open-vault/vault/core.go

1476 lines
40 KiB
Go
Raw Normal View History

2015-03-09 23:33:27 +00:00
package vault
import (
2015-03-11 18:43:36 +00:00
"bytes"
2015-03-10 00:45:34 +00:00
"encoding/json"
"errors"
2015-03-09 23:33:27 +00:00
"fmt"
2015-03-10 00:45:34 +00:00
"log"
"net/url"
2015-03-11 18:52:01 +00:00
"os"
2015-04-03 01:05:23 +00:00
"strings"
2015-03-10 00:45:34 +00:00
"sync"
2015-04-08 23:43:17 +00:00
"time"
2015-03-09 23:33:27 +00:00
2015-04-08 23:43:17 +00:00
"github.com/armon/go-metrics"
"github.com/hashicorp/vault/audit"
"github.com/hashicorp/vault/helper/mlock"
"github.com/hashicorp/vault/logical"
2015-03-09 23:33:27 +00:00
"github.com/hashicorp/vault/physical"
2015-03-11 18:34:08 +00:00
"github.com/hashicorp/vault/shamir"
2015-03-09 23:33:27 +00:00
)
2015-03-10 00:45:34 +00:00
const (
// coreSealConfigPath is the path used to store our seal configuration.
// This value is stored in plaintext, since we must be able to read
// it even with the Vault sealed. This is required so that we know
// how many secret parts must be used to reconstruct the master key.
coreSealConfigPath = "core/seal-config"
2015-04-14 21:06:15 +00:00
// coreLockPath is the path used to acquire a coordinating lock
// for a highly-available deploy.
coreLockPath = "core/lock"
2015-04-14 23:44:48 +00:00
// coreLeaderPrefix is the prefix used for the UUID that contains
// the currently elected leader.
coreLeaderPrefix = "core/leader/"
2015-04-14 21:06:15 +00:00
// lockRetryInterval is the interval we re-attempt to acquire the
// HA lock if an error is encountered
lockRetryInterval = 10 * time.Second
2015-05-28 23:11:31 +00:00
// keyRotateCheckInterval is how often a standby checks for a key
// rotation taking place.
keyRotateCheckInterval = 30 * time.Second
// keyRotateGracePeriod is how long we allow an upgrade path
// for standby instances before we delete the upgrade keys
keyRotateGracePeriod = 2 * time.Minute
2015-03-10 00:45:34 +00:00
)
var (
// ErrSealed is returned if an operation is performed on
// a sealed barrier. No operation is expected to succeed before unsealing
ErrSealed = errors.New("Vault is sealed")
2015-04-14 21:09:11 +00:00
// ErrStandby is returned if an operation is performed on
// a standby Vault. No operation is expected to succeed until active.
ErrStandby = errors.New("Vault is in standby mode")
2015-03-10 00:45:34 +00:00
// ErrAlreadyInit is returned if the core is already
// initialized. This prevents a re-initialization.
ErrAlreadyInit = errors.New("Vault is already initialized")
// ErrNotInit is returned if a non-initialized barrier
// is attempted to be unsealed.
ErrNotInit = errors.New("Vault is not initialized")
// ErrInternalError is returned when we don't want to leak
// any information about an internal error
ErrInternalError = errors.New("internal error")
2015-04-14 23:53:40 +00:00
// ErrHANotEnabled is returned if the operation only makes sense
// in an HA setting
ErrHANotEnabled = errors.New("Vault is not configured for highly-available mode")
2015-03-10 00:45:34 +00:00
)
2015-03-09 23:33:27 +00:00
// SealConfig is used to describe the seal configuration
type SealConfig struct {
2015-03-11 18:34:08 +00:00
// SecretShares is the number of shares the secret is
2015-03-09 23:33:27 +00:00
// split into. This is the N value of Shamir
2015-03-11 18:34:08 +00:00
SecretShares int `json:"secret_shares"`
2015-03-09 23:33:27 +00:00
// SecretThreshold is the number of parts required
// to open the vault. This is the T value of Shamir
SecretThreshold int `json:"secret_threshold"`
}
2015-03-10 00:45:34 +00:00
// Validate is used to sanity check the seal configuration
func (s *SealConfig) Validate() error {
2015-03-11 18:34:08 +00:00
if s.SecretShares < 1 {
return fmt.Errorf("secret shares must be at least one")
2015-03-10 00:45:34 +00:00
}
2015-03-11 18:34:08 +00:00
if s.SecretThreshold < 1 {
return fmt.Errorf("secret threshold must be at least one")
2015-03-10 00:45:34 +00:00
}
if s.SecretShares > 1 && s.SecretThreshold == 1 {
return fmt.Errorf("secret threshold must be greater than one for multiple shares")
}
2015-03-12 18:20:27 +00:00
if s.SecretShares > 255 {
return fmt.Errorf("secret shares must be less than 256")
}
if s.SecretThreshold > 255 {
return fmt.Errorf("secret threshold must be less than 256")
}
2015-03-11 18:34:08 +00:00
if s.SecretThreshold > s.SecretShares {
return fmt.Errorf("secret threshold cannot be larger than secret shares")
2015-03-10 00:45:34 +00:00
}
return nil
}
// InitResult is used to provide the key parts back after
// they are generated as part of the initialization.
type InitResult struct {
2015-03-11 18:34:08 +00:00
SecretShares [][]byte
RootToken string
2015-03-10 00:45:34 +00:00
}
2015-05-28 18:40:01 +00:00
// RekeyResult is used to provide the key parts back after
// they are generated as part of the rekey.
type RekeyResult struct {
SecretShares [][]byte
}
2015-03-12 18:20:27 +00:00
// ErrInvalidKey is returned if there is an error with a
// provided unseal key.
type ErrInvalidKey struct {
Reason string
}
func (e *ErrInvalidKey) Error() string {
return fmt.Sprintf("invalid key: %v", e.Reason)
}
2015-03-09 23:33:27 +00:00
// Core is used as the central manager of Vault activity. It is the primary point of
// interface for API handlers and is responsible for managing the logical and physical
// backends, router, security barrier, and audit trails.
type Core struct {
2015-04-14 21:06:15 +00:00
// HABackend may be available depending on the physical backend
ha physical.HABackend
2015-04-14 23:44:48 +00:00
// AdvertiseAddr is the address we advertise as leader if held
advertiseAddr string
2015-03-09 23:33:27 +00:00
// physical backend is the un-trusted backend with durable data
physical physical.Backend
// barrier is the security barrier wrapping the physical backend
barrier SecurityBarrier
// router is responsible for managing the mount points for logical backends.
router *Router
2015-03-10 00:45:34 +00:00
// logicalBackends is the mapping of backends to use for this core
logicalBackends map[string]logical.Factory
// credentialBackends is the mapping of backends to use for this core
credentialBackends map[string]logical.Factory
2015-03-15 23:25:38 +00:00
// auditBackends is the mapping of backends to use for this core
auditBackends map[string]audit.Factory
2015-03-10 00:45:34 +00:00
// stateLock protects mutable state
stateLock sync.RWMutex
sealed bool
2015-04-14 23:11:39 +00:00
standby bool
2015-04-14 21:06:15 +00:00
standbyDoneCh chan struct{}
standbyStopCh chan struct{}
2015-03-10 00:45:34 +00:00
// unlockParts has the keys provided to Unseal until
// the threshold number of parts is available.
