2018-09-25 23:18:22 +00:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
2019-07-29 20:05:43 +00:00
|
|
|
"net/url"
|
2018-09-25 23:18:22 +00:00
|
|
|
"os"
|
|
|
|
"sort"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
log "github.com/hashicorp/go-hclog"
|
|
|
|
"github.com/hashicorp/hcl"
|
|
|
|
"github.com/hashicorp/hcl/hcl/ast"
|
|
|
|
"github.com/hashicorp/vault/command/server"
|
2019-07-29 20:05:43 +00:00
|
|
|
"github.com/hashicorp/vault/physical/raft"
|
2019-04-12 21:54:35 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/helper/logging"
|
|
|
|
"github.com/hashicorp/vault/sdk/physical"
|
2018-10-12 16:29:15 +00:00
|
|
|
"github.com/hashicorp/vault/vault"
|
2018-09-25 23:18:22 +00:00
|
|
|
"github.com/mitchellh/cli"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/posener/complete"
|
|
|
|
)
|
|
|
|
|
2021-04-08 16:43:39 +00:00
|
|
|
var (
|
|
|
|
_ cli.Command = (*OperatorMigrateCommand)(nil)
|
|
|
|
_ cli.CommandAutocomplete = (*OperatorMigrateCommand)(nil)
|
|
|
|
)
|
2018-09-25 23:18:22 +00:00
|
|
|
|
|
|
|
var errAbort = errors.New("Migration aborted")
|
|
|
|
|
|
|
|
type OperatorMigrateCommand struct {
|
|
|
|
*BaseCommand
|
|
|
|
|
|
|
|
PhysicalBackends map[string]physical.Factory
|
|
|
|
flagConfig string
|
|
|
|
flagStart string
|
|
|
|
flagReset bool
|
|
|
|
logger log.Logger
|
|
|
|
ShutdownCh chan struct{}
|
|
|
|
}
|
|
|
|
|
|
|
|
type migratorConfig struct {
|
|
|
|
StorageSource *server.Storage `hcl:"-"`
|
|
|
|
StorageDestination *server.Storage `hcl:"-"`
|
2019-07-29 20:05:43 +00:00
|
|
|
ClusterAddr string `hcl:"cluster_addr"`
|
2018-09-25 23:18:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorMigrateCommand) Synopsis() string {
|
|
|
|
return "Migrates Vault data between storage backends"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorMigrateCommand) Help() string {
|
|
|
|
helpText := `
|
|
|
|
Usage: vault operator migrate [options]
|
|
|
|
|
|
|
|
This command starts a storage backend migration process to copy all data
|
|
|
|
from one backend to another. This operates directly on encrypted data and
|
|
|
|
does not require a Vault server, nor any unsealing.
|
|
|
|
|
|
|
|
Start a migration with a configuration file:
|
|
|
|
|
|
|
|
$ vault operator migrate -config=migrate.hcl
|
|
|
|
|
|
|
|
For more information, please see the documentation.
