2015-03-06 01:23:56 +00:00
|
|
|
package vault
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
2015-04-08 23:43:17 +00:00
|
|
|
"time"
|
2015-03-06 01:23:56 +00:00
|
|
|
|
2015-04-08 23:43:17 +00:00
|
|
|
"github.com/armon/go-metrics"
|
2015-03-06 01:23:56 +00:00
|
|
|
"github.com/armon/go-radix"
|
2015-06-30 21:08:21 +00:00
|
|
|
"github.com/hashicorp/vault/helper/salt"
|
2015-03-15 21:53:41 +00:00
|
|
|
"github.com/hashicorp/vault/logical"
|
2015-03-06 01:23:56 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Router is used to do prefix based routing of a request to a logical backend
|
|
|
|
type Router struct {
|
2015-09-15 15:28:07 +00:00
|
|
|
l sync.RWMutex
|
|
|
|
root *radix.Tree
|
|
|
|
tokenStoreSalt *salt.Salt
|
2017-01-07 23:18:22 +00:00
|
|
|
|
|
|
|
// storagePrefix maps the prefix used for storage (ala the BarrierView)
|
|
|
|
// to the backend. This is used to map a key back into the backend that owns it.
|
|
|
|
// For example, logical/uuid1/foobar -> secrets/ (generic backend) + foobar
|
|
|
|
storagePrefix *radix.Tree
|
2015-03-06 01:23:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewRouter returns a new router
|
|
|
|
func NewRouter() *Router {
|
|
|
|
r := &Router{
|
2017-01-07 23:18:22 +00:00
|
|
|
root: radix.New(),
|
|
|
|
storagePrefix: radix.New(),
|
2015-03-06 01:23:56 +00:00
|
|
|
}
|
|
|
|
return r
|
|
|
|
}
|
|
|
|
|
2015-09-04 20:58:12 +00:00
|
|
|
// routeEntry is used to represent a mount point in the router
|
|
|
|
type routeEntry struct {
|
2015-09-15 16:27:22 +00:00
|
|
|
tainted bool
|
|
|
|
backend logical.Backend
|
|
|
|
mountEntry *MountEntry
|
|
|
|
storageView *BarrierView
|
|
|
|
rootPaths *radix.Tree
|
|
|
|
loginPaths *radix.Tree
|
2015-03-06 01:23:56 +00:00
|
|
|
}
|
|
|
|
|
2016-05-15 16:58:36 +00:00
|
|
|
// SaltID is used to apply a salt and hash to an ID to make sure its not reversible
|
2015-09-04 20:58:12 +00:00
|
|
|
func (re *routeEntry) SaltID(id string) string {
|
|
|
|
return salt.SaltID(re.mountEntry.UUID, id, salt.SHA1Hash)
|
2015-04-03 21:42:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Mount is used to expose a logical backend at a given prefix, using a unique salt,
|
|
|
|
// and the barrier view for that path.
|
2015-09-15 16:27:22 +00:00
|
|
|
func (r *Router) Mount(backend logical.Backend, prefix string, mountEntry *MountEntry, storageView *BarrierView) error {
|
2015-03-06 01:23:56 +00:00
|
|
|
r.l.Lock()
|
|
|
|
defer r.l.Unlock()
|
|
|
|
|
|
|
|
// Check if this is a nested mount
|
|
|
|
if existing, _, ok := r.root.LongestPrefix(prefix); ok && existing != "" {
|
|
|
|
return fmt.Errorf("cannot mount under existing mount '%s'", existing)
|
|
|
|
}
|
|
|
|
|
2015-03-31 00:46:18 +00:00
|
|
|
// Build the paths
|
|
|
|
paths := backend.SpecialPaths()
|
|
|
|
if paths == nil {
|
|
|
|
paths = new(logical.Paths)
|
2015-03-06 01:23:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create a mount entry
|
2015-09-04 20:58:12 +00:00
|
|
|
re := &routeEntry{
|
2015-09-15 16:27:22 +00:00
|
|
|
tainted: false,
|
|
|
|
backend: backend,
|
|
|
|
mountEntry: mountEntry,
|
|
|
|
storageView: storageView,
|
|
|
|
rootPaths: pathsToRadix(paths.Root),
|
|
|
|
