2021-02-02 20:15:10 +00:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
2021-04-29 18:32:41 +00:00
|
|
|
"context"
|
2021-05-22 02:21:11 +00:00
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2021-05-25 22:23:20 +00:00
|
|
|
"io"
|
2021-05-22 02:21:11 +00:00
|
|
|
"os"
|
2021-02-02 20:15:10 +00:00
|
|
|
"strings"
|
2021-04-06 23:40:43 +00:00
|
|
|
"sync"
|
2021-05-25 22:23:20 +00:00
|
|
|
"time"
|
2021-02-02 20:15:10 +00:00
|
|
|
|
2021-06-10 19:29:32 +00:00
|
|
|
"golang.org/x/term"
|
|
|
|
|
2021-05-22 02:21:11 +00:00
|
|
|
"github.com/docker/docker/pkg/ioutils"
|
2021-04-28 15:55:18 +00:00
|
|
|
"github.com/hashicorp/consul/api"
|
2021-02-02 20:15:10 +00:00
|
|
|
log "github.com/hashicorp/go-hclog"
|
2021-05-25 22:23:20 +00:00
|
|
|
uuid "github.com/hashicorp/go-uuid"
|
|
|
|
"github.com/hashicorp/vault/helper/metricsutil"
|
|
|
|
"github.com/hashicorp/vault/internalshared/configutil"
|
2021-04-06 23:40:43 +00:00
|
|
|
"github.com/hashicorp/vault/internalshared/listenerutil"
|
|
|
|
"github.com/hashicorp/vault/internalshared/reloadutil"
|
2021-04-28 15:55:18 +00:00
|
|
|
physconsul "github.com/hashicorp/vault/physical/consul"
|
2021-05-25 22:23:20 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/physical"
|
2021-02-02 20:15:10 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/version"
|
2021-05-25 22:23:20 +00:00
|
|
|
sr "github.com/hashicorp/vault/serviceregistration"
|
2021-04-28 15:55:18 +00:00
|
|
|
srconsul "github.com/hashicorp/vault/serviceregistration/consul"
|
2021-05-25 22:23:20 +00:00
|
|
|
"github.com/hashicorp/vault/vault"
|
2021-04-06 23:40:43 +00:00
|
|
|
"github.com/hashicorp/vault/vault/diagnose"
|
2021-02-02 20:15:10 +00:00
|
|
|
"github.com/mitchellh/cli"
|
|
|
|
"github.com/posener/complete"
|
|
|
|
)
|
|
|
|
|
|
|
|
const OperatorDiagnoseEnableEnv = "VAULT_DIAGNOSE"
|
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
const CoreUninitializedErr = "diagnose cannot attempt this step because core could not be initialized"
|
|
|
|
const BackendUninitializedErr = "diagnose cannot attempt this step because backend could not be initialized"
|
|
|
|
const CoreConfigUninitializedErr = "diagnose cannot attempt this step because core config could not be set"
|
|
|
|
|
2021-04-08 16:43:39 +00:00
|
|
|
var (
|
|
|
|
_ cli.Command = (*OperatorDiagnoseCommand)(nil)
|
|
|
|
_ cli.CommandAutocomplete = (*OperatorDiagnoseCommand)(nil)
|
|
|
|
)
|
2021-02-02 20:15:10 +00:00
|
|
|
|
|
|
|
type OperatorDiagnoseCommand struct {
|
|
|
|
*BaseCommand
|
2021-04-29 18:32:41 +00:00
|
|
|
diagnose *diagnose.Session
|
2021-02-02 20:15:10 +00:00
|
|
|
|
2021-04-06 23:40:43 +00:00
|
|
|
flagDebug bool
|
|
|
|
flagSkips []string
|
|
|
|
flagConfigs []string
|
|
|
|
cleanupGuard sync.Once
|
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
reloadFuncsLock *sync.RWMutex
|
|
|
|
reloadFuncs *map[string][]reloadutil.ReloadFunc
|
|
|
|
ServiceRegistrations map[string]sr.Factory
|
|
|
|
startedCh chan struct{} // for tests
|
|
|
|
reloadedCh chan struct{} // for tests
|
|
|
|
skipEndEnd bool // for tests
|
2021-02-02 20:15:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorDiagnoseCommand) Synopsis() string {
|
|
|
|
return "Troubleshoot problems starting Vault"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorDiagnoseCommand) Help() string {
|
|
|
|
helpText := `
|
|
|
|
Usage: vault operator diagnose
|
|
|
|
|
|
|
|
This command troubleshoots Vault startup issues, such as TLS configuration or
|
|
|
|
auto-unseal. It should be run using the same environment variables and configuration
|
|
|
|
files as the "vault server" command, so that startup problems can be accurately
|
|
|
|
reproduced.
