open-vault/http/sys_rekey.go

412 lines
12 KiB
Go
Raw Normal View History

2015-05-28 21:28:50 +00:00
package http
import (
"context"
"encoding/base64"
2015-05-28 21:28:50 +00:00
"encoding/hex"
"errors"
"fmt"
"net/http"
2015-12-16 21:56:15 +00:00
"github.com/hashicorp/vault/helper/pgpkeys"
"github.com/hashicorp/vault/sdk/helper/consts"
2015-05-28 21:28:50 +00:00
"github.com/hashicorp/vault/vault"
)
2016-04-04 14:44:22 +00:00
func handleSysRekeyInit(core *vault.Core, recovery bool) http.Handler {
2015-05-28 21:28:50 +00:00
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
standby, _ := core.Standby()
if standby {
respondStandby(core, w, r.URL)
return
}
repState := core.ReplicationState()
if repState.HasState(consts.ReplicationPerformanceSecondary) {
respondError(w, http.StatusBadRequest,
fmt.Errorf("rekeying can only be performed on the primary cluster when replication is activated"))
return
}
ctx, cancel := core.GetContext()
defer cancel()
2016-04-04 14:44:22 +00:00
switch {
case recovery && !core.SealAccess().RecoveryKeySupported():
2016-04-04 14:44:22 +00:00
respondError(w, http.StatusBadRequest, fmt.Errorf("recovery rekeying not supported"))
case r.Method == "GET":
handleSysRekeyInitGet(ctx, core, recovery, w, r)
2016-04-04 14:44:22 +00:00
case r.Method == "POST" || r.Method == "PUT":
handleSysRekeyInitPut(ctx, core, recovery, w, r)
2016-04-04 14:44:22 +00:00
case r.Method == "DELETE":
2018-05-21 18:47:00 +00:00
handleSysRekeyInitDelete(ctx, core, recovery, w, r)
2015-05-28 21:28:50 +00:00
default:
respondError(w, http.StatusMethodNotAllowed, nil)
}
})
}
func handleSysRekeyInitGet(ctx context.Context, core *vault.Core, recovery bool, w http.ResponseWriter, r *http.Request) {
barrierConfig, barrierConfErr := core.SealAccess().BarrierConfig(ctx)
if barrierConfErr != nil {
respondError(w, http.StatusInternalServerError, barrierConfErr)
2015-05-28 21:28:50 +00:00
return
}
2016-04-04 14:44:22 +00:00
if barrierConfig == nil {
respondError(w, http.StatusBadRequest, fmt.Errorf("server is not yet initialized"))
2015-05-28 21:28:50 +00:00
return
}
// Get the rekey configuration
2016-04-04 14:44:22 +00:00
rekeyConf, err := core.RekeyConfig(recovery)
2015-05-28 21:28:50 +00:00
if err != nil {
respondError(w, err.Code(), err)
2015-05-28 21:28:50 +00:00
return
}
sealThreshold, err := core.RekeyThreshold(ctx, recovery)
if err != nil {
respondError(w, err.Code(), err)
return
}
2015-05-28 21:28:50 +00:00
// Format the status
status := &RekeyStatusResponse{
Started: false,
T: 0,
N: 0,
Required: sealThreshold,
2015-05-28 21:28:50 +00:00
}
if rekeyConf != nil {
2018-05-21 21:46:32 +00:00
// Get the progress
started, progress, err := core.RekeyProgress(recovery, false)
2018-05-21 21:46:32 +00:00
if err != nil {
respondError(w, err.Code(), err)
return
}
2015-12-16 21:56:15 +00:00
status.Nonce = rekeyConf.Nonce
status.Started = started
2015-05-28 21:28:50 +00:00
status.T = rekeyConf.SecretThreshold
status.N = rekeyConf.SecretShares
2018-05-21 21:46:32 +00:00
status.Progress = progress
2018-05-18 01:17:52 +00:00
status.VerificationRequired = rekeyConf.VerificationRequired
2018-05-29 20:13:08 +00:00
status.VerificationNonce = rekeyConf.VerificationNonce
2015-12-16 21:56:15 +00:00
if rekeyConf.PGPKeys != nil && len(rekeyConf.PGPKeys) != 0 {
pgpFingerprints, err := pgpkeys.GetFingerprints(rekeyConf.PGPKeys, nil)
if err != nil {
