2017-04-04 00:52:29 +00:00
|
|
|
package vault
|
|
|
|
|
|
|
|
import (
|
2018-01-19 06:44:44 +00:00
|
|
|
"context"
|
2017-04-04 00:52:29 +00:00
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"path/filepath"
|
2017-04-12 16:40:54 +00:00
|
|
|
"sort"
|
2017-04-04 00:52:29 +00:00
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
|
2018-11-07 01:21:24 +00:00
|
|
|
log "github.com/hashicorp/go-hclog"
|
|
|
|
multierror "github.com/hashicorp/go-multierror"
|
|
|
|
|
2018-04-05 15:49:21 +00:00
|
|
|
"github.com/hashicorp/errwrap"
|
2019-04-15 18:10:07 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/database/dbplugin"
|
2019-04-12 21:54:35 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/helper/consts"
|
|
|
|
"github.com/hashicorp/vault/sdk/helper/jsonutil"
|
|
|
|
"github.com/hashicorp/vault/sdk/helper/pluginutil"
|
|
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
|
|
backendplugin "github.com/hashicorp/vault/sdk/plugin"
|
2017-04-04 00:52:29 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2017-04-24 17:30:33 +00:00
|
|
|
pluginCatalogPath = "core/plugin-catalog/"
|
|
|
|
ErrDirectoryNotConfigured = errors.New("could not set plugin, plugin directory is not configured")
|
2017-09-01 05:02:03 +00:00
|
|
|
ErrPluginNotFound = errors.New("plugin not found in the catalog")
|
2018-11-16 00:55:24 +00:00
|
|
|
ErrPluginBadType = errors.New("unable to determine plugin type")
|
2017-04-04 00:52:29 +00:00
|
|
|
)
|
|
|
|
|
2017-04-12 17:01:36 +00:00
|
|
|
// PluginCatalog keeps a record of plugins known to vault. External plugins need
|
|
|
|
// to be registered to the catalog before they can be used in backends. Builtin
|
|
|
|
// plugins are automatically detected and included in the catalog.
|
2017-04-04 00:52:29 +00:00
|
|
|
type PluginCatalog struct {
|
2018-11-07 01:21:24 +00:00
|
|
|
builtinRegistry BuiltinRegistry
|
|
|
|
catalogView *BarrierView
|
|
|
|
directory string
|
2017-04-04 00:52:29 +00:00
|
|
|
|
2017-04-05 00:12:02 +00:00
|
|
|
lock sync.RWMutex
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
|
2018-11-07 01:21:24 +00:00
|
|
|
func (c *Core) setupPluginCatalog(ctx context.Context) error {
|
2017-04-04 21:43:39 +00:00
|
|
|
c.pluginCatalog = &PluginCatalog{
|
2018-11-07 01:21:24 +00:00
|
|
|
builtinRegistry: c.builtinRegistry,
|
|
|
|
catalogView: NewBarrierView(c.barrier, pluginCatalogPath),
|
|
|
|
directory: c.pluginDirectory,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run upgrade if untyped plugins exist
|
|
|
|
err := c.pluginCatalog.UpgradePlugins(ctx, c.logger)
|
|
|
|
if err != nil {
|
|
|
|
c.logger.Error("error while upgrading plugin storage", "error", err)
|
2017-04-04 21:43:39 +00:00
|
|
|
}
|
2017-04-04 00:52:29 +00:00
|
|
|
|
2017-09-01 05:02:03 +00:00
|
|
|
if c.logger.IsInfo() {
|
2018-04-03 00:46:59 +00:00
|
|
|
c.logger.Info("successfully setup plugin catalog", "plugin-directory", c.pluginDirectory)
|
2017-09-01 05:02:03 +00:00
|
|
|
}
|
|
|
|
|
2017-04-04 00:52:29 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-11-07 01:21:24 +00:00
|
|
|
// getPluginTypeFromUnknown will attempt to run the plugin to determine the
|
|
|
|
// type. It will first attempt to run as a database plugin then a backend
|
|
|
|
// plugin. Both of these will be run in metadata mode.
