2015-03-16 02:34:47 +00:00
|
|
|
package http
|
|
|
|
|
|
|
|
import (
|
2020-02-12 22:20:22 +00:00
|
|
|
"bufio"
|
2018-02-01 22:30:17 +00:00
|
|
|
"encoding/base64"
|
|
|
|
"encoding/json"
|
2018-09-18 03:03:00 +00:00
|
|
|
"fmt"
|
2015-04-07 21:36:17 +00:00
|
|
|
"io"
|
2015-05-20 05:23:41 +00:00
|
|
|
"net"
|
2015-03-16 02:34:47 +00:00
|
|
|
"net/http"
|
2016-01-19 23:09:26 +00:00
|
|
|
"strconv"
|
2015-03-16 02:34:47 +00:00
|
|
|
"strings"
|
2016-09-23 16:32:07 +00:00
|
|
|
"time"
|
2015-03-16 02:34:47 +00:00
|
|
|
|
2016-05-02 02:39:45 +00:00
|
|
|
"github.com/hashicorp/errwrap"
|
2020-02-07 08:30:25 +00:00
|
|
|
uuid "github.com/hashicorp/go-uuid"
|
2018-09-18 03:03:00 +00:00
|
|
|
"github.com/hashicorp/vault/helper/namespace"
|
2019-10-17 19:33:29 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/helper/consts"
|
2019-04-12 21:54:35 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/logical"
|
2015-03-16 02:34:47 +00:00
|
|
|
"github.com/hashicorp/vault/vault"
|
2019-10-17 19:33:29 +00:00
|
|
|
"go.uber.org/atomic"
|
2015-03-16 02:34:47 +00:00
|
|
|
)
|
|
|
|
|
2020-02-12 22:20:22 +00:00
|
|
|
// bufferedReader can be used to replace a request body with a buffered
|
|
|
|
// version. The Close method invokes the original Closer.
|
|
|
|
type bufferedReader struct {
|
|
|
|
*bufio.Reader
|
|
|
|
rOrig io.ReadCloser
|
|
|
|
}
|
|
|
|
|
|
|
|
func newBufferedReader(r io.ReadCloser) *bufferedReader {
|
|
|
|
return &bufferedReader{
|
|
|
|
Reader: bufio.NewReader(r),
|
|
|
|
rOrig: r,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *bufferedReader) Close() error {
|
|
|
|
return b.rOrig.Close()
|
|
|
|
}
|
|
|
|
|
2019-10-15 04:55:31 +00:00
|
|
|
func buildLogicalRequestNoAuth(perfStandby bool, w http.ResponseWriter, r *http.Request) (*logical.Request, io.ReadCloser, int, error) {
|
2018-09-18 03:03:00 +00:00
|
|
|
ns, err := namespace.FromContext(r.Context())
|
|
|
|
if err != nil {
|
2019-04-05 18:36:34 +00:00
|
|
|
return nil, nil, http.StatusBadRequest, nil
|
2016-05-20 17:03:54 +00:00
|
|
|
}
|
2018-09-18 03:03:00 +00:00
|
|
|
path := ns.TrimmedPath(r.URL.Path[len("/v1/"):])
|
2015-03-16 02:34:47 +00:00
|
|
|
|
2018-08-14 02:00:26 +00:00
|
|
|
var data map[string]interface{}
|
2019-04-05 18:36:34 +00:00
|
|
|
var origBody io.ReadCloser
|
2019-09-06 19:40:15 +00:00
|
|
|
var passHTTPReq bool
|
2019-09-06 17:34:36 +00:00
|
|
|
var responseWriter http.ResponseWriter
|
2018-08-14 02:00:26 +00:00
|
|
|
|
2016-05-20 17:03:54 +00:00
|
|
|
// Determine the operation
|
|
|
|
var op logical.Operation
|
|
|
|
switch r.Method {
|
|
|
|
case "DELETE":
|
|
|
|
op = logical.DeleteOperation
|
2019-07-18 17:42:36 +00:00
|
|
|
data = parseQuery(r.URL.Query())
|
2016-05-20 17:03:54 +00:00
|
|
|
case "GET":
|
|
|
|
op = logical.ReadOperation
|
|
|
|
queryVals := r.URL.Query()
|
2018-08-14 02:00:26 +00:00
|
|
|
var list bool
|
|
|
|
var err error
|
2016-05-20 17:03:54 +00:00
|
|
|
listStr := queryVals.Get("list")
|
|
|
|
if listStr != "" {
|
2018-08-14 02:00:26 +00:00
|
|
|
list, err = strconv.ParseBool(listStr)
|
2015-04-07 21:36:17 +00:00
|
|
|
if err != nil {
|
2019-04-05 18:36:34 +00:00
|
|
|
return nil, nil, http.StatusBadRequest, nil
|
2016-05-20 17:03:54 +00:00
|
|
|
}
|
|
|
|
if list {
|
|
|
|
op = logical.ListOperation
|
