2015-04-05 01:07:53 +00:00
|
|
|
package file
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"os"
|
2015-04-27 19:40:32 +00:00
|
|
|
"path/filepath"
|
2015-04-27 21:28:02 +00:00
|
|
|
"strconv"
|
2015-04-05 01:07:53 +00:00
|
|
|
"sync"
|
|
|
|
|
|
|
|
"github.com/hashicorp/vault/audit"
|
2017-05-24 00:36:20 +00:00
|
|
|
"github.com/hashicorp/vault/helper/salt"
|
2015-04-05 01:07:53 +00:00
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
)
|
|
|
|
|
2015-09-18 21:36:42 +00:00
|
|
|
func Factory(conf *audit.BackendConfig) (audit.Backend, error) {
|
2017-05-24 00:36:20 +00:00
|
|
|
if conf.SaltConfig == nil {
|
|
|
|
return nil, fmt.Errorf("nil salt config")
|
|
|
|
}
|
|
|
|
if conf.SaltView == nil {
|
|
|
|
return nil, fmt.Errorf("nil salt view")
|
2015-09-18 16:18:37 +00:00
|
|
|
}
|
|
|
|
|
2016-03-14 21:15:07 +00:00
|
|
|
path, ok := conf.Config["file_path"]
|
2015-04-05 01:07:53 +00:00
|
|
|
if !ok {
|
2016-03-16 00:05:51 +00:00
|
|
|
path, ok = conf.Config["path"]
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("file_path is required")
|
|
|
|
}
|
2015-04-05 01:07:53 +00:00
|
|
|
}
|
|
|
|
|
2016-09-21 14:29:42 +00:00
|
|
|
format, ok := conf.Config["format"]
|
|
|
|
if !ok {
|
|
|
|
format = "json"
|
|
|
|
}
|
|
|
|
switch format {
|
|
|
|
case "json", "jsonx":
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("unknown format type %s", format)
|
|
|
|
}
|
|
|
|
|
2016-03-12 00:28:06 +00:00
|
|
|
// Check if hashing of accessor is disabled
|
2016-03-14 18:52:29 +00:00
|
|
|
hmacAccessor := true
|
|
|
|
if hmacAccessorRaw, ok := conf.Config["hmac_accessor"]; ok {
|
|
|
|
value, err := strconv.ParseBool(hmacAccessorRaw)
|
2016-03-12 00:28:06 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-03-14 18:52:29 +00:00
|
|
|
hmacAccessor = value
|
2016-03-12 00:28:06 +00:00
|
|
|
}
|
|
|
|
|
2015-04-27 21:28:02 +00:00
|
|
|
// Check if raw logging is enabled
|
|
|
|
logRaw := false
|
2015-09-18 16:18:37 +00:00
|
|
|
if raw, ok := conf.Config["log_raw"]; ok {
|
2015-04-27 21:28:02 +00:00
|
|
|
b, err := strconv.ParseBool(raw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
logRaw = b
|
|
|
|
}
|
2016-10-10 15:58:26 +00:00
|
|
|
|
2016-10-08 23:52:49 +00:00
|
|
|
// Check if mode is provided
|
2016-10-10 15:58:26 +00:00
|
|
|
mode := os.FileMode(0600)
|
2016-10-08 23:52:49 +00:00
|
|
|
if modeRaw, ok := conf.Config["mode"]; ok {
|
|
|
|
m, err := strconv.ParseUint(modeRaw, 8, 32)
|
2016-10-07 19:09:32 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-10-08 23:52:49 +00:00
|
|
|
mode = os.FileMode(m)
|
2016-10-07 19:09:32 +00:00
|
|
|
}
|
2015-04-27 21:28:02 +00:00
|
|
|
|
|
|
|
b := &Backend{
|
2017-05-24 00:36:20 +00:00
|
|
|
path: path,
|
|
|
|
mode: mode,
|
|
|
|
saltConfig: conf.SaltConfig,
|
|
|
|
saltView: conf.SaltView,
|
2016-09-21 14:29:42 +00:00
|
|
|
formatConfig: audit.FormatterConfig{
|
|
|
|
Raw: logRaw,
|
|
|
|
HMACAccessor: hmacAccessor,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
switch format {
|
|
|
|
case "json":
|
