
},
|
|
{
|
|
Name: []string{"acl", "logout"},
|
|
Help: "",
|
|
},
|
|
}
|
|
|
|
// ACL endpoint is used to manipulate ACLs
|
|
type ACL struct {
|
|
srv *Server
|
|
logger hclog.Logger
|
|
}
|
|
|
|
// fileBootstrapResetIndex retrieves the reset index specified by the administrator from
|
|
// the file on disk.
|
|
//
|
|
// Q: What is the bootstrap reset index?
|
|
// A: If you happen to lose acess to all tokens capable of ACL management you need a way
|
|
// to get back into your system. This allows an admin to write the current
|
|
// bootstrap "index" into a special file on disk to override the mechanism preventing
|
|
// a second token bootstrap. The index will be retrieved by a API call to /v1/acl/bootstrap
|
|
// When already bootstrapped this API will return the reset index necessary within
|
|
// the error response. Once set in the file, the bootstrap API can be used again to
|
|
// get a new token.
|
|
//
|
|
// Q: Why is the reset index not in the config?
|
|
// A: We want to be able to remove the reset index once we have used it. This prevents
|
|
// accidentally allowing bootstrapping yet again after a snapshot restore.
|
|
func (a *ACL) fileBootstrapResetIndex() uint64 {
|
|
// Determine the file path to check
|
|
path := filepath.Join(a.srv.config.DataDir, aclBootstrapReset)
|
|
|
|
// Read the file
|
|
raw, err := os.ReadFile(path)
|
|
if err != nil {
|
|
if !os.IsNotExist(err) {
|
|
a.logger.Error("bootstrap: failed to read path",
|
|
"path", path,
|
|
"error", err,
|
|
)
|
|
}
|
|
return 0
|
|
}
|
|
|
|
// Attempt to parse the file
|
|
var resetIdx uint64
|
|
if _, err := fmt.Sscanf(string(raw), "%d", &resetIdx); err != nil {
|
|
a.logger.Error("failed to parse bootstrap reset index path", "path", path, "error", err)
|
|
return 0
|
|
}
|
|
|
|
// Return the reset index
|
|
a.logger.Debug("parsed bootstrap reset index path", "path", path, "reset_index", resetIdx)
|
|
return resetIdx
|
|
}
|
|
|
|
func (a *ACL) removeBootstrapResetFile() {
|
|
if err := os.Remove(filepath.Join(a.srv.config.DataDir, aclBootstrapReset)); err != nil {
|
|
a.logger.Warn("failed to remove bootstrap file", "error", err)
|
|
}
|
|
}
|
|
|
|
func (a *ACL) aclPreCheck() error {
|
|
if !a.srv.config.ACLsEnabled {
|
|
return acl.ErrDisabled
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// BootstrapTokens is used to perform a one-time ACL bootstrap operation on
|
|
// a cluster to get the first management token.
|
|
func (a *ACL) BootstrapTokens(args *structs.ACLInitialTokenBootstrapRequest, reply *structs.ACLToken) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
if done, err := a.srv.ForwardRPC("ACL.BootstrapTokens", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.aclBootstrapAllowed(); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Verify we are allowed to serve this request
|
|
if !a.srv.InPrimaryDatacenter() {
|
|
return acl.ErrDisabled
|
|
}
|
|
|
|
// By doing some pre-checks we can head off later bootstrap attempts
|
|
// without having to run them through Raft, which should curb abuse.
|
|
state := a.srv.fsm.State()
|
|
allowed, resetIdx, err := state.CanBootstrapACLToken()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
var specifiedIndex uint64 = 0
|
|
if !allowed {
|
|
// Check if there is a reset index specified
|
|
specifiedIndex = a.fileBootstrapResetIndex()
|
|
if specifiedIndex == 0 {
|
|
return fmt.Errorf("ACL bootstrap no longer allowed (reset index: %d)", resetIdx)
|
|
} else if specifiedIndex != resetIdx {
|
|
return fmt.Errorf("Invalid bootstrap reset index (specified %d, reset index: %d)", specifiedIndex, resetIdx)
|
|
}
|
|
}
|
|
|
|
// remove the bootstrap override file now that we have the index from it and it was valid.
|
|
// whether bootstrapping works or not is irrelevant as we really don't want this file hanging around
|
|
// in case a snapshot restore is done. In that case we don't want to accidentally allow re-bootstrapping
|
|
// just because the file was unchanged.
|
|
a.removeBootstrapResetFile()
|
|
|
|
accessor, err := lib.GenerateUUID(a.srv.checkTokenUUID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
secret := args.BootstrapSecret
|
|
if secret == "" {
|
|
secret, err = lib.GenerateUUID(a.srv.checkTokenUUID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
_, err = uuid.ParseUUID(secret)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ok, err := a.srv.checkTokenUUID(secret)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if !ok {
|
|
return fmt.Errorf("Provided token cannot be used because a token with that secret already exists.")
|
|
}
|
|
}
|
|
|
|
req := structs.ACLTokenBootstrapRequest{
|
|
Token: structs.ACLToken{
|
|
AccessorID: accessor,
|
|
SecretID: secret,
|
|
Description: "Bootstrap Token (Global Management)",
|
|
Policies: []structs.ACLTokenPolicyLink{
|
|
{
|
|
ID: structs.ACLPolicyGlobalManagementID,
|
|
},
|
|
},
|
|
CreateTime: time.Now(),
|
|
Local: false,
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(),
|
|
},
|
|
ResetIndex: specifiedIndex,
|
|
}
|
|
|
|
req.Token.SetHash(true)
|
|
|
|
_, err = a.srv.raftApply(structs.ACLBootstrapRequestType, &req)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if _, token, err := state.ACLTokenGetByAccessor(nil, accessor, structs.DefaultEnterpriseMetaInDefaultPartition()); err == nil {
|
|
*reply = *token
|
|
}
|
|
|
|
a.logger.Info("ACL bootstrap completed")
|
|
return nil
|
|
}
|
|
|
|
func (a *ACL) TokenRead(args *structs.ACLTokenGetRequest, reply *structs.ACLTokenResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, false); err != nil {
|
|
return err
|
|
}
|
|
|
|
// clients will not know whether the server has local token store. In the case
|
|
// where it doesn't we will transparently forward requests.
|
|
if !a.srv.LocalTokensEnabled() {
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.TokenRead", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
var authz resolver.Result
|
|
|
|
if args.TokenIDType == structs.ACLTokenAccessor {
|
|
var err error
|
|
var authzContext acl.AuthorizerContext
|
|
// Only ACLRead privileges are required to list tokens
|
|
// However if you do not have ACLWrite as well the token
|
|
// secrets will be redacted
|
|
if authz, err = a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLReadAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
var index uint64
|
|
var token *structs.ACLToken
|
|
var err error
|
|
|
|
if args.TokenIDType == structs.ACLTokenAccessor {
|
|
index, token, err = state.ACLTokenGetByAccessor(ws, args.TokenID, &args.EnterpriseMeta)
|
|
if token != nil {
|
|
a.srv.filterACLWithAuthorizer(authz, &token)
|
|
|
|
// token secret was redacted
|
|
if token.SecretID == aclfilter.RedactedToken {
|
|
reply.Redacted = true
|
|
}
|
|
}
|
|
} else {
|
|
index, token, err = state.ACLTokenGetBySecret(ws, args.TokenID, nil)
|
|
// no extra validation is needed here. If you have the secret ID you can read it.