|
|
|
|
|
|
|
|
Start diagnose with a configuration file:
|
|
|
|
|
|
|
|
$ vault operator diagnose -config=/etc/vault/config.hcl
|
|
|
|
|
|
|
|
Perform a diagnostic check while Vault is still running:
|
|
|
|
|
|
|
|
$ vault operator diagnose -config=/etc/vault/config.hcl -skip=listener
|
|
|
|
|
|
|
|
` + c.Flags().Help()
|
|
|
|
return strings.TrimSpace(helpText)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorDiagnoseCommand) Flags() *FlagSets {
|
|
|
|
set := NewFlagSets(c.UI)
|
|
|
|
f := set.NewFlagSet("Command Options")
|
|
|
|
|
|
|
|
f.StringSliceVar(&StringSliceVar{
|
|
|
|
Name: "config",
|
|
|
|
Target: &c.flagConfigs,
|
|
|
|
Completion: complete.PredictOr(
|
|
|
|
complete.PredictFiles("*.hcl"),
|
|
|
|
complete.PredictFiles("*.json"),
|
|
|
|
complete.PredictDirs("*"),
|
|
|
|
),
|
|
|
|
Usage: "Path to a Vault configuration file or directory of configuration " +
|
|
|
|
"files. This flag can be specified multiple times to load multiple " +
|
|
|
|
"configurations. If the path is a directory, all files which end in " +
|
|
|
|
".hcl or .json are loaded.",
|
|
|
|
})
|
|
|
|
|
|
|
|
f.StringSliceVar(&StringSliceVar{
|
|
|
|
Name: "skip",
|
|
|
|
Target: &c.flagSkips,
|
|
|
|
Usage: "Skip the health checks named as arguments. May be 'listener', 'storage', or 'autounseal'.",
|
|
|
|
})
|
|
|
|
|
|
|
|
f.BoolVar(&BoolVar{
|
|
|
|
Name: "debug",
|
|
|
|
Target: &c.flagDebug,
|
|
|
|
Default: false,
|
|
|
|
Usage: "Dump all information collected by Diagnose.",
|
|
|
|
})
|
2021-05-22 02:21:11 +00:00
|
|
|
|
|
|
|
f.StringVar(&StringVar{
|
|
|
|
Name: "format",
|
|
|
|
Target: &c.flagFormat,
|
|
|
|
Usage: "The output format",
|
|
|
|
})
|
2021-02-02 20:15:10 +00:00
|
|
|
return set
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorDiagnoseCommand) AutocompleteArgs() complete.Predictor {
|
|
|
|
return complete.PredictNothing
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorDiagnoseCommand) AutocompleteFlags() complete.Flags {
|
|
|
|
return c.Flags().Completions()
|
|
|
|
}
|
|
|
|
|
2021-04-08 16:43:39 +00:00
|
|
|
const (
|
|
|
|
status_unknown = "[ ] "
|
|
|
|
status_ok = "\u001b[32m[ ok ]\u001b[0m "
|
|
|
|
status_failed = "\u001b[31m[failed]\u001b[0m "
|
|
|
|
status_warn = "\u001b[33m[ warn ]\u001b[0m "
|
|
|
|
same_line = "\u001b[F"
|
|
|
|
)
|
2021-02-02 20:15:10 +00:00
|
|
|
|
|
|
|
func (c *OperatorDiagnoseCommand) Run(args []string) int {
|
|
|
|
f := c.Flags()
|
|
|
|
if err := f.Parse(args); err != nil {
|
|
|
|
c.UI.Error(err.Error())
|
2021-06-04 16:52:49 +00:00
|
|
|
return 3
|
2021-02-02 20:15:10 +00:00
|
|
|
}
|
|
|
|
return c.RunWithParsedFlags()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorDiagnoseCommand) RunWithParsedFlags() int {
|
2021-04-28 15:55:18 +00:00
|
|
|
|
2021-02-02 20:15:10 +00:00
|
|
|
if len(c.flagConfigs) == 0 {
|
|
|
|
c.UI.Error("Must specify a configuration file using -config.")
