2019-10-15 04:55:31 +00:00
|
|
|
package vault
|
|
|
|
|
|
|
|
import (
|
2022-01-20 12:52:53 +00:00
|
|
|
"compress/gzip"
|
2019-10-15 04:55:31 +00:00
|
|
|
"context"
|
2022-01-20 12:52:53 +00:00
|
|
|
"encoding/base64"
|
2019-10-15 04:55:31 +00:00
|
|
|
"fmt"
|
2019-11-07 16:54:34 +00:00
|
|
|
"strings"
|
|
|
|
|
2019-10-15 04:55:31 +00:00
|
|
|
log "github.com/hashicorp/go-hclog"
|
|
|
|
"github.com/hashicorp/vault/sdk/framework"
|
|
|
|
"github.com/hashicorp/vault/sdk/helper/compressutil"
|
|
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
|
|
)
|
|
|
|
|
2021-04-08 16:43:39 +00:00
|
|
|
// protectedPaths cannot be accessed via the raw APIs.
|
|
|
|
// This is both for security and to prevent disrupting Vault.
|
|
|
|
var protectedPaths = []string{
|
|
|
|
keyringPath,
|
|
|
|
// Changing the cluster info path can change the cluster ID which can be disruptive
|
|
|
|
coreLocalClusterInfoPath,
|
|
|
|
}
|
2019-10-15 04:55:31 +00:00
|
|
|
|
|
|
|
type RawBackend struct {
|
|
|
|
*framework.Backend
|
|
|
|
barrier SecurityBarrier
|
|
|
|
logger log.Logger
|
|
|
|
checkRaw func(path string) error
|
|
|
|
recoveryMode bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewRawBackend(core *Core) *RawBackend {
|
|
|
|
r := &RawBackend{
|
|
|
|
barrier: core.barrier,
|
|
|
|
logger: core.logger.Named("raw"),
|
|
|
|
checkRaw: func(path string) error {
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
recoveryMode: core.recoveryMode,
|
|
|
|
}
|
|
|
|
r.Backend = &framework.Backend{
|
|
|
|
Paths: rawPaths("sys/", r),
|
|
|
|
}
|
|
|
|
return r
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleRawRead is used to read directly from the barrier
|
|
|
|
func (b *RawBackend) handleRawRead(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
|
|
path := data.Get("path").(string)
|
|
|
|
|
2022-01-20 12:52:53 +00:00
|
|
|
// Preserve pre-existing behavior to decompress if `compressed` is missing
|
|
|
|
compressed := true
|
|
|
|
if d, ok := data.GetOk("compressed"); ok {
|
|
|
|
compressed = d.(bool)
|
|
|
|
}
|
|
|
|
|
|
|
|
encoding := data.Get("encoding").(string)
|
|
|
|
if encoding != "" && encoding != "base64" {
|
2022-08-03 18:32:45 +00:00
|
|
|
return logical.ErrorResponse("invalid encoding %q", encoding), logical.ErrInvalidRequest
|
2022-01-20 12:52:53 +00:00
|
|
|
}
|
|
|
|
|
2019-10-15 04:55:31 +00:00
|
|
|
if b.recoveryMode {
|
|
|
|
b.logger.Info("reading", "path", path)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prevent access of protected paths
|
|
|
|
for _, p := range protectedPaths {
|
|
|
|
if strings.HasPrefix(path, p) {
|
2022-08-03 18:32:45 +00:00
|
|
|
err := fmt.Sprintf("cannot read %q", path)
|
2019-10-15 04:55:31 +00:00
|
|
|
return logical.ErrorResponse(err), logical.ErrInvalidRequest
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run additional checks if needed
|
|
|
|
if err := b.checkRaw(path); err != nil {
|
|
|
|
b.logger.Warn(err.Error(), "path", path)
|
2022-08-03 18:32:45 +00:00
|
|
|
return logical.ErrorResponse("cannot read %q", path), logical.ErrInvalidRequest
|
2019-10-15 04:55:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
entry, err := b.barrier.Get(ctx, path)
|
|
|
|
if err != nil {
|
|
|
|
return handleErrorNoReadOnlyForward(err)
|
|
|
|
}
|
|
|
|
if entry == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2022-01-20 12:52:53 +00:00
|
|
|
valueBytes := entry.Value
|
|
|
|
if compressed {
|
|
|
|
// Run this through the decompression helper to see if it's been compressed.