2018-08-14 02:00:26 +00:00
|
|
|
if !strings.HasSuffix(path, "/") {
|
|
|
|
path += "/"
|
|
|
|
}
|
2015-03-16 02:34:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-14 02:00:26 +00:00
|
|
|
if !list {
|
2019-07-18 17:42:36 +00:00
|
|
|
data = parseQuery(queryVals)
|
2018-08-14 02:00:26 +00:00
|
|
|
}
|
2019-07-18 17:42:36 +00:00
|
|
|
|
2019-09-19 20:44:37 +00:00
|
|
|
switch {
|
|
|
|
case strings.HasPrefix(path, "sys/pprof/"):
|
|
|
|
passHTTPReq = true
|
|
|
|
responseWriter = w
|
|
|
|
case path == "sys/storage/raft/snapshot":
|
2019-06-20 19:14:58 +00:00
|
|
|
responseWriter = w
|
|
|
|
}
|
2018-02-21 22:36:53 +00:00
|
|
|
|
2018-08-14 02:00:26 +00:00
|
|
|
case "POST", "PUT":
|
|
|
|
op = logical.UpdateOperation
|
2020-02-12 22:20:22 +00:00
|
|
|
|
|
|
|
// Buffer the request body in order to allow us to peek at the beginning
|
|
|
|
// without consuming it. This approach involves no copying.
|
|
|
|
bufferedBody := newBufferedReader(r.Body)
|
|
|
|
r.Body = bufferedBody
|
|
|
|
|
|
|
|
// If we are uploading a snapshot we don't want to parse it. Instead
|
|
|
|
// we will simply add the HTTP request to the logical request object
|
|
|
|
// for later consumption.
|
|
|
|
if path == "sys/storage/raft/snapshot" || path == "sys/storage/raft/snapshot-force" {
|
|
|
|
passHTTPReq = true
|
|
|
|
origBody = r.Body
|
|
|
|
} else {
|
|
|
|
// Sample the first bytes to determine whether this should be parsed as
|
|
|
|
// a form or as JSON. The amount to look ahead (512 bytes) is arbitrary
|
|
|
|
// but extremely tolerant (i.e. allowing 511 bytes of leading whitespace
|
|
|
|
// and an incorrect content-type).
|
|
|
|
head, err := bufferedBody.Peek(512)
|
|
|
|
if err != nil && err != bufio.ErrBufferFull && err != io.EOF {
|
|
|
|
return nil, nil, http.StatusBadRequest, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if isForm(head, r.Header.Get("Content-Type")) {
|
|
|
|
formData, err := parseFormRequest(r)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, http.StatusBadRequest, fmt.Errorf("error parsing form data: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
data = formData
|
2019-06-20 19:14:58 +00:00
|
|
|
} else {
|
2020-02-12 22:20:22 +00:00
|
|
|
origBody, err = parseJSONRequest(perfStandby, r, w, &data)
|
2019-06-20 19:14:58 +00:00
|
|
|
if err == io.EOF {
|
|
|
|
data = nil
|
|
|
|
err = nil
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, http.StatusBadRequest, err
|
|
|
|
}
|
2018-02-21 22:36:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-14 02:00:26 +00:00
|
|
|
case "LIST":
|
|
|
|
op = logical.ListOperation
|
|
|
|
if !strings.HasSuffix(path, "/") {
|
|
|
|
path += "/"
|
2018-02-21 22:36:53 +00:00
|
|
|
}
|
2018-08-14 02:00:26 +00:00
|
|
|
|
|
|
|
case "OPTIONS":
|
|
|
|
default:
|
2019-04-05 18:36:34 +00:00
|
|
|
return nil, nil, http.StatusMethodNotAllowed, nil
|
2018-02-21 22:36:53 +00:00
|
|
|
}
|
|
|
|
|
2016-07-26 19:50:37 +00:00
|
|
|
request_id, err := uuid.GenerateUUID()
|
|
|
|
if err != nil {
|
2019-04-05 18:36:34 +00:00
|
|
|
return nil, nil, http.StatusBadRequest, errwrap.Wrapf("failed to generate identifier for the request: {{err}}", err)
|
2016-07-26 19:50:37 +00:00
|
|
|
}
|
|
|
|
|
2019-10-15 04:55:31 +00:00
|
|
|
req := &logical.Request{
|
2016-07-26 20:44:50 +00:00