2017-02-11 00:56:28 +00:00
|
|
|
b.formatter.AuditFormatWriter = &audit.JSONFormatWriter{
|
2017-05-24 00:36:20 +00:00
|
|
|
Prefix: conf.Config["prefix"],
|
|
|
|
SaltFunc: b.Salt,
|
2017-02-11 00:56:28 +00:00
|
|
|
}
|
2016-09-21 14:29:42 +00:00
|
|
|
case "jsonx":
|
2017-02-11 00:56:28 +00:00
|
|
|
b.formatter.AuditFormatWriter = &audit.JSONxFormatWriter{
|
2017-05-24 00:36:20 +00:00
|
|
|
Prefix: conf.Config["prefix"],
|
|
|
|
SaltFunc: b.Salt,
|
2017-02-11 00:56:28 +00:00
|
|
|
}
|
2015-04-27 21:28:02 +00:00
|
|
|
}
|
2015-08-26 16:13:10 +00:00
|
|
|
|
|
|
|
// Ensure that the file can be successfully opened for writing;
|
|
|
|
// otherwise it will be too late to catch later without problems
|
|
|
|
// (ref: https://github.com/hashicorp/vault/issues/550)
|
|
|
|
if err := b.open(); err != nil {
|
2016-08-15 20:26:36 +00:00
|
|
|
return nil, fmt.Errorf("sanity check failed; unable to open %s for writing: %v", path, err)
|
2015-08-26 16:13:10 +00:00
|
|
|
}
|
|
|
|
|
2015-04-27 21:28:02 +00:00
|
|
|
return b, nil
|
2015-04-05 01:07:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Backend is the audit backend for the file-based audit store.
|
|
|
|
//
|
|
|
|
// NOTE: This audit backend is currently very simple: it appends to a file.
|
|
|
|
// It doesn't do anything more at the moment to assist with rotation
|
|
|
|
// or reset the write cursor, this should be done in the future.
|
|
|
|
type Backend struct {
|
2016-09-21 14:29:42 +00:00
|
|
|
path string
|
|
|
|
|
|
|
|
formatter audit.AuditFormatter
|
|
|
|
formatConfig audit.FormatterConfig
|
2015-04-05 01:07:53 +00:00
|
|
|
|
2016-09-30 19:04:50 +00:00
|
|
|
fileLock sync.RWMutex
|
|
|
|
f *os.File
|
2016-10-10 15:58:26 +00:00
|
|
|
mode os.FileMode
|
2017-05-24 00:36:20 +00:00
|
|
|
|
|
|
|
saltMutex sync.RWMutex
|
|
|
|
salt *salt.Salt
|
|
|
|
saltConfig *salt.Config
|
|
|
|
saltView logical.Storage
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *Backend) Salt() (*salt.Salt, error) {
|
|
|
|
b.saltMutex.RLock()
|
|
|
|
if b.salt != nil {
|
|
|
|
defer b.saltMutex.RUnlock()
|
|
|
|
return b.salt, nil
|
|
|
|
}
|
|
|
|
b.saltMutex.RUnlock()
|
|
|
|
b.saltMutex.Lock()
|
|
|
|
defer b.saltMutex.Unlock()
|
|
|
|
if b.salt != nil {
|
|
|
|
return b.salt, nil
|
|
|
|
}
|
|
|
|
salt, err := salt.NewSalt(b.saltView, b.saltConfig)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
b.salt = salt
|
|
|
|
return salt, nil
|
2015-04-05 01:07:53 +00:00
|
|
|
}
|
|
|
|
|
2017-05-24 00:36:20 +00:00
|
|
|
func (b *Backend) GetHash(data string) (string, error) {
|
|
|
|
salt, err := b.Salt()
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return audit.HashString(salt, data), nil
|
2015-11-19 01:26:03 +00:00
|
|
|
}
|
|
|
|
|
2015-06-19 01:30:18 +00:00
|
|
|
func (b *Backend) LogRequest(auth *logical.Auth, req *logical.Request, outerErr error) error {
|
2016-09-30 19:04:50 +00:00
|
|
|
b.fileLock.Lock()
|
|
|
|
defer b.fileLock.Unlock()
|
|
|
|
|
2015-04-05 01:07:53 +00:00
|
|
|
if err := b.open(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-07-14 15:03:01 +00:00
