open-vault/vault/init.go

304 lines
8.7 KiB
Go
Raw Normal View History

2016-04-04 14:44:22 +00:00
package vault
import (
"encoding/base64"
2016-04-04 14:44:22 +00:00
"encoding/hex"
"fmt"
"github.com/hashicorp/vault/helper/pgpkeys"
"github.com/hashicorp/vault/shamir"
)
// InitParams keeps the init function from being littered with too many
// params, that's it!
type InitParams struct {
BarrierConfig *SealConfig
RecoveryConfig *SealConfig
RootTokenPGPKey string
}
2016-04-04 14:44:22 +00:00
// InitResult is used to provide the key parts back after
// they are generated as part of the initialization.
type InitResult struct {
SecretShares [][]byte
RecoveryShares [][]byte
RootToken string
}
// Initialized checks if the Vault is already initialized
func (c *Core) Initialized() (bool, error) {
// Check the barrier first
init, err := c.barrier.Initialized()
if err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: barrier init check failed", "error", err)
2016-04-04 14:44:22 +00:00
return false, err
}
if !init {
2016-08-19 20:45:17 +00:00
c.logger.Info("core: security barrier not initialized")
2016-04-04 14:44:22 +00:00
return false, nil
}
// Verify the seal configuration
sealConf, err := c.seal.BarrierConfig()
if err != nil {
return false, err
}
if sealConf == nil {
2016-08-19 20:45:17 +00:00
return false, fmt.Errorf("core: barrier reports initialized but no seal configuration found")
2016-04-04 14:44:22 +00:00
}
2016-04-04 14:44:22 +00:00
return true, nil
}
func (c *Core) generateShares(sc *SealConfig) ([]byte, [][]byte, error) {
// Generate a master key
masterKey, err := c.barrier.GenerateKey()
if err != nil {
return nil, nil, fmt.Errorf("key generation failed: %v", err)
}
// Return the master key if only a single key part is used
var unsealKeys [][]byte
if sc.SecretShares == 1 {
unsealKeys = append(unsealKeys, masterKey)
} else {
// Split the master key using the Shamir algorithm
shares, err := shamir.Split(masterKey, sc.SecretShares, sc.SecretThreshold)
if err != nil {
2016-08-19 20:45:17 +00:00
return nil, nil, fmt.Errorf("failed to generate barrier shares: %v", err)
2016-04-04 14:44:22 +00:00
}
unsealKeys = shares
}
// If we have PGP keys, perform the encryption
if len(sc.PGPKeys) > 0 {
hexEncodedShares := make([][]byte, len(unsealKeys))
for i, _ := range unsealKeys {
hexEncodedShares[i] = []byte(hex.EncodeToString(unsealKeys[i]))
}
_, encryptedShares, err := pgpkeys.EncryptShares(hexEncodedShares, sc.PGPKeys)
if err != nil {
return nil, nil, err
}
unsealKeys = encryptedShares
}
return masterKey, unsealKeys, nil
}
// Initialize is used to initialize the Vault with the given
// configurations.
func (c *Core) Initialize(initParams *InitParams) (*InitResult, error) {
barrierConfig := initParams.BarrierConfig
recoveryConfig := initParams.RecoveryConfig
2016-04-04 14:44:22 +00:00
if c.seal.RecoveryKeySupported() {
if recoveryConfig == nil {
return nil, fmt.Errorf("recovery configuration must be supplied")
}
if recoveryConfig.SecretShares < 1 {
return nil, fmt.Errorf("recovery configuration must specify a positive number of shares")
2016-04-04 14:44:22 +00:00
}
2016-05-15 16:58:36 +00:00
// Check if the seal configuration is valid
if err := recoveryConfig.Validate(); err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: invalid recovery configuration", "error", err)
return nil, fmt.Errorf("invalid recovery configuration: %v", err)
2016-04-04 14:44:22 +00:00
}
}
2016-05-15 16:58:36 +00:00
// Check if the seal configuration is valid
2016-04-04 14:44:22 +00:00
if err := barrierConfig.Validate(); err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: invalid seal configuration", "error", err)
2016-04-04 14:44:22 +00:00
return nil, fmt.Errorf("invalid seal configuration: %v", err)
}
// Avoid an initialization race
c.stateLock.Lock()
defer c.stateLock.Unlock()
// Check if we are initialized
init, err := c.Initialized()
if err != nil {
return nil, err
}
if init {
return nil, ErrAlreadyInit
}
err = c.seal.Init()
if err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: failed to initialize seal", "error", err)
2016-04-04 14:44:22 +00:00
return nil, fmt.Errorf("error initializing seal: %v", err)
}
barrierKey, barrierUnsealKeys, err := c.generateShares(barrierConfig)
if err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: error generating shares", "error", err)
2016-04-04 14:44:22 +00:00
return nil, err
}
// Initialize the barrier
if err := c.barrier.Initialize(barrierKey); err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: failed to initialize barrier", "error", err)
2016-04-04 14:44:22 +00:00
return nil, fmt.Errorf("failed to initialize barrier: %v", err)
}
2016-08-19 20:45:17 +00:00
if c.logger.IsInfo() {
c.logger.Info("core: security barrier initialized", "shares", barrierConfig.SecretShares, "threshold", barrierConfig.SecretThreshold)
}
2016-04-04 14:44:22 +00:00
// Unseal the barrier
if err := c.barrier.Unseal(barrierKey); err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: failed to unseal barrier", "error", err)
2016-04-04 14:44:22 +00:00
return nil, fmt.Errorf("failed to unseal barrier: %v", err)
}
// Ensure the barrier is re-sealed
defer func() {
// Defers are LIFO so we need to run this here too to ensure the stop
// happens before sealing. preSeal also stops, so we just make the
// stopping safe against multiple calls.