|
2021-06-04 16:52:49 +00:00
|
|
|
return 3
|
2021-02-02 20:15:10 +00:00
|
|
|
}
|
|
|
|
|
2021-05-22 02:21:11 +00:00
|
|
|
if c.diagnose == nil {
|
|
|
|
if c.flagFormat == "json" {
|
|
|
|
c.diagnose = diagnose.New(&ioutils.NopWriter{})
|
|
|
|
} else {
|
|
|
|
c.UI.Output(version.GetVersion().FullVersionNumber(true))
|
|
|
|
c.diagnose = diagnose.New(os.Stdout)
|
|
|
|
}
|
|
|
|
}
|
2021-04-29 18:32:41 +00:00
|
|
|
ctx := diagnose.Context(context.Background(), c.diagnose)
|
2021-05-12 17:54:40 +00:00
|
|
|
c.diagnose.SetSkipList(c.flagSkips)
|
2021-05-22 02:21:11 +00:00
|
|
|
err := c.offlineDiagnostics(ctx)
|
|
|
|
|
|
|
|
results := c.diagnose.Finalize(ctx)
|
|
|
|
if c.flagFormat == "json" {
|
|
|
|
resultsJS, err := json.MarshalIndent(results, "", " ")
|
|
|
|
if err != nil {
|
|
|
|
fmt.Fprintf(os.Stderr, "error marshalling results: %v", err)
|
2021-06-04 16:52:49 +00:00
|
|
|
return 4
|
2021-05-22 02:21:11 +00:00
|
|
|
}
|
|
|
|
c.UI.Output(string(resultsJS))
|
|
|
|
} else {
|
|
|
|
c.UI.Output("\nResults:")
|
2021-06-07 16:29:36 +00:00
|
|
|
w, _, err := term.GetSize(0)
|
|
|
|
if err == nil {
|
|
|
|
results.Write(os.Stdout, w)
|
|
|
|
} else {
|
|
|
|
results.Write(os.Stdout, 0)
|
|
|
|
}
|
2021-05-22 02:21:11 +00:00
|
|
|
}
|
2021-04-29 18:32:41 +00:00
|
|
|
|
|
|
|
if err != nil {
|
2021-06-04 16:52:49 +00:00
|
|
|
return 4
|
|
|
|
}
|
|
|
|
// Use a different return code
|
|
|
|
switch results.Status {
|
|
|
|
case diagnose.WarningStatus:
|
|
|
|
return 2
|
|
|
|
case diagnose.ErrorStatus:
|
2021-04-29 18:32:41 +00:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorDiagnoseCommand) offlineDiagnostics(ctx context.Context) error {
|
2021-04-06 23:40:43 +00:00
|
|
|
rloadFuncs := make(map[string][]reloadutil.ReloadFunc)
|
2021-02-02 20:15:10 +00:00
|
|
|
server := &ServerCommand{
|
|
|
|
// TODO: set up a different one?
