2022-05-12 20:29:52 +00:00
|
|
|
package structs
|
|
|
|
|
|
|
|
import "time"
|
|
|
|
|
|
|
|
// SecureVariable is the metadata envelope for a Secure Variable
|
|
|
|
type SecureVariable struct {
|
|
|
|
Namespace string
|
|
|
|
Path string
|
|
|
|
CreateTime time.Time
|
|
|
|
CreateIndex uint64
|
|
|
|
ModifyIndex uint64
|
|
|
|
ModifyTime time.Time
|
|
|
|
|
|
|
|
// reserved for post-1.4.0 work
|
|
|
|
// LockIndex uint64
|
|
|
|
// Session string
|
|
|
|
// DeletedAt time.Time
|
|
|
|
// Version uint64
|
|
|
|
// CustomMetaData map[string]string
|
|
|
|
|
2022-05-13 17:11:27 +00:00
|
|
|
EncryptedData *SecureVariableData `json:"-"` // removed during serialization
|
|
|
|
UnencryptedData map[string]string `json:"Items"` // empty until serialized
|
2022-05-12 20:29:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// SecureVariableData is the secret data for a Secure Variable
|
|
|
|
type SecureVariableData struct {
|
|
|
|
Data []byte // includes nonce
|
|
|
|
KeyID string // ID of root key used to encrypt this entry
|
|
|
|
}
|
|
|
|
|
2022-05-13 17:11:27 +00:00
|
|
|
func (sv SecureVariableData) Copy() *SecureVariableData {
|
|
|
|
out := make([]byte, 0, len(sv.Data))
|
|
|
|
copy(out, sv.Data)
|
|
|
|
return &SecureVariableData{
|
|
|
|
Data: out,
|
|
|
|
KeyID: sv.KeyID,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sv *SecureVariable) Copy() *SecureVariable {
|
|
|
|
if sv == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
out := *sv
|
|
|
|
if sv.UnencryptedData != nil {
|
|
|
|
out.UnencryptedData = make(map[string]string, len(sv.UnencryptedData))
|
|
|
|
for k, v := range sv.UnencryptedData {
|
|
|
|
out.UnencryptedData[k] = v
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if sv.EncryptedData != nil {
|
|
|
|
out.EncryptedData = sv.EncryptedData.Copy()
|
|
|
|
}
|
|
|
|
return &out
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sv SecureVariable) Stub() SecureVariableStub {
|
|
|
|
return SecureVariableStub{
|
|
|
|
Namespace: sv.Namespace,
|
|
|
|
Path: sv.Path,
|
|
|
|
CreateIndex: sv.CreateIndex,
|
|
|
|
CreateTime: sv.CreateTime,
|
|
|
|
ModifyIndex: sv.ModifyIndex,
|
|
|
|
ModifyTime: sv.ModifyTime,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// SecureVariableStub is the metadata envelope for a Secure Variable omitting
|
|
|
|
// the actual data. Intended to be used in list operations.
|
|
|
|
type SecureVariableStub struct {
|
|
|
|
Namespace string
|
|
|
|
Path string
|
|
|
|
CreateTime time.Time
|
|
|
|
CreateIndex uint64
|
|
|
|
ModifyIndex uint64
|
|
|
|
ModifyTime time.Time
|
|
|
|
|
|
|
|
// reserved for post-1.4.0 work
|
|
|
|
// LockIndex uint64
|
|
|
|
// Session string
|
|
|
|
// DeletedAt time.Time
|
|
|
|
// Version uint64
|
|
|
|
// CustomMetaData map[string]string
|
|
|
|
}
|
|
|
|
|
2022-05-12 20:29:52 +00:00
|
|
|
// SecureVariablesQuota is used to track the total size of secure
|
|
|
|
// variables entries per namespace. The total length of
|
|
|
|
// SecureVariable.EncryptedData will be added to the SecureVariablesQuota
|
|
|
|
// table in the same transaction as a write, update, or delete.
|
|
|
|
type SecureVariablesQuota struct {
|
|
|
|
Namespace string
|
|
|
|
Size uint64
|
|
|
|
CreateIndex uint64
|
|
|
|
ModifyIndex uint64
|
|
|
|
}
|
|
|
|
|
|
|
|
type SecureVariablesUpsertRequest struct {
|
|
|
|
Data *SecureVariable
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
type SecureVariablesUpsertResponse struct {
|
|
|
|
WriteMeta
|
|
|
|
}
|
|
|
|
|
|
|
|
type SecureVariablesListRequest struct {
|
|
|
|
// TODO: do we need any fields here?