|
|
|
ID: request_id,
|
2016-05-20 17:03:54 +00:00
|
|
|
Operation: op,
|
|
|
|
Path: path,
|
|
|
|
Data: data,
|
|
|
|
Connection: getConnection(r),
|
2017-02-02 19:49:20 +00:00
|
|
|
Headers: r.Header,
|
2019-10-15 04:55:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if passHTTPReq {
|
|
|
|
req.HTTPRequest = r
|
|
|
|
}
|
|
|
|
if responseWriter != nil {
|
|
|
|
req.ResponseWriter = logical.NewHTTPResponseWriter(responseWriter)
|
|
|
|
}
|
|
|
|
|
|
|
|
return req, origBody, 0, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func buildLogicalRequest(core *vault.Core, w http.ResponseWriter, r *http.Request) (*logical.Request, io.ReadCloser, int, error) {
|
|
|
|
req, origBody, status, err := buildLogicalRequestNoAuth(core.PerfStandby(), w, r)
|
2019-10-24 17:37:13 +00:00
|
|
|
if err != nil || status != 0 {
|
2019-10-15 04:55:31 +00:00
|
|
|
return nil, nil, status, err
|
|
|
|
}
|
|
|
|
|
|
|
|
req, err = requestAuth(core, r, req)
|
2018-09-18 03:03:00 +00:00
|
|
|
if err != nil {
|
|
|
|
if errwrap.Contains(err, logical.ErrPermissionDenied.Error()) {
|
2019-04-05 18:36:34 +00:00
|
|
|
return nil, nil, http.StatusForbidden, nil
|
2018-09-18 03:03:00 +00:00
|
|
|
}
|
2019-04-05 18:36:34 +00:00
|
|
|
return nil, nil, http.StatusBadRequest, errwrap.Wrapf("error performing token check: {{err}}", err)
|
2018-09-18 03:03:00 +00:00
|
|
|
}
|
2016-10-29 21:01:49 +00:00
|
|
|
|
2017-01-04 21:44:03 +00:00
|
|
|
req, err = requestWrapInfo(r, req)
|
2016-05-20 17:03:54 +00:00
|
|
|
if err != nil {
|
2019-04-05 18:36:34 +00:00
|
|
|
return nil, nil, http.StatusBadRequest, errwrap.Wrapf("error parsing X-Vault-Wrap-TTL header: {{err}}", err)
|
2016-05-20 17:03:54 +00:00
|
|
|
}
|
|
|
|
|
2018-09-18 03:03:00 +00:00
|
|
|
err = parseMFAHeader(req)
|
|
|
|
if err != nil {
|
2019-04-05 18:36:34 +00:00
|
|
|
return nil, nil, http.StatusBadRequest, errwrap.Wrapf("failed to parse X-Vault-MFA header: {{err}}", err)
|
2018-09-18 03:03:00 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
err = requestPolicyOverride(r, req)
|
|
|
|
if err != nil {
|
2019-04-05 18:36:34 +00:00
|
|
|
return nil, nil, http.StatusBadRequest, errwrap.Wrapf(fmt.Sprintf(`failed to parse %s header: {{err}}`, PolicyOverrideHeaderName), err)
|
2018-09-18 03:03:00 +00:00
|
|
|
}
|
|
|
|
|
2019-04-05 18:36:34 +00:00
|
|
|
return req, origBody, 0, nil
|
2016-05-20 17:03:54 +00:00
|
|
|
}
|
|
|
|
|
2019-09-17 00:50:28 +00:00
|
|
|
// handleLogical returns a handler for processing logical requests. These requests
|
|
|
|
// may or may not end up getting forwarded under certain scenarios if the node
|
|
|
|
// is a performance standby. Some of these cases include:
|
|
|
|
// - Perf standby and token with limited use count.
|
|
|
|
// - Perf standby and token re-validation needed (e.g. due to invalid token).
|
|
|
|
// - Perf standby and control group error.
|
2018-09-18 03:03:00 +00:00
|
|
|
func handleLogical(core *vault.Core) http.Handler {
|
2019-09-17 00:50:28 +00:00
|
|
|
return handleLogicalInternal(core, false, false)
|
2018-09-05 15:45:17 +00:00
|
|
|
}
|
|
|
|
|
2019-09-17 00:50:28 +00:00
|
|
|
// handleLogicalWithInjector returns a handler for processing logical requests
|
|
|
|
// that also have their logical response data injected at the top-level payload.
