2023-03-15 16:00:52 +00:00
// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
2015-03-15 21:42:05 +00:00
package vault
import (
2018-01-08 18:31:38 +00:00
"context"
2017-10-20 14:59:17 +00:00
"crypto/sha256"
"crypto/sha512"
2016-08-15 20:01:15 +00:00
"encoding/base64"
"encoding/hex"
2016-09-29 04:01:28 +00:00
"encoding/json"
2017-11-13 20:31:32 +00:00
"errors"
2015-05-28 17:24:41 +00:00
"fmt"
2017-10-20 14:59:17 +00:00
"hash"
2018-03-27 20:23:33 +00:00
"net/http"
2020-10-29 18:06:07 +00:00
"path"
2018-01-18 00:19:28 +00:00
"path/filepath"
2018-11-07 01:21:24 +00:00
"sort"
2017-10-20 14:59:17 +00:00
"strconv"
2015-03-15 21:42:05 +00:00
"strings"
2016-05-03 18:24:04 +00:00
"sync"
2015-03-16 23:11:55 +00:00
"time"
2020-10-29 18:06:07 +00:00
"unicode"
2015-03-15 21:42:05 +00:00
2018-03-21 19:04:27 +00:00
"github.com/hashicorp/errwrap"
2018-04-03 00:46:59 +00:00
log "github.com/hashicorp/go-hclog"
2022-02-17 21:08:51 +00:00
"github.com/hashicorp/go-memdb"
2020-05-21 20:07:50 +00:00
"github.com/hashicorp/go-multierror"
2021-07-16 00:17:31 +00:00
"github.com/hashicorp/go-secure-stdlib/parseutil"
"github.com/hashicorp/go-secure-stdlib/strutil"
2022-08-25 20:31:42 +00:00
semver "github.com/hashicorp/go-version"
2023-01-16 16:07:18 +00:00
"github.com/hashicorp/vault/helper/experiments"
2019-10-03 16:43:52 +00:00
"github.com/hashicorp/vault/helper/hostutil"
2018-04-23 22:00:02 +00:00
"github.com/hashicorp/vault/helper/identity"
2022-11-28 16:18:36 +00:00
"github.com/hashicorp/vault/helper/logging"
2020-10-13 23:38:21 +00:00
"github.com/hashicorp/vault/helper/metricsutil"
2020-05-21 20:07:50 +00:00
"github.com/hashicorp/vault/helper/monitor"
2018-09-18 03:03:00 +00:00
"github.com/hashicorp/vault/helper/namespace"
2020-06-17 20:24:38 +00:00
"github.com/hashicorp/vault/helper/random"
2022-11-28 16:18:36 +00:00
"github.com/hashicorp/vault/helper/versions"
2019-04-13 07:44:06 +00:00
"github.com/hashicorp/vault/sdk/framework"
"github.com/hashicorp/vault/sdk/helper/consts"
"github.com/hashicorp/vault/sdk/helper/jsonutil"
2022-08-25 20:31:42 +00:00
"github.com/hashicorp/vault/sdk/helper/pluginutil"
2019-04-12 21:54:35 +00:00
"github.com/hashicorp/vault/sdk/helper/wrapping"
"github.com/hashicorp/vault/sdk/logical"
2022-12-07 18:29:51 +00:00
"github.com/hashicorp/vault/version"
2015-08-31 18:27:49 +00:00
"github.com/mitchellh/mapstructure"
2022-11-28 16:18:36 +00:00
"golang.org/x/crypto/sha3"
2015-03-15 21:42:05 +00:00
)
2021-04-08 16:43:39 +00:00
const (
maxBytes = 128 * 1024
globalScope = "global"
)
2019-07-25 01:22:23 +00:00
2018-09-18 03:03:00 +00:00
func systemBackendMemDBSchema ( ) * memdb . DBSchema {
systemSchema := & memdb . DBSchema {
Tables : make ( map [ string ] * memdb . TableSchema ) ,
}
schemas := getSystemSchemas ( )
for _ , schemaFunc := range schemas {
schema := schemaFunc ( )
if _ , ok := systemSchema . Tables [ schema . Name ] ; ok {
panic ( fmt . Sprintf ( "duplicate table name: %s" , schema . Name ) )
2017-02-17 04:23:21 +00:00
}
2018-09-18 03:03:00 +00:00
systemSchema . Tables [ schema . Name ] = schema
2017-02-17 01:13:19 +00:00
}
2018-09-18 03:03:00 +00:00
return systemSchema
}
2015-05-28 17:24:41 +00:00
2022-02-17 21:08:51 +00:00
type PolicyMFABackend struct {
* MFABackend
}
2018-04-03 00:46:59 +00:00
func NewSystemBackend ( core * Core , logger log . Logger ) * SystemBackend {
2018-09-18 03:03:00 +00:00
db , _ := memdb . NewMemDB ( systemBackendMemDBSchema ( ) )
2015-08-27 15:51:35 +00:00
b := & SystemBackend {
2022-02-17 21:08:51 +00:00
Core : core ,
db : db ,
logger : logger ,
mfaBackend : NewPolicyMFABackend ( core , logger ) ,
2015-08-27 15:51:35 +00:00
}
2015-09-04 20:58:12 +00:00
2015-05-16 00:19:32 +00:00
b . Backend = & framework . Backend {
Add plugin version to GRPC interface (#17088)
Add plugin version to GRPC interface
Added a version interface in the sdk/logical so that it can be shared between all plugin types, and then wired it up to RunningVersion in the mounts, auth list, and database systems.
I've tested that this works with auth, database, and secrets plugin types, with the following logic to populate RunningVersion:
If a plugin has a PluginVersion() method implemented, then that is used
If not, and the plugin is built into the Vault binary, then the go.mod version is used
Otherwise, the it will be the empty string.
My apologies for the length of this PR.
* Placeholder backend should be external
We use a placeholder backend (previously a framework.Backend) before a
GRPC plugin is lazy-loaded. This makes us later think the plugin is a
builtin plugin.
So we added a `placeholderBackend` type that overrides the
`IsExternal()` method so that later we know that the plugin is external,
and don't give it a default builtin version.
2022-09-15 23:37:59 +00:00
RunningVersion : versions . DefaultBuiltinVersion ,
Help : strings . TrimSpace ( sysHelpRoot ) ,
2015-04-04 04:00:23 +00:00
2015-03-31 00:46:18 +00:00
PathsSpecial : & logical . Paths {
Root : [ ] string {
"auth/*" ,
"remount" ,
2015-03-31 23:45:00 +00:00
"audit" ,
"audit/*" ,
2017-09-15 04:21:35 +00:00
"raw" ,
2015-04-02 00:44:43 +00:00
"raw/*" ,
2017-02-16 21:29:30 +00:00
"replication/primary/secondary-token" ,
2018-09-18 03:03:00 +00:00
"replication/performance/primary/secondary-token" ,
"replication/dr/primary/secondary-token" ,
2017-02-17 04:36:06 +00:00
"replication/reindex" ,
2018-09-18 03:03:00 +00:00
"replication/dr/reindex" ,
"replication/performance/reindex" ,
2015-05-28 00:53:42 +00:00
"rotate" ,
2017-06-17 05:26:25 +00:00
"config/cors" ,
2017-02-02 19:49:20 +00:00
"config/auditing/*" ,
2018-03-27 20:23:33 +00:00
"config/ui/headers/*" ,
2017-04-24 18:35:32 +00:00
"plugins/catalog/*" ,
2017-05-04 02:03:42 +00:00
"revoke-prefix/*" ,
2017-07-25 15:59:43 +00:00
"revoke-force/*" ,
2017-05-04 02:03:42 +00:00
"leases/revoke-prefix/*" ,
"leases/revoke-force/*" ,
"leases/lookup/*" ,
2020-10-16 18:57:11 +00:00
"storage/raft/snapshot-auto/config/*" ,
2021-06-28 22:51:47 +00:00
"leases" ,
2022-11-04 16:39:09 +00:00
"internal/inspect/*" ,
2015-03-31 00:46:18 +00:00
} ,
2017-01-04 21:44:03 +00:00
Unauthenticated : [ ] string {
2017-07-31 20:16:16 +00:00
"wrapping/lookup" ,
2017-01-04 21:44:03 +00:00
"wrapping/pubkey" ,
2017-02-16 21:29:30 +00:00
"replication/status" ,
2018-11-05 20:24:39 +00:00
"internal/specs/openapi" ,
2018-03-20 03:16:33 +00:00
"internal/ui/mounts" ,
2018-04-23 22:16:10 +00:00
"internal/ui/mounts/*" ,
2018-09-18 03:03:00 +00:00
"internal/ui/namespaces" ,
"replication/performance/status" ,
"replication/dr/status" ,
"replication/dr/secondary/promote" ,
2020-07-01 20:02:14 +00:00
"replication/dr/secondary/disable" ,
"replication/dr/secondary/recover" ,
2018-09-18 03:03:00 +00:00
"replication/dr/secondary/update-primary" ,
"replication/dr/secondary/operation-token/delete" ,
"replication/dr/secondary/license" ,
2021-06-09 21:04:06 +00:00
"replication/dr/secondary/license/signed" ,
"replication/dr/secondary/license/status" ,
"replication/dr/secondary/sys/config/reload/license" ,
2018-09-18 03:03:00 +00:00
"replication/dr/secondary/reindex" ,
2019-06-20 19:14:58 +00:00
"storage/raft/bootstrap/challenge" ,
"storage/raft/bootstrap/answer" ,
2019-04-29 23:42:23 +00:00
"init" ,
"seal-status" ,
"unseal" ,
"leader" ,
"health" ,
"generate-root/attempt" ,
"generate-root/update" ,
"rekey/init" ,
"rekey/update" ,
"rekey/verify" ,
"rekey-recovery-key/init" ,
"rekey-recovery-key/update" ,
"rekey-recovery-key/verify" ,
2022-02-17 21:08:51 +00:00
"mfa/validate" ,
2017-01-04 21:44:03 +00:00
} ,
2016-09-29 04:01:28 +00:00
2018-09-18 03:03:00 +00:00
LocalStorage : [ ] string {
expirationSubPath ,
2020-11-03 03:59:55 +00:00
countersSubPath ,
2018-04-20 18:19:04 +00:00
} ,
2022-02-04 21:06:32 +00:00
SealWrapStorage : [ ] string {
managedKeyRegistrySubPath ,
} ,
2015-03-16 00:35:59 +00:00
} ,
}
2015-09-04 20:58:12 +00:00
2018-09-18 03:03:00 +00:00
b . Backend . Paths = append ( b . Backend . Paths , entPaths ( b ) ... )
b . Backend . Paths = append ( b . Backend . Paths , b . configPaths ( ) ... )
b . Backend . Paths = append ( b . Backend . Paths , b . rekeyPaths ( ) ... )
b . Backend . Paths = append ( b . Backend . Paths , b . sealPaths ( ) ... )
2021-01-20 20:04:24 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . statusPaths ( ) ... )
2018-11-07 17:38:48 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . pluginsCatalogListPaths ( ) ... )
b . Backend . Paths = append ( b . Backend . Paths , b . pluginsCatalogCRUDPath ( ) )
2018-09-18 03:03:00 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . pluginsReloadPath ( ) )
b . Backend . Paths = append ( b . Backend . Paths , b . auditPaths ( ) ... )
b . Backend . Paths = append ( b . Backend . Paths , b . mountPaths ( ) ... )
b . Backend . Paths = append ( b . Backend . Paths , b . authPaths ( ) ... )
2022-12-19 22:24:42 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . lockedUserPaths ( ) ... )
2018-09-18 03:03:00 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . leasePaths ( ) ... )
b . Backend . Paths = append ( b . Backend . Paths , b . policyPaths ( ) ... )
b . Backend . Paths = append ( b . Backend . Paths , b . wrappingPaths ( ) ... )
b . Backend . Paths = append ( b . Backend . Paths , b . toolsPaths ( ) ... )
b . Backend . Paths = append ( b . Backend . Paths , b . capabilitiesPaths ( ) ... )
2018-11-05 20:24:39 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . internalPaths ( ) ... )
2019-09-19 20:44:37 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . pprofPaths ( ) ... )
2022-02-17 20:17:59 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . remountPaths ( ) ... )
2019-02-14 20:46:59 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . metricsPath ( ) )
2020-05-21 20:07:50 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . monitorPath ( ) )
2021-12-08 22:34:42 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . inFlightRequestPath ( ) )
2019-10-03 16:43:52 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . hostInfoPath ( ) )
2020-06-29 22:36:22 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . quotasPaths ( ) ... )
2020-10-29 23:47:34 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . rootActivityPaths ( ) ... )
2022-02-17 21:08:51 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . loginMFAPaths ( ) ... )
2023-01-16 16:07:18 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . experimentPaths ( ) ... )
2022-12-15 20:19:19 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . introspectionPaths ( ) ... )
2017-02-16 21:29:30 +00:00
2017-09-15 04:21:35 +00:00
if core . rawEnabled {
2019-10-15 04:55:31 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . rawPaths ( ) ... )
2017-09-15 04:21:35 +00:00
}
2020-06-29 22:36:22 +00:00
if backend := core . getRaftBackend ( ) ; backend != nil {
2019-06-20 19:14:58 +00:00
b . Backend . Paths = append ( b . Backend . Paths , b . raftStoragePaths ( ) ... )
}
2021-07-08 16:30:01 +00:00
// If the node is in a DR secondary cluster, gate some raft operations by
// the DR operation token.
2020-10-01 19:15:20 +00:00
if core . IsDRSecondary ( ) {
2021-07-08 16:30:01 +00:00
b . Backend . PathsSpecial . Unauthenticated = append ( b . Backend . PathsSpecial . Unauthenticated , "storage/raft/autopilot/configuration" )
b . Backend . PathsSpecial . Unauthenticated = append ( b . Backend . PathsSpecial . Unauthenticated , "storage/raft/autopilot/state" )
2021-01-22 16:50:59 +00:00
b . Backend . PathsSpecial . Unauthenticated = append ( b . Backend . PathsSpecial . Unauthenticated , "storage/raft/configuration" )
2021-07-08 16:30:01 +00:00
b . Backend . PathsSpecial . Unauthenticated = append ( b . Backend . PathsSpecial . Unauthenticated , "storage/raft/remove-peer" )
2020-10-01 19:15:20 +00:00
}
2018-09-18 03:03:00 +00:00
b . Backend . Invalidate = sysInvalidate ( b )
2017-06-17 05:26:25 +00:00
return b
2015-03-16 00:35:59 +00:00
}
2019-10-15 04:55:31 +00:00
func ( b * SystemBackend ) rawPaths ( ) [ ] * framework . Path {
r := & RawBackend {
barrier : b . Core . barrier ,
logger : b . logger ,
checkRaw : func ( path string ) error {
return checkRaw ( b , path )
} ,
}
return rawPaths ( "" , r )
}
2015-03-15 21:42:05 +00:00
// SystemBackend implements logical.Backend and is used to interact with
// the core of the system. This backend is hardcoded to exist at the "sys"
// prefix. Conceptually it is similar to procfs on Linux.
2015-03-15 21:54:49 +00:00
type SystemBackend struct {
2017-06-17 05:26:25 +00:00
* framework . Backend
2022-02-17 21:08:51 +00:00
Core * Core
db * memdb . MemDB
logger log . Logger
mfaBackend * PolicyMFABackend
2015-03-15 21:42:05 +00:00
}
2019-10-08 17:57:15 +00:00
// handleConfigStateSanitized returns the current configuration state. The configuration
// data that it returns is a sanitized version of the combined configuration
// file(s) provided.
func ( b * SystemBackend ) handleConfigStateSanitized ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
config := b . Core . SanitizedConfig ( )
resp := & logical . Response {
Data : config ,
}
return resp , nil
}
2021-06-03 17:30:30 +00:00
// handleConfigReload handles reloading specific pieces of the configuration.
func ( b * SystemBackend ) handleConfigReload ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
subsystem := data . Get ( "subsystem" ) . ( string )
switch subsystem {
case "license" :
return handleLicenseReload ( b ) ( ctx , req , data )
}
return nil , logical . ErrUnsupportedPath
}
2017-06-17 04:04:55 +00:00
// handleCORSRead returns the current CORS configuration
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleCORSRead ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2017-06-17 04:04:55 +00:00
corsConf := b . Core . corsConfig
2017-06-17 05:26:25 +00:00
enabled := corsConf . IsEnabled ( )
resp := & logical . Response {
2017-06-17 04:04:55 +00:00
Data : map [ string ] interface { } {
2017-06-17 05:26:25 +00:00
"enabled" : enabled ,
2017-06-17 04:04:55 +00:00
} ,
2017-06-17 05:26:25 +00:00
}
if enabled {
corsConf . RLock ( )
resp . Data [ "allowed_origins" ] = corsConf . AllowedOrigins
2017-08-07 14:03:30 +00:00
resp . Data [ "allowed_headers" ] = corsConf . AllowedHeaders
2017-06-17 05:26:25 +00:00
corsConf . RUnlock ( )
}
return resp , nil
2017-06-17 04:04:55 +00:00
}
2017-06-17 05:26:25 +00:00
// handleCORSUpdate sets the list of origins that are allowed to make
// cross-origin requests and sets the CORS enabled flag to true
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleCORSUpdate ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2017-06-17 04:04:55 +00:00
origins := d . Get ( "allowed_origins" ) . ( [ ] string )
2017-08-07 14:03:30 +00:00
headers := d . Get ( "allowed_headers" ) . ( [ ] string )
2017-06-17 04:04:55 +00:00
2018-01-19 06:44:44 +00:00
return nil , b . Core . corsConfig . Enable ( ctx , origins , headers )
2017-06-17 04:04:55 +00:00
}
2017-08-07 14:03:30 +00:00
// handleCORSDelete sets the CORS enabled flag to false and clears the list of
// allowed origins & headers.
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleCORSDelete ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2018-01-19 06:44:44 +00:00
return nil , b . Core . corsConfig . Disable ( ctx )
2017-06-17 04:04:55 +00:00
}
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleTidyLeases ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2018-09-18 03:03:00 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
2018-06-16 22:21:33 +00:00
go func ( ) {
2018-09-18 03:03:00 +00:00
tidyCtx := namespace . ContextWithNamespace ( b . Core . activeContext , ns )
err := b . Core . expiration . Tidy ( tidyCtx )
2018-06-16 22:21:33 +00:00
if err != nil {
b . Backend . Logger ( ) . Error ( "failed to tidy leases" , "error" , err )
return
}
} ( )
resp := & logical . Response { }
resp . AddWarning ( "Tidy operation successfully started. Any information from the operation will be printed to Vault's server logs." )
2018-07-11 19:45:09 +00:00
return logical . RespondWithStatusCode ( resp , req , http . StatusAccepted )
2017-03-07 20:22:21 +00:00
}
2021-06-02 16:11:30 +00:00
func ( b * SystemBackend ) handleLeaseCount ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
typeRaw , ok := d . GetOk ( "type" )
if ! ok || strings . ToLower ( typeRaw . ( string ) ) != "irrevocable" {
return nil , nil
}
includeChildNamespacesRaw , ok := d . GetOk ( "include_child_namespaces" )
includeChildNamespaces := ok && includeChildNamespacesRaw . ( bool )
resp , err := b . Core . expiration . getIrrevocableLeaseCounts ( ctx , includeChildNamespaces )
if err != nil {
return nil , err
}
return & logical . Response {
Data : resp ,
} , nil
}
func processLimit ( d * framework . FieldData ) ( bool , int , error ) {
limitStr := ""
limitRaw , ok := d . GetOk ( "limit" )
if ok {
limitStr = limitRaw . ( string )
}
includeAll := false
maxResults := MaxIrrevocableLeasesToReturn
if limitStr == "" {
// use the defaults
} else if strings . ToLower ( limitStr ) == "none" {
includeAll = true
} else {
// not having a valid, positive int here is an error
limit , err := strconv . Atoi ( limitStr )
if err != nil {
return false , 0 , fmt . Errorf ( "invalid 'limit' provided: %w" , err )
}
if limit < 1 {
return false , 0 , fmt . Errorf ( "limit must be 'none' or a positive integer" )
}
maxResults = limit
}
return includeAll , maxResults , nil
}
func ( b * SystemBackend ) handleLeaseList ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
typeRaw , ok := d . GetOk ( "type" )
if ! ok || strings . ToLower ( typeRaw . ( string ) ) != "irrevocable" {
return nil , nil
}
includeChildNamespacesRaw , ok := d . GetOk ( "include_child_namespaces" )
includeChildNamespaces := ok && includeChildNamespacesRaw . ( bool )
includeAll , maxResults , err := processLimit ( d )
if err != nil {
return nil , err
}
leases , warning , err := b . Core . expiration . listIrrevocableLeases ( ctx , includeChildNamespaces , includeAll , maxResults )
if err != nil {
return nil , err
}
resp := & logical . Response {
Data : leases ,
}
if warning != "" {
resp . AddWarning ( warning )
}
return resp , nil
}
2018-11-07 01:21:24 +00:00
func ( b * SystemBackend ) handlePluginCatalogTypedList ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
pluginType , err := consts . ParsePluginType ( d . Get ( "type" ) . ( string ) )
2017-04-12 16:40:54 +00:00
if err != nil {
return nil , err
}
2018-11-07 01:21:24 +00:00
plugins , err := b . Core . pluginCatalog . List ( ctx , pluginType )
if err != nil {
return nil , err
}
2022-08-25 20:31:42 +00:00
sort . Strings ( plugins )
2017-04-24 17:30:33 +00:00
return logical . ListResponse ( plugins ) , nil
2017-04-12 16:40:54 +00:00
}
2022-08-25 20:31:42 +00:00
func ( b * SystemBackend ) handlePluginCatalogUntypedList ( ctx context . Context , _ * logical . Request , _ * framework . FieldData ) ( * logical . Response , error ) {
data := make ( map [ string ] interface { } )
var versionedPlugins [ ] pluginutil . VersionedPlugin
2018-11-07 01:21:24 +00:00
for _ , pluginType := range consts . PluginTypes {
plugins , err := b . Core . pluginCatalog . List ( ctx , pluginType )
if err != nil {
return nil , err
}
if len ( plugins ) > 0 {
sort . Strings ( plugins )
2022-08-25 20:31:42 +00:00
data [ pluginType . String ( ) ] = plugins
2018-11-07 01:21:24 +00:00
}
2022-08-25 20:31:42 +00:00
versioned , err := b . Core . pluginCatalog . ListVersionedPlugins ( ctx , pluginType )
if err != nil {
return nil , err
}
// Sort for consistent ordering
2022-09-29 17:22:33 +00:00
sortVersionedPlugins ( versioned )
2022-08-25 20:31:42 +00:00
versionedPlugins = append ( versionedPlugins , versioned ... )
}
if len ( versionedPlugins ) != 0 {
2022-12-01 10:44:44 +00:00
// Audit logging uses reflection to HMAC the values of all fields in the
// response recursively, which panics if it comes across any unexported
// fields. Therefore, we have to rebuild the VersionedPlugin struct as
// a map of primitive types to avoid the panic that would happen when
// audit logging tries to HMAC the contents of the SemanticVersion field.
var detailed [ ] map [ string ] any
for _ , p := range versionedPlugins {
entry := map [ string ] any {
"type" : p . Type ,
"name" : p . Name ,
"version" : p . Version ,
"builtin" : p . Builtin ,
}
if p . SHA256 != "" {
entry [ "sha256" ] = p . SHA256
}
if p . DeprecationStatus != "" {
entry [ "deprecation_status" ] = p . DeprecationStatus
}
detailed = append ( detailed , entry )
}
data [ "detailed" ] = detailed
2018-11-07 01:21:24 +00:00
}
2022-08-25 20:31:42 +00:00
2018-11-07 01:21:24 +00:00
return & logical . Response {
2022-08-25 20:31:42 +00:00
Data : data ,
2018-11-07 01:21:24 +00:00
} , nil
}
2022-08-25 20:31:42 +00:00
func sortVersionedPlugins ( versionedPlugins [ ] pluginutil . VersionedPlugin ) {
sort . SliceStable ( versionedPlugins , func ( i , j int ) bool {
left , right := versionedPlugins [ i ] , versionedPlugins [ j ]
if left . Type != right . Type {
return left . Type < right . Type
}
if left . Name != right . Name {
return left . Name < right . Name
}
if left . Version != right . Version {
return right . SemanticVersion . GreaterThan ( left . SemanticVersion )
}
return false
} )
}
func ( b * SystemBackend ) handlePluginCatalogUpdate ( ctx context . Context , _ * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2017-04-04 00:52:29 +00:00
pluginName := d . Get ( "name" ) . ( string )
if pluginName == "" {
return logical . ErrorResponse ( "missing plugin name" ) , nil
}
2018-11-07 01:21:24 +00:00
pluginTypeStr := d . Get ( "type" ) . ( string )
if pluginTypeStr == "" {
// If the plugin type is not provided, list it as unknown so that we
// add it to the catalog and UpdatePlugins later will sort it.
pluginTypeStr = "unknown"
}
pluginType , err := consts . ParsePluginType ( pluginTypeStr )
if err != nil {
return nil , err
}
2022-10-07 14:28:15 +00:00
pluginVersion , builtin , err := getVersion ( d )
2022-08-25 20:31:42 +00:00
if err != nil {
return logical . ErrorResponse ( err . Error ( ) ) , nil
}
2022-10-07 14:28:15 +00:00
if builtin {
return logical . ErrorResponse ( "version %q is not allowed because 'builtin' is a reserved metadata identifier" , pluginVersion ) , nil
}
2022-08-25 20:31:42 +00:00
2017-08-16 15:17:50 +00:00
sha256 := d . Get ( "sha256" ) . ( string )
2017-04-04 00:52:29 +00:00
if sha256 == "" {
2017-08-16 15:17:50 +00:00
sha256 = d . Get ( "sha_256" ) . ( string )
if sha256 == "" {
return logical . ErrorResponse ( "missing SHA-256 value" ) , nil
}
2017-04-04 00:52:29 +00:00
}
command := d . Get ( "command" ) . ( string )
if command == "" {
return logical . ErrorResponse ( "missing command value" ) , nil
}
2022-04-04 16:45:41 +00:00
if err = b . Core . CheckPluginPerms ( command ) ; err != nil {
return nil , err
}
2018-09-20 17:50:29 +00:00
// For backwards compatibility, also accept args as part of command. Don't
2018-01-18 00:19:28 +00:00
// accepts args in both command and args.
args := d . Get ( "args" ) . ( [ ] string )
parts := strings . Split ( command , " " )
if len ( parts ) <= 0 {
return logical . ErrorResponse ( "missing command value" ) , nil
} else if len ( parts ) > 1 && len ( args ) > 0 {
2018-03-20 18:54:10 +00:00
return logical . ErrorResponse ( "must not specify args in command and args field" ) , nil
2018-01-18 00:19:28 +00:00
} else if len ( parts ) > 1 {
args = parts [ 1 : ]
}
2018-09-20 17:50:29 +00:00
env := d . Get ( "env" ) . ( [ ] string )
2017-04-04 00:52:29 +00:00
sha256Bytes , err := hex . DecodeString ( sha256 )
if err != nil {
return logical . ErrorResponse ( "Could not decode SHA-256 value from Hex" ) , err
}
2022-08-25 20:31:42 +00:00
err = b . Core . pluginCatalog . Set ( ctx , pluginName , pluginType , pluginVersion , parts [ 0 ] , args , env , sha256Bytes )
2017-04-04 00:52:29 +00:00
if err != nil {
2022-09-21 19:25:04 +00:00
if errors . Is ( err , ErrPluginNotFound ) || strings . HasPrefix ( err . Error ( ) , "plugin version mismatch" ) {
return logical . ErrorResponse ( err . Error ( ) ) , nil
}
2017-04-04 00:52:29 +00:00
return nil , err
}
return nil , nil
}
2022-08-25 20:31:42 +00:00
func ( b * SystemBackend ) handlePluginCatalogRead ( ctx context . Context , _ * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2017-04-04 00:52:29 +00:00
pluginName := d . Get ( "name" ) . ( string )
if pluginName == "" {
return logical . ErrorResponse ( "missing plugin name" ) , nil
}
2018-11-07 01:21:24 +00:00
2018-11-15 22:33:11 +00:00
pluginTypeStr := d . Get ( "type" ) . ( string )
if pluginTypeStr == "" {
// If the plugin type is not provided (i.e. the old
// sys/plugins/catalog/:name endpoint is being requested) short-circuit here
// and return a warning
resp := & logical . Response { }
resp . AddWarning ( fmt . Sprintf ( "Deprecated API endpoint, cannot read plugin information from catalog for %q" , pluginName ) )
return resp , nil
}
pluginType , err := consts . ParsePluginType ( pluginTypeStr )
2018-11-07 01:21:24 +00:00
if err != nil {
return nil , err
}
2022-10-07 14:28:15 +00:00
pluginVersion , _ , err := getVersion ( d )
2022-08-25 20:31:42 +00:00
if err != nil {
return logical . ErrorResponse ( err . Error ( ) ) , nil
}
plugin , err := b . Core . pluginCatalog . Get ( ctx , pluginName , pluginType , pluginVersion )
2017-04-04 00:52:29 +00:00
if err != nil {
return nil , err
}
2017-04-25 01:31:27 +00:00
if plugin == nil {
return nil , nil
}
2017-04-04 00:52:29 +00:00
2018-01-18 00:19:28 +00:00
command := ""
if ! plugin . Builtin {
command , err = filepath . Rel ( b . Core . pluginCatalog . directory , plugin . Command )
if err != nil {
return nil , err
}
}
data := map [ string ] interface { } {
"name" : plugin . Name ,
"args" : plugin . Args ,
"command" : command ,
"sha256" : hex . EncodeToString ( plugin . Sha256 ) ,
"builtin" : plugin . Builtin ,
2022-08-25 20:31:42 +00:00
"version" : plugin . Version ,
2018-01-18 00:19:28 +00:00
}
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
2022-09-09 20:03:07 +00:00
if plugin . Builtin {
status , _ := b . Core . builtinRegistry . DeprecationStatus ( plugin . Name , plugin . Type )
data [ "deprecation_status" ] = status . String ( )
}
2017-04-04 00:52:29 +00:00
return & logical . Response {
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
Data : data ,
2017-04-04 00:52:29 +00:00
} , nil
}
2022-08-25 20:31:42 +00:00
func ( b * SystemBackend ) handlePluginCatalogDelete ( ctx context . Context , _ * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2017-04-04 00:52:29 +00:00
pluginName := d . Get ( "name" ) . ( string )
if pluginName == "" {
return logical . ErrorResponse ( "missing plugin name" ) , nil
}
2018-11-15 22:33:11 +00:00
2022-10-07 14:28:15 +00:00
pluginVersion , builtin , err := getVersion ( d )
2022-08-25 20:31:42 +00:00
if err != nil {
return logical . ErrorResponse ( err . Error ( ) ) , nil
}
2022-10-07 14:28:15 +00:00
if builtin {
return logical . ErrorResponse ( "version %q cannot be deleted" , pluginVersion ) , nil
}
2022-08-25 20:31:42 +00:00
2018-11-15 22:33:11 +00:00
var resp * logical . Response
pluginTypeStr := d . Get ( "type" ) . ( string )
if pluginTypeStr == "" {
// If the plugin type is not provided (i.e. the old
// sys/plugins/catalog/:name endpoint is being requested), set type to
// unknown and let pluginCatalog.Delete proceed. It should handle
// deregistering out of the old storage path (root of core/plugin-catalog)
resp = new ( logical . Response )
resp . AddWarning ( fmt . Sprintf ( "Deprecated API endpoint, cannot deregister plugin from catalog for %q" , pluginName ) )
pluginTypeStr = "unknown"
}
pluginType , err := consts . ParsePluginType ( pluginTypeStr )
2017-04-04 00:52:29 +00:00
if err != nil {
return nil , err
}
2022-08-25 20:31:42 +00:00
if err := b . Core . pluginCatalog . Delete ( ctx , pluginName , pluginType , pluginVersion ) ; err != nil {
2018-11-07 01:21:24 +00:00
return nil , err
}
2017-04-04 00:52:29 +00:00
2018-11-15 22:33:11 +00:00
return resp , nil
2017-04-04 00:52:29 +00:00
}
2022-10-07 14:28:15 +00:00
func getVersion ( d * framework . FieldData ) ( version string , builtin bool , err error ) {
version = d . Get ( "version" ) . ( string )
2022-08-25 20:31:42 +00:00
if version != "" {
semanticVersion , err := semver . NewSemver ( version )
if err != nil {
2022-10-07 14:28:15 +00:00
return "" , false , fmt . Errorf ( "version %q is not a valid semantic version: %w" , version , err )
2022-08-25 20:31:42 +00:00
}
// Canonicalize the version string.