|
|
|
|
QueryOptions
|
|
|
|
}
|
|
|
|
|
|
|
|
type SecureVariablesListResponse struct {
|
2022-05-13 17:11:27 +00:00
|
|
|
Data []*SecureVariableStub
|
2022-05-12 20:29:52 +00:00
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
|
|
|
type SecureVariablesReadRequest struct {
|
|
|
|
Path string
|
|
|
|
QueryOptions
|
|
|
|
}
|
|
|
|
|
|
|
|
type SecureVariablesReadResponse struct {
|
|
|
|
Data *SecureVariable
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
|
|
|
type SecureVariablesDeleteRequest struct {
|
|
|
|
Path string
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
type SecureVariablesDeleteResponse struct {
|
|
|
|
WriteMeta
|
|
|
|
}
|
|
|
|
|
|
|
|
// RootKey is used to encrypt and decrypt secure variables. It is
|
|
|
|
// never stored in raft.
|
|
|
|
type RootKey struct {
|
|
|
|
Meta RootKeyMeta
|
|
|
|
Key []byte // serialized to keystore as base64 blob
|
|
|
|
}
|
|
|
|
|
|
|
|
// RootKeyMeta is the metadata used to refer to a RootKey. It is
|
|
|
|
// stored in raft.
|
|
|
|
type RootKeyMeta struct {
|
|
|
|
Active bool
|
|
|
|
KeyID string // UUID
|
|
|
|
Algorithm EncryptionAlgorithm
|
|
|
|
EncryptionsCount uint64
|
|
|
|
CreateTime time.Time
|
|
|
|
CreateIndex uint64
|
|
|
|
ModifyIndex uint64
|
|
|
|
}
|
|
|
|
|
|
|
|
// EncryptionAlgorithm chooses which algorithm is used for
|
|
|
|
// encrypting / decrypting entries with this key
|
|
|
|
type EncryptionAlgorithm string
|
|
|
|
|
|
|
|
const (
|
|
|
|
EncryptionAlgorithmXChaCha20 EncryptionAlgorithm = "xchacha20"
|
|
|
|
EncryptionAlgorithmAES256GCM EncryptionAlgorithm = "aes256-gcm"
|
|
|
|
)
|
|
|
|
|
|
|
|
type KeyringRotateRootKeyRequest struct {
|
|
|
|
Algorithm EncryptionAlgorithm
|
|
|
|
Full bool
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
// KeyringRotateRootKeyResponse returns the full key metadata
|
|
|
|
type KeyringRotateRootKeyResponse struct {
|
|
|
|
Key *RootKeyMeta
|
|
|
|
WriteMeta
|
|
|
|
}
|
|
|
|
|
|
|
|
type KeyringListRootKeyMetaRequest struct {
|
|
|
|
// TODO: do we need any fields here?
|
|
|
|
QueryOptions
|
|
|
|
}
|
|
|
|
|
|
|
|
type KeyringListRootKeyMetaResponse struct {
|
|
|
|
Keys []*RootKeyMeta
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
|
|
|
// KeyringUpdateRootKeyRequest is used internally for key replication
|
|
|
|
// only and for keyring restores. The RootKeyMeta will be extracted
|
|
|
|
// for applying to the FSM with the KeyringUpdateRootKeyMetaRequest
|
|
|
|
// (see below)
|
|
|
|
type KeyringUpdateRootKeyRequest struct {
|
|
|
|
RootKey *RootKey
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
type KeyringUpdateRootKeyResponse struct {
|
|
|
|
WriteMeta
|
|
|
|
}
|
|
|
|
|
|
|
|
// KeyringUpdateRootKeyMetaRequest is used internally for key
|
|
|
|
// replication so that we have a request wrapper for writing the
|
|
|
|
// metadata to the FSM without including the key material
|
|
|
|
type KeyringUpdateRootKeyMetaRequest struct {
|
|
|
|
RootKeyMeta *RootKeyMeta
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
type KeyringUpdateRootKeyMetaResponse struct {
|
|
|
|
WriteMeta
|
|
|
|
}
|
|
|
|
|
|
|
|
type KeyringDeleteRootKeyRequest struct {
|
|
|
|
KeyID string
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
type KeyringDeleteRootKeyResponse struct {
|
|
|
|
WriteMeta
|
|
|
|
}
|