|
|
|
|
// All forwarding behavior remains the same as `handleLogical`.
|
2018-09-18 03:03:00 +00:00
|
|
|
func handleLogicalWithInjector(core *vault.Core) http.Handler {
|
2019-09-17 00:50:28 +00:00
|
|
|
return handleLogicalInternal(core, true, false)
|
2018-09-05 15:45:17 +00:00
|
|
|
}
|
|
|
|
|
2019-09-17 00:50:28 +00:00
|
|
|
// handleLogicalNoForward returns a handler for processing logical local-only
|
|
|
|
// requests. These types of requests never forwarded, and return an
|
|
|
|
// `vault.ErrCannotForwardLocalOnly` error if attempted to do so.
|
|
|
|
func handleLogicalNoForward(core *vault.Core) http.Handler {
|
|
|
|
return handleLogicalInternal(core, false, true)
|
|
|
|
}
|
|
|
|
|
2019-10-15 04:55:31 +00:00
|
|
|
func handleLogicalRecovery(raw *vault.RawBackend, token *atomic.String) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
req, _, statusCode, err := buildLogicalRequestNoAuth(false, w, r)
|
|
|
|
if err != nil || statusCode != 0 {
|
|
|
|
respondError(w, statusCode, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
reqToken := r.Header.Get(consts.AuthHeaderName)
|
|
|
|
if reqToken == "" || token.Load() == "" || reqToken != token.Load() {
|
|
|
|
respondError(w, http.StatusForbidden, nil)
|
2020-04-21 22:30:36 +00:00
|
|
|
return
|
2019-10-15 04:55:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := raw.HandleRequest(r.Context(), req)
|
|
|
|
if respondErrorCommon(w, req, resp, err) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var httpResp *logical.HTTPResponse
|
|
|
|
if resp != nil {
|
|
|
|
httpResp = logical.LogicalResponseToHTTPResponse(resp)
|
|
|
|
httpResp.RequestID = req.ID
|
|
|
|
}
|
|
|
|
respondOk(w, httpResp)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-09-17 00:50:28 +00:00
|
|
|
// handleLogicalInternal is a common helper that returns a handler for
|
|
|
|
// processing logical requests. The behavior depends on the various boolean
|
|
|
|
// toggles. Refer to usage on functions for possible behaviors.
|
|
|
|
func handleLogicalInternal(core *vault.Core, injectDataIntoTopLevel bool, noForward bool) http.Handler {
|
2016-05-20 17:03:54 +00:00
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
2019-04-05 18:36:34 +00:00
|
|
|
req, origBody, statusCode, err := buildLogicalRequest(core, w, r)
|
2016-05-20 17:03:54 +00:00
|
|
|
if err != nil || statusCode != 0 {
|
|
|
|
respondError(w, statusCode, err)
|
2016-05-02 02:39:45 +00:00
|
|
|
return
|
|
|
|
}
|
2016-03-18 02:29:53 +00:00
|
|
|
|
2019-04-05 18:36:34 +00:00
|
|
|
// Always forward requests that are using a limited use count token.
|
2019-04-08 20:48:44 +00:00
|
|
|
if core.PerfStandby() && req.ClientTokenRemainingUses > 0 {
|
2019-09-17 00:50:28 +00:00
|
|
|
// Prevent forwarding on local-only requests.
