2020-06-26 21:13:16 +00:00
|
|
|
package vault
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"strings"
|
2020-07-29 19:15:05 +00:00
|
|
|
"time"
|
2020-06-26 21:13:16 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/vault/helper/namespace"
|
|
|
|
"github.com/hashicorp/vault/sdk/framework"
|
|
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
|
|
"github.com/hashicorp/vault/vault/quotas"
|
|
|
|
)
|
|
|
|
|
|
|
|
// quotasPaths returns paths that enable quota management
|
|
|
|
func (b *SystemBackend) quotasPaths() []*framework.Path {
|
|
|
|
return []*framework.Path{
|
|
|
|
{
|
|
|
|
Pattern: "quotas/config$",
|
|
|
|
Fields: map[string]*framework.FieldSchema{
|
|
|
|
"enable_rate_limit_audit_logging": {
|
|
|
|
Type: framework.TypeBool,
|
|
|
|
Description: "If set, starts audit logging of requests that get rejected due to rate limit quota rule violations.",
|
|
|
|
},
|
2020-07-29 19:15:05 +00:00
|
|
|
"enable_rate_limit_response_headers": {
|
|
|
|
Type: framework.TypeBool,
|
|
|
|
Description: "If set, additional rate limit quota HTTP headers will be added to responses.",
|
|
|
|
},
|
2020-06-26 21:13:16 +00:00
|
|
|
},
|
|
|
|
Operations: map[logical.Operation]framework.OperationHandler{
|
|
|
|
logical.UpdateOperation: &framework.PathOperation{
|
|
|
|
Callback: b.handleQuotasConfigUpdate(),
|
|
|
|
},
|
|
|
|
logical.ReadOperation: &framework.PathOperation{
|
|
|
|
Callback: b.handleQuotasConfigRead(),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
HelpSynopsis: strings.TrimSpace(quotasHelp["quotas-config"][0]),
|
|
|
|
HelpDescription: strings.TrimSpace(quotasHelp["quotas-config"][1]),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Pattern: "quotas/rate-limit/?$",
|
|
|
|
Operations: map[logical.Operation]framework.OperationHandler{
|
|
|
|
logical.ListOperation: &framework.PathOperation{
|
|
|
|
Callback: b.handleRateLimitQuotasList(),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
HelpSynopsis: strings.TrimSpace(quotasHelp["rate-limit-list"][0]),
|
|
|
|
HelpDescription: strings.TrimSpace(quotasHelp["rate-limit-list"][1]),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Pattern: "quotas/rate-limit/" + framework.GenericNameRegex("name"),
|
|
|
|
Fields: map[string]*framework.FieldSchema{
|
|
|
|
"type": {
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "Type of the quota rule.",
|
|
|
|
},
|
|
|
|
"name": {
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "Name of the quota rule.",
|
|
|
|
},
|
|
|
|
"path": {
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: `Path of the mount or namespace to apply the quota. A blank path configures a
|
|
|
|
global quota. For example namespace1/ adds a quota to a full namespace,
|
|
|
|
namespace1/auth/userpass adds a quota to userpass in namespace1.`,
|
|
|
|
},
|
|
|
|
"rate": {
|
|
|
|
Type: framework.TypeFloat,
|
2020-07-29 19:15:05 +00:00
|
|
|
Description: `The maximum number of requests in a given interval to be allowed by the quota rule.