|
|
|
|
// If the input contained the compression canary, `valueBytes` will hold
|
|
|
|
// the decompressed data. If the input was not compressed, then `valueBytes`
|
|
|
|
// will be nil.
|
|
|
|
valueBytes, _, err = compressutil.Decompress(entry.Value)
|
|
|
|
if err != nil {
|
|
|
|
return handleErrorNoReadOnlyForward(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// `valueBytes` is nil if the input is uncompressed. In that case set it to the original input.
|
|
|
|
if valueBytes == nil {
|
|
|
|
valueBytes = entry.Value
|
|
|
|
}
|
2019-10-15 04:55:31 +00:00
|
|
|
}
|
|
|
|
|
2022-01-20 12:52:53 +00:00
|
|
|
var value interface{} = string(valueBytes)
|
|
|
|
// Golang docs (https://pkg.go.dev/encoding/json#Marshal), []byte encodes as a base64-encoded string
|
|
|
|
if encoding == "base64" {
|
|
|
|
value = valueBytes
|
2019-10-15 04:55:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
resp := &logical.Response{
|
|
|
|
Data: map[string]interface{}{
|
2022-01-20 12:52:53 +00:00
|
|
|
"value": value,
|
2019-10-15 04:55:31 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleRawWrite is used to write directly to the barrier
|
|
|
|
func (b *RawBackend) handleRawWrite(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
|
|
path := data.Get("path").(string)
|
2022-01-20 12:52:53 +00:00
|
|
|
compressionType := ""
|
|
|
|
c, compressionTypeOk := data.GetOk("compression_type")
|
|
|
|
if compressionTypeOk {
|
|
|
|
compressionType = c.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
encoding := data.Get("encoding").(string)
|
|
|
|
if encoding != "" && encoding != "base64" {
|
2022-08-03 18:32:45 +00:00
|
|
|
return logical.ErrorResponse("invalid encoding %q", encoding), logical.ErrInvalidRequest
|
2022-01-20 12:52:53 +00:00
|
|
|
}
|
2019-10-15 04:55:31 +00:00
|
|
|
|
|
|
|
if b.recoveryMode {
|
|
|
|
b.logger.Info("writing", "path", path)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prevent access of protected paths
|
|
|
|
for _, p := range protectedPaths {
|
|
|
|
if strings.HasPrefix(path, p) {
|
2022-08-03 18:32:45 +00:00
|
|
|
err := fmt.Sprintf("cannot write %q", path)
|
2019-10-15 04:55:31 +00:00
|
|
|
return logical.ErrorResponse(err), logical.ErrInvalidRequest
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-20 12:52:53 +00:00
|
|
|
v := data.Get("value").(string)
|
|
|
|
value := []byte(v)
|
|
|
|
if encoding == "base64" {
|
|
|
|
var err error
|
|
|
|
value, err = base64.StdEncoding.DecodeString(v)
|
|
|
|
if err != nil {
|
|
|
|
return logical.ErrorResponse(err.Error()), logical.ErrInvalidRequest
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if req.Operation == logical.UpdateOperation {
|
|
|
|
// Check if this is an existing value with compression applied, if so, use the same compression (or no compression)
|
|
|
|
entry, err := b.barrier.Get(ctx, path)
|
|
|
|
if err != nil {
|
|
|
|
return handleErrorNoReadOnlyForward(err)
|
|
|
|
}
|
|
|
|
if entry == nil {
|
|
|
|
err := fmt.Sprintf("cannot figure out compression type because entry does not exist")
|
|
|
|
return logical.ErrorResponse(err), logical.ErrInvalidRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
// For cases where DecompressWithCanary errored, treat entry as non-compressed data.