|
2019-01-15 15:51:55 +00:00
|
|
|
func (c *PluginCatalog) getPluginTypeFromUnknown(ctx context.Context, logger log.Logger, plugin *pluginutil.PluginRunner) (consts.PluginType, error) {
|
|
|
|
|
2018-11-07 01:21:24 +00:00
|
|
|
{
|
|
|
|
// Attempt to run as database plugin
|
|
|
|
client, err := dbplugin.NewPluginClient(ctx, nil, plugin, log.NewNullLogger(), true)
|
|
|
|
if err == nil {
|
|
|
|
// Close the client and cleanup the plugin process
|
|
|
|
client.Close()
|
|
|
|
return consts.PluginTypeDatabase, nil
|
2019-01-15 15:51:55 +00:00
|
|
|
} else {
|
|
|
|
logger.Warn(fmt.Sprintf("received %s attempting as db plugin, attempting as auth/secret plugin", err))
|
2018-11-07 01:21:24 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
// Attempt to run as backend plugin
|
|
|
|
client, err := backendplugin.NewPluginClient(ctx, nil, plugin, log.NewNullLogger(), true)
|
|
|
|
if err == nil {
|
|
|
|
err := client.Setup(ctx, &logical.BackendConfig{})
|
|
|
|
if err != nil {
|
|
|
|
return consts.PluginTypeUnknown, err
|
|
|
|
}
|
|
|
|
|
|
|
|
backendType := client.Type()
|
|
|
|
client.Cleanup(ctx)
|
|
|
|
|
|
|
|
switch backendType {
|
|
|
|
case logical.TypeCredential:
|
|
|
|
return consts.PluginTypeCredential, nil
|
|
|
|
case logical.TypeLogical:
|
|
|
|
return consts.PluginTypeSecrets, nil
|
|
|
|
}
|
2019-01-15 15:51:55 +00:00
|
|
|
logger.Warn(fmt.Sprintf("unknown backendType of %s", backendType))
|
|
|
|
} else {
|
|
|
|
logger.Warn(fmt.Sprintf("received %s attempting as an auth/secret plugin, continuing", err))
|
2018-11-07 01:21:24 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return consts.PluginTypeUnknown, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// UpdatePlugins will loop over all the plugins of unknown type and attempt to
|
|
|
|
// upgrade them to typed plugins
|
|
|
|
func (c *PluginCatalog) UpgradePlugins(ctx context.Context, logger log.Logger) error {
|
|
|
|
c.lock.Lock()
|
|
|
|
defer c.lock.Unlock()
|
|
|
|
|
|
|
|
// If the directory isn't set we can skip the upgrade attempt
|
|
|
|
if c.directory == "" {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// List plugins from old location
|
|
|
|
pluginsRaw, err := c.catalogView.List(ctx, "")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
plugins := make([]string, 0, len(pluginsRaw))
|
|
|
|
for _, p := range pluginsRaw {
|
|
|
|
if !strings.HasSuffix(p, "/") {
|
|
|
|
plugins = append(plugins, p)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
logger.Info("upgrading plugin information", "plugins", plugins)
|
|
|
|
|
|
|
|
var retErr error
|
|
|
|
for _, pluginName := range plugins {
|
|
|
|
pluginRaw, err := c.catalogView.Get(ctx, pluginName)
|
|
|
|
if err != nil {
|
|
|
|
retErr = multierror.Append(errwrap.Wrapf("failed to load plugin entry: {{err}}", err))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
plugin := new(pluginutil.PluginRunner)
|
|
|
|
if err := jsonutil.DecodeJSON(pluginRaw.Value, plugin); err != nil {
|
|
|
|
retErr = multierror.Append(errwrap.Wrapf("failed to decode plugin entry: {{err}}", err))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// prepend the plugin directory to the command
|
|
|
|
cmdOld := plugin.Command
|
|
|
|
plugin.Command = filepath.Join(c.directory, plugin.Command)
|
|
|
|
|
2019-01-15 15:51:55 +00:00
|
|
|
pluginType, err := c.getPluginTypeFromUnknown(ctx, logger, plugin)
|
2018-11-07 01:21:24 +00:00
|
|
|
if err != nil {
|
|
|
|
retErr = multierror.Append(retErr, fmt.Errorf("could not upgrade plugin %s: %s", pluginName, err))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if pluginType == consts.PluginTypeUnknown {
|
|
|
|
retErr = multierror.Append(retErr, fmt.Errorf("could not upgrade plugin %s: plugin of unknown type", pluginName))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Upgrade the storage
|
|
|
|
err = c.setInternal(ctx, pluginName, pluginType, cmdOld, plugin.Args, plugin.Env, plugin.Sha256)
|
|
|
|
if err != nil {
|
|
|
|
retErr = multierror.Append(retErr, fmt.Errorf("could not upgrade plugin %s: %s", pluginName, err))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
err = c.catalogView.Delete(ctx, pluginName)
|
|
|
|
if err != nil {
|
|
|
|
logger.Error("could not remove plugin", "plugin", pluginName, "error", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
logger.Info("upgraded plugin type", "plugin", pluginName, "type", pluginType.String())
|
|
|
|
}
|
|
|
|
|
|
|
|
return retErr
|
|
|
|
}
|
|
|
|
|
2017-04-12 17:01:36 +00:00
|
|
|
// Get retrieves a plugin with the specified name from the catalog. It first
|
|
|
|
// looks for external plugins with this name and then looks for builtin plugins.