|
2020-07-16 18:34:43 +00:00
|
|
|
The 'rate' must be positive.`,
|
2020-06-26 21:13:16 +00:00
|
|
|
},
|
2020-07-29 19:15:05 +00:00
|
|
|
"interval": {
|
|
|
|
Type: framework.TypeDurationSecond,
|
|
|
|
Description: "The duration to enforce rate limiting for (default '1s').",
|
|
|
|
},
|
2020-08-17 02:09:18 +00:00
|
|
|
"block_interval": {
|
|
|
|
Type: framework.TypeDurationSecond,
|
|
|
|
Description: `If set, when a client reaches a rate limit threshold, the client will be prohibited
|
|
|
|
from any further requests until after the 'block_interval' has elapsed.`,
|
|
|
|
},
|
2020-06-26 21:13:16 +00:00
|
|
|
},
|
|
|
|
Operations: map[logical.Operation]framework.OperationHandler{
|
|
|
|
logical.UpdateOperation: &framework.PathOperation{
|
|
|
|
Callback: b.handleRateLimitQuotasUpdate(),
|
|
|
|
},
|
|
|
|
logical.ReadOperation: &framework.PathOperation{
|
|
|
|
Callback: b.handleRateLimitQuotasRead(),
|
|
|
|
},
|
|
|
|
logical.DeleteOperation: &framework.PathOperation{
|
|
|
|
Callback: b.handleRateLimitQuotasDelete(),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
HelpSynopsis: strings.TrimSpace(quotasHelp["rate-limit"][0]),
|
|
|
|
HelpDescription: strings.TrimSpace(quotasHelp["rate-limit"][1]),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *SystemBackend) handleQuotasConfigUpdate() framework.OperationFunc {
|
|
|
|
return func(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
|
|
config, err := quotas.LoadConfig(ctx, b.Core.systemBarrierView)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-07-29 19:15:05 +00:00
|
|
|
|
2020-06-26 21:13:16 +00:00
|
|
|
config.EnableRateLimitAuditLogging = d.Get("enable_rate_limit_audit_logging").(bool)
|
2020-07-29 19:15:05 +00:00
|
|
|
config.EnableRateLimitResponseHeaders = d.Get("enable_rate_limit_response_headers").(bool)
|
2020-06-26 21:13:16 +00:00
|
|
|
|
|
|
|
entry, err := logical.StorageEntryJSON(quotas.ConfigPath, config)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := req.Storage.Put(ctx, entry); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
b.Core.quotaManager.SetEnableRateLimitAuditLogging(config.EnableRateLimitAuditLogging)
|
2020-07-29 19:15:05 +00:00
|
|
|
b.Core.quotaManager.SetEnableRateLimitResponseHeaders(config.EnableRateLimitResponseHeaders)
|
|
|
|
|
2020-06-26 21:13:16 +00:00
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *SystemBackend) handleQuotasConfigRead() framework.OperationFunc {
|
|
|
|
return func(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
|
|
config := b.Core.quotaManager.Config()
|
|
|
|
return &logical.Response{
|
|
|
|
Data: map[string]interface{}{
|
2020-07-29 19:15:05 +00:00
|
|
|
"enable_rate_limit_audit_logging": config.EnableRateLimitAuditLogging,
|
|
|
|
"enable_rate_limit_response_headers": config.EnableRateLimitResponseHeaders,
|
2020-06-26 21:13:16 +00:00
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *SystemBackend) handleRateLimitQuotasList() framework.OperationFunc {
|
|
|
|
return func(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
|
|
names, err := b.Core.quotaManager.QuotaNames(quotas.TypeRateLimit)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return logical.ListResponse(names), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *SystemBackend) handleRateLimitQuotasUpdate() framework.OperationFunc {
|
|
|
|
return func(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
|
|
name := d.Get("name").(string)
|
|
|
|
|
|
|
|
qType := quotas.TypeRateLimit.String()
|
|
|
|
rate := d.Get("rate").(float64)
|
|
|
|
if rate <= 0 {
|
|
|
|
return logical.ErrorResponse("'rate' is invalid"), nil
|
|
|
|
}
|
|
|
|
|
2020-07-29 19:15:05 +00:00
|
|
|
interval := time.Second * time.Duration(d.Get("interval").(int))
|
|
|
|
if interval == 0 {
|
|
|
|
interval = time.Second
|
|
|
|
}
|
|
|
|
|
2020-08-17 02:09:18 +00:00
|
|
|
blockInterval := time.Second * time.Duration(d.Get("block_interval").(int))
|
|
|
|
if blockInterval < 0 {
|
|
|
|
return logical.ErrorResponse("'block' is invalid"), nil
|
|
|
|
}
|
|
|
|
|
2020-06-26 21:13:16 +00:00
|
|
|
mountPath := sanitizePath(d.Get("path").(string))
|
|
|
|
ns := b.Core.namespaceByPath(mountPath)
|
|
|
|
if ns.ID != namespace.RootNamespaceID {
|
|
|
|
mountPath = strings.TrimPrefix(mountPath, ns.Path)
|
|
|
|
}
|
|
|
|
|
|
|
|
if mountPath != "" {
|
|
|
|
match := b.Core.router.MatchingMount(namespace.ContextWithNamespace(ctx, ns), mountPath)
|
|
|
|
if match == "" {
|
|
|
|
return logical.ErrorResponse("invalid mount path %q", mountPath), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-15 17:25:00 +00:00
|
|
|
// If a quota already exists, fetch and update it.