unlockParts [][]byte
2015-05-28 18:40:01 +00:00
// rekeyProgress holds the shares we have until we reach enough
// to verify the master key.
rekeyConfig *SealConfig
rekeyProgress [][]byte
rekeyLock sync.Mutex
2015-03-11 22:19:41 +00:00
// mounts is loaded after unseal since it is a protected
// configuration
mounts *MountTable
2015-03-11 22:19:41 +00:00
// auth is loaded after unseal since it is a protected
// configuration
auth *MountTable
// audit is loaded after unseal since it is a protected
// configuration
audit *MountTable
// auditBroker is used to ingest the audit events and fan
// out into the configured audit backends
auditBroker *AuditBroker
2015-03-12 19:41:12 +00:00
// systemView is the barrier view for the system backend
systemView *BarrierView
// expiration manager is used for managing LeaseIDs,
// renewal, expiration and revocation
expiration *ExpirationManager
// rollback manager is used to run rollbacks periodically
rollback *RollbackManager
// policy store is used to manage named ACL policies
policy *PolicyStore
2015-03-23 20:41:05 +00:00
// token store is used to manage authentication tokens
tokenStore *TokenStore
2015-04-08 23:43:17 +00:00
// metricsCh is used to stop the metrics streaming
metricsCh chan struct{}
2015-03-10 00:45:34 +00:00
logger *log.Logger
2015-03-09 23:33:27 +00:00
}
2015-03-11 18:52:01 +00:00
// CoreConfig is used to parameterize a core
type CoreConfig struct {
LogicalBackends map[string]logical.Factory
CredentialBackends map[string]logical.Factory
AuditBackends map[string]audit.Factory
Physical physical.Backend
Logger *log.Logger
2015-04-14 23:44:48 +00:00
DisableCache bool // Disables the LRU cache on the physical backend
2015-04-27 23:40:14 +00:00
DisableMlock bool // Disables mlock syscall
2015-04-14 23:44:48 +00:00
CacheSize int // Custom cache size of zero for default
AdvertiseAddr string // Set as the leader address for HA
2015-03-11 18:52:01 +00:00
}
// NewCore isk used to construct a new core
func NewCore(conf *CoreConfig) (*Core, error) {
2015-04-14 21:06:15 +00:00
// Check if this backend supports an HA configuraiton
var haBackend physical.HABackend
if ha, ok := conf.Physical.(physical.HABackend); ok {
haBackend = ha
}
2015-04-14 23:44:48 +00:00
if haBackend != nil && conf.AdvertiseAddr == "" {
return nil, fmt.Errorf("missing advertisement address")
}
2015-04-14 21:06:15 +00:00
// Validate the advertise addr if its given to us
if conf.AdvertiseAddr != "" {
u, err := url.Parse(conf.AdvertiseAddr)
if err != nil {
return nil, fmt.Errorf("advertisement address is not valid url: %s", err)
}
if u.Scheme == "" {
return nil, fmt.Errorf("advertisement address must include scheme (ex. 'http')")
}
}
2015-04-14 18:08:04 +00:00
// Wrap the backend in a cache unless disabled
if !conf.DisableCache {
_, isCache := conf.Physical.(*physical.Cache)
_, isInmem := conf.Physical.(*physical.InmemBackend)
if !isCache && !isInmem {
cache := physical.NewCache(conf.Physical, conf.CacheSize)
conf.Physical = cache
}
}
2015-04-27 23:40:14 +00:00
if !conf.DisableMlock {
// Ensure our memory usage is locked into physical RAM
if err := mlock.LockMemory(); err != nil {
return nil, fmt.Errorf(
"Failed to lock memory: %v\n\n"+
"This usually means that the mlock syscall is not available.\n"+
"Vault uses mlock to prevent memory from being swapped to\n"+
"disk. This requires root privileges as well as a machine\n"+
"that supports mlock. Please enable mlock on your system or\n"+
"disable Vault from using it. To disable Vault from using it,\n"+
"set the `disable_mlock` configuration option in your configuration\n"+
"file.",
err)
2015-04-27 23:40:14 +00:00
}
2015-04-19 20:42:47 +00:00
}
2015-03-09 23:33:27 +00:00
// Construct a new AES-GCM barrier
2015-03-12 17:22:12 +00:00
barrier, err := NewAESGCMBarrier(conf.Physical)
2015-03-09 23:33:27 +00:00
if err != nil {
return nil, fmt.Errorf("barrier setup failed: %v", err)
}
2015-03-11 18:52:01 +00:00
// Make a default logger if not provided
2015-03-12 17:22:12 +00:00
if conf.Logger == nil {
conf.Logger = log.New(os.Stderr, "", log.LstdFlags)
2015-03-11 18:52:01 +00:00
}
2015-03-09 23:33:27 +00:00
// Setup the core
c := &Core{
2015-04-14 23:44:48 +00:00
ha: haBackend,
advertiseAddr: conf.AdvertiseAddr,
physical: conf.Physical,
barrier: barrier,
router: NewRouter(),
sealed: true,
standby: true,
logger: conf.Logger,
2015-03-09 23:33:27 +00:00
}
2015-03-15 23:25:38 +00:00
// Setup the backends
logicalBackends := make(map[string]logical.Factory)
for k, f := range conf.LogicalBackends {
logicalBackends[k] = f
2015-03-15 23:25:38 +00:00
}
logicalBackends["generic"] = PassthroughBackendFactory
logicalBackends["system"] = func(map[string]string) (logical.Backend, error) {
2015-03-16 00:35:59 +00:00
return NewSystemBackend(c), nil
2015-03-15 23:25:38 +00:00
}
c.logicalBackends = logicalBackends
2015-03-15 23:25:38 +00:00
credentialBackends := make(map[string]logical.Factory)
for k, f := range conf.CredentialBackends {
credentialBackends[k] = f
}
credentialBackends["token"] = func(map[string]string) (logical.Backend, error) {
return NewTokenStore(c)
}
c.credentialBackends = credentialBackends
auditBackends := make(map[string]audit.Factory)
for k, f := range conf.AuditBackends {
auditBackends[k] = f
}
c.auditBackends = auditBackends
2015-03-09 23:33:27 +00:00
return c, nil
}
// HandleRequest is used to handle a new incoming request
func (c *Core) HandleRequest(req *logical.Request) (resp *logical.Response, err error) {
2015-03-11 21:31:55 +00:00
c.stateLock.RLock()
defer c.stateLock.RUnlock()
if c.sealed {
return nil, ErrSealed
}
2015-04-14 23:11:39 +00:00
if c.standby {
2015-04-14 21:09:11 +00:00
return nil, ErrStandby
}
2015-03-11 21:31:55 +00:00
2015-03-31 03:26:39 +00:00
if c.router.LoginPath(req.Path) {
resp, err = c.handleLoginRequest(req)
2015-03-31 03:26:39 +00:00
} else {
resp, err = c.handleRequest(req)
2015-03-31 03:26:39 +00:00
}
// Ensure we don't leak internal data
if resp != nil {
if resp.Secret != nil {
resp.Secret.InternalData = nil
}
if resp.Auth != nil {
resp.Auth.InternalData = nil
}
}
return
2015-03-31 03:26:39 +00:00
}
func (c *Core) handleRequest(req *logical.Request) (*logical.Response, error) {
2015-04-08 23:43:17 +00:00
defer metrics.MeasureSince([]string{"core", "handle_request"}, time.Now())
2015-03-31 16:59:02 +00:00
// Validate the token