2022-08-31 18:23:05 +00:00
// Add the 'v' back in, since semantic version strips it out, and we want to be consistent with internal plugins.
version = "v" + semanticVersion . String ( )
2022-08-25 20:31:42 +00:00
}
2022-11-23 18:36:25 +00:00
return version , versions . IsBuiltinVersion ( version ) , nil
2022-08-25 20:31:42 +00:00
}
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handlePluginReloadUpdate ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2017-08-08 04:18:59 +00:00
pluginName := d . Get ( "plugin" ) . ( string )
pluginMounts := d . Get ( "mounts" ) . ( [ ] string )
2020-06-30 15:26:52 +00:00
scope := d . Get ( "scope" ) . ( string )
if scope != "" && scope != globalScope {
return logical . ErrorResponse ( "reload scope must be omitted or 'global'" ) , nil
}
2020-06-29 21:58:51 +00:00
2017-08-08 04:18:59 +00:00
if pluginName != "" && len ( pluginMounts ) > 0 {
return logical . ErrorResponse ( "plugin and mounts cannot be set at the same time" ) , nil
}
if pluginName == "" && len ( pluginMounts ) == 0 {
return logical . ErrorResponse ( "plugin or mounts must be provided" ) , nil
}
if pluginName != "" {
2020-06-29 21:58:51 +00:00
err := b . Core . reloadMatchingPlugin ( ctx , pluginName )
2017-08-08 04:18:59 +00:00
if err != nil {
return nil , err
}
} else if len ( pluginMounts ) > 0 {
2020-06-29 21:58:51 +00:00
err := b . Core . reloadMatchingPluginMounts ( ctx , pluginMounts )
2017-08-08 04:18:59 +00:00
if err != nil {
return nil , err
}
2020-06-29 21:23:28 +00:00
}
2020-06-30 15:26:52 +00:00
r := logical . Response {
Data : map [ string ] interface { } {
"reload_id" : req . ID ,
} ,
}
if scope == globalScope {
err := handleGlobalPluginReload ( ctx , b . Core , req . ID , pluginName , pluginMounts )
if err != nil {
return nil , err
}
return logical . RespondWithStatusCode ( & r , req , http . StatusAccepted )
}
return & r , nil
2017-08-08 04:18:59 +00:00
}
2017-02-02 19:49:20 +00:00
// handleAuditedHeaderUpdate creates or overwrites a header entry
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleAuditedHeaderUpdate ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2017-02-02 19:49:20 +00:00
header := d . Get ( "header" ) . ( string )
hmac := d . Get ( "hmac" ) . ( bool )
if header == "" {
return logical . ErrorResponse ( "missing header name" ) , nil
}
headerConfig := b . Core . AuditedHeadersConfig ( )
2018-01-19 06:44:44 +00:00
err := headerConfig . add ( ctx , header , hmac )
2017-02-02 19:49:20 +00:00
if err != nil {
return nil , err
}
return nil , nil
}
2018-03-20 18:54:10 +00:00
// handleAuditedHeaderDelete deletes the header with the given name
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleAuditedHeaderDelete ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2017-02-02 19:49:20 +00:00
header := d . Get ( "header" ) . ( string )
if header == "" {
return logical . ErrorResponse ( "missing header name" ) , nil
}
headerConfig := b . Core . AuditedHeadersConfig ( )
2018-01-19 06:44:44 +00:00
err := headerConfig . remove ( ctx , header )
2017-02-02 19:49:20 +00:00
if err != nil {
return nil , err
}
return nil , nil
}
// handleAuditedHeaderRead returns the header configuration for the given header name
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleAuditedHeaderRead ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2017-02-02 19:49:20 +00:00
header := d . Get ( "header" ) . ( string )
if header == "" {
return logical . ErrorResponse ( "missing header name" ) , nil
}
headerConfig := b . Core . AuditedHeadersConfig ( )
2017-12-18 15:05:51 +00:00
settings , ok := headerConfig . Headers [ strings . ToLower ( header ) ]
2017-02-02 19:49:20 +00:00
if ! ok {
return logical . ErrorResponse ( "Could not find header in config" ) , nil
}
return & logical . Response {
Data : map [ string ] interface { } {
header : settings ,
} ,
} , nil
}
// handleAuditedHeadersRead returns the whole audited headers config
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleAuditedHeadersRead ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2017-02-02 19:49:20 +00:00
headerConfig := b . Core . AuditedHeadersConfig ( )
return & logical . Response {
Data : map [ string ] interface { } {
"headers" : headerConfig . Headers ,
} ,
} , nil
}
2017-06-17 04:04:55 +00:00
// handleCapabilitiesAccessor returns the ACL capabilities of the
2018-03-20 18:54:10 +00:00
// token associated with the given accessor for a given path.
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleCapabilitiesAccessor ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2016-03-17 18:07:55 +00:00
accessor := d . Get ( "accessor" ) . ( string )
if accessor == "" {
2016-03-17 19:39:58 +00:00
return logical . ErrorResponse ( "missing accessor" ) , nil
2016-03-17 18:07:55 +00:00
}
2018-09-18 03:03:00 +00:00
aEntry , err := b . Core . tokenStore . lookupByAccessor ( ctx , accessor , false , false )
2016-03-17 18:07:55 +00:00
if err != nil {
return nil , err
}
2022-01-18 11:56:38 +00:00
if aEntry == nil {
return nil , & logical . StatusBadRequest { Err : "invalid accessor" }
}
2016-03-17 18:07:55 +00:00
2018-03-01 16:14:56 +00:00
d . Raw [ "token" ] = aEntry . TokenID
return b . handleCapabilities ( ctx , req , d )
}
// handleCapabilities returns the ACL capabilities of the token for a given path
func ( b * SystemBackend ) handleCapabilities ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
var token string
if strings . HasSuffix ( req . Path , "capabilities-self" ) {
token = req . ClientToken
} else {
tokenRaw , ok := d . Raw [ "token" ]
if ok {
token , _ = tokenRaw . ( string )
}
}
if token == "" {
return nil , fmt . Errorf ( "no token found" )
2016-03-17 16:55:38 +00:00
}
2016-03-17 18:07:55 +00:00
2018-03-01 16:14:56 +00:00
ret := & logical . Response {
Data : map [ string ] interface { } { } ,
}
paths := d . Get ( "paths" ) . ( [ ] string )
if len ( paths ) == 0 {
// Read from the deprecated field
paths = d . Get ( "path" ) . ( [ ] string )
}
if len ( paths ) == 0 {
return logical . ErrorResponse ( "paths must be supplied" ) , nil
}
for _ , path := range paths {
pathCap , err := b . Core . Capabilities ( ctx , token , path )
if err != nil {
2018-06-19 16:57:19 +00:00
if ! strings . HasSuffix ( req . Path , "capabilities-self" ) && errwrap . Contains ( err , logical . ErrPermissionDenied . Error ( ) ) {
return nil , & logical . StatusBadRequest { Err : "invalid token" }
}
2018-03-01 16:14:56 +00:00
return nil , err
}
ret . Data [ path ] = pathCap
}
// This is only here for backwards compatibility
if len ( paths ) == 1 {
ret . Data [ "capabilities" ] = ret . Data [ paths [ 0 ] ]
}
return ret , nil
2016-03-17 16:55:38 +00:00
}
2015-12-16 21:56:15 +00:00
// handleRekeyRetrieve returns backed-up, PGP-encrypted unseal keys from a
// rekey operation
func ( b * SystemBackend ) handleRekeyRetrieve (
2018-01-19 06:44:44 +00:00
ctx context . Context ,
2016-04-04 14:44:22 +00:00
req * logical . Request ,
data * framework . FieldData ,
2022-05-20 20:49:11 +00:00
recovery bool ,
) ( * logical . Response , error ) {
2018-01-19 06:44:44 +00:00
backup , err := b . Core . RekeyRetrieveBackup ( ctx , recovery )
2015-12-16 21:56:15 +00:00
if err != nil {
2021-05-11 17:12:54 +00:00
return nil , fmt . Errorf ( "unable to look up backed-up keys: %w" , err )
2015-12-16 21:56:15 +00:00
}
if backup == nil {
return logical . ErrorResponse ( "no backed-up keys found" ) , nil
}
2016-08-15 20:01:15 +00:00
keysB64 := map [ string ] [ ] string { }
for k , v := range backup . Keys {
for _ , j := range v {
currB64Keys := keysB64 [ k ]
if currB64Keys == nil {
currB64Keys = [ ] string { }
}
key , err := hex . DecodeString ( j )
if err != nil {
2021-05-11 17:12:54 +00:00
return nil , fmt . Errorf ( "error decoding hex-encoded backup key: %w" , err )
2016-08-15 20:01:15 +00:00
}
currB64Keys = append ( currB64Keys , base64 . StdEncoding . EncodeToString ( key ) )
keysB64 [ k ] = currB64Keys
}
}
2015-12-16 21:56:15 +00:00
// Format the status
resp := & logical . Response {
Data : map [ string ] interface { } {
2016-08-15 20:01:15 +00:00
"nonce" : backup . Nonce ,
"keys" : backup . Keys ,
"keys_base64" : keysB64 ,
2015-12-16 21:56:15 +00:00
} ,
}
return resp , nil
}
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleRekeyRetrieveBarrier ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-01-19 06:44:44 +00:00
return b . handleRekeyRetrieve ( ctx , req , data , false )
2016-04-04 14:44:22 +00:00
}
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleRekeyRetrieveRecovery ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-01-19 06:44:44 +00:00
return b . handleRekeyRetrieve ( ctx , req , data , true )
2016-04-04 14:44:22 +00:00
}
2015-12-16 21:56:15 +00:00
// handleRekeyDelete deletes backed-up, PGP-encrypted unseal keys from a rekey
// operation
func ( b * SystemBackend ) handleRekeyDelete (
2018-01-19 06:44:44 +00:00
ctx context . Context ,
2016-04-04 14:44:22 +00:00
req * logical . Request ,
data * framework . FieldData ,
2022-05-20 20:49:11 +00:00
recovery bool ,
) ( * logical . Response , error ) {
2018-01-19 06:44:44 +00:00
err := b . Core . RekeyDeleteBackup ( ctx , recovery )
2015-12-16 21:56:15 +00:00
if err != nil {
2021-05-11 17:12:54 +00:00
return nil , fmt . Errorf ( "error during deletion of backed-up keys: %w" , err )
2015-12-16 21:56:15 +00:00
}
return nil , nil
}
2016-09-29 04:01:28 +00:00
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleRekeyDeleteBarrier ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-01-19 06:44:44 +00:00
return b . handleRekeyDelete ( ctx , req , data , false )
2016-04-04 14:44:22 +00:00
}
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleRekeyDeleteRecovery ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-01-19 06:44:44 +00:00
return b . handleRekeyDelete ( ctx , req , data , true )
2016-04-04 14:44:22 +00:00
}
2015-12-16 21:56:15 +00:00
2022-08-31 20:11:14 +00:00
func ( b * SystemBackend ) mountInfo ( ctx context . Context , entry * MountEntry ) map [ string ] interface { } {
2018-04-23 22:00:02 +00:00
info := map [ string ] interface { } {
2019-10-17 17:33:00 +00:00
"type" : entry . Type ,
"description" : entry . Description ,
"accessor" : entry . Accessor ,
"local" : entry . Local ,
"seal_wrap" : entry . SealWrap ,
"external_entropy_access" : entry . ExternalEntropyAccess ,
"options" : entry . Options ,
"uuid" : entry . UUID ,
2022-09-20 11:35:50 +00:00
"plugin_version" : entry . Version ,
"running_plugin_version" : entry . RunningVersion ,
"running_sha256" : entry . RunningSha256 ,
2018-04-23 22:00:02 +00:00
}
entryConfig := map [ string ] interface { } {
"default_lease_ttl" : int64 ( entry . Config . DefaultLeaseTTL . Seconds ( ) ) ,
"max_lease_ttl" : int64 ( entry . Config . MaxLeaseTTL . Seconds ( ) ) ,
"force_no_cache" : entry . Config . ForceNoCache ,
}
if rawVal , ok := entry . synthesizedConfigCache . Load ( "audit_non_hmac_request_keys" ) ; ok {
entryConfig [ "audit_non_hmac_request_keys" ] = rawVal . ( [ ] string )
}
if rawVal , ok := entry . synthesizedConfigCache . Load ( "audit_non_hmac_response_keys" ) ; ok {
entryConfig [ "audit_non_hmac_response_keys" ] = rawVal . ( [ ] string )
}
// Even though empty value is valid for ListingVisibility, we can ignore
// this case during mount since there's nothing to unset/hide.
if len ( entry . Config . ListingVisibility ) > 0 {
entryConfig [ "listing_visibility" ] = entry . Config . ListingVisibility
}
if rawVal , ok := entry . synthesizedConfigCache . Load ( "passthrough_request_headers" ) ; ok {
entryConfig [ "passthrough_request_headers" ] = rawVal . ( [ ] string )
}
2019-02-05 21:02:15 +00:00
if rawVal , ok := entry . synthesizedConfigCache . Load ( "allowed_response_headers" ) ; ok {
entryConfig [ "allowed_response_headers" ] = rawVal . ( [ ] string )
}
2021-11-22 01:08:38 +00:00
if rawVal , ok := entry . synthesizedConfigCache . Load ( "allowed_managed_keys" ) ; ok {
entryConfig [ "allowed_managed_keys" ] = rawVal . ( [ ] string )
}
2018-10-15 16:56:24 +00:00
if entry . Table == credentialTableType {
entryConfig [ "token_type" ] = entry . Config . TokenType . String ( )
}
2022-11-01 18:02:07 +00:00
if entry . Config . UserLockoutConfig != nil {
userLockoutConfig := map [ string ] interface { } {
"user_lockout_counter_reset_duration" : int64 ( entry . Config . UserLockoutConfig . LockoutCounterReset . Seconds ( ) ) ,
"user_lockout_threshold" : entry . Config . UserLockoutConfig . LockoutThreshold ,
"user_lockout_duration" : int64 ( entry . Config . UserLockoutConfig . LockoutDuration . Seconds ( ) ) ,
"user_lockout_disable" : entry . Config . UserLockoutConfig . DisableLockout ,
}
entryConfig [ "user_lockout_config" ] = userLockoutConfig
}
2018-04-23 22:00:02 +00:00
2022-08-31 20:11:14 +00:00
// Add deprecation status only if it exists
builtinType := b . Core . builtinTypeFromMountEntry ( ctx , entry )
if status , ok := b . Core . builtinRegistry . DeprecationStatus ( entry . Type , builtinType ) ; ok {
info [ "deprecation_status" ] = status . String ( )
}
2018-04-23 22:00:02 +00:00
info [ "config" ] = entryConfig
return info
}
2015-03-15 21:42:05 +00:00
// handleMountTable handles the "mounts" endpoint to provide the mount table
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleMountTable ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-09-18 03:03:00 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
2015-11-11 16:44:07 +00:00
b . Core . mountsLock . RLock ( )
defer b . Core . mountsLock . RUnlock ( )
2015-03-15 21:42:05 +00:00
resp := & logical . Response {
2015-03-19 22:11:42 +00:00
Data : make ( map [ string ] interface { } ) ,
2015-03-15 21:42:05 +00:00
}
2015-11-11 16:44:07 +00:00
2015-03-15 21:42:05 +00:00
for _ , entry := range b . Core . mounts . Entries {
2018-09-18 03:03:00 +00:00
// Only show entries for current namespace
if entry . Namespace ( ) . Path != ns . Path {
continue
}
cont , err := b . Core . checkReplicatedFiltering ( ctx , entry , "" )
if err != nil {
return nil , err
}
if cont {
continue
}
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
// Populate mount info
2022-08-31 20:11:14 +00:00
info := b . mountInfo ( ctx , entry )
2015-03-15 21:42:05 +00:00
resp . Data [ entry . Path ] = info
}
return resp , nil
}
// handleMount is used to mount a new path
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleMount ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-01-16 18:51:55 +00:00
repState := b . Core . ReplicationState ( )
2017-02-16 21:29:30 +00:00
local := data . Get ( "local" ) . ( bool )
2019-04-11 15:12:37 +00:00
// If we are a performance secondary cluster we should forward the request
// to the primary. We fail early here since the view in use isn't marked as
// readonly
2017-09-04 23:38:37 +00:00
if ! local && repState . HasState ( consts . ReplicationPerformanceSecondary ) {
2019-04-11 15:12:37 +00:00
return nil , logical . ErrReadOnly
2017-02-16 21:29:30 +00:00
}
2015-03-16 00:35:59 +00:00
// Get all the options
path := data . Get ( "path" ) . ( string )
2020-06-29 22:36:22 +00:00
path = sanitizePath ( path )
2018-03-20 03:16:33 +00:00
2015-03-16 00:35:59 +00:00
logicalType := data . Get ( "type" ) . ( string )
description := data . Get ( "description" ) . ( string )
2017-08-31 16:16:59 +00:00
pluginName := data . Get ( "plugin_name" ) . ( string )
2017-11-13 16:22:22 +00:00
sealWrap := data . Get ( "seal_wrap" ) . ( bool )
2019-10-17 17:33:00 +00:00
externalEntropyAccess := data . Get ( "external_entropy_access" ) . ( bool )
2018-03-21 19:04:27 +00:00
options := data . Get ( "options" ) . ( map [ string ] string )
2015-09-01 22:29:30 +00:00
var config MountConfig
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
var apiConfig APIMountConfig
2015-09-25 13:46:20 +00:00
2015-09-01 22:29:30 +00:00
configMap := data . Get ( "config" ) . ( map [ string ] interface { } )
2021-08-09 19:37:03 +00:00
// Augmenting configMap for some config options to treat them as comma separated entries
err := expandStringValsWithCommas ( configMap )
if err != nil {
return logical . ErrorResponse (
"unable to parse given auth config information" ) ,
logical . ErrInvalidRequest
}
2015-09-01 22:29:30 +00:00
if configMap != nil && len ( configMap ) != 0 {
2015-09-25 13:46:20 +00:00
err := mapstructure . Decode ( configMap , & apiConfig )
2015-09-01 22:29:30 +00:00
if err != nil {
2015-08-31 18:27:49 +00:00
return logical . ErrorResponse (
2015-09-01 22:29:30 +00:00
"unable to convert given mount config information" ) ,
2015-08-31 18:27:49 +00:00
logical . ErrInvalidRequest
}
}
2015-03-15 21:42:05 +00:00
2015-09-25 13:46:20 +00:00
switch apiConfig . DefaultLeaseTTL {
case "" :
case "system" :
default :
2017-03-07 16:21:22 +00:00
tmpDef , err := parseutil . ParseDurationSecond ( apiConfig . DefaultLeaseTTL )
2015-09-25 13:46:20 +00:00
if err != nil {
return logical . ErrorResponse ( fmt . Sprintf (
"unable to parse default TTL of %s: %s" , apiConfig . DefaultLeaseTTL , err ) ) ,
logical . ErrInvalidRequest
}
2016-07-11 18:19:35 +00:00
config . DefaultLeaseTTL = tmpDef
2015-09-25 13:46:20 +00:00
}
switch apiConfig . MaxLeaseTTL {
case "" :
case "system" :
default :
2017-03-07 16:21:22 +00:00
tmpMax , err := parseutil . ParseDurationSecond ( apiConfig . MaxLeaseTTL )
2015-09-25 13:46:20 +00:00
if err != nil {
return logical . ErrorResponse ( fmt . Sprintf (
"unable to parse max TTL of %s: %s" , apiConfig . MaxLeaseTTL , err ) ) ,
logical . ErrInvalidRequest
}
2016-07-11 18:19:35 +00:00
config . MaxLeaseTTL = tmpMax
2015-09-25 13:46:20 +00:00
}
if config . MaxLeaseTTL != 0 && config . DefaultLeaseTTL > config . MaxLeaseTTL {
return logical . ErrorResponse (
"given default lease TTL greater than given max lease TTL" ) ,
logical . ErrInvalidRequest
}
2017-10-23 19:35:28 +00:00
if config . DefaultLeaseTTL > b . Core . maxLeaseTTL && config . MaxLeaseTTL == 0 {
2015-09-25 13:46:20 +00:00
return logical . ErrorResponse ( fmt . Sprintf (
"given default lease TTL greater than system max lease TTL of %d" , int ( b . Core . maxLeaseTTL . Seconds ( ) ) ) ) ,
logical . ErrInvalidRequest
}
2017-10-23 19:35:28 +00:00
switch logicalType {
case "" :
return logical . ErrorResponse (
"backend type must be specified as a string" ) ,
logical . ErrInvalidRequest
case "plugin" :
2018-11-19 23:23:48 +00:00
// Only set plugin-name if mount is of type plugin, with apiConfig.PluginName
2017-10-23 19:35:28 +00:00
// option taking precedence.
2017-08-31 16:16:59 +00:00
switch {
2018-11-19 23:23:48 +00:00
case apiConfig . PluginName != "" :
logicalType = apiConfig . PluginName
2017-08-31 16:16:59 +00:00
case pluginName != "" :
2018-11-07 01:21:24 +00:00
logicalType = pluginName
2017-08-31 16:16:59 +00:00
default :
return logical . ErrorResponse (
"plugin_name must be provided for plugin backend" ) ,
logical . ErrInvalidRequest
}
2018-04-10 02:17:37 +00:00
}
2018-04-09 16:39:32 +00:00
2018-04-10 02:17:37 +00:00
switch logicalType {
2018-04-10 04:22:23 +00:00
case "kv" :
case "kv-v1" :
2018-04-09 16:39:32 +00:00
// Alias KV v1
logicalType = "kv"
if options == nil {
options = map [ string ] string { }
}
options [ "version" ] = "1"
case "kv-v2" :
// Alias KV v2
logicalType = "kv"
if options == nil {
options = map [ string ] string { }
}
options [ "version" ] = "2"
2018-04-10 02:17:37 +00:00
default :
if options != nil && options [ "version" ] != "" {
return logical . ErrorResponse ( fmt . Sprintf (
"secrets engine %q does not allow setting a version" , logicalType ) ) ,
logical . ErrInvalidRequest
}
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
}
2022-09-23 20:14:37 +00:00
pluginVersion , resp , err := b . validateVersion ( ctx , apiConfig . PluginVersion , logicalType , consts . PluginTypeSecrets )
if resp != nil || err != nil {
return resp , err
2022-09-22 12:53:52 +00:00
}
2017-03-08 14:20:09 +00:00
// Copy over the force no cache if set
if apiConfig . ForceNoCache {
config . ForceNoCache = true
}
2018-03-20 03:16:33 +00:00
if err := checkListingVisibility ( apiConfig . ListingVisibility ) ; err != nil {
return logical . ErrorResponse ( fmt . Sprintf ( "invalid listing_visibility %s" , apiConfig . ListingVisibility ) ) , nil
}
config . ListingVisibility = apiConfig . ListingVisibility
2018-03-09 19:32:28 +00:00
if len ( apiConfig . AuditNonHMACRequestKeys ) > 0 {
config . AuditNonHMACRequestKeys = apiConfig . AuditNonHMACRequestKeys
}
if len ( apiConfig . AuditNonHMACResponseKeys ) > 0 {
config . AuditNonHMACResponseKeys = apiConfig . AuditNonHMACResponseKeys
}
2018-03-21 23:56:47 +00:00
if len ( apiConfig . PassthroughRequestHeaders ) > 0 {
config . PassthroughRequestHeaders = apiConfig . PassthroughRequestHeaders
}
2019-02-05 21:02:15 +00:00
if len ( apiConfig . AllowedResponseHeaders ) > 0 {
config . AllowedResponseHeaders = apiConfig . AllowedResponseHeaders
}
2021-11-22 01:08:38 +00:00
if len ( apiConfig . AllowedManagedKeys ) > 0 {
config . AllowedManagedKeys = apiConfig . AllowedManagedKeys
}
2018-03-09 19:32:28 +00:00
2015-03-15 21:42:05 +00:00
// Create the mount entry
me := & MountEntry {
2019-10-17 17:33:00 +00:00
Table : mountTableType ,
Path : path ,
Type : logicalType ,
Description : description ,
Config : config ,
Local : local ,
SealWrap : sealWrap ,
ExternalEntropyAccess : externalEntropyAccess ,
Options : options ,
2022-09-23 20:14:37 +00:00
Version : pluginVersion ,
2015-03-15 21:42:05 +00:00
}
2015-09-01 22:29:30 +00:00
2022-12-14 18:06:33 +00:00
if b . Core . isMountEntryBuiltin ( ctx , me , consts . PluginTypeSecrets ) {
resp , err = b . Core . handleDeprecatedMountEntry ( ctx , me , consts . PluginTypeSecrets )
if err != nil {
b . Core . logger . Error ( "could not mount builtin" , "name" , me . Type , "path" , me . Path , "error" , err )
return handleError ( fmt . Errorf ( "could not mount %q: %w" , me . Type , err ) )
}
2022-09-08 13:15:10 +00:00
}
2015-03-15 21:42:05 +00:00
// Attempt mount
2018-01-19 06:44:44 +00:00
if err := b . Core . mount ( ctx , me ) ; err != nil {
2019-10-27 20:30:38 +00:00
b . Backend . Logger ( ) . Error ( "error occurred during enable mount" , "path" , me . Path , "error" , err )
2015-08-10 17:27:25 +00:00
return handleError ( err )
2015-03-15 21:42:05 +00:00
}
2015-08-10 17:27:25 +00:00
2022-09-08 13:15:10 +00:00
return resp , nil
2015-03-15 21:42:05 +00:00
}
2022-09-22 12:53:52 +00:00
func selectPluginVersion ( ctx context . Context , sys logical . SystemView , pluginName string , pluginType consts . PluginType ) ( string , error ) {
unversionedPlugin , err := sys . LookupPlugin ( ctx , pluginName , pluginType )
if err == nil && ! unversionedPlugin . Builtin {
// We'll select the unversioned plugin that's been registered.
return "" , nil
}
// No version provided and no unversioned plugin of that name available.
// Pin to the current latest version if any versioned plugins are registered.
plugins , err := sys . ListVersionedPlugins ( ctx , pluginType )
if err != nil {
return "" , err
}
var versionedCandidates [ ] pluginutil . VersionedPlugin
for _ , plugin := range plugins {
if ! plugin . Builtin && plugin . Name == pluginName && plugin . Version != "" {
versionedCandidates = append ( versionedCandidates , plugin )
}
}
if len ( versionedCandidates ) != 0 {
// Sort in reverse order.
sort . SliceStable ( versionedCandidates , func ( i , j int ) bool {
return versionedCandidates [ i ] . SemanticVersion . GreaterThan ( versionedCandidates [ j ] . SemanticVersion )
} )
return "v" + versionedCandidates [ 0 ] . SemanticVersion . String ( ) , nil
}
return "" , nil
}
2021-11-08 18:32:01 +00:00
func ( b * SystemBackend ) handleReadMount ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
path := data . Get ( "path" ) . ( string )
path = sanitizePath ( path )
entry := b . Core . router . MatchingMountEntry ( ctx , path )
if entry == nil {
return logical . ErrorResponse ( "No secret engine mount at %s" , path ) , nil
}
return & logical . Response {
2022-08-31 20:11:14 +00:00
Data : b . mountInfo ( ctx , entry ) ,
2021-11-08 18:32:01 +00:00
} , nil
}
2015-08-10 17:27:25 +00:00
// used to intercept an HTTPCodedError so it goes back to callee
func handleError (
2022-05-20 20:49:11 +00:00
err error ,
) ( * logical . Response , error ) {
2018-03-18 01:29:17 +00:00
if strings . Contains ( err . Error ( ) , logical . ErrReadOnly . Error ( ) ) {
return logical . ErrorResponse ( err . Error ( ) ) , err
}
switch err . ( type ) {
case logical . HTTPCodedError :
return logical . ErrorResponse ( err . Error ( ) ) , err
default :
return logical . ErrorResponse ( err . Error ( ) ) , logical . ErrInvalidRequest
}
}
// Performs a similar function to handleError, but upon seeing a ReadOnlyError
// will actually strip it out to prevent forwarding
func handleErrorNoReadOnlyForward (
2022-05-20 20:49:11 +00:00
err error ,
) ( * logical . Response , error ) {
2018-03-18 01:29:17 +00:00
if strings . Contains ( err . Error ( ) , logical . ErrReadOnly . Error ( ) ) {
return nil , fmt . Errorf ( "operation could not be completed as storage is read-only" )
}
2015-08-10 17:27:25 +00:00
switch err . ( type ) {
case logical . HTTPCodedError :
return logical . ErrorResponse ( err . Error ( ) ) , err
default :
return logical . ErrorResponse ( err . Error ( ) ) , logical . ErrInvalidRequest
}
}
2015-03-15 21:42:05 +00:00
// handleUnmount is used to unmount a path
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleUnmount ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2017-07-13 17:57:14 +00:00
path := data . Get ( "path" ) . ( string )
2020-06-29 22:36:22 +00:00
path = sanitizePath ( path )
2016-03-03 18:13:47 +00:00
2018-09-18 03:03:00 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
2018-01-16 18:51:55 +00:00
repState := b . Core . ReplicationState ( )
2018-09-18 03:03:00 +00:00
entry := b . Core . router . MatchingMountEntry ( ctx , path )
2019-04-11 15:12:37 +00:00
// If we are a performance secondary cluster we should forward the request
// to the primary. We fail early here since the view in use isn't marked as
// readonly
2017-09-04 23:38:37 +00:00
if entry != nil && ! entry . Local && repState . HasState ( consts . ReplicationPerformanceSecondary ) {
2019-04-11 15:12:37 +00:00
return nil , logical . ErrReadOnly
2017-02-16 21:29:30 +00:00
}
2019-12-03 22:25:09 +00:00
// We return success when the mount does not exist to not expose if the
2017-07-13 17:57:14 +00:00
// mount existed or not
2018-09-18 03:03:00 +00:00
match := b . Core . router . MatchingMount ( ctx , path )
if match == "" || ns . Path + path != match {
2017-07-13 17:57:14 +00:00
return nil , nil
}
2019-10-27 20:30:38 +00:00
_ , found := b . Core . router . MatchingStoragePrefixByAPIPath ( ctx , path )
2018-09-18 03:03:00 +00:00
if ! found {
b . Backend . Logger ( ) . Error ( "unable to find storage for path" , "path" , path )
return handleError ( fmt . Errorf ( "unable to find storage for path: %q" , path ) )
}
2015-03-15 21:42:05 +00:00
// Attempt unmount
2018-01-19 06:44:44 +00:00
if err := b . Core . unmount ( ctx , path ) ; err != nil {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "unmount failed" , "path" , path , "error" , err )
2015-08-10 17:27:25 +00:00
return handleError ( err )
2015-03-15 21:42:05 +00:00
}
2019-10-27 20:30:38 +00:00
// Get the view path if available
var viewPath string
if entry != nil {
viewPath = entry . ViewPath ( )
}
2018-09-18 03:03:00 +00:00
// Remove from filtered mounts
2019-10-27 20:30:38 +00:00
if err := b . Core . removePathFromFilteredPaths ( ctx , ns . Path + path , viewPath ) ; err != nil {
2018-09-18 03:03:00 +00:00
b . Backend . Logger ( ) . Error ( "filtered path removal failed" , path , "error" , err )
return handleError ( err )
}
2015-03-15 21:42:05 +00:00
return nil , nil
}
2020-10-29 18:06:07 +00:00
func validateMountPath ( p string ) error {
2020-10-29 18:31:58 +00:00
hasSuffix := strings . HasSuffix ( p , "/" )
2020-10-29 18:06:07 +00:00
s := path . Clean ( p )
2020-10-29 18:31:58 +00:00
// Retain the trailing slash if it was provided
if hasSuffix {
s = s + "/"
}
2020-10-29 18:06:07 +00:00
if p != s {
return fmt . Errorf ( "path '%v' does not match cleaned path '%v'" , p , s )
}
// Check URL path for non-printable characters
idx := strings . IndexFunc ( p , func ( c rune ) bool {
return ! unicode . IsPrint ( c )
} )
if idx != - 1 {
return errors . New ( "path cannot contain non-printable characters" )
}
return nil
}
2015-03-15 21:42:05 +00:00
// handleRemount is used to remount a path
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleRemount ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-01-16 18:51:55 +00:00
repState := b . Core . ReplicationState ( )
2017-02-16 21:29:30 +00:00
2019-10-27 20:30:38 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
2015-03-15 21:42:05 +00:00
// Get the paths
2015-03-19 22:11:42 +00:00
fromPath := data . Get ( "from" ) . ( string )
toPath := data . Get ( "to" ) . ( string )
2015-03-15 21:42:05 +00:00
if fromPath == "" || toPath == "" {
return logical . ErrorResponse (
"both 'from' and 'to' path must be specified as a string" ) ,
2015-03-15 21:53:41 +00:00
logical . ErrInvalidRequest
2015-03-15 21:42:05 +00:00
}
2015-09-01 22:29:30 +00:00
2023-03-16 19:26:55 +00:00
if strings . HasPrefix ( fromPath , " " ) || strings . HasSuffix ( fromPath , " " ) {
return logical . ErrorResponse ( "'from' path cannot contain trailing whitespace" ) , logical . ErrInvalidRequest
2022-03-15 18:11:23 +00:00
}
2023-03-16 19:26:55 +00:00
if strings . HasPrefix ( toPath , " " ) || strings . HasSuffix ( toPath , " " ) {
return logical . ErrorResponse ( "'to' path cannot contain trailing whitespace" ) , logical . ErrInvalidRequest
2022-03-15 18:11:23 +00:00
}
2022-02-17 20:17:59 +00:00
fromPathDetails := b . Core . splitNamespaceAndMountFromPath ( ns . Path , fromPath )
toPathDetails := b . Core . splitNamespaceAndMountFromPath ( ns . Path , toPath )
if err = validateMountPath ( toPathDetails . MountPath ) ; err != nil {
return handleError ( fmt . Errorf ( "invalid destination mount: %v" , err ) )
}
2022-02-18 16:04:21 +00:00
// Check that target is a valid auth mount, if source is an auth mount
if strings . HasPrefix ( fromPathDetails . MountPath , credentialRoutePrefix ) {
if ! strings . HasPrefix ( toPathDetails . MountPath , credentialRoutePrefix ) {
return handleError ( fmt . Errorf ( "cannot remount auth mount to non-auth mount %q" , toPathDetails . MountPath ) )
2022-02-17 20:17:59 +00:00
}
2022-02-18 16:04:21 +00:00
// Prevent target and source auth mounts from being in a protected path
for _ , auth := range protectedAuths {
if strings . HasPrefix ( fromPathDetails . MountPath , auth ) {
return handleError ( fmt . Errorf ( "cannot remount %q" , fromPathDetails . MountPath ) )
}
}
for _ , auth := range protectedAuths {
if strings . HasPrefix ( toPathDetails . MountPath , auth ) {
return handleError ( fmt . Errorf ( "cannot remount to destination %q" , toPathDetails . MountPath ) )
}
}
} else {
// Prevent target and source non-auth mounts from being in a protected path
for _ , p := range protectedMounts {
if strings . HasPrefix ( fromPathDetails . MountPath , p ) {
return handleError ( fmt . Errorf ( "cannot remount %q" , fromPathDetails . MountPath ) )
}
2022-02-17 20:17:59 +00:00
2022-02-18 16:04:21 +00:00
if strings . HasPrefix ( toPathDetails . MountPath , p ) {
return handleError ( fmt . Errorf ( "cannot remount to destination %+v" , toPathDetails . MountPath ) )
}
2022-02-17 20:17:59 +00:00
}
}
entry := b . Core . router . MatchingMountEntry ( ctx , sanitizePath ( fromPath ) )
if entry == nil {
return handleError ( fmt . Errorf ( "no matching mount at %q" , sanitizePath ( fromPath ) ) )
2020-10-29 18:06:07 +00:00
}
2022-02-18 16:04:21 +00:00
if match := b . Core . router . MountConflict ( ctx , sanitizePath ( toPath ) ) ; match != "" {
return handleError ( fmt . Errorf ( "path already in use at %q" , match ) )
2022-02-17 20:17:59 +00:00
}
2022-02-18 16:04:21 +00:00
2019-04-11 15:12:37 +00:00
// If we are a performance secondary cluster we should forward the request
// to the primary. We fail early here since the view in use isn't marked as
// readonly
2017-09-04 23:38:37 +00:00
if entry != nil && ! entry . Local && repState . HasState ( consts . ReplicationPerformanceSecondary ) {
2019-04-11 15:12:37 +00:00
return nil , logical . ErrReadOnly
2017-02-16 21:29:30 +00:00
}
2022-02-17 20:17:59 +00:00
migrationID , err := b . Core . createMigrationStatus ( fromPathDetails , toPathDetails )
if err != nil {
return nil , fmt . Errorf ( "Error creating migration status %+v" , err )
}
// Start up a goroutine to handle the remount operations, and return early to the caller
go func ( migrationID string ) {
b . Core . stateLock . RLock ( )
defer b . Core . stateLock . RUnlock ( )
logger := b . Core . Logger ( ) . Named ( "mounts.migration" ) . With ( "migration_id" , migrationID , "namespace" , ns . Path , "to_path" , toPath , "from_path" , fromPath )
2022-02-18 16:04:21 +00:00
err := b . moveMount ( ns , logger , migrationID , entry , fromPathDetails , toPathDetails )
2022-02-17 20:17:59 +00:00
if err != nil {
logger . Error ( "remount failed" , "error" , err )
if err := b . Core . setMigrationStatus ( migrationID , MigrationFailureStatus ) ; err != nil {
logger . Error ( "Setting migration status failed" , "error" , err , "target_status" , MigrationFailureStatus )
}
}
} ( migrationID )
resp := & logical . Response {
Data : map [ string ] interface { } {
"migration_id" : migrationID ,
} ,
}
resp . AddWarning ( "Mount move has been queued. Progress will be reported in Vault's server log, tagged with the returned migration_id" )
return resp , nil
}
2022-02-18 16:04:21 +00:00
// moveMount carries out a remount operation on the secrets engine or auth method, updating the migration status as required
2022-02-17 20:17:59 +00:00
// It is expected to be called asynchronously outside of a request context, hence it creates a context derived from the active one
// and intermittently checks to see if it is still open.
