2015-03-12 19:44:22 +00:00
package vault
2015-03-13 17:55:54 +00:00
import (
2017-12-01 22:08:38 +00:00
"context"
2015-03-13 17:55:54 +00:00
"encoding/json"
2017-09-05 15:09:00 +00:00
"errors"
2015-03-13 17:55:54 +00:00
"fmt"
"path"
2015-03-16 18:33:59 +00:00
"strings"
2015-03-13 18:31:43 +00:00
"sync"
2017-04-26 19:07:58 +00:00
"sync/atomic"
2015-03-13 17:55:54 +00:00
"time"
2015-03-15 20:52:43 +00:00
2016-12-16 20:29:27 +00:00
"github.com/armon/go-metrics"
2016-08-19 20:45:17 +00:00
log "github.com/mgutz/logxi/v1"
2017-05-03 16:17:09 +00:00
"github.com/hashicorp/errwrap"
2017-03-07 20:22:21 +00:00
multierror "github.com/hashicorp/go-multierror"
2015-12-16 17:56:20 +00:00
"github.com/hashicorp/go-uuid"
2017-02-16 18:16:06 +00:00
"github.com/hashicorp/vault/helper/consts"
2016-07-06 16:25:40 +00:00
"github.com/hashicorp/vault/helper/jsonutil"
2017-03-07 20:22:21 +00:00
"github.com/hashicorp/vault/helper/locksutil"
2015-03-15 20:52:43 +00:00
"github.com/hashicorp/vault/logical"
2015-03-13 17:55:54 +00:00
)
2015-03-13 01:38:15 +00:00
2015-03-12 19:44:22 +00:00
const (
// expirationSubPath is the sub-path used for the expiration manager
// view. This is nested under the system view.
expirationSubPath = "expire/"
2015-03-16 18:33:59 +00:00
2015-04-10 21:21:23 +00:00
// leaseViewPrefix is the prefix used for the ID based lookup of leases.
leaseViewPrefix = "id/"
// tokenViewPrefix is the prefix used for the token based lookup of leases.
tokenViewPrefix = "token/"
2015-03-16 18:33:59 +00:00
// maxRevokeAttempts limits how many revoke attempts are made
maxRevokeAttempts = 6
// revokeRetryBase is a baseline retry time
revokeRetryBase = 10 * time . Second
2015-07-30 13:42:49 +00:00
// maxLeaseDuration is the default maximum lease duration
2016-09-28 22:32:49 +00:00
maxLeaseTTL = 32 * 24 * time . Hour
2015-04-03 00:45:42 +00:00
2015-07-30 13:42:49 +00:00
// defaultLeaseDuration is the default lease duration used when no lease is specified
2015-08-27 14:50:16 +00:00
defaultLeaseTTL = maxLeaseTTL
2018-02-14 14:22:46 +00:00
//maxLeaseThreshold is the maximum lease count before generating log warning
maxLeaseThreshold = 256000
2015-03-12 19:44:22 +00:00
)
// ExpirationManager is used by the Core to manage leases. Secrets
// can provide a lease, meaning that they can be renewed or revoked.
// If a secret is not renewed in timely manner, it may be expired, and
// the ExpirationManager will handle doing automatic revocation.
type ExpirationManager struct {
2015-03-24 01:00:14 +00:00
router * Router
2015-04-10 21:21:23 +00:00
idView * BarrierView
tokenView * BarrierView
2015-03-24 01:00:14 +00:00
tokenStore * TokenStore
2016-08-19 20:45:17 +00:00
logger log . Logger
2015-03-16 01:06:19 +00:00
pending map [ string ] * time . Timer
2017-09-05 15:09:00 +00:00
pendingLock sync . RWMutex
2017-04-26 19:07:58 +00:00
2017-09-11 15:17:22 +00:00
tidyLock int32
2017-09-05 15:09:00 +00:00
2017-09-11 15:17:22 +00:00
restoreMode int32
2017-09-05 15:09:00 +00:00
restoreModeLock sync . RWMutex
restoreRequestLock sync . RWMutex
restoreLocks [ ] * locksutil . LockEntry
restoreLoaded sync . Map
quitCh chan struct { }
2017-12-01 22:08:38 +00:00
2018-02-14 14:22:46 +00:00
coreStateLock * sync . RWMutex
quitContext context . Context
leaseCheckCounter uint32
2015-03-12 19:44:22 +00:00
}
// NewExpirationManager creates a new ExpirationManager that is backed
2015-03-13 01:38:15 +00:00
// using a given view, and uses the provided router for revocation.