|
|
|
|
// In particular, a UI instance that won't output?
|
|
|
|
BaseCommand: c.BaseCommand,
|
|
|
|
|
|
|
|
// TODO: refactor to a common place?
|
|
|
|
AuditBackends: auditBackends,
|
|
|
|
CredentialBackends: credentialBackends,
|
|
|
|
LogicalBackends: logicalBackends,
|
|
|
|
PhysicalBackends: physicalBackends,
|
|
|
|
ServiceRegistrations: serviceRegistrations,
|
|
|
|
|
|
|
|
// TODO: other ServerCommand options?
|
|
|
|
|
2021-04-06 23:40:43 +00:00
|
|
|
logger: log.NewInterceptLogger(nil),
|
|
|
|
allLoggers: []log.Logger{},
|
|
|
|
reloadFuncs: &rloadFuncs,
|
|
|
|
reloadFuncsLock: new(sync.RWMutex),
|
2021-02-02 20:15:10 +00:00
|
|
|
}
|
|
|
|
|
2021-04-29 18:32:41 +00:00
|
|
|
ctx, span := diagnose.StartSpan(ctx, "initialization")
|
|
|
|
defer span.End()
|
2021-05-27 17:17:52 +00:00
|
|
|
|
2021-06-01 17:43:51 +00:00
|
|
|
// OS Specific checks
|
|
|
|
diagnose.OSChecks(ctx)
|
2021-05-27 17:17:52 +00:00
|
|
|
|
2021-02-02 20:15:10 +00:00
|
|
|
server.flagConfigs = c.flagConfigs
|
|
|
|
config, err := server.parseConfig()
|
|
|
|
if err != nil {
|
2021-04-29 18:32:41 +00:00
|
|
|
return diagnose.SpotError(ctx, "parse-config", err)
|
|
|
|
} else {
|
|
|
|
diagnose.SpotOk(ctx, "parse-config", "")
|
2021-02-02 20:15:10 +00:00
|
|
|
}
|
2021-04-06 23:40:43 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
var metricSink *metricsutil.ClusterMetricSink
|
|
|
|
var metricsHelper *metricsutil.MetricsHelper
|
2021-04-06 23:40:43 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
var backend *physical.Backend
|
|
|
|
diagnose.Test(ctx, "storage", func(ctx context.Context) error {
|
|
|
|
diagnose.Test(ctx, "create-storage-backend", func(ctx context.Context) error {
|
2021-04-06 23:40:43 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
b, err := server.setupStorage(config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2021-04-29 18:32:41 +00:00
|
|
|
}
|
2021-05-25 22:23:20 +00:00
|
|
|
backend = &b
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
if config.Storage == nil {
|
|
|
|
return fmt.Errorf("no storage stanza found in config")
|
2021-04-06 23:40:43 +00:00
|
|
|
}
|
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
if config.Storage != nil && config.Storage.Type == storageTypeConsul {
|
|
|
|
diagnose.Test(ctx, "test-storage-tls-consul", func(ctx context.Context) error {
|
2021-06-15 16:53:29 +00:00
|
|
|
err = physconsul.SetupSecureTLS(ctx, api.DefaultConfig(), config.Storage.Config, server.logger, true)
|
2021-05-25 22:23:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
2021-04-06 23:40:43 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
diagnose.Test(ctx, "test-consul-direct-access-storage", func(ctx context.Context) error {
|
|
|
|
dirAccess := diagnose.ConsulDirectAccess(config.Storage.Config)
|
|
|
|
if dirAccess != "" {
|
|
|
|
diagnose.Warn(ctx, dirAccess)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to use storage backend
|
|
|
|
if !c.skipEndEnd {
|
|
|
|
diagnose.Test(ctx, "test-access-storage", diagnose.WithTimeout(30*time.Second, func(ctx context.Context) error {
|
|
|
|
maxDurationCrudOperation := "write"
|
|
|
|
maxDuration := time.Duration(0)
|
|
|
|
uuidSuffix, err := uuid.GenerateUUID()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