|
|
|
if err := b.formatter.FormatRequest(b.f, b.formatConfig, auth, req, outerErr); err == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Opportunistically try to re-open the FD, once per call
|
|
|
|
b.f.Close()
|
|
|
|
b.f = nil
|
|
|
|
|
|
|
|
if err := b.open(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2016-09-21 14:29:42 +00:00
|
|
|
return b.formatter.FormatRequest(b.f, b.formatConfig, auth, req, outerErr)
|
2015-04-05 01:07:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (b *Backend) LogResponse(
|
|
|
|
auth *logical.Auth,
|
|
|
|
req *logical.Request,
|
|
|
|
resp *logical.Response,
|
|
|
|
err error) error {
|
2016-09-30 19:04:50 +00:00
|
|
|
|
|
|
|
b.fileLock.Lock()
|
|
|
|
defer b.fileLock.Unlock()
|
|
|
|
|
2015-04-05 01:07:53 +00:00
|
|
|
if err := b.open(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-07-14 15:03:01 +00:00
|
|
|
if err := b.formatter.FormatResponse(b.f, b.formatConfig, auth, req, resp, err); err == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Opportunistically try to re-open the FD, once per call
|
|
|
|
b.f.Close()
|
|
|
|
b.f = nil
|
|
|
|
|
|
|
|
if err := b.open(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2016-09-21 14:29:42 +00:00
|
|
|
return b.formatter.FormatResponse(b.f, b.formatConfig, auth, req, resp, err)
|
2015-04-05 01:07:53 +00:00
|
|
|
}
|
|
|
|
|
2016-09-30 19:04:50 +00:00
|
|
|
// The file lock must be held before calling this
|
2015-04-05 01:07:53 +00:00
|
|
|
func (b *Backend) open() error {
|
|
|
|
if b.f != nil {
|
|
|
|
return nil
|
|
|
|
}
|
2016-10-10 15:58:26 +00:00
|
|
|
if err := os.MkdirAll(filepath.Dir(b.path), b.mode); err != nil {
|
2015-04-27 19:40:32 +00:00
|
|
|
return err
|
|
|
|
}
|
2015-04-05 01:07:53 +00:00
|
|
|
|
|
|
|
var err error
|
2016-10-10 15:58:26 +00:00
|
|
|
b.f, err = os.OpenFile(b.path, os.O_APPEND|os.O_WRONLY|os.O_CREATE, b.mode)
|
2016-10-07 19:09:32 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-10-10 15:58:26 +00:00
|
|
|
|
2017-02-16 18:09:53 +00:00
|
|
|
// Change the file mode in case the log file already existed. We special
|
|
|
|
// case /dev/null since we can't chmod it
|
|
|
|
switch b.path {
|
|
|
|
case "/dev/null":
|
|
|
|
default:
|
|
|
|
err = os.Chmod(b.path, b.mode)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-04-05 01:07:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2016-09-30 19:04:50 +00:00
|
|
|
|
|
|
|
func (b *Backend) Reload() error {
|
|
|
|
b.fileLock.Lock()
|
|
|
|
defer b.fileLock.Unlock()
|
|
|
|
|
|
|
|
if b.f == nil {
|
|
|
|
return b.open()
|
|
|
|
}
|
|
|
|
|
|
|
|
err := b.f.Close()
|
|
|
|
// Set to nil here so that even if we error out, on the next access open()
|
|
|
|
// will be tried
|
|
|
|
b.f = nil
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return b.open()
|
|
|
|
}
|
2017-05-24 00:36:20 +00:00
|
|
|
|
|
|
|
func (b *Backend) Invalidate() {
|
|
|
|
b.saltMutex.Lock()
|
|
|
|
defer b.saltMutex.Unlock()
|
|
|
|
b.salt = nil
|
|
|
|
}
|