auth, err := c.checkToken(req.Operation, req.Path, req.ClientToken)
2015-03-24 18:37:07 +00:00
if err != nil {
2015-03-31 16:59:02 +00:00
// If it is an internal error we return that, otherwise we
// return invalid request so that the status codes can be correct
2015-04-01 21:11:26 +00:00
var errType error
2015-03-31 16:59:02 +00:00
switch err {
2015-04-01 21:11:26 +00:00
case ErrInternalError, logical.ErrPermissionDenied:
2015-03-31 16:59:02 +00:00
errType = err
2015-04-01 21:11:26 +00:00
default:
errType = logical.ErrInvalidRequest
2015-03-31 16:59:02 +00:00
}
2015-03-24 18:37:07 +00:00
2015-03-31 16:59:02 +00:00
return logical.ErrorResponse(err.Error()), errType
2015-03-24 18:37:07 +00:00
}
2015-03-11 21:31:55 +00:00
2015-04-15 21:12:34 +00:00
// Attach the display name
req.DisplayName = auth.DisplayName
// Create an audit trail of the request
if err := c.auditBroker.LogRequest(auth, req); err != nil {
c.logger.Printf("[ERR] core: failed to audit request (%#v): %v",
req, err)
return nil, ErrInternalError
}
2015-03-11 21:31:55 +00:00
// Route the request
resp, err := c.router.Route(req)
vault: clean up VaultID duplications, make secret responses clearer /cc @armon - This is a reasonably major refactor that I think cleans up a lot of the logic with secrets in responses. The reason for the refactor is that while implementing Renew/Revoke in logical/framework I found the existing API to be really awkward to work with. Primarily, we needed a way to send down internal data for Vault core to store since not all the data you need to revoke a key is always sent down to the user (for example the user than AWS key belongs to). At first, I was doing this manually in logical/framework with req.Storage, but this is going to be such a common event that I think its something core should assist with. Additionally, I think the added context for secrets will be useful in the future when we have a Vault API for returning orphaned out keys: we can also return the internal data that might help an operator. So this leads me to this refactor. I've removed most of the fields in `logical.Response` and replaced it with a single `*Secret` pointer. If this is non-nil, then the response represents a secret. The Secret struct encapsulates all the lease info and such. It also has some fields on it that are only populated at _request_ time for Revoke/Renew operations. There is precedent for this sort of behavior in the Go stdlib where http.Request/http.Response have fields that differ based on client/server. I copied this style. All core unit tests pass. The APIs fail for obvious reasons but I'll fix that up in the next commit.
2015-03-19 22:11:42 +00:00
// If there is a secret, we must register it with the expiration manager.
// We exclude renewal of a lease, since it does not need to be re-registered
if resp != nil && resp.Secret != nil && !strings.HasPrefix(req.Path, "sys/renew/") {
// Apply the default lease if none given
if resp.Secret.Lease == 0 {
resp.Secret.Lease = defaultLeaseDuration
}
// Limit the lease duration
if resp.Secret.Lease > maxLeaseDuration {
resp.Secret.Lease = maxLeaseDuration
}
// Register the lease
leaseID, err := c.expiration.Register(req, resp)
if err != nil {
vault: clean up VaultID duplications, make secret responses clearer /cc @armon - This is a reasonably major refactor that I think cleans up a lot of the logic with secrets in responses. The reason for the refactor is that while implementing Renew/Revoke in logical/framework I found the existing API to be really awkward to work with. Primarily, we needed a way to send down internal data for Vault core to store since not all the data you need to revoke a key is always sent down to the user (for example the user than AWS key belongs to). At first, I was doing this manually in logical/framework with req.Storage, but this is going to be such a common event that I think its something core should assist with. Additionally, I think the added context for secrets will be useful in the future when we have a Vault API for returning orphaned out keys: we can also return the internal data that might help an operator. So this leads me to this refactor. I've removed most of the fields in `logical.Response` and replaced it with a single `*Secret` pointer. If this is non-nil, then the response represents a secret. The Secret struct encapsulates all the lease info and such. It also has some fields on it that are only populated at _request_ time for Revoke/Renew operations. There is precedent for this sort of behavior in the Go stdlib where http.Request/http.Response have fields that differ based on client/server. I copied this style. All core unit tests pass. The APIs fail for obvious reasons but I'll fix that up in the next commit.
2015-03-19 22:11:42 +00:00
c.logger.Printf(
"[ERR] core: failed to register lease "+
"(request: %#v, response: %#v): %v", req, resp, err)
return nil, ErrInternalError
}
resp.Secret.LeaseID = leaseID
}
2015-04-03 01:05:23 +00:00
// Only the token store is allowed to return an auth block, for any
// other request this is an internal error
if resp != nil && resp.Auth != nil {
if !strings.HasPrefix(req.Path, "auth/token/") {
c.logger.Printf(
"[ERR] core: unexpected Auth response for non-token backend "+
"(request: %#v, response: %#v)", req, resp)
return nil, ErrInternalError
}
// Set the default lease if non-provided, root tokens are exempt
if resp.Auth.Lease == 0 && !strListContains(resp.Auth.Policies, "root") {
resp.Auth.Lease = defaultLeaseDuration
}
// Limit the lease duration
if resp.Auth.Lease > maxLeaseDuration {
resp.Auth.Lease = maxLeaseDuration
}
2015-04-03 01:05:23 +00:00
// Register with the expiration manager
if err := c.expiration.RegisterAuth(req.Path, resp.Auth); err != nil {
c.logger.Printf("[ERR] core: failed to register token lease "+
"(request: %#v, response: %#v): %v", req, resp, err)
return nil, ErrInternalError
}
}
// Create an audit trail of the response
if err := c.auditBroker.LogResponse(auth, req, resp, err); err != nil {
c.logger.Printf("[ERR] core: failed to audit response (request: %#v, response: %#v): %v",
req, resp, err)
return nil, ErrInternalError
}
// Return the response and error
return resp, err
2015-03-09 23:33:27 +00:00
}
2015-03-31 03:26:39 +00:00
// handleLoginRequest is used to handle a login request, which is an
// unauthenticated request to the backend.