|
|
|
|
|
|
|
|
` + c.Flags().Help()
|
|
|
|
|
|
|
|
return strings.TrimSpace(helpText)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorMigrateCommand) Flags() *FlagSets {
|
|
|
|
set := NewFlagSets(c.UI)
|
|
|
|
f := set.NewFlagSet("Command Options")
|
|
|
|
|
|
|
|
f.StringVar(&StringVar{
|
|
|
|
Name: "config",
|
|
|
|
Target: &c.flagConfig,
|
|
|
|
Completion: complete.PredictOr(
|
|
|
|
complete.PredictFiles("*.hcl"),
|
|
|
|
),
|
|
|
|
Usage: "Path to a configuration file. This configuration file should " +
|
|
|
|
"contain only migrator directives.",
|
|
|
|
})
|
|
|
|
|
|
|
|
f.StringVar(&StringVar{
|
|
|
|
Name: "start",
|
|
|
|
Target: &c.flagStart,
|
|
|
|
Usage: "Only copy keys lexicographically at or after this value.",
|
|
|
|
})
|
|
|
|
|
|
|
|
f.BoolVar(&BoolVar{
|
|
|
|
Name: "reset",
|
|
|
|
Target: &c.flagReset,
|
|
|
|
Usage: "Reset the migration lock. No migration will occur.",
|
|
|
|
})
|
|
|
|
|
|
|
|
return set
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorMigrateCommand) AutocompleteArgs() complete.Predictor {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorMigrateCommand) AutocompleteFlags() complete.Flags {
|
|
|
|
return c.Flags().Completions()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorMigrateCommand) Run(args []string) int {
|
|
|
|
c.logger = logging.NewVaultLogger(log.Info)
|
|
|
|
f := c.Flags()
|
|
|
|
|
|
|
|
if err := f.Parse(args); err != nil {
|
|
|
|
c.UI.Error(err.Error())
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.flagConfig == "" {
|
|
|
|
c.UI.Error("Must specify exactly one config path using -config")
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
config, err := c.loadMigratorConfig(c.flagConfig)
|
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Error loading configuration from %s: %s", c.flagConfig, err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := c.migrate(config); err != nil {
|
|
|
|
if err == errAbort {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
c.UI.Error(fmt.Sprintf("Error migrating: %s", err))
|
|
|
|
return 2
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.flagReset {
|
|
|
|
c.UI.Output("Success! Migration lock reset (if it was set).")
|
|
|
|
} else {
|
|
|
|
c.UI.Output("Success! All of the keys have been migrated.")
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// migrate attempts to instantiate the source and destinations backends,
|
|
|
|
// and then invoke the migration the the root of the keyspace.
|
|
|
|
func (c *OperatorMigrateCommand) migrate(config *migratorConfig) error {
|
|
|
|
from, err := c.newBackend(config.StorageSource.Type, config.StorageSource.Config)
|
|
|
|
if err != nil {
|
2021-06-02 13:22:31 +00:00
|
|
|
return fmt.Errorf("error mounting 'storage_source': %w", err)
|
2018-09-25 23:18:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if c.flagReset {
|
2018-10-23 06:34:02 +00:00
|
|
|
if err := SetStorageMigration(from, false); err != nil {
|
2021-06-02 13:22:31 +00:00
|
|
|
return fmt.Errorf("error resetting migration lock: %w", err)
|
2018-09-25 23:18:22 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-07-29 20:05:43 +00:00
|
|
|
to, err := c.createDestinationBackend(config.StorageDestination.Type, config.StorageDestination.Config, config)
|
2018-09-25 23:18:22 +00:00
|
|
|
if err != nil {
|
2021-06-02 13:22:31 +00:00
|
|
|
return fmt.Errorf("error mounting 'storage_destination': %w", err)
|
2018-09-25 23:18:22 +00:00
|
|
|
}
|
|
|
|
|
2018-10-23 06:34:02 +00:00
|
|
|
migrationStatus, err := CheckStorageMigration(from)
|
2018-09-25 23:18:22 +00:00
|
|
|
if err != nil {
|
2021-06-02 13:22:31 +00:00
|
|
|
return fmt.Errorf("error checking migration status: %w", err)
|
2018-09-25 23:18:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if migrationStatus != nil {
|
2020-06-23 19:04:13 +00:00
|
|
|
return fmt.Errorf("storage migration in progress (started: %s)", migrationStatus.Start.Format(time.RFC3339))
|
2018-09-25 23:18:22 +00:00
|
|
|
}
|
|
|
|
|
2020-03-06 17:35:17 +00:00
|
|
|
switch config.StorageSource.Type {
|
|
|
|
case "raft":
|
|
|
|
// Raft storage cannot be written to when shutdown. Also the boltDB file
|
|
|
|
// already uses file locking to ensure two processes are not accessing
|
|
|
|
// it.