2022-02-18 16:04:21 +00:00
func ( b * SystemBackend ) moveMount ( ns * namespace . Namespace , logger log . Logger , migrationID string , entry * MountEntry , fromPathDetails , toPathDetails namespace . MountPathDetails ) error {
2022-02-17 20:17:59 +00:00
logger . Info ( "Starting to update the mount table and revoke leases" )
revokeCtx := namespace . ContextWithNamespace ( b . Core . activeContext , ns )
2022-02-18 16:04:21 +00:00
var err error
2015-09-02 19:56:58 +00:00
// Attempt remount
2022-02-18 16:04:21 +00:00
switch entry . Table {
case credentialTableType :
err = b . Core . remountCredential ( revokeCtx , fromPathDetails , toPathDetails , ! b . Core . perfStandby )
case mountTableType :
err = b . Core . remountSecretsEngine ( revokeCtx , fromPathDetails , toPathDetails , ! b . Core . perfStandby )
default :
return fmt . Errorf ( "cannot remount mount of table %q" , entry . Table )
}
if err != nil {
2022-02-17 20:17:59 +00:00
return err
2015-09-02 19:56:58 +00:00
}
2022-02-17 20:17:59 +00:00
if err := revokeCtx . Err ( ) ; err != nil {
return err
2019-10-27 20:30:38 +00:00
}
2022-02-17 20:17:59 +00:00
logger . Info ( "Removing the source mount from filtered paths on secondaries" )
2019-10-27 20:30:38 +00:00
// Remove from filtered mounts and restart evaluation process
2022-02-18 16:04:21 +00:00
if err := b . Core . removePathFromFilteredPaths ( revokeCtx , fromPathDetails . GetFullPath ( ) , entry . ViewPath ( ) ) ; err != nil {
2022-02-17 20:17:59 +00:00
return err
2020-06-29 22:36:22 +00:00
}
2022-02-17 20:17:59 +00:00
if err := revokeCtx . Err ( ) ; err != nil {
return err
2022-02-16 19:21:42 +00:00
}
2022-02-17 20:17:59 +00:00
logger . Info ( "Updating quotas associated with the source mount" )
// Update quotas with the new path and namespace
if err := b . Core . quotaManager . HandleRemount ( revokeCtx , fromPathDetails , toPathDetails ) ; err != nil {
return err
}
if err := b . Core . setMigrationStatus ( migrationID , MigrationSuccessStatus ) ; err != nil {
return err
}
logger . Info ( "Completed mount move operations" )
return nil
2015-09-02 19:56:58 +00:00
}
2016-06-15 16:35:30 +00:00
// handleAuthTuneRead is used to get config settings on a auth path
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleAuthTuneRead ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2016-06-15 16:35:30 +00:00
path := data . Get ( "path" ) . ( string )
if path == "" {
return logical . ErrorResponse (
"path must be specified as a string" ) ,
logical . ErrInvalidRequest
}
2018-09-18 03:03:00 +00:00
return b . handleTuneReadCommon ( ctx , "auth/" + path )
2016-06-15 16:35:30 +00:00
}
2022-02-17 20:17:59 +00:00
func ( b * SystemBackend ) handleRemountStatusCheck ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
repState := b . Core . ReplicationState ( )
migrationID := data . Get ( "migration_id" ) . ( string )
if migrationID == "" {
return logical . ErrorResponse (
"migrationID must be specified" ) ,
logical . ErrInvalidRequest
}
migrationInfo := b . Core . readMigrationStatus ( migrationID )
if migrationInfo == nil {
// If the migration info is not found and this is a perf secondary
// forward the request to the primary cluster
if repState . HasState ( consts . ReplicationPerformanceSecondary ) {
return nil , logical . ErrReadOnly
}
return nil , nil
}
resp := & logical . Response {
Data : map [ string ] interface { } {
"migration_id" : migrationID ,
"migration_info" : migrationInfo ,
} ,
}
return resp , nil
}
2015-10-10 00:00:17 +00:00
// handleMountTuneRead is used to get config settings on a backend
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleMountTuneRead ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2015-09-02 19:56:58 +00:00
path := data . Get ( "path" ) . ( string )
if path == "" {
return logical . ErrorResponse (
"path must be specified as a string" ) ,
logical . ErrInvalidRequest
}
2017-09-13 01:48:52 +00:00
// This call will read both logical backend's configuration as well as auth methods'.
2016-06-15 16:35:30 +00:00
// Retaining this behavior for backward compatibility. If this behavior is not desired,
// an error can be returned if path has a prefix of "auth/".
2018-09-18 03:03:00 +00:00
return b . handleTuneReadCommon ( ctx , path )
2016-06-15 16:35:30 +00:00
}
// handleTuneReadCommon returns the config settings of a path
2018-09-18 03:03:00 +00:00
func ( b * SystemBackend ) handleTuneReadCommon ( ctx context . Context , path string ) ( * logical . Response , error ) {
2020-06-29 22:36:22 +00:00
path = sanitizePath ( path )
2015-09-04 20:58:12 +00:00
2018-09-18 03:03:00 +00:00
sysView := b . Core . router . MatchingSystemView ( ctx , path )
2015-09-04 20:58:12 +00:00
if sysView == nil {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "cannot fetch sysview" , "path" , path )
2018-09-18 03:03:00 +00:00
return handleError ( fmt . Errorf ( "cannot fetch sysview for path %q" , path ) )
2015-09-04 20:58:12 +00:00
}
2018-09-18 03:03:00 +00:00
mountEntry := b . Core . router . MatchingMountEntry ( ctx , path )
2017-03-08 14:20:09 +00:00
if mountEntry == nil {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "cannot fetch mount entry" , "path" , path )
2018-09-18 03:03:00 +00:00
return handleError ( fmt . Errorf ( "cannot fetch mount entry for path %q" , path ) )
2017-03-08 14:20:09 +00:00
}
2015-09-02 19:56:58 +00:00
resp := & logical . Response {
Data : map [ string ] interface { } {
2020-02-15 18:32:47 +00:00
"description" : mountEntry . Description ,
2015-09-25 13:46:20 +00:00
"default_lease_ttl" : int ( sysView . DefaultLeaseTTL ( ) . Seconds ( ) ) ,
"max_lease_ttl" : int ( sysView . MaxLeaseTTL ( ) . Seconds ( ) ) ,
2017-03-08 14:20:09 +00:00
"force_no_cache" : mountEntry . Config . ForceNoCache ,
2015-09-02 19:56:58 +00:00
} ,
}
2019-10-17 17:33:00 +00:00
// not tunable so doesn't need to be stored/loaded through synthesizedConfigCache
if mountEntry . ExternalEntropyAccess {
resp . Data [ "external_entropy_access" ] = true
}
2018-10-15 16:56:24 +00:00
if mountEntry . Table == credentialTableType {
resp . Data [ "token_type" ] = mountEntry . Config . TokenType . String ( )
}
2018-03-02 17:18:39 +00:00
if rawVal , ok := mountEntry . synthesizedConfigCache . Load ( "audit_non_hmac_request_keys" ) ; ok {
resp . Data [ "audit_non_hmac_request_keys" ] = rawVal . ( [ ] string )
}
if rawVal , ok := mountEntry . synthesizedConfigCache . Load ( "audit_non_hmac_response_keys" ) ; ok {
resp . Data [ "audit_non_hmac_response_keys" ] = rawVal . ( [ ] string )
}
2018-03-20 03:16:33 +00:00
if len ( mountEntry . Config . ListingVisibility ) > 0 {
resp . Data [ "listing_visibility" ] = mountEntry . Config . ListingVisibility
}
2018-03-21 23:56:47 +00:00
if rawVal , ok := mountEntry . synthesizedConfigCache . Load ( "passthrough_request_headers" ) ; ok {
resp . Data [ "passthrough_request_headers" ] = rawVal . ( [ ] string )
}
2019-02-05 21:02:15 +00:00
if rawVal , ok := mountEntry . synthesizedConfigCache . Load ( "allowed_response_headers" ) ; ok {
resp . Data [ "allowed_response_headers" ] = rawVal . ( [ ] string )
}
2021-11-22 01:08:38 +00:00
if rawVal , ok := mountEntry . synthesizedConfigCache . Load ( "allowed_managed_keys" ) ; ok {
resp . Data [ "allowed_managed_keys" ] = rawVal . ( [ ] string )
}
2022-11-01 18:02:07 +00:00
if mountEntry . Config . UserLockoutConfig != nil {
resp . Data [ "user_lockout_counter_reset_duration" ] = int64 ( mountEntry . Config . UserLockoutConfig . LockoutCounterReset . Seconds ( ) )
resp . Data [ "user_lockout_threshold" ] = mountEntry . Config . UserLockoutConfig . LockoutThreshold
resp . Data [ "user_lockout_duration" ] = int64 ( mountEntry . Config . UserLockoutConfig . LockoutDuration . Seconds ( ) )
resp . Data [ "user_lockout_disable" ] = mountEntry . Config . UserLockoutConfig . DisableLockout
}
2018-03-21 19:04:27 +00:00
if len ( mountEntry . Options ) > 0 {
resp . Data [ "options" ] = mountEntry . Options
}
2022-09-22 12:53:52 +00:00
if mountEntry . Version != "" {
resp . Data [ "plugin_version" ] = mountEntry . Version
}
2015-09-02 19:56:58 +00:00
return resp , nil
}
2016-06-15 16:35:30 +00:00
// handleAuthTuneWrite is used to set config settings on an auth path
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleAuthTuneWrite ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2016-06-15 16:35:30 +00:00
path := data . Get ( "path" ) . ( string )
if path == "" {
2018-09-18 03:03:00 +00:00
return logical . ErrorResponse ( "missing path" ) , nil
2016-06-15 16:35:30 +00:00
}
2018-09-18 03:03:00 +00:00
2018-11-13 04:02:02 +00:00
return b . handleTuneWriteCommon ( ctx , "auth/" + path , data )
2016-06-15 16:35:30 +00:00
}
2015-10-10 00:00:17 +00:00
// handleMountTuneWrite is used to set config settings on a backend
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleMountTuneWrite ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2015-09-02 19:56:58 +00:00
path := data . Get ( "path" ) . ( string )
if path == "" {
2018-09-18 03:03:00 +00:00
return logical . ErrorResponse ( "missing path" ) , nil
2015-09-02 19:56:58 +00:00
}
2018-09-18 03:03:00 +00:00
2017-09-13 01:48:52 +00:00
// This call will write both logical backend's configuration as well as auth methods'.
2016-06-15 16:35:30 +00:00
// Retaining this behavior for backward compatibility. If this behavior is not desired,
// an error can be returned if path has a prefix of "auth/".
2018-01-19 06:44:44 +00:00
return b . handleTuneWriteCommon ( ctx , path , data )
2016-06-15 16:35:30 +00:00
}
2015-09-02 19:56:58 +00:00
2016-06-15 16:35:30 +00:00
// handleTuneWriteCommon is used to set config settings on a path
2018-01-19 06:44:44 +00:00
func ( b * SystemBackend ) handleTuneWriteCommon ( ctx context . Context , path string , data * framework . FieldData ) ( * logical . Response , error ) {
2018-01-16 18:51:55 +00:00
repState := b . Core . ReplicationState ( )
2017-02-16 21:29:30 +00:00
2020-06-29 22:36:22 +00:00
path = sanitizePath ( path )
2015-09-04 20:58:12 +00:00
2015-09-09 19:24:45 +00:00
// Prevent protected paths from being changed
2015-09-19 15:50:50 +00:00
for _ , p := range untunableMounts {
2015-09-09 19:24:45 +00:00
if strings . HasPrefix ( path , p ) {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "cannot tune this mount" , "path" , path )
2018-04-05 15:49:21 +00:00
return handleError ( fmt . Errorf ( "cannot tune %q" , path ) )
2015-09-09 19:24:45 +00:00
}
2015-08-31 18:27:49 +00:00
}
2015-03-15 21:42:05 +00:00
2018-09-18 03:03:00 +00:00
mountEntry := b . Core . router . MatchingMountEntry ( ctx , path )
2015-09-09 19:24:45 +00:00
if mountEntry == nil {
2018-10-09 16:43:17 +00:00
b . Backend . Logger ( ) . Error ( "tune failed" , "error" , "no mount entry found" , "path" , path )
2018-04-05 15:49:21 +00:00
return handleError ( fmt . Errorf ( "tune of path %q failed: no mount entry found" , path ) )
2015-09-02 19:56:58 +00:00
}
2017-09-04 23:38:37 +00:00
if mountEntry != nil && ! mountEntry . Local && repState . HasState ( consts . ReplicationPerformanceSecondary ) {
2019-04-11 15:12:37 +00:00
return nil , logical . ErrReadOnly
2017-02-16 21:29:30 +00:00
}
2015-09-03 12:54:59 +00:00
2016-05-03 18:24:04 +00:00
var lock * sync . RWMutex
switch {
2017-10-23 19:35:28 +00:00
case strings . HasPrefix ( path , credentialRoutePrefix ) :
2016-05-03 18:24:04 +00:00
lock = & b . Core . authLock
default :
lock = & b . Core . mountsLock
}
2017-09-05 14:57:25 +00:00
lock . Lock ( )
defer lock . Unlock ( )
// Check again after grabbing the lock
2018-09-18 03:03:00 +00:00
mountEntry = b . Core . router . MatchingMountEntry ( ctx , path )
2017-09-05 14:57:25 +00:00
if mountEntry == nil {
2018-10-09 16:43:17 +00:00
b . Backend . Logger ( ) . Error ( "tune failed" , "error" , "no mount entry found" , "path" , path )
2018-04-05 15:49:21 +00:00
return handleError ( fmt . Errorf ( "tune of path %q failed: no mount entry found" , path ) )
2017-09-05 14:57:25 +00:00
}
if mountEntry != nil && ! mountEntry . Local && repState . HasState ( consts . ReplicationPerformanceSecondary ) {
2019-04-11 15:12:37 +00:00
return nil , logical . ErrReadOnly
2017-09-05 14:57:25 +00:00
}
2015-09-09 19:24:45 +00:00
// Timing configuration parameters
{
2017-09-05 14:57:25 +00:00
var newDefault , newMax time . Duration
2015-09-25 13:46:20 +00:00
defTTL := data . Get ( "default_lease_ttl" ) . ( string )
switch defTTL {
case "" :
2017-09-05 14:57:25 +00:00
newDefault = mountEntry . Config . DefaultLeaseTTL
2015-09-25 13:46:20 +00:00
case "system" :
2017-09-05 14:57:25 +00:00
newDefault = time . Duration ( 0 )
2015-09-25 13:46:20 +00:00
default :
2017-03-07 16:21:22 +00:00
tmpDef , err := parseutil . ParseDurationSecond ( defTTL )
2015-09-25 13:46:20 +00:00
if err != nil {
return handleError ( err )
}
2017-09-05 14:57:25 +00:00
newDefault = tmpDef
2015-09-09 19:24:45 +00:00
}
2015-09-25 13:46:20 +00:00
maxTTL := data . Get ( "max_lease_ttl" ) . ( string )
switch maxTTL {
case "" :
2017-09-05 14:57:25 +00:00
newMax = mountEntry . Config . MaxLeaseTTL
2015-09-25 13:46:20 +00:00
case "system" :
2017-09-05 14:57:25 +00:00
newMax = time . Duration ( 0 )
2015-09-25 13:46:20 +00:00
default :
2017-03-07 16:21:22 +00:00
tmpMax , err := parseutil . ParseDurationSecond ( maxTTL )
2015-09-25 13:46:20 +00:00
if err != nil {
return handleError ( err )
}
2017-09-05 14:57:25 +00:00
newMax = tmpMax
2015-09-09 19:24:45 +00:00
}
2015-09-25 13:46:20 +00:00
2017-09-05 14:57:25 +00:00
if newDefault != mountEntry . Config . DefaultLeaseTTL ||
newMax != mountEntry . Config . MaxLeaseTTL {
2016-05-03 18:24:04 +00:00
2018-01-19 06:44:44 +00:00
if err := b . tuneMountTTLs ( ctx , path , mountEntry , newDefault , newMax ) ; err != nil {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "tuning failed" , "path" , path , "error" , err )
2015-09-09 19:24:45 +00:00
return handleError ( err )
}
}
2015-03-15 21:42:05 +00:00
}
2022-11-01 18:02:07 +00:00
// user-lockout config
{
var apiuserLockoutConfig APIUserLockoutConfig
userLockoutConfigMap := data . Get ( "user_lockout_config" ) . ( map [ string ] interface { } )
var err error
if userLockoutConfigMap != nil && len ( userLockoutConfigMap ) != 0 {
err := mapstructure . Decode ( userLockoutConfigMap , & apiuserLockoutConfig )
if err != nil {
return logical . ErrorResponse (
"unable to convert given user lockout config information" ) ,
logical . ErrInvalidRequest
}
// Supported auth methods for user lockout configuration: ldap, approle, userpass
switch strings . ToLower ( mountEntry . Type ) {
case "ldap" , "approle" , "userpass" :
default :
return logical . ErrorResponse ( "tuning of user lockout configuration for auth type %q not allowed" , mountEntry . Type ) ,
logical . ErrInvalidRequest
}
}
if len ( userLockoutConfigMap ) > 0 && mountEntry . Config . UserLockoutConfig == nil {
mountEntry . Config . UserLockoutConfig = & UserLockoutConfig { }
}
var oldUserLockoutThreshold uint64
var newUserLockoutDuration , oldUserLockoutDuration time . Duration
var newUserLockoutCounterReset , oldUserLockoutCounterReset time . Duration
var oldUserLockoutDisable bool
if apiuserLockoutConfig . LockoutThreshold != "" {
userLockoutThreshold , err := strconv . ParseUint ( apiuserLockoutConfig . LockoutThreshold , 10 , 64 )
if err != nil {
return nil , fmt . Errorf ( "unable to parse user lockout threshold: %w" , err )
}
oldUserLockoutThreshold = mountEntry . Config . UserLockoutConfig . LockoutThreshold
mountEntry . Config . UserLockoutConfig . LockoutThreshold = userLockoutThreshold
}
if apiuserLockoutConfig . LockoutDuration != "" {
oldUserLockoutDuration = mountEntry . Config . UserLockoutConfig . LockoutDuration
switch apiuserLockoutConfig . LockoutDuration {
case "" :
newUserLockoutDuration = oldUserLockoutDuration
case "system" :
newUserLockoutDuration = time . Duration ( 0 )
default :
tmpUserLockoutDuration , err := parseutil . ParseDurationSecond ( apiuserLockoutConfig . LockoutDuration )
if err != nil {
return handleError ( err )
}
newUserLockoutDuration = tmpUserLockoutDuration
}
mountEntry . Config . UserLockoutConfig . LockoutDuration = newUserLockoutDuration
}
if apiuserLockoutConfig . LockoutCounterResetDuration != "" {
oldUserLockoutCounterReset = mountEntry . Config . UserLockoutConfig . LockoutCounterReset
switch apiuserLockoutConfig . LockoutCounterResetDuration {
case "" :
newUserLockoutCounterReset = oldUserLockoutCounterReset
case "system" :
newUserLockoutCounterReset = time . Duration ( 0 )
default :
tmpUserLockoutCounterReset , err := parseutil . ParseDurationSecond ( apiuserLockoutConfig . LockoutCounterResetDuration )
if err != nil {
return handleError ( err )
}
newUserLockoutCounterReset = tmpUserLockoutCounterReset
}
mountEntry . Config . UserLockoutConfig . LockoutCounterReset = newUserLockoutCounterReset
}
if apiuserLockoutConfig . DisableLockout != nil {
oldUserLockoutDisable = mountEntry . Config . UserLockoutConfig . DisableLockout
userLockoutDisable := apiuserLockoutConfig . DisableLockout
mountEntry . Config . UserLockoutConfig . DisableLockout = * userLockoutDisable
}
// Update the mount table
if len ( userLockoutConfigMap ) > 0 {
switch {
case strings . HasPrefix ( path , "auth/" ) :
err = b . Core . persistAuth ( ctx , b . Core . auth , & mountEntry . Local )
default :
err = b . Core . persistMounts ( ctx , b . Core . mounts , & mountEntry . Local )
}
if err != nil {
mountEntry . Config . UserLockoutConfig . LockoutCounterReset = oldUserLockoutCounterReset
mountEntry . Config . UserLockoutConfig . LockoutThreshold = oldUserLockoutThreshold
mountEntry . Config . UserLockoutConfig . LockoutDuration = oldUserLockoutDuration
mountEntry . Config . UserLockoutConfig . DisableLockout = oldUserLockoutDisable
return handleError ( err )
}
if b . Core . logger . IsInfo ( ) {
b . Core . logger . Info ( "tuning of user_lockout_config successful" , "path" , path )
}
}
}
2018-07-12 15:15:50 +00:00
if rawVal , ok := data . GetOk ( "description" ) ; ok {
description := rawVal . ( string )
2017-09-05 14:57:25 +00:00
oldDesc := mountEntry . Description
mountEntry . Description = description
// Update the mount table
var err error
switch {
case strings . HasPrefix ( path , "auth/" ) :
2018-04-11 18:32:55 +00:00
err = b . Core . persistAuth ( ctx , b . Core . auth , & mountEntry . Local )
2017-09-05 14:57:25 +00:00
default :
2018-04-11 18:32:55 +00:00
err = b . Core . persistMounts ( ctx , b . Core . mounts , & mountEntry . Local )
2017-09-05 14:57:25 +00:00
}
if err != nil {
mountEntry . Description = oldDesc
return handleError ( err )
}
if b . Core . logger . IsInfo ( ) {
2019-04-11 15:12:37 +00:00
b . Core . logger . Info ( "mount tuning of description successful" , "path" , path , "description" , description )
2017-09-05 14:57:25 +00:00
}
}
2022-09-22 12:53:52 +00:00
if rawVal , ok := data . GetOk ( "plugin_version" ) ; ok {
version := rawVal . ( string )
semanticVersion , err := semver . NewVersion ( version )
if err != nil {
return logical . ErrorResponse ( "version %q is not a valid semantic version: %s" , version , err ) , nil
}
version = "v" + semanticVersion . String ( )
// Lookup the version to ensure it exists in the catalog before committing.