|
|
|
|
if noForward {
|
|
|
|
respondError(w, http.StatusBadRequest, vault.ErrCannotForwardLocalOnly)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-04-08 20:48:44 +00:00
|
|
|
if origBody != nil {
|
|
|
|
r.Body = origBody
|
|
|
|
}
|
2018-09-18 03:03:00 +00:00
|
|
|
forwardRequest(core, w, r)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// req.Path will be relative by this point. The prefix check is first
|
|
|
|
// to fail faster if we're not in this situation since it's a hot path
|
|
|
|
switch {
|
|
|
|
case strings.HasPrefix(req.Path, "sys/wrapping/"), strings.HasPrefix(req.Path, "auth/token/"):
|
|
|
|
// Get the token ns info; if we match the paths below we want to
|
|
|
|
// swap in the token context (but keep the relative path)
|
|
|
|
te := req.TokenEntry()
|
|
|
|
newCtx := r.Context()
|
|
|
|
if te != nil {
|
|
|
|
ns, err := vault.NamespaceByID(newCtx, te.NamespaceID, core)
|
|
|
|
if err != nil {
|
|
|
|
core.Logger().Warn("error looking up namespace from the token's namespace ID", "error", err)
|
|
|
|
respondError(w, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ns != nil {
|
|
|
|
newCtx = namespace.ContextWithNamespace(newCtx, ns)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
switch req.Path {
|
2019-07-05 21:15:14 +00:00
|
|
|
// Route the token wrapping request to its respective sys NS
|
2018-09-18 03:03:00 +00:00
|
|
|
case "sys/wrapping/lookup", "sys/wrapping/rewrap", "sys/wrapping/unwrap":
|
|
|
|
r = r.WithContext(newCtx)
|
|
|
|
if err := wrappingVerificationFunc(r.Context(), core, req); err != nil {
|
|
|
|
if errwrap.Contains(err, logical.ErrPermissionDenied.Error()) {
|
|
|
|
respondError(w, http.StatusForbidden, err)
|
|
|
|
} else {
|
|
|
|
respondError(w, http.StatusBadRequest, err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// The -self paths have no meaning outside of the token NS, so
|
|
|
|
// requests for these paths always go to the token NS
|
|
|
|
case "auth/token/lookup-self", "auth/token/renew-self", "auth/token/revoke-self":
|
|
|
|
r = r.WithContext(newCtx)
|
2019-03-01 00:02:25 +00:00
|
|
|
|
|
|
|
// For the following operations, we can set the proper namespace context
|
|
|
|
// using the token's embedded nsID if a relative path was provided. Since
|
|
|
|
// this is done at the HTTP layer, the operation will still be gated by
|
|
|
|
// ACLs.
|
|
|
|
case "auth/token/lookup", "auth/token/renew", "auth/token/revoke", "auth/token/revoke-orphan":
|
|
|
|
token, ok := req.Data["token"]
|
|
|
|
// If the token is not present (e.g. a bad request), break out and let the backend
|
|
|
|
// handle the error
|
|
|
|
if !ok {
|
|
|
|
// If this is a token lookup request and if the token is not
|
|
|
|
// explicitly provided, it will use the client token so we simply set
|
|
|
|
// the context to the client token's context.
|
|
|
|
if req.Path == "auth/token/lookup" {
|
|
|
|
r = r.WithContext(newCtx)
|
|
|
|
}
|
|
|
|
break
|
|
|
|
}
|
|
|
|
_, nsID := namespace.SplitIDFromString(token.(string))
|
|
|
|
if nsID != "" {
|
|
|
|
ns, err := vault.NamespaceByID(newCtx, nsID, core)
|
|
|
|
if err != nil {
|
|
|
|
core.Logger().Warn("error looking up namespace from the token's namespace ID", "error", err)
|
|
|
|
respondError(w, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ns != nil {
|
|
|
|
newCtx = namespace.ContextWithNamespace(newCtx, ns)
|
|
|
|
r = r.WithContext(newCtx)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// The following relative sys/leases/ paths handles re-routing requests
|
|
|
|
// to the proper namespace using the lease ID on applicable paths.
|
|
|
|
case strings.HasPrefix(req.Path, "sys/leases/"):
|
|
|
|
switch req.Path {
|
|
|
|
// For the following operations, we can set the proper namespace context
|
|
|
|
// using the lease's embedded nsID if a relative path was provided. Since
|
|
|
|
// this is done at the HTTP layer, the operation will still be gated by
|
|
|
|
// ACLs.
|
|
|
|
case "sys/leases/lookup", "sys/leases/renew", "sys/leases/revoke", "sys/leases/revoke-force":
|
|
|
|
leaseID, ok := req.Data["lease_id"]
|
|
|
|
// If lease ID is not present, break out and let the backend handle the error
|
|
|
|
if !ok {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
_, nsID := namespace.SplitIDFromString(leaseID.(string))
|
|
|
|
if nsID != "" {
|
|
|
|
newCtx := r.Context()
|
|
|
|
ns, err := vault.NamespaceByID(newCtx, nsID, core)
|
|
|
|
if err != nil {
|
|
|
|
core.Logger().Warn("error looking up namespace from the lease's namespace ID", "error", err)
|
|
|
|
respondError(w, http.StatusInternalServerError, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ns != nil {
|
|
|
|
newCtx = namespace.ContextWithNamespace(newCtx, ns)
|
|
|
|
r = r.WithContext(newCtx)
|
|
|
|
}
|
|
|
|
}
|
2018-09-18 03:03:00 +00:00
|
|
|
}
|
2020-02-07 08:30:25 +00:00
|
|
|
|
|
|
|
// Prevent any metrics requests to be forwarded from a standby node.
|
|
|
|
// Instead, we return an error since we cannot be sure if we have an
|
|
|
|
// active token store to validate the provided token.