loginPaths: pathsToRadix(paths.Unauthenticated),
|
2015-03-06 01:23:56 +00:00
|
|
|
}
|
2015-09-04 20:58:12 +00:00
|
|
|
r.root.Insert(prefix, re)
|
2017-01-07 23:18:22 +00:00
|
|
|
r.storagePrefix.Insert(storageView.prefix, re)
|
2015-09-10 01:58:09 +00:00
|
|
|
|
2015-03-06 01:23:56 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unmount is used to remove a logical backend from a given prefix
|
|
|
|
func (r *Router) Unmount(prefix string) error {
|
|
|
|
r.l.Lock()
|
|
|
|
defer r.l.Unlock()
|
2015-09-10 14:11:37 +00:00
|
|
|
|
2017-01-07 23:18:22 +00:00
|
|
|
// Fast-path out if the backend doesn't exist
|
|
|
|
raw, ok := r.root.Get(prefix)
|
|
|
|
if !ok {
|
|
|
|
return nil
|
2015-09-10 14:11:37 +00:00
|
|
|
}
|
2017-01-07 23:18:22 +00:00
|
|
|
|
|
|
|
// Call backend's Cleanup routine
|
|
|
|
re := raw.(*routeEntry)
|
|
|
|
re.backend.Cleanup()
|
|
|
|
|
|
|
|
// Purge from the radix trees
|
2015-03-06 01:23:56 +00:00
|
|
|
r.root.Delete(prefix)
|
2017-01-07 23:18:22 +00:00
|
|
|
r.storagePrefix.Delete(re.storageView.prefix)
|
2015-03-06 01:23:56 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remount is used to change the mount location of a logical backend
|
|
|
|
func (r *Router) Remount(src, dst string) error {
|
|
|
|
r.l.Lock()
|
|
|
|
defer r.l.Unlock()
|
|
|
|
|
|
|
|
// Check for existing mount
|
|
|
|
raw, ok := r.root.Get(src)
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("no mount at '%s'", src)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update the mount point
|
|
|
|
r.root.Delete(src)
|
|
|
|
r.root.Insert(dst, raw)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-04-02 18:12:13 +00:00
|
|
|
// Taint is used to mark a path as tainted. This means only RollbackOperation
|
2016-03-01 01:29:04 +00:00
|
|
|
// RevokeOperation requests are allowed to proceed
|
2015-04-02 18:12:13 +00:00
|
|
|
func (r *Router) Taint(path string) error {
|
|
|
|
r.l.Lock()
|
|
|
|
defer r.l.Unlock()
|
|
|
|
_, raw, ok := r.root.LongestPrefix(path)
|
|
|
|
if ok {
|
2015-09-04 20:58:12 +00:00
|
|
|
raw.(*routeEntry).tainted = true
|
2015-04-02 18:12:13 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-04-02 19:01:53 +00:00
|
|
|
// Untaint is used to unmark a path as tainted.
|
|
|
|
func (r *Router) Untaint(path string) error {
|
|
|
|
r.l.Lock()
|
|
|
|
defer r.l.Unlock()
|
|
|
|
_, raw, ok := r.root.LongestPrefix(path)
|
|
|
|
if ok {
|
2015-09-04 20:58:12 +00:00
|
|
|
raw.(*routeEntry).tainted = false
|
2015-04-02 19:01:53 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-04-02 18:03:59 +00:00
|
|
|
// MatchingMount returns the mount prefix that would be used for a path
|
2015-03-12 00:56:01 +00:00
|
|
|
func (r *Router) MatchingMount(path string) string {
|
|
|
|
r.l.RLock()
|
|
|
|
mount, _, ok := r.root.LongestPrefix(path)
|
|
|
|
r.l.RUnlock()
|
|
|
|
if !ok {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
return mount
|
|
|
|
}
|
|
|
|
|
2015-04-02 18:03:59 +00:00
|
|
|
// MatchingView returns the view used for a path
|
2015-09-15 16:27:22 +00:00
|
|
|
func (r *Router) MatchingStorageView(path string) *BarrierView {
|
2015-04-02 18:03:59 +00:00
|
|
|
r.l.RLock()
|
|
|
|