|
|
|
|
quota, err := b.Core.quotaManager.QuotaByName(qType, name)
|
2020-06-26 21:13:16 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case quota == nil:
|
2020-07-15 17:25:00 +00:00
|
|
|
// Disallow creation of new quota that has properties similar to an
|
|
|
|
// existing quota.
|
|
|
|
quotaByFactors, err := b.Core.quotaManager.QuotaByFactors(ctx, qType, ns.Path, mountPath)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if quotaByFactors != nil && quotaByFactors.QuotaName() != name {
|
|
|
|
return logical.ErrorResponse("quota rule with similar properties exists under the name %q", quotaByFactors.QuotaName()), nil
|
|
|
|
}
|
|
|
|
|
2020-08-17 02:09:18 +00:00
|
|
|
quota = quotas.NewRateLimitQuota(name, ns.Path, mountPath, rate, interval, blockInterval)
|
2020-06-26 21:13:16 +00:00
|
|
|
default:
|
|
|
|
rlq := quota.(*quotas.RateLimitQuota)
|
|
|
|
rlq.NamespacePath = ns.Path
|
|
|
|
rlq.MountPath = mountPath
|
|
|
|
rlq.Rate = rate
|
2020-07-29 19:15:05 +00:00
|
|
|
rlq.Interval = interval
|
2020-08-17 02:09:18 +00:00
|
|
|
rlq.BlockInterval = blockInterval
|
2020-06-26 21:13:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
entry, err := logical.StorageEntryJSON(quotas.QuotaStoragePath(qType, name), quota)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := req.Storage.Put(ctx, entry); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := b.Core.quotaManager.SetQuota(ctx, qType, quota, false); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *SystemBackend) handleRateLimitQuotasRead() framework.OperationFunc {
|
|
|
|
return func(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
|
|
name := d.Get("name").(string)
|
|
|
|
qType := quotas.TypeRateLimit.String()
|
|
|
|
|
|
|
|
quota, err := b.Core.quotaManager.QuotaByName(qType, name)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if quota == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
rlq := quota.(*quotas.RateLimitQuota)
|
|
|
|
|
|
|
|
nsPath := rlq.NamespacePath
|
|
|
|
if rlq.NamespacePath == "root" {
|
|
|
|
nsPath = ""
|
|
|
|
}
|
|
|
|
|
|
|
|
data := map[string]interface{}{
|
2020-08-17 02:09:18 +00:00
|
|
|
"type": qType,
|
|
|
|
"name": rlq.Name,
|
|
|
|
"path": nsPath + rlq.MountPath,
|
|
|
|
"rate": rlq.Rate,
|
|
|
|
"interval": int(rlq.Interval.Seconds()),
|
|
|
|
"block_interval": int(rlq.BlockInterval.Seconds()),
|
2020-06-26 21:13:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return &logical.Response{
|
|
|
|
Data: data,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *SystemBackend) handleRateLimitQuotasDelete() framework.OperationFunc {
|
|
|
|
return func(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
|
|
name := d.Get("name").(string)
|
|
|
|
qType := quotas.TypeRateLimit.String()
|
|
|
|
|
|
|
|
if err := req.Storage.Delete(ctx, quotas.QuotaStoragePath(qType, name)); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := b.Core.quotaManager.DeleteQuota(ctx, qType, name); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var quotasHelp = map[string][2]string{
|
|
|
|
"quotas-config": {
|
|
|
|
"Create, update and read the quota configuration.",
|
|
|
|
"",
|
|
|
|
},
|
|
|
|
"rate-limit": {
|
|
|
|
`Get, create or update rate limit resource quota for an optional namespace or
|
|
|
|
mount.`,
|
2020-07-29 19:15:05 +00:00
|
|
|
`A rate limit quota will enforce API rate limiting in a specified interval. A
|
2020-06-26 21:13:16 +00:00
|
|
|
rate limit quota can be created at the root level or defined on a namespace or
|
|
|
|
mount by specifying a 'path'. The rate limiter is applied to each unique client
|
2020-07-16 18:34:43 +00:00
|
|
|
IP address.`,
|
2020-06-26 21:13:16 +00:00
|
|
|
},
|
|
|
|
"rate-limit-list": {
|
|
|
|
"Lists the names of all the rate limit quotas.",
|
|
|
|
"This list contains quota definitions from all the namespaces.",
|
|
|
|
},
|
|
|
|
}
|