|
|
}
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if token != nil && token.IsExpired(time.Now()) {
|
|
return fmt.Errorf("token has expired: %w", acl.ErrNotFound)
|
|
} else if token == nil {
|
|
// token does not exist
|
|
if ns := args.EnterpriseMeta.NamespaceOrEmpty(); ns != "" {
|
|
return fmt.Errorf("token not found in namespace %s: %w", ns, acl.ErrNotFound)
|
|
}
|
|
return fmt.Errorf("token does not exist: %w", acl.ErrNotFound)
|
|
}
|
|
|
|
reply.Index, reply.Token = index, token
|
|
reply.SourceDatacenter = args.Datacenter
|
|
|
|
if args.Expanded {
|
|
info, err := a.lookupExpandedTokenInfo(ws, state, token)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
reply.ExpandedTokenInfo = info
|
|
}
|
|
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func (a *ACL) lookupExpandedTokenInfo(ws memdb.WatchSet, state *state.Store, token *structs.ACLToken) (structs.ExpandedTokenInfo, error) {
|
|
policyIDs := make(map[string]struct{})
|
|
roleIDs := make(map[string]struct{})
|
|
identityPolicies := make(map[string]*structs.ACLPolicy)
|
|
tokenInfo := structs.ExpandedTokenInfo{}
|
|
|
|
// Add the token's policies and node/service identity policies
|
|
for _, policy := range token.Policies {
|
|
policyIDs[policy.ID] = struct{}{}
|
|
}
|
|
for _, roleLink := range token.Roles {
|
|
roleIDs[roleLink.ID] = struct{}{}
|
|
}
|
|
|
|
for _, identity := range token.ServiceIdentities {
|
|
policy := identity.SyntheticPolicy(&token.EnterpriseMeta)
|
|
identityPolicies[policy.ID] = policy
|
|
}
|
|
for _, identity := range token.NodeIdentities {
|
|
policy := identity.SyntheticPolicy(&token.EnterpriseMeta)
|
|
identityPolicies[policy.ID] = policy
|
|
}
|
|
|
|
// Get any namespace default roles/policies to look up
|
|
nsPolicies, nsRoles, err := getTokenNamespaceDefaults(ws, state, &token.EnterpriseMeta)
|
|
if err != nil {
|
|
return tokenInfo, err
|
|
}
|
|
tokenInfo.NamespaceDefaultPolicyIDs = nsPolicies
|
|
tokenInfo.NamespaceDefaultRoleIDs = nsRoles
|
|
for _, id := range nsPolicies {
|
|
policyIDs[id] = struct{}{}
|
|
}
|
|
for _, id := range nsRoles {
|
|
roleIDs[id] = struct{}{}
|
|
}
|
|
|
|
// Add each role's policies and node/service identity policies
|
|
for roleID := range roleIDs {
|
|
_, role, err := state.ACLRoleGetByID(ws, roleID, &token.EnterpriseMeta)
|
|
if err != nil {
|
|
return tokenInfo, err
|
|
}
|
|
if role == nil {
|
|
continue
|
|
}
|
|
|
|
for _, policy := range role.Policies {
|
|
policyIDs[policy.ID] = struct{}{}
|
|
}
|
|
|
|
for _, identity := range role.ServiceIdentities {
|
|
policy := identity.SyntheticPolicy(&role.EnterpriseMeta)
|
|
identityPolicies[policy.ID] = policy
|
|
}
|
|
for _, identity := range role.NodeIdentities {
|
|
policy := identity.SyntheticPolicy(&role.EnterpriseMeta)
|
|
identityPolicies[policy.ID] = policy
|
|
}
|
|
|
|
tokenInfo.ExpandedRoles = append(tokenInfo.ExpandedRoles, role)
|
|
}
|
|
|
|
var policies []*structs.ACLPolicy
|
|
for id := range policyIDs {
|
|
_, policy, err := state.ACLPolicyGetByID(ws, id, &token.EnterpriseMeta)
|
|
if err != nil {
|
|
return tokenInfo, err
|
|
}
|
|
if policy == nil {
|
|
continue
|
|
}
|
|
policies = append(policies, policy)
|
|
}
|
|
for _, policy := range identityPolicies {
|
|
policies = append(policies, policy)
|
|
}
|
|
|
|
tokenInfo.ExpandedPolicies = policies
|
|
tokenInfo.AgentACLDefaultPolicy = a.srv.config.ACLResolverSettings.ACLDefaultPolicy
|
|
tokenInfo.AgentACLDownPolicy = a.srv.config.ACLResolverSettings.ACLDownPolicy
|
|
tokenInfo.ResolvedByAgent = a.srv.config.NodeName
|
|
|
|
return tokenInfo, nil
|
|
}
|
|
|
|
func (a *ACL) TokenClone(args *structs.ACLTokenSetRequest, reply *structs.ACLToken) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.ACLToken.EnterpriseMeta, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
// clients will not know whether the server has local token store. In the case
|
|
// where it doesn't we will transparently forward requests.
|
|
if !a.srv.LocalTokensEnabled() {
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.TokenClone", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "token", "clone"}, time.Now())
|
|
|
|
var authzContext acl.AuthorizerContext
|
|
authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.ACLToken.EnterpriseMeta, &authzContext)
|
|
if err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLWriteAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
_, token, err := a.srv.fsm.State().ACLTokenGetByAccessor(nil, args.ACLToken.AccessorID, &args.ACLToken.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
} else if token == nil {
|
|
if ns := args.ACLToken.EnterpriseMeta.NamespaceOrEmpty(); ns != "" {
|
|
return fmt.Errorf("token not found in namespace %s: %w", ns, acl.ErrNotFound)
|
|
}
|
|
return fmt.Errorf("token does not exist: %w", acl.ErrNotFound)
|
|
} else if token.IsExpired(time.Now()) {
|
|
return fmt.Errorf("token is expired: %w", acl.ErrNotFound)
|
|
} else if !a.srv.InPrimaryDatacenter() && !token.Local {
|
|
// global token writes must be forwarded to the primary DC
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
return a.srv.forwardDC("ACL.TokenClone", a.srv.config.PrimaryDatacenter, args, reply)
|
|
}
|
|
|
|
if token.AuthMethod != "" {
|
|
return fmt.Errorf("Cannot clone a token created from an auth method")
|
|
}
|
|
|
|
clone := &structs.ACLToken{
|
|
Policies: token.Policies,
|
|
Roles: token.Roles,
|
|
ServiceIdentities: token.ServiceIdentities,
|
|
NodeIdentities: token.NodeIdentities,
|
|
Local: token.Local,
|
|
Description: token.Description,
|
|
ExpirationTime: token.ExpirationTime,
|
|
EnterpriseMeta: args.ACLToken.EnterpriseMeta,
|
|
}
|
|
|
|
if args.ACLToken.Description != "" {
|
|
clone.Description = args.ACLToken.Description
|
|
}
|
|
|
|
updated, err := a.srv.aclTokenWriter().Create(clone, false)
|
|
if err == nil {
|
|
*reply = *updated
|
|
}
|
|
return err
|
|
}
|
|
|
|
func (a *ACL) TokenSet(args *structs.ACLTokenSetRequest, reply *structs.ACLToken) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.ACLToken.EnterpriseMeta, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Global token creation/modification always goes to the ACL DC
|
|
if !args.ACLToken.Local {
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
} else if !a.srv.LocalTokensEnabled() {
|
|
return fmt.Errorf("Local tokens are disabled")
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.TokenSet", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "token", "upsert"}, time.Now())
|
|
|
|
// Verify token is permitted to modify ACLs
|
|
var authzContext acl.AuthorizerContext
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.ACLToken.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLWriteAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
var (
|
|
updated *structs.ACLToken
|
|
err error
|
|
)
|
|
writer := a.srv.aclTokenWriter()
|
|
if args.ACLToken.AccessorID == "" || args.Create {
|
|
updated, err = writer.Create(&args.ACLToken, false)
|
|
} else {
|
|
updated, err = writer.Update(&args.ACLToken)
|
|
}
|
|
|
|
if err == nil {
|
|
*reply = *updated
|
|
}
|
|
return err
|
|
}
|
|
|
|
func (a *ACL) TokenDelete(args *structs.ACLTokenDeleteRequest, reply *string) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.TokenDelete", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "token", "delete"}, time.Now())
|
|
|
|
// Verify token is permitted to modify ACLs
|
|
var authzContext acl.AuthorizerContext
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLWriteAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
if _, err := uuid.ParseUUID(args.TokenID); err != nil {
|
|
return fmt.Errorf("Accessor ID is missing or an invalid UUID")
|
|
}
|
|
|
|
if args.TokenID == acl.AnonymousTokenID {
|
|
return fmt.Errorf("Delete operation not permitted on the anonymous token")
|
|
}
|
|
|
|
// grab the token here so we can invalidate our cache later on
|
|
_, token, err := a.srv.fsm.State().ACLTokenGetByAccessor(nil, args.TokenID, &args.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if token != nil {
|
|
if args.Token == token.SecretID {
|
|
return fmt.Errorf("Deletion of the request's authorization token is not permitted")
|
|
}
|
|
|
|
// No need to check expiration time because it's being deleted.