pluginType := consts . PluginTypeSecrets
if strings . HasPrefix ( path , "auth/" ) {
pluginType = consts . PluginTypeCredential
}
_ , err = b . System ( ) . LookupPluginVersion ( ctx , mountEntry . Type , pluginType , version )
if err != nil {
return handleError ( err )
}
oldVersion := mountEntry . Version
mountEntry . Version = version
// Update the mount table
switch {
case strings . HasPrefix ( path , "auth/" ) :
err = b . Core . persistAuth ( ctx , b . Core . auth , & mountEntry . Local )
default :
err = b . Core . persistMounts ( ctx , b . Core . mounts , & mountEntry . Local )
}
if err != nil {
mountEntry . Version = oldVersion
return handleError ( err )
}
if b . Core . logger . IsInfo ( ) {
b . Core . logger . Info ( "mount tuning of version successful" , "path" , path , "version" , version )
}
}
2018-03-02 17:18:39 +00:00
if rawVal , ok := data . GetOk ( "audit_non_hmac_request_keys" ) ; ok {
auditNonHMACRequestKeys := rawVal . ( [ ] string )
oldVal := mountEntry . Config . AuditNonHMACRequestKeys
mountEntry . Config . AuditNonHMACRequestKeys = auditNonHMACRequestKeys
// Update the mount table
var err error
switch {
case strings . HasPrefix ( path , "auth/" ) :
2018-04-11 18:32:55 +00:00
err = b . Core . persistAuth ( ctx , b . Core . auth , & mountEntry . Local )
2018-03-02 17:18:39 +00:00
default :
2018-04-11 18:32:55 +00:00
err = b . Core . persistMounts ( ctx , b . Core . mounts , & mountEntry . Local )
2018-03-02 17:18:39 +00:00
}
if err != nil {
mountEntry . Config . AuditNonHMACRequestKeys = oldVal
return handleError ( err )
}
mountEntry . SyncCache ( )
if b . Core . logger . IsInfo ( ) {
2018-04-10 01:14:23 +00:00
b . Core . logger . Info ( "mount tuning of audit_non_hmac_request_keys successful" , "path" , path )
2018-03-02 17:18:39 +00:00
}
}
if rawVal , ok := data . GetOk ( "audit_non_hmac_response_keys" ) ; ok {
auditNonHMACResponseKeys := rawVal . ( [ ] string )
oldVal := mountEntry . Config . AuditNonHMACResponseKeys
mountEntry . Config . AuditNonHMACResponseKeys = auditNonHMACResponseKeys
// Update the mount table
var err error
switch {
case strings . HasPrefix ( path , "auth/" ) :
2018-04-11 18:32:55 +00:00
err = b . Core . persistAuth ( ctx , b . Core . auth , & mountEntry . Local )
2018-03-02 17:18:39 +00:00
default :
2018-04-11 18:32:55 +00:00
err = b . Core . persistMounts ( ctx , b . Core . mounts , & mountEntry . Local )
2018-03-02 17:18:39 +00:00
}
if err != nil {
mountEntry . Config . AuditNonHMACResponseKeys = oldVal
return handleError ( err )
}
mountEntry . SyncCache ( )
if b . Core . logger . IsInfo ( ) {
2018-04-10 01:14:23 +00:00
b . Core . logger . Info ( "mount tuning of audit_non_hmac_response_keys successful" , "path" , path )
2018-03-02 17:18:39 +00:00
}
}
2018-03-20 03:16:33 +00:00
if rawVal , ok := data . GetOk ( "listing_visibility" ) ; ok {
lvString := rawVal . ( string )
2018-05-25 17:39:35 +00:00
listingVisibility := ListingVisibilityType ( lvString )
2018-03-20 03:16:33 +00:00
if err := checkListingVisibility ( listingVisibility ) ; err != nil {
return logical . ErrorResponse ( fmt . Sprintf ( "invalid listing_visibility %s" , listingVisibility ) ) , nil
}
oldVal := mountEntry . Config . ListingVisibility
mountEntry . Config . ListingVisibility = listingVisibility
// Update the mount table
var err error
switch {
case strings . HasPrefix ( path , "auth/" ) :
2018-04-11 18:32:55 +00:00
err = b . Core . persistAuth ( ctx , b . Core . auth , & mountEntry . Local )
2018-03-20 03:16:33 +00:00
default :
2018-04-11 18:32:55 +00:00
err = b . Core . persistMounts ( ctx , b . Core . mounts , & mountEntry . Local )
2018-03-20 03:16:33 +00:00
}
if err != nil {
mountEntry . Config . ListingVisibility = oldVal
return handleError ( err )
}
if b . Core . logger . IsInfo ( ) {
2018-04-10 01:14:23 +00:00
b . Core . logger . Info ( "mount tuning of listing_visibility successful" , "path" , path )
2018-03-20 03:16:33 +00:00
}
}
2018-10-15 16:56:24 +00:00
if rawVal , ok := data . GetOk ( "token_type" ) ; ok {
if ! strings . HasPrefix ( path , "auth/" ) {
return logical . ErrorResponse ( fmt . Sprintf ( "'token_type' can only be modified on auth mounts" ) ) , logical . ErrInvalidRequest
}
if mountEntry . Type == "token" || mountEntry . Type == "ns_token" {
return logical . ErrorResponse ( fmt . Sprintf ( "'token_type' cannot be set for 'token' or 'ns_token' auth mounts" ) ) , logical . ErrInvalidRequest
}
tokenType := logical . TokenTypeDefaultService
ttString := rawVal . ( string )
switch ttString {
case "" , "default-service" :
case "default-batch" :
tokenType = logical . TokenTypeDefaultBatch
case "service" :
tokenType = logical . TokenTypeService
case "batch" :
tokenType = logical . TokenTypeBatch
default :
return logical . ErrorResponse ( fmt . Sprintf (
"invalid value for 'token_type'" ) ) , logical . ErrInvalidRequest
}
oldVal := mountEntry . Config . TokenType
mountEntry . Config . TokenType = tokenType
// Update the mount table
if err := b . Core . persistAuth ( ctx , b . Core . auth , & mountEntry . Local ) ; err != nil {
mountEntry . Config . TokenType = oldVal
return handleError ( err )
}
if b . Core . logger . IsInfo ( ) {
b . Core . logger . Info ( "mount tuning of token_type successful" , "path" , path , "token_type" , ttString )
}
}
2018-03-21 23:56:47 +00:00
if rawVal , ok := data . GetOk ( "passthrough_request_headers" ) ; ok {
headers := rawVal . ( [ ] string )
oldVal := mountEntry . Config . PassthroughRequestHeaders
mountEntry . Config . PassthroughRequestHeaders = headers
// Update the mount table
var err error
switch {
case strings . HasPrefix ( path , "auth/" ) :
2018-04-11 18:32:55 +00:00
err = b . Core . persistAuth ( ctx , b . Core . auth , & mountEntry . Local )
2018-03-21 23:56:47 +00:00
default :
2018-04-11 18:32:55 +00:00
err = b . Core . persistMounts ( ctx , b . Core . mounts , & mountEntry . Local )
2018-03-21 23:56:47 +00:00
}
if err != nil {
mountEntry . Config . PassthroughRequestHeaders = oldVal
return handleError ( err )
}
mountEntry . SyncCache ( )
if b . Core . logger . IsInfo ( ) {
2018-04-10 01:14:23 +00:00
b . Core . logger . Info ( "mount tuning of passthrough_request_headers successful" , "path" , path )
2018-03-21 23:56:47 +00:00
}
}
2019-02-05 21:02:15 +00:00
if rawVal , ok := data . GetOk ( "allowed_response_headers" ) ; ok {
headers := rawVal . ( [ ] string )
oldVal := mountEntry . Config . AllowedResponseHeaders
mountEntry . Config . AllowedResponseHeaders = headers
// Update the mount table
var err error
switch {
case strings . HasPrefix ( path , "auth/" ) :
err = b . Core . persistAuth ( ctx , b . Core . auth , & mountEntry . Local )
default :
err = b . Core . persistMounts ( ctx , b . Core . mounts , & mountEntry . Local )
}
if err != nil {
mountEntry . Config . AllowedResponseHeaders = oldVal
return handleError ( err )
}
mountEntry . SyncCache ( )
if b . Core . logger . IsInfo ( ) {
b . Core . logger . Info ( "mount tuning of allowed_response_headers successful" , "path" , path )
}
}
2021-11-22 01:08:38 +00:00
if rawVal , ok := data . GetOk ( "allowed_managed_keys" ) ; ok {
2021-12-20 21:20:18 +00:00
allowedManagedKeys := rawVal . ( [ ] string )
2021-11-22 01:08:38 +00:00
oldVal := mountEntry . Config . AllowedManagedKeys
2021-12-20 21:20:18 +00:00
mountEntry . Config . AllowedManagedKeys = allowedManagedKeys
2021-11-22 01:08:38 +00:00
// Update the mount table
var err error
switch {
case strings . HasPrefix ( path , "auth/" ) :
err = b . Core . persistAuth ( ctx , b . Core . auth , & mountEntry . Local )
default :
err = b . Core . persistMounts ( ctx , b . Core . mounts , & mountEntry . Local )
}
if err != nil {
mountEntry . Config . AllowedManagedKeys = oldVal
return handleError ( err )
}
mountEntry . SyncCache ( )
if b . Core . logger . IsInfo ( ) {
b . Core . logger . Info ( "mount tuning of allowed_managed_keys successful" , "path" , path )
}
}
2018-04-10 02:17:37 +00:00
var err error
2018-03-21 19:04:27 +00:00
var resp * logical . Response
2018-04-10 02:17:37 +00:00
var options map [ string ] string
2018-03-21 19:04:27 +00:00
if optionsRaw , ok := data . GetOk ( "options" ) ; ok {
2018-04-10 02:17:37 +00:00
options = optionsRaw . ( map [ string ] string )
}
2018-11-19 22:23:25 +00:00
2018-04-10 02:17:37 +00:00
if len ( options ) > 0 {
2018-04-10 01:14:23 +00:00
b . Core . logger . Info ( "mount tuning of options" , "path" , path , "options" , options )
2018-11-19 22:23:25 +00:00
newOptions := make ( map [ string ] string )
var kvUpgraded bool
2018-03-21 19:04:27 +00:00
2018-11-19 22:23:25 +00:00
// The version options should only apply to the KV mount, check that first
2018-04-10 02:17:37 +00:00
if v , ok := options [ "version" ] ; ok {
// Special case to make sure we can not disable versioning once it's
2018-09-01 16:15:02 +00:00
// enabled. If the vkv backend suports downgrading this can be removed.
2018-04-10 02:17:37 +00:00
meVersion , err := parseutil . ParseInt ( mountEntry . Options [ "version" ] )
if err != nil {
2021-05-11 17:12:54 +00:00
return nil , fmt . Errorf ( "unable to parse mount entry: %w" , err )
2018-04-10 02:17:37 +00:00
}
optVersion , err := parseutil . ParseInt ( v )
if err != nil {
2021-05-11 17:12:54 +00:00
return handleError ( fmt . Errorf ( "unable to parse options: %w" , err ) )
2018-04-10 02:17:37 +00:00
}
2018-11-19 22:23:25 +00:00
// Only accept valid versions
switch optVersion {
case 1 :
case 2 :
default :
return logical . ErrorResponse ( fmt . Sprintf ( "invalid version provided: %d" , optVersion ) ) , logical . ErrInvalidRequest
}
2018-04-10 02:17:37 +00:00
if meVersion > optVersion {
2018-11-19 22:23:25 +00:00
// Return early if version option asks for a downgrade
2018-04-10 02:17:37 +00:00
return logical . ErrorResponse ( fmt . Sprintf ( "cannot downgrade mount from version %d" , meVersion ) ) , logical . ErrInvalidRequest
}
if meVersion < optVersion {
2018-11-19 22:23:25 +00:00
kvUpgraded = true
2018-04-10 02:17:37 +00:00
resp = & logical . Response { }
resp . AddWarning ( fmt . Sprintf ( "Upgrading mount from version %d to version %d. This mount will be unavailable for a brief period and will resume service shortly." , meVersion , optVersion ) )
}
2018-04-10 04:22:23 +00:00
}
2018-11-19 22:23:25 +00:00
// Upsert options value to a copy of the existing mountEntry's options
for k , v := range mountEntry . Options {
newOptions [ k ] = v
}
for k , v := range options {
// If the value of the provided option is empty, delete the key We
// special-case the version value here to guard against KV downgrades, but
// this piece could potentially be refactored in the future to be non-KV
// specific.
if len ( v ) == 0 && k != "version" {
delete ( newOptions , k )
} else {
newOptions [ k ] = v
2018-04-10 04:22:23 +00:00
}
2018-03-21 19:04:27 +00:00
}
2018-11-19 22:23:25 +00:00
// Update the mount table
oldVal := mountEntry . Options
mountEntry . Options = newOptions
switch {
case strings . HasPrefix ( path , "auth/" ) :
err = b . Core . persistAuth ( ctx , b . Core . auth , & mountEntry . Local )
default :
err = b . Core . persistMounts ( ctx , b . Core . mounts , & mountEntry . Local )
}
if err != nil {
mountEntry . Options = oldVal
return handleError ( err )
}
2018-04-10 02:17:37 +00:00
2018-11-19 22:23:25 +00:00
// Reload the backend to kick off the upgrade process. It should only apply to KV backend so we
// trigger based on the version logic above.
if kvUpgraded {
2018-12-12 01:21:23 +00:00
err = b . Core . reloadBackendCommon ( ctx , mountEntry , strings . HasPrefix ( path , credentialRoutePrefix ) )
if err != nil {
b . Core . logger . Error ( "mount tuning of options: could not reload backend" , "error" , err , "path" , path , "options" , options )
}
2018-04-10 02:17:37 +00:00
}
2018-03-21 19:04:27 +00:00
}
2018-03-21 23:56:47 +00:00
2018-03-21 19:04:27 +00:00
return resp , nil
2015-03-15 21:42:05 +00:00
}
2015-03-16 00:35:59 +00:00
2023-01-17 22:25:56 +00:00
// handleLockedUsersMetricQuery reports the locked user count metrics for this namespace and all child namespaces
// if mount_accessor in request, returns the locked user metrics for that mount accessor for namespace in ctx
func ( b * SystemBackend ) handleLockedUsersMetricQuery ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
var mountAccessor string
if mountAccessorRaw , ok := d . GetOk ( "mount_accessor" ) ; ok {
mountAccessor = mountAccessorRaw . ( string )
}
results , err := b . handleLockedUsersQuery ( ctx , mountAccessor )
if err != nil {
return nil , err
}
if results == nil {
return logical . RespondWithStatusCode ( nil , req , http . StatusNoContent )
}
return & logical . Response {
Data : results ,
} , nil
}
2022-12-19 22:24:42 +00:00
// handleUnlockUser is used to unlock user with given mount_accessor and alias_identifier if locked
func ( b * SystemBackend ) handleUnlockUser ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
mountAccessor := data . Get ( "mount_accessor" ) . ( string )
if mountAccessor == "" {
return logical . ErrorResponse (
"missing mount_accessor" ) ,
logical . ErrInvalidRequest
}
aliasName := data . Get ( "alias_identifier" ) . ( string )
if aliasName == "" {
return logical . ErrorResponse (
"missing alias_identifier" ) ,
logical . ErrInvalidRequest
}
if err := unlockUser ( ctx , b . Core , mountAccessor , aliasName ) ; err != nil {
b . Backend . Logger ( ) . Error ( "unlock user failed" , "mount accessor" , mountAccessor , "alias identifier" , aliasName , "error" , err )
return handleError ( err )
}
return nil , nil
}
2017-05-04 02:03:42 +00:00
// handleLease is use to view the metadata for a given LeaseID
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleLeaseLookup ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2017-05-04 02:03:42 +00:00
leaseID := data . Get ( "lease_id" ) . ( string )
if leaseID == "" {
return logical . ErrorResponse ( "lease_id must be specified" ) ,
logical . ErrInvalidRequest
}
2018-08-02 01:39:39 +00:00
leaseTimes , err := b . Core . expiration . FetchLeaseTimes ( ctx , leaseID )
2017-05-04 02:03:42 +00:00
if err != nil {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "error retrieving lease" , "lease_id" , leaseID , "error" , err )
2017-05-04 02:03:42 +00:00
return handleError ( err )
}
if leaseTimes == nil {
return logical . ErrorResponse ( "invalid lease" ) , logical . ErrInvalidRequest
}
resp := & logical . Response {
Data : map [ string ] interface { } {
"id" : leaseID ,
"issue_time" : leaseTimes . IssueTime ,
"expire_time" : nil ,
"last_renewal" : nil ,
"ttl" : int64 ( 0 ) ,
} ,
}
renewable , _ := leaseTimes . renewable ( )
resp . Data [ "renewable" ] = renewable
if ! leaseTimes . LastRenewalTime . IsZero ( ) {
resp . Data [ "last_renewal" ] = leaseTimes . LastRenewalTime
}
if ! leaseTimes . ExpireTime . IsZero ( ) {
resp . Data [ "expire_time" ] = leaseTimes . ExpireTime
resp . Data [ "ttl" ] = leaseTimes . ttl ( )
}
return resp , nil
}
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleLeaseLookupList ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2017-05-04 02:03:42 +00:00
prefix := data . Get ( "prefix" ) . ( string )
if prefix != "" && ! strings . HasSuffix ( prefix , "/" ) {
prefix = prefix + "/"
}
2018-09-18 03:03:00 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
view := b . Core . expiration . leaseView ( ns )
keys , err := view . List ( ctx , prefix )
2017-05-04 02:03:42 +00:00
if err != nil {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "error listing leases" , "prefix" , prefix , "error" , err )
2018-03-18 01:29:17 +00:00
return handleErrorNoReadOnlyForward ( err )
2017-05-04 02:03:42 +00:00
}
return logical . ListResponse ( keys ) , nil
}
2015-04-08 20:35:32 +00:00
// handleRenew is used to renew a lease with a given LeaseID
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleRenew ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2015-03-16 23:11:55 +00:00
// Get all the options
2015-04-08 20:35:32 +00:00
leaseID := data . Get ( "lease_id" ) . ( string )
2016-08-08 22:00:44 +00:00
if leaseID == "" {
2016-08-08 22:34:00 +00:00
leaseID = data . Get ( "url_lease_id" ) . ( string )
2016-08-08 22:00:44 +00:00
}
2017-04-27 14:47:43 +00:00
if leaseID == "" {
return logical . ErrorResponse ( "lease_id must be specified" ) ,
logical . ErrInvalidRequest
}
2015-03-16 23:11:55 +00:00
incrementRaw := data . Get ( "increment" ) . ( int )
// Convert the increment
increment := time . Duration ( incrementRaw ) * time . Second
// Invoke the expiration manager directly
2018-08-02 01:39:39 +00:00
resp , err := b . Core . expiration . Renew ( ctx , leaseID , increment )
2015-03-16 23:14:53 +00:00
if err != nil {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "lease renewal failed" , "lease_id" , leaseID , "error" , err )
2018-03-18 01:29:17 +00:00
return handleErrorNoReadOnlyForward ( err )
2015-03-16 23:14:53 +00:00
}
return resp , err
2015-03-16 23:11:55 +00:00
}
2015-04-08 20:35:32 +00:00
// handleRevoke is used to revoke a given LeaseID
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleRevoke ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2015-03-16 23:26:34 +00:00
// Get all the options
2015-04-08 20:35:32 +00:00
leaseID := data . Get ( "lease_id" ) . ( string )
2017-04-27 14:47:43 +00:00
if leaseID == "" {
leaseID = data . Get ( "url_lease_id" ) . ( string )
}
if leaseID == "" {
return logical . ErrorResponse ( "lease_id must be specified" ) ,
logical . ErrInvalidRequest
}
2015-03-16 23:26:34 +00:00
2018-09-18 03:03:00 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
revokeCtx := namespace . ContextWithNamespace ( b . Core . activeContext , ns )
2018-07-11 19:45:09 +00:00
if data . Get ( "sync" ) . ( bool ) {
// Invoke the expiration manager directly
2018-09-18 03:03:00 +00:00
if err := b . Core . expiration . Revoke ( revokeCtx , leaseID ) ; err != nil {
2018-07-11 19:45:09 +00:00
b . Backend . Logger ( ) . Error ( "lease revocation failed" , "lease_id" , leaseID , "error" , err )
return handleErrorNoReadOnlyForward ( err )
}
return nil , nil
}
2018-09-18 03:03:00 +00:00
if err := b . Core . expiration . LazyRevoke ( revokeCtx , leaseID ) ; err != nil {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "lease revocation failed" , "lease_id" , leaseID , "error" , err )
2018-03-18 01:29:17 +00:00
return handleErrorNoReadOnlyForward ( err )
2015-03-16 23:26:34 +00:00
}
2018-07-11 19:45:09 +00:00
return logical . RespondWithStatusCode ( nil , nil , http . StatusAccepted )
2015-03-16 23:26:34 +00:00
}
2015-04-08 20:35:32 +00:00
// handleRevokePrefix is used to revoke a prefix with many LeaseIDs
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleRevokePrefix ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-08-02 01:39:39 +00:00
return b . handleRevokePrefixCommon ( ctx , req , data , false , data . Get ( "sync" ) . ( bool ) )
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
}
// handleRevokeForce is used to revoke a prefix with many LeaseIDs, ignoring errors
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleRevokeForce ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-08-02 01:39:39 +00:00
return b . handleRevokePrefixCommon ( ctx , req , data , true , true )
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
}
// handleRevokePrefixCommon is used to revoke a prefix with many LeaseIDs
2018-08-02 01:39:39 +00:00
func ( b * SystemBackend ) handleRevokePrefixCommon ( ctx context . Context ,
2022-05-20 20:49:11 +00:00
req * logical . Request , data * framework . FieldData , force , sync bool ,
) ( * logical . Response , error ) {
2015-03-16 23:33:48 +00:00
// Get all the options
prefix := data . Get ( "prefix" ) . ( string )
2018-09-18 03:03:00 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
2015-03-16 23:33:48 +00:00
// Invoke the expiration manager directly
2018-09-18 03:03:00 +00:00
revokeCtx := namespace . ContextWithNamespace ( b . Core . activeContext , ns )
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
if force {
2018-09-18 03:03:00 +00:00
err = b . Core . expiration . RevokeForce ( revokeCtx , prefix )
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
} else {
2018-09-18 03:03:00 +00:00
err = b . Core . expiration . RevokePrefix ( revokeCtx , prefix , sync )
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
}
if err != nil {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "revoke prefix failed" , "prefix" , prefix , "error" , err )
2018-03-18 01:29:17 +00:00
return handleErrorNoReadOnlyForward ( err )
2015-03-16 23:33:48 +00:00
}
2018-07-11 19:45:09 +00:00
if sync {
return nil , nil
}
return logical . RespondWithStatusCode ( nil , nil , http . StatusAccepted )
2015-03-16 23:33:48 +00:00
}
2015-03-20 19:48:19 +00:00
// handleAuthTable handles the "auth" endpoint to provide the auth table
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleAuthTable ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-09-18 03:03:00 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
2015-11-11 16:44:07 +00:00
b . Core . authLock . RLock ( )
defer b . Core . authLock . RUnlock ( )
2015-03-20 19:48:19 +00:00
resp := & logical . Response {
Data : make ( map [ string ] interface { } ) ,
}
2018-09-18 03:03:00 +00:00
2015-03-20 19:48:19 +00:00
for _ , entry := range b . Core . auth . Entries {
2018-09-18 03:03:00 +00:00
// Only show entries for current namespace
if entry . Namespace ( ) . Path != ns . Path {
continue
}
cont , err := b . Core . checkReplicatedFiltering ( ctx , entry , credentialRoutePrefix )
if err != nil {
return nil , err
}
if cont {
continue
}
2022-08-31 20:11:14 +00:00
info := b . mountInfo ( ctx , entry )
2015-03-20 19:48:19 +00:00
resp . Data [ entry . Path ] = info
}
2018-10-15 16:56:24 +00:00
2015-03-20 19:48:19 +00:00
return resp , nil
}
2022-01-25 19:56:40 +00:00
func ( b * SystemBackend ) handleReadAuth ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
path := data . Get ( "path" ) . ( string )
path = sanitizePath ( path )
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
b . Core . authLock . RLock ( )
defer b . Core . authLock . RUnlock ( )
for _ , entry := range b . Core . auth . Entries {
// Only show entry for current namespace
2022-01-27 18:06:34 +00:00
if entry . Namespace ( ) . Path != ns . Path || entry . Path != path {
2022-01-25 19:56:40 +00:00
continue
}
cont , err := b . Core . checkReplicatedFiltering ( ctx , entry , credentialRoutePrefix )
if err != nil {
return nil , err
}
if cont {
continue
}
return & logical . Response {
2022-08-31 20:11:14 +00:00
Data : b . mountInfo ( ctx , entry ) ,
2022-01-25 19:56:40 +00:00
} , nil
}
return logical . ErrorResponse ( "No auth engine at %s" , path ) , nil
}
2021-08-09 19:37:03 +00:00
func expandStringValsWithCommas ( configMap map [ string ] interface { } ) error {
configParamNameSlice := [ ] string {
"audit_non_hmac_request_keys" ,
"audit_non_hmac_response_keys" ,
"passthrough_request_headers" ,
"allowed_response_headers" ,
2021-11-22 01:08:38 +00:00
"allowed_managed_keys" ,
2021-08-09 19:37:03 +00:00
}
for _ , paramName := range configParamNameSlice {
if raw , ok := configMap [ paramName ] ; ok {
switch t := raw . ( type ) {
case string :
// To be consistent with auth tune, and in cases where a single comma separated strings
// is provided in the curl command, we split the entries by the commas.
rawNew := raw . ( string )
res , err := parseutil . ParseCommaStringSlice ( rawNew )
if err != nil {
return fmt . Errorf ( "invalid input parameter %v of type %v" , paramName , t )
}
configMap [ paramName ] = res
}
}
}
return nil
}
2015-03-20 19:48:19 +00:00
// handleEnableAuth is used to enable a new credential backend
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleEnableAuth ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-01-16 18:51:55 +00:00
repState := b . Core . ReplicationState ( )
2017-02-16 21:29:30 +00:00
local := data . Get ( "local" ) . ( bool )
2019-04-11 15:12:37 +00:00
// If we are a performance secondary cluster we should forward the request
// to the primary. We fail early here since the view in use isn't marked as
// readonly
2017-09-04 23:38:37 +00:00
if ! local && repState . HasState ( consts . ReplicationPerformanceSecondary ) {
2019-04-11 15:12:37 +00:00
return nil , logical . ErrReadOnly
2017-02-16 21:29:30 +00:00
}
2015-03-20 19:48:19 +00:00
// Get all the options
path := data . Get ( "path" ) . ( string )
2020-06-29 22:36:22 +00:00
path = sanitizePath ( path )
2015-03-20 19:48:19 +00:00
logicalType := data . Get ( "type" ) . ( string )
description := data . Get ( "description" ) . ( string )
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
pluginName := data . Get ( "plugin_name" ) . ( string )
2017-11-13 16:22:22 +00:00
sealWrap := data . Get ( "seal_wrap" ) . ( bool )
2019-10-17 17:33:00 +00:00
externalEntropyAccess := data . Get ( "external_entropy_access" ) . ( bool )
2018-03-21 19:04:27 +00:00
options := data . Get ( "options" ) . ( map [ string ] string )
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
var config MountConfig
2017-08-31 16:16:59 +00:00
var apiConfig APIMountConfig
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
2017-08-31 16:16:59 +00:00
configMap := data . Get ( "config" ) . ( map [ string ] interface { } )
2021-08-09 19:37:03 +00:00
// Augmenting configMap for some config options to treat them as comma separated entries
err := expandStringValsWithCommas ( configMap )
if err != nil {
return logical . ErrorResponse (
"unable to parse given auth config information" ) ,
logical . ErrInvalidRequest
}
2017-08-31 16:16:59 +00:00
if configMap != nil && len ( configMap ) != 0 {
err := mapstructure . Decode ( configMap , & apiConfig )
if err != nil {
return logical . ErrorResponse (
"unable to convert given auth config information" ) ,
logical . ErrInvalidRequest
}
}
2018-02-22 15:26:29 +00:00
switch apiConfig . DefaultLeaseTTL {
case "" :
case "system" :
default :
tmpDef , err := parseutil . ParseDurationSecond ( apiConfig . DefaultLeaseTTL )
if err != nil {
return logical . ErrorResponse ( fmt . Sprintf (
"unable to parse default TTL of %s: %s" , apiConfig . DefaultLeaseTTL , err ) ) ,
logical . ErrInvalidRequest
}
config . DefaultLeaseTTL = tmpDef
}
switch apiConfig . MaxLeaseTTL {
case "" :
case "system" :
default :
tmpMax , err := parseutil . ParseDurationSecond ( apiConfig . MaxLeaseTTL )
if err != nil {
return logical . ErrorResponse ( fmt . Sprintf (
"unable to parse max TTL of %s: %s" , apiConfig . MaxLeaseTTL , err ) ) ,
logical . ErrInvalidRequest
}
config . MaxLeaseTTL = tmpMax
}
if config . MaxLeaseTTL != 0 && config . DefaultLeaseTTL > config . MaxLeaseTTL {
return logical . ErrorResponse (
"given default lease TTL greater than given max lease TTL" ) ,
logical . ErrInvalidRequest
}
if config . DefaultLeaseTTL > b . Core . maxLeaseTTL && config . MaxLeaseTTL == 0 {
return logical . ErrorResponse ( fmt . Sprintf (
"given default lease TTL greater than system max lease TTL of %d" , int ( b . Core . maxLeaseTTL . Seconds ( ) ) ) ) ,
logical . ErrInvalidRequest
}
2018-10-15 16:56:24 +00:00
switch apiConfig . TokenType {
case "" , "default-service" :
config . TokenType = logical . TokenTypeDefaultService
case "default-batch" :
config . TokenType = logical . TokenTypeDefaultBatch
case "service" :
config . TokenType = logical . TokenTypeService
case "batch" :
config . TokenType = logical . TokenTypeBatch
default :
return logical . ErrorResponse ( fmt . Sprintf (
"invalid value for 'token_type'" ) ) , logical . ErrInvalidRequest
}
2018-03-20 03:16:33 +00:00
switch logicalType {
case "" :
return logical . ErrorResponse (
"backend type must be specified as a string" ) ,
logical . ErrInvalidRequest
case "plugin" :
2018-11-19 23:23:48 +00:00
// Only set plugin name if mount is of type plugin, with apiConfig.PluginName
2018-03-20 03:16:33 +00:00
// option taking precedence.
2017-08-31 16:16:59 +00:00
switch {
2018-11-19 23:23:48 +00:00
case apiConfig . PluginName != "" :
logicalType = apiConfig . PluginName
2017-08-31 16:16:59 +00:00
case pluginName != "" :
2018-11-07 01:21:24 +00:00
logicalType = pluginName
2017-08-31 16:16:59 +00:00
default :
return logical . ErrorResponse (
"plugin_name must be provided for plugin backend" ) ,
logical . ErrInvalidRequest
}
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
}
2015-03-20 19:48:19 +00:00
2022-09-23 20:14:37 +00:00
pluginVersion , response , err := b . validateVersion ( ctx , apiConfig . PluginVersion , logicalType , consts . PluginTypeCredential )
if response != nil || err != nil {
return response , err
2022-09-22 12:53:52 +00:00
}
2018-04-10 02:17:37 +00:00
if options != nil && options [ "version" ] != "" {
return logical . ErrorResponse ( fmt . Sprintf (
"auth method %q does not allow setting a version" , logicalType ) ) ,
logical . ErrInvalidRequest
}
2018-03-20 03:16:33 +00:00
if err := checkListingVisibility ( apiConfig . ListingVisibility ) ; err != nil {
return logical . ErrorResponse ( fmt . Sprintf ( "invalid listing_visibility %s" , apiConfig . ListingVisibility ) ) , nil
2015-03-20 19:48:19 +00:00
}
2018-03-20 03:16:33 +00:00
config . ListingVisibility = apiConfig . ListingVisibility
2016-03-03 18:13:47 +00:00
2018-03-09 19:32:28 +00:00
if len ( apiConfig . AuditNonHMACRequestKeys ) > 0 {
config . AuditNonHMACRequestKeys = apiConfig . AuditNonHMACRequestKeys
}
if len ( apiConfig . AuditNonHMACResponseKeys ) > 0 {
config . AuditNonHMACResponseKeys = apiConfig . AuditNonHMACResponseKeys
}
2018-03-21 23:56:47 +00:00
if len ( apiConfig . PassthroughRequestHeaders ) > 0 {
config . PassthroughRequestHeaders = apiConfig . PassthroughRequestHeaders
}
2019-02-05 21:02:15 +00:00
if len ( apiConfig . AllowedResponseHeaders ) > 0 {
config . AllowedResponseHeaders = apiConfig . AllowedResponseHeaders
}
2021-11-22 01:08:38 +00:00
if len ( apiConfig . AllowedManagedKeys ) > 0 {
config . AllowedManagedKeys = apiConfig . AllowedManagedKeys
}
2018-03-09 19:32:28 +00:00
2015-03-20 19:48:19 +00:00
// Create the mount entry
me := & MountEntry {
2019-10-17 17:33:00 +00:00
Table : credentialTableType ,
Path : path ,
Type : logicalType ,
Description : description ,
Config : config ,
Local : local ,
SealWrap : sealWrap ,
ExternalEntropyAccess : externalEntropyAccess ,
Options : options ,
2022-09-23 20:14:37 +00:00
Version : pluginVersion ,
2015-03-20 19:48:19 +00:00
}
2022-12-14 18:06:33 +00:00
var resp * logical . Response
if b . Core . isMountEntryBuiltin ( ctx , me , consts . PluginTypeCredential ) {
resp , err = b . Core . handleDeprecatedMountEntry ( ctx , me , consts . PluginTypeCredential )
if err != nil {
b . Core . logger . Error ( "could not mount builtin" , "name" , me . Type , "path" , me . Path , "error" , err )
return handleError ( fmt . Errorf ( "could not mount %q: %w" , me . Type , err ) )
}
2022-09-06 19:49:35 +00:00
}
2015-03-20 19:48:19 +00:00
// Attempt enabling
2018-01-19 06:44:44 +00:00
if err := b . Core . enableCredential ( ctx , me ) ; err != nil {
2019-10-27 20:30:38 +00:00
b . Backend . Logger ( ) . Error ( "error occurred during enable credential" , "path" , me . Path , "error" , err )
2015-08-10 17:27:25 +00:00
return handleError ( err )
2015-03-20 19:48:19 +00:00
}
2022-09-08 13:15:10 +00:00
return resp , nil
2015-03-20 19:48:19 +00:00
}
2022-09-23 20:14:37 +00:00
func ( b * SystemBackend ) validateVersion ( ctx context . Context , version string , pluginName string , pluginType consts . PluginType ) ( string , * logical . Response , error ) {
switch version {
case "" :
var err error
version , err = selectPluginVersion ( ctx , b . System ( ) , pluginName , pluginType )
if err != nil {
return "" , nil , err
}
if version != "" {
b . logger . Debug ( "pinning plugin version" , "plugin type" , pluginType . String ( ) , "plugin name" , pluginName , "plugin version" , version )
}
default :
semanticVersion , err := semver . NewVersion ( version )
if err != nil {
return "" , logical . ErrorResponse ( "version %q is not a valid semantic version: %s" , version , err ) , nil
}
// Canonicalize the version.
version = "v" + semanticVersion . String ( )
2022-11-23 18:36:25 +00:00
if version == versions . GetBuiltinVersion ( pluginType , pluginName ) {
unversionedPlugin , err := b . System ( ) . LookupPlugin ( ctx , pluginName , pluginType )
if err == nil && ! unversionedPlugin . Builtin {
// Builtin is overridden, return "not found" error.
return "" , logical . ErrorResponse ( "%s plugin %q, version %s not found, as it is" +
" overridden by an unversioned plugin of the same name. Omit `plugin_version` to use the unversioned plugin" , pluginType . String ( ) , pluginName , version ) , nil
}
// Don't put the builtin version in storage. Ensures that builtins
// can always be overridden, and upgrades are much simpler to handle.