func (c *Core) handleLoginRequest(req *logical.Request) (*logical.Response, error) {
2015-04-08 23:43:17 +00:00
defer metrics.MeasureSince([]string{"core", "handle_login_request"}, time.Now())
2015-04-01 21:48:37 +00:00
// Create an audit trail of the request, auth is not available on login requests
if err := c.auditBroker.LogRequest(nil, req); err != nil {
c.logger.Printf("[ERR] core: failed to audit request (%#v): %v",
req, err)
return nil, ErrInternalError
}
2015-03-23 20:56:43 +00:00
// Route the request
2015-03-31 03:26:39 +00:00
resp, err := c.router.Route(req)
2015-03-23 20:56:43 +00:00
// A login request should never return a secret!
if resp != nil && resp.Secret != nil {
c.logger.Printf("[ERR] core: unexpected Secret response for login path"+
"(request: %#v, response: %#v)", req, resp)
return nil, ErrInternalError
}
2015-03-31 03:26:39 +00:00
// If the response generated an authentication, then generate the token
2015-04-01 21:48:37 +00:00
var auth *logical.Auth
2015-03-31 03:26:39 +00:00
if resp != nil && resp.Auth != nil {
auth = resp.Auth
2015-04-15 21:12:34 +00:00
// Determine the source of the login
source := c.router.MatchingMount(req.Path)
source = strings.TrimPrefix(source, credentialRoutePrefix)
2015-04-15 21:12:34 +00:00
source = strings.Replace(source, "/", "-", -1)
// Prepend the source to the display name
auth.DisplayName = strings.TrimSuffix(source+auth.DisplayName, "-")
2015-03-23 20:56:43 +00:00
// Generate a token
te := TokenEntry{
2015-04-15 21:12:34 +00:00
Path: req.Path,
Policies: auth.Policies,
Meta: auth.Metadata,
DisplayName: auth.DisplayName,
2015-03-23 20:56:43 +00:00
}
if err := c.tokenStore.Create(&te); err != nil {
c.logger.Printf("[ERR] core: failed to create token: %v", err)
return nil, ErrInternalError
}
2015-03-31 03:26:39 +00:00
// Populate the client token
resp.Auth.ClientToken = te.ID
2015-03-23 20:56:43 +00:00
// Set the default lease if non-provided, root tokens are exempt
if auth.Lease == 0 && !strListContains(auth.Policies, "root") {
auth.Lease = defaultLeaseDuration
}
2015-04-01 21:48:37 +00:00
// Limit the lease duration
if resp.Auth.Lease > maxLeaseDuration {
resp.Auth.Lease = maxLeaseDuration
}
// Register with the expiration manager
if err := c.expiration.RegisterAuth(req.Path, auth); err != nil {
c.logger.Printf("[ERR] core: failed to register token lease "+
"(request: %#v, response: %#v): %v", req, resp, err)
return nil, ErrInternalError
}
2015-04-15 21:12:34 +00:00
// Attach the display name, might be used by audit backends
req.DisplayName = auth.DisplayName
2015-03-23 20:56:43 +00:00
}
2015-03-31 03:26:39 +00:00
2015-04-01 21:48:37 +00:00
// Create an audit trail of the response
if err := c.auditBroker.LogResponse(auth, req, resp, err); err != nil {
c.logger.Printf("[ERR] core: failed to audit response (request: %#v, response: %#v): %v",
req, resp, err)
return nil, ErrInternalError
}
2015-03-23 20:56:43 +00:00
return resp, err
}
2015-03-31 16:59:02 +00:00
func (c *Core) checkToken(
op logical.Operation, path string, token string) (*logical.Auth, error) {
2015-04-08 23:43:17 +00:00
defer metrics.MeasureSince([]string{"core", "check_token"}, time.Now())
2015-03-31 16:59:02 +00:00
// Ensure there is a client token
if token == "" {
return nil, fmt.Errorf("missing client token")
2015-03-31 16:59:02 +00:00
}
// Resolve the token policy
te, err := c.tokenStore.Lookup(token)
if err != nil {
c.logger.Printf("[ERR] core: failed to lookup token: %v", err)
return nil, ErrInternalError
2015-03-31 16:59:02 +00:00
}
// Ensure the token is valid
if te == nil {
return nil, logical.ErrPermissionDenied
}
// Attempt to use the token
if err := c.tokenStore.UseToken(te); err != nil {
c.logger.Printf("[ERR] core: failed to use token: %v", err)
return nil, ErrInternalError
2015-03-31 16:59:02 +00:00
}
// Construct the corresponding ACL object
acl, err := c.policy.ACL(te.Policies...)
if err != nil {
c.logger.Printf("[ERR] core: failed to construct ACL: %v", err)
return nil, ErrInternalError
2015-03-31 16:59:02 +00:00
}
// Check if this is a root protected path
2015-04-01 21:03:17 +00:00
if c.router.RootPath(path) && !acl.RootPrivilege(path) {
return nil, logical.ErrPermissionDenied
2015-03-31 16:59:02 +00:00
}
// Check the standard non-root ACLs
if !acl.AllowOperation(op, path) {
return nil, logical.ErrPermissionDenied
2015-03-31 16:59:02 +00:00
}
// Create the auth response
auth := &logical.Auth{
ClientToken: token,
Policies: te.Policies,
Metadata: te.Meta,
2015-04-15 21:12:34 +00:00
DisplayName: te.DisplayName,
}
return auth, nil
2015-03-31 16:59:02 +00:00
}
2015-03-09 23:33:27 +00:00
// Initialized checks if the Vault is already initialized
func (c *Core) Initialized() (bool, error) {
2015-03-10 00:45:34 +00:00
// Check the barrier first
init, err := c.barrier.Initialized()
if err != nil {
2015-03-10 00:45:34 +00:00
c.logger.Printf("[ERR] core: barrier init check failed: %v", err)
return false, err
}
if !init {
return false, nil
}
2015-03-10 00:45:34 +00:00
if !init {
c.logger.Printf("[INFO] core: security barrier not initialized")
return false, nil
}
// Verify the seal configuration
sealConf, err := c.SealConfig()
if err != nil {
return false, err
}
if sealConf == nil {
return false, nil
}
return true, nil
2015-03-09 23:33:27 +00:00
}
// Initialize is used to initialize the Vault with the given
// configurations.