|
|
|
|
// token found in secondary DC but its not local so it must be deleted in the primary
|
|
if !a.srv.InPrimaryDatacenter() && !token.Local {
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
return a.srv.forwardDC("ACL.TokenDelete", a.srv.config.PrimaryDatacenter, args, reply)
|
|
}
|
|
} else if !a.srv.InPrimaryDatacenter() {
|
|
// token not found in secondary DC - attempt to delete within the primary
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
return a.srv.forwardDC("ACL.TokenDelete", a.srv.config.PrimaryDatacenter, args, reply)
|
|
} else {
|
|
// in Primary Datacenter but the token does not exist - return early indicating it wasn't found.
|
|
if ns := args.EnterpriseMeta.NamespaceOrEmpty(); ns != "" {
|
|
return fmt.Errorf("token not found in namespace %s: %w", ns, acl.ErrNotFound)
|
|
}
|
|
return fmt.Errorf("token does not exist: %w", acl.ErrNotFound)
|
|
}
|
|
|
|
req := &structs.ACLTokenBatchDeleteRequest{
|
|
TokenIDs: []string{args.TokenID},
|
|
}
|
|
|
|
_, err = a.srv.raftApply(structs.ACLTokenDeleteRequestType, req)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to apply token delete request: %v", err)
|
|
}
|
|
|
|
// Purge the identity from the cache to prevent using the previous definition of the identity
|
|
a.srv.ACLResolver.cache.RemoveIdentityWithSecretToken(token.SecretID)
|
|
|
|
if reply != nil {
|
|
*reply = token.AccessorID
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (a *ACL) TokenList(args *structs.ACLTokenListRequest, reply *structs.ACLTokenListResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, false); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
if args.Datacenter != a.srv.config.PrimaryDatacenter {
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
args.IncludeLocal = false
|
|
args.IncludeGlobal = true
|
|
}
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.TokenList", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
var authzContext acl.AuthorizerContext
|
|
var requestMeta acl.EnterpriseMeta
|
|
authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &requestMeta, &authzContext)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
// merge the token default meta into the requests meta
|
|
args.EnterpriseMeta.Merge(&requestMeta)
|
|
args.EnterpriseMeta.FillAuthzContext(&authzContext)
|
|
if err := authz.ToAllowAuthorizer().ACLReadAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
var methodMeta *acl.EnterpriseMeta
|
|
if args.AuthMethod != "" {
|
|
methodMeta = args.ACLAuthMethodEnterpriseMeta.ToEnterpriseMeta()
|
|
// attempt to merge in the overall meta, wildcards will not be merged
|
|
methodMeta.MergeNoWildcard(&args.EnterpriseMeta)
|
|
// in the event that the meta above didn't merge due to being a wildcard
|
|
// we ensure that proper token based meta inference occurs
|
|
methodMeta.Merge(&requestMeta)
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
index, tokens, err := state.ACLTokenList(ws, args.IncludeLocal, args.IncludeGlobal, args.Policy, args.Role, args.AuthMethod, methodMeta, &args.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
now := time.Now()
|
|
|
|
stubs := make([]*structs.ACLTokenListStub, 0, len(tokens))
|
|
for _, token := range tokens {
|
|
if token.IsExpired(now) {
|
|
continue
|
|
}
|
|
stubs = append(stubs, token.Stub())
|
|
}
|
|
|
|
// filter down to just the tokens that the requester has permissions to read
|
|
a.srv.filterACLWithAuthorizer(authz, &stubs)
|
|
|
|
reply.Index, reply.Tokens = index, stubs
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func (a *ACL) TokenBatchRead(args *structs.ACLTokenBatchGetRequest, reply *structs.ACLTokenBatchResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.TokenBatchRead", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
authz, err := a.srv.ResolveToken(args.Token)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
index, tokens, err := state.ACLTokenBatchGet(ws, args.AccessorIDs)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// This RPC is used for replication, so don't filter out expired tokens here.
|
|
|
|
// Filter the tokens down to just what we have permission to see - also redact
|
|
// secrets based on allowed permissions. We could just call filterACLWithAuthorizer
|
|
// on the whole token list but then it would require another pass through the token
|
|
// list to determine if any secrets were redacted. Its a small amount of code to
|
|
// process the loop so it was duplicated here and we instead call the filter func
|
|
// with just a single token.