version = ""
}
2022-09-23 20:14:37 +00:00
}
// if a non-builtin version is requested for a builtin plugin, return an error
if version != "" {
switch pluginType {
case consts . PluginTypeSecrets :
aliased , ok := mountAliases [ pluginName ]
if ok {
pluginName = aliased
}
if _ , ok = b . Core . logicalBackends [ pluginName ] ; ok {
if version != versions . GetBuiltinVersion ( pluginType , pluginName ) {
return "" , logical . ErrorResponse ( "cannot select non-builtin version of secrets plugin %s" , pluginName ) , nil
}
}
case consts . PluginTypeCredential :
aliased , ok := credentialAliases [ pluginName ]
if ok {
pluginName = aliased
}
if _ , ok = b . Core . credentialBackends [ pluginName ] ; ok {
if version != versions . GetBuiltinVersion ( pluginType , pluginName ) {
return "" , logical . ErrorResponse ( "cannot select non-builtin version of auth plugin %s" , pluginName ) , nil
}
}
}
}
return version , nil , nil
}
2015-03-20 19:48:19 +00:00
// handleDisableAuth is used to disable a credential backend
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleDisableAuth ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2017-07-13 17:57:14 +00:00
path := data . Get ( "path" ) . ( string )
2020-06-29 22:36:22 +00:00
path = sanitizePath ( path )
2017-10-23 19:35:28 +00:00
2018-09-18 03:03:00 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
2017-07-13 17:57:14 +00:00
fullPath := credentialRoutePrefix + path
2018-01-16 18:51:55 +00:00
repState := b . Core . ReplicationState ( )
2018-09-18 03:03:00 +00:00
entry := b . Core . router . MatchingMountEntry ( ctx , fullPath )
2019-04-11 15:12:37 +00:00
// If we are a performance secondary cluster we should forward the request
// to the primary. We fail early here since the view in use isn't marked as
// readonly
2017-09-04 23:38:37 +00:00
if entry != nil && ! entry . Local && repState . HasState ( consts . ReplicationPerformanceSecondary ) {
2019-04-11 15:12:37 +00:00
return nil , logical . ErrReadOnly
2015-03-20 19:48:19 +00:00
}
2019-12-03 22:25:09 +00:00
// We return success when the mount does not exist to not expose if the
2017-07-13 17:57:14 +00:00
// mount existed or not
2018-09-18 03:03:00 +00:00
match := b . Core . router . MatchingMount ( ctx , fullPath )
if match == "" || ns . Path + fullPath != match {
2017-07-13 17:57:14 +00:00
return nil , nil
}
2016-03-03 18:13:47 +00:00
2019-10-27 20:30:38 +00:00
_ , found := b . Core . router . MatchingStoragePrefixByAPIPath ( ctx , fullPath )
2018-09-18 03:03:00 +00:00
if ! found {
b . Backend . Logger ( ) . Error ( "unable to find storage for path" , "path" , fullPath )
return handleError ( fmt . Errorf ( "unable to find storage for path: %q" , fullPath ) )
}
2015-03-20 19:48:19 +00:00
// Attempt disable
2018-01-19 06:44:44 +00:00
if err := b . Core . disableCredential ( ctx , path ) ; err != nil {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "disable auth mount failed" , "path" , path , "error" , err )
2015-08-10 17:27:25 +00:00
return handleError ( err )
2015-03-20 19:48:19 +00:00
}
2018-09-18 03:03:00 +00:00
2019-10-27 20:30:38 +00:00
// Get the view path if available
var viewPath string
if entry != nil {
viewPath = entry . ViewPath ( )
}
2018-09-18 03:03:00 +00:00
// Remove from filtered mounts
2019-10-27 20:30:38 +00:00
if err := b . Core . removePathFromFilteredPaths ( ctx , fullPath , viewPath ) ; err != nil {
2018-09-18 03:03:00 +00:00
b . Backend . Logger ( ) . Error ( "filtered path removal failed" , path , "error" , err )
return handleError ( err )
}
2015-03-20 19:48:19 +00:00
return nil , nil
}
2018-06-01 16:11:33 +00:00
// handlePoliciesList handles /sys/policy/ and /sys/policies/<type> endpoints to provide the enabled policies
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handlePoliciesList ( policyType PolicyType ) framework . OperationFunc {
return func ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-09-18 03:03:00 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
2018-01-19 06:44:44 +00:00
policies , err := b . Core . policyStore . ListPolicies ( ctx , policyType )
2017-10-23 19:35:28 +00:00
if err != nil {
return nil , err
}
switch policyType {
case PolicyTypeACL :
2018-09-18 03:03:00 +00:00
// Add the special "root" policy if not egp and we are at the root namespace
if ns . ID == namespace . RootNamespaceID {
policies = append ( policies , "root" )
}
2018-06-01 16:11:33 +00:00
resp := logical . ListResponse ( policies )
// If the request is from sys/policy/ we handle backwards compatibility
if strings . HasPrefix ( req . Path , "policy" ) {
resp . Data [ "policies" ] = resp . Data [ "keys" ]
}
return resp , nil
2018-09-18 03:03:00 +00:00
case PolicyTypeRGP :
return logical . ListResponse ( policies ) , nil
case PolicyTypeEGP :
nsScopedKeyInfo := getEGPListResponseKeyInfo ( b , ns )
return & logical . Response {
Data : map [ string ] interface { } {
"keys" : policies ,
"key_info" : nsScopedKeyInfo ,
} ,
} , nil
2017-10-23 19:35:28 +00:00
}
return logical . ErrorResponse ( "unknown policy type" ) , nil
}
}
2018-06-01 16:11:33 +00:00
// handlePoliciesRead handles the "/sys/policy/<name>" and "/sys/policies/<type>/<name>" endpoints to read a policy
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handlePoliciesRead ( policyType PolicyType ) framework . OperationFunc {
return func ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2017-10-23 19:35:28 +00:00
name := data . Get ( "name" ) . ( string )
2018-01-19 06:44:44 +00:00
policy , err := b . Core . policyStore . GetPolicy ( ctx , name , policyType )
2017-10-23 19:35:28 +00:00
if err != nil {
return handleError ( err )
}
if policy == nil {
return nil , nil
}
2018-06-01 16:11:33 +00:00
// If the request is from sys/policy/ we handle backwards compatibility
var respDataPolicyName string
if policyType == PolicyTypeACL && strings . HasPrefix ( req . Path , "policy" ) {
respDataPolicyName = "rules"
} else {
respDataPolicyName = "policy"
}
2017-10-23 19:35:28 +00:00
resp := & logical . Response {
Data : map [ string ] interface { } {
2018-06-01 16:11:33 +00:00
"name" : policy . Name ,
respDataPolicyName : policy . Raw ,
2017-10-23 19:35:28 +00:00
} ,
}
2017-10-23 20:49:46 +00:00
2018-09-18 03:03:00 +00:00
switch policy . Type {
case PolicyTypeRGP , PolicyTypeEGP :
addSentinelPolicyData ( resp . Data , policy )
}
2017-10-23 20:49:46 +00:00
return resp , nil
}
2017-10-23 19:35:28 +00:00
}
2018-06-01 16:11:33 +00:00
// handlePoliciesSet handles the "/sys/policy/<name>" and "/sys/policies/<type>/<name>" endpoints to set a policy
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handlePoliciesSet ( policyType PolicyType ) framework . OperationFunc {
return func ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-06-01 16:11:33 +00:00
var resp * logical . Response
2018-09-18 03:03:00 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
2022-03-24 20:29:11 +00:00
name := data . Get ( "name" ) . ( string )
2017-10-23 19:35:28 +00:00
policy := & Policy {
2022-03-24 20:29:11 +00:00
Name : strings . ToLower ( name ) ,
2018-09-18 03:03:00 +00:00
Type : policyType ,
namespace : ns ,
2017-10-23 19:35:28 +00:00
}
if policy . Name == "" {
return logical . ErrorResponse ( "policy name must be provided in the URL" ) , nil
}
2022-03-24 20:29:11 +00:00
if name != policy . Name {
resp = & logical . Response { }
resp . AddWarning ( fmt . Sprintf ( "policy name was converted to %s" , policy . Name ) )
}
2017-10-23 19:35:28 +00:00
policy . Raw = data . Get ( "policy" ) . ( string )
2018-06-05 17:01:55 +00:00
if policy . Raw == "" && policyType == PolicyTypeACL && strings . HasPrefix ( req . Path , "policy" ) {
2018-06-01 16:11:33 +00:00
policy . Raw = data . Get ( "rules" ) . ( string )
if resp == nil {
resp = & logical . Response { }
}
resp . AddWarning ( "'rules' is deprecated, please use 'policy' instead" )
}
2017-10-23 19:35:28 +00:00
if policy . Raw == "" {
return logical . ErrorResponse ( "'policy' parameter not supplied or empty" ) , nil
}
if polBytes , err := base64 . StdEncoding . DecodeString ( policy . Raw ) ; err == nil {
policy . Raw = string ( polBytes )
}
switch policyType {
case PolicyTypeACL :
2018-09-18 03:03:00 +00:00
p , err := ParseACLPolicy ( ns , policy . Raw )
2017-10-23 19:35:28 +00:00
if err != nil {
return handleError ( err )
}
policy . Paths = p . Paths
2018-08-15 18:42:56 +00:00
policy . Templated = p . Templated
2017-10-23 19:35:28 +00:00
2018-09-18 03:03:00 +00:00
case PolicyTypeRGP , PolicyTypeEGP :
2017-10-23 19:35:28 +00:00
default :
return logical . ErrorResponse ( "unknown policy type" ) , nil
}
2018-09-18 03:03:00 +00:00
if policy . Type == PolicyTypeRGP || policy . Type == PolicyTypeEGP {
if errResp := inputSentinelPolicyData ( data , policy ) ; errResp != nil {
return errResp , nil
}
}
2017-10-23 19:35:28 +00:00
// Update the policy
2018-01-19 06:44:44 +00:00
if err := b . Core . policyStore . SetPolicy ( ctx , policy ) ; err != nil {
2017-10-23 19:35:28 +00:00
return handleError ( err )
}
2022-03-24 20:29:11 +00:00
2018-06-01 16:11:33 +00:00
return resp , nil
2015-03-23 21:43:31 +00:00
}
2017-10-23 19:35:28 +00:00
}
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handlePoliciesDelete ( policyType PolicyType ) framework . OperationFunc {
return func ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2017-10-23 19:35:28 +00:00
name := data . Get ( "name" ) . ( string )
2018-01-19 06:44:44 +00:00
if err := b . Core . policyStore . DeletePolicy ( ctx , name , policyType ) ; err != nil {
2017-10-23 19:35:28 +00:00
return handleError ( err )
}
return nil , nil
}
2015-03-23 21:43:31 +00:00
}
2020-05-27 18:28:00 +00:00
type passwordPolicyConfig struct {
HCLPolicy string ` json:"policy" `
}
func getPasswordPolicyKey ( policyName string ) string {
return fmt . Sprintf ( "password_policy/%s" , policyName )
}
const (
minPasswordLength = 4
maxPasswordLength = 100
)
2022-01-24 21:42:14 +00:00
// handlePoliciesPasswordList returns the list of password policies
func ( * SystemBackend ) handlePoliciesPasswordList ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( resp * logical . Response , err error ) {
keys , err := req . Storage . List ( ctx , "password_policy/" )
if err != nil {
return nil , err
}
return logical . ListResponse ( keys ) , nil
}
2020-05-27 18:28:00 +00:00
// handlePoliciesPasswordSet saves/updates password policies
func ( * SystemBackend ) handlePoliciesPasswordSet ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( resp * logical . Response , err error ) {
policyName := data . Get ( "name" ) . ( string )
if policyName == "" {
return nil , logical . CodedError ( http . StatusBadRequest , "missing policy name" )
}
rawPolicy := data . Get ( "policy" ) . ( string )
if rawPolicy == "" {
return nil , logical . CodedError ( http . StatusBadRequest , "missing policy" )
}
// Optionally decode base64 string
decodedPolicy , err := base64 . StdEncoding . DecodeString ( rawPolicy )
if err == nil {
rawPolicy = string ( decodedPolicy )
}
// Parse the policy to ensure that it's valid
policy , err := random . ParsePolicy ( rawPolicy )
if err != nil {
return nil , logical . CodedError ( http . StatusBadRequest , fmt . Sprintf ( "invalid password policy: %s" , err ) )
}
if policy . Length > maxPasswordLength || policy . Length < minPasswordLength {
return nil , logical . CodedError ( http . StatusBadRequest ,
fmt . Sprintf ( "passwords must be between %d and %d characters" , minPasswordLength , maxPasswordLength ) )
}
// Generate some passwords to ensure that we're confident that the policy isn't impossible
timeout := 1 * time . Second
genCtx , cancel := context . WithTimeout ( ctx , timeout )
defer cancel ( )
attempts := 10
failed := 0
for i := 0 ; i < attempts ; i ++ {
_ , err = policy . Generate ( genCtx , nil )
if err != nil {
failed ++
}
}
if failed == attempts {
return nil , logical . CodedError ( http . StatusBadRequest ,
fmt . Sprintf ( "unable to generate password from provided policy in %s: are the rules impossible?" , timeout ) )
}
if failed > 0 {
return nil , logical . CodedError ( http . StatusBadRequest ,
fmt . Sprintf ( "failed to generate passwords %d times out of %d attempts in %s - is the policy too restrictive?" , failed , attempts , timeout ) )
}
cfg := passwordPolicyConfig {
HCLPolicy : rawPolicy ,
}
entry , err := logical . StorageEntryJSON ( getPasswordPolicyKey ( policyName ) , cfg )
if err != nil {
return nil , logical . CodedError ( http . StatusInternalServerError , fmt . Sprintf ( "unable to save password policy: %s" , err ) )
}
err = req . Storage . Put ( ctx , entry )
if err != nil {
return nil , logical . CodedError ( http . StatusInternalServerError ,
fmt . Sprintf ( "failed to save policy to storage backend: %s" , err ) )
}
return logical . RespondWithStatusCode ( nil , req , http . StatusNoContent )
}
// handlePoliciesPasswordGet retrieves a password policy if it exists
func ( * SystemBackend ) handlePoliciesPasswordGet ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
policyName := data . Get ( "name" ) . ( string )
if policyName == "" {
return nil , logical . CodedError ( http . StatusBadRequest , "missing policy name" )
}
cfg , err := retrievePasswordPolicy ( ctx , req . Storage , policyName )
if err != nil {
return nil , logical . CodedError ( http . StatusInternalServerError , "failed to retrieve password policy" )
}
if cfg == nil {
return nil , logical . CodedError ( http . StatusNotFound , "policy does not exist" )
}
resp := & logical . Response {
Data : map [ string ] interface { } {
"policy" : cfg . HCLPolicy ,
} ,
}
return resp , nil
}
// retrievePasswordPolicy retrieves a password policy from the logical storage
func retrievePasswordPolicy ( ctx context . Context , storage logical . Storage , policyName string ) ( policyCfg * passwordPolicyConfig , err error ) {
entry , err := storage . Get ( ctx , getPasswordPolicyKey ( policyName ) )
if err != nil {
return nil , err
}
if entry == nil {
return nil , nil
}
policyCfg = & passwordPolicyConfig { }
err = json . Unmarshal ( entry . Value , & policyCfg )
if err != nil {
return nil , fmt . Errorf ( "failed to unmarshal stored data: %w" , err )
}
return policyCfg , nil
}
// handlePoliciesPasswordDelete deletes a password policy if it exists
func ( * SystemBackend ) handlePoliciesPasswordDelete ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
policyName := data . Get ( "name" ) . ( string )
if policyName == "" {
return nil , logical . CodedError ( http . StatusBadRequest , "missing policy name" )
}
err := req . Storage . Delete ( ctx , getPasswordPolicyKey ( policyName ) )
if err != nil {
return nil , logical . CodedError ( http . StatusInternalServerError ,
fmt . Sprintf ( "failed to delete password policy: %s" , err ) )
}
return nil , nil
}
// handlePoliciesPasswordGenerate generates a password from the specified password policy
func ( * SystemBackend ) handlePoliciesPasswordGenerate ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
policyName := data . Get ( "name" ) . ( string )
if policyName == "" {
return nil , logical . CodedError ( http . StatusBadRequest , "missing policy name" )
}
cfg , err := retrievePasswordPolicy ( ctx , req . Storage , policyName )
if err != nil {
return nil , logical . CodedError ( http . StatusInternalServerError , "failed to retrieve password policy" )
}
if cfg == nil {
return nil , logical . CodedError ( http . StatusNotFound , "policy does not exist" )
}
policy , err := random . ParsePolicy ( cfg . HCLPolicy )
if err != nil {
return nil , logical . CodedError ( http . StatusInternalServerError ,
"stored password policy configuration failed to parse" )
}
password , err := policy . Generate ( ctx , nil )
if err != nil {
return nil , logical . CodedError ( http . StatusInternalServerError ,
fmt . Sprintf ( "failed to generate password from policy: %s" , err ) )
}
resp := & logical . Response {
Data : map [ string ] interface { } {
"password" : password ,
} ,
}
return resp , nil
}
2015-03-31 23:45:00 +00:00
// handleAuditTable handles the "audit" endpoint to provide the audit table
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleAuditTable ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2015-11-11 16:44:07 +00:00
b . Core . auditLock . RLock ( )
defer b . Core . auditLock . RUnlock ( )
2015-03-31 23:45:00 +00:00
resp := & logical . Response {
Data : make ( map [ string ] interface { } ) ,
}
for _ , entry := range b . Core . audit . Entries {
info := map [ string ] interface { } {
2016-03-14 21:15:07 +00:00
"path" : entry . Path ,
2015-03-31 23:45:00 +00:00
"type" : entry . Type ,
"description" : entry . Description ,
"options" : entry . Options ,
2017-02-16 21:29:30 +00:00
"local" : entry . Local ,
2015-03-31 23:45:00 +00:00
}
resp . Data [ entry . Path ] = info
}
return resp , nil
}
2015-11-19 01:26:03 +00:00
// handleAuditHash is used to fetch the hash of the given input data with the
// specified audit backend's salt
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleAuditHash ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2015-11-19 01:26:03 +00:00
path := data . Get ( "path" ) . ( string )
input := data . Get ( "input" ) . ( string )
if input == "" {
return logical . ErrorResponse ( "the \"input\" parameter is empty" ) , nil
}
2020-06-29 22:36:22 +00:00
path = sanitizePath ( path )
2015-11-19 01:26:03 +00:00
2018-03-08 19:21:11 +00:00
hash , err := b . Core . auditBroker . GetHash ( ctx , path , input )
2015-11-19 01:26:03 +00:00
if err != nil {
return logical . ErrorResponse ( err . Error ( ) ) , nil
}
return & logical . Response {
Data : map [ string ] interface { } {
"hash" : hash ,
} ,
} , nil
}
2015-03-31 23:45:00 +00:00
// handleEnableAudit is used to enable a new audit backend
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleEnableAudit ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2018-01-16 18:51:55 +00:00
repState := b . Core . ReplicationState ( )
2017-02-16 21:29:30 +00:00
local := data . Get ( "local" ) . ( bool )
2019-04-11 15:12:37 +00:00
// If we are a performance secondary cluster we should forward the request
// to the primary. We fail early here since the view in use isn't marked as
// readonly
2017-09-04 23:38:37 +00:00
if ! local && repState . HasState ( consts . ReplicationPerformanceSecondary ) {
2019-04-11 15:12:37 +00:00
return nil , logical . ErrReadOnly
2017-02-16 21:29:30 +00:00
}
2015-03-31 23:45:00 +00:00
// Get all the options
path := data . Get ( "path" ) . ( string )
backendType := data . Get ( "type" ) . ( string )
description := data . Get ( "description" ) . ( string )
2018-03-21 19:04:27 +00:00
options := data . Get ( "options" ) . ( map [ string ] string )
2015-03-31 23:45:00 +00:00
// Create the mount entry
me := & MountEntry {
2016-05-26 17:38:51 +00:00
Table : auditTableType ,
2015-03-31 23:45:00 +00:00
Path : path ,
Type : backendType ,
Description : description ,
2018-03-21 19:04:27 +00:00
Options : options ,
2017-02-16 21:29:30 +00:00
Local : local ,
2015-03-31 23:45:00 +00:00
}
// Attempt enabling
2018-09-18 03:03:00 +00:00
if err := b . Core . enableAudit ( ctx , me , true ) ; err != nil {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "enable audit mount failed" , "path" , me . Path , "error" , err )
2015-08-10 17:27:25 +00:00
return handleError ( err )
2015-03-31 23:45:00 +00:00
}
return nil , nil
}
// handleDisableAudit is used to disable an audit backend
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleDisableAudit ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2015-03-31 23:45:00 +00:00
path := data . Get ( "path" ) . ( string )
2019-04-11 15:12:37 +00:00
if ! strings . HasSuffix ( path , "/" ) {
path += "/"
}
if path == "/" {
return handleError ( errors . New ( "audit device path must be specified" ) )
}
b . Core . auditLock . RLock ( )
table := b . Core . audit . shallowClone ( )
entry , err := table . find ( ctx , path )
b . Core . auditLock . RUnlock ( )
if err != nil {
return handleError ( err )
}
if entry == nil {
return nil , nil
}
repState := b . Core . ReplicationState ( )
// If we are a performance secondary cluster we should forward the request
// to the primary. We fail early here since the view in use isn't marked as
// readonly
if ! entry . Local && repState . HasState ( consts . ReplicationPerformanceSecondary ) {
return nil , logical . ErrReadOnly
}
2015-03-31 23:45:00 +00:00
// Attempt disable
2018-09-18 03:03:00 +00:00
if existed , err := b . Core . disableAudit ( ctx , path , true ) ; existed && err != nil {
2018-04-03 00:46:59 +00:00
b . Backend . Logger ( ) . Error ( "disable audit mount failed" , "path" , path , "error" , err )
2015-08-10 17:27:25 +00:00
return handleError ( err )
2015-03-31 23:45:00 +00:00
}
return nil , nil
}
2018-03-27 20:23:33 +00:00
func ( b * SystemBackend ) handleConfigUIHeadersRead ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
header := data . Get ( "header" ) . ( string )
2020-12-15 14:58:03 +00:00
multivalue := data . Get ( "multivalue" ) . ( bool )
2018-03-27 20:23:33 +00:00
2020-12-15 14:58:03 +00:00
values , err := b . Core . uiConfig . GetHeader ( ctx , header )
2018-03-27 20:23:33 +00:00
if err != nil {
return nil , err
}
2020-12-15 14:58:03 +00:00
if len ( values ) == 0 {
2018-03-27 20:23:33 +00:00
return nil , nil
}
2020-12-15 14:58:03 +00:00
// Return multiple values if specified
if multivalue {
return & logical . Response {
Data : map [ string ] interface { } {
"values" : values ,
} ,
} , nil
}
2018-03-27 20:23:33 +00:00
return & logical . Response {
Data : map [ string ] interface { } {
2020-12-15 14:58:03 +00:00
"value" : values [ 0 ] ,
2018-03-27 20:23:33 +00:00
} ,
} , nil
}
func ( b * SystemBackend ) handleConfigUIHeadersList ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
headers , err := b . Core . uiConfig . HeaderKeys ( ctx )
if err != nil {
return nil , err
}
if len ( headers ) == 0 {
return nil , nil
}
return logical . ListResponse ( headers ) , nil
}
func ( b * SystemBackend ) handleConfigUIHeadersUpdate ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
header := data . Get ( "header" ) . ( string )
values := data . Get ( "values" ) . ( [ ] string )
if header == "" || len ( values ) == 0 {
return logical . ErrorResponse ( "header and values must be specified" ) , logical . ErrInvalidRequest
}
2018-03-28 20:57:58 +00:00
lowerHeader := strings . ToLower ( header )
if strings . HasPrefix ( lowerHeader , "x-vault-" ) {
2018-03-27 20:23:33 +00:00
return logical . ErrorResponse ( "X-Vault headers cannot be set" ) , logical . ErrInvalidRequest
}
// Translate the list of values to the valid header string
2018-03-28 20:57:58 +00:00
value := http . Header { }
for _ , v := range values {
2021-10-13 15:06:33 +00:00
if b . Core . ExistCustomResponseHeader ( header ) {
return logical . ErrorResponse ( "This header already exists in the server configuration and cannot be set in the UI." ) , logical . ErrInvalidRequest
}
2018-03-28 20:57:58 +00:00
value . Add ( header , v )
2018-03-27 20:23:33 +00:00
}
2020-12-15 14:58:03 +00:00
err := b . Core . uiConfig . SetHeader ( ctx , header , value . Values ( header ) )
2018-03-27 20:23:33 +00:00
if err != nil {
return nil , err
}
2018-03-28 20:57:58 +00:00
// Warn when overriding the CSP
resp := & logical . Response { }
if lowerHeader == "content-security-policy" {
resp . AddWarning ( "overriding default Content-Security-Policy which is secure by default, proceed with caution" )
}
return resp , nil
2018-03-27 20:23:33 +00:00
}
func ( b * SystemBackend ) handleConfigUIHeadersDelete ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
header := data . Get ( "header" ) . ( string )
err := b . Core . uiConfig . DeleteHeader ( ctx , header )
if err != nil {
return nil , err
}
return nil , nil
}
2015-05-28 00:53:42 +00:00
// handleKeyStatus returns status information about the backend key
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleKeyStatus ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2015-05-28 00:53:42 +00:00
// Get the key info
info , err := b . Core . barrier . ActiveKeyInfo ( )
if err != nil {
return nil , err
}
resp := & logical . Response {
Data : map [ string ] interface { } {
"term" : info . Term ,
2016-07-25 18:11:57 +00:00
"install_time" : info . InstallTime . Format ( time . RFC3339Nano ) ,
2021-02-25 20:27:25 +00:00
"encryptions" : info . Encryptions ,
2015-05-28 00:53:42 +00:00
} ,
}
return resp , nil
}
2021-02-25 20:27:25 +00:00
// handleKeyRotationConfigRead returns the barrier key rotation config
func ( b * SystemBackend ) handleKeyRotationConfigRead ( _ context . Context , _ * logical . Request , _ * framework . FieldData ) ( * logical . Response , error ) {
// Get the key info
rotConfig , err := b . Core . barrier . RotationConfig ( )
if err != nil {
return nil , err
2017-02-16 21:29:30 +00:00
}
2021-02-25 20:27:25 +00:00
resp := & logical . Response {
Data : map [ string ] interface { } {
"max_operations" : rotConfig . MaxOperations ,
"enabled" : ! rotConfig . Disabled ,
} ,
2015-05-28 00:53:42 +00:00
}
2021-02-25 20:27:25 +00:00
if rotConfig . Interval > 0 {
resp . Data [ "interval" ] = rotConfig . Interval . String ( )
} else {
resp . Data [ "interval" ] = 0
}
return resp , nil
}
2015-05-28 23:43:15 +00:00
2021-02-25 20:27:25 +00:00
// handleKeyRotationConfigRead returns the barrier key rotation config
func ( b * SystemBackend ) handleKeyRotationConfigUpdate ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
rotConfig , err := b . Core . barrier . RotationConfig ( )
if err != nil {
return nil , err
}
maxOps , ok , err := data . GetOkErr ( "max_operations" )
if err != nil {
return nil , err
}
if ok {
2021-05-05 19:39:04 +00:00
rotConfig . MaxOperations = maxOps . ( int64 )
2021-02-25 20:27:25 +00:00
}
interval , ok , err := data . GetOkErr ( "interval" )
if err != nil {
return nil , err
}
if ok {
rotConfig . Interval = time . Second * time . Duration ( interval . ( int ) )
}
2015-05-28 23:43:15 +00:00
2021-02-25 20:27:25 +00:00
enabled , ok , err := data . GetOkErr ( "enabled" )
if err != nil {
return nil , err
}
if ok {
rotConfig . Disabled = ! enabled . ( bool )
}
2021-03-18 20:08:47 +00:00
// Reject out of range settings
2021-05-05 19:39:04 +00:00
if rotConfig . Interval < minimumRotationInterval && rotConfig . Interval != 0 {
2021-03-18 20:08:47 +00:00
return logical . ErrorResponse ( "interval must be greater or equal to %s" , minimumRotationInterval . String ( ) ) , logical . ErrInvalidRequest
}
if rotConfig . MaxOperations < absoluteOperationMinimum || rotConfig . MaxOperations > absoluteOperationMaximum {
return logical . ErrorResponse ( "max_operations must be in the range [%d,%d]" , absoluteOperationMinimum , absoluteOperationMaximum ) , logical . ErrInvalidRequest
}
2021-02-25 20:27:25 +00:00
// Store the rotation config
b . Core . barrier . SetRotationConfig ( ctx , rotConfig )
if err != nil {
return nil , err
2015-05-28 23:43:15 +00:00
}
2017-02-16 21:29:30 +00:00
2021-02-25 20:27:25 +00:00
return nil , nil
}
// handleRotate is used to trigger a key rotation
func ( b * SystemBackend ) handleRotate ( ctx context . Context , _ * logical . Request , _ * framework . FieldData ) ( * logical . Response , error ) {
repState := b . Core . ReplicationState ( )
if repState . HasState ( consts . ReplicationPerformanceSecondary ) {
return logical . ErrorResponse ( "cannot rotate on a replication secondary" ) , nil
2017-02-16 21:29:30 +00:00
}
2021-02-25 20:27:25 +00:00
if err := b . rotateBarrierKey ( ctx ) ; err != nil {
b . Backend . Logger ( ) . Error ( "error handling key rotation" , "error" , err )
return handleError ( err )
}
2015-05-28 00:53:42 +00:00
return nil , nil
}
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleWrappingPubkey ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2017-01-04 21:44:03 +00:00
x , _ := b . Core . wrappingJWTKey . X . MarshalText ( )
y , _ := b . Core . wrappingJWTKey . Y . MarshalText ( )
return & logical . Response {
Data : map [ string ] interface { } {
"jwt_x" : string ( x ) ,
"jwt_y" : string ( y ) ,
"jwt_curve" : corePrivateKeyTypeP521 ,
} ,
} , nil
}
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleWrappingWrap ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2017-01-04 21:44:03 +00:00
if req . WrapInfo == nil || req . WrapInfo . TTL == 0 {
2016-09-29 04:01:28 +00:00
return logical . ErrorResponse ( "endpoint requires response wrapping to be used" ) , logical . ErrInvalidRequest
}
2017-02-22 16:13:40 +00:00
// N.B.: Do *NOT* allow JWT wrapping tokens to be created through this
// endpoint. JWTs are signed so if we don't allow users to create wrapping
// tokens using them we can ensure that an operator can't spoof a legit JWT
// wrapped token, which makes certain init/rekey/generate-root cases have
// better properties.
req . WrapInfo . Format = "uuid"
2016-09-29 04:01:28 +00:00
return & logical . Response {
Data : data . Raw ,
} , nil
}
2018-09-18 03:03:00 +00:00
// handleWrappingUnwrap will unwrap a response wrapping token or complete a
// request that required a control group.
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleWrappingUnwrap ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2016-09-29 04:01:28 +00:00
// If a third party is unwrapping (rather than the calling token being the
// wrapping token) we detect this so that we can revoke the original
// wrapping token after reading it
var thirdParty bool
token := data . Get ( "token" ) . ( string )
if token != "" {
thirdParty = true
} else {
token = req . ClientToken
}
2017-11-13 20:31:32 +00:00
// Get the policies so we can determine if this is a normal response
// wrapping request or a control group token.
//
// We use lookupTainted here because the token might have already been used
// by handleRequest(), this happens when it's a normal response wrapping
// request and the token was provided "first party". We want to inspect the
// token policies but will not use this token entry for anything else.
2018-01-19 06:44:44 +00:00
te , err := b . Core . tokenStore . lookupTainted ( ctx , token )
2017-11-13 20:31:32 +00:00
if err != nil {
return nil , err
}
if te == nil {
2018-09-18 03:03:00 +00:00
return nil , nil
2017-11-13 20:31:32 +00:00
}
if len ( te . Policies ) != 1 {
return nil , errors . New ( "token is not a valid unwrap token" )
}
2018-09-18 03:03:00 +00:00
unwrapNS , err := NamespaceByID ( ctx , te . NamespaceID , b . Core )
if err != nil {
return nil , err
}
2021-10-19 00:29:47 +00:00
if unwrapNS == nil {
return nil , errors . New ( "token is not from a valid namespace" )
}
2018-09-18 03:03:00 +00:00
unwrapCtx := namespace . ContextWithNamespace ( ctx , unwrapNS )
2017-11-13 20:31:32 +00:00
var response string
switch te . Policies [ 0 ] {
2018-09-18 03:03:00 +00:00
case controlGroupPolicyName :
response , err = controlGroupUnwrap ( unwrapCtx , b , token , thirdParty )
2017-11-13 20:31:32 +00:00
case responseWrappingPolicyName :
2018-09-18 03:03:00 +00:00
response , err = b . responseWrappingUnwrap ( unwrapCtx , te , thirdParty )
2017-11-13 20:31:32 +00:00
}
if err != nil {
var respErr * logical . Response
if len ( response ) > 0 {
respErr = logical . ErrorResponse ( response )
}
return respErr , err
}
resp := & logical . Response {
Data : map [ string ] interface { } { } ,
}
Fix response wrapping from K/V version 2 (#4511)
This takes place in two parts, since working on this exposed an issue
with response wrapping when there is a raw body set. The changes are (in
diff order):
* A CurrentWrappingLookupFunc has been added to return the current
value. This is necessary for the lookahead call since we don't want the
lookahead call to be wrapped.
* Support for unwrapping < 0.6.2 tokens via the API/CLI has been
removed, because we now have backends returning 404s with data and can't
rely on the 404 trick. These can still be read manually via
cubbyhole/response.
* KV preflight version request now ensures that its calls is not
wrapped, and restores any given function after.
* When responding with a raw body, instead of always base64-decoding a
string value and erroring on failure, on failure we assume that it
simply wasn't a base64-encoded value and use it as is.
* A test that fails on master and works now that ensures that raw body
responses that are wrapped and then unwrapped return the expected
values.
* A flag for response data that indicates to the wrapping handling that
the data contained therein is already JSON decoded (more later).