2015-03-10 00:45:34 +00:00
func (c *Core) Initialize(config *SealConfig) (*InitResult, error) {
// Check if the seal configuraiton is valid
if err := config.Validate(); err != nil {
c.logger.Printf("[ERR] core: invalid seal configuration: %v", err)
return nil, fmt.Errorf("invalid seal configuration: %v", err)
}
// Avoid an initialization race
c.stateLock.Lock()
defer c.stateLock.Unlock()
// Check if we are initialized
init, err := c.Initialized()
if err != nil {
return nil, err
}
if init {
return nil, ErrAlreadyInit
}
// Encode the seal configuration
buf, err := json.Marshal(config)
if err != nil {
return nil, fmt.Errorf("failed to encode seal configuration: %v", err)
}
// Store the seal configuration
pe := &physical.Entry{
Key: coreSealConfigPath,
Value: buf,
}
if err := c.physical.Put(pe); err != nil {
2015-05-28 18:40:01 +00:00
c.logger.Printf("[ERR] core: failed to write seal configuration: %v", err)
return nil, fmt.Errorf("failed to write seal configuration: %v", err)
2015-03-10 00:45:34 +00:00
}
// Generate a master key
masterKey, err := c.barrier.GenerateKey()
if err != nil {
c.logger.Printf("[ERR] core: failed to generate master key: %v", err)
return nil, fmt.Errorf("master key generation failed: %v", err)
}
// Return the master key if only a single key part is used
results := new(InitResult)
2015-03-11 18:34:08 +00:00
if config.SecretShares == 1 {
results.SecretShares = append(results.SecretShares, masterKey)
2015-03-10 00:45:34 +00:00
} else {
2015-03-11 18:34:08 +00:00
// Split the master key using the Shamir algorithm
shares, err := shamir.Split(masterKey, config.SecretShares, config.SecretThreshold)
if err != nil {
c.logger.Printf("[ERR] core: failed to generate shares: %v", err)
return nil, fmt.Errorf("failed to generate shares: %v", err)
}
results.SecretShares = shares
2015-03-10 00:45:34 +00:00
}
// Initialize the barrier
if err := c.barrier.Initialize(masterKey); err != nil {
c.logger.Printf("[ERR] core: failed to initialize barrier: %v", err)
return nil, fmt.Errorf("failed to initialize barrier: %v", err)
}
2015-05-28 21:15:06 +00:00
c.logger.Printf("[INFO] core: security barrier initialized (shares: %d, threshold %d)",
config.SecretShares, config.SecretThreshold)
// Unseal the barrier
if err := c.barrier.Unseal(masterKey); err != nil {
c.logger.Printf("[ERR] core: failed to unseal barrier: %v", err)
return nil, fmt.Errorf("failed to unseal barrier: %v", err)
}
// Ensure the barrier is re-sealed
defer func() {
if err := c.barrier.Seal(); err != nil {
c.logger.Printf("[ERR] core: failed to seal barrier: %v", err)
}
}()
// Perform initial setup
if err := c.postUnseal(); err != nil {
c.logger.Printf("[ERR] core: post-unseal setup failed: %v", err)
return nil, err
}
// Generate a new root token
rootToken, err := c.tokenStore.RootToken()
if err != nil {
c.logger.Printf("[ERR] core: root token generation failed: %v", err)
return nil, err
}
results.RootToken = rootToken.ID
c.logger.Printf("[INFO] core: root token generated")
// Prepare to re-seal
if err := c.preSeal(); err != nil {
c.logger.Printf("[ERR] core: pre-seal teardown failed: %v", err)
return nil, err
}
2015-03-10 00:45:34 +00:00
return results, nil
2015-03-09 23:33:27 +00:00
}
// Sealed checks if the Vault is current sealed
func (c *Core) Sealed() (bool, error) {
2015-03-10 00:45:34 +00:00
c.stateLock.RLock()
defer c.stateLock.RUnlock()
return c.sealed, nil
2015-03-09 23:33:27 +00:00
}
2015-04-14 21:09:11 +00:00
// Standby checks if the Vault is in standby mode
func (c *Core) Standby() (bool, error) {
c.stateLock.RLock()
defer c.stateLock.RUnlock()
2015-04-14 23:11:39 +00:00
return c.standby, nil
2015-04-14 21:09:11 +00:00
}
2015-04-14 23:53:40 +00:00
// Leader is used to get the current active leader
func (c *Core) Leader() (bool, string, error) {
c.stateLock.RLock()
defer c.stateLock.RUnlock()
// Check if HA enabled
if c.ha == nil {
return false, "", ErrHANotEnabled
}
// Check if sealed
if c.sealed {
return false, "", ErrSealed
}
2015-04-14 23:53:40 +00:00
// Check if we are the leader
if !c.standby {
return true, c.advertiseAddr, nil
}
// Initialize a lock
lock, err := c.ha.LockWith(coreLockPath, "read")
if err != nil {
return false, "", err
}
// Read the value
held, value, err := lock.Value()
if err != nil {
return false, "", err
}
if !held {
return false, "", nil
}
// Value is the UUID of the leader, fetch the key
key := coreLeaderPrefix + value
entry, err := c.barrier.Get(key)
if err != nil {
return false, "", err
}
if entry == nil {
return false, "", nil
}
// Leader address is in the entry
return false, string(entry.Value), nil
}
2015-03-09 23:33:27 +00:00
// SealConfiguration is used to return information
// about the configuration of the Vault and it's current
// status.
func (c *Core) SealConfig() (*SealConfig, error) {
2015-03-10 00:45:34 +00:00
// Fetch the core configuration
pe, err := c.physical.Get(coreSealConfigPath)
if err != nil {
c.logger.Printf("[ERR] core: failed to read seal configuration: %v", err)
return nil, fmt.Errorf("failed to check seal configuration: %v", err)
}
// If the seal configuration is missing, we are not initialized
if pe == nil {
c.logger.Printf("[INFO] core: seal configuration missing, not initialized")
return nil, nil
}
// Decode the barrier entry
var conf SealConfig
if err := json.Unmarshal(pe.Value, &conf); err != nil {
c.logger.Printf("[ERR] core: failed to decode seal configuration: %v", err)
return nil, fmt.Errorf("failed to decode seal configuration: %v", err)
}
// Check for a valid seal configuration
if err := conf.Validate(); err != nil {
c.logger.Printf("[ERR] core: invalid seal configuration: %v", err)
return nil, fmt.Errorf("seal validation failed: %v", err)
}
return &conf, nil
2015-03-09 23:33:27 +00:00
}
2015-03-11 18:52:01 +00:00
// SecretProgress returns the number of keys provided so far
func (c *Core) SecretProgress() int {
c.stateLock.RLock()
defer c.stateLock.RUnlock()
return len(c.unlockParts)
}
// Unseal is used to provide one of the key parts to unseal the Vault.
//
// They key given as a parameter will automatically be zerod after
// this method is done with it. If you want to keep the key around, a copy
// should be made.