respondError(w, http.StatusInternalServerError, err)
return
2015-12-16 21:56:15 +00:00
}
status.PGPFingerprints = pgpFingerprints
status.Backup = rekeyConf.Backup
}
2015-05-28 21:28:50 +00:00
}
respondOk(w, status)
}
func handleSysRekeyInitPut(ctx context.Context, core *vault.Core, recovery bool, w http.ResponseWriter, r *http.Request) {
2015-05-28 21:28:50 +00:00
// Parse the request
var req RekeyRequest
if _, err := parseJSONRequest(core.PerfStandby(), r, w, &req); err != nil {
2015-05-28 21:28:50 +00:00
respondError(w, http.StatusBadRequest, err)
return
}
2015-12-16 21:56:15 +00:00
if req.Backup && len(req.PGPKeys) == 0 {
respondError(w, http.StatusBadRequest, fmt.Errorf("cannot request a backup of the new keys without providing PGP keys for encryption"))
return
}
if len(req.PGPKeys) > 0 && len(req.PGPKeys) != req.SecretShares {
2017-01-12 05:05:41 +00:00
respondError(w, http.StatusBadRequest, fmt.Errorf("incorrect number of PGP keys for rekey"))
return
}
2015-05-28 21:28:50 +00:00
// Initialize the rekey
err := core.RekeyInit(&vault.SealConfig{
2018-05-18 01:17:52 +00:00
SecretShares: req.SecretShares,
SecretThreshold: req.SecretThreshold,
StoredShares: req.StoredShares,
PGPKeys: req.PGPKeys,
Backup: req.Backup,
VerificationRequired: req.RequireVerification,
2016-04-04 14:44:22 +00:00
}, recovery)
2015-05-28 21:28:50 +00:00
if err != nil {
respondError(w, err.Code(), err)
2015-05-28 21:28:50 +00:00
return
}
handleSysRekeyInitGet(ctx, core, recovery, w, r)
2015-05-28 21:28:50 +00:00
}
2018-05-21 18:47:00 +00:00
func handleSysRekeyInitDelete(ctx context.Context, core *vault.Core, recovery bool, w http.ResponseWriter, r *http.Request) {
if err := core.RekeyCancel(recovery); err != nil {
respondError(w, err.Code(), err)
2015-05-28 21:28:50 +00:00
return
}
respondOk(w, nil)
}
2016-04-04 14:44:22 +00:00
func handleSysRekeyUpdate(core *vault.Core, recovery bool) http.Handler {
2015-05-28 21:28:50 +00:00
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
standby, _ := core.Standby()
if standby {
respondStandby(core, w, r.URL)
return
}
2015-05-28 21:28:50 +00:00
// Parse the request
var req RekeyUpdateRequest
if _, err := parseJSONRequest(core.PerfStandby(), r, w, &req); err != nil {
2015-05-28 21:28:50 +00:00
respondError(w, http.StatusBadRequest, err)
return
}
if req.Key == "" {
respondError(
w, http.StatusBadRequest,
2017-03-14 21:10:43 +00:00
errors.New("'key' must be specified in request body as JSON"))
2015-05-28 21:28:50 +00:00
return
}
// Decode the key, which is base64 or hex encoded
min, max := core.BarrierKeyLength()
2015-05-28 21:28:50 +00:00
key, err := hex.DecodeString(req.Key)
// We check min and max here to ensure that a string that is base64
// encoded but also valid hex will not be valid and we instead base64
// decode it
if err != nil || len(key) < min || len(key) > max {
key, err = base64.StdEncoding.DecodeString(req.Key)
if err != nil {
respondError(
w, http.StatusBadRequest,
errors.New("'key' must be a valid hex or base64 string"))
return
}
2015-05-28 21:28:50 +00:00
}
ctx, cancel := core.GetContext()
defer cancel()
2015-05-28 21:28:50 +00:00
// Use the key to make progress on rekey
result, rekeyErr := core.RekeyUpdate(ctx, key, req.Nonce, recovery)
if rekeyErr != nil {
2018-05-20 22:42:14 +00:00
respondError(w, rekeyErr.Code(), rekeyErr)
2015-05-28 21:28:50 +00:00
return
}
// Format the response
resp := &RekeyUpdateResponse{}
