ab7eb5de6e
Move some common Vault API data struct decoding out of the Vault client so it can be reused in other situations. Make Vault job validation its own function so it's easier to expand it. Rename the `Job.VaultPolicies` method to just `Job.Vault` since it returns the full Vault block, not just their policies. Set `ChangeMode` on `Vault.Canonicalize`. Add some missing tests. Allows specifying an entity alias that will be used by Nomad when deriving the task Vault token. An entity alias assigns an indentity to a token, allowing better control and management of Vault clients since all tokens with the same indentity alias will now be considered the same client. This helps track Nomad activity in Vault's audit logs and better control over Vault billing. Add support for a new Nomad server configuration to define a default entity alias to be used when deriving Vault tokens. This default value will be used if the task doesn't have an entity alias defined.
253 lines
6.6 KiB
Go
253 lines
6.6 KiB
Go
package config
|
|
|
|
import (
|
|
"time"
|
|
|
|
"github.com/hashicorp/nomad/helper"
|
|
vault "github.com/hashicorp/vault/api"
|
|
)
|
|
|
|
const (
|
|
// DefaultVaultConnectRetryIntv is the retry interval between trying to
|
|
// connect to Vault
|
|
DefaultVaultConnectRetryIntv = 30 * time.Second
|
|
)
|
|
|
|
// VaultConfig contains the configuration information necessary to
|
|
// communicate with Vault in order to:
|
|
//
|
|
// - Renew Vault tokens/leases.
|
|
//
|
|
// - Pass a token for the Nomad Server to derive sub-tokens.
|
|
//
|
|
// - Create child tokens with policy subsets of the Server's token.
|
|
type VaultConfig struct {
|
|
|
|
// Enabled enables or disables Vault support.
|
|
Enabled *bool `hcl:"enabled"`
|
|
|
|
// Token is the Vault token given to Nomad such that it can
|
|
// derive child tokens. Nomad will renew this token at half its lease
|
|
// lifetime.
|
|
Token string `hcl:"token"`
|
|
|
|
// Role sets the role in which to create tokens from. The Token given to
|
|
// Nomad does not have to be created from this role but must have "update"
|
|
// capability on "auth/token/create/<create_from_role>". If this value is
|
|
// unset and the token is created from a role, the value is defaulted to the
|
|
// role the token is from.
|
|
Role string `hcl:"create_from_role"`
|
|
|
|
// EntityAlias is the entity alias to use when creating tokens for tasks
|
|
// that don't define one. The role used by Nomad must be allowed to use
|
|
// this alias.
|
|
EntityAlias string `hcl:"create_with_entity_alias"`
|
|
|
|
// Namespace sets the Vault namespace used for all calls against the
|
|
// Vault API. If this is unset, then Nomad does not use Vault namespaces.
|
|
Namespace string `mapstructure:"namespace"`
|
|
|
|
// AllowUnauthenticated allows users to submit jobs requiring Vault tokens
|
|
// without providing a Vault token proving they have access to these
|
|
// policies.
|
|
AllowUnauthenticated *bool `hcl:"allow_unauthenticated"`
|
|
|
|
// TaskTokenTTL is the TTL of the tokens created by Nomad Servers and used
|
|
// by the client. There should be a minimum time value such that the client
|
|
// does not have to renew with Vault at a very high frequency
|
|
TaskTokenTTL string `hcl:"task_token_ttl"`
|
|
|
|
// Addr is the address of the local Vault agent. This should be a complete
|
|
// URL such as "http://vault.example.com"
|
|
Addr string `hcl:"address"`
|
|
|
|
// ConnectionRetryIntv is the interval to wait before re-attempting to
|
|
// connect to Vault.
|
|
ConnectionRetryIntv time.Duration
|
|
|
|
// TLSCaFile is the path to a PEM-encoded CA cert file to use to verify the
|
|
// Vault server SSL certificate.
|
|
TLSCaFile string `hcl:"ca_file"`
|
|
|
|
// TLSCaFile is the path to a directory of PEM-encoded CA cert files to
|
|
// verify the Vault server SSL certificate.
|
|
TLSCaPath string `hcl:"ca_path"`
|
|
|
|
// TLSCertFile is the path to the certificate for Vault communication
|
|
TLSCertFile string `hcl:"cert_file"`
|
|
|
|
// TLSKeyFile is the path to the private key for Vault communication
|
|
TLSKeyFile string `hcl:"key_file"`
|
|
|
|
// TLSSkipVerify enables or disables SSL verification
|
|
TLSSkipVerify *bool `hcl:"tls_skip_verify"`
|
|
|
|
// TLSServerName, if set, is used to set the SNI host when connecting via TLS.
|
|
TLSServerName string `hcl:"tls_server_name"`
|
|
}
|
|
|
|
// DefaultVaultConfig returns the canonical defaults for the Nomad
|
|
// `vault` configuration.
|
|
func DefaultVaultConfig() *VaultConfig {
|
|
return &VaultConfig{
|
|
Addr: "https://vault.service.consul:8200",
|
|
ConnectionRetryIntv: DefaultVaultConnectRetryIntv,
|
|
AllowUnauthenticated: helper.BoolToPtr(true),
|
|
}
|
|
}
|
|
|
|
// IsEnabled returns whether the config enables Vault integration
|
|
func (c *VaultConfig) IsEnabled() bool {
|
|
return c.Enabled != nil && *c.Enabled
|
|
}
|
|
|
|
// AllowsUnauthenticated returns whether the config allows unauthenticated
|
|
// access to Vault
|
|
func (c *VaultConfig) AllowsUnauthenticated() bool {
|
|
return c.AllowUnauthenticated != nil && *c.AllowUnauthenticated
|
|
}
|
|
|
|
// Merge merges two Vault configurations together.
