open-nomad/nomad/structs/variables.go

404 lines
11 KiB
Go

// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
package structs
import (
"bytes"
"errors"
"fmt"
"reflect"
"regexp"
"strings"
)
const (
// VariablesApplyRPCMethod is the RPC method for upserting or deleting a
// variable by its namespace and path, with optional conflict detection.
//
// Args: VariablesApplyRequest
// Reply: VariablesApplyResponse
VariablesApplyRPCMethod = "Variables.Apply"
// VariablesListRPCMethod is the RPC method for listing variables within
// Nomad.
//
// Args: VariablesListRequest
// Reply: VariablesListResponse
VariablesListRPCMethod = "Variables.List"
// VariablesReadRPCMethod is the RPC method for fetching a variable
// according to its namepace and path.
//
// Args: VariablesByNameRequest
// Reply: VariablesByNameResponse
VariablesReadRPCMethod = "Variables.Read"
// maxVariableSize is the maximum size of the unencrypted contents of a
// variable. This size is deliberately set low and is not configurable, to
// discourage DoS'ing the cluster
maxVariableSize = 65536
)
// VariableMetadata is the metadata envelope for a Variable, it is the list
// object and is shared data between an VariableEncrypted and a
// VariableDecrypted object.
type VariableMetadata struct {
Namespace string
Path string
CreateIndex uint64
CreateTime int64
ModifyIndex uint64
ModifyTime int64
}
// VariableEncrypted structs are returned from the Encrypter's encrypt
// method. They are the only form that should ever be persisted to storage.
type VariableEncrypted struct {
VariableMetadata
VariableData
}
// VariableData is the secret data for a Variable
type VariableData struct {
Data []byte // includes nonce
KeyID string // ID of root key used to encrypt this entry
}
// VariableDecrypted structs are returned from the Encrypter's decrypt
// method. Since they contains sensitive material, they should never be
// persisted to disk.
type VariableDecrypted struct {
VariableMetadata
Items VariableItems
}
// VariableItems are the actual secrets stored in a variable. They are always
// encrypted and decrypted as a single unit.
type VariableItems map[string]string
func (vi VariableItems) Size() uint64 {
var out uint64
for k, v := range vi {
out += uint64(len(k))
out += uint64(len(v))
}
return out
}
// Equal checks both the metadata and items in a VariableDecrypted struct
func (vd VariableDecrypted) Equal(v2 VariableDecrypted) bool {
return vd.VariableMetadata.Equal(v2.VariableMetadata) &&
vd.Items.Equal(v2.Items)
}
// Equal is a convenience method to provide similar equality checking syntax
// for metadata and the VariablesData or VariableItems struct
func (sv VariableMetadata) Equal(sv2 VariableMetadata) bool {
return sv == sv2
}
// Equal performs deep equality checking on the cleartext items of a
// VariableDecrypted. Uses reflect.DeepEqual
func (vi VariableItems) Equal(i2 VariableItems) bool {
return reflect.DeepEqual(vi, i2)
}
// Equal checks both the metadata and encrypted data for a VariableEncrypted
// struct
func (ve VariableEncrypted) Equal(v2 VariableEncrypted) bool {
return ve.VariableMetadata.Equal(v2.VariableMetadata) &&
ve.VariableData.Equal(v2.VariableData)
}
// Equal performs deep equality checking on the encrypted data part of a
// VariableEncrypted
func (vd VariableData) Equal(d2 VariableData) bool {
return vd.KeyID == d2.KeyID &&
bytes.Equal(vd.Data, d2.Data)
}
func (vd VariableDecrypted) Copy() VariableDecrypted {
return VariableDecrypted{
VariableMetadata: vd.VariableMetadata,
Items: vd.Items.Copy(),
}
}
func (vi VariableItems) Copy() VariableItems {
out := make(VariableItems, len(vi))
for k, v := range vi {
out[k] = v
}
return out
}
func (ve VariableEncrypted) Copy() VariableEncrypted {