|
|
|
|
_, existingCompressionType, _, _ := compressutil.DecompressWithCanary(entry.Value)
|
|
|
|
|
|
|
|
// Ensure compression_type matches existing entries' compression
|
|
|
|
// except allow writing non-compressed data over compressed data
|
|
|
|
if existingCompressionType != compressionType && compressionType != "" {
|
|
|
|
err := fmt.Sprintf("the entry uses a different compression scheme then compression_type")
|
|
|
|
return logical.ErrorResponse(err), logical.ErrInvalidRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
if !compressionTypeOk {
|
|
|
|
compressionType = existingCompressionType
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if compressionType != "" {
|
|
|
|
var config *compressutil.CompressionConfig
|
|
|
|
switch compressionType {
|
|
|
|
case compressutil.CompressionTypeLZ4:
|
|
|
|
config = &compressutil.CompressionConfig{
|
|
|
|
Type: compressutil.CompressionTypeLZ4,
|
|
|
|
}
|
|
|
|
break
|
|
|
|
case compressutil.CompressionTypeLZW:
|
|
|
|
config = &compressutil.CompressionConfig{
|
|
|
|
Type: compressutil.CompressionTypeLZW,
|
|
|
|
}
|
|
|
|
break
|
|
|
|
case compressutil.CompressionTypeGzip:
|
|
|
|
config = &compressutil.CompressionConfig{
|
|
|
|
Type: compressutil.CompressionTypeGzip,
|
|
|
|
GzipCompressionLevel: gzip.BestCompression,
|
|
|
|
}
|
|
|
|
break
|
|
|
|
case compressutil.CompressionTypeSnappy:
|
|
|
|
config = &compressutil.CompressionConfig{
|
|
|
|
Type: compressutil.CompressionTypeSnappy,
|
|
|
|
}
|
|
|
|
break
|
|
|
|
default:
|
2022-08-03 18:32:45 +00:00
|
|
|
err := fmt.Sprintf("invalid compression type %q", compressionType)
|
2022-01-20 12:52:53 +00:00
|
|
|
return logical.ErrorResponse(err), logical.ErrInvalidRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
|
|
|
value, err = compressutil.Compress(value, config)
|
|
|
|
if err != nil {
|
|
|
|
return logical.ErrorResponse(err.Error()), logical.ErrInvalidRequest
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-15 04:55:31 +00:00
|
|
|
entry := &logical.StorageEntry{
|
|
|
|
Key: path,
|
2022-01-20 12:52:53 +00:00
|
|
|
Value: value,
|
2019-10-15 04:55:31 +00:00
|
|
|
}
|
2022-01-20 12:52:53 +00:00
|
|
|
|
2019-10-15 04:55:31 +00:00
|
|
|
if err := b.barrier.Put(ctx, entry); err != nil {
|
|
|
|
return logical.ErrorResponse(err.Error()), logical.ErrInvalidRequest
|
|
|
|
}
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleRawDelete is used to delete directly from the barrier
|
|
|
|
func (b *RawBackend) handleRawDelete(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
|
|
path := data.Get("path").(string)
|
|
|
|
|
|
|
|
if b.recoveryMode {
|
|
|
|
b.logger.Info("deleting", "path", path)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prevent access of protected paths
|
|
|
|
for _, p := range protectedPaths {
|
|
|
|
if strings.HasPrefix(path, p) {
|
2022-08-03 18:32:45 +00:00
|
|
|
err := fmt.Sprintf("cannot delete %q", path)
|
2019-10-15 04:55:31 +00:00
|
|
|
return logical.ErrorResponse(err), logical.ErrInvalidRequest
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := b.barrier.Delete(ctx, path); err != nil {
|
|
|
|
return handleErrorNoReadOnlyForward(err)
|
|
|
|
}
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleRawList is used to list directly from the barrier
|
|
|
|
func (b *RawBackend) handleRawList(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
|
|
path := data.Get("path").(string)
|
|
|
|
if path != "" && !strings.HasSuffix(path, "/") {
|
|
|
|
path = path + "/"
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.recoveryMode {