|
|
|
|
default:
|
|
|
|
if err := SetStorageMigration(from, true); err != nil {
|
2021-06-02 13:22:31 +00:00
|
|
|
return fmt.Errorf("error setting migration lock: %w", err)
|
2020-03-06 17:35:17 +00:00
|
|
|
}
|
2018-09-25 23:18:22 +00:00
|
|
|
|
2020-03-06 17:35:17 +00:00
|
|
|
defer SetStorageMigration(from, false)
|
|
|
|
}
|
2018-09-25 23:18:22 +00:00
|
|
|
|
|
|
|
ctx, cancelFunc := context.WithCancel(context.Background())
|
|
|
|
|
|
|
|
doneCh := make(chan error)
|
|
|
|
go func() {
|
|
|
|
doneCh <- c.migrateAll(ctx, from, to)
|
|
|
|
}()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case err := <-doneCh:
|
2018-11-02 20:21:44 +00:00
|
|
|
cancelFunc()
|
2018-09-25 23:18:22 +00:00
|
|
|
return err
|
|
|
|
case <-c.ShutdownCh:
|
|
|
|
c.UI.Output("==> Migration shutdown triggered\n")
|
|
|
|
cancelFunc()
|
|
|
|
<-doneCh
|
|
|
|
return errAbort
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// migrateAll copies all keys in lexicographic order.
|
|
|
|
func (c *OperatorMigrateCommand) migrateAll(ctx context.Context, from physical.Backend, to physical.Backend) error {
|
|
|
|
return dfsScan(ctx, from, func(ctx context.Context, path string) error {
|
2018-10-23 06:34:02 +00:00
|
|
|
if path < c.flagStart || path == storageMigrationLock || path == vault.CoreLockPath {
|
2018-09-25 23:18:22 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
entry, err := from.Get(ctx, path)
|
|
|
|
if err != nil {
|
2021-06-02 13:22:31 +00:00
|
|
|
return fmt.Errorf("error reading entry: %w", err)
|
2018-09-25 23:18:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if entry == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := to.Put(ctx, entry); err != nil {
|
2021-06-02 13:22:31 +00:00
|
|
|
return fmt.Errorf("error writing entry: %w", err)
|
2018-09-25 23:18:22 +00:00
|
|
|
}
|
2018-10-09 16:43:17 +00:00
|
|
|
c.logger.Info("copied key", "path", path)
|
2018-09-25 23:18:22 +00:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *OperatorMigrateCommand) newBackend(kind string, conf map[string]string) (physical.Backend, error) {
|
|
|
|
factory, ok := c.PhysicalBackends[kind]
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("no Vault storage backend named: %+q", kind)
|
|
|
|
}
|
|
|
|
|
|
|
|
return factory(conf, c.logger)
|
|
|
|
}
|
|
|
|
|
2019-07-29 20:05:43 +00:00
|
|
|
func (c *OperatorMigrateCommand) createDestinationBackend(kind string, conf map[string]string, config *migratorConfig) (physical.Backend, error) {
|
|
|
|
storage, err := c.newBackend(kind, conf)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
switch kind {
|
|
|
|
case "raft":
|
|
|
|
if len(config.ClusterAddr) == 0 {
|
|
|
|
return nil, errors.New("cluster_addr config not set")
|
|
|
|
}
|
|
|
|
|
|
|
|
raftStorage, ok := storage.(*raft.RaftBackend)
|
|
|
|
if !ok {
|
|
|
|
return nil, errors.New("wrong storage type for raft backend")
|
|
|
|
}
|
|
|
|
|
|
|
|
parsedClusterAddr, err := url.Parse(config.ClusterAddr)
|
|
|
|
if err != nil {
|
2021-06-02 13:22:31 +00:00
|
|
|
return nil, fmt.Errorf("error parsing cluster address: %w", err)
|
2019-07-29 20:05:43 +00:00
|
|
|
}
|
2020-06-23 19:04:13 +00:00
|
|
|
if err := raftStorage.Bootstrap([]raft.Peer{
|
2019-07-29 20:05:43 +00:00
|
|
|
{
|
|
|
|
ID: raftStorage.NodeID(),
|
|
|
|
Address: parsedClusterAddr.Host,
|
|
|
|
},
|
|
|
|
}); err != nil {
|
2021-06-02 13:22:31 +00:00
|
|
|
return nil, fmt.Errorf("could not bootstrap clustered storage: %w", err)
|
2019-07-29 20:05:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := raftStorage.SetupCluster(context.Background(), raft.SetupOpts{
|
|
|
|
StartAsLeader: true,
|
|
|
|
}); err != nil {