|
|
ret := make(structs.ACLTokens, 0, len(tokens))
|
|
for _, token := range tokens {
|
|
final := token
|
|
a.srv.filterACLWithAuthorizer(authz, &final)
|
|
if final != nil {
|
|
ret = append(ret, final)
|
|
if final.SecretID == aclfilter.RedactedToken {
|
|
reply.Redacted = true
|
|
}
|
|
} else {
|
|
reply.Removed = true
|
|
}
|
|
}
|
|
|
|
reply.Index, reply.Tokens = index, ret
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func (a *ACL) PolicyRead(args *structs.ACLPolicyGetRequest, reply *structs.ACLPolicyResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, false); err != nil {
|
|
return err
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.PolicyRead", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
var authzContext acl.AuthorizerContext
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLReadAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
var (
|
|
index uint64
|
|
policy *structs.ACLPolicy
|
|
err error
|
|
)
|
|
if args.PolicyID != "" {
|
|
index, policy, err = state.ACLPolicyGetByID(ws, args.PolicyID, &args.EnterpriseMeta)
|
|
} else {
|
|
index, policy, err = state.ACLPolicyGetByName(ws, args.PolicyName, &args.EnterpriseMeta)
|
|
}
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
reply.Index, reply.Policy = index, policy
|
|
if policy == nil {
|
|
return errNotFound
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func (a *ACL) PolicyBatchRead(args *structs.ACLPolicyBatchGetRequest, reply *structs.ACLPolicyBatchResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.PolicyBatchRead", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
authz, err := a.srv.ResolveToken(args.Token)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
index, policies, err := state.ACLPolicyBatchGet(ws, args.PolicyIDs)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
a.srv.filterACLWithAuthorizer(authz, &policies)
|
|
|
|
reply.Index, reply.Policies = index, policies
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func (a *ACL) PolicySet(args *structs.ACLPolicySetRequest, reply *structs.ACLPolicy) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.Policy.EnterpriseMeta, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.InPrimaryDatacenter() {
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.PolicySet", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "policy", "upsert"}, time.Now())
|
|
|
|
// Verify token is permitted to modify ACLs
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.Policy.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLWriteAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
policy := &args.Policy
|
|
state := a.srv.fsm.State()
|
|
|
|
// Almost all of the checks here are also done in the state store. However,
|
|
// we want to prevent the raft operations when we know they are going to fail
|
|
// so we still do them here.
|
|
|
|
// ensure a name is set
|
|
if policy.Name == "" {
|
|
return fmt.Errorf("Invalid Policy: no Name is set")
|
|
}
|
|
|
|
if !acl.IsValidPolicyName(policy.Name) {
|
|
return fmt.Errorf("Invalid Policy: invalid Name. Only alphanumeric characters, '-' and '_' are allowed")
|
|
}
|
|
|
|
var idMatch *structs.ACLPolicy
|
|
var nameMatch *structs.ACLPolicy
|
|
var err error
|
|
|
|
if policy.ID != "" {
|
|
if _, err := uuid.ParseUUID(policy.ID); err != nil {
|
|
return fmt.Errorf("Policy ID invalid UUID")
|
|
}
|
|
|
|
_, idMatch, err = state.ACLPolicyGetByID(nil, policy.ID, nil)
|
|
if err != nil {
|
|
return fmt.Errorf("acl policy lookup by id failed: %v", err)
|
|
}
|
|
}
|
|
_, nameMatch, err = state.ACLPolicyGetByName(nil, policy.Name, &policy.EnterpriseMeta)
|
|
if err != nil {
|
|
return fmt.Errorf("acl policy lookup by name failed: %v", err)
|
|
}
|
|
|
|
if policy.ID == "" {
|
|
// with no policy ID one will be generated
|
|
var err error
|
|
policy.ID, err = lib.GenerateUUID(a.srv.checkPolicyUUID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// validate the name is unique
|
|
if nameMatch != nil {
|
|
return fmt.Errorf("Invalid Policy: A Policy with Name %q already exists", policy.Name)
|
|
}
|
|
} else {
|
|
// Verify the policy exists
|
|
if idMatch == nil {
|
|
return fmt.Errorf("cannot find policy %s", policy.ID)
|
|
}
|
|
|
|
// Verify that the name isn't changing or that the name is not already used
|
|
if idMatch.Name != policy.Name && nameMatch != nil {
|
|
return fmt.Errorf("Invalid Policy: A policy with name %q already exists", policy.Name)
|
|
}
|
|
|
|
if policy.ID == structs.ACLPolicyGlobalManagementID {
|
|
if policy.Datacenters != nil || len(policy.Datacenters) > 0 {
|
|
return fmt.Errorf("Changing the Datacenters of the builtin global-management policy is not permitted")
|
|
}
|
|
|
|
if policy.Rules != idMatch.Rules {
|
|
return fmt.Errorf("Changing the Rules for the builtin global-management policy is not permitted")
|
|
}
|
|
}
|
|
}
|
|
|
|
// validate the rules
|
|
_, err = acl.NewPolicyFromSource(policy.Rules, a.srv.aclConfig, policy.EnterprisePolicyMeta())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// validate the enterprise specific fields
|
|
if err = a.policyUpsertValidateEnterprise(policy, idMatch); err != nil {
|
|
return err
|
|
}
|
|
|
|
// calculate the hash for this policy
|
|
policy.SetHash(true)
|
|
|
|
req := &structs.ACLPolicyBatchSetRequest{
|
|
Policies: structs.ACLPolicies{policy},
|
|
}
|
|
|
|
_, err = a.srv.raftApply(structs.ACLPolicySetRequestType, req)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to apply policy upsert request: %v", err)
|
|
}
|
|
|
|
// Remove from the cache to prevent stale cache usage
|
|
a.srv.ACLResolver.cache.RemovePolicy(policy.ID)
|
|
|
|
if _, policy, err := a.srv.fsm.State().ACLPolicyGetByID(nil, policy.ID, &policy.EnterpriseMeta); err == nil && policy != nil {
|
|
*reply = *policy
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (a *ACL) PolicyDelete(args *structs.ACLPolicyDeleteRequest, reply *string) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.InPrimaryDatacenter() {
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.PolicyDelete", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "policy", "delete"}, time.Now())
|
|
|
|
// Verify token is permitted to modify ACLs
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLWriteAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
_, policy, err := a.srv.fsm.State().ACLPolicyGetByID(nil, args.PolicyID, &args.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if policy == nil {
|
|
if ns := args.EnterpriseMeta.NamespaceOrEmpty(); ns != "" {
|
|
return fmt.Errorf("policy not found in namespace %s: %w", ns, acl.ErrNotFound)
|
|
}
|
|
return fmt.Errorf("policy does not exist: %w", acl.ErrNotFound)
|
|
}
|
|
|
|
if policy.ID == structs.ACLPolicyGlobalManagementID {
|
|
return fmt.Errorf("Delete operation not permitted on the builtin global-management policy")
|
|
}
|
|
|
|
req := structs.ACLPolicyBatchDeleteRequest{
|
|
PolicyIDs: []string{args.PolicyID},
|
|
}
|
|
|
|
_, err = a.srv.raftApply(structs.ACLPolicyDeleteRequestType, &req)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to apply policy delete request: %v", err)
|
|
}
|
|
|
|
a.srv.ACLResolver.cache.RemovePolicy(policy.ID)
|
|
|
|
*reply = policy.Name
|
|
|
|
return nil
|
|
}
|
|
|
|
func (a *ACL) PolicyList(args *structs.ACLPolicyListRequest, reply *structs.ACLPolicyListResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, false); err != nil {
|
|
return err
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.PolicyList", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext)
|
|
if err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLReadAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
index, policies, err := state.ACLPolicyList(ws, &args.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// filter down to just what the requester has permissions to see
|
|
a.srv.filterACLWithAuthorizer(authz, &policies)
|
|
|
|
var stubs structs.ACLPolicyListStubs
|
|
for _, policy := range policies {
|
|
stubs = append(stubs, policy.Stub())
|
|
}
|
|
|
|
reply.Index, reply.Policies = index, stubs
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// PolicyResolve is used to retrieve a subset of the policies associated with a given token
|
|
// The policy ids in the args simply act as a filter on the policy set assigned to the token
|
|
func (a *ACL) PolicyResolve(args *structs.ACLPolicyBatchGetRequest, reply *structs.ACLPolicyBatchResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.PolicyResolve", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
// get full list of policies for this token
|
|
identity, policies, err := a.srv.ACLResolver.resolveTokenToIdentityAndPolicies(args.Token)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
entIdentity, entPolicies, err := a.srv.ACLResolver.resolveEnterpriseIdentityAndPolicies(identity)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
idMap := make(map[string]*structs.ACLPolicy)
|
|
for _, policyID := range identity.PolicyIDs() {
|
|
idMap[policyID] = nil
|
|
}
|
|
if entIdentity != nil {
|
|
for _, policyID := range entIdentity.PolicyIDs() {
|
|
idMap[policyID] = nil
|
|
}
|
|
}
|
|
|
|
for _, policy := range policies {
|
|
idMap[policy.ID] = policy
|
|
}
|
|
for _, policy := range entPolicies {
|
|
idMap[policy.ID] = policy
|
|
}
|
|
|
|
for _, policyID := range args.PolicyIDs {
|
|
if policy, ok := idMap[policyID]; ok {
|
|
// only add non-deleted policies
|
|
if policy != nil {
|
|
reply.Policies = append(reply.Policies, policy)
|
|
}
|
|
} else {
|
|
// send a permission denied to indicate that the request included
|
|
// policy ids not associated with this token
|
|
return acl.ErrPermissionDenied
|
|
}
|
|
}
|
|
|
|
a.srv.SetQueryMeta(&reply.QueryMeta, args.Token)
|
|
|
|
return nil
|
|
}
|
|
|
|
// ReplicationStatus is used to retrieve the current ACL replication status.