func (c *Core) Unseal(key []byte) (bool, error) {
2015-04-08 23:43:17 +00:00
defer metrics.MeasureSince([]string{"core", "unseal"}, time.Now())
2015-03-12 18:20:27 +00:00
// Verify the key length
min, max := c.barrier.KeyLength()
max += shamir.ShareOverhead
if len(key) < min {
return false, &ErrInvalidKey{fmt.Sprintf("key is shorter than minimum %d bytes", min)}
}
if len(key) > max {
return false, &ErrInvalidKey{fmt.Sprintf("key is longer than maximum %d bytes", max)}
}
2015-03-11 18:43:36 +00:00
// Get the seal configuration
config, err := c.SealConfig()
if err != nil {
return false, err
}
// Ensure the barrier is initialized
if config == nil {
return false, ErrNotInit
}
2015-03-10 00:45:34 +00:00
c.stateLock.Lock()
defer c.stateLock.Unlock()
2015-03-11 18:43:36 +00:00
// Check if already unsealed
if !c.sealed {
return true, nil
}
// Check if we already have this piece
for _, existing := range c.unlockParts {
if bytes.Equal(existing, key) {
return false, nil
}
}
// Store this key
c.unlockParts = append(c.unlockParts, key)
// Check if we don't have enough keys to unlock
if len(c.unlockParts) < config.SecretThreshold {
c.logger.Printf("[DEBUG] core: cannot unseal, have %d of %d keys",
len(c.unlockParts), config.SecretThreshold)
return false, nil
}
// Recover the master key
var masterKey []byte
if config.SecretThreshold == 1 {
masterKey = c.unlockParts[0]
c.unlockParts = nil
} else {
masterKey, err = shamir.Combine(c.unlockParts)
c.unlockParts = nil
if err != nil {
return false, fmt.Errorf("failed to compute master key: %v", err)
}
}
defer memzero(masterKey)
// Attempt to unlock
if err := c.barrier.Unseal(masterKey); err != nil {
return false, err
}
c.logger.Printf("[INFO] core: vault is unsealed")
2015-03-11 18:43:36 +00:00
2015-04-14 21:06:15 +00:00
// Do post-unseal setup if HA is not enabled
if c.ha == nil {
2015-04-14 23:11:39 +00:00
c.standby = false
2015-04-14 21:06:15 +00:00
if err := c.postUnseal(); err != nil {
c.logger.Printf("[ERR] core: post-unseal setup failed: %v", err)
c.barrier.Seal()
c.logger.Printf("[WARN] core: vault is sealed")
return false, err
}
} else {
// Go to standby mode, wait until we are active to unseal
c.standbyDoneCh = make(chan struct{})
c.standbyStopCh = make(chan struct{})
2015-04-14 23:11:39 +00:00
go c.runStandby(c.standbyDoneCh, c.standbyStopCh)
2015-03-11 22:19:41 +00:00
}
2015-03-11 18:43:36 +00:00
// Success!
c.sealed = false
return true, nil
2015-03-09 23:33:27 +00:00
}
2015-03-10 00:45:34 +00:00
2015-03-13 18:16:24 +00:00
// Seal is used to re-seal the Vault. This requires the Vault to
2015-03-10 00:45:34 +00:00
// be unsealed again to perform any further operations.
2015-03-31 16:59:02 +00:00
func (c *Core) Seal(token string) error {
2015-04-08 23:43:17 +00:00
defer metrics.MeasureSince([]string{"core", "seal"}, time.Now())
2015-03-10 00:45:34 +00:00
c.stateLock.Lock()
defer c.stateLock.Unlock()
if c.sealed {
return nil
}
2015-03-31 16:59:02 +00:00
// Validate the token is a root token
_, err := c.checkToken(logical.WriteOperation, "sys/seal", token)
2015-03-31 16:59:02 +00:00
if err != nil {
return err
}
2015-04-14 21:06:15 +00:00
// Enable that we are sealed to prevent furthur transactions
2015-03-10 00:45:34 +00:00
c.sealed = true
2015-03-13 18:16:24 +00:00
2015-04-14 21:06:15 +00:00
// Do pre-seal teardown if HA is not enabled
if c.ha == nil {
if err := c.preSeal(); err != nil {
c.logger.Printf("[ERR] core: pre-seal teardown failed: %v", err)
return fmt.Errorf("internal error")
}
} else {
// Signal the standby goroutine to shutdown, wait for completion
close(c.standbyStopCh)
// Release the lock while we wait to avoid deadlocking
c.stateLock.Unlock()
<-c.standbyDoneCh
c.stateLock.Lock()
2015-03-13 18:16:24 +00:00
}
if err := c.barrier.Seal(); err != nil {
return err
}
c.logger.Printf("[INFO] core: vault is sealed")
return nil
2015-03-10 00:45:34 +00:00
}
2015-03-11 22:19:41 +00:00
2015-05-28 18:40:01 +00:00
// RekeyProgress is used to return the rekey progress (num shares)
func (c *Core) RekeyProgress() (int, error) {
c.stateLock.RLock()
defer c.stateLock.RUnlock()
if c.sealed {
return 0, ErrSealed
}
if c.standby {
return 0, ErrStandby
}
2015-05-28 18:40:01 +00:00
c.rekeyLock.Lock()
defer c.rekeyLock.Unlock()
return len(c.rekeyProgress), nil
}
// RekeyConfig is used to read the rekey configuration
func (c *Core) RekeyConfig() (*SealConfig, error) {
c.stateLock.RLock()
defer c.stateLock.RUnlock()
if c.sealed {
return nil, ErrSealed
}
if c.standby {
return nil, ErrStandby
}
2015-05-28 18:40:01 +00:00
c.rekeyLock.Lock()
defer c.rekeyLock.Unlock()
// Copy the seal config if any
var conf *SealConfig
if c.rekeyConfig != nil {
conf = new(SealConfig)
*conf = *c.rekeyConfig
}
return conf, nil
}
// RekeyInit is used to initialize the rekey settings
func (c *Core) RekeyInit(config *SealConfig) error {
// Check if the seal configuraiton is valid
if err := config.Validate(); err != nil {
c.logger.Printf("[ERR] core: invalid rekey seal configuration: %v", err)
return fmt.Errorf("invalid rekey seal configuration: %v", err)
}
c.stateLock.RLock()
defer c.stateLock.RUnlock()
if c.sealed {
return ErrSealed
}
2015-05-28 22:26:35 +00:00
if c.standby {
return ErrStandby
}
2015-05-28 18:40:01 +00:00
// Prevent multiple concurrent re-keys
if c.rekeyConfig != nil {
2015-05-28 19:07:52 +00:00
return fmt.Errorf("rekey already in progress")
2015-05-28 18:40:01 +00:00
}
// Copy the configuration
c.rekeyConfig = new(SealConfig)
*c.rekeyConfig = *config
2015-05-28 21:15:06 +00:00
c.logger.Printf("[INFO] core: rekey initialized (shares: %d, threshold: %d)",
c.rekeyConfig.SecretShares, c.rekeyConfig.SecretThreshold)
2015-05-28 18:40:01 +00:00
return nil
}
// RekeyUpdate is used to provide a new key part
func (c *Core) RekeyUpdate(key []byte) (*RekeyResult, error) {
// Verify the key length
min, max := c.barrier.KeyLength()
max += shamir.ShareOverhead
if len(key) < min {
return nil, &ErrInvalidKey{fmt.Sprintf("key is shorter than minimum %d bytes", min)}
}
if len(key) > max {
return nil, &ErrInvalidKey{fmt.Sprintf("key is longer than maximum %d bytes", max)}
}
// Get the seal configuration
config, err := c.SealConfig()
if err != nil {
return nil, err
}
// Ensure the barrier is initialized
if config == nil {
return nil, ErrNotInit
}
// Ensure we are already unsealed
c.stateLock.RLock()
defer c.stateLock.RUnlock()
if c.sealed {
return nil, ErrSealed
