2023-03-15 16:00:52 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
|
2017-08-03 17:24:27 +00:00
|
|
|
package etcd
|
2017-01-03 19:43:46 +00:00
|
|
|
|
|
|
|
import (
|
2018-07-13 14:59:34 +00:00
|
|
|
"context"
|
2017-01-03 19:43:46 +00:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
metrics "github.com/armon/go-metrics"
|
2018-04-03 00:46:59 +00:00
|
|
|
log "github.com/hashicorp/go-hclog"
|
2021-07-16 00:17:31 +00:00
|
|
|
"github.com/hashicorp/go-secure-stdlib/parseutil"
|
|
|
|
"github.com/hashicorp/go-secure-stdlib/strutil"
|
2019-04-12 21:54:35 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/physical"
|
2021-09-29 18:28:13 +00:00
|
|
|
"go.etcd.io/etcd/client/pkg/v3/transport"
|
|
|
|
clientv3 "go.etcd.io/etcd/client/v3"
|
|
|
|
"go.etcd.io/etcd/client/v3/concurrency"
|
2017-01-03 19:43:46 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// EtcdBackend is a physical backend that stores data at specific
|
|
|
|
// prefix within etcd. It is used for most production situations as
|
|
|
|
// it allows Vault to run on multiple machines in a highly-available manner.
|
|
|
|
type EtcdBackend struct {
|
2019-02-28 02:34:29 +00:00
|
|
|
logger log.Logger
|
|
|
|
path string
|
|
|
|
haEnabled bool
|
|
|
|
lockTimeout time.Duration
|
|
|
|
requestTimeout time.Duration
|
2017-01-03 19:43:46 +00:00
|
|
|
|
2017-08-03 17:24:27 +00:00
|
|
|
permitPool *physical.PermitPool
|
2017-01-03 19:43:46 +00:00
|
|
|
|
|
|
|
etcd *clientv3.Client
|
|
|
|
}
|
|
|
|
|
2018-01-20 01:44:24 +00:00
|
|
|
// Verify EtcdBackend satisfies the correct interfaces
|
2021-04-08 16:43:39 +00:00
|
|
|
var (
|
|
|
|
_ physical.Backend = (*EtcdBackend)(nil)
|
|
|
|
_ physical.HABackend = (*EtcdBackend)(nil)
|
|
|
|
_ physical.Lock = (*EtcdLock)(nil)
|
|
|
|
)
|
2018-01-19 06:44:44 +00:00
|
|
|
|
2017-01-03 19:43:46 +00:00
|
|
|
// newEtcd3Backend constructs a etcd3 backend.
|
2017-08-03 17:24:27 +00:00
|
|
|
func newEtcd3Backend(conf map[string]string, logger log.Logger) (physical.Backend, error) {
|
2017-01-03 19:43:46 +00:00
|
|
|
// Get the etcd path form the configuration.
|
|
|
|
path, ok := conf["path"]
|
|
|
|
if !ok {
|
|
|
|
path = "/vault"
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure path is prefixed.
|
|
|
|
if !strings.HasPrefix(path, "/") {
|
|
|
|
path = "/" + path
|
|
|
|
}
|
|
|
|
|
2017-04-04 15:50:44 +00:00
|
|
|
endpoints, err := getEtcdEndpoints(conf)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2017-01-03 19:43:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
cfg := clientv3.Config{
|
|
|
|
Endpoints: endpoints,
|
|
|
|
}
|
|
|
|
|
|
|
|
haEnabled := os.Getenv("ETCD_HA_ENABLED")
|
|
|
|
if haEnabled == "" {
|
|
|
|
haEnabled = conf["ha_enabled"]
|
|
|
|
}
|
2017-01-26 22:19:13 +00:00
|
|
|
if haEnabled == "" {
|
|
|
|
haEnabled = "false"
|
|
|
|
}
|
|
|
|
haEnabledBool, err := strconv.ParseBool(haEnabled)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("value [%v] of 'ha_enabled' could not be understood", haEnabled)
|
|
|
|
}
|
2017-01-03 19:43:46 +00:00
|
|
|
|
|
|
|
cert, hasCert := conf["tls_cert_file"]
|
|
|
|
key, hasKey := conf["tls_key_file"]
|
|
|
|
ca, hasCa := conf["tls_ca_file"]
|
|
|
|
if (hasCert && hasKey) || hasCa {
|
|
|
|
tls := transport.TLSInfo{
|
2018-05-22 19:46:39 +00:00
|
|
|
TrustedCAFile: ca,
|
|
|
|
CertFile: cert,
|
|
|
|
KeyFile: key,
|
2017-01-03 19:43:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
tlscfg, err := tls.ClientConfig()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
cfg.TLS = tlscfg
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set credentials.