|
|
func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest,
|
|
reply *structs.ACLReplicationStatus) error {
|
|
// This must be sent to the leader, so we fix the args since we are
|
|
// re-using a structure where we don't support all the options.
|
|
args.RequireConsistent = true
|
|
args.AllowStale = false
|
|
if done, err := a.srv.ForwardRPC("ACL.ReplicationStatus", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
// There's no ACL token required here since this doesn't leak any
|
|
// sensitive information, and we don't want people to have to use
|
|
// management tokens if they are querying this via a health check.
|
|
|
|
// Poll the latest status.
|
|
a.srv.aclReplicationStatusLock.RLock()
|
|
*reply = a.srv.aclReplicationStatus
|
|
a.srv.aclReplicationStatusLock.RUnlock()
|
|
return nil
|
|
}
|
|
|
|
func timePointer(t time.Time) *time.Time {
|
|
return &t
|
|
}
|
|
|
|
func (a *ACL) RoleRead(args *structs.ACLRoleGetRequest, reply *structs.ACLRoleResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, false); err != nil {
|
|
return err
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.RoleRead", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLReadAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
var (
|
|
index uint64
|
|
role *structs.ACLRole
|
|
err error
|
|
)
|
|
if args.RoleID != "" {
|
|
index, role, err = state.ACLRoleGetByID(ws, args.RoleID, &args.EnterpriseMeta)
|
|
} else {
|
|
index, role, err = state.ACLRoleGetByName(ws, args.RoleName, &args.EnterpriseMeta)
|
|
}
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
reply.Index, reply.Role = index, role
|
|
if role == nil {
|
|
return errNotFound
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func (a *ACL) RoleBatchRead(args *structs.ACLRoleBatchGetRequest, reply *structs.ACLRoleBatchResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.RoleBatchRead", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
authz, err := a.srv.ResolveToken(args.Token)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
index, roles, err := state.ACLRoleBatchGet(ws, args.RoleIDs)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
a.srv.filterACLWithAuthorizer(authz, &roles)
|
|
|
|
reply.Index, reply.Roles = index, roles
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func (a *ACL) RoleSet(args *structs.ACLRoleSetRequest, reply *structs.ACLRole) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.Role.EnterpriseMeta, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.InPrimaryDatacenter() {
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.RoleSet", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "role", "upsert"}, time.Now())
|
|
|
|
// Verify token is permitted to modify ACLs
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.Role.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLWriteAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
role := &args.Role
|
|
state := a.srv.fsm.State()
|
|
|
|
// Almost all of the checks here are also done in the state store. However,
|
|
// we want to prevent the raft operations when we know they are going to fail
|
|
// so we still do them here.
|
|
|
|
// ensure a name is set
|
|
if role.Name == "" {
|
|
return fmt.Errorf("Invalid Role: no Name is set")
|
|
}
|
|
|
|
if !acl.IsValidRoleName(role.Name) {
|
|
return fmt.Errorf("Invalid Role: invalid Name. Only alphanumeric characters, '-' and '_' are allowed")
|
|
}
|
|
|
|
var existing *structs.ACLRole
|
|
var err error
|
|
if role.ID == "" {
|
|
// with no role ID one will be generated
|
|
role.ID, err = lib.GenerateUUID(a.srv.checkRoleUUID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// validate the name is unique
|
|
if _, existing, err = state.ACLRoleGetByName(nil, role.Name, &role.EnterpriseMeta); err != nil {
|
|
return fmt.Errorf("acl role lookup by name failed: %v", err)
|
|
} else if existing != nil {
|
|
return fmt.Errorf("Invalid Role: A Role with Name %q already exists", role.Name)
|
|
}
|
|
} else {
|
|
if _, err := uuid.ParseUUID(role.ID); err != nil {
|
|
return fmt.Errorf("Role ID invalid UUID")
|
|
}
|
|
|
|
// Verify the role exists
|
|
_, existing, err = state.ACLRoleGetByID(nil, role.ID, nil)
|
|
if err != nil {
|
|
return fmt.Errorf("acl role lookup failed: %v", err)
|
|
} else if existing == nil {
|
|
return fmt.Errorf("cannot find role %s", role.ID)
|
|
}
|
|
|
|
if existing.Name != role.Name {
|
|
if _, nameMatch, err := state.ACLRoleGetByName(nil, role.Name, &role.EnterpriseMeta); err != nil {
|
|
return fmt.Errorf("acl role lookup by name failed: %v", err)
|
|
} else if nameMatch != nil {
|
|
return fmt.Errorf("Invalid Role: A role with name %q already exists", role.Name)
|
|
}
|
|
}
|
|
}
|
|
|
|
// validate the enterprise specific fields
|
|
if err := a.roleUpsertValidateEnterprise(role, existing); err != nil {
|
|
return err
|
|
}
|
|
|
|
policyIDs := make(map[string]struct{})
|
|
var policies []structs.ACLRolePolicyLink
|
|
|
|
// Validate all the policy names and convert them to policy IDs
|
|
for _, link := range role.Policies {
|
|
if link.ID == "" {
|
|
_, policy, err := state.ACLPolicyGetByName(nil, link.Name, &role.EnterpriseMeta)
|
|
if err != nil {
|
|
return fmt.Errorf("Error looking up policy for name %q: %v", link.Name, err)
|
|
}
|
|
if policy == nil {
|
|
return fmt.Errorf("No such ACL policy with name %q", link.Name)
|
|
}
|
|
link.ID = policy.ID
|
|
}
|
|
|
|
// Do not store the policy name within raft/memdb as the policy could be renamed in the future.