|
|
func (c *VaultConfig) Merge(b *VaultConfig) *VaultConfig {
|
|
result := *c
|
|
|
|
if b.Token != "" {
|
|
result.Token = b.Token
|
|
}
|
|
if b.Namespace != "" {
|
|
result.Namespace = b.Namespace
|
|
}
|
|
if b.Role != "" {
|
|
result.Role = b.Role
|
|
}
|
|
if b.EntityAlias != "" {
|
|
result.EntityAlias = b.EntityAlias
|
|
}
|
|
if b.TaskTokenTTL != "" {
|
|
result.TaskTokenTTL = b.TaskTokenTTL
|
|
}
|
|
if b.Addr != "" {
|
|
result.Addr = b.Addr
|
|
}
|
|
if b.ConnectionRetryIntv.Nanoseconds() != 0 {
|
|
result.ConnectionRetryIntv = b.ConnectionRetryIntv
|
|
}
|
|
if b.TLSCaFile != "" {
|
|
result.TLSCaFile = b.TLSCaFile
|
|
}
|
|
if b.TLSCaPath != "" {
|
|
result.TLSCaPath = b.TLSCaPath
|
|
}
|
|
if b.TLSCertFile != "" {
|
|
result.TLSCertFile = b.TLSCertFile
|
|
}
|
|
if b.TLSKeyFile != "" {
|
|
result.TLSKeyFile = b.TLSKeyFile
|
|
}
|
|
if b.TLSServerName != "" {
|
|
result.TLSServerName = b.TLSServerName
|
|
}
|
|
if b.AllowUnauthenticated != nil {
|
|
result.AllowUnauthenticated = b.AllowUnauthenticated
|
|
}
|
|
if b.TLSSkipVerify != nil {
|
|
result.TLSSkipVerify = b.TLSSkipVerify
|
|
}
|
|
if b.Enabled != nil {
|
|
result.Enabled = b.Enabled
|
|
}
|
|
|
|
return &result
|
|
}
|
|
|
|
// ApiConfig returns a usable Vault config that can be passed directly to
|
|
// hashicorp/vault/api.
|
|
func (c *VaultConfig) ApiConfig() (*vault.Config, error) {
|
|
conf := vault.DefaultConfig()
|
|
tlsConf := &vault.TLSConfig{
|
|
CACert: c.TLSCaFile,
|
|
CAPath: c.TLSCaPath,
|
|
ClientCert: c.TLSCertFile,
|
|
ClientKey: c.TLSKeyFile,
|
|
TLSServerName: c.TLSServerName,
|
|
}
|
|
if c.TLSSkipVerify != nil {
|
|
tlsConf.Insecure = *c.TLSSkipVerify
|
|
} else {
|
|
tlsConf.Insecure = false
|
|
}
|
|
|
|
if err := conf.ConfigureTLS(tlsConf); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
conf.Address = c.Addr
|
|
return conf, nil
|
|
}
|
|
|
|
// Copy returns a copy of this Vault config.
|
|
func (c *VaultConfig) Copy() *VaultConfig {
|
|
if c == nil {
|
|
return nil
|
|
}
|
|
|
|
nc := new(VaultConfig)
|
|
*nc = *c
|
|
return nc
|
|
}
|
|
|
|
// IsEqual compares two Vault configurations and returns a boolean indicating
|
|
// if they are equal.
|
|
func (c *VaultConfig) IsEqual(b *VaultConfig) bool {
|
|
if c == nil && b != nil {
|
|
return false
|
|
}
|
|
if c != nil && b == nil {
|
|
return false
|
|
}
|
|
|
|
if c.Token != b.Token {
|
|
return false
|
|
}
|
|
if c.Role != b.Role {
|
|
return false
|
|
}
|
|
if c.EntityAlias != b.EntityAlias {
|
|
return false
|
|
}
|
|
if c.TaskTokenTTL != b.TaskTokenTTL {
|
|
return false
|
|
}
|
|
if c.Addr != b.Addr {
|
|
return false
|
|
}
|
|
if c.ConnectionRetryIntv.Nanoseconds() != b.ConnectionRetryIntv.Nanoseconds() {
|
|
return false
|
|
}
|
|
if c.TLSCaFile != b.TLSCaFile {
|
|
return false
|
|
}
|
|
if c.TLSCaPath != b.TLSCaPath {
|
|
return false
|
|
}
|
|
if c.TLSCertFile != b.TLSCertFile {
|
|
return false
|
|
}
|
|
if c.TLSKeyFile != b.TLSKeyFile {
|
|
return false
|
|
}
|
|
if c.TLSServerName != b.TLSServerName {
|
|
return false
|
|
}
|
|
if c.AllowUnauthenticated != b.AllowUnauthenticated {
|
|
return false
|
|
}
|
|
if c.TLSSkipVerify != b.TLSSkipVerify {
|
|
return false
|
|
}
|
|
if c.Enabled != b.Enabled {
|
|
return false
|
|
}
|
|
return true
|
|
}
|