if result != nil {
resp.Complete = true
2015-12-16 21:56:15 +00:00
resp.Nonce = req.Nonce
resp.Backup = result.Backup
resp.PGPFingerprints = result.PGPFingerprints
2018-05-18 01:17:52 +00:00
resp.VerificationRequired = result.VerificationRequired
resp.VerificationNonce = result.VerificationNonce
2015-05-28 21:28:50 +00:00
// Encode the keys
keys := make([]string, 0, len(result.SecretShares))
keysB64 := make([]string, 0, len(result.SecretShares))
2015-05-28 21:28:50 +00:00
for _, k := range result.SecretShares {
keys = append(keys, hex.EncodeToString(k))
keysB64 = append(keysB64, base64.StdEncoding.EncodeToString(k))
2015-05-28 21:28:50 +00:00
}
resp.Keys = keys
resp.KeysB64 = keysB64
2017-01-17 20:43:10 +00:00
respondOk(w, resp)
} else {
handleSysRekeyInitGet(ctx, core, recovery, w, r)
2015-05-28 21:28:50 +00:00
}
})
}
2018-05-18 01:17:52 +00:00
func handleSysRekeyVerify(core *vault.Core, recovery bool) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
standby, _ := core.Standby()
if standby {
respondStandby(core, w, r.URL)
return
}
repState := core.ReplicationState()
if repState.HasState(consts.ReplicationPerformanceSecondary) {
respondError(w, http.StatusBadRequest,
fmt.Errorf("rekeying can only be performed on the primary cluster when replication is activated"))
return
}
ctx, cancel := core.GetContext()
defer cancel()
switch {
case recovery && !core.SealAccess().RecoveryKeySupported():
respondError(w, http.StatusBadRequest, fmt.Errorf("recovery rekeying not supported"))
case r.Method == "GET":
handleSysRekeyVerifyGet(ctx, core, recovery, w, r)
case r.Method == "POST" || r.Method == "PUT":
handleSysRekeyVerifyPut(ctx, core, recovery, w, r)
case r.Method == "DELETE":
2018-05-21 18:47:00 +00:00
handleSysRekeyVerifyDelete(ctx, core, recovery, w, r)
2018-05-18 01:17:52 +00:00
default:
respondError(w, http.StatusMethodNotAllowed, nil)
}
})
}
func handleSysRekeyVerifyGet(ctx context.Context, core *vault.Core, recovery bool, w http.ResponseWriter, r *http.Request) {
barrierConfig, barrierConfErr := core.SealAccess().BarrierConfig(ctx)
if barrierConfErr != nil {
respondError(w, http.StatusInternalServerError, barrierConfErr)
2018-05-18 01:17:52 +00:00
return
}
if barrierConfig == nil {
respondError(w, http.StatusBadRequest, fmt.Errorf("server is not yet initialized"))
return
}
// Get the rekey configuration
rekeyConf, err := core.RekeyConfig(recovery)
if err != nil {
respondError(w, err.Code(), err)
2018-05-18 01:17:52 +00:00
return
}
if rekeyConf == nil {
respondError(w, http.StatusBadRequest, errors.New("no rekey configuration found"))
return
}
// Get the progress
started, progress, err := core.RekeyProgress(recovery, true)
2018-05-18 01:17:52 +00:00
if err != nil {
respondError(w, err.Code(), err)
2018-05-18 01:17:52 +00:00
return
}
// Format the status
status := &RekeyVerificationStatusResponse{
Started: started,
2018-05-20 06:42:15 +00:00
Nonce: rekeyConf.VerificationNonce,
2018-05-18 01:17:52 +00:00
T: rekeyConf.SecretThreshold,
N: rekeyConf.SecretShares,
Progress: progress,
}
respondOk(w, status)
}
2018-05-21 18:47:00 +00:00
func handleSysRekeyVerifyDelete(ctx context.Context, core *vault.Core, recovery bool, w http.ResponseWriter, r *http.Request) {
if err := core.RekeyVerifyRestart(recovery); err != nil {
respondError(w, err.Code(), err)
2018-05-18 01:17:52 +00:00
return
}
handleSysRekeyVerifyGet(ctx, core, recovery, w, r)
