2016-09-16 00:24:09 +00:00
|
|
|
package vaultclient
|
|
|
|
|
|
|
|
import (
|
2019-02-12 21:46:09 +00:00
|
|
|
"sync"
|
|
|
|
|
2017-09-29 16:58:48 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/uuid"
|
2016-09-16 00:24:09 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
vaultapi "github.com/hashicorp/vault/api"
|
|
|
|
)
|
|
|
|
|
2019-02-12 21:46:09 +00:00
|
|
|
// MockVaultClient is used for testing the vaultclient integration and is safe
|
|
|
|
// for concurrent access.
|
2016-09-16 00:24:09 +00:00
|
|
|
type MockVaultClient struct {
|
2019-02-12 21:46:09 +00:00
|
|
|
// stoppedTokens tracks the tokens that have stopped renewing
|
|
|
|
stoppedTokens []string
|
2016-09-16 00:24:09 +00:00
|
|
|
|
2019-02-12 21:46:09 +00:00
|
|
|
// renewTokens are the tokens that have been renewed and their error
|
2016-09-16 00:24:09 +00:00
|
|
|
// channels
|
2019-02-12 21:46:09 +00:00
|
|
|
renewTokens map[string]chan error
|
2016-09-16 00:24:09 +00:00
|
|
|
|
2019-02-12 21:46:09 +00:00
|
|
|
// renewTokenErrors is used to return an error when the RenewToken is called
|
2016-09-16 00:24:09 +00:00
|
|
|
// with the given token
|
2019-02-12 21:46:09 +00:00
|
|
|
renewTokenErrors map[string]error
|
2016-09-16 00:24:09 +00:00
|
|
|
|
2019-02-12 21:46:09 +00:00
|
|
|
// deriveTokenErrors maps an allocation ID and tasks to an error when the
|
2016-09-16 00:24:09 +00:00
|
|
|
// token is derived
|
2019-02-12 21:46:09 +00:00
|
|
|
deriveTokenErrors map[string]map[string]error
|
2016-10-18 18:22:16 +00:00
|
|
|
|
2016-10-18 18:36:04 +00:00
|
|
|
// DeriveTokenFn allows the caller to control the DeriveToken function. If
|
|
|
|
// not set an error is returned if found in DeriveTokenErrors and otherwise
|
|
|
|
// a token is generated and returned
|
2016-10-18 18:22:16 +00:00
|
|
|
DeriveTokenFn func(a *structs.Allocation, tasks []string) (map[string]string, error)
|
2019-02-12 21:46:09 +00:00
|
|
|
|
|
|
|
mu sync.Mutex
|
2016-09-16 00:24:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewMockVaultClient returns a MockVaultClient for testing
|
|
|
|
func NewMockVaultClient() *MockVaultClient { return &MockVaultClient{} }
|
|
|
|
|
|
|
|
func (vc *MockVaultClient) DeriveToken(a *structs.Allocation, tasks []string) (map[string]string, error) {
|
2019-02-12 21:46:09 +00:00
|
|
|
vc.mu.Lock()
|
|
|
|
defer vc.mu.Unlock()
|
|
|
|
|
2016-10-18 18:22:16 +00:00
|
|
|
if vc.DeriveTokenFn != nil {
|
|
|
|
return vc.DeriveTokenFn(a, tasks)
|
|
|
|
}
|
|
|
|
|
2016-09-16 00:24:09 +00:00
|
|
|
tokens := make(map[string]string, len(tasks))
|
|
|
|
for _, task := range tasks {
|
2019-02-12 21:46:09 +00:00
|
|
|
if tasks, ok := vc.deriveTokenErrors[a.ID]; ok {
|
2016-09-16 00:24:09 +00:00
|
|
|
if err, ok := tasks[task]; ok {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-09-29 16:58:48 +00:00
|
|
|
tokens[task] = uuid.Generate()
|
2016-09-16 00:24:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return tokens, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vc *MockVaultClient) SetDeriveTokenError(allocID string, tasks []string, err error) {
|
2019-02-12 21:46:09 +00:00
|
|
|
vc.mu.Lock()
|
|
|
|
defer vc.mu.Unlock()
|
|
|
|
|
|
|
|
if vc.deriveTokenErrors == nil {
|
|
|
|
vc.deriveTokenErrors = make(map[string]map[string]error, 10)
|
2016-09-16 00:24:09 +00:00
|
|
|
}
|
|