|
|
|
|
username := os.Getenv("ETCD_USERNAME")
|
|
|
|
if username == "" {
|
|
|
|
username, _ = conf["username"]
|
|
|
|
}
|
|
|
|
|
|
|
|
password := os.Getenv("ETCD_PASSWORD")
|
|
|
|
if password == "" {
|
|
|
|
password, _ = conf["password"]
|
|
|
|
}
|
|
|
|
|
|
|
|
if username != "" && password != "" {
|
|
|
|
cfg.Username = username
|
|
|
|
cfg.Password = password
|
|
|
|
}
|
|
|
|
|
2018-02-02 00:08:09 +00:00
|
|
|
if maxReceive, ok := conf["max_receive_size"]; ok {
|
|
|
|
// grpc converts this to uint32 internally, so parse as that to avoid passing invalid values
|
|
|
|
val, err := strconv.ParseUint(maxReceive, 10, 32)
|
|
|
|
if err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return nil, fmt.Errorf("value of 'max_receive_size' (%v) could not be understood: %w", maxReceive, err)
|
2018-02-02 00:08:09 +00:00
|
|
|
}
|
|
|
|
cfg.MaxCallRecvMsgSize = int(val)
|
|
|
|
}
|
|
|
|
|
2017-01-03 19:43:46 +00:00
|
|
|
etcd, err := clientv3.New(cfg)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-02-28 02:34:29 +00:00
|
|
|
sReqTimeout := conf["request_timeout"]
|
|
|
|
if sReqTimeout == "" {
|
|
|
|
// etcd3 default request timeout is set to 5s. It should be long enough
|
|
|
|
// for most cases, even with internal retry.
|
|
|
|
sReqTimeout = "5s"
|
|
|
|
}
|
|
|
|
reqTimeout, err := parseutil.ParseDurationSecond(sReqTimeout)
|
|
|
|
if err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return nil, fmt.Errorf("value [%v] of 'request_timeout' could not be understood: %w", sReqTimeout, err)
|
2019-02-28 02:34:29 +00:00
|
|
|
}
|
|
|
|
|
2017-01-03 19:43:46 +00:00
|
|
|
ssync, ok := conf["sync"]
|
|
|
|
if !ok {
|
|
|
|
ssync = "true"
|
|
|
|
}
|
|
|
|
sync, err := strconv.ParseBool(ssync)
|
|
|
|
if err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return nil, fmt.Errorf("value of 'sync' (%v) could not be understood: %w", ssync, err)
|
2017-01-03 19:43:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if sync {
|
2019-02-28 02:34:29 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), reqTimeout)
|
2017-01-03 19:43:46 +00:00
|
|
|
err := etcd.Sync(ctx)
|
|
|
|
cancel()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-28 02:34:29 +00:00
|
|
|
sLock := conf["lock_timeout"]
|
|
|
|
if sLock == "" {
|
|
|
|
// etcd3 default lease duration is 60s. set to 15s for faster recovery.
|
|
|
|
sLock = "15s"
|
|
|
|
}
|
|
|
|
lock, err := parseutil.ParseDurationSecond(sLock)
|
|
|
|
if err != nil {
|
2021-05-31 16:54:05 +00:00
|
|
|
return nil, fmt.Errorf("value [%v] of 'lock_timeout' could not be understood: %w", sLock, err)
|
2019-02-28 02:34:29 +00:00
|
|
|
}
|
|
|
|
|
2017-01-03 19:43:46 +00:00
|
|
|
return &EtcdBackend{
|
2019-02-28 02:34:29 +00:00
|
|
|
path: path,
|
|
|
|
etcd: etcd,
|
|
|
|
permitPool: physical.NewPermitPool(physical.DefaultParallelOperations),
|
|
|
|
logger: logger,
|
|
|
|
haEnabled: haEnabledBool,
|
|
|
|
lockTimeout: lock,
|
|
|
|
requestTimeout: reqTimeout,
|
2017-01-03 19:43:46 +00:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2018-01-19 06:44:44 +00:00
|
|
|
func (c *EtcdBackend) Put(ctx context.Context, entry *physical.Entry) error {
|
2017-01-03 19:43:46 +00:00
|
|
|
defer metrics.MeasureSince([]string{"etcd", "put"}, time.Now())
|
|
|
|
|
|
|
|
c.permitPool.Acquire()
|
|
|
|
defer c.permitPool.Release()
|
|
|
|
|
2019-02-28 02:34:29 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), c.requestTimeout)
|
2017-07-26 16:10:12 +00:00
|
|
|
defer cancel()
|
|
|
|
_, err := c.etcd.Put(ctx, path.Join(c.path, entry.Key), string(entry.Value))