|
2021-06-02 13:22:31 +00:00
|
|
|
return nil, fmt.Errorf("could not start clustered storage: %w", err)
|
2019-07-29 20:05:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return storage, nil
|
|
|
|
}
|
|
|
|
|
2018-09-25 23:18:22 +00:00
|
|
|
// loadMigratorConfig loads the configuration at the given path
|
|
|
|
func (c *OperatorMigrateCommand) loadMigratorConfig(path string) (*migratorConfig, error) {
|
|
|
|
fi, err := os.Stat(path)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if fi.IsDir() {
|
|
|
|
return nil, fmt.Errorf("location is a directory, not a file")
|
|
|
|
}
|
|
|
|
|
|
|
|
d, err := ioutil.ReadFile(path)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
obj, err := hcl.ParseBytes(d)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
var result migratorConfig
|
|
|
|
if err := hcl.DecodeObject(&result, obj); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
list, ok := obj.Node.(*ast.ObjectList)
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("error parsing: file doesn't contain a root object")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Look for storage_* stanzas
|
|
|
|
for _, stanza := range []string{"storage_source", "storage_destination"} {
|
|
|
|
o := list.Filter(stanza)
|
|
|
|
if len(o.Items) != 1 {
|
|
|
|
return nil, fmt.Errorf("exactly one '%s' block is required", stanza)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := parseStorage(&result, o, stanza); err != nil {
|
2021-06-02 13:22:31 +00:00
|
|
|
return nil, fmt.Errorf("error parsing '%s': %w", stanza, err)
|
2018-09-25 23:18:22 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return &result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// parseStorage reuses the existing storage parsing that's part of the main Vault
|
|
|
|
// config processing, but only keeps the storage result.
|
|
|
|
func parseStorage(result *migratorConfig, list *ast.ObjectList, name string) error {
|
|
|
|
tmpConfig := new(server.Config)
|
|
|
|
|
|
|
|
if err := server.ParseStorage(tmpConfig, list, name); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
switch name {
|
|
|
|
case "storage_source":
|
|
|
|
result.StorageSource = tmpConfig.Storage
|
|
|
|
case "storage_destination":
|
|
|
|
result.StorageDestination = tmpConfig.Storage
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("unknown storage name: %s", name)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// dfsScan will invoke cb with every key from source.
|
|
|
|
// Keys will be traversed in lexicographic, depth-first order.
|
|
|
|
func dfsScan(ctx context.Context, source physical.Backend, cb func(ctx context.Context, path string) error) error {
|
|
|
|
dfs := []string{""}
|
|
|
|
|
|
|
|
for l := len(dfs); l > 0; l = len(dfs) {
|
|
|
|
key := dfs[len(dfs)-1]
|
|
|
|
if key == "" || strings.HasSuffix(key, "/") {
|
|
|
|
children, err := source.List(ctx, key)
|
|
|
|
if err != nil {
|
2021-06-02 13:22:31 +00:00
|
|
|
return fmt.Errorf("failed to scan for children: %w", err)
|
2018-09-25 23:18:22 +00:00
|
|
|
}
|
|
|
|
sort.Strings(children)
|
|
|
|
|
|
|
|
// remove List-triggering key and add children in reverse order
|
|
|
|
dfs = dfs[:len(dfs)-1]
|
|
|
|
for i := len(children) - 1; i >= 0; i-- {
|
2019-03-07 19:48:48 +00:00
|
|
|
if children[i] != "" {
|
|
|
|
dfs = append(dfs, key+children[i])
|
|
|
|
}
|
2018-09-25 23:18:22 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
err := cb(ctx, key)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
dfs = dfs[:len(dfs)-1]
|
|
|
|
}
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return nil
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|