_, raw, ok := r.root.LongestPrefix(path)
|
|
|
|
r.l.RUnlock()
|
|
|
|
if !ok {
|
|
|
|
return nil
|
|
|
|
}
|
2015-09-15 16:27:22 +00:00
|
|
|
return raw.(*routeEntry).storageView
|
2015-09-04 20:58:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// MatchingMountEntry returns the MountEntry used for a path
|
|
|
|
func (r *Router) MatchingMountEntry(path string) *MountEntry {
|
|
|
|
r.l.RLock()
|
|
|
|
_, raw, ok := r.root.LongestPrefix(path)
|
|
|
|
r.l.RUnlock()
|
|
|
|
if !ok {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return raw.(*routeEntry).mountEntry
|
|
|
|
}
|
|
|
|
|
2015-09-15 15:28:07 +00:00
|
|
|
// MatchingMountEntry returns the MountEntry used for a path
|
|
|
|
func (r *Router) MatchingBackend(path string) logical.Backend {
|
|
|
|
r.l.RLock()
|
|
|
|
_, raw, ok := r.root.LongestPrefix(path)
|
|
|
|
r.l.RUnlock()
|
|
|
|
if !ok {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return raw.(*routeEntry).backend
|
|
|
|
}
|
|
|
|
|
2015-09-04 20:58:12 +00:00
|
|
|
// MatchingSystemView returns the SystemView used for a path
|
|
|
|
func (r *Router) MatchingSystemView(path string) logical.SystemView {
|
|
|
|
r.l.RLock()
|
|
|
|
_, raw, ok := r.root.LongestPrefix(path)
|
|
|
|
r.l.RUnlock()
|
|
|
|
if !ok {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return raw.(*routeEntry).backend.System()
|
2015-04-02 18:03:59 +00:00
|
|
|
}
|
|
|
|
|
2017-01-07 23:18:22 +00:00
|
|
|
// MatchingStoragePrefix returns the mount path matching and storage prefix
|
|
|
|
// matching the given path
|
|
|
|
func (r *Router) MatchingStoragePrefix(path string) (string, string, bool) {
|
|
|
|
r.l.RLock()
|
|
|
|
_, raw, ok := r.storagePrefix.LongestPrefix(path)
|
|
|
|
r.l.RUnlock()
|
|
|
|
if !ok {
|
|
|
|
return "", "", false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Extract the mount path and storage prefix
|
|
|
|
re := raw.(*routeEntry)
|
|
|
|
mountPath := re.mountEntry.Path
|
|
|
|
prefix := re.storageView.prefix
|
|
|
|
return mountPath, prefix, true
|
|
|
|
}
|
|
|
|
|
2015-03-06 01:23:56 +00:00
|
|
|
// Route is used to route a given request
|
2015-03-15 21:53:41 +00:00
|
|
|
func (r *Router) Route(req *logical.Request) (*logical.Response, error) {
|
2016-01-12 20:09:16 +00:00
|
|
|
resp, _, _, err := r.routeCommon(req, false)
|
2016-01-07 20:10:05 +00:00
|
|
|
return resp, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Route is used to route a given existence check request
|
2016-01-12 20:09:16 +00:00
|
|
|
func (r *Router) RouteExistenceCheck(req *logical.Request) (bool, bool, error) {
|
|
|
|
_, ok, exists, err := r.routeCommon(req, true)
|
|
|
|
return ok, exists, err
|
2016-01-07 20:10:05 +00:00
|
|
|
}
|
|
|
|
|
2016-01-12 20:09:16 +00:00
|
|
|
func (r *Router) routeCommon(req *logical.Request, existenceCheck bool) (*logical.Response, bool, bool, error) {
|
2015-03-06 01:23:56 +00:00
|
|
|
// Find the mount point
|
|
|
|
r.l.RLock()
|
2015-04-04 03:48:04 +00:00
|
|
|
mount, raw, ok := r.root.LongestPrefix(req.Path)
|
2015-05-07 19:18:50 +00:00
|
|
|
if !ok {
|
|
|
|
// Re-check for a backend by appending a slash. This lets "foo" mean
|
|
|
|
// "foo/" at the root level which is almost always what we want.