|
|
|
|
// It returns a PluginRunner or an error if no plugin was found.
|
2018-11-07 01:21:24 +00:00
|
|
|
func (c *PluginCatalog) Get(ctx context.Context, name string, pluginType consts.PluginType) (*pluginutil.PluginRunner, error) {
|
2017-04-12 16:40:54 +00:00
|
|
|
c.lock.RLock()
|
2019-04-08 17:40:54 +00:00
|
|
|
runner, err := c.get(ctx, name, pluginType)
|
|
|
|
c.lock.RUnlock()
|
|
|
|
return runner, err
|
|
|
|
}
|
2017-04-12 16:40:54 +00:00
|
|
|
|
2019-04-08 17:40:54 +00:00
|
|
|
func (c *PluginCatalog) get(ctx context.Context, name string, pluginType consts.PluginType) (*pluginutil.PluginRunner, error) {
|
2017-04-24 17:30:33 +00:00
|
|
|
// If the directory isn't set only look for builtin plugins.
|
|
|
|
if c.directory != "" {
|
|
|
|
// Look for external plugins in the barrier
|
2018-11-07 01:21:24 +00:00
|
|
|
out, err := c.catalogView.Get(ctx, pluginType.String()+"/"+name)
|
2017-04-24 17:30:33 +00:00
|
|
|
if err != nil {
|
2018-04-05 15:49:21 +00:00
|
|
|
return nil, errwrap.Wrapf(fmt.Sprintf("failed to retrieve plugin %q: {{err}}", name), err)
|
2017-04-04 21:43:39 +00:00
|
|
|
}
|
2018-11-07 01:21:24 +00:00
|
|
|
if out == nil {
|
|
|
|
// Also look for external plugins under what their name would have been if they
|
|
|
|
// were registered before plugin types existed.
|
|
|
|
out, err = c.catalogView.Get(ctx, name)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errwrap.Wrapf(fmt.Sprintf("failed to retrieve plugin %q: {{err}}", name), err)
|
|
|
|
}
|
|
|
|
}
|
2017-04-24 17:30:33 +00:00
|
|
|
if out != nil {
|
|
|
|
entry := new(pluginutil.PluginRunner)
|
|
|
|
if err := jsonutil.DecodeJSON(out.Value, entry); err != nil {
|
2018-04-05 15:49:21 +00:00
|
|
|
return nil, errwrap.Wrapf("failed to decode plugin entry: {{err}}", err)
|
2017-04-24 17:30:33 +00:00
|
|
|
}
|
2018-11-07 01:21:24 +00:00
|
|
|
if entry.Type != pluginType && entry.Type != consts.PluginTypeUnknown {
|
|
|
|
return nil, nil
|
|
|
|
}
|
2017-04-04 21:43:39 +00:00
|
|
|
|
2017-05-04 19:36:06 +00:00
|
|
|
// prepend the plugin directory to the command
|
|
|
|
entry.Command = filepath.Join(c.directory, entry.Command)
|
|
|
|
|
2017-04-24 17:30:33 +00:00
|
|
|
return entry, nil
|
|
|
|
}
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
2017-04-04 21:43:39 +00:00
|
|
|
// Look for builtin plugins
|
2018-11-07 01:21:24 +00:00
|
|
|
if factory, ok := c.builtinRegistry.Get(name, pluginType); ok {
|
2017-04-21 01:46:41 +00:00
|
|
|
return &pluginutil.PluginRunner{
|
|
|
|
Name: name,
|
2018-11-07 01:21:24 +00:00
|
|
|
Type: pluginType,
|
2017-04-21 01:46:41 +00:00
|
|
|
Builtin: true,
|
|
|
|
BuiltinFactory: factory,
|
|
|
|
}, nil
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
|
2017-04-25 01:31:27 +00:00
|
|
|
return nil, nil
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
|
2017-04-12 17:01:36 +00:00
|
|
|
// Set registers a new external plugin with the catalog, or updates an existing
|
|
|
|
// external plugin. It takes the name, command and SHA256 of the plugin.