}
func handleSysRekeyVerifyPut(ctx context.Context, core *vault.Core, recovery bool, w http.ResponseWriter, r *http.Request) {
// Parse the request
var req RekeyVerificationUpdateRequest
if _, err := parseJSONRequest(core.PerfStandby(), r, w, &req); err != nil {
2018-05-18 01:17:52 +00:00
respondError(w, http.StatusBadRequest, err)
return
}
if req.Key == "" {
respondError(
w, http.StatusBadRequest,
errors.New("'key' must be specified in request body as JSON"))
return
}
// Decode the key, which is base64 or hex encoded
min, max := core.BarrierKeyLength()
key, err := hex.DecodeString(req.Key)
// We check min and max here to ensure that a string that is base64
// encoded but also valid hex will not be valid and we instead base64
// decode it
if err != nil || len(key) < min || len(key) > max {
key, err = base64.StdEncoding.DecodeString(req.Key)
if err != nil {
respondError(
w, http.StatusBadRequest,
errors.New("'key' must be a valid hex or base64 string"))
return
}
}
ctx, cancel := core.GetContext()
defer cancel()
// Use the key to make progress on rekey
2018-05-20 06:42:15 +00:00
result, rekeyErr := core.RekeyVerify(ctx, key, req.Nonce, recovery)
if rekeyErr != nil {
2018-05-20 22:42:14 +00:00
respondError(w, rekeyErr.Code(), rekeyErr)
2018-05-18 01:17:52 +00:00
return
}
// Format the response
resp := &RekeyVerificationUpdateResponse{}
if result != nil {
resp.Complete = true
resp.Nonce = result.Nonce
respondOk(w, resp)
} else {
handleSysRekeyVerifyGet(ctx, core, recovery, w, r)
}
}
2015-05-28 21:28:50 +00:00
type RekeyRequest struct {
2018-05-18 01:17:52 +00:00
SecretShares int `json:"secret_shares"`
SecretThreshold int `json:"secret_threshold"`
StoredShares int `json:"stored_shares"`
PGPKeys []string `json:"pgp_keys"`
Backup bool `json:"backup"`
RequireVerification bool `json:"require_verification"`
2015-05-28 21:28:50 +00:00
}
type RekeyStatusResponse struct {
2018-05-18 01:17:52 +00:00
Nonce string `json:"nonce"`
Started bool `json:"started"`
T int `json:"t"`
N int `json:"n"`
Progress int `json:"progress"`
Required int `json:"required"`
PGPFingerprints []string `json:"pgp_fingerprints"`
Backup bool `json:"backup"`
VerificationRequired bool `json:"verification_required"`
2018-05-29 21:02:52 +00:00
VerificationNonce string `json:"verification_nonce,omitempty"`
2015-05-28 21:28:50 +00:00
}
type RekeyUpdateRequest struct {
2015-12-16 21:56:15 +00:00
Nonce string
Key string
2015-05-28 21:28:50 +00:00
}
type RekeyUpdateResponse struct {
2018-05-18 01:17:52 +00:00
Nonce string `json:"nonce"`
Complete bool `json:"complete"`
Keys []string `json:"keys"`
KeysB64 []string `json:"keys_base64"`
PGPFingerprints []string `json:"pgp_fingerprints"`
Backup bool `json:"backup"`
VerificationRequired bool `json:"verification_required"`
2018-05-20 02:04:45 +00:00
VerificationNonce string `json:"verification_nonce,omitempty"`
2018-05-18 01:17:52 +00:00
}
type RekeyVerificationUpdateRequest struct {
2018-05-20 06:42:15 +00:00
Nonce string `json:"nonce"`
Key string `json:"key"`
2018-05-18 01:17:52 +00:00
}
type RekeyVerificationStatusResponse struct {
Nonce string `json:"nonce"`
Started bool `json:"started"`
2018-05-18 01:17:52 +00:00
T int `json:"t"`
N int `json:"n"`
Progress int `json:"progress"`
}
type RekeyVerificationUpdateResponse struct {
Nonce string `json:"nonce"`
Complete bool `json:"complete"`
2015-05-28 21:28:50 +00:00
}