uuid := "diagnose/latency/" + uuidSuffix
|
|
|
|
dur, err := diagnose.EndToEndLatencyCheckWrite(ctx, uuid, *backend)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
maxDuration = dur
|
|
|
|
dur, err = diagnose.EndToEndLatencyCheckRead(ctx, uuid, *backend)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if dur > maxDuration {
|
|
|
|
maxDuration = dur
|
|
|
|
maxDurationCrudOperation = "read"
|
|
|
|
}
|
|
|
|
dur, err = diagnose.EndToEndLatencyCheckDelete(ctx, uuid, *backend)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if dur > maxDuration {
|
|
|
|
maxDuration = dur
|
|
|
|
maxDurationCrudOperation = "delete"
|
|
|
|
}
|
|
|
|
|
|
|
|
if maxDuration > time.Duration(0) {
|
|
|
|
diagnose.Warn(ctx, diagnose.LatencyWarning+fmt.Sprintf("duration: %s, ", maxDuration)+fmt.Sprintf("operation: %s", maxDurationCrudOperation))
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
var configSR sr.ServiceRegistration
|
|
|
|
diagnose.Test(ctx, "service-discovery", func(ctx context.Context) error {
|
|
|
|
if config.ServiceRegistration == nil || config.ServiceRegistration.Config == nil {
|
2021-06-03 16:01:14 +00:00
|
|
|
diagnose.Skipped(ctx, "no service registration configured")
|
|
|
|
return nil
|
2021-05-25 22:23:20 +00:00
|
|
|
}
|
|
|
|
srConfig := config.ServiceRegistration.Config
|
2021-04-29 18:32:41 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
diagnose.Test(ctx, "test-serviceregistration-tls-consul", func(ctx context.Context) error {
|
|
|
|
// SetupSecureTLS for service discovery uses the same cert and key to set up physical
|
|
|
|
// storage. See the consul package in physical for details.
|
2021-06-15 16:53:29 +00:00
|
|
|
err = srconsul.SetupSecureTLS(ctx, api.DefaultConfig(), srConfig, server.logger, true)
|
2021-04-29 18:32:41 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-05-25 22:23:20 +00:00
|
|
|
return nil
|
|
|
|
})
|
2021-04-29 18:32:41 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
if config.ServiceRegistration != nil && config.ServiceRegistration.Type == "consul" {
|
|
|
|
diagnose.Test(ctx, "test-consul-direct-access-service-discovery", func(ctx context.Context) error {
|
|
|
|
dirAccess := diagnose.ConsulDirectAccess(config.ServiceRegistration.Config)
|
|
|
|
if dirAccess != "" {
|
|
|
|
diagnose.Warn(ctx, dirAccess)
|
|
|
|
}
|
|
|
|
return nil
|
2021-04-29 18:32:41 +00:00
|
|
|
})
|
|
|
|
}
|
2021-05-25 22:23:20 +00:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
sealcontext, sealspan := diagnose.StartSpan(ctx, "create-seal")
|
|
|
|
var seals []vault.Seal
|
|
|
|
var sealConfigError error
|
|
|
|
barrierSeal, barrierWrapper, unwrapSeal, seals, sealConfigError, err := setSeal(server, config, make([]string, 0), make(map[string]string))
|
|
|
|
// Check error here
|
|
|
|
if err != nil {
|
|
|
|
diagnose.Fail(sealcontext, err.Error())
|
|
|
|
goto SEALFAIL
|
|
|
|
}
|
|
|
|
if sealConfigError != nil {
|
|
|
|
diagnose.Fail(sealcontext, "seal could not be configured: seals may already be initialized")
|
|
|
|
goto SEALFAIL
|
|
|
|
}
|
|
|
|
|
|
|
|
if seals != nil {
|
|
|
|
for _, seal := range seals {
|
|
|
|
// Ensure that the seal finalizer is called, even if using verify-only
|
|
|
|