|
|
|
|
case strings.HasPrefix(req.Path, "sys/metrics"):
|
|
|
|
if isStandby, _ := core.Standby(); isStandby {
|
|
|
|
respondError(w, http.StatusBadRequest, vault.ErrCannotForwardLocalOnly)
|
2020-04-21 22:30:36 +00:00
|
|
|
return
|
2020-02-07 08:30:25 +00:00
|
|
|
}
|
2016-03-18 02:29:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Make the internal request. We attach the connection info
|
|
|
|
// as well in case this is an authentication request that requires
|
2017-02-16 20:15:02 +00:00
|
|
|
// it. Vault core handles stripping this if we need to. This also
|
|
|
|
// handles all error cases; if we hit respondLogical, the request is a
|
|
|
|
// success.
|
2019-01-25 19:08:42 +00:00
|
|
|
resp, ok, needsForward := request(core, w, r, req)
|
2019-09-17 00:50:28 +00:00
|
|
|
switch {
|
|
|
|
case needsForward && noForward:
|
|
|
|
respondError(w, http.StatusBadRequest, vault.ErrCannotForwardLocalOnly)
|
|
|
|
return
|
|
|
|
case needsForward && !noForward:
|
2019-04-08 20:48:44 +00:00
|
|
|
if origBody != nil {
|
|
|
|
r.Body = origBody
|
|
|
|
}
|
2019-01-25 19:08:42 +00:00
|
|
|
forwardRequest(core, w, r)
|
|
|
|
return
|
2019-09-17 00:50:28 +00:00
|
|
|
case !ok:
|
|
|
|
// If not ok, we simply return. The call on request should have
|
|
|
|
// taken care of setting the appropriate response code and payload
|
|
|
|
// in this case.
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
// Build and return the proper response if everything is fine.
|
|
|
|
respondLogical(w, r, req, resp, injectDataIntoTopLevel)
|
2015-03-16 02:42:24 +00:00
|
|
|
return
|
|
|
|
}
|
2015-04-14 00:21:31 +00:00
|
|
|
})
|
|
|
|
}
|
2015-03-31 04:06:15 +00:00
|
|
|
|
2018-09-05 15:45:17 +00:00
|
|
|
func respondLogical(w http.ResponseWriter, r *http.Request, req *logical.Request, resp *logical.Response, injectDataIntoTopLevel bool) {
|
2016-08-08 15:55:24 +00:00
|
|
|
var httpResp *logical.HTTPResponse
|
|
|
|
var ret interface{}
|
|
|
|
|
2019-06-20 19:14:58 +00:00
|
|
|
// If vault's core has already written to the response writer do not add any
|
|
|
|
// additional output. Headers have already been sent.
|
|
|
|
if req != nil && req.ResponseWriter != nil && req.ResponseWriter.Written() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-04-14 00:21:31 +00:00
|
|
|
if resp != nil {
|
|
|
|
if resp.Redirect != "" {
|
2015-08-20 20:20:35 +00:00
|
|
|
// If we have a redirect, redirect! We use a 307 code
|
2015-04-14 00:21:31 +00:00
|
|
|
// because we don't actually know if its permanent.
|
2015-08-20 20:20:35 +00:00
|
|
|
http.Redirect(w, r, resp.Redirect, 307)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-05-27 21:10:00 +00:00
|
|
|
// Check if this is a raw response
|
2016-09-29 04:01:28 +00:00
|
|
|
if _, ok := resp.Data[logical.HTTPStatusCode]; ok {
|
|
|
|
respondRaw(w, r, resp)
|
2015-05-27 21:10:00 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2016-05-07 23:17:51 +00:00
|
|
|
if resp.WrapInfo != nil && resp.WrapInfo.Token != "" {
|
2016-08-08 15:55:24 +00:00
|
|
|
httpResp = &logical.HTTPResponse{
|
2016-05-02 04:08:07 +00:00
|
|
|
WrapInfo: &logical.HTTPWrapInfo{
|
2016-06-13 23:58:17 +00:00
|
|
|
Token: resp.WrapInfo.Token,
|
2017-11-13 20:31:32 +00:00
|
|
|
Accessor: resp.WrapInfo.Accessor,
|
2016-06-13 23:58:17 +00:00
|
|
|
TTL: int(resp.WrapInfo.TTL.Seconds()),
|
2016-09-23 16:32:07 +00:00
|
|
|
CreationTime: resp.WrapInfo.CreationTime.Format(time.RFC3339Nano),
|
2017-08-02 22:28:58 +00:00
|
|
|
CreationPath: resp.WrapInfo.CreationPath,
|
2016-06-13 23:58:17 +00:00
|
|
|
WrappedAccessor: resp.WrapInfo.WrappedAccessor,
|
2016-05-02 04:08:07 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
} else {
|
2016-09-29 19:03:47 +00:00
|
|
|
httpResp = logical.LogicalResponseToHTTPResponse(resp)
|
2016-08-08 15:55:24 +00:00
|
|
|
httpResp.RequestID = req.ID
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = httpResp
|
2018-09-05 15:45:17 +00:00
|
|
|
|
|
|
|
if injectDataIntoTopLevel {
|
|
|
|
injector := logical.HTTPSysInjector{
|
|
|
|
Response: httpResp,
|
|
|
|
}
|
|
|
|
ret = injector
|
|
|
|
}
|
2015-04-14 00:21:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Respond
|
2016-08-08 15:55:24 +00:00
|
|
|
respondOk(w, ret)
|
2016-05-20 15:49:48 +00:00
|
|
|
return
|
2015-03-16 02:34:47 +00:00
|
|
|
}
|
|
|
|
|
2015-05-27 21:10:00 +00:00
|
|
|
// respondRaw is used when the response is using HTTPContentType and HTTPRawBody
|
|
|
|
// to change the default response handling. This is only used for specific things like
|
|
|
|
// returning the CRL information on the PKI backends.