|
|
link.Name = ""
|
|
|
|
// dedup policy links by id
|
|
if _, ok := policyIDs[link.ID]; !ok {
|
|
policies = append(policies, link)
|
|
policyIDs[link.ID] = struct{}{}
|
|
}
|
|
}
|
|
role.Policies = policies
|
|
|
|
for _, svcid := range role.ServiceIdentities {
|
|
if svcid.ServiceName == "" {
|
|
return fmt.Errorf("Service identity is missing the service name field on this role")
|
|
}
|
|
if !acl.IsValidServiceIdentityName(svcid.ServiceName) {
|
|
return fmt.Errorf("Service identity %q has an invalid name. Only lowercase alphanumeric characters, '-' and '_' are allowed", svcid.ServiceName)
|
|
}
|
|
}
|
|
role.ServiceIdentities = role.ServiceIdentities.Deduplicate()
|
|
|
|
for _, nodeid := range role.NodeIdentities {
|
|
if nodeid.NodeName == "" {
|
|
return fmt.Errorf("Node identity is missing the node name field on this role")
|
|
}
|
|
if nodeid.Datacenter == "" {
|
|
return fmt.Errorf("Node identity is missing the datacenter field on this role")
|
|
}
|
|
if !acl.IsValidNodeIdentityName(nodeid.NodeName) {
|
|
return fmt.Errorf("Node identity has an invalid name. Only lowercase alphanumeric characters, '-' and '_' are allowed")
|
|
}
|
|
}
|
|
role.NodeIdentities = role.NodeIdentities.Deduplicate()
|
|
|
|
// calculate the hash for this role
|
|
role.SetHash(true)
|
|
|
|
req := &structs.ACLRoleBatchSetRequest{
|
|
Roles: structs.ACLRoles{role},
|
|
}
|
|
|
|
_, err = a.srv.raftApply(structs.ACLRoleSetRequestType, req)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to apply role upsert request: %v", err)
|
|
}
|
|
|
|
// Remove from the cache to prevent stale cache usage
|
|
a.srv.ACLResolver.cache.RemoveRole(role.ID)
|
|
|
|
if _, role, err := a.srv.fsm.State().ACLRoleGetByID(nil, role.ID, &role.EnterpriseMeta); err == nil && role != nil {
|
|
*reply = *role
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (a *ACL) RoleDelete(args *structs.ACLRoleDeleteRequest, reply *string) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.InPrimaryDatacenter() {
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.RoleDelete", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "role", "delete"}, time.Now())
|
|
|
|
// Verify token is permitted to modify ACLs
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLWriteAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
_, role, err := a.srv.fsm.State().ACLRoleGetByID(nil, args.RoleID, &args.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if role == nil {
|
|
if ns := args.EnterpriseMeta.NamespaceOrEmpty(); ns != "" {
|
|
return fmt.Errorf("role not found in namespace %s: %w", ns, acl.ErrNotFound)
|
|
}
|
|
return fmt.Errorf("role does not exist: %w", acl.ErrNotFound)
|
|
}
|
|
|
|
req := structs.ACLRoleBatchDeleteRequest{
|
|
RoleIDs: []string{args.RoleID},
|
|
}
|
|
|
|
_, err = a.srv.raftApply(structs.ACLRoleDeleteRequestType, &req)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to apply role delete request: %v", err)
|
|
}
|
|
|
|
a.srv.ACLResolver.cache.RemoveRole(role.ID)
|
|
|
|
*reply = role.Name
|
|
|
|
return nil
|
|
}
|
|
|
|
func (a *ACL) RoleList(args *structs.ACLRoleListRequest, reply *structs.ACLRoleListResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, false); err != nil {
|
|
return err
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.RoleList", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext)
|
|
if err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLReadAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
index, roles, err := state.ACLRoleList(ws, args.Policy, &args.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
a.srv.filterACLWithAuthorizer(authz, &roles)
|
|
|
|
reply.Index, reply.Roles = index, roles
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// RoleResolve is used to retrieve a subset of the roles associated with a given token
|
|
// The role ids in the args simply act as a filter on the role set assigned to the token
|
|
func (a *ACL) RoleResolve(args *structs.ACLRoleBatchGetRequest, reply *structs.ACLRoleBatchResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.RoleResolve", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
// get full list of roles for this token
|
|
identity, roles, err := a.srv.ACLResolver.resolveTokenToIdentityAndRoles(args.Token)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
entIdentity, entRoles, err := a.srv.ACLResolver.resolveEnterpriseIdentityAndRoles(identity)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
idMap := make(map[string]*structs.ACLRole)
|
|
for _, roleID := range identity.RoleIDs() {
|
|
idMap[roleID] = nil
|
|
}
|
|
if entIdentity != nil {
|
|
for _, roleID := range entIdentity.RoleIDs() {
|
|
idMap[roleID] = nil
|
|
}
|
|
}
|
|
|
|
for _, role := range roles {
|
|
idMap[role.ID] = role
|
|
}
|
|
for _, role := range entRoles {
|
|
idMap[role.ID] = role
|
|
}
|
|
|
|
for _, roleID := range args.RoleIDs {
|
|
if role, ok := idMap[roleID]; ok {
|
|
// only add non-deleted roles
|
|
if role != nil {
|
|
reply.Roles = append(reply.Roles, role)
|
|
}
|
|
} else {
|
|
// send a permission denied to indicate that the request included
|
|
// role ids not associated with this token
|
|
return acl.ErrPermissionDenied
|
|
}
|
|
}
|
|
|
|
a.srv.SetQueryMeta(&reply.QueryMeta, args.Token)
|
|
|
|
return nil
|
|
}
|
|
|
|
var errAuthMethodsRequireTokenReplication = errors.New("Token replication is required for auth methods to function")
|
|
|
|
func (a *ACL) BindingRuleRead(args *structs.ACLBindingRuleGetRequest, reply *structs.ACLBindingRuleResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, false); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
return errAuthMethodsRequireTokenReplication
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.BindingRuleRead", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext)
|
|
if err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLReadAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
index, rule, err := state.ACLBindingRuleGetByID(ws, args.BindingRuleID, &args.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
reply.Index, reply.BindingRule = index, rule
|
|
if rule == nil {
|
|
return errNotFound
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func (a *ACL) BindingRuleSet(args *structs.ACLBindingRuleSetRequest, reply *structs.ACLBindingRule) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.BindingRule.EnterpriseMeta, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
return errAuthMethodsRequireTokenReplication
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.BindingRuleSet", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "bindingrule", "upsert"}, time.Now())
|
|
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
// Verify token is permitted to modify ACLs
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.BindingRule.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLWriteAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
var existing *structs.ACLBindingRule
|
|
rule := &args.BindingRule
|
|
state := a.srv.fsm.State()
|
|
|
|
if rule.ID == "" {
|
|
// with no binding rule ID one will be generated
|
|
var err error
|
|
|
|
rule.ID, err = lib.GenerateUUID(a.srv.checkBindingRuleUUID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
if _, err := uuid.ParseUUID(rule.ID); err != nil {
|
|
return fmt.Errorf("Binding Rule ID invalid UUID")
|
|
}
|
|
|
|
// Verify the role exists
|
|
var err error
|
|
// specifically disregarding the enterprise meta here
|
|
_, existing, err = state.ACLBindingRuleGetByID(nil, rule.ID, nil)
|
|
if err != nil {
|
|
return fmt.Errorf("acl binding rule lookup failed: %v", err)
|
|
} else if existing == nil {
|
|
return fmt.Errorf("cannot find binding rule %s", rule.ID)
|
|
}
|
|
|
|
if rule.AuthMethod == "" {
|
|
rule.AuthMethod = existing.AuthMethod
|
|
} else if existing.AuthMethod != rule.AuthMethod {
|
|
return fmt.Errorf("the AuthMethod field of an Binding Rule is immutable")
|
|
}
|
|
}
|
|
|
|
if rule.AuthMethod == "" {
|
|
return fmt.Errorf("Invalid Binding Rule: no AuthMethod is set")
|
|
}
|
|
|
|
// this is done early here to produce better errors
|
|
if err := state.ACLBindingRuleUpsertValidateEnterprise(rule, existing); err != nil {
|
|
return err
|
|
}
|
|
|
|
methodIdx, method, err := state.ACLAuthMethodGetByName(nil, rule.AuthMethod, &args.BindingRule.EnterpriseMeta)
|
|
if err != nil {
|
|
return fmt.Errorf("acl auth method lookup failed: %v", err)
|
|
} else if method == nil {
|
|
return fmt.Errorf("cannot find auth method with name %q", rule.AuthMethod)
|
|
}
|
|
validator, err := a.srv.loadAuthMethodValidator(methodIdx, method)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Create a blank placeholder identity for use in validation below.