|
|
|
2019-02-12 21:46:09 +00:00
|
|
|
if _, ok := vc.renewTokenErrors[allocID]; !ok {
|
|
|
|
vc.deriveTokenErrors[allocID] = make(map[string]error, 10)
|
2016-09-16 00:24:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, task := range tasks {
|
2019-02-12 21:46:09 +00:00
|
|
|
vc.deriveTokenErrors[allocID][task] = err
|
2016-09-16 00:24:09 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vc *MockVaultClient) RenewToken(token string, interval int) (<-chan error, error) {
|
2019-02-12 21:46:09 +00:00
|
|
|
vc.mu.Lock()
|
|
|
|
defer vc.mu.Unlock()
|
|
|
|
|
|
|
|
if err, ok := vc.renewTokenErrors[token]; ok {
|
2016-09-16 00:24:09 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
renewCh := make(chan error)
|
2019-02-12 21:46:09 +00:00
|
|
|
if vc.renewTokens == nil {
|
|
|
|
vc.renewTokens = make(map[string]chan error, 10)
|
2016-09-16 00:24:09 +00:00
|
|
|
}
|
2019-02-12 21:46:09 +00:00
|
|
|
vc.renewTokens[token] = renewCh
|
2016-09-16 00:24:09 +00:00
|
|
|
return renewCh, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vc *MockVaultClient) SetRenewTokenError(token string, err error) {
|
2019-02-12 21:46:09 +00:00
|
|
|
vc.mu.Lock()
|
|
|
|
defer vc.mu.Unlock()
|
|
|
|
|
|
|
|
if vc.renewTokenErrors == nil {
|
|
|
|
vc.renewTokenErrors = make(map[string]error, 10)
|
2016-09-16 00:24:09 +00:00
|
|
|
}
|
|
|
|
|
2019-02-12 21:46:09 +00:00
|
|
|
vc.renewTokenErrors[token] = err
|
2016-09-16 00:24:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (vc *MockVaultClient) StopRenewToken(token string) error {
|
2019-02-12 21:46:09 +00:00
|
|
|
vc.mu.Lock()
|
|
|
|
defer vc.mu.Unlock()
|
|
|
|
|
|
|
|
vc.stoppedTokens = append(vc.stoppedTokens, token)
|
2016-09-16 00:24:09 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vc *MockVaultClient) RenewLease(leaseId string, interval int) (<-chan error, error) {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
func (vc *MockVaultClient) StopRenewLease(leaseId string) error { return nil }
|
|
|
|
func (vc *MockVaultClient) Start() {}
|
|
|
|
func (vc *MockVaultClient) Stop() {}
|
|
|
|
func (vc *MockVaultClient) GetConsulACL(string, string) (*vaultapi.Secret, error) { return nil, nil }
|
2019-02-12 21:46:09 +00:00
|
|
|
|
|
|
|
// StoppedTokens tracks the tokens that have stopped renewing
|
|
|
|
func (vc *MockVaultClient) StoppedTokens() []string {
|
|
|
|
vc.mu.Lock()
|
|
|
|
defer vc.mu.Unlock()
|
|
|
|
return vc.stoppedTokens
|
|
|
|
}
|
|
|
|
|
|
|
|
// RenewTokens are the tokens that have been renewed and their error
|
|
|
|
// channels
|
|
|
|
func (vc *MockVaultClient) RenewTokens() map[string]chan error {
|
|
|
|
vc.mu.Lock()
|
|
|
|
defer vc.mu.Unlock()
|
|
|
|
return vc.renewTokens
|
|
|
|
}
|
|
|
|
|
|
|
|
// RenewTokenErrors is used to return an error when the RenewToken is called
|
|
|
|
// with the given token
|
|
|
|
func (vc *MockVaultClient) RenewTokenErrors() map[string]error {
|
|
|
|
vc.mu.Lock()
|
|
|
|
defer vc.mu.Unlock()
|
|
|
|
return vc.renewTokenErrors
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeriveTokenErrors maps an allocation ID and tasks to an error when the
|
|
|
|
// token is derived
|
|
|
|
func (vc *MockVaultClient) DeriveTokenErrors() map[string]map[string]error {
|
|
|
|
vc.mu.Lock()
|
|
|
|
defer vc.mu.Unlock()
|
|
|
|
return vc.deriveTokenErrors
|
|
|
|
}
|