|
2017-01-03 19:43:46 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-01-19 06:44:44 +00:00
|
|
|
func (c *EtcdBackend) Get(ctx context.Context, key string) (*physical.Entry, error) {
|
2017-01-03 19:43:46 +00:00
|
|
|
defer metrics.MeasureSince([]string{"etcd", "get"}, time.Now())
|
|
|
|
|
|
|
|
c.permitPool.Acquire()
|
|
|
|
defer c.permitPool.Release()
|
|
|
|
|
2019-02-28 02:34:29 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), c.requestTimeout)
|
2017-07-26 16:10:12 +00:00
|
|
|
defer cancel()
|
|
|
|
resp, err := c.etcd.Get(ctx, path.Join(c.path, key))
|
2017-01-03 19:43:46 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(resp.Kvs) == 0 {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
if len(resp.Kvs) > 1 {
|
|
|
|
return nil, errors.New("unexpected number of keys from a get request")
|
|
|
|
}
|
2017-08-03 17:24:27 +00:00
|
|
|
return &physical.Entry{
|
2017-01-03 19:43:46 +00:00
|
|
|
Key: key,
|
|
|
|
Value: resp.Kvs[0].Value,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2018-01-19 06:44:44 +00:00
|
|
|
func (c *EtcdBackend) Delete(ctx context.Context, key string) error {
|
2017-01-03 19:43:46 +00:00
|
|
|
defer metrics.MeasureSince([]string{"etcd", "delete"}, time.Now())
|
|
|
|
|
|
|
|
c.permitPool.Acquire()
|
|
|
|
defer c.permitPool.Release()
|
|
|
|
|
2019-02-28 02:34:29 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), c.requestTimeout)
|
2017-07-26 16:10:12 +00:00
|
|
|
defer cancel()
|
|
|
|
_, err := c.etcd.Delete(ctx, path.Join(c.path, key))
|
2017-01-03 19:43:46 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-01-19 06:44:44 +00:00
|
|
|
func (c *EtcdBackend) List(ctx context.Context, prefix string) ([]string, error) {
|
2017-01-03 19:43:46 +00:00
|
|
|
defer metrics.MeasureSince([]string{"etcd", "list"}, time.Now())
|
|
|
|
|
|
|
|
c.permitPool.Acquire()
|
|
|
|
defer c.permitPool.Release()
|
|
|
|
|
2019-02-28 02:34:29 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), c.requestTimeout)
|
2017-07-26 16:10:12 +00:00
|
|
|
defer cancel()
|
2017-10-06 13:48:46 +00:00
|
|
|
prefix = path.Join(c.path, prefix) + "/"
|
2017-07-26 16:10:12 +00:00
|
|
|
resp, err := c.etcd.Get(ctx, prefix, clientv3.WithPrefix())
|
2017-01-03 19:43:46 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
keys := []string{}
|
|
|
|
for _, kv := range resp.Kvs {
|
|
|
|
key := strings.TrimPrefix(string(kv.Key), prefix)
|
|
|
|
key = strings.TrimPrefix(key, "/")
|
|
|
|
|
|
|
|
if len(key) == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if i := strings.Index(key, "/"); i == -1 {
|
|
|
|
keys = append(keys, key)
|
|
|
|
} else if i != -1 {
|
2017-06-16 15:09:15 +00:00
|
|
|
keys = strutil.AppendIfMissing(keys, key[:i+1])
|
2017-01-03 19:43:46 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return keys, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *EtcdBackend) HAEnabled() bool {
|
|
|
|
return e.haEnabled
|
|
|
|
}
|
|
|
|
|
2018-03-20 18:54:10 +00:00
|
|
|
// EtcdLock implements a lock using and etcd backend.
|
2017-01-03 19:43:46 +00:00
|
|
|
type EtcdLock struct {
|
2019-02-28 02:34:29 +00:00
|
|
|
lock sync.Mutex
|
|
|
|
held bool
|
|
|
|
timeout time.Duration
|
|
|
|
requestTimeout time.Duration
|
2017-01-03 19:43:46 +00:00
|
|
|
|
|
|
|
etcdSession *concurrency.Session
|
|
|
|
etcdMu *concurrency.Mutex
|
|
|
|
|
|
|
|
prefix string
|
|
|
|
value string
|
|
|
|
|
|
|
|
etcd *clientv3.Client
|
|
|
|
}
|
|
|
|
|
|
|
|
// Lock is used for mutual exclusion based on the given key.