|
2016-09-29 04:01:28 +00:00
|
|
|
func respondRaw(w http.ResponseWriter, r *http.Request, resp *logical.Response) {
|
|
|
|
retErr := func(w http.ResponseWriter, err string) {
|
|
|
|
w.Header().Set("X-Vault-Raw-Error", err)
|
|
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
|
|
w.Write(nil)
|
|
|
|
}
|
|
|
|
|
2015-05-27 21:10:00 +00:00
|
|
|
// Ensure this is never a secret or auth response
|
|
|
|
if resp.Secret != nil || resp.Auth != nil {
|
2016-09-29 04:01:28 +00:00
|
|
|
retErr(w, "raw responses cannot contain secrets or auth")
|
2015-05-27 21:10:00 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the status code
|
|
|
|
statusRaw, ok := resp.Data[logical.HTTPStatusCode]
|
|
|
|
if !ok {
|
2016-09-29 04:01:28 +00:00
|
|
|
retErr(w, "no status code given")
|
2015-05-27 21:10:00 +00:00
|
|
|
return
|
|
|
|
}
|
2018-02-01 22:30:17 +00:00
|
|
|
|
|
|
|
var status int
|
|
|
|
switch statusRaw.(type) {
|
|
|
|
case int:
|
|
|
|
status = statusRaw.(int)
|
|
|
|
case float64:
|
|
|
|
status = int(statusRaw.(float64))
|
|
|
|
case json.Number:
|
|
|
|
s64, err := statusRaw.(json.Number).Float64()
|
|
|
|
if err != nil {
|
|
|
|
retErr(w, "cannot decode status code")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
status = int(s64)
|
|
|
|
default:
|
2016-09-29 04:01:28 +00:00
|
|
|
retErr(w, "cannot decode status code")
|
2015-05-27 21:10:00 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2016-09-29 04:01:28 +00:00
|
|
|
nonEmpty := status != http.StatusNoContent
|
|
|
|
|
|
|
|
var contentType string
|
|
|
|
var body []byte
|
|
|
|
|
|
|
|
// Get the content type header; don't require it if the body is empty
|
2015-05-27 21:10:00 +00:00
|
|
|
contentTypeRaw, ok := resp.Data[logical.HTTPContentType]
|
2017-10-26 07:08:10 +00:00
|
|
|
if !ok && nonEmpty {
|
2016-09-29 04:01:28 +00:00
|
|
|
retErr(w, "no content type given")
|
2015-05-27 21:10:00 +00:00
|
|
|
return
|
|
|
|
}
|
2016-09-29 04:01:28 +00:00
|
|
|
if ok {
|
|
|
|
contentType, ok = contentTypeRaw.(string)
|
|
|
|
if !ok {
|
|
|
|
retErr(w, "cannot decode content type")
|
|
|
|
return
|
|
|
|
}
|
2015-05-27 21:10:00 +00:00
|
|
|
}
|
|
|
|
|
2016-09-29 04:01:28 +00:00
|
|
|
if nonEmpty {
|
|
|
|
// Get the body
|
|
|
|
bodyRaw, ok := resp.Data[logical.HTTPRawBody]
|
|
|
|
if !ok {
|
2018-07-11 19:45:09 +00:00
|
|
|
goto WRITE_RESPONSE
|
2016-09-29 04:01:28 +00:00
|
|
|
}
|
2018-02-01 22:30:17 +00:00
|
|
|
|
|
|
|
switch bodyRaw.(type) {
|
|
|
|
case string:
|
Fix response wrapping from K/V version 2 (#4511)
This takes place in two parts, since working on this exposed an issue
with response wrapping when there is a raw body set. The changes are (in
diff order):
* A CurrentWrappingLookupFunc has been added to return the current
value. This is necessary for the lookahead call since we don't want the
lookahead call to be wrapped.