return VariableEncrypted{
VariableMetadata: ve.VariableMetadata,
VariableData: ve.VariableData.Copy(),
}
}
func (vd VariableData) Copy() VariableData {
out := make([]byte, len(vd.Data))
copy(out, vd.Data)
return VariableData{
Data: out,
KeyID: vd.KeyID,
}
}
var (
// validVariablePath is used to validate a variable path. We restrict to
// RFC3986 URL-safe characters that don't conflict with the use of
// characters "@" and "." in template blocks. We also restrict the length so
// that a user can't make queries in the state store unusually expensive (as
// they are O(k) on the key length)
validVariablePath = regexp.MustCompile("^[a-zA-Z0-9-_~/]{1,128}$")
)
func (vd VariableDecrypted) Validate() error {
if vd.Namespace == AllNamespacesSentinel {
return errors.New("can not target wildcard (\"*\")namespace")
}
if len(vd.Items) == 0 {
return errors.New("empty variables are invalid")
}
if vd.Items.Size() > maxVariableSize {
return errors.New("variables are limited to 64KiB in total size")
}
if err := validatePath(vd.Path); err != nil {
return err
}
return nil
}
func validatePath(path string) error {
if len(path) == 0 {
return fmt.Errorf("variable requires path")
}
if !validVariablePath.MatchString(path) {
return fmt.Errorf("invalid path %q", path)
}
parts := strings.Split(path, "/")
if parts[0] != "nomad" {
return nil
}
// Don't allow a variable with path "nomad"
if len(parts) == 1 {
return fmt.Errorf("\"nomad\" is a reserved top-level directory path, but you may write variables to \"nomad/jobs\", \"nomad/job-templates\", or below")
}
switch {
case parts[1] == "jobs":
// Any path including "nomad/jobs" is valid
return nil
case parts[1] == "job-templates" && len(parts) == 3:
// Paths including "nomad/job-templates" is valid, provided they have single further path part
return nil
case parts[1] == "job-templates":
// Disallow exactly nomad/job-templates with no further paths
return fmt.Errorf("\"nomad/job-templates\" is a reserved directory path, but you may write variables at the level below it, for example, \"nomad/job-templates/template-name\"")
default:
// Disallow arbitrary sub-paths beneath nomad/
return fmt.Errorf("only paths at \"nomad/jobs\" or \"nomad/job-templates\" and below are valid paths under the top-level \"nomad\" directory")
}
}
func (vd *VariableDecrypted) Canonicalize() {
if vd.Namespace == "" {
vd.Namespace = DefaultNamespace
}
}
// Copy returns a fully hydrated copy of VariableMetadata that can be
// manipulated while ensuring the original is not touched.
func (sv *VariableMetadata) Copy() *VariableMetadata {
var out = *sv
return &out
}
// GetNamespace returns the variable's namespace. Used for pagination.
func (sv VariableMetadata) GetNamespace() string {
return sv.Namespace
}
// GetID returns the variable's path. Used for pagination.
func (sv VariableMetadata) GetID() string {
return sv.Path
}
// GetCreateIndex returns the variable's create index. Used for pagination.
func (sv VariableMetadata) GetCreateIndex() uint64 {
return sv.CreateIndex
}
// VariablesQuota is used to track the total size of variables entries per
// namespace. The total length of Variable.EncryptedData in bytes will be added
// to the VariablesQuota table in the same transaction as a write, update, or
// delete. This tracking effectively caps the maximum size of variables in a
// given namespace to MaxInt64 bytes.
type VariablesQuota struct {
Namespace string
Size int64
CreateIndex uint64
ModifyIndex uint64
}
func (svq *VariablesQuota) Copy() *VariablesQuota {
if svq == nil {
return nil
}
nq := new(VariablesQuota)
*nq = *svq
return nq
}
// ---------------------------------------
// RPC and FSM request/response objects
// VarOp constants give possible operations available in a transaction.