}
2015-05-28 22:26:35 +00:00
if c.standby {
return nil, ErrStandby
}
2015-05-28 18:40:01 +00:00
c.rekeyLock.Lock()
defer c.rekeyLock.Unlock()
2015-05-28 19:07:52 +00:00
// Ensure a rekey is in progress
if c.rekeyConfig == nil {
return nil, fmt.Errorf("no rekey in progress")
}
2015-05-28 18:40:01 +00:00
// Check if we already have this piece
for _, existing := range c.rekeyProgress {
if bytes.Equal(existing, key) {
return nil, nil
}
}
// Store this key
c.rekeyProgress = append(c.rekeyProgress, key)
// Check if we don't have enough keys to unlock
if len(c.rekeyProgress) < config.SecretThreshold {
c.logger.Printf("[DEBUG] core: cannot rekey, have %d of %d keys",
len(c.rekeyProgress), config.SecretThreshold)
return nil, nil
}
// Recover the master key
var masterKey []byte
if config.SecretThreshold == 1 {
masterKey = c.rekeyProgress[0]
c.rekeyProgress = nil
} else {
masterKey, err = shamir.Combine(c.rekeyProgress)
c.rekeyProgress = nil
if err != nil {
return nil, fmt.Errorf("failed to compute master key: %v", err)
}
}
// Verify the master key
if err := c.barrier.VerifyMaster(masterKey); err != nil {
c.logger.Printf("[ERR] core: rekey aborted, master key verification failed: %v", err)
return nil, err
}
// Generate a new master key
newMasterKey, err := c.barrier.GenerateKey()
if err != nil {
c.logger.Printf("[ERR] core: failed to generate master key: %v", err)
return nil, fmt.Errorf("master key generation failed: %v", err)
}
// Return the master key if only a single key part is used
results := new(RekeyResult)
if c.rekeyConfig.SecretShares == 1 {
results.SecretShares = append(results.SecretShares, newMasterKey)
} else {
// Split the master key using the Shamir algorithm
shares, err := shamir.Split(newMasterKey, c.rekeyConfig.SecretShares, c.rekeyConfig.SecretThreshold)
if err != nil {
c.logger.Printf("[ERR] core: failed to generate shares: %v", err)
return nil, fmt.Errorf("failed to generate shares: %v", err)
}
results.SecretShares = shares
}
// Encode the seal configuration
buf, err := json.Marshal(c.rekeyConfig)
if err != nil {
return nil, fmt.Errorf("failed to encode seal configuration: %v", err)
}
// Rekey the barrier
if err := c.barrier.Rekey(newMasterKey); err != nil {
c.logger.Printf("[ERR] core: failed to rekey barrier: %v", err)
return nil, fmt.Errorf("failed to rekey barrier: %v", err)
}
2015-05-28 21:15:06 +00:00
c.logger.Printf("[INFO] core: security barrier rekeyed (shares: %d, threshold: %d)",
c.rekeyConfig.SecretShares, c.rekeyConfig.SecretThreshold)
2015-05-28 18:40:01 +00:00
// Store the seal configuration
pe := &physical.Entry{
Key: coreSealConfigPath,
Value: buf,
}
if err := c.physical.Put(pe); err != nil {
c.logger.Printf("[ERR] core: failed to update seal configuration: %v", err)
return nil, fmt.Errorf("failed to update seal configuration: %v", err)
}
// Done!
c.rekeyProgress = nil
c.rekeyConfig = nil
return results, nil
}
// RekeyCancel is used to cancel an inprogress rekey
func (c *Core) RekeyCancel() error {
c.stateLock.RLock()
defer c.stateLock.RUnlock()
if c.sealed {
return ErrSealed
}
if c.standby {
return ErrStandby
}
2015-05-28 18:40:01 +00:00
// Clear any progress or config
c.rekeyConfig = nil
c.rekeyProgress = nil
return nil
}
2015-03-11 22:19:41 +00:00
// postUnseal is invoked after the barrier is unsealed, but before
// allowing any user operations. This allows us to setup any state that
// requires the Vault to be unsealed such as mount tables, logical backends,
// credential stores, etc.
func (c *Core) postUnseal() error {
2015-04-08 23:43:17 +00:00
defer metrics.MeasureSince([]string{"core", "post_unseal"}, time.Now())
2015-04-14 21:06:15 +00:00
c.logger.Printf("[INFO] core: post-unseal setup starting")
2015-04-14 18:08:04 +00:00
if cache, ok := c.physical.(*physical.Cache); ok {
cache.Purge()
}
2015-05-28 23:11:31 +00:00
// HA mode requires us to handle keyring rotation and rekeying
if c.ha != nil {
if err := c.checkKeyUpgrades(); err != nil {
return err
}
if err := c.barrier.ReloadMasterKey(); err != nil {
return err
}
2015-05-28 23:11:31 +00:00
if err := c.barrier.ReloadKeyring(); err != nil {
return err
}
2015-05-28 23:52:06 +00:00
if err := c.scheduleUpgradeCleanup(); err != nil {
return err
}
2015-05-28 23:11:31 +00:00
}
2015-03-11 22:19:41 +00:00
if err := c.loadMounts(); err != nil {
return err
}
if err := c.setupMounts(); err != nil {
return err
}
if err := c.startRollback(); err != nil {
return err
}
if err := c.setupPolicyStore(); err != nil {
return nil
}
if err := c.loadCredentials(); err != nil {
return nil
}
2015-03-18 22:30:31 +00:00
if err := c.setupCredentials(); err != nil {
return nil
}
if err := c.setupExpiration(); err != nil {
return err
}
if err := c.loadAudits(); err != nil {
return err
}
if err := c.setupAudits(); err != nil {
return err
}
2015-04-08 23:43:17 +00:00
c.metricsCh = make(chan struct{})
go c.emitMetrics(c.metricsCh)
2015-04-14 21:06:15 +00:00
c.logger.Printf("[INFO] core: post-unseal setup complete")
2015-03-11 22:19:41 +00:00
return nil
}
2015-03-13 18:16:24 +00:00
// preSeal is invoked before the barrier is sealed, allowing
// for any state teardown required.
func (c *Core) preSeal() error {
2015-04-08 23:43:17 +00:00
defer metrics.MeasureSince([]string{"core", "pre_seal"}, time.Now())
2015-04-14 21:06:15 +00:00
c.logger.Printf("[INFO] core: pre-seal teardown starting")
2015-05-28 19:07:52 +00:00
// Clear any rekey progress
c.rekeyConfig = nil
c.rekeyProgress = nil
2015-04-08 23:43:17 +00:00
if c.metricsCh != nil {
close(c.metricsCh)
c.metricsCh = nil
}
if err := c.teardownAudits(); err != nil {
return err
}
if err := c.stopExpiration(); err != nil {
return err
}
2015-03-18 22:30:31 +00:00
if err := c.teardownCredentials(); err != nil {
return err
}
if err := c.teardownPolicyStore(); err != nil {
return err
}
if err := c.stopRollback(); err != nil {
return err
}
2015-03-13 18:16:24 +00:00
if err := c.unloadMounts(); err != nil {
return err
}
2015-04-14 18:08:04 +00:00
if cache, ok := c.physical.(*physical.Cache); ok {
cache.Purge()
}
2015-04-14 21:06:15 +00:00
c.logger.Printf("[INFO] core: pre-seal teardown complete")
2015-03-13 18:16:24 +00:00
return nil
}
2015-04-08 23:43:17 +00:00
2015-04-14 23:11:39 +00:00
// runStandby is a long running routine that is used when an HA backend
2015-04-14 21:06:15 +00:00
// is enabled. It waits until we are leader and switches this Vault to
// active.