|
|
|
|
b.logger.Info("listing", "path", path)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prevent access of protected paths
|
|
|
|
for _, p := range protectedPaths {
|
|
|
|
if strings.HasPrefix(path, p) {
|
2022-08-03 18:32:45 +00:00
|
|
|
err := fmt.Sprintf("cannot list %q", path)
|
2019-10-15 04:55:31 +00:00
|
|
|
return logical.ErrorResponse(err), logical.ErrInvalidRequest
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run additional checks if needed
|
|
|
|
if err := b.checkRaw(path); err != nil {
|
|
|
|
b.logger.Warn(err.Error(), "path", path)
|
2022-08-03 18:32:45 +00:00
|
|
|
return logical.ErrorResponse("cannot list %q", path), logical.ErrInvalidRequest
|
2019-10-15 04:55:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
keys, err := b.barrier.List(ctx, path)
|
|
|
|
if err != nil {
|
|
|
|
return handleErrorNoReadOnlyForward(err)
|
|
|
|
}
|
|
|
|
return logical.ListResponse(keys), nil
|
|
|
|
}
|
|
|
|
|
2022-01-20 12:52:53 +00:00
|
|
|
// existenceCheck checks if entry exists, used in handleRawWrite for update or create operations
|
|
|
|
func (b *RawBackend) existenceCheck(ctx context.Context, request *logical.Request, data *framework.FieldData) (bool, error) {
|
|
|
|
path := data.Get("path").(string)
|
|
|
|
entry, err := b.barrier.Get(ctx, path)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
return entry != nil, nil
|
|
|
|
}
|
|
|
|
|
2019-10-15 04:55:31 +00:00
|
|
|
func rawPaths(prefix string, r *RawBackend) []*framework.Path {
|
|
|
|
return []*framework.Path{
|
2021-04-08 16:43:39 +00:00
|
|
|
{
|
2019-10-15 04:55:31 +00:00
|
|
|
Pattern: prefix + "(raw/?$|raw/(?P<path>.+))",
|
|
|
|
|
|
|
|
Fields: map[string]*framework.FieldSchema{
|
2021-04-08 16:43:39 +00:00
|
|
|
"path": {
|
2019-10-15 04:55:31 +00:00
|
|
|
Type: framework.TypeString,
|
|
|
|
},
|
2021-04-08 16:43:39 +00:00
|
|
|
"value": {
|
2019-10-15 04:55:31 +00:00
|
|
|
Type: framework.TypeString,
|
|
|
|
},
|
2022-01-20 12:52:53 +00:00
|
|
|
"compressed": {
|
|
|
|
Type: framework.TypeBool,
|
|
|
|
},
|
|
|
|
"encoding": {
|
|
|
|
Type: framework.TypeString,
|
|
|
|
},
|
|
|
|
"compression_type": {
|
|
|
|
Type: framework.TypeString,
|
|
|
|
},
|
2019-10-15 04:55:31 +00:00
|
|
|
},
|
|
|
|
|
|
|
|
Operations: map[logical.Operation]framework.OperationHandler{
|
|
|
|
logical.ReadOperation: &framework.PathOperation{
|
|
|
|
Callback: r.handleRawRead,
|
|
|
|
Summary: "Read the value of the key at the given path.",
|
|
|
|
},
|
|
|
|
logical.UpdateOperation: &framework.PathOperation{
|
|
|
|
Callback: r.handleRawWrite,
|
|
|
|
Summary: "Update the value of the key at the given path.",
|
|
|
|
},
|
2022-01-20 12:52:53 +00:00
|
|
|
logical.CreateOperation: &framework.PathOperation{
|
|
|
|
Callback: r.handleRawWrite,
|
|
|
|
Summary: "Create a key with value at the given path.",
|
|
|
|
},
|
2019-10-15 04:55:31 +00:00
|
|
|
logical.DeleteOperation: &framework.PathOperation{
|
|
|
|
Callback: r.handleRawDelete,
|
|
|
|
Summary: "Delete the key with given path.",
|
|
|
|
},
|
|
|
|
logical.ListOperation: &framework.PathOperation{
|
|
|
|
Callback: r.handleRawList,
|
|
|
|
Summary: "Return a list keys for a given path prefix.",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
|
2022-01-20 12:52:53 +00:00
|
|
|
ExistenceCheck: r.existenceCheck,
|
2019-10-15 04:55:31 +00:00
|
|
|
HelpSynopsis: strings.TrimSpace(sysHelp["raw"][0]),
|
|
|
|
HelpDescription: strings.TrimSpace(sysHelp["raw"][1]),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|