type VarOp string
const (
VarOpSet VarOp = "set"
VarOpDelete VarOp = "delete"
VarOpDeleteCAS VarOp = "delete-cas"
VarOpCAS VarOp = "cas"
)
// VarOpResult constants give possible operations results from a transaction.
type VarOpResult string
const (
VarOpResultOk VarOpResult = "ok"
VarOpResultConflict VarOpResult = "conflict"
VarOpResultRedacted VarOpResult = "conflict-redacted"
VarOpResultError VarOpResult = "error"
)
// VariablesApplyRequest is used by users to operate on the variable store
type VariablesApplyRequest struct {
Op VarOp // Operation to be performed during apply
Var *VariableDecrypted // Variable-shaped request data
WriteRequest
}
// VariablesApplyResponse is sent back to the user to inform them of success or failure
type VariablesApplyResponse struct {
Op VarOp // Operation performed
Input *VariableDecrypted // Input supplied
Result VarOpResult // Return status from operation
Error error // Error if any
Conflict *VariableDecrypted // Conflicting value if applicable
Output *VariableDecrypted // Operation Result if successful; nil for successful deletes
WriteMeta
}
func (r *VariablesApplyResponse) IsOk() bool {
return r.Result == VarOpResultOk
}
func (r *VariablesApplyResponse) IsConflict() bool {
return r.Result == VarOpResultConflict || r.Result == VarOpResultRedacted
}
func (r *VariablesApplyResponse) IsError() bool {
return r.Result == VarOpResultError
}
func (r *VariablesApplyResponse) IsRedacted() bool {
return r.Result == VarOpResultRedacted
}
// VarApplyStateRequest is used by the FSM to modify the variable store
type VarApplyStateRequest struct {
Op VarOp // Which operation are we performing
Var *VariableEncrypted // Which directory entry
WriteRequest
}
// VarApplyStateResponse is used by the FSM to inform the RPC layer of success or failure
type VarApplyStateResponse struct {
Op VarOp // Which operation were we performing
Result VarOpResult // What happened (ok, conflict, error)
Error error // error if any
Conflict *VariableEncrypted // conflicting variable if applies
WrittenSVMeta *VariableMetadata // for making the VariablesApplyResponse
WriteMeta
}
func (r *VarApplyStateRequest) ErrorResponse(raftIndex uint64, err error) *VarApplyStateResponse {
return &VarApplyStateResponse{
Op: r.Op,
Result: VarOpResultError,
Error: err,
WriteMeta: WriteMeta{Index: raftIndex},
}
}
func (r *VarApplyStateRequest) SuccessResponse(raftIndex uint64, meta *VariableMetadata) *VarApplyStateResponse {
return &VarApplyStateResponse{
Op: r.Op,
Result: VarOpResultOk,
WrittenSVMeta: meta,
WriteMeta: WriteMeta{Index: raftIndex},
}
}
func (r *VarApplyStateRequest) ConflictResponse(raftIndex uint64, cv *VariableEncrypted) *VarApplyStateResponse {
var cvCopy VariableEncrypted
if cv != nil {
// make a copy so that we aren't sending
// the live state store version
cvCopy = cv.Copy()
}
return &VarApplyStateResponse{
Op: r.Op,
Result: VarOpResultConflict,
Conflict: &cvCopy,
WriteMeta: WriteMeta{Index: raftIndex},
}
}
func (r *VarApplyStateResponse) IsOk() bool {
return r.Result == VarOpResultOk
}
func (r *VarApplyStateResponse) IsConflict() bool {
return r.Result == VarOpResultConflict
}
func (r *VarApplyStateResponse) IsError() bool {
// FIXME: This is brittle and requires immense faith that
// the response is properly managed.
return r.Result == VarOpResultError
}
type VariablesListRequest struct {
QueryOptions
}
type VariablesListResponse struct {
Data []*VariableMetadata
QueryMeta
}
type VariablesReadRequest struct {
Path string
QueryOptions
}
type VariablesReadResponse struct {
Data *VariableDecrypted
QueryMeta
}