* RespondWithStatusCode now defaults to a string so that the value is
HMAC'd during audit. The function always JSON encodes the body, so
before now it was always returning []byte which would skip HMACing. We
don't know what's in the data, so this is a "better safe than sorry"
issue. If different behavior is needed, backends can always manually
populate the data instead of relying on the helper function.
* We now check unwrapped data after unwrapping to see if there were raw
flags. If so, we try to detect whether the value can be unbase64'd. The
reason is that if it can it was probably originally a []byte and
shouldn't be audit HMAC'd; if not, it was probably originally a string
and should be. In either case, we then set the value as the raw body and
hit the flag indicating that it's already been JSON decoded so not to
try again before auditing. Doing it this way ensures the right typing.
* There is now a check to see if the data coming from unwrapping is
already JSON decoded and if so the decoding is skipped before setting
the audit response.
2018-05-10 19:40:03 +00:00
2020-04-09 18:09:23 +00:00
if len ( response ) == 0 {
resp . Data [ logical . HTTPStatusCode ] = 204
return resp , nil
}
Fix response wrapping from K/V version 2 (#4511)
This takes place in two parts, since working on this exposed an issue
with response wrapping when there is a raw body set. The changes are (in
diff order):
* A CurrentWrappingLookupFunc has been added to return the current
value. This is necessary for the lookahead call since we don't want the
lookahead call to be wrapped.
* Support for unwrapping < 0.6.2 tokens via the API/CLI has been
removed, because we now have backends returning 404s with data and can't
rely on the 404 trick. These can still be read manually via
cubbyhole/response.
* KV preflight version request now ensures that its calls is not
wrapped, and restores any given function after.
* When responding with a raw body, instead of always base64-decoding a
string value and erroring on failure, on failure we assume that it
simply wasn't a base64-encoded value and use it as is.
* A test that fails on master and works now that ensures that raw body
responses that are wrapped and then unwrapped return the expected
values.
* A flag for response data that indicates to the wrapping handling that
the data contained therein is already JSON decoded (more later).
* RespondWithStatusCode now defaults to a string so that the value is
HMAC'd during audit. The function always JSON encodes the body, so
before now it was always returning []byte which would skip HMACing. We
don't know what's in the data, so this is a "better safe than sorry"
issue. If different behavior is needed, backends can always manually
populate the data instead of relying on the helper function.
* We now check unwrapped data after unwrapping to see if there were raw
flags. If so, we try to detect whether the value can be unbase64'd. The
reason is that if it can it was probably originally a []byte and
shouldn't be audit HMAC'd; if not, it was probably originally a string
and should be. In either case, we then set the value as the raw body and
hit the flag indicating that it's already been JSON decoded so not to
try again before auditing. Doing it this way ensures the right typing.
* There is now a check to see if the data coming from unwrapping is
already JSON decoded and if so the decoding is skipped before setting
the audit response.
2018-05-10 19:40:03 +00:00
// Most of the time we want to just send over the marshalled HTTP bytes.
// However there is a sad separate case: if the original response was using
// bare values we need to use those or else what comes back is garbled.
httpResp := & logical . HTTPResponse { }
err = jsonutil . DecodeJSON ( [ ] byte ( response ) , httpResp )
if err != nil {
2021-05-11 17:12:54 +00:00
return nil , fmt . Errorf ( "error decoding wrapped response: %w" , err )
Fix response wrapping from K/V version 2 (#4511)
This takes place in two parts, since working on this exposed an issue
with response wrapping when there is a raw body set. The changes are (in
diff order):
* A CurrentWrappingLookupFunc has been added to return the current
value. This is necessary for the lookahead call since we don't want the
lookahead call to be wrapped.
* Support for unwrapping < 0.6.2 tokens via the API/CLI has been
removed, because we now have backends returning 404s with data and can't
rely on the 404 trick. These can still be read manually via
cubbyhole/response.
* KV preflight version request now ensures that its calls is not
wrapped, and restores any given function after.
* When responding with a raw body, instead of always base64-decoding a
string value and erroring on failure, on failure we assume that it
simply wasn't a base64-encoded value and use it as is.
* A test that fails on master and works now that ensures that raw body
responses that are wrapped and then unwrapped return the expected
values.
* A flag for response data that indicates to the wrapping handling that
the data contained therein is already JSON decoded (more later).
* RespondWithStatusCode now defaults to a string so that the value is
HMAC'd during audit. The function always JSON encodes the body, so
before now it was always returning []byte which would skip HMACing. We
don't know what's in the data, so this is a "better safe than sorry"
issue. If different behavior is needed, backends can always manually
populate the data instead of relying on the helper function.
* We now check unwrapped data after unwrapping to see if there were raw
flags. If so, we try to detect whether the value can be unbase64'd. The
reason is that if it can it was probably originally a []byte and
shouldn't be audit HMAC'd; if not, it was probably originally a string
and should be. In either case, we then set the value as the raw body and
hit the flag indicating that it's already been JSON decoded so not to
try again before auditing. Doing it this way ensures the right typing.
* There is now a check to see if the data coming from unwrapping is
already JSON decoded and if so the decoding is skipped before setting
the audit response.
2018-05-10 19:40:03 +00:00
}
if httpResp . Data != nil &&
( httpResp . Data [ logical . HTTPStatusCode ] != nil ||
httpResp . Data [ logical . HTTPRawBody ] != nil ||
httpResp . Data [ logical . HTTPContentType ] != nil ) {
if httpResp . Data [ logical . HTTPStatusCode ] != nil {
resp . Data [ logical . HTTPStatusCode ] = httpResp . Data [ logical . HTTPStatusCode ]
}
if httpResp . Data [ logical . HTTPContentType ] != nil {
resp . Data [ logical . HTTPContentType ] = httpResp . Data [ logical . HTTPContentType ]
}
rawBody := httpResp . Data [ logical . HTTPRawBody ]
if rawBody != nil {
// Decode here so that we can audit properly
switch rawBody . ( type ) {
case string :
// Best effort decoding; if this works, the original value was
// probably a []byte instead of a string, but was marshaled
// when the value was saved, so this restores it as it was
decBytes , err := base64 . StdEncoding . DecodeString ( rawBody . ( string ) )
if err == nil {
// We end up with []byte, will not be HMAC'd
resp . Data [ logical . HTTPRawBody ] = decBytes
} else {
// We end up with string, will be HMAC'd
resp . Data [ logical . HTTPRawBody ] = rawBody
}
default :
b . Core . Logger ( ) . Error ( "unexpected type of raw body when decoding wrapped token" , "type" , fmt . Sprintf ( "%T" , rawBody ) )
}
resp . Data [ logical . HTTPRawBodyAlreadyJSONDecoded ] = true
}
return resp , nil
}
2020-04-09 18:09:23 +00:00
resp . Data [ logical . HTTPStatusCode ] = 200
resp . Data [ logical . HTTPRawBody ] = [ ] byte ( response )
resp . Data [ logical . HTTPContentType ] = "application/json"
2017-11-13 20:31:32 +00:00
return resp , nil
}
// responseWrappingUnwrap will read the stored response in the cubbyhole and
// return the raw HTTP response.
2018-09-18 03:03:00 +00:00
func ( b * SystemBackend ) responseWrappingUnwrap ( ctx context . Context , te * logical . TokenEntry , thirdParty bool ) ( string , error ) {
tokenID := te . ID
2016-09-29 04:01:28 +00:00
if thirdParty {
// Use the token to decrement the use count to avoid a second operation on the token.
2018-09-18 03:03:00 +00:00
_ , err := b . Core . tokenStore . UseTokenByID ( ctx , tokenID )
2016-09-29 04:01:28 +00:00
if err != nil {
2021-05-11 17:12:54 +00:00
return "" , fmt . Errorf ( "error decrementing wrapping token's use-count: %w" , err )
2016-09-29 04:01:28 +00:00
}
2018-09-18 03:03:00 +00:00
defer b . Core . tokenStore . revokeOrphan ( ctx , tokenID )
2016-09-29 04:01:28 +00:00
}
cubbyReq := & logical . Request {
Operation : logical . ReadOperation ,
Path : "cubbyhole/response" ,
2018-09-18 03:03:00 +00:00
ClientToken : tokenID ,
2016-09-29 04:01:28 +00:00
}
2018-09-18 03:03:00 +00:00
cubbyReq . SetTokenEntry ( te )
2018-01-08 18:31:38 +00:00
cubbyResp , err := b . Core . router . Route ( ctx , cubbyReq )
2016-09-29 04:01:28 +00:00
if err != nil {
2021-05-11 17:12:54 +00:00
return "" , fmt . Errorf ( "error looking up wrapping information: %w" , err )
2016-09-29 04:01:28 +00:00
}
if cubbyResp == nil {
2017-11-13 20:31:32 +00:00
return "no information found; wrapping token may be from a previous Vault version" , ErrInternalError
2016-09-29 04:01:28 +00:00
}
if cubbyResp != nil && cubbyResp . IsError ( ) {
2017-11-13 20:31:32 +00:00
return cubbyResp . Error ( ) . Error ( ) , nil
2016-09-29 04:01:28 +00:00
}
if cubbyResp . Data == nil {
2017-11-13 20:31:32 +00:00
return "wrapping information was nil; wrapping token may be from a previous Vault version" , ErrInternalError
2016-09-29 04:01:28 +00:00
}
responseRaw := cubbyResp . Data [ "response" ]
if responseRaw == nil {
2017-11-13 20:31:32 +00:00
return "" , fmt . Errorf ( "no response found inside the cubbyhole" )
2016-09-29 04:01:28 +00:00
}
response , ok := responseRaw . ( string )
if ! ok {
2017-11-13 20:31:32 +00:00
return "" , fmt . Errorf ( "could not decode response inside the cubbyhole" )
2016-09-29 04:01:28 +00:00
}
2017-11-13 20:31:32 +00:00
return response , nil
2016-09-29 04:01:28 +00:00
}
2019-02-14 20:46:59 +00:00
func ( b * SystemBackend ) handleMetrics ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
format := data . Get ( "format" ) . ( string )
if format == "" {
format = metricsutil . FormatFromRequest ( req )
}
2019-10-08 12:55:25 +00:00
return b . Core . metricsHelper . ResponseForFormat ( format ) , nil
2019-02-14 20:46:59 +00:00
}
2021-12-08 22:34:42 +00:00
func ( b * SystemBackend ) handleInFlightRequestData ( _ context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
resp := & logical . Response {
Data : map [ string ] interface { } {
logical . HTTPContentType : "text/plain" ,
logical . HTTPStatusCode : http . StatusInternalServerError ,
} ,
}
currentInFlightReqMap := b . Core . LoadInFlightReqData ( )
content , err := json . Marshal ( currentInFlightReqMap )
if err != nil {
resp . Data [ logical . HTTPRawBody ] = fmt . Sprintf ( "error while marshalling the in-flight requests data: %s" , err )
return resp , nil
}
resp . Data [ logical . HTTPContentType ] = "application/json"
resp . Data [ logical . HTTPRawBody ] = content
resp . Data [ logical . HTTPStatusCode ] = http . StatusOK
return resp , nil
}
2020-05-21 20:07:50 +00:00
func ( b * SystemBackend ) handleMonitor ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
ll := data . Get ( "log_level" ) . ( string )
w := req . ResponseWriter
if ll == "" {
ll = "info"
}
logLevel := log . LevelFromString ( ll )
if logLevel == log . NoLevel {
return logical . ErrorResponse ( "unknown log level" ) , nil
}
2022-05-24 17:10:53 +00:00
lf := data . Get ( "log_format" ) . ( string )
lowerLogFormat := strings . ToLower ( lf )
validFormats := [ ] string { "standard" , "json" }
if ! strutil . StrListContains ( validFormats , lowerLogFormat ) {
return logical . ErrorResponse ( "unknown log format" ) , nil
}
2020-05-21 20:07:50 +00:00
flusher , ok := w . ResponseWriter . ( http . Flusher )
if ! ok {
2021-11-23 19:30:25 +00:00
// http.ResponseWriter is wrapped in wrapGenericHandler, so let's
// access the underlying functionality
nw , ok := w . ResponseWriter . ( logical . WrappingResponseWriter )
if ! ok {
return logical . ErrorResponse ( "streaming not supported" ) , nil
}
flusher , ok = nw . Wrapped ( ) . ( http . Flusher )
if ! ok {
return logical . ErrorResponse ( "streaming not supported" ) , nil
}
2020-05-21 20:07:50 +00:00
}
2022-05-24 17:10:53 +00:00
isJson := b . Core . LogFormat ( ) == "json" || lf == "json"
2020-05-21 20:07:50 +00:00
logger := b . Core . Logger ( ) . ( log . InterceptLogger )
mon , err := monitor . NewMonitor ( 512 , logger , & log . LoggerOptions {
Level : logLevel ,
JSONFormat : isJson ,
} )
if err != nil {
2020-06-29 19:58:41 +00:00
return nil , err
2020-05-21 20:07:50 +00:00
}
logCh := mon . Start ( )
2020-06-29 19:58:41 +00:00
defer mon . Stop ( )
2020-05-21 20:07:50 +00:00
if logCh == nil {
2020-06-29 19:58:41 +00:00
return nil , fmt . Errorf ( "error trying to start a monitor that's already been started" )
2020-05-21 20:07:50 +00:00
}
w . WriteHeader ( http . StatusOK )
// 0 byte write is needed before the Flush call so that if we are using
// a gzip stream it will go ahead and write out the HTTP response header
_ , err = w . Write ( [ ] byte ( "" ) )
if err != nil {
2020-06-29 19:58:41 +00:00
return nil , fmt . Errorf ( "error seeding flusher: %w" , err )
2020-05-21 20:07:50 +00:00
}
flusher . Flush ( )
2020-06-29 19:58:41 +00:00
ticker := time . NewTicker ( 1 * time . Second )
defer ticker . Stop ( )
2020-05-21 20:07:50 +00:00
// Stream logs until the connection is closed.
for {
select {
2020-06-29 19:58:41 +00:00
// Periodically check for the seal status and return if core gets
// marked as sealed.
case <- ticker . C :
if b . Core . Sealed ( ) {
// We still return the error, but this will be ignored upstream
// due to the fact that we've already sent a response by
// writing the header and flushing the writer above.
_ , err = fmt . Fprint ( w , "core received sealed state change, ending monitor session" )
if err != nil {
return nil , fmt . Errorf ( "error checking seal state: %w" , err )
}
}
2020-05-21 20:07:50 +00:00
case <- ctx . Done ( ) :
2020-06-29 19:58:41 +00:00
return nil , nil
2020-05-21 20:07:50 +00:00
case l := <- logCh :
2020-06-29 19:58:41 +00:00
// We still return the error, but this will be ignored upstream
// due to the fact that we've already sent a response by
// writing the header and flushing the writer above.
2020-05-21 20:07:50 +00:00
_ , err = fmt . Fprint ( w , string ( l ) )
if err != nil {
2020-06-29 19:58:41 +00:00
return nil , fmt . Errorf ( "error streaming monitor output: %w" , err )
2020-05-21 20:07:50 +00:00
}
flusher . Flush ( )
}
}
}
2019-10-03 16:43:52 +00:00
// handleHostInfo collects and returns host-related information, which includes
// system information, cpu, disk, and memory usage. Any capture-related errors
// returned by the collection method will be returned as response warnings.
func ( b * SystemBackend ) handleHostInfo ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
resp := & logical . Response { }
2019-11-01 17:12:22 +00:00
info , err := hostutil . CollectHostInfo ( ctx )
2019-10-03 16:43:52 +00:00
if err != nil {
// If the error is a HostInfoError, we return them as response warnings
if errs , ok := err . ( * multierror . Error ) ; ok {
var warnings [ ] string
for _ , mErr := range errs . Errors {
if errwrap . ContainsType ( mErr , new ( hostutil . HostInfoError ) ) {
warnings = append ( warnings , mErr . Error ( ) )
} else {
// If the error is a multierror, it should only be for
// HostInfoError, but if it's not for any reason, we return
// it as an error to avoid it being swallowed.
return nil , err
}
}
resp . Warnings = warnings
} else {
return nil , err
}
}
if info == nil {
return nil , errors . New ( "unable to collect host information: nil HostInfo" )
}
respData := map [ string ] interface { } {
"timestamp" : info . Timestamp ,
}
if info . CPU != nil {
respData [ "cpu" ] = info . CPU
}
if info . CPUTimes != nil {
respData [ "cpu_times" ] = info . CPUTimes
}
if info . Disk != nil {
respData [ "disk" ] = info . Disk
}
if info . Host != nil {
respData [ "host" ] = info . Host
}
if info . Memory != nil {
respData [ "memory" ] = info . Memory
}
resp . Data = respData
return resp , nil
}
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleWrappingLookup ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2017-07-31 20:16:16 +00:00
// This ordering of lookups has been validated already in the wrapping
// validation func, we're just doing this for a safety check
2016-09-29 04:01:28 +00:00
token := data . Get ( "token" ) . ( string )
if token == "" {
2017-07-31 20:16:16 +00:00
token = req . ClientToken
if token == "" {
return logical . ErrorResponse ( "missing \"token\" value in input" ) , logical . ErrInvalidRequest
}
2016-09-29 04:01:28 +00:00
}
2018-09-18 03:03:00 +00:00
te , err := b . Core . tokenStore . lookupTainted ( ctx , token )
if err != nil {
return nil , err
}
if te == nil {
return nil , nil
}
if len ( te . Policies ) != 1 {
return nil , errors . New ( "token is not a valid unwrap token" )
}
2022-05-26 19:17:29 +00:00
lookupNS , err := NamespaceByID ( ctx , te . NamespaceID , b . Core )
if err != nil {
return nil , err
}
if lookupNS == nil {
return nil , errors . New ( "token is not from a valid namespace" )
}
lookupCtx := namespace . ContextWithNamespace ( ctx , lookupNS )
2016-09-29 04:01:28 +00:00
cubbyReq := & logical . Request {
Operation : logical . ReadOperation ,
Path : "cubbyhole/wrapinfo" ,
ClientToken : token ,
}
2018-09-18 03:03:00 +00:00
cubbyReq . SetTokenEntry ( te )
2022-05-26 19:17:29 +00:00
cubbyResp , err := b . Core . router . Route ( lookupCtx , cubbyReq )
2016-09-29 04:01:28 +00:00
if err != nil {
2021-05-11 17:12:54 +00:00
return nil , fmt . Errorf ( "error looking up wrapping information: %w" , err )
2016-09-29 04:01:28 +00:00
}
if cubbyResp == nil {
return logical . ErrorResponse ( "no information found; wrapping token may be from a previous Vault version" ) , nil
}
if cubbyResp != nil && cubbyResp . IsError ( ) {
return cubbyResp , nil
}
if cubbyResp . Data == nil {
return logical . ErrorResponse ( "wrapping information was nil; wrapping token may be from a previous Vault version" ) , nil
}
creationTTLRaw := cubbyResp . Data [ "creation_ttl" ]
creationTime := cubbyResp . Data [ "creation_time" ]
2017-08-02 22:28:58 +00:00
creationPath := cubbyResp . Data [ "creation_path" ]
2016-09-29 04:01:28 +00:00
resp := & logical . Response {
Data : map [ string ] interface { } { } ,
}
if creationTTLRaw != nil {
creationTTL , err := creationTTLRaw . ( json . Number ) . Int64 ( )
if err != nil {
2021-05-11 17:12:54 +00:00
return nil , fmt . Errorf ( "error reading creation_ttl value from wrapping information: %w" , err )
2016-09-29 04:01:28 +00:00
}
resp . Data [ "creation_ttl" ] = time . Duration ( creationTTL ) . Seconds ( )
}
if creationTime != nil {
// This was JSON marshaled so it's already a string in RFC3339 format
resp . Data [ "creation_time" ] = cubbyResp . Data [ "creation_time" ]
}
2017-08-02 22:28:58 +00:00
if creationPath != nil {
resp . Data [ "creation_path" ] = cubbyResp . Data [ "creation_path" ]
}
2016-09-29 04:01:28 +00:00
return resp , nil
}
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) handleWrappingRewrap ( ctx context . Context , req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
2016-09-29 04:01:28 +00:00
// If a third party is rewrapping (rather than the calling token being the
// wrapping token) we detect this so that we can revoke the original
// wrapping token after reading it. Right now wrapped tokens can't unwrap
// themselves, but in case we change it, this will be ready to do the right
// thing.
var thirdParty bool
token := data . Get ( "token" ) . ( string )
if token != "" {
thirdParty = true
} else {
token = req . ClientToken
}
2018-09-18 03:03:00 +00:00
te , err := b . Core . tokenStore . lookupTainted ( ctx , token )
if err != nil {
return nil , err
}
if te == nil {
return nil , nil
}
if len ( te . Policies ) != 1 {
return nil , errors . New ( "token is not a valid unwrap token" )
}
2016-09-29 04:01:28 +00:00
if thirdParty {
// Use the token to decrement the use count to avoid a second operation on the token.
2018-01-19 06:44:44 +00:00
_ , err := b . Core . tokenStore . UseTokenByID ( ctx , token )
2016-09-29 04:01:28 +00:00
if err != nil {
2021-05-11 17:12:54 +00:00
return nil , fmt . Errorf ( "error decrementing wrapping token's use-count: %w" , err )
2016-09-29 04:01:28 +00:00
}
2018-05-10 19:50:02 +00:00
defer b . Core . tokenStore . revokeOrphan ( ctx , token )
2016-09-29 04:01:28 +00:00
}
// Fetch the original TTL
cubbyReq := & logical . Request {
Operation : logical . ReadOperation ,
Path : "cubbyhole/wrapinfo" ,
ClientToken : token ,
}
2018-09-18 03:03:00 +00:00
cubbyReq . SetTokenEntry ( te )
2018-01-08 18:31:38 +00:00
cubbyResp , err := b . Core . router . Route ( ctx , cubbyReq )
2016-09-29 04:01:28 +00:00
if err != nil {
2021-05-11 17:12:54 +00:00
return nil , fmt . Errorf ( "error looking up wrapping information: %w" , err )
2016-09-29 04:01:28 +00:00
}
if cubbyResp == nil {
return logical . ErrorResponse ( "no information found; wrapping token may be from a previous Vault version" ) , nil
}
if cubbyResp != nil && cubbyResp . IsError ( ) {
return cubbyResp , nil
}
if cubbyResp . Data == nil {
return logical . ErrorResponse ( "wrapping information was nil; wrapping token may be from a previous Vault version" ) , nil
}
// Set the creation TTL on the request
creationTTLRaw := cubbyResp . Data [ "creation_ttl" ]
if creationTTLRaw == nil {
return nil , fmt . Errorf ( "creation_ttl value in wrapping information was nil" )
}
creationTTL , err := cubbyResp . Data [ "creation_ttl" ] . ( json . Number ) . Int64 ( )
if err != nil {
2021-05-11 17:12:54 +00:00
return nil , fmt . Errorf ( "error reading creation_ttl value from wrapping information: %w" , err )
2016-09-29 04:01:28 +00:00
}
2017-08-02 22:28:58 +00:00
// Get creation_path to return as the response later
creationPathRaw := cubbyResp . Data [ "creation_path" ]
if creationPathRaw == nil {
return nil , fmt . Errorf ( "creation_path value in wrapping information was nil" )
}
creationPath := creationPathRaw . ( string )
2016-09-29 04:01:28 +00:00
// Fetch the original response and return it as the data for the new response
cubbyReq = & logical . Request {
Operation : logical . ReadOperation ,
Path : "cubbyhole/response" ,
ClientToken : token ,
}
2018-09-18 03:03:00 +00:00
cubbyReq . SetTokenEntry ( te )
2018-01-08 18:31:38 +00:00
cubbyResp , err = b . Core . router . Route ( ctx , cubbyReq )
2016-09-29 04:01:28 +00:00
if err != nil {
2021-05-11 17:12:54 +00:00
return nil , fmt . Errorf ( "error looking up response: %w" , err )
2016-09-29 04:01:28 +00:00
}
if cubbyResp == nil {
return logical . ErrorResponse ( "no information found; wrapping token may be from a previous Vault version" ) , nil
}
if cubbyResp != nil && cubbyResp . IsError ( ) {
return cubbyResp , nil
}
if cubbyResp . Data == nil {
return logical . ErrorResponse ( "wrapping information was nil; wrapping token may be from a previous Vault version" ) , nil
}
response := cubbyResp . Data [ "response" ]
if response == nil {
return nil , fmt . Errorf ( "no response found inside the cubbyhole" )
}
// Return response in "response"; wrapping code will detect the rewrap and
// slot in instead of nesting
return & logical . Response {
Data : map [ string ] interface { } {
"response" : response ,
} ,
2017-04-24 19:15:01 +00:00
WrapInfo : & wrapping . ResponseWrapInfo {
2017-08-02 22:28:58 +00:00
TTL : time . Duration ( creationTTL ) ,
CreationPath : creationPath ,
2016-11-11 20:12:11 +00:00
} ,
2016-09-29 04:01:28 +00:00
} , nil
}
2018-01-08 18:31:38 +00:00
func ( b * SystemBackend ) pathHashWrite ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2017-10-20 14:59:17 +00:00
inputB64 := d . Get ( "input" ) . ( string )
format := d . Get ( "format" ) . ( string )
algorithm := d . Get ( "urlalgorithm" ) . ( string )
if algorithm == "" {
algorithm = d . Get ( "algorithm" ) . ( string )
}
input , err := base64 . StdEncoding . DecodeString ( inputB64 )
if err != nil {
return logical . ErrorResponse ( fmt . Sprintf ( "unable to decode input as base64: %s" , err ) ) , logical . ErrInvalidRequest
}
switch format {
case "hex" :
case "base64" :
default :
return logical . ErrorResponse ( fmt . Sprintf ( "unsupported encoding format %s; must be \"hex\" or \"base64\"" , format ) ) , nil
}
var hf hash . Hash
switch algorithm {
case "sha2-224" :
hf = sha256 . New224 ( )
case "sha2-256" :
hf = sha256 . New ( )
case "sha2-384" :
hf = sha512 . New384 ( )
case "sha2-512" :
hf = sha512 . New ( )
2021-12-08 18:29:33 +00:00
case "sha3-224" :
hf = sha3 . New224 ( )
case "sha3-256" :
hf = sha3 . New256 ( )
case "sha3-384" :
hf = sha3 . New384 ( )
case "sha3-512" :
hf = sha3 . New512 ( )
2017-10-20 14:59:17 +00:00
default :
return logical . ErrorResponse ( fmt . Sprintf ( "unsupported algorithm %s" , algorithm ) ) , nil
}
hf . Write ( input )
retBytes := hf . Sum ( nil )
var retStr string
switch format {
case "hex" :
retStr = hex . EncodeToString ( retBytes )
case "base64" :
retStr = base64 . StdEncoding . EncodeToString ( retBytes )
}
// Generate the response
resp := & logical . Response {
Data : map [ string ] interface { } {
"sum" : retStr ,
} ,
}
return resp , nil
}
2022-05-02 19:42:07 +00:00
func ( b * SystemBackend ) pathRandomWrite ( _ context . Context , _ * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
return random . HandleRandomAPI ( d , b . Core . secureRandomReader )
2017-10-20 14:59:17 +00:00
}
2018-09-18 03:03:00 +00:00
func hasMountAccess ( ctx context . Context , acl * ACL , path string ) bool {
ns , err := namespace . FromContext ( ctx )
if err != nil {
return false
}
2019-04-10 21:46:17 +00:00
// If a policy is giving us direct access to the mount path then we can do
2019-03-04 22:08:21 +00:00
// a fast return.
capabilities := acl . Capabilities ( ctx , ns . TrimmedPath ( path ) )
if ! strutil . StrListContains ( capabilities , DenyCapability ) {
2018-04-23 22:00:02 +00:00
return true
}
2018-03-20 03:16:33 +00:00
2018-04-23 22:00:02 +00:00
var aclCapabilitiesGiven bool
walkFn := func ( s string , v interface { } ) bool {
if v == nil {
return false
}
perms := v . ( * ACLPermissions )
switch {
case perms . CapabilitiesBitmap & DenyCapabilityInt > 0 :
return false
case perms . CapabilitiesBitmap & CreateCapabilityInt > 0 ,
perms . CapabilitiesBitmap & DeleteCapabilityInt > 0 ,
perms . CapabilitiesBitmap & ListCapabilityInt > 0 ,
perms . CapabilitiesBitmap & ReadCapabilityInt > 0 ,
perms . CapabilitiesBitmap & SudoCapabilityInt > 0 ,
2021-10-13 19:24:31 +00:00
perms . CapabilitiesBitmap & UpdateCapabilityInt > 0 ,
perms . CapabilitiesBitmap & PatchCapabilityInt > 0 :
2018-04-23 22:00:02 +00:00
aclCapabilitiesGiven = true
2019-04-10 21:46:17 +00:00
2018-04-23 22:00:02 +00:00
return true
}
return false
}
acl . exactRules . WalkPrefix ( path , walkFn )
if ! aclCapabilitiesGiven {
2019-01-23 18:55:40 +00:00
acl . prefixRules . WalkPrefix ( path , walkFn )
2018-04-23 22:00:02 +00:00
}
2019-04-10 21:46:17 +00:00
if ! aclCapabilitiesGiven {
if perms := acl . CheckAllowedFromNonExactPaths ( path , true ) ; perms != nil {
return true
}
}
2018-04-23 22:00:02 +00:00
return aclCapabilitiesGiven
}
func ( b * SystemBackend ) pathInternalUIMountsRead ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2018-09-18 03:03:00 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
2018-03-20 03:16:33 +00:00
resp := & logical . Response {
Data : make ( map [ string ] interface { } ) ,
}
secretMounts := make ( map [ string ] interface { } )
authMounts := make ( map [ string ] interface { } )
resp . Data [ "secret" ] = secretMounts
resp . Data [ "auth" ] = authMounts
2018-04-23 22:00:02 +00:00
var acl * ACL
var isAuthed bool
if req . ClientToken != "" {
isAuthed = true
var entity * identity . Entity
2018-06-19 16:57:19 +00:00
var te * logical . TokenEntry
2018-04-23 22:00:02 +00:00
// Load the ACL policies so we can walk the prefix for this mount
2018-09-18 03:03:00 +00:00
acl , te , entity , _ , err = b . Core . fetchACLTokenEntryAndEntity ( ctx , req )
2018-04-23 22:00:02 +00:00
if err != nil {
return nil , err
}
if entity != nil && entity . Disabled {
2018-06-19 16:57:19 +00:00
b . logger . Warn ( "permission denied as the entity on the token is disabled" )
return nil , logical . ErrPermissionDenied
}
if te != nil && te . EntityID != "" && entity == nil {
b . logger . Warn ( "permission denied as the entity on the token is invalid" )
2018-04-23 22:00:02 +00:00
return nil , logical . ErrPermissionDenied
}
}
2018-09-18 03:03:00 +00:00
hasAccess := func ( ctx context . Context , me * MountEntry ) bool {
2018-04-23 22:00:02 +00:00
if me . Config . ListingVisibility == ListingVisibilityUnauth {
return true
}
if isAuthed {
2022-05-31 15:25:27 +00:00
if me . Table == "auth" {
return hasMountAccess ( ctx , acl , me . Namespace ( ) . Path + me . Table + "/" + me . Path )
} else {
return hasMountAccess ( ctx , acl , me . Namespace ( ) . Path + me . Path )
}
2018-04-23 22:00:02 +00:00
}
return false
}
b . Core . mountsLock . RLock ( )
2018-03-20 03:16:33 +00:00
for _ , entry := range b . Core . mounts . Entries {
2020-07-01 19:37:11 +00:00
ctxWithNamespace := namespace . ContextWithNamespace ( ctx , entry . Namespace ( ) )
filtered , err := b . Core . checkReplicatedFiltering ( ctxWithNamespace , entry , "" )
2019-03-14 18:43:44 +00:00
if err != nil {
2019-04-10 02:20:06 +00:00
b . Core . mountsLock . RUnlock ( )
2019-03-14 18:43:44 +00:00
return nil , err
}
if filtered {
continue
}
2019-01-22 22:21:53 +00:00
if ns . ID == entry . NamespaceID && hasAccess ( ctx , entry ) {
2018-04-23 22:00:02 +00:00
if isAuthed {
// If this is an authed request return all the mount info
2022-08-31 20:11:14 +00:00
secretMounts [ entry . Path ] = b . mountInfo ( ctx , entry )
2018-04-23 22:00:02 +00:00
} else {
secretMounts [ entry . Path ] = map [ string ] interface { } {
"type" : entry . Type ,
"description" : entry . Description ,
"options" : entry . Options ,
}
2018-03-20 03:16:33 +00:00
}
}
}
2018-04-23 22:00:02 +00:00
b . Core . mountsLock . RUnlock ( )
2018-03-20 03:16:33 +00:00
2018-04-23 22:00:02 +00:00
b . Core . authLock . RLock ( )
2018-03-20 03:16:33 +00:00
for _ , entry := range b . Core . auth . Entries {
2020-07-01 19:37:11 +00:00
ctxWithNamespace := namespace . ContextWithNamespace ( ctx , entry . Namespace ( ) )
filtered , err := b . Core . checkReplicatedFiltering ( ctxWithNamespace , entry , credentialRoutePrefix )
2019-03-14 18:43:44 +00:00
if err != nil {
2019-04-10 02:20:06 +00:00
b . Core . authLock . RUnlock ( )
2019-03-14 18:43:44 +00:00
return nil , err
}
if filtered {
continue
}
2019-01-22 22:21:53 +00:00
if ns . ID == entry . NamespaceID && hasAccess ( ctx , entry ) {
2018-04-23 22:00:02 +00:00
if isAuthed {
// If this is an authed request return all the mount info
2022-08-31 20:11:14 +00:00
authMounts [ entry . Path ] = b . mountInfo ( ctx , entry )
2018-04-23 22:00:02 +00:00
} else {
authMounts [ entry . Path ] = map [ string ] interface { } {
"type" : entry . Type ,
"description" : entry . Description ,
"options" : entry . Options ,
}
2018-03-20 03:16:33 +00:00
}
}
}
2018-04-23 22:00:02 +00:00
b . Core . authLock . RUnlock ( )
return resp , nil
}
func ( b * SystemBackend ) pathInternalUIMountRead ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
path := d . Get ( "path" ) . ( string )
if path == "" {
return logical . ErrorResponse ( "path not set" ) , logical . ErrInvalidRequest
}
2020-06-29 22:36:22 +00:00
path = sanitizePath ( path )
2018-04-23 22:00:02 +00:00
2021-01-07 17:46:08 +00:00
// Load the ACL policies so we can walk the prefix for this mount
acl , te , entity , _ , err := b . Core . fetchACLTokenEntryAndEntity ( ctx , req )
if err != nil {
return nil , err
}
if entity != nil && entity . Disabled {
b . logger . Warn ( "permission denied as the entity on the token is disabled" )
return nil , logical . ErrPermissionDenied
}
if te != nil && te . EntityID != "" && entity == nil {
b . logger . Warn ( "permission denied as the entity on the token is invalid" )
return nil , logical . ErrPermissionDenied
}
2018-09-18 03:03:00 +00:00
errResp := logical . ErrorResponse ( fmt . Sprintf ( "preflight capability check returned 403, please ensure client's policies grant access to path %q" , path ) )
2018-05-24 00:47:54 +00:00
2018-12-12 01:21:23 +00:00
ns , err := namespace . FromContext ( ctx )
if err != nil {
return nil , err
}
2018-09-18 03:03:00 +00:00
me := b . Core . router . MatchingMountEntry ( ctx , path )
2018-04-23 22:00:02 +00:00
if me == nil {
// Return a permission denied error here so this path cannot be used to
// brute force a list of mounts.