|
|
|
|
req.Path += "/"
|
|
|
|
mount, raw, ok = r.root.LongestPrefix(req.Path)
|
|
|
|
}
|
2015-03-06 01:23:56 +00:00
|
|
|
r.l.RUnlock()
|
|
|
|
if !ok {
|
2016-01-12 20:09:16 +00:00
|
|
|
return logical.ErrorResponse(fmt.Sprintf("no handler for route '%s'", req.Path)), false, false, logical.ErrUnsupportedPath
|
2015-03-06 01:23:56 +00:00
|
|
|
}
|
2015-04-09 00:09:10 +00:00
|
|
|
defer metrics.MeasureSince([]string{"route", string(req.Operation),
|
|
|
|
strings.Replace(mount, "/", "-", -1)}, time.Now())
|
2015-09-04 20:58:12 +00:00
|
|
|
re := raw.(*routeEntry)
|
2015-03-06 01:23:56 +00:00
|
|
|
|
2015-04-02 18:12:13 +00:00
|
|
|
// If the path is tainted, we reject any operation except for
|
|
|
|
// Rollback and Revoke
|
2015-09-04 20:58:12 +00:00
|
|
|
if re.tainted {
|
2015-04-02 18:12:13 +00:00
|
|
|
switch req.Operation {
|
|
|
|
case logical.RevokeOperation, logical.RollbackOperation:
|
|
|
|
default:
|
2016-01-12 20:09:16 +00:00
|
|
|
return logical.ErrorResponse(fmt.Sprintf("no handler for route '%s'", req.Path)), false, false, logical.ErrUnsupportedPath
|
2015-04-02 18:12:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-24 22:12:52 +00:00
|
|
|
// Adjust the path to exclude the routing prefix
|
2016-09-29 04:01:28 +00:00
|
|
|
originalPath := req.Path
|
2015-03-06 01:23:56 +00:00
|
|
|
req.Path = strings.TrimPrefix(req.Path, mount)
|
2015-05-27 18:46:42 +00:00
|
|
|
req.MountPoint = mount
|
2015-04-04 03:48:04 +00:00
|
|
|
if req.Path == "/" {
|
|
|
|
req.Path = ""
|
|
|
|
}
|
2015-03-24 22:12:52 +00:00
|
|
|
|
|
|
|
// Attach the storage view for the request
|
2015-09-15 16:27:22 +00:00
|
|
|
req.Storage = re.storageView
|
2015-03-24 22:12:52 +00:00
|
|
|
|
2015-04-03 21:42:39 +00:00
|
|
|
// Hash the request token unless this is the token backend
|
2015-03-24 22:12:52 +00:00
|
|
|
clientToken := req.ClientToken
|
2015-09-10 01:58:09 +00:00
|
|
|
switch {
|
2016-09-29 04:01:28 +00:00
|
|
|
case strings.HasPrefix(originalPath, "auth/token/"):
|
|
|
|
case strings.HasPrefix(originalPath, "sys/"):
|
|
|
|
case strings.HasPrefix(originalPath, "cubbyhole/"):
|
2015-09-10 01:58:09 +00:00
|
|
|
// In order for the token store to revoke later, we need to have the same
|
|
|
|
// salted ID, so we double-salt what's going to the cubbyhole backend
|
|
|
|
req.ClientToken = re.SaltID(r.tokenStoreSalt.SaltID(req.ClientToken))
|
|
|
|
default:
|
2015-09-04 20:58:12 +00:00
|
|
|
req.ClientToken = re.SaltID(req.ClientToken)
|
2015-03-24 22:12:52 +00:00
|
|
|
}
|
2015-03-06 01:23:56 +00:00
|
|
|
|
2016-02-18 16:22:04 +00:00
|
|
|
// Cache the pointer to the original connection object
|
2015-03-31 03:55:01 +00:00
|
|
|
originalConn := req.Connection
|
|
|
|
|
2016-07-24 01:46:28 +00:00
|
|
|
// Cache the identifier of the request
|
|
|
|
originalReqID := req.ID
|
|
|
|
|
2017-02-02 19:49:20 +00:00
|
|
|
// Cache the headers and hide them from backends
|
|
|
|
headers := req.Headers
|
|
|
|
req.Headers = nil
|
|
|
|
|
2017-01-04 21:44:03 +00:00
|
|
|
// Cache the wrap info of the request
|
|
|
|
var wrapInfo *logical.RequestWrapInfo
|
|
|
|
if req.WrapInfo != nil {
|
|
|
|
wrapInfo = &logical.RequestWrapInfo{
|
|
|
|
TTL: req.WrapInfo.TTL,
|
|
|
|
Format: req.WrapInfo.Format,
|
|
|
|
}
|
|
|
|
}
|
2016-09-29 04:01:28 +00:00
|
|
|
|
2015-03-06 01:23:56 +00:00
|
|
|
// Reset the request before returning
|
|
|
|
defer func() {
|
2016-09-29 04:01:28 +00:00
|
|
|
req.Path = originalPath
|
2015-05-27 18:46:42 +00:00
|
|
|
req.MountPoint = ""
|
2015-03-31 03:55:01 +00:00
|
|
|
req.Connection = originalConn
|
2016-07-24 01:46:28 +00:00