|
|
blankID := validator.NewIdentity()
|
|
|
|
if rule.Selector != "" {
|
|
if _, err := bexpr.CreateEvaluatorForType(rule.Selector, nil, blankID.SelectableFields); err != nil {
|
|
return fmt.Errorf("invalid Binding Rule: Selector is invalid: %v", err)
|
|
}
|
|
}
|
|
|
|
if rule.BindType == "" {
|
|
return fmt.Errorf("Invalid Binding Rule: no BindType is set")
|
|
}
|
|
|
|
if rule.BindName == "" {
|
|
return fmt.Errorf("Invalid Binding Rule: no BindName is set")
|
|
}
|
|
|
|
switch rule.BindType {
|
|
case structs.BindingRuleBindTypeService:
|
|
case structs.BindingRuleBindTypeNode:
|
|
case structs.BindingRuleBindTypeRole:
|
|
default:
|
|
return fmt.Errorf("Invalid Binding Rule: unknown BindType %q", rule.BindType)
|
|
}
|
|
|
|
if valid, err := auth.IsValidBindName(rule.BindType, rule.BindName, blankID.ProjectedVarNames()); err != nil {
|
|
return fmt.Errorf("Invalid Binding Rule: invalid BindName: %v", err)
|
|
} else if !valid {
|
|
return fmt.Errorf("Invalid Binding Rule: invalid BindName")
|
|
}
|
|
|
|
req := &structs.ACLBindingRuleBatchSetRequest{
|
|
BindingRules: structs.ACLBindingRules{rule},
|
|
}
|
|
|
|
_, err = a.srv.raftApply(structs.ACLBindingRuleSetRequestType, req)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to apply binding rule upsert request: %v", err)
|
|
}
|
|
|
|
if _, rule, err := a.srv.fsm.State().ACLBindingRuleGetByID(nil, rule.ID, &rule.EnterpriseMeta); err == nil && rule != nil {
|
|
*reply = *rule
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (a *ACL) BindingRuleDelete(args *structs.ACLBindingRuleDeleteRequest, reply *bool) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
return errAuthMethodsRequireTokenReplication
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.BindingRuleDelete", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "bindingrule", "delete"}, time.Now())
|
|
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
// Verify token is permitted to modify ACLs
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLWriteAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
_, rule, err := a.srv.fsm.State().ACLBindingRuleGetByID(nil, args.BindingRuleID, &args.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if rule == nil {
|
|
if ns := args.EnterpriseMeta.NamespaceOrEmpty(); ns != "" {
|
|
return fmt.Errorf("binding rule not found in namespace %s: %w", ns, acl.ErrNotFound)
|
|
}
|
|
return fmt.Errorf("binding rule does not exist: %w", acl.ErrNotFound)
|
|
}
|
|
|
|
req := structs.ACLBindingRuleBatchDeleteRequest{
|
|
BindingRuleIDs: []string{args.BindingRuleID},
|
|
}
|
|
|
|
_, err = a.srv.raftApply(structs.ACLBindingRuleDeleteRequestType, &req)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to apply binding rule delete request: %v", err)
|
|
}
|
|
|
|
*reply = true
|
|
|
|
return nil
|
|
}
|
|
|
|
func (a *ACL) BindingRuleList(args *structs.ACLBindingRuleListRequest, reply *structs.ACLBindingRuleListResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, false); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
return errAuthMethodsRequireTokenReplication
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.BindingRuleList", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext)
|
|
if err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLReadAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
index, rules, err := state.ACLBindingRuleList(ws, args.AuthMethod, &args.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
a.srv.filterACLWithAuthorizer(authz, &rules)
|
|
|
|
reply.Index, reply.BindingRules = index, rules
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func (a *ACL) AuthMethodRead(args *structs.ACLAuthMethodGetRequest, reply *structs.ACLAuthMethodResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, false); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
return errAuthMethodsRequireTokenReplication
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.AuthMethodRead", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLReadAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
index, method, err := state.ACLAuthMethodGetByName(ws, args.AuthMethodName, &args.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
reply.Index, reply.AuthMethod = index, method
|
|
if method == nil {
|
|
return errNotFound
|
|
}
|
|
|
|
_ = a.srv.enterpriseAuthMethodTypeValidation(method.Type)
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func (a *ACL) AuthMethodSet(args *structs.ACLAuthMethodSetRequest, reply *structs.ACLAuthMethod) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.AuthMethod.EnterpriseMeta, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
return errAuthMethodsRequireTokenReplication
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.AuthMethodSet", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "authmethod", "upsert"}, time.Now())
|
|
|
|
// Verify token is permitted to modify ACLs
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.AuthMethod.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLWriteAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
method := &args.AuthMethod
|
|
state := a.srv.fsm.State()
|
|
|
|
// ensure a name is set
|
|
if method.Name == "" {
|
|
return fmt.Errorf("Invalid Auth Method: no Name is set")
|
|
}
|
|
if !acl.IsValidAuthMethodName(method.Name) {
|
|
return fmt.Errorf("Invalid Auth Method: invalid Name. Only alphanumeric characters, '-' and '_' are allowed")
|
|
}
|
|
|
|
if err := a.srv.enterpriseAuthMethodTypeValidation(method.Type); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Check to see if the method exists first.
|
|
_, existing, err := state.ACLAuthMethodGetByName(nil, method.Name, &method.EnterpriseMeta)
|
|
if err != nil {
|
|
return fmt.Errorf("acl auth method lookup failed: %v", err)
|
|
}
|
|
|
|
if existing != nil {
|
|
if method.Type == "" {
|
|
method.Type = existing.Type
|
|
} else if existing.Type != method.Type {
|
|
return fmt.Errorf("the Type field of an Auth Method is immutable")
|
|
}
|
|
}
|
|
|
|
if !authmethod.IsRegisteredType(method.Type) {
|
|
return fmt.Errorf("Invalid Auth Method: Type should be one of: %v", authmethod.Types())
|
|
}
|
|
|
|
if method.MaxTokenTTL != 0 {
|
|
if method.MaxTokenTTL > a.srv.config.ACLTokenMaxExpirationTTL {
|
|
return fmt.Errorf("MaxTokenTTL %s cannot be more than %s",
|
|
method.MaxTokenTTL, a.srv.config.ACLTokenMaxExpirationTTL)
|
|
} else if method.MaxTokenTTL < a.srv.config.ACLTokenMinExpirationTTL {
|
|
return fmt.Errorf("MaxTokenTTL %s cannot be less than %s",
|
|
method.MaxTokenTTL, a.srv.config.ACLTokenMinExpirationTTL)
|
|
}
|
|
}
|
|
|
|
switch method.TokenLocality {
|
|
case "local", "":
|
|
case "global":
|
|
if !a.srv.InPrimaryDatacenter() {
|
|
return fmt.Errorf("Invalid Auth Method: TokenLocality 'global' can only be used in the primary datacenter")
|
|
}
|
|
default:
|
|
return fmt.Errorf("Invalid Auth Method: TokenLocality should be one of 'local' or 'global'")
|
|
}
|
|
|
|
// Instantiate a validator but do not cache it yet. This will validate the
|
|
// configuration.