2018-05-24 00:47:54 +00:00
return errResp , logical . ErrPermissionDenied
2018-04-23 22:00:02 +00:00
}
2019-03-14 18:43:44 +00:00
filtered , err := b . Core . checkReplicatedFiltering ( ctx , me , "" )
if err != nil {
return nil , err
}
if filtered {
return errResp , logical . ErrPermissionDenied
}
2018-04-23 22:00:02 +00:00
resp := & logical . Response {
2022-08-31 20:11:14 +00:00
Data : b . mountInfo ( ctx , me ) ,
2018-04-23 22:00:02 +00:00
}
resp . Data [ "path" ] = me . Path
2020-05-08 23:02:40 +00:00
2022-05-31 15:25:27 +00:00
pathWithTable := ""
if me . Table == "auth" {
pathWithTable = me . Table + "/" + me . Path
} else {
pathWithTable = me . Path
}
fullMountPath := ns . Path + pathWithTable
2018-12-12 01:21:23 +00:00
if ns . ID != me . Namespace ( ) . ID {
2022-05-31 15:25:27 +00:00
resp . Data [ "path" ] = me . Namespace ( ) . Path + pathWithTable
fullMountPath = ns . Path + me . Namespace ( ) . Path + pathWithTable
2018-12-12 01:21:23 +00:00
}
2018-04-23 22:00:02 +00:00
2020-05-08 23:02:40 +00:00
if ! hasMountAccess ( ctx , acl , fullMountPath ) {
2018-05-24 00:47:54 +00:00
return errResp , logical . ErrPermissionDenied
2018-04-23 22:00:02 +00:00
}
2018-03-20 03:16:33 +00:00
return resp , nil
}
2019-03-05 19:55:07 +00:00
func ( b * SystemBackend ) pathInternalCountersRequests ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2021-07-29 17:21:40 +00:00
resp := logical . ErrorResponse ( "The functionality has been removed on this path" )
2019-03-05 19:55:07 +00:00
2021-07-29 17:21:40 +00:00
return resp , logical . ErrPathFunctionalityRemoved
2019-03-05 19:55:07 +00:00
}
2019-10-08 17:58:19 +00:00
func ( b * SystemBackend ) pathInternalCountersTokens ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
activeTokens , err := b . Core . countActiveTokens ( ctx )
if err != nil {
return nil , err
}
resp := & logical . Response {
Data : map [ string ] interface { } {
"counters" : activeTokens ,
} ,
}
return resp , nil
}
func ( b * SystemBackend ) pathInternalCountersEntities ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
activeEntities , err := b . Core . countActiveEntities ( ctx )
if err != nil {
return nil , err
}
resp := & logical . Response {
Data : map [ string ] interface { } {
"counters" : activeEntities ,
} ,
}
return resp , nil
}
2022-11-04 16:39:09 +00:00
func ( b * SystemBackend ) pathInternalInspectRouter ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2022-12-15 20:19:19 +00:00
b . Core . introspectionEnabledLock . Lock ( )
defer b . Core . introspectionEnabledLock . Unlock ( )
if b . Core . introspectionEnabled {
tag := d . Get ( "tag" ) . ( string )
inspectableRouter , err := b . Core . router . GetRecords ( tag )
if err != nil {
return nil , err
}
resp := & logical . Response {
Data : map [ string ] interface { } {
tag : inspectableRouter ,
} ,
}
return resp , nil
2022-11-04 16:39:09 +00:00
}
2022-12-15 20:19:19 +00:00
return logical . ErrorResponse ( ErrIntrospectionNotEnabled . Error ( ) ) , nil
2022-11-04 16:39:09 +00:00
}
2018-04-20 18:19:04 +00:00
func ( b * SystemBackend ) pathInternalUIResultantACL ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
if req . ClientToken == "" {
// 204 -- no ACL
return nil , nil
}
2018-09-18 03:03:00 +00:00
acl , te , entity , _ , err := b . Core . fetchACLTokenEntryAndEntity ( ctx , req )
2018-04-20 18:19:04 +00:00
if err != nil {
return nil , err
}
if entity != nil && entity . Disabled {
2018-06-19 16:57:19 +00:00
b . logger . Warn ( "permission denied as the entity on the token is disabled" )
return logical . ErrorResponse ( logical . ErrPermissionDenied . Error ( ) ) , nil
}
if te != nil && te . EntityID != "" && entity == nil {
b . logger . Warn ( "permission denied as the entity on the token is invalid" )
2018-04-23 20:50:04 +00:00
return logical . ErrorResponse ( logical . ErrPermissionDenied . Error ( ) ) , nil
2018-04-20 18:19:04 +00:00
}
resp := & logical . Response {
Data : map [ string ] interface { } {
"root" : false ,
} ,
}
if acl . root {
resp . Data [ "root" ] = true
return resp , nil
}
exact := map [ string ] interface { } { }
glob := map [ string ] interface { } { }
walkFn := func ( pt map [ string ] interface { } , s string , v interface { } ) {
if v == nil {
return
}
perms := v . ( * ACLPermissions )
capabilities := [ ] string { }
if perms . CapabilitiesBitmap & CreateCapabilityInt > 0 {
capabilities = append ( capabilities , CreateCapability )
}
if perms . CapabilitiesBitmap & DeleteCapabilityInt > 0 {
capabilities = append ( capabilities , DeleteCapability )
}
if perms . CapabilitiesBitmap & ListCapabilityInt > 0 {
capabilities = append ( capabilities , ListCapability )
}
if perms . CapabilitiesBitmap & ReadCapabilityInt > 0 {
capabilities = append ( capabilities , ReadCapability )
}
if perms . CapabilitiesBitmap & SudoCapabilityInt > 0 {
capabilities = append ( capabilities , SudoCapability )
}
if perms . CapabilitiesBitmap & UpdateCapabilityInt > 0 {
capabilities = append ( capabilities , UpdateCapability )
}
2021-10-13 19:24:31 +00:00
if perms . CapabilitiesBitmap & PatchCapabilityInt > 0 {
capabilities = append ( capabilities , PatchCapability )
}
2018-04-20 18:19:04 +00:00
// If "deny" is explicitly set or if the path has no capabilities at all,
// set the path capabilities to "deny"
if perms . CapabilitiesBitmap & DenyCapabilityInt > 0 || len ( capabilities ) == 0 {
capabilities = [ ] string { DenyCapability }
}
res := map [ string ] interface { } { }
if len ( capabilities ) > 0 {
res [ "capabilities" ] = capabilities
}
if perms . MinWrappingTTL != 0 {
res [ "min_wrapping_ttl" ] = int64 ( perms . MinWrappingTTL . Seconds ( ) )
}
if perms . MaxWrappingTTL != 0 {
res [ "max_wrapping_ttl" ] = int64 ( perms . MaxWrappingTTL . Seconds ( ) )
}
if len ( perms . AllowedParameters ) > 0 {
res [ "allowed_parameters" ] = perms . AllowedParameters
}
if len ( perms . DeniedParameters ) > 0 {
res [ "denied_parameters" ] = perms . DeniedParameters
}
if len ( perms . RequiredParameters ) > 0 {
res [ "required_parameters" ] = perms . RequiredParameters
}
pt [ s ] = res
}
exactWalkFn := func ( s string , v interface { } ) bool {
walkFn ( exact , s , v )
return false
}
globWalkFn := func ( s string , v interface { } ) bool {
walkFn ( glob , s , v )
return false
}
acl . exactRules . Walk ( exactWalkFn )
2019-01-23 18:55:40 +00:00
acl . prefixRules . Walk ( globWalkFn )
2018-04-20 18:19:04 +00:00
resp . Data [ "exact_paths" ] = exact
resp . Data [ "glob_paths" ] = glob
return resp , nil
}
2018-11-05 20:24:39 +00:00
func ( b * SystemBackend ) pathInternalOpenAPI ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
// Limit output to authorized paths
resp , err := b . pathInternalUIMountsRead ( ctx , req , d )
if err != nil {
return nil , err
}
2022-11-10 23:39:53 +00:00
context := d . Get ( "context" ) . ( string )
2023-01-18 04:07:11 +00:00
// Set up target document
2022-12-07 18:29:51 +00:00
doc := framework . NewOASDocument ( version . Version )
2018-11-05 20:24:39 +00:00
2023-01-18 04:07:11 +00:00
// Generic mount paths will primarily be used for code generation purposes.
// This will result in parameterized mount paths being returned instead of
// hardcoded actual paths. For example /auth/my-auth-method/login would be
// replaced with /auth/{my-auth-method_mount_path}/login.
//
// Note that for this to actually be useful, you have to be using it with
// a Vault instance in which you have mounted one of each secrets engine
// and auth method of types you are interested in, at paths which identify
// their type, and for the KV secrets engine you will probably want to
// mount separate kv-v1 and kv-v2 mounts to include the documentation for
// each of those APIs.
2023-01-10 16:16:59 +00:00
genericMountPaths , _ := d . Get ( "generic_mount_paths" ) . ( bool )
2018-11-05 20:24:39 +00:00
procMountGroup := func ( group , mountPrefix string ) error {
2022-03-12 00:00:26 +00:00
for mount , entry := range resp . Data [ group ] . ( map [ string ] interface { } ) {
var pluginType string
if t , ok := entry . ( map [ string ] interface { } ) [ "type" ] ; ok {
pluginType = t . ( string )
}
2018-11-05 20:24:39 +00:00
backend := b . Core . router . MatchingBackend ( ctx , mountPrefix + mount )
if backend == nil {
continue
}
req := & logical . Request {
Operation : logical . HelpOperation ,
2019-07-09 22:10:39 +00:00
Storage : req . Storage ,
2023-01-18 04:07:11 +00:00
Data : map [ string ] interface { } { "requestResponsePrefix" : pluginType } ,
2018-11-05 20:24:39 +00:00
}
resp , err := backend . HandleRequest ( ctx , req )
if err != nil {
return err
}
var backendDoc * framework . OASDocument
// Normalize response type, which will be different if received
// from an external plugin.
switch v := resp . Data [ "openapi" ] . ( type ) {
case * framework . OASDocument :
backendDoc = v
case map [ string ] interface { } :
backendDoc , err = framework . NewOASDocumentFromMap ( v )
if err != nil {
return err
}
default :
continue
}
// Prepare to add tags to default builtins that are
// type "unknown" and won't already be tagged.
var tag string
switch mountPrefix + mount {
case "cubbyhole/" , "secret/" :
tag = "secrets"
case "sys/" :
tag = "system"
case "auth/token/" :
tag = "auth"
case "identity/" :
tag = "identity"
}
2023-01-18 04:07:11 +00:00
// When set to the empty string, mountPathParameterName means not to use a parameter at all;
// the one variable combines both boolean, and value-to-use-if-true semantics.
mountPathParameterName := ""
if genericMountPaths {
isSingletonMount := ( group == "auth" && pluginType == "token" ) ||
( group == "secret" &&
( pluginType == "system" || pluginType == "identity" || pluginType == "cubbyhole" ) )
if ! isSingletonMount {
mountPathParameterName = strings . TrimRight ( mount , "/" ) + "_mount_path"
}
}
2018-11-05 20:24:39 +00:00
// Merge backend paths with existing document
for path , obj := range backendDoc . Paths {
path := strings . TrimPrefix ( path , "/" )
// Add tags to all of the operations if necessary
if tag != "" {
for _ , op := range [ ] * framework . OASOperation { obj . Get , obj . Post , obj . Delete } {
// TODO: a special override for identity is used used here because the backend
// is currently categorized as "secret", which will likely change. Also of interest
// is removing all tag handling here and providing the mount information to OpenAPI.
if op != nil && ( len ( op . Tags ) == 0 || tag == "identity" ) {
op . Tags = [ ] string { tag }
}
}
}
2023-01-18 04:07:11 +00:00
mountForOpenAPI := mount
if mountPathParameterName != "" {
mountForOpenAPI = "{" + mountPathParameterName + "}/"
obj . Parameters = append ( obj . Parameters , framework . OASParameter {
Name : mountPathParameterName ,
Description : "Path that the backend was mounted at" ,
In : "path" ,
Schema : & framework . OASSchema {
2023-02-01 00:37:16 +00:00
Type : "string" ,
Default : strings . TrimRight ( mount , "/" ) ,
2023-01-18 04:07:11 +00:00
} ,
2023-02-02 19:39:09 +00:00
Required : true ,
2023-01-18 04:07:11 +00:00
} )
2022-06-30 14:43:04 +00:00
}
2023-01-18 04:07:11 +00:00
doc . Paths [ "/" + mountPrefix + mountForOpenAPI + path ] = obj
2018-11-05 20:24:39 +00:00
}
2022-03-12 00:00:26 +00:00
// Merge backend schema components
for e , schema := range backendDoc . Components . Schemas {
doc . Components . Schemas [ e ] = schema
}
2018-11-05 20:24:39 +00:00
}
return nil
}
if err := procMountGroup ( "secret" , "" ) ; err != nil {
return nil , err
}
if err := procMountGroup ( "auth" , "auth/" ) ; err != nil {
return nil , err
}
2022-11-10 23:39:53 +00:00
doc . CreateOperationIDs ( context )
2018-11-05 20:24:39 +00:00
buf , err := json . Marshal ( doc )
if err != nil {
return nil , err
}
resp = & logical . Response {
Data : map [ string ] interface { } {
logical . HTTPStatusCode : 200 ,
logical . HTTPRawBody : buf ,
logical . HTTPContentType : "application/json" ,
} ,
}
return resp , nil
}
2021-01-20 20:04:24 +00:00
type SealStatusResponse struct {
2022-11-09 16:04:36 +00:00
Type string ` json:"type" `
Initialized bool ` json:"initialized" `
Sealed bool ` json:"sealed" `
T int ` json:"t" `
N int ` json:"n" `
Progress int ` json:"progress" `
Nonce string ` json:"nonce" `
Version string ` json:"version" `
BuildDate string ` json:"build_date" `
Migration bool ` json:"migration" `
ClusterName string ` json:"cluster_name,omitempty" `
ClusterID string ` json:"cluster_id,omitempty" `
RecoverySeal bool ` json:"recovery_seal" `
StorageType string ` json:"storage_type,omitempty" `
HCPLinkStatus string ` json:"hcp_link_status,omitempty" `
HCPLinkResourceID string ` json:"hcp_link_resource_ID,omitempty" `
Warnings [ ] string ` json:"warnings,omitempty" `
}
// getStatusWarnings exposes potentially dangerous overrides in the status response
// currently, this only warns about VAULT_DISABLE_SERVER_SIDE_CONSISTENT_TOKENS,
// but should be extended to report more warnings where appropriate
func ( core * Core ) getStatusWarnings ( ) [ ] string {
var warnings [ ] string
if core . GetCoreConfigInternal ( ) != nil && core . GetCoreConfigInternal ( ) . DisableSSCTokens {
warnings = append ( warnings , "Server Side Consistent Tokens are disabled, due to the " +
"VAULT_DISABLE_SERVER_SIDE_CONSISTENT_TOKENS environment variable being set. " +
"It is not recommended to run Vault for an extended period of time with this configuration." )
}
return warnings
2021-01-20 20:04:24 +00:00
}
func ( core * Core ) GetSealStatus ( ctx context . Context ) ( * SealStatusResponse , error ) {
sealed := core . Sealed ( )
initialized , err := core . Initialized ( ctx )
if err != nil {
return nil , err
}
var sealConfig * SealConfig
if core . SealAccess ( ) . RecoveryKeySupported ( ) {
sealConfig , err = core . SealAccess ( ) . RecoveryConfig ( ctx )
} else {
sealConfig , err = core . SealAccess ( ) . BarrierConfig ( ctx )
}
if err != nil {
return nil , err
}
2022-09-06 18:11:04 +00:00
hcpLinkStatus , resourceIDonHCP := core . GetHCPLinkStatus ( )
2021-01-20 20:04:24 +00:00
if sealConfig == nil {
2022-09-06 18:11:04 +00:00
s := & SealStatusResponse {
2022-08-23 19:37:16 +00:00
Type : core . SealAccess ( ) . BarrierType ( ) . String ( ) ,
2021-01-20 20:04:24 +00:00
Initialized : initialized ,
Sealed : true ,
RecoverySeal : core . SealAccess ( ) . RecoveryKeySupported ( ) ,
StorageType : core . StorageType ( ) ,
Version : version . GetVersion ( ) . VersionNumber ( ) ,
2022-04-19 18:28:08 +00:00
BuildDate : version . BuildDate ,
2022-09-06 18:11:04 +00:00
}
if resourceIDonHCP != "" {
s . HCPLinkStatus = hcpLinkStatus
s . HCPLinkResourceID = resourceIDonHCP
}
return s , nil
2021-01-20 20:04:24 +00:00
}
// Fetch the local cluster name and identifier
var clusterName , clusterID string
if ! sealed {
cluster , err := core . Cluster ( ctx )
if err != nil {
return nil , err
}
if cluster == nil {
return nil , fmt . Errorf ( "failed to fetch cluster details" )
}
clusterName = cluster . Name
clusterID = cluster . ID
}
progress , nonce := core . SecretProgress ( )
2022-09-06 18:11:04 +00:00
s := & SealStatusResponse {
2021-01-20 20:04:24 +00:00
Type : sealConfig . Type ,
Initialized : initialized ,
Sealed : sealed ,
T : sealConfig . SecretThreshold ,
N : sealConfig . SecretShares ,
Progress : progress ,
Nonce : nonce ,
Version : version . GetVersion ( ) . VersionNumber ( ) ,
2022-04-19 18:28:08 +00:00
BuildDate : version . BuildDate ,
2021-01-20 20:04:24 +00:00
Migration : core . IsInSealMigrationMode ( ) && ! core . IsSealMigrated ( ) ,
ClusterName : clusterName ,
ClusterID : clusterID ,
RecoverySeal : core . SealAccess ( ) . RecoveryKeySupported ( ) ,
StorageType : core . StorageType ( ) ,
2022-11-09 16:04:36 +00:00
Warnings : core . getStatusWarnings ( ) ,
2022-09-06 18:11:04 +00:00
}
if resourceIDonHCP != "" {
s . HCPLinkStatus = hcpLinkStatus
s . HCPLinkResourceID = resourceIDonHCP
}
return s , nil
2021-01-20 20:04:24 +00:00
}
type LeaderResponse struct {
HAEnabled bool ` json:"ha_enabled" `
IsSelf bool ` json:"is_self" `
ActiveTime time . Time ` json:"active_time,omitempty" `
LeaderAddress string ` json:"leader_address" `
LeaderClusterAddress string ` json:"leader_cluster_address" `
PerfStandby bool ` json:"performance_standby" `
PerfStandbyLastRemoteWAL uint64 ` json:"performance_standby_last_remote_wal" `
LastWAL uint64 ` json:"last_wal,omitempty" `
// Raft Indexes for this node
RaftCommittedIndex uint64 ` json:"raft_committed_index,omitempty" `
RaftAppliedIndex uint64 ` json:"raft_applied_index,omitempty" `
}
func ( core * Core ) GetLeaderStatus ( ) ( * LeaderResponse , error ) {
haEnabled := true
isLeader , address , clusterAddr , err := core . Leader ( )
if errwrap . Contains ( err , ErrHANotEnabled . Error ( ) ) {
haEnabled = false
err = nil
}
if err != nil {
return nil , err
}
resp := & LeaderResponse {
HAEnabled : haEnabled ,
IsSelf : isLeader ,
LeaderAddress : address ,
LeaderClusterAddress : clusterAddr ,
PerfStandby : core . PerfStandby ( ) ,
}
if isLeader {
resp . ActiveTime = core . ActiveTime ( )
}
if resp . PerfStandby {
resp . PerfStandbyLastRemoteWAL = LastRemoteWAL ( core )
} else if isLeader || ! haEnabled {
resp . LastWAL = LastWAL ( core )
}
resp . RaftCommittedIndex , resp . RaftAppliedIndex = core . GetRaftIndexes ( )
return resp , nil
}
func ( b * SystemBackend ) handleSealStatus ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
status , err := b . Core . GetSealStatus ( ctx )
if err != nil {
return nil , err
}
buf , err := json . Marshal ( status )
if err != nil {
return nil , err
}
httpResp := & logical . Response {
Data : map [ string ] interface { } {
logical . HTTPStatusCode : 200 ,
logical . HTTPRawBody : buf ,
logical . HTTPContentType : "application/json" ,
} ,
}
return httpResp , nil
}
func ( b * SystemBackend ) handleLeaderStatus ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
status , err := b . Core . GetLeaderStatus ( )
if err != nil {
return nil , err
}
buf , err := json . Marshal ( status )
if err != nil {
return nil , err
}
httpResp := & logical . Response {
Data : map [ string ] interface { } {
logical . HTTPStatusCode : 200 ,
logical . HTTPRawBody : buf ,
logical . HTTPContentType : "application/json" ,
} ,
}
return httpResp , nil
}
2021-01-25 22:35:58 +00:00
func ( b * SystemBackend ) verifyDROperationTokenOnSecondary ( f framework . OperationFunc , lock bool ) framework . OperationFunc {
if b . Core . IsDRSecondary ( ) {
return b . verifyDROperationToken ( f , lock )
}
return f
}
2021-02-25 20:27:25 +00:00
func ( b * SystemBackend ) rotateBarrierKey ( ctx context . Context ) error {
// Rotate to the new term
newTerm , err := b . Core . barrier . Rotate ( ctx , b . Core . secureRandomReader )
if err != nil {
return errwrap . Wrap ( errors . New ( "failed to create new encryption key" ) , err )
}
b . Backend . Logger ( ) . Info ( "installed new encryption key" )
// In HA mode, we need to an upgrade path for the standby instances
2021-03-01 18:51:04 +00:00
if b . Core . ha != nil && b . Core . KeyRotateGracePeriod ( ) > 0 {
2021-02-25 20:27:25 +00:00
// Create the upgrade path to the new term
if err := b . Core . barrier . CreateUpgrade ( ctx , newTerm ) ; err != nil {
b . Backend . Logger ( ) . Error ( "failed to create new upgrade" , "term" , newTerm , "error" , err )
}
// Schedule the destroy of the upgrade path
time . AfterFunc ( b . Core . KeyRotateGracePeriod ( ) , func ( ) {
b . Backend . Logger ( ) . Debug ( "cleaning up upgrade keys" , "waited" , b . Core . KeyRotateGracePeriod ( ) )
if err := b . Core . barrier . DestroyUpgrade ( b . Core . activeContext , newTerm ) ; err != nil {
b . Backend . Logger ( ) . Error ( "failed to destroy upgrade" , "term" , newTerm , "error" , err )
}
} )
}
// Write to the canary path, which will force a synchronous truing during
// replication
if err := b . Core . barrier . Put ( ctx , & logical . StorageEntry {
Key : coreKeyringCanaryPath ,
Value : [ ] byte ( fmt . Sprintf ( "new-rotation-term-%d" , newTerm ) ) ,
} ) ; err != nil {
b . Core . logger . Error ( "error saving keyring canary" , "error" , err )
return errwrap . Wrap ( errors . New ( "failed to save keyring canary" ) , err )
}
return nil
}
2021-11-30 19:49:58 +00:00
func ( b * SystemBackend ) handleHAStatus ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
// We're always the leader if we're handling this request.
2022-10-06 18:24:16 +00:00
nodes , err := b . Core . getHAMembers ( )
2021-12-10 13:57:15 +00:00
if err != nil {
return nil , err
}
2021-11-30 19:49:58 +00:00
return & logical . Response {
Data : map [ string ] interface { } {
"nodes" : nodes ,
} ,
} , nil
}
type HAStatusNode struct {
Hostname string ` json:"hostname" `
APIAddress string ` json:"api_address" `
ClusterAddress string ` json:"cluster_address" `
ActiveNode bool ` json:"active_node" `
LastEcho * time . Time ` json:"last_echo" `
2022-05-20 20:49:11 +00:00
Version string ` json:"version" `
UpgradeVersion string ` json:"upgrade_version,omitempty" `
RedundancyZone string ` json:"redundancy_zone,omitempty" `
2021-11-30 19:49:58 +00:00
}
2022-02-14 20:26:57 +00:00
func ( b * SystemBackend ) handleVersionHistoryList ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
versions := make ( [ ] VaultVersion , 0 )
respKeys := make ( [ ] string , 0 )
2022-04-19 18:28:08 +00:00
for _ , versionEntry := range b . Core . versionHistory {
versions = append ( versions , versionEntry )
2022-02-14 20:26:57 +00:00
}
sort . Slice ( versions , func ( i , j int ) bool {
return versions [ i ] . TimestampInstalled . Before ( versions [ j ] . TimestampInstalled )
} )
respKeyInfo := map [ string ] interface { } { }
for i , v := range versions {
respKeys = append ( respKeys , v . Version )
entry := map [ string ] interface { } {
"timestamp_installed" : v . TimestampInstalled . Format ( time . RFC3339 ) ,
2022-04-19 18:28:08 +00:00
"build_date" : v . BuildDate ,
2022-02-14 20:26:57 +00:00
"previous_version" : nil ,
}
if i > 0 {
entry [ "previous_version" ] = versions [ i - 1 ] . Version
}
respKeyInfo [ v . Version ] = entry
}
return logical . ListResponseWithInfo ( respKeys , respKeyInfo ) , nil
}
2022-11-28 16:18:36 +00:00
func ( b * SystemBackend ) handleLoggersRead ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
b . Core . allLoggersLock . RLock ( )
defer b . Core . allLoggersLock . RUnlock ( )
loggers := make ( map [ string ] interface { } )
warnings := make ( [ ] string , 0 )
for _ , logger := range b . Core . allLoggers {
loggerName := logger . Name ( )
// ignore base logger
if loggerName == "" {
continue
}
logLevel , err := logging . TranslateLoggerLevel ( logger )
if err != nil {
warnings = append ( warnings , fmt . Sprintf ( "cannot translate level for %q: %s" , loggerName , err . Error ( ) ) )
} else {
loggers [ loggerName ] = logLevel
}
2022-06-27 15:39:53 +00:00
}
2022-11-28 16:18:36 +00:00
resp := & logical . Response {
Data : loggers ,
Warnings : warnings ,
}
return resp , nil
2022-06-27 15:39:53 +00:00
}
func ( b * SystemBackend ) handleLoggersWrite ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
logLevelRaw , ok := d . GetOk ( "level" )
if ! ok {
return logical . ErrorResponse ( "level is required" ) , nil
}
logLevel := logLevelRaw . ( string )
if logLevel == "" {
return logical . ErrorResponse ( "level is empty" ) , nil
}
2022-11-28 16:18:36 +00:00
level , err := logging . ParseLogLevel ( logLevel )
2022-06-27 15:39:53 +00:00
if err != nil {
return logical . ErrorResponse ( fmt . Sprintf ( "invalid level provided: %s" , err . Error ( ) ) ) , nil
}
b . Core . SetLogLevel ( level )
return nil , nil
}
func ( b * SystemBackend ) handleLoggersDelete ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
2022-11-28 16:18:36 +00:00
level , err := logging . ParseLogLevel ( b . Core . logLevel )
2022-06-27 15:39:53 +00:00
if err != nil {
return logical . ErrorResponse ( fmt . Sprintf ( "log level from config is invalid: %s" , err . Error ( ) ) ) , nil
}
b . Core . SetLogLevel ( level )
return nil , nil
}
2022-11-28 16:18:36 +00:00
func ( b * SystemBackend ) handleLoggersByNameRead ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
nameRaw , nameOk := d . GetOk ( "name" )
if ! nameOk {
return logical . ErrorResponse ( "name is required" ) , nil
}
name := nameRaw . ( string )
if name == "" {
return logical . ErrorResponse ( "name is empty" ) , nil
}
b . Core . allLoggersLock . RLock ( )
defer b . Core . allLoggersLock . RUnlock ( )
loggers := make ( map [ string ] interface { } )
warnings := make ( [ ] string , 0 )
for _ , logger := range b . Core . allLoggers {
loggerName := logger . Name ( )
// ignore base logger
if loggerName == "" {
continue
}
if loggerName == name {
logLevel , err := logging . TranslateLoggerLevel ( logger )
if err != nil {
warnings = append ( warnings , fmt . Sprintf ( "cannot translate level for %q: %s" , loggerName , err . Error ( ) ) )
} else {
loggers [ loggerName ] = logLevel
}
break
}
}
resp := & logical . Response {
Data : loggers ,
Warnings : warnings ,
}
return resp , nil
}
2022-06-27 15:39:53 +00:00
func ( b * SystemBackend ) handleLoggersByNameWrite ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
nameRaw , nameOk := d . GetOk ( "name" )
if ! nameOk {
return logical . ErrorResponse ( "name is required" ) , nil
}
2022-11-28 16:18:36 +00:00
name := nameRaw . ( string )
if name == "" {
return logical . ErrorResponse ( "name is empty" ) , nil
}
2022-06-27 15:39:53 +00:00
logLevelRaw , logLevelOk := d . GetOk ( "level" )
if ! logLevelOk {
return logical . ErrorResponse ( "level is required" ) , nil
}
logLevel := logLevelRaw . ( string )
if logLevel == "" {
return logical . ErrorResponse ( "level is empty" ) , nil
}
2022-11-28 16:18:36 +00:00
level , err := logging . ParseLogLevel ( logLevel )
2022-06-27 15:39:53 +00:00
if err != nil {
return logical . ErrorResponse ( fmt . Sprintf ( "invalid level provided: %s" , err . Error ( ) ) ) , nil
}
2022-11-28 16:18:36 +00:00
success := b . Core . SetLogLevelByName ( name , level )
if ! success {
return logical . ErrorResponse ( fmt . Sprintf ( "logger %q not found" , name ) ) , nil
2022-06-27 15:39:53 +00:00
}
return nil , nil
}
func ( b * SystemBackend ) handleLoggersByNameDelete ( ctx context . Context , req * logical . Request , d * framework . FieldData ) ( * logical . Response , error ) {
nameRaw , ok := d . GetOk ( "name" )
if ! ok {
return logical . ErrorResponse ( "name is required" ) , nil
}
2022-11-28 16:18:36 +00:00
level , err := logging . ParseLogLevel ( b . Core . logLevel )
2022-06-27 15:39:53 +00:00
if err != nil {
return logical . ErrorResponse ( fmt . Sprintf ( "log level from config is invalid: %s" , err . Error ( ) ) ) , nil
}
2022-11-28 16:18:36 +00:00
name := nameRaw . ( string )
if name == "" {
return logical . ErrorResponse ( "name is empty" ) , nil
}
success := b . Core . SetLogLevelByName ( name , level )
if ! success {
return logical . ErrorResponse ( fmt . Sprintf ( "logger %q not found" , name ) ) , nil
2022-06-27 15:39:53 +00:00
}
return nil , nil
}
2023-01-16 16:07:18 +00:00
// handleReadExperiments returns the available and enabled experiments on this node.