2016-04-04 14:44:22 +00:00
if err := c.barrier.Seal(); err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: failed to seal barrier", "error", err)
2016-04-04 14:44:22 +00:00
}
}()
err = c.seal.SetBarrierConfig(barrierConfig)
if err != nil {
c.logger.Error("core: failed to save barrier configuration", "error", err)
return nil, fmt.Errorf("barrier configuration saving failed: %v", err)
}
// If we are storing shares, pop them out of the returned results and push
// them through the seal
if barrierConfig.StoredShares > 0 {
var keysToStore [][]byte
for i := 0; i < barrierConfig.StoredShares; i++ {
keysToStore = append(keysToStore, barrierUnsealKeys[0])
barrierUnsealKeys = barrierUnsealKeys[1:]
}
if err := c.seal.SetStoredKeys(keysToStore); err != nil {
c.logger.Error("core: failed to store keys", "error", err)
return nil, fmt.Errorf("failed to store keys: %v", err)
}
}
results := &InitResult{
SecretShares: barrierUnsealKeys,
}
2016-04-04 14:44:22 +00:00
// Perform initial setup
if err := c.setupCluster(); err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: cluster setup failed during init", "error", err)
return nil, err
}
2016-04-04 14:44:22 +00:00
if err := c.postUnseal(); err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: post-unseal setup failed during init", "error", err)
2016-04-04 14:44:22 +00:00
return nil, err
}
2016-04-15 17:04:29 +00:00
// Save the configuration regardless, but only generate a key if it's not
// disabled. When using recovery keys they are stored in the barrier, so
// this must happen post-unseal.
if c.seal.RecoveryKeySupported() {
err = c.seal.SetRecoveryConfig(recoveryConfig)
if err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: failed to save recovery configuration", "error", err)
2016-04-15 17:04:29 +00:00
return nil, fmt.Errorf("recovery configuration saving failed: %v", err)
}
if recoveryConfig.SecretShares > 0 {
recoveryKey, recoveryUnsealKeys, err := c.generateShares(recoveryConfig)
if err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: failed to generate recovery shares", "error", err)
2016-04-15 17:04:29 +00:00
return nil, err
}
err = c.seal.SetRecoveryKey(recoveryKey)
if err != nil {
return nil, err
}
results.RecoveryShares = recoveryUnsealKeys
}
}
2016-04-04 14:44:22 +00:00
// Generate a new root token
rootToken, err := c.tokenStore.rootToken()
if err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: root token generation failed", "error", err)
2016-04-04 14:44:22 +00:00
return nil, err
}
results.RootToken = rootToken.ID
2016-08-19 20:45:17 +00:00
c.logger.Info("core: root token generated")
2016-04-04 14:44:22 +00:00
if initParams.RootTokenPGPKey != "" {
_, encryptedVals, err := pgpkeys.EncryptShares([][]byte{[]byte(results.RootToken)}, []string{initParams.RootTokenPGPKey})
if err != nil {
c.logger.Error("core: root token encryption failed", "error", err)
return nil, err
}
results.RootToken = base64.StdEncoding.EncodeToString(encryptedVals[0])
}
2016-04-04 14:44:22 +00:00
// Prepare to re-seal
if err := c.preSeal(); err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: pre-seal teardown failed", "error", err)
2016-04-04 14:44:22 +00:00
return nil, err
}
return results, nil
}
2017-10-23 20:03:36 +00:00
// UnsealWithStoredKeys performs auto-unseal using stored keys.
func (c *Core) UnsealWithStoredKeys() error {
2016-04-04 14:44:22 +00:00
if !c.seal.StoredKeysSupported() {
return nil
}
sealed, err := c.Sealed()
if err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: error checking sealed status in auto-unseal", "error", err)
return fmt.Errorf("error checking sealed status in auto-unseal: %s", err)
}
if !sealed {
return nil
}
2016-08-19 20:45:17 +00:00
c.logger.Info("core: stored unseal keys supported, attempting fetch")
2016-04-04 14:44:22 +00:00
keys, err := c.seal.GetStoredKeys()
if err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: fetching stored unseal keys failed", "error", err)
2016-04-04 14:44:22 +00:00
return &NonFatalError{Err: fmt.Errorf("fetching stored unseal keys failed: %v", err)}
}
if len(keys) == 0 {
2016-08-19 20:45:17 +00:00
c.logger.Warn("core: stored unseal key(s) supported but none found")
2016-04-04 14:44:22 +00:00
} else {
unsealed := false
keysUsed := 0
for _, key := range keys {
unsealed, err = c.Unseal(key)
if err != nil {
2016-08-19 20:45:17 +00:00
c.logger.Error("core: unseal with stored unseal key failed", "error", err)
2016-04-04 14:44:22 +00:00
return &NonFatalError{Err: fmt.Errorf("unseal with stored key failed: %v", err)}
}
keysUsed += 1
if unsealed {
break
}
}
if !unsealed {
2016-08-19 20:45:17 +00:00
if c.logger.IsWarn() {
c.logger.Warn("core: stored unseal key(s) used but Vault not unsealed yet", "stored_keys_used", keysUsed)
}
2016-04-04 14:44:22 +00:00
} else {
2016-08-19 20:45:17 +00:00
if c.logger.IsInfo() {
c.logger.Info("core: successfully unsealed with stored key(s)", "stored_keys_used", keysUsed)
}
2016-04-04 14:44:22 +00:00
}
}
2017-10-23 20:49:46 +00:00
2016-04-04 14:44:22 +00:00
return nil
}