defer func(seal *vault.Seal) {
|
|
|
|
sealType := (*seal).BarrierType()
|
|
|
|
finalizeSealContext, finalizeSealSpan := diagnose.StartSpan(ctx, "finalize-seal-"+sealType)
|
|
|
|
err = (*seal).Finalize(finalizeSealContext)
|
|
|
|
if err != nil {
|
|
|
|
diagnose.Fail(finalizeSealContext, "error finalizing seal")
|
|
|
|
finalizeSealSpan.End()
|
|
|
|
}
|
|
|
|
finalizeSealSpan.End()
|
|
|
|
}(&seal)
|
|
|
|
}
|
2021-04-29 18:32:41 +00:00
|
|
|
}
|
2021-04-28 15:55:18 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
if barrierSeal == nil {
|
|
|
|
diagnose.Fail(sealcontext, "could not create barrier seal! Most likely proper Seal configuration information was not set, but no error was generated")
|
|
|
|
}
|
|
|
|
|
|
|
|
SEALFAIL:
|
|
|
|
sealspan.End()
|
|
|
|
var coreConfig vault.CoreConfig
|
|
|
|
if err := diagnose.Test(ctx, "setup-core", func(ctx context.Context) error {
|
|
|
|
var secureRandomReader io.Reader
|
|
|
|
// prepare a secure random reader for core
|
|
|
|
secureRandomReader, err = configutil.CreateSecureRandomReaderFunc(config.SharedConfig, barrierWrapper)
|
2021-04-28 15:55:18 +00:00
|
|
|
if err != nil {
|
2021-05-25 22:23:20 +00:00
|
|
|
return diagnose.SpotError(ctx, "init-randreader", err)
|
2021-04-28 15:55:18 +00:00
|
|
|
}
|
2021-05-25 22:23:20 +00:00
|
|
|
diagnose.SpotOk(ctx, "init-randreader", "")
|
2021-04-28 15:55:18 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
if backend == nil {
|
|
|
|
return fmt.Errorf(BackendUninitializedErr)
|
2021-05-02 23:21:06 +00:00
|
|
|
}
|
2021-05-25 22:23:20 +00:00
|
|
|
coreConfig = createCoreConfig(server, config, *backend, configSR, barrierSeal, unwrapSeal, metricsHelper, metricSink, secureRandomReader)
|
|
|
|
return nil
|
|
|
|
}); err != nil {
|
|
|
|
diagnose.Error(ctx, err)
|
|
|
|
}
|
2021-05-02 23:21:06 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
var disableClustering bool
|
|
|
|
diagnose.Test(ctx, "setup-ha-storage", func(ctx context.Context) error {
|
|
|
|
if backend == nil {
|
|
|
|
return fmt.Errorf(BackendUninitializedErr)
|
|
|
|
}
|
|
|
|
diagnose.Test(ctx, "create-ha-storage-backend", func(ctx context.Context) error {
|
|
|
|
// Initialize the separate HA storage backend, if it exists
|
|
|
|
disableClustering, err = initHaBackend(server, config, &coreConfig, *backend)
|
2021-04-29 18:32:41 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-05-25 22:23:20 +00:00
|
|
|
return nil
|
|
|
|
})
|
2021-06-10 19:29:32 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
diagnose.Test(ctx, "test-consul-direct-access-storage", func(ctx context.Context) error {
|
2021-06-03 16:01:14 +00:00
|
|
|
if config.HAStorage == nil {
|
|
|
|
diagnose.Skipped(ctx, "no HA storage configured")
|
|
|
|
} else {
|
|
|
|
dirAccess := diagnose.ConsulDirectAccess(config.HAStorage.Config)
|
|
|
|
if dirAccess != "" {
|
|
|
|
diagnose.Warn(ctx, dirAccess)
|
|
|
|
}
|
2021-05-02 23:21:06 +00:00
|
|
|
}
|
2021-05-25 22:23:20 +00:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if config.HAStorage != nil && config.HAStorage.Type == storageTypeConsul {
|
2021-05-27 17:17:52 +00:00
|
|
|
diagnose.Test(ctx, "test-ha-storage-tls-consul", func(ctx context.Context) error {
|
2021-06-15 16:53:29 +00:00
|
|
|
