vault: protect against empty Vault secret response

Also, fix a case where a successful second attempt of loading token can
cause a panic.
This commit is contained in:
Mahmood Ali 2018-11-29 09:09:55 -05:00
parent bbe420718a
commit 0a2611e41f
1 changed files with 26 additions and 12 deletions

View File

@ -630,24 +630,15 @@ func (v *vaultClient) getWrappingFn() func(operation, path string) string {
// it in the client. If the token is not valid for Nomads purposes an error is // it in the client. If the token is not valid for Nomads purposes an error is
// returned. // returned.
func (v *vaultClient) parseSelfToken() error { func (v *vaultClient) parseSelfToken() error {
// Get the initial lease duration
auth := v.client.Auth().Token()
var self *vapi.Secret
// Try looking up the token using the self endpoint // Try looking up the token using the self endpoint
secret, err := auth.LookupSelf() secret, err := v.lookupSelf()
if err != nil { if err != nil {
// Try looking up our token directly return err
self, err = auth.Lookup(v.client.Token())
if err != nil {
return fmt.Errorf("failed to lookup Vault periodic token: %v", err)
}
} }
self = secret
// Read and parse the fields // Read and parse the fields
var data tokenData var data tokenData
if err := mapstructure.WeakDecode(self.Data, &data); err != nil { if err := mapstructure.WeakDecode(secret.Data, &data); err != nil {
return fmt.Errorf("failed to parse Vault token's data block: %v", err) return fmt.Errorf("failed to parse Vault token's data block: %v", err)
} }
root := false root := false
@ -724,6 +715,29 @@ func (v *vaultClient) parseSelfToken() error {
return mErr.ErrorOrNil() return mErr.ErrorOrNil()
} }
// lookupSelf is a helper function that looks up latest self lease info.
func (v *vaultClient) lookupSelf() (*vapi.Secret, error) {
// Get the initial lease duration
auth := v.client.Auth().Token()
secret, err := auth.LookupSelf()
if err == nil && secret != nil && secret.Data != nil {
return secret, nil
}
// Try looking up our token directly, even when we get an empty response,
// in case of an unexpected event - a true failure would occur in this lookup again
secret, err = auth.Lookup(v.client.Token())
switch {
case err != nil:
return nil, fmt.Errorf("failed to lookup Vault periodic token: %v", err)
case secret == nil || secret.Data == nil:
return nil, fmt.Errorf("failed to lookup Vault periodic token: got empty response")
default:
return secret, nil
}
}
// getRole returns the role name to be used when creating tokens // getRole returns the role name to be used when creating tokens
func (v *vaultClient) getRole() string { func (v *vaultClient) getRole() string {
if v.config.Role != "" { if v.config.Role != "" {