// Each node within a cluster could have different values for each, but it's not
// recommended.
func ( b * SystemBackend ) handleReadExperiments ( ctx context . Context , _ * logical . Request , _ * framework . FieldData ) ( * logical . Response , error ) {
enabled := b . Core . experiments
if len ( enabled ) == 0 {
// Return empty slice instead of nil, so the JSON shows [] instead of null
enabled = [ ] string { }
}
return & logical . Response {
Data : map [ string ] interface { } {
"available" : experiments . ValidExperiments ( ) ,
"enabled" : enabled ,
} ,
} , nil
}
2020-06-29 22:36:22 +00:00
func sanitizePath ( path string ) string {
2016-03-03 18:13:47 +00:00
if ! strings . HasSuffix ( path , "/" ) {
path += "/"
}
2023-01-10 16:16:59 +00:00
if strings . HasPrefix ( path , "/" ) {
path = path [ 1 : ]
}
2016-03-03 18:13:47 +00:00
return path
}
2018-05-25 17:39:35 +00:00
func checkListingVisibility ( visibility ListingVisibilityType ) error {
2018-03-20 03:16:33 +00:00
switch visibility {
2018-07-02 16:13:25 +00:00
case ListingVisibilityDefault :
2018-03-20 03:16:33 +00:00
case ListingVisibilityHidden :
case ListingVisibilityUnauth :
default :
2022-02-15 18:43:49 +00:00
return fmt . Errorf ( "invalid listing visibility type" )
2018-03-20 03:16:33 +00:00
}
return nil
}
2015-04-04 04:00:23 +00:00
const sysHelpRoot = `
The system backend is built - in to Vault and cannot be remounted or
unmounted . It contains the paths that are used to configure Vault itself
as well as perform core operations .
`
2015-03-16 00:35:59 +00:00
// sysHelp is all the help text for the sys backend.
var sysHelp = map [ string ] [ 2 ] string {
2018-09-18 03:03:00 +00:00
"license" : {
"Sets the license of the server." ,
`
The path responds to the following HTTP methods .
GET /
Returns information on the installed license
POST
Sets the license for the server
` ,
} ,
2017-06-17 04:04:55 +00:00
"config/cors" : {
"Configures or returns the current configuration of CORS settings." ,
`
This path responds to the following HTTP methods .
GET /
Returns the configuration of the CORS setting .
POST /
Sets the comma - separated list of origins that can make cross - origin requests .
DELETE /
Clears the CORS configuration and disables acceptance of CORS requests .
` ,
} ,
2023-01-05 18:00:55 +00:00
"config/group-policy-application" : {
"Configures how policies in groups should be applied, accepting 'within_namespace_hierarchy' (default) and 'any'," +
"which will allow policies to grant permissions in groups outside of those sharing a namespace hierarchy." ,
`
This path responds to the following HTTP methods .
GET /
Returns the current group policy application mode .
POST /
Sets the current group_policy_application_mode to either ' within_namespace_hierarchy ' or ' any ' .
` ,
} ,
2018-03-27 20:23:33 +00:00
"config/ui/headers" : {
"Configures response headers that should be returned from the UI." ,
`
This path responds to the following HTTP methods .
GET / < header >
Returns the header value .
POST / < header >
Sets the header value for the UI .
DELETE / < header >
Clears the header value for UI .
2020-05-21 20:07:50 +00:00
2018-03-27 20:23:33 +00:00
LIST /
List the headers configured for the UI .
` ,
} ,
2016-04-13 21:15:54 +00:00
"init" : {
"Initializes or returns the initialization status of the Vault." ,
`
This path responds to the following HTTP methods .
GET /
Returns the initialization status of the Vault .
POST /
Initializes a new vault .
` ,
} ,
2019-09-26 20:16:21 +00:00
"health" : {
"Checks the health status of the Vault." ,
`
This path responds to the following HTTP methods .
GET /
Returns health information about the Vault .
` ,
} ,
2016-04-13 21:15:54 +00:00
"generate-root" : {
"Reads, generates, or deletes a root token regeneration process." ,
`
This path responds to multiple HTTP methods which change the behavior . Those
HTTP methods are listed below .
GET / attempt
Reads the configuration and progress of the current root generation
attempt .
POST / attempt
Initializes a new root generation attempt . Only a single root generation
attempt can take place at a time . One ( and only one ) of otp or pgp_key
are required .
DELETE / attempt
Cancels any in - progress root generation attempt . This clears any
progress made . This must be called to change the OTP or PGP key being
used .
` ,
} ,
"seal-status" : {
"Returns the seal status of the Vault." ,
`
This path responds to the following HTTP methods .
GET /
Returns the seal status of the Vault . This is an unauthenticated
endpoint .
` ,
} ,
"seal" : {
"Seals the Vault." ,
`
This path responds to the following HTTP methods .
PUT /
Seals the Vault .
` ,
} ,
"unseal" : {
"Unseals the Vault." ,
`
This path responds to the following HTTP methods .
PUT /
Unseals the Vault .
` ,
} ,
2015-03-16 00:35:59 +00:00
"mounts" : {
"List the currently mounted backends." ,
`
2016-04-13 21:15:54 +00:00
This path responds to the following HTTP methods .
GET /
Lists all the mounted secret backends .
GET / < mount point >
Get information about the mount at the specified path .
POST / < mount point >
Mount a new secret backend to the mount point in the URL .
POST / < mount point > / tune
Tune configuration parameters for the given mount point .
DELETE / < mount point >
Unmount the specified mount point .
2015-03-16 00:35:59 +00:00
` ,
} ,
"mount" : {
` Mount a new backend at a new path. ` ,
`
Mount a backend at a new path . A backend can be mounted multiple times at
multiple paths in order to configure multiple separately configured backends .
Example : you might have an AWS backend for the east coast , and one for the
west coast .
` ,
} ,
"mount_path" : {
` The path to mount to. Example: "aws/east" ` ,
"" ,
} ,
"mount_type" : {
` The type of the backend. Example: "passthrough" ` ,
"" ,
} ,
"mount_desc" : {
` User-friendly description for this mount. ` ,
"" ,
} ,
2015-08-31 18:27:49 +00:00
"mount_config" : {
` Configuration for this mount , such as default_lease_ttl
and max_lease_ttl . ` ,
} ,
2017-02-16 21:29:30 +00:00
"mount_local" : {
` Mark the mount as a local mount , which is not replicated
and is unaffected by replication . ` ,
} ,
2017-08-31 16:16:59 +00:00
"mount_plugin_name" : {
2017-10-19 20:29:59 +00:00
` Name of the plugin to mount based from the name registered
2017-08-31 16:16:59 +00:00
in the plugin catalog . ` ,
} ,
2018-03-21 19:04:27 +00:00
"mount_options" : {
` The options to pass into the backend. Should be a json object with string keys and values. ` ,
} ,
2017-11-13 16:22:22 +00:00
"seal_wrap" : {
` Whether to turn on seal wrapping for the mount. ` ,
} ,
2019-10-17 17:33:00 +00:00
"external_entropy_access" : {
` Whether to give the mount access to Vault's external entropy. ` ,
} ,
2015-09-09 19:24:45 +00:00
"tune_default_lease_ttl" : {
` The default lease TTL for this mount. ` ,
} ,
"tune_max_lease_ttl" : {
` The max lease TTL for this mount. ` ,
} ,
2018-03-02 17:18:39 +00:00
"tune_audit_non_hmac_request_keys" : {
` The list of keys in the request data object that will not be HMAC'ed by audit devices. ` ,
} ,
"tune_audit_non_hmac_response_keys" : {
` The list of keys in the response data object that will not be HMAC'ed by audit devices. ` ,
} ,
2018-03-21 19:04:27 +00:00
"tune_mount_options" : {
` The options to pass into the backend. Should be a json object with string keys and values. ` ,
2022-11-01 18:02:07 +00:00
} ,
"tune_user_lockout_config" : {
` The user lockout configuration to pass into the backend. Should be a json object with string keys and values. ` ,
2018-03-21 19:04:27 +00:00
} ,
2015-03-16 00:35:59 +00:00
"remount" : {
2022-02-17 20:17:59 +00:00
"Move the mount point of an already-mounted backend, within or across namespaces" ,
2015-03-16 00:35:59 +00:00
`
2016-04-13 21:15:54 +00:00
This path responds to the following HTTP methods .
2015-03-19 14:05:22 +00:00
2016-04-13 21:15:54 +00:00
POST / sys / remount
Changes the mount point of an already - mounted backend .
` ,
2015-03-19 14:05:22 +00:00
} ,
2022-02-17 20:17:59 +00:00
"remount-status" : {
"Check the status of a mount move operation" ,
`
This path responds to the following HTTP methods .
GET / sys / remount / status / : migration_id
Check the status of a mount move operation for the given migration_id
` ,
} ,
2016-06-15 16:35:30 +00:00
"auth_tune" : {
"Tune the configuration parameters for an auth path." ,
` Read and write the ' default - lease - ttl ' and ' max - lease - ttl ' values of
the auth path . ` ,
} ,
2015-09-02 19:56:58 +00:00
"mount_tune" : {
"Tune backend configuration parameters for this mount." ,
2016-06-15 16:35:30 +00:00
` Read and write the ' default - lease - ttl ' and ' max - lease - ttl ' values of
the mount . ` ,
2015-09-02 19:56:58 +00:00
} ,
2022-12-19 22:24:42 +00:00
"unlock_user" : {
"Unlock the locked user with given mount_accessor and alias_identifier." ,
`
This path responds to the following HTTP methods .
2023-01-17 22:25:56 +00:00
POST sys / locked - users / : mount_accessor / unlock / : alias_identifier
2022-12-19 22:24:42 +00:00
Unlocks the user with given mount_accessor and alias_identifier
if locked . ` ,
} ,
"mount_accessor" : {
"MountAccessor is the identifier of the mount entry to which the user belongs" ,
"" ,
} ,
2023-01-17 22:25:56 +00:00
"locked_users" : {
"Report the locked user count metrics" ,
`
This path responds to the following HTTP methods .
GET sys / locked - users
Report the locked user count metrics , for current namespace and all child namespaces . ` ,
} ,
2022-12-19 22:24:42 +00:00
"alias_identifier" : {
` It is the name of the alias ( user ) . For example , if the alias belongs to userpass backend ,
the name should be a valid username within userpass auth method . If the alias belongs
to an approle auth method , the name should be a valid RoleID ` ,
"" ,
} ,
2015-03-16 23:11:55 +00:00
"renew" : {
"Renew a lease on a secret" ,
`
When a secret is read , it may optionally include a lease interval
and a boolean indicating if renew is possible . For secrets that support
lease renewal , this endpoint is used to extend the validity of the
lease and to prevent an automatic revocation .
` ,
} ,
2015-04-08 20:35:32 +00:00
"lease_id" : {
"The lease identifier to renew. This is included with a lease." ,
2015-03-16 23:11:55 +00:00
"" ,
} ,
"increment" : {
"The desired increment in seconds to the lease" ,
"" ,
} ,
2015-03-16 23:26:34 +00:00
"revoke" : {
"Revoke a leased secret immediately" ,
`
When a secret is generated with a lease , it is automatically revoked
at the end of the lease period if not renewed . However , in some cases
you may want to force an immediate revocation . This endpoint can be
2015-04-08 20:35:32 +00:00
used to revoke the secret with the given Lease ID .
2015-03-16 23:26:34 +00:00
` ,
} ,
2015-03-16 23:33:48 +00:00
2018-07-11 19:45:09 +00:00
"revoke-sync" : {
"Whether or not to perform the revocation synchronously" ,
`
If false , the call will return immediately and revocation will be queued ; if it
fails , Vault will keep trying . If true , if the revocation fails , Vault will not
automatically try again and will return an error . For revoke - prefix , this
setting will apply to all leases being revoked . For revoke - force , since errors
are ignored , this setting is not supported .
` ,
} ,
2015-03-16 23:33:48 +00:00
"revoke-prefix" : {
"Revoke all secrets generated in a given prefix" ,
`
Revokes all the secrets generated under a given mount prefix . As
an example , "prod/aws/" might be the AWS logical backend , and due to
a change in the "ops" policy , we may want to invalidate all the secrets
generated . We can do a revoke prefix at "prod/aws/ops" to revoke all
2015-04-08 20:35:32 +00:00
the ops secrets . This does a prefix match on the Lease IDs and revokes
2015-03-16 23:33:48 +00:00
all matching leases .
` ,
} ,
"revoke-prefix-path" : {
` The path to revoke keys under. Example: "prod/aws/ops" ` ,
"" ,
} ,
2015-03-20 19:48:19 +00:00
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
"revoke-force" : {
"Revoke all secrets generated in a given prefix, ignoring errors." ,
`
See the path help for ' revoke - prefix ' ; this behaves the same , except that it
ignores errors encountered during revocation . This can be used in certain
recovery situations ; for instance , when you want to unmount a backend , but it
is impossible to fix revocation errors and these errors prevent the unmount
from proceeding . This is a DANGEROUS operation as it removes Vault ' s oversight
of external secrets . Access to this prefix should be tightly controlled .
` ,
} ,
"revoke-force-path" : {
` The path to revoke keys under. Example: "prod/aws/ops" ` ,
"" ,
} ,
2015-03-20 19:48:19 +00:00
"auth-table" : {
"List the currently enabled credential backends." ,
`
2016-04-13 21:15:54 +00:00
This path responds to the following HTTP methods .
GET /
List the currently enabled credential backends : the name , the type of
the backend , and a user friendly description of the purpose for the
credential backend .
POST / < mount point >
2017-09-13 01:48:52 +00:00
Enable a new auth method .
2016-04-13 21:15:54 +00:00
DELETE / < mount point >
2017-09-13 01:48:52 +00:00
Disable the auth method at the given mount point .
2015-03-20 19:48:19 +00:00
` ,
} ,
"auth" : {
` Enable a new credential backend with a name. ` ,
`
Enable a credential mechanism at a new path . A backend can be mounted multiple times at
multiple paths in order to configure multiple separately configured backends .
Example : you might have an OAuth backend for GitHub , and one for Google Apps .
` ,
} ,
"auth_path" : {
` The path to mount to. Cannot be delimited. Example: "user" ` ,
"" ,
} ,
"auth_type" : {
` The type of the backend. Example: "userpass" ` ,
"" ,
} ,
"auth_desc" : {
2018-03-20 18:54:10 +00:00
` User-friendly description for this credential backend. ` ,
2015-03-20 19:48:19 +00:00
"" ,
} ,
2015-03-23 21:43:31 +00:00
2017-08-31 16:16:59 +00:00
"auth_config" : {
` Configuration for this mount, such as plugin_name. ` ,
} ,
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
"auth_plugin" : {
` Name of the auth plugin to use based from the name in the plugin catalog. ` ,
"" ,
} ,
2018-03-21 19:04:27 +00:00
"auth_options" : {
` The options to pass into the backend. Should be a json object with string keys and values. ` ,
} ,
2015-03-23 21:43:31 +00:00
"policy-list" : {
` List the configured access control policies. ` ,
`
2016-04-13 21:15:54 +00:00
This path responds to the following HTTP methods .
GET /
List the names of the configured access control policies .
GET / < name >
Retrieve the rules for the named policy .
PUT / < name >
Add or update a policy .
DELETE / < name >
Delete the policy with the given name .
2015-03-23 21:43:31 +00:00
` ,
} ,
"policy" : {
` Read, Modify, or Delete an access control policy. ` ,
`
Read the rules of an existing policy , create or update the rules of a policy ,
or delete a policy .
` ,
} ,
"policy-name" : {
` The name of the policy. Example: "ops" ` ,
"" ,
} ,
"policy-rules" : {
2018-09-18 03:03:00 +00:00
` The rules of the policy. ` ,
"" ,
} ,
"policy-paths" : {
` The paths on which the policy should be applied. ` ,
"" ,
} ,
"policy-enforcement-level" : {
` The enforcement level to apply to the policy. ` ,
2015-03-23 21:43:31 +00:00
"" ,
} ,
2015-03-31 23:45:00 +00:00
2020-05-27 18:28:00 +00:00
"password-policy-name" : {
` The name of the password policy. ` ,
"" ,
} ,
2015-11-19 01:26:03 +00:00
"audit-hash" : {
"The hash of the given string via the given audit backend" ,
"" ,
} ,
2015-03-31 23:45:00 +00:00
"audit-table" : {
"List the currently enabled audit backends." ,
`
2016-04-13 21:15:54 +00:00
This path responds to the following HTTP methods .
GET /
List the currently enabled audit backends .
PUT / < path >
Enable an audit backend at the given path .
DELETE / < path >
Disable the given audit backend .
2015-03-31 23:45:00 +00:00
` ,
} ,
"audit_path" : {
` The name of the backend. Cannot be delimited. Example: "mysql" ` ,
"" ,
} ,
"audit_type" : {
` The type of the backend. Example: "mysql" ` ,
"" ,
} ,
"audit_desc" : {
` User-friendly description for this audit backend. ` ,
"" ,
} ,
"audit_opts" : {
` Configuration options for the audit backend. ` ,
"" ,
} ,
"audit" : {
` Enable or disable audit backends. ` ,
`
Enable a new audit backend or disable an existing backend .
` ,
} ,
2015-05-28 00:53:42 +00:00
2021-11-30 19:49:58 +00:00
"ha-status" : {
"Provides information about the nodes in an HA cluster." ,
`
Provides the list of hosts known to the active node and when they were last heard from .
` ,
} ,
2015-05-28 00:53:42 +00:00
"key-status" : {
"Provides information about the backend encryption key." ,
`
Provides the current backend encryption key term and installation time .
` ,
} ,
2021-02-25 20:27:25 +00:00
"rotate-config" : {
"Configures settings related to the backend encryption key management." ,
`
Configures settings related to the automatic rotation of the backend encryption key .
` ,
} ,
"rotation-enabled" : {
"Whether automatic rotation is enabled." ,
"" ,
} ,
"rotation-max-operations" : {
"The number of encryption operations performed before the barrier key is automatically rotated." ,
"" ,
} ,
"rotation-interval" : {
"How long after installation of an active key term that the key will be automatically rotated." ,
"" ,
} ,
2015-05-28 00:53:42 +00:00
"rotate" : {
"Rotates the backend encryption key used to persist data." ,
`
Rotate generates a new encryption key which is used to encrypt all
data going to the storage backend . The old encryption keys are kept so
that data encrypted using those keys can still be decrypted .
` ,
} ,
2016-03-10 02:04:54 +00:00
"rekey_backup" : {
"Allows fetching or deleting the backup of the rotated unseal keys." ,
"" ,
} ,
2016-03-17 19:23:36 +00:00
"capabilities" : {
"Fetches the capabilities of the given token on the given path." ,
2016-03-18 03:01:28 +00:00
` Returns the capabilities of the given token on the path .
The path will be searched for a path match in all the policies associated with the token . ` ,
} ,
"capabilities_self" : {
"Fetches the capabilities of the given token on the given path." ,
` Returns the capabilities of the client token on the path .
The path will be searched for a path match in all the policies associated with the client token . ` ,
2016-03-17 19:23:36 +00:00
} ,
"capabilities_accessor" : {
"Fetches the capabilities of the token associated with the given token, on the given path." ,
2016-03-18 03:01:28 +00:00
` When there is no access to the token , token accessor can be used to fetch the token ' s capabilities
on a given path . ` ,
2016-03-17 19:23:36 +00:00
} ,
2016-09-29 04:01:28 +00:00
2017-03-07 20:22:21 +00:00
"tidy_leases" : {
` This endpoint performs cleanup tasks that can be run if certain error
conditions have occurred . ` ,
2017-03-07 21:06:05 +00:00
` This endpoint performs cleanup tasks that can be run to clean up the
2017-03-07 20:22:21 +00:00
lease entries after certain error conditions . Usually running this is not
necessary , and is only required if upgrade notes or support personnel suggest
it . ` ,
} ,
2016-09-29 04:01:28 +00:00
"wrap" : {
"Response-wraps an arbitrary JSON object." ,
` Round trips the given input data into a response-wrapped token. ` ,
} ,
2017-01-04 21:44:03 +00:00
"wrappubkey" : {
"Returns pubkeys used in some wrapping formats." ,
"Returns pubkeys used in some wrapping formats." ,
} ,
2016-09-29 04:01:28 +00:00
"unwrap" : {
"Unwraps a response-wrapped token." ,
` Unwraps a response - wrapped token . Unlike simply reading from cubbyhole / response ,
this provides additional validation on the token , and rather than a JSON - escaped
string , the returned response is the exact same as the contained wrapped response . ` ,
} ,
"wraplookup" : {
"Looks up the properties of a response-wrapped token." ,
` Returns the creation TTL and creation time of a response-wrapped token. ` ,
} ,
"rewrap" : {
"Rotates a response-wrapped token." ,
` Rotates a response - wrapped token ; the output is a new token with the same
response wrapped inside and the same creation TTL . The original token is revoked . ` ,
} ,
2017-02-03 18:08:31 +00:00
"audited-headers-name" : {
"Configures the headers sent to the audit logs." ,
`
This path responds to the following HTTP methods .
GET / < name >
Returns the setting for the header with the given name .
POST / < name >
Enable auditing of the given header .
DELETE / < path >
Disable auditing of the given header .
` ,
} ,
"audited-headers" : {
"Lists the headers configured to be audited." ,
` Returns a list of headers that have been configured to be audited. ` ,
} ,
2018-11-07 01:21:24 +00:00
"plugin-catalog-list-all" : {
"Lists all the plugins known to Vault" ,
`
This path responds to the following HTTP methods .
LIST /
Returns a list of names of configured plugins .
` ,
} ,
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
"plugin-catalog" : {
2018-11-07 01:21:24 +00:00
"Configures the plugins known to Vault" ,
2017-04-12 17:01:36 +00:00
`
This path responds to the following HTTP methods .
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
LIST /
Returns a list of names of configured plugins .
2017-05-04 02:03:42 +00:00
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
GET / < name >
Retrieve the metadata for the named plugin .
2017-04-12 17:01:36 +00:00
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
PUT / < name >
Add or update plugin .
2017-04-12 17:01:36 +00:00
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
DELETE / < name >
Delete the plugin with the given name .
2017-04-12 17:01:36 +00:00
` ,
} ,
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
"plugin-catalog_name" : {
"The name of the plugin" ,
"" ,
} ,
2018-11-07 01:21:24 +00:00
"plugin-catalog_type" : {
"The type of the plugin, may be auth, secret, or database" ,
"" ,
} ,
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
"plugin-catalog_sha-256" : {
2017-10-19 20:29:59 +00:00
` The SHA256 sum of the executable used in the
Backend plugin system (#2874)
* Add backend plugin changes
* Fix totp backend plugin tests
* Fix logical/plugin InvalidateKey test
* Fix plugin catalog CRUD test, fix NoopBackend
* Clean up commented code block
* Fix system backend mount test
* Set plugin_name to omitempty, fix handleMountTable config parsing
* Clean up comments, keep shim connections alive until cleanup
* Include pluginClient, disallow LookupPlugin call from within a plugin
* Add wrapper around backendPluginClient for proper cleanup
* Add logger shim tests
* Add logger, storage, and system shim tests
* Use pointer receivers for system view shim
* Use plugin name if no path is provided on mount
* Enable plugins for auth backends
* Add backend type attribute, move builtin/plugin/package
* Fix merge conflict
* Fix missing plugin name in mount config
* Add integration tests on enabling auth backend plugins
* Remove dependency cycle on mock-plugin
* Add passthrough backend plugin, use logical.BackendType to determine lease generation
* Remove vault package dependency on passthrough package
* Add basic impl test for passthrough plugin
* Incorporate feedback; set b.backend after shims creation on backendPluginServer
* Fix totp plugin test
* Add plugin backends docs
* Fix tests
* Fix builtin/plugin tests
* Remove flatten from PluginRunner fields
* Move mock plugin to logical/plugin, remove totp and passthrough plugins
* Move pluginMap into newPluginClient
* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck
* Change shim logger's Fatal to no-op
* Change BackendType to uint32, match UX backend types
* Change framework.Backend Setup signature
* Add Setup func to logical.Backend interface
* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments
* Remove commented var in plugin package
* RegisterLicense on logical.Backend interface (#3017)
* Add RegisterLicense to logical.Backend interface
* Update RegisterLicense to use callback func on framework.Backend
* Refactor framework.Backend.RegisterLicense
* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs
* plugin: Revert BackendType to remove TypePassthrough and related references
* Fix typo in plugin backends docs
2017-07-20 17:28:40 +00:00
command field . This should be HEX encoded . ` ,
"" ,
} ,
"plugin-catalog_command" : {
` The command used to start the plugin . The
executable defined in this command must exist in vault ' s
plugin directory . ` ,
"" ,
} ,
2018-01-18 00:19:28 +00:00
"plugin-catalog_args" : {
` The args passed to plugin command. ` ,
"" ,
} ,
2018-09-20 17:50:29 +00:00
"plugin-catalog_env" : {
` The environment variables passed to plugin command .
Each entry is of the form "key=value" . ` ,
"" ,
} ,
2022-08-25 20:31:42 +00:00
"plugin-catalog_version" : {
"The semantic version of the plugin to use." ,
"" ,
} ,
2017-05-04 02:03:42 +00:00
"leases" : {
` View or list lease metadata. ` ,
`
This path responds to the following HTTP methods .
PUT /
Retrieve the metadata for the provided lease id .
LIST / < prefix >
Lists the leases for the named prefix .
` ,
} ,
"leases-list-prefix" : {
` The path to list leases under. Example: "aws/creds/deploy" ` ,
"" ,
} ,
2017-08-08 04:18:59 +00:00
"plugin-reload" : {
"Reload mounts that use a particular backend plugin." ,
` Reload mounts that use a particular backend plugin . Either the plugin name
or the desired plugin backend mounts must be provided , but not both . In the
case that the plugin name is provided , all mounted paths that use that plugin
backend will be reloaded . ` ,
} ,
"plugin-backend-reload-plugin" : {
` The name of the plugin to reload, as registered in the plugin catalog. ` ,
"" ,
} ,
"plugin-backend-reload-mounts" : {
` The mount paths of the plugin backends to reload. ` ,
"" ,
} ,
2017-10-20 14:59:17 +00:00
"hash" : {
"Generate a hash sum for input data" ,
"Generates a hash sum of the given algorithm against the given input data." ,
} ,
"random" : {
"Generate random bytes" ,
"This function can be used to generate high-entropy random bytes." ,
} ,
2018-03-20 03:16:33 +00:00
"listing_visibility" : {
2022-06-06 20:44:46 +00:00
"Determines the visibility of the mount in the UI-specific listing endpoint. Accepted value are 'unauth' and 'hidden', with the empty default ('') behaving like 'hidden'." ,
2018-04-20 18:19:04 +00:00
"" ,
2018-03-20 03:16:33 +00:00
} ,
2018-03-21 23:56:47 +00:00
"passthrough_request_headers" : {
2019-02-05 21:02:15 +00:00
"A list of headers to whitelist and pass from the request to the plugin." ,
"" ,
} ,
"allowed_response_headers" : {
"A list of headers to whitelist and allow a plugin to set on responses." ,
2018-04-20 18:19:04 +00:00
"" ,
2018-03-21 23:56:47 +00:00
} ,
2018-10-15 16:56:24 +00:00
"token_type" : {
"The type of token to issue (service or batch)." ,
"" ,
} ,
2018-04-17 17:54:04 +00:00
"raw" : {
"Write, Read, and Delete data directly in the Storage backend." ,
"" ,
} ,
2021-01-06 22:05:00 +00:00
"internal-ui-feature-flags" : {
"Enabled feature flags. Internal API; its location, inputs, and outputs may change." ,
"" ,
} ,
2018-04-20 18:19:04 +00:00
"internal-ui-mounts" : {
"Information about mounts returned according to their tuned visibility. Internal API; its location, inputs, and outputs may change." ,
"" ,
} ,
2018-09-18 03:03:00 +00:00
"internal-ui-namespaces" : {
"Information about visible child namespaces. Internal API; its location, inputs, and outputs may change." ,
` Information about visible child namespaces returned starting from the request ' s
context namespace and filtered based on access from the client token . Internal API ;
its location , inputs , and outputs may change . ` ,
} ,
2018-04-20 18:19:04 +00:00
"internal-ui-resultant-acl" : {
"Information about a token's resultant ACL. Internal API; its location, inputs, and outputs may change." ,
"" ,
} ,
2019-02-14 20:46:59 +00:00
"metrics" : {
"Export the metrics aggregated for telemetry purpose." ,
"" ,
} ,
2021-12-08 22:34:42 +00:00
"in-flight-req" : {
"reports in-flight requests" ,
`
This path responds to the following HTTP methods .
GET /
Returns a map of in - flight requests .
` ,
} ,
2019-03-05 19:55:07 +00:00
"internal-counters-requests" : {
2021-07-29 17:21:40 +00:00
"Currently unsupported. Previously, count of requests seen by this Vault cluster over time." ,
"Currently unsupported. Previously, count of requests seen by this Vault cluster over time. Not included in count: health checks, UI asset requests, requests forwarded from another cluster." ,
2019-03-05 19:55:07 +00:00
} ,
2019-10-08 17:58:19 +00:00
"internal-counters-tokens" : {
"Count of active tokens in this Vault cluster." ,
"Count of active tokens in this Vault cluster." ,
} ,
"internal-counters-entities" : {
"Count of active entities in this Vault cluster." ,
"Count of active entities in this Vault cluster." ,
} ,
2022-11-04 16:39:09 +00:00
"internal-inspect-router" : {
"Information on the entries in each of the trees in the router. Inspectable trees are uuid, accessor, storage, and root." ,
`
This path responds to the following HTTP methods .
GET /
Returns a list of entries in specified table
` ,
} ,
2019-10-03 16:43:52 +00:00
"host-info" : {
2019-10-04 00:02:19 +00:00
"Information about the host instance that this Vault server is running on." ,
` Information about the host instance that this Vault server is running on .
2019-10-03 16:43:52 +00:00
The information that gets collected includes host hardware information , and CPU ,
disk , and memory utilization ` ,
} ,
2020-10-29 23:47:34 +00:00
"activity-query" : {
"Query the historical count of clients." ,
"Query the historical count of clients." ,
} ,
2022-05-25 00:00:46 +00:00
"activity-export" : {
"Export the historical activity of clients." ,
"Export the historical activity of clients." ,
} ,
2021-03-01 23:15:59 +00:00
"activity-monthly" : {
"Count of active clients so far this month." ,
"Count of active clients so far this month." ,
} ,
2020-10-29 23:47:34 +00:00
"activity-config" : {
"Control the collection and reporting of client counts." ,
"Control the collection and reporting of client counts." ,
} ,
2021-06-02 16:11:30 +00:00
"count-leases" : {
"Count of leases associated with this Vault cluster" ,
"Count of leases associated with this Vault cluster" ,
} ,
"list-leases" : {
"List leases associated with this Vault cluster" ,
2021-06-28 22:51:47 +00:00
"Requires sudo capability. List leases associated with this Vault cluster" ,
2021-06-02 16:11:30 +00:00
} ,
2022-02-14 20:26:57 +00:00
"version-history" : {
"List historical version changes sorted by installation time in ascending order." ,
`
This path responds to the following HTTP methods .
LIST /
Returns a list historical version changes sorted by installation time in ascending order .
` ,
} ,
2023-01-16 16:07:18 +00:00
"experiments" : {
"Returns information about Vault's experimental features. Should NOT be used in production." ,
`
This path responds to the following HTTP methods .
GET /
Returns the available and enabled experiments .
` ,
} ,
2015-03-16 00:35:59 +00:00
}