|
2018-11-07 01:21:24 +00:00
|
|
|
func (c *PluginCatalog) Set(ctx context.Context, name string, pluginType consts.PluginType, command string, args []string, env []string, sha256 []byte) error {
|
2017-04-24 17:30:33 +00:00
|
|
|
if c.directory == "" {
|
|
|
|
return ErrDirectoryNotConfigured
|
|
|
|
}
|
|
|
|
|
2017-05-12 17:52:33 +00:00
|
|
|
switch {
|
|
|
|
case strings.Contains(name, ".."):
|
|
|
|
fallthrough
|
|
|
|
case strings.Contains(command, ".."):
|
|
|
|
return consts.ErrPathContainsParentReferences
|
|
|
|
}
|
|
|
|
|
2017-04-12 16:40:54 +00:00
|
|
|
c.lock.Lock()
|
|
|
|
defer c.lock.Unlock()
|
|
|
|
|
2018-11-07 01:21:24 +00:00
|
|
|
return c.setInternal(ctx, name, pluginType, command, args, env, sha256)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PluginCatalog) setInternal(ctx context.Context, name string, pluginType consts.PluginType, command string, args []string, env []string, sha256 []byte) error {
|
2017-04-04 00:52:29 +00:00
|
|
|
// Best effort check to make sure the command isn't breaking out of the
|
|
|
|
// configured plugin directory.
|
2018-01-18 00:19:28 +00:00
|
|
|
commandFull := filepath.Join(c.directory, command)
|
2017-05-04 19:36:06 +00:00
|
|
|
sym, err := filepath.EvalSymlinks(commandFull)
|
2017-04-04 00:52:29 +00:00
|
|
|
if err != nil {
|
2018-04-05 15:49:21 +00:00
|
|
|
return errwrap.Wrapf("error while validating the command path: {{err}}", err)
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
symAbs, err := filepath.Abs(filepath.Dir(sym))
|
|
|
|
if err != nil {
|
2018-04-05 15:49:21 +00:00
|
|
|
return errwrap.Wrapf("error while validating the command path: {{err}}", err)
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if symAbs != c.directory {
|
2019-10-07 15:08:18 +00:00
|
|
|
return errors.New("cannot execute files outside of configured plugin directory")
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
|
2018-11-07 01:21:24 +00:00
|
|
|
// If the plugin type is unknown, we want to attempt to determine the type
|
|
|
|
if pluginType == consts.PluginTypeUnknown {
|
|
|
|
// entryTmp should only be used for the below type check, it uses the
|
|
|
|
// full command instead of the relative command.
|
|
|
|
entryTmp := &pluginutil.PluginRunner{
|
|
|
|
Name: name,
|
|
|
|
Command: commandFull,
|
|
|
|
Args: args,
|
|
|
|
Env: env,
|
|
|
|
Sha256: sha256,
|
|
|
|
Builtin: false,
|
|
|
|
}
|
|
|
|
|
2019-01-15 15:51:55 +00:00
|
|
|
pluginType, err = c.getPluginTypeFromUnknown(ctx, log.Default(), entryTmp)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if pluginType == consts.PluginTypeUnknown {
|
2018-11-16 00:55:24 +00:00
|
|
|
return ErrPluginBadType
|
2018-11-07 01:21:24 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-04 00:52:29 +00:00
|
|
|
entry := &pluginutil.PluginRunner{
|
|
|
|
Name: name,
|
2018-11-07 01:21:24 +00:00
|
|
|
Type: pluginType,
|
2018-01-18 00:19:28 +00:00
|
|
|
Command: command,
|
|
|
|
Args: args,
|
2018-09-20 17:50:29 +00:00
|
|
|
Env: env,
|
2017-04-04 00:52:29 +00:00
|
|
|
Sha256: sha256,
|
2017-04-11 00:12:52 +00:00
|
|
|
Builtin: false,
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
buf, err := json.Marshal(entry)
|
|
|
|
if err != nil {
|
2018-04-05 15:49:21 +00:00
|
|
|
return errwrap.Wrapf("failed to encode plugin entry: {{err}}", err)
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
logicalEntry := logical.StorageEntry{
|
2018-11-07 01:21:24 +00:00
|
|
|
Key: pluginType.String() + "/" + name,
|
2017-04-04 00:52:29 +00:00
|
|
|
Value: buf,
|
|
|
|
}
|
2018-01-19 06:44:44 +00:00
|
|
|
if err := c.catalogView.Put(ctx, &logicalEntry); err != nil {
|
2018-04-05 15:49:21 +00:00
|
|
|
return errwrap.Wrapf("failed to persist plugin entry: {{err}}", err)
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2017-04-12 16:40:54 +00:00
|
|
|
|
2017-04-12 17:01:36 +00:00
|
|
|
// Delete is used to remove an external plugin from the catalog. Builtin plugins
|
|
|
|
// can not be deleted.