err = physconsul.SetupSecureTLS(ctx, api.DefaultConfig(), config.HAStorage.Config, server.logger, true)
|
2021-05-25 22:23:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
2021-04-28 15:55:18 +00:00
|
|
|
}
|
2021-05-25 22:23:20 +00:00
|
|
|
return nil
|
|
|
|
})
|
2021-04-28 15:55:18 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
// Determine the redirect address from environment variables
|
|
|
|
err = determineRedirectAddr(server, &coreConfig, config)
|
|
|
|
if err != nil {
|
|
|
|
return diagnose.SpotError(ctx, "determine-redirect", err)
|
|
|
|
}
|
|
|
|
diagnose.SpotOk(ctx, "determine-redirect", "")
|
|
|
|
|
|
|
|
err = findClusterAddress(server, &coreConfig, config, disableClustering)
|
|
|
|
if err != nil {
|
|
|
|
return diagnose.SpotError(ctx, "find-cluster-addr", err)
|
|
|
|
}
|
|
|
|
diagnose.SpotOk(ctx, "find-cluster-addr", "")
|
|
|
|
|
2021-06-10 19:29:32 +00:00
|
|
|
// Run all the checks that are utilized when initializing a core object
|
|
|
|
// without actually calling core.Init. These are in the init-core section
|
|
|
|
// as they are runtime checks.
|
|
|
|
diagnose.Test(ctx, "init-core", func(ctx context.Context) error {
|
|
|
|
var newCoreError error
|
|
|
|
if coreConfig.RawConfig == nil {
|
|
|
|
return fmt.Errorf(CoreConfigUninitializedErr)
|
|
|
|
}
|
|
|
|
_, newCoreError = vault.CreateCore(&coreConfig)
|
|
|
|
if newCoreError != nil {
|
|
|
|
if vault.IsFatalError(newCoreError) {
|
|
|
|
return fmt.Errorf("Error initializing core: %s", newCoreError)
|
|
|
|
}
|
|
|
|
diagnose.Warn(ctx, wrapAtLength(
|
|
|
|
"WARNING! A non-fatal error occurred during initialization. Please "+
|
|
|
|
"check the logs for more information."))
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
var lns []listenerutil.Listener
|
|
|
|
diagnose.Test(ctx, "init-listeners", func(ctx context.Context) error {
|
2021-06-03 16:01:14 +00:00
|
|
|
disableClustering := config.HAStorage != nil && config.HAStorage.DisableClustering
|
2021-05-25 22:23:20 +00:00
|
|
|
infoKeys := make([]string, 0, 10)
|
|
|
|
info := make(map[string]string)
|
|
|
|
var listeners []listenerutil.Listener
|
|
|
|
var status int
|
|
|
|
diagnose.Test(ctx, "create-listeners", func(ctx context.Context) error {
|
|
|
|
status, listeners, _, err = server.InitListeners(config, disableClustering, &infoKeys, &info)
|
|
|
|
if status != 0 {
|
2021-04-29 18:32:41 +00:00
|
|
|
return err
|
|
|
|
}
|
2021-05-25 22:23:20 +00:00
|
|
|
return nil
|
|
|
|
})
|
2021-05-02 20:33:13 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
lns = listeners
|
|
|
|
|
|
|
|
// Make sure we close all listeners from this point on
|
|
|
|
listenerCloseFunc := func() {
|
|
|
|
for _, ln := range lns {
|
|
|
|
ln.Listener.Close()
|
2021-05-02 20:33:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
defer c.cleanupGuard.Do(listenerCloseFunc)
|
2021-04-28 15:55:18 +00:00
|
|
|
|
2021-06-15 16:53:29 +00:00
|
|
|
listenerTLSContext, listenerTLSSpan := diagnose.StartSpan(ctx, "check-listener-tls")
|
|
|
|
sanitizedListeners := make([]listenerutil.Listener, 0, len(config.Listeners))
|
|
|
|
for _, ln := range lns {
|
|
|
|
if ln.Config.TLSDisable {
|
|
|
|
diagnose.Warn(listenerTLSContext, "TLS is disabled in a Listener config stanza.")