* Support for unwrapping < 0.6.2 tokens via the API/CLI has been
removed, because we now have backends returning 404s with data and can't
rely on the 404 trick. These can still be read manually via
cubbyhole/response.
* KV preflight version request now ensures that its calls is not
wrapped, and restores any given function after.
* When responding with a raw body, instead of always base64-decoding a
string value and erroring on failure, on failure we assume that it
simply wasn't a base64-encoded value and use it as is.
* A test that fails on master and works now that ensures that raw body
responses that are wrapped and then unwrapped return the expected
values.
* A flag for response data that indicates to the wrapping handling that
the data contained therein is already JSON decoded (more later).
* RespondWithStatusCode now defaults to a string so that the value is
HMAC'd during audit. The function always JSON encodes the body, so
before now it was always returning []byte which would skip HMACing. We
don't know what's in the data, so this is a "better safe than sorry"
issue. If different behavior is needed, backends can always manually
populate the data instead of relying on the helper function.
* We now check unwrapped data after unwrapping to see if there were raw
flags. If so, we try to detect whether the value can be unbase64'd. The
reason is that if it can it was probably originally a []byte and
shouldn't be audit HMAC'd; if not, it was probably originally a string
and should be. In either case, we then set the value as the raw body and
hit the flag indicating that it's already been JSON decoded so not to
try again before auditing. Doing it this way ensures the right typing.
* There is now a check to see if the data coming from unwrapping is
already JSON decoded and if so the decoding is skipped before setting
the audit response.
2018-05-10 19:40:03 +00:00
|
|
|
// This is best effort. The value may already be base64-decoded so
|
|
|
|
// if it doesn't work we just use as-is
|
|
|
|
bodyDec, err := base64.StdEncoding.DecodeString(bodyRaw.(string))
|
|
|
|
if err == nil {
|
|
|
|
body = bodyDec
|
|
|
|
} else {
|
|
|
|
body = []byte(bodyRaw.(string))
|
2018-02-01 22:30:17 +00:00
|
|
|
}
|
|
|
|
case []byte:
|
|
|
|
body = bodyRaw.([]byte)
|
|
|
|
default:
|
2016-09-29 04:01:28 +00:00
|
|
|
retErr(w, "cannot decode body")
|
|
|
|
return
|
|
|
|
}
|
2015-05-27 21:10:00 +00:00
|
|
|
}
|
|
|
|
|
2018-07-11 19:45:09 +00:00
|
|
|
WRITE_RESPONSE:
|
2015-05-27 21:10:00 +00:00
|
|
|
// Write the response
|
2016-09-29 04:01:28 +00:00
|
|
|
if contentType != "" {
|
|
|
|
w.Header().Set("Content-Type", contentType)
|
|
|
|
}
|
2016-12-15 22:53:07 +00:00
|
|
|
|
2019-07-15 18:04:45 +00:00
|
|
|
if cacheControl, ok := resp.Data[logical.HTTPRawCacheControl].(string); ok {
|
|
|
|
w.Header().Set("Cache-Control", cacheControl)
|
|
|
|
}
|
|
|
|
|
2015-05-27 21:10:00 +00:00
|
|
|
w.WriteHeader(status)
|
|
|
|
w.Write(body)
|
|
|
|
}
|
|
|
|
|
2015-06-29 22:27:28 +00:00
|
|
|
// getConnection is used to format the connection information for
|
|
|
|
// attaching to a logical request
|
2015-06-19 00:17:18 +00:00
|
|
|
func getConnection(r *http.Request) (connection *logical.Connection) {
|
|
|
|
var remoteAddr string
|
|
|
|
|
|
|
|
remoteAddr, _, err := net.SplitHostPort(r.RemoteAddr)
|
|
|
|
if err != nil {
|
|
|
|
remoteAddr = ""
|
|
|
|
}
|
|
|
|
|
|
|
|
connection = &logical.Connection{
|
|
|
|
RemoteAddr: remoteAddr,
|
|
|
|
ConnState: r.TLS,
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|