|
2017-08-03 17:24:27 +00:00
|
|
|
func (c *EtcdBackend) LockWith(key, value string) (physical.Lock, error) {
|
2017-01-03 19:43:46 +00:00
|
|
|
p := path.Join(c.path, key)
|
|
|
|
return &EtcdLock{
|
2019-02-28 02:34:29 +00:00
|
|
|
prefix: p,
|
|
|
|
value: value,
|
|
|
|
etcd: c.etcd,
|
|
|
|
timeout: c.lockTimeout,
|
|
|
|
requestTimeout: c.requestTimeout,
|
2017-01-03 19:43:46 +00:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *EtcdLock) Lock(stopCh <-chan struct{}) (<-chan struct{}, error) {
|
|
|
|
c.lock.Lock()
|
|
|
|
defer c.lock.Unlock()
|
|
|
|
|
2018-02-02 00:04:52 +00:00
|
|
|
if c.etcdMu == nil {
|
|
|
|
if err := c.initMu(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-03 19:43:46 +00:00
|
|
|
if c.held {
|
|
|
|
return nil, EtcdLockHeldError
|
|
|
|
}
|
|
|
|
|
2017-11-03 17:38:16 +00:00
|
|
|
select {
|
|
|
|
case _, ok := <-c.etcdSession.Done():
|
|
|
|
if !ok {
|
|
|
|
// The session's done channel is closed, so the session is over,
|
2018-02-02 00:04:52 +00:00
|
|
|
// and we need a new lock with a new session.
|
|
|
|
if err := c.initMu(); err != nil {
|
2017-11-03 17:38:16 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
|
2017-01-03 19:43:46 +00:00
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
go func() {
|
|
|
|
<-stopCh
|
|
|
|
cancel()
|
|
|
|
}()
|
|
|
|
if err := c.etcdMu.Lock(ctx); err != nil {
|
|
|
|
if err == context.Canceled {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
2017-07-26 16:10:12 +00:00
|
|
|
|
2019-02-28 02:34:29 +00:00
|
|
|
pctx, cancel := context.WithTimeout(context.Background(), c.requestTimeout)
|
2017-07-26 16:10:12 +00:00
|
|
|
defer cancel()
|
|
|
|
if _, err := c.etcd.Put(pctx, c.etcdMu.Key(), c.value, clientv3.WithLease(c.etcdSession.Lease())); err != nil {
|
2017-01-03 19:43:46 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
c.held = true
|
|
|
|
|
|
|
|
return c.etcdSession.Done(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *EtcdLock) Unlock() error {
|
|
|
|
c.lock.Lock()
|
|
|
|
defer c.lock.Unlock()
|
|
|
|
|
|
|
|
if !c.held {
|
|
|
|
return EtcdLockNotHeldError
|
|
|
|
}
|
|
|
|
|
2019-02-28 02:34:29 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), c.requestTimeout)
|
2017-07-26 16:10:12 +00:00
|
|
|
defer cancel()
|
|
|
|
return c.etcdMu.Unlock(ctx)
|
2017-01-03 19:43:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *EtcdLock) Value() (bool, string, error) {
|
2019-02-28 02:34:29 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), c.requestTimeout)
|
2017-07-26 16:10:12 +00:00
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
resp, err := c.etcd.Get(ctx,
|
2017-01-03 19:43:46 +00:00
|
|
|
c.prefix, clientv3.WithPrefix(),
|
|
|
|
clientv3.WithSort(clientv3.SortByCreateRevision, clientv3.SortAscend))
|
|
|
|
if err != nil {
|
|
|
|
return false, "", err
|
|
|
|
}
|
|
|
|
if len(resp.Kvs) == 0 {
|
|
|
|
return false, "", nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, string(resp.Kvs[0].Value), nil
|
|
|
|
}
|
2018-02-02 00:04:52 +00:00
|
|
|
|
|
|
|
func (c *EtcdLock) initMu() error {
|
2019-02-28 02:34:29 +00:00
|
|
|
session, err := concurrency.NewSession(c.etcd, concurrency.WithTTL(int(c.timeout.Seconds())))
|
2018-02-02 00:04:52 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
c.etcdSession = session
|
|
|
|
c.etcdMu = concurrency.NewMutex(session, c.prefix)
|
|
|
|
return nil
|
|
|
|
}
|