|
|
|
req.ID = originalReqID
|
2015-03-15 20:54:20 +00:00
|
|
|
req.Storage = nil
|
2015-03-24 18:09:25 +00:00
|
|
|
req.ClientToken = clientToken
|
2017-01-04 21:44:03 +00:00
|
|
|
req.WrapInfo = wrapInfo
|
2017-02-02 19:49:20 +00:00
|
|
|
req.Headers = headers
|
2017-03-01 17:39:42 +00:00
|
|
|
// This is only set in one place, after routing, so should never be set
|
|
|
|
// by a backend
|
|
|
|
req.SetLastRemoteWAL(0)
|
2015-03-06 01:23:56 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
// Invoke the backend
|
2016-01-07 20:10:05 +00:00
|
|
|
if existenceCheck {
|
2016-01-12 20:09:16 +00:00
|
|
|
ok, exists, err := re.backend.HandleExistenceCheck(req)
|
|
|
|
return nil, ok, exists, err
|
2016-01-07 20:10:05 +00:00
|
|
|
} else {
|
|
|
|
resp, err := re.backend.HandleRequest(req)
|
2016-01-12 20:09:16 +00:00
|
|
|
return resp, false, false, err
|
2016-01-07 20:10:05 +00:00
|
|
|
}
|
2015-03-06 01:23:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// RootPath checks if the given path requires root privileges
|
|
|
|
func (r *Router) RootPath(path string) bool {
|
|
|
|
r.l.RLock()
|
|
|
|
mount, raw, ok := r.root.LongestPrefix(path)
|
|
|
|
r.l.RUnlock()
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
2015-09-04 20:58:12 +00:00
|
|
|
re := raw.(*routeEntry)
|
2015-03-06 01:23:56 +00:00
|
|
|
|
|
|
|
// Trim to get remaining path
|
|
|
|
remain := strings.TrimPrefix(path, mount)
|
|
|
|
|
|
|
|
// Check the rootPaths of this backend
|
2015-09-04 20:58:12 +00:00
|
|
|
match, raw, ok := re.rootPaths.LongestPrefix(remain)
|
2015-03-06 01:23:56 +00:00
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
prefixMatch := raw.(bool)
|
|
|
|
|
|
|
|
// Handle the prefix match case
|
|
|
|
if prefixMatch {
|
|
|
|
return strings.HasPrefix(remain, match)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Handle the exact match case
|
|
|
|
return match == remain
|
|
|
|
}
|
2015-03-23 18:47:55 +00:00
|
|
|
|
|
|
|
// LoginPath checks if the given path is used for logins
|
|
|
|
func (r *Router) LoginPath(path string) bool {
|
|
|
|
r.l.RLock()
|
|
|
|
mount, raw, ok := r.root.LongestPrefix(path)
|
|
|
|
r.l.RUnlock()
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
2015-09-04 20:58:12 +00:00
|
|
|
re := raw.(*routeEntry)
|
2015-03-23 18:47:55 +00:00
|
|
|
|
|
|
|
// Trim to get remaining path
|
|
|
|
remain := strings.TrimPrefix(path, mount)
|
|
|
|
|
|
|
|
// Check the loginPaths of this backend
|
2015-09-04 20:58:12 +00:00
|
|
|
match, raw, ok := re.loginPaths.LongestPrefix(remain)
|
2015-03-23 18:47:55 +00:00
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
prefixMatch := raw.(bool)
|
|
|
|
|
|
|
|
// Handle the prefix match case
|
|
|
|
if prefixMatch {
|
|
|
|
return strings.HasPrefix(remain, match)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Handle the exact match case
|
|
|
|
return match == remain
|
|
|
|
}
|
|
|
|
|
2015-03-31 00:46:18 +00:00
|
|
|
// pathsToRadix converts a the mapping of special paths to a mapping
|
|
|
|
// of special paths to radix trees.
|
2015-03-23 18:47:55 +00:00
|
|
|
func pathsToRadix(paths []string) *radix.Tree {
|
|
|
|
tree := radix.New()
|
|
|
|
for _, path := range paths {
|
|
|
|
// Check if this is a prefix or exact match
|
|
|
|
prefixMatch := len(path) >= 1 && path[len(path)-1] == '*'
|
|
|
|
if prefixMatch {
|
|
|
|
path = path[:len(path)-1]
|
|
|
|
}
|
2015-03-31 00:46:18 +00:00
|
|
|
|
2015-03-23 18:47:55 +00:00
|
|
|
tree.Insert(path, prefixMatch)
|
|
|
|
}
|
2015-03-31 00:46:18 +00:00
|
|
|
|
2015-03-23 18:47:55 +00:00
|
|
|
return tree
|
|
|
|
}
|