|
|
|
|
continue
|
2021-05-02 23:21:06 +00:00
|
|
|
}
|
2021-06-15 16:53:29 +00:00
|
|
|
if ln.Config.TLSDisableClientCerts {
|
|
|
|
diagnose.Warn(listenerTLSContext, "TLS for a listener is turned on without requiring client certs.")
|
2021-05-25 22:23:20 +00:00
|
|
|
}
|
2021-06-15 16:53:29 +00:00
|
|
|
|
|
|
|
sanitizedListeners = append(sanitizedListeners, listenerutil.Listener{
|
|
|
|
Listener: ln.Listener,
|
|
|
|
Config: ln.Config,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
diagnose.ListenerChecks(listenerTLSContext, sanitizedListeners)
|
|
|
|
|
|
|
|
listenerTLSSpan.End()
|
|
|
|
|
2021-04-29 18:32:41 +00:00
|
|
|
return nil
|
|
|
|
})
|
2021-05-22 02:21:11 +00:00
|
|
|
|
2021-05-25 22:23:20 +00:00
|
|
|
// TODO: Diagnose logging configuration
|
2021-06-10 19:29:32 +00:00
|
|
|
|
|
|
|
// The unseal diagnose check will simply attempt to use the barrier to encrypt and
|
|
|
|
// decrypt a mock value. It will not call runUnseal.
|
|
|
|
diagnose.Test(ctx, "unseal", diagnose.WithTimeout(30*time.Second, func(ctx context.Context) error {
|
|
|
|
if barrierWrapper == nil {
|
|
|
|
return fmt.Errorf("Diagnose could not create a barrier seal object")
|
|
|
|
}
|
|
|
|
barrierUUID, err := uuid.GenerateUUID()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Diagnose could not create unique UUID for unsealing")
|
|
|
|
}
|
|
|
|
barrierEncValue := "diagnose-" + barrierUUID
|
|
|
|
ciphertext, err := barrierWrapper.Encrypt(ctx, []byte(barrierEncValue), nil)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error encrypting with seal barrier: %w", err)
|
|
|
|
}
|
|
|
|
plaintext, err := barrierWrapper.Decrypt(ctx, ciphertext, nil)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error decrypting with seal barrier: %w", err)
|
|
|
|
|
|
|
|
}
|
|
|
|
if string(plaintext) != barrierEncValue {
|
|
|
|
return fmt.Errorf("barrier returned incorrect decrypted value for mock data")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}))
|
|
|
|
|
|
|
|
// The following block contains static checks that are run during the
|
|
|
|
// startHttpServers portion of server run. In other words, they are static
|
|
|
|
// checks during resource creation.
|
|
|
|
diagnose.Test(ctx, "start-servers", func(ctx context.Context) error {
|
|
|
|
for _, ln := range lns {
|
|
|
|
if ln.Config == nil {
|
|
|
|
return fmt.Errorf("Found nil listener config after parsing")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
2021-05-22 02:21:11 +00:00
|
|
|
return nil
|
2021-04-28 15:55:18 +00:00
|
|
|
}
|