|
2018-11-07 01:21:24 +00:00
|
|
|
func (c *PluginCatalog) Delete(ctx context.Context, name string, pluginType consts.PluginType) error {
|
2017-04-12 16:40:54 +00:00
|
|
|
c.lock.Lock()
|
|
|
|
defer c.lock.Unlock()
|
|
|
|
|
2018-11-07 01:21:24 +00:00
|
|
|
// Check the name under which the plugin exists, but if it's unfound, don't return any error.
|
|
|
|
pluginKey := pluginType.String() + "/" + name
|
|
|
|
out, err := c.catalogView.Get(ctx, pluginKey)
|
|
|
|
if err != nil || out == nil {
|
|
|
|
pluginKey = name
|
|
|
|
}
|
|
|
|
|
|
|
|
return c.catalogView.Delete(ctx, pluginKey)
|
2017-04-12 16:40:54 +00:00
|
|
|
}
|
|
|
|
|
2017-04-12 17:01:36 +00:00
|
|
|
// List returns a list of all the known plugin names. If an external and builtin
|
|
|
|
// plugin share the same name, only one instance of the name will be returned.
|
2018-11-07 01:21:24 +00:00
|
|
|
func (c *PluginCatalog) List(ctx context.Context, pluginType consts.PluginType) ([]string, error) {
|
2017-04-12 16:40:54 +00:00
|
|
|
c.lock.RLock()
|
|
|
|
defer c.lock.RUnlock()
|
|
|
|
|
2017-04-12 17:01:36 +00:00
|
|
|
// Collect keys for external plugins in the barrier.
|
2018-01-19 06:44:44 +00:00
|
|
|
keys, err := logical.CollectKeys(ctx, c.catalogView)
|
2017-04-12 16:40:54 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-11-07 01:21:24 +00:00
|
|
|
// Get the builtin plugins.
|
|
|
|
builtinKeys := c.builtinRegistry.Keys(pluginType)
|
2017-04-12 16:40:54 +00:00
|
|
|
|
2018-11-07 01:21:24 +00:00
|
|
|
// Use a map to unique the two lists.
|
2017-04-12 16:40:54 +00:00
|
|
|
mapKeys := make(map[string]bool)
|
|
|
|
|
2018-11-07 01:21:24 +00:00
|
|
|
pluginTypePrefix := pluginType.String() + "/"
|
|
|
|
|
2017-04-12 16:40:54 +00:00
|
|
|
for _, plugin := range keys {
|
2018-11-07 01:21:24 +00:00
|
|
|
|
|
|
|
// Only list user-added plugins if they're of the given type.
|
2019-04-08 17:40:54 +00:00
|
|
|
if entry, err := c.get(ctx, plugin, pluginType); err == nil && entry != nil {
|
2018-11-07 01:21:24 +00:00
|
|
|
|
|
|
|
// Some keys will be prepended with the plugin type, but other ones won't.
|
|
|
|
// Users don't expect to see the plugin type, so we need to strip that here.
|
|
|
|
idx := strings.Index(plugin, pluginTypePrefix)
|
|
|
|
if idx == 0 {
|
|
|
|
plugin = plugin[len(pluginTypePrefix):]
|
|
|
|
}
|
|
|
|
mapKeys[plugin] = true
|
|
|
|
}
|
2017-04-12 16:40:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, plugin := range builtinKeys {
|
|
|
|
mapKeys[plugin] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
retList := make([]string, len(mapKeys))
|
|
|
|
i := 0
|
|
|
|
for k := range mapKeys {
|
|
|
|
retList[i] = k
|
|
|
|
i++
|
|
|
|
}
|
2018-03-20 18:54:10 +00:00
|
|
|
// sort for consistent ordering of builtin plugins
|
2017-04-12 16:40:54 +00:00
|
|
|
sort.Strings(retList)
|
|
|
|
|
|
|
|
return retList, nil
|
|
|
|
}
|