|
|
validator, err := authmethod.NewValidator(a.srv.logger, method)
|
|
if err != nil {
|
|
return fmt.Errorf("Invalid Auth Method: %v", err)
|
|
}
|
|
|
|
if err := enterpriseAuthMethodValidation(method, validator); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.fsm.State().ACLAuthMethodUpsertValidateEnterprise(method, existing); err != nil {
|
|
return err
|
|
}
|
|
|
|
req := &structs.ACLAuthMethodBatchSetRequest{
|
|
AuthMethods: structs.ACLAuthMethods{method},
|
|
}
|
|
|
|
_, err = a.srv.raftApply(structs.ACLAuthMethodSetRequestType, req)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to apply auth method upsert request: %v", err)
|
|
}
|
|
|
|
if _, method, err := a.srv.fsm.State().ACLAuthMethodGetByName(nil, method.Name, &method.EnterpriseMeta); err == nil && method != nil {
|
|
*reply = *method
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (a *ACL) AuthMethodDelete(args *structs.ACLAuthMethodDeleteRequest, reply *bool) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
return errAuthMethodsRequireTokenReplication
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.AuthMethodDelete", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "authmethod", "delete"}, time.Now())
|
|
|
|
// Verify token is permitted to modify ACLs
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
if authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext); err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLWriteAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
_, method, err := a.srv.fsm.State().ACLAuthMethodGetByName(nil, args.AuthMethodName, &args.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if method == nil {
|
|
if ns := args.EnterpriseMeta.NamespaceOrEmpty(); ns != "" {
|
|
return fmt.Errorf("auth method not found in namespace %s: %w", ns, acl.ErrNotFound)
|
|
}
|
|
return fmt.Errorf("auth method does not exist: %w", acl.ErrNotFound)
|
|
}
|
|
|
|
if err := a.srv.enterpriseAuthMethodTypeValidation(method.Type); err != nil {
|
|
return err
|
|
}
|
|
|
|
req := structs.ACLAuthMethodBatchDeleteRequest{
|
|
AuthMethodNames: []string{args.AuthMethodName},
|
|
EnterpriseMeta: args.EnterpriseMeta,
|
|
}
|
|
|
|
_, err = a.srv.raftApply(structs.ACLAuthMethodDeleteRequestType, &req)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to apply auth method delete request: %v", err)
|
|
}
|
|
|
|
*reply = true
|
|
|
|
return nil
|
|
}
|
|
|
|
func (a *ACL) AuthMethodList(args *structs.ACLAuthMethodListRequest, reply *structs.ACLAuthMethodListResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.EnterpriseMeta, false); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
return errAuthMethodsRequireTokenReplication
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.AuthMethodList", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
var authzContext acl.AuthorizerContext
|
|
|
|
authz, err := a.srv.ResolveTokenAndDefaultMeta(args.Token, &args.EnterpriseMeta, &authzContext)
|
|
if err != nil {
|
|
return err
|
|
} else if err := authz.ToAllowAuthorizer().ACLReadAllowed(&authzContext); err != nil {
|
|
return err
|
|
}
|
|
|
|
return a.srv.blockingQuery(&args.QueryOptions, &reply.QueryMeta,
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
index, methods, err := state.ACLAuthMethodList(ws, &args.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
a.srv.filterACLWithAuthorizer(authz, &methods)
|
|
|
|
var stubs structs.ACLAuthMethodListStubs
|
|
for _, method := range methods {
|
|
_ = a.srv.enterpriseAuthMethodTypeValidation(method.Type)
|
|
stubs = append(stubs, method.Stub())
|
|
}
|
|
|
|
reply.Index, reply.AuthMethods = index, stubs
|
|
return nil
|
|
})
|
|
}
|
|
|
|
func (a *ACL) Login(args *structs.ACLLoginRequest, reply *structs.ACLToken) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
return errAuthMethodsRequireTokenReplication
|
|
}
|
|
|
|
if args.Auth == nil {
|
|
return fmt.Errorf("Invalid Login request: Missing auth parameters")
|
|
}
|
|
|
|
if err := a.srv.validateEnterpriseRequest(&args.Auth.EnterpriseMeta, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
if args.Token != "" { // This shouldn't happen.
|
|
return errors.New("do not provide a token when logging in")
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.Login", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "login"}, time.Now())
|
|
|
|
authMethod, validator, err := a.srv.loadAuthMethod(args.Auth.AuthMethod, &args.Auth.EnterpriseMeta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
verifiedIdentity, err := validator.ValidateLogin(context.Background(), args.Auth.BearerToken)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
description, err := auth.BuildTokenDescription("token created via login", args.Auth.Meta)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
token, err := a.srv.aclLogin().TokenForVerifiedIdentity(verifiedIdentity, authMethod, description)
|
|
if err == nil {
|
|
*reply = *token
|
|
}
|
|
return err
|
|
}
|
|
|
|
func (a *ACL) Logout(args *structs.ACLLogoutRequest, reply *bool) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !a.srv.LocalTokensEnabled() {
|
|
return errAuthMethodsRequireTokenReplication
|
|
}
|
|
|
|
if args.Token == "" {
|
|
return fmt.Errorf("no valid token ID provided: %w", acl.ErrNotFound)
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.Logout", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"acl", "logout"}, time.Now())
|
|
|
|
// No need to check expiration time because it's being deleted.
|
|
err := a.srv.aclTokenWriter().Delete(args.Token, true)
|
|
switch {
|
|
case errors.Is(err, auth.ErrCannotWriteGlobalToken):
|
|
// Writes to global tokens must be forwarded to the primary DC.
|
|
args.Datacenter = a.srv.config.PrimaryDatacenter
|
|
return a.srv.forwardDC("ACL.Logout", a.srv.config.PrimaryDatacenter, args, reply)
|
|
case err != nil:
|
|
return err
|
|
}
|
|
|
|
*reply = true
|
|
return nil
|
|
}
|
|
|
|
func (a *ACL) Authorize(args *structs.RemoteACLAuthorizationRequest, reply *[]structs.ACLAuthorizationResponse) error {
|
|
if err := a.aclPreCheck(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if done, err := a.srv.ForwardRPC("ACL.Authorize", args, reply); done {
|
|
return err
|
|
}
|
|
|
|
authz, err := a.srv.ResolveToken(args.Token)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
responses, err := structs.CreateACLAuthorizationResponses(authz, args.Requests)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
*reply = responses
|
|
return nil
|
|
}
|