2015-04-14 23:11:39 +00:00
func (c *Core) runStandby(doneCh, stopCh chan struct{}) {
2015-04-14 21:06:15 +00:00
defer close(doneCh)
2015-04-14 23:06:58 +00:00
c.logger.Printf("[INFO] core: entering standby mode")
2015-05-28 23:11:31 +00:00
// Monitor for key rotation
keyRotateDone := make(chan struct{})
keyRotateStop := make(chan struct{})
go c.periodicCheckKeyUpgrade(keyRotateDone, keyRotateStop)
defer func() {
close(keyRotateStop)
<-keyRotateDone
}()
2015-04-14 21:06:15 +00:00
for {
// Check for a shutdown
select {
case <-stopCh:
return
default:
}
// Create a lock
2015-04-14 23:44:48 +00:00
uuid := generateUUID()
lock, err := c.ha.LockWith(coreLockPath, uuid)
2015-04-14 21:06:15 +00:00
if err != nil {
c.logger.Printf("[ERR] core: failed to create lock: %v", err)
return
}
// Attempt the acquisition
leaderCh := c.acquireLock(lock, stopCh)
// Bail if we are being shutdown
if leaderCh == nil {
return
}
c.logger.Printf("[INFO] core: acquired lock, enabling active operation")
2015-04-14 23:44:48 +00:00
// Advertise ourself as leader
if err := c.advertiseLeader(uuid); err != nil {
c.logger.Printf("[ERR] core: leader advertisement setup failed: %v", err)
lock.Unlock()
continue
}
2015-04-14 21:06:15 +00:00
// Attempt the post-unseal process
c.stateLock.Lock()
err = c.postUnseal()
if err == nil {
2015-04-14 23:11:39 +00:00
c.standby = false
2015-04-14 21:06:15 +00:00
}
c.stateLock.Unlock()
// Handle a failure to unseal
if err != nil {
c.logger.Printf("[ERR] core: post-unseal setup failed: %v", err)
lock.Unlock()
continue
}
// Monitor a loss of leadership
select {
case <-leaderCh:
c.logger.Printf("[WARN] core: leadership lost, stopping active operation")
case <-stopCh:
c.logger.Printf("[WARN] core: stopping active operation")
}
2015-04-14 23:44:48 +00:00
// Clear ourself as leader
if err := c.clearLeader(uuid); err != nil {
c.logger.Printf("[ERR] core: clearing leader advertisement failed: %v", err)
}
2015-04-14 21:06:15 +00:00
// Attempt the pre-seal process
c.stateLock.Lock()
2015-04-14 23:11:39 +00:00
c.standby = true
2015-04-14 21:06:15 +00:00
err = c.preSeal()
c.stateLock.Unlock()
// Give up leadership
lock.Unlock()
// Check for a failure to prepare to seal
if err := c.preSeal(); err != nil {
c.logger.Printf("[ERR] core: pre-seal teardown failed: %v", err)
continue
}
}
}
2015-05-28 23:11:31 +00:00
// periodicCheckKeyUpgrade is used to watch for key rotation events as a standby
func (c *Core) periodicCheckKeyUpgrade(doneCh, stopCh chan struct{}) {
defer close(doneCh)
for {
select {
case <-time.After(keyRotateCheckInterval):
// Only check if we are a standby
c.stateLock.RLock()
standby := c.standby
c.stateLock.RUnlock()
if !standby {
continue
}
if err := c.checkKeyUpgrades(); err != nil {
c.logger.Printf("[ERR] core: upgrade due to key rotation failed: %v", err)
}
case <-stopCh:
return
}
}
}
// checkKeyUpgrades is used to check if there have been any key rotations
// and if there is a chain of upgrades available
func (c *Core) checkKeyUpgrades() error {
for {
2015-05-28 23:43:44 +00:00
// Check for an upgrade
didUpgrade, newTerm, err := c.barrier.CheckUpgrade()
2015-05-28 23:11:31 +00:00
if err != nil {
return err
}
// Nothing to do if no upgrade
2015-05-28 23:43:44 +00:00
if !didUpgrade {
2015-05-28 23:11:31 +00:00
break
}
2015-05-28 23:43:44 +00:00
c.logger.Printf("[INFO] core: upgraded to key term %d", newTerm)
2015-05-28 23:11:31 +00:00
}
return nil
}
2015-05-28 23:52:06 +00:00
// scheduleUpgradeCleanup is used to ensure that all the upgrade paths
// are cleaned up in a timely manner if a leader failover takes place
func (c *Core) scheduleUpgradeCleanup() error {
// List the upgrades
upgrades, err := c.barrier.List(keyringUpgradePrefix)
if err != nil {
return fmt.Errorf("failed to list upgrades: %v", err)
}
// Nothing to do if no upgrades
if len(upgrades) == 0 {
return nil
}
// Schedule cleanup for all of them
time.AfterFunc(keyRotateGracePeriod, func() {
for _, upgrade := range upgrades {
path := fmt.Sprintf("%s%s", keyringUpgradePrefix, upgrade)
if err := c.barrier.Delete(path); err != nil {
c.logger.Printf("[ERR] core: failed to cleanup upgrade: %s", path)
}
}
})
return nil
}
2015-04-14 21:06:15 +00:00
// acquireLock blocks until the lock is acquired, returning the leaderCh
func (c *Core) acquireLock(lock physical.Lock, stopCh <-chan struct{}) <-chan struct{} {
for {
// Attempt lock acquisition
leaderCh, err := lock.Lock(stopCh)
if err == nil {
return leaderCh
}
// Retry the acquisition
c.logger.Printf("[ERR] core: failed to acquire lock: %v", err)
select {
case <-time.After(lockRetryInterval):
case <-stopCh:
return nil
}
}
}
2015-04-14 23:44:48 +00:00
// advertiseLeader is used to advertise the current node as leader
func (c *Core) advertiseLeader(uuid string) error {
ent := &Entry{
Key: coreLeaderPrefix + uuid,
Value: []byte(c.advertiseAddr),
}
return c.barrier.Put(ent)
}
// clearLeader is used to clear our leadership entry
func (c *Core) clearLeader(uuid string) error {
key := coreLeaderPrefix + uuid
return c.barrier.Delete(key)
}
2015-04-08 23:43:17 +00:00
// emitMetrics is used to periodically expose metrics while runnig
func (c *Core) emitMetrics(stopCh chan struct{}) {
for {
select {
case <-time.After(time.Second):
c.expiration.emitMetrics()
case <-stopCh:
return
}
}
}