2017-12-01 22:08:38 +00:00
func NewExpirationManager ( c * Core , view * BarrierView ) * ExpirationManager {
2015-03-12 19:44:22 +00:00
exp := & ExpirationManager {
2017-12-01 22:08:38 +00:00
router : c . router ,
2015-04-10 21:21:23 +00:00
idView : view . SubView ( leaseViewPrefix ) ,
tokenView : view . SubView ( tokenViewPrefix ) ,
2017-12-01 22:08:38 +00:00
tokenStore : c . tokenStore ,
logger : c . logger ,
2015-03-24 01:00:14 +00:00
pending : make ( map [ string ] * time . Timer ) ,
2017-09-05 15:09:00 +00:00
// new instances of the expiration manager will go immediately into
// restore mode
restoreMode : 1 ,
restoreLocks : locksutil . CreateLocks ( ) ,
quitCh : make ( chan struct { } ) ,
2017-12-01 22:08:38 +00:00
2018-02-14 14:22:46 +00:00
coreStateLock : & c . stateLock ,
quitContext : c . activeContext ,
leaseCheckCounter : 0 ,
2015-03-12 19:44:22 +00:00
}
2017-12-01 22:08:38 +00:00
if exp . logger == nil {
exp . logger = log . New ( "expiration_manager" )
}
2015-03-12 19:44:22 +00:00
return exp
}
// setupExpiration is invoked after we've loaded the mount table to
// initialize the expiration manager
func ( c * Core ) setupExpiration ( ) error {
2015-10-12 20:33:54 +00:00
c . metricsMutex . Lock ( )
defer c . metricsMutex . Unlock ( )
2015-03-12 19:44:22 +00:00
// Create a sub-view
2015-09-04 20:58:12 +00:00
view := c . systemBarrierView . SubView ( expirationSubPath )
2015-03-12 19:44:22 +00:00
// Create the manager
2017-12-01 22:08:38 +00:00
mgr := NewExpirationManager ( c , view )
2015-03-12 19:44:22 +00:00
c . expiration = mgr
2015-03-13 18:20:36 +00:00
2015-04-03 18:40:08 +00:00
// Link the token store to this
c . tokenStore . SetExpirationManager ( mgr )
2015-03-13 18:20:36 +00:00
// Restore the existing state
2017-02-06 23:30:13 +00:00
c . logger . Info ( "expiration: restoring leases" )
2017-09-05 15:09:00 +00:00
errorFunc := func ( ) {
c . logger . Error ( "expiration: shutting down" )
if err := c . Shutdown ( ) ; err != nil {
c . logger . Error ( "expiration: error shutting down core: %v" , err )
}
2015-03-13 18:20:36 +00:00
}
2017-09-11 18:49:08 +00:00
go c . expiration . Restore ( errorFunc )
2017-09-05 15:09:00 +00:00
2015-03-13 18:20:36 +00:00
return nil
}
// stopExpiration is used to stop the expiration manager before
// sealing the Vault.
func ( c * Core ) stopExpiration ( ) error {
2015-04-14 20:32:56 +00:00
if c . expiration != nil {
if err := c . expiration . Stop ( ) ; err != nil {
return err
}
2015-10-12 20:33:54 +00:00
c . metricsMutex . Lock ( )
defer c . metricsMutex . Unlock ( )
2015-04-14 20:32:56 +00:00
c . expiration = nil
2015-03-13 18:20:36 +00:00
}
return nil
}
2017-09-05 15:09:00 +00:00
// lockLease takes out a lock for a given lease ID
func ( m * ExpirationManager ) lockLease ( leaseID string ) {
locksutil . LockForKey ( m . restoreLocks , leaseID ) . Lock ( )
}
// unlockLease unlocks a given lease ID
func ( m * ExpirationManager ) unlockLease ( leaseID string ) {
locksutil . LockForKey ( m . restoreLocks , leaseID ) . Unlock ( )
}
// inRestoreMode returns if we are currently in restore mode
func ( m * ExpirationManager ) inRestoreMode ( ) bool {
2017-09-11 15:17:22 +00:00
return atomic . LoadInt32 ( & m . restoreMode ) == 1
2017-09-05 15:09:00 +00:00
}
2017-05-04 16:11:00 +00:00
// Tidy cleans up the dangling storage entries for leases. It scans the storage
// view to find all the available leases, checks if the token embedded in it is
// either empty or invalid and in both the cases, it revokes them. It also uses
// a token cache to avoid multiple lookups of the same token ID. It is normally
// not required to use the API that invokes this. This is only intended to
// clean up the corrupt storage due to bugs.
2017-03-07 20:22:21 +00:00
func ( m * ExpirationManager ) Tidy ( ) error {
2017-09-05 15:09:00 +00:00
if m . inRestoreMode ( ) {
return errors . New ( "cannot run tidy while restoring leases" )
}
2017-03-07 20:22:21 +00:00
var tidyErrors * multierror . Error
2017-09-11 15:17:22 +00:00
if ! atomic . CompareAndSwapInt32 ( & m . tidyLock , 0 , 1 ) {
2017-05-05 14:48:12 +00:00
m . logger . Warn ( "expiration: tidy operation on leases is already in progress" )
2017-04-27 20:22:19 +00:00
return fmt . Errorf ( "tidy operation on leases is already in progress" )
}
2017-09-11 15:17:22 +00:00
defer atomic . CompareAndSwapInt32 ( & m . tidyLock , 1 , 0 )
2017-04-27 20:22:19 +00:00
2017-05-05 14:48:12 +00:00
m . logger . Info ( "expiration: beginning tidy operation on leases" )
defer m . logger . Info ( "expiration: finished tidy operation on leases" )
2017-04-27 20:22:19 +00:00
2017-04-26 20:54:48 +00:00
// Create a cache to keep track of looked up tokens
2017-04-27 15:31:42 +00:00
tokenCache := make ( map [ string ] bool )
2017-05-05 14:48:12 +00:00
var countLease , revokedCount , deletedCountInvalidToken , deletedCountEmptyToken int64
2017-04-26 20:54:48 +00:00
2017-03-07 20:22:21 +00:00
tidyFunc := func ( leaseID string ) {
2017-05-03 14:54:07 +00:00
countLease ++
if countLease % 500 == 0 {
2017-05-05 14:48:12 +00:00
m . logger . Info ( "expiration: tidying leases" , "progress" , countLease )
2017-04-27 14:56:19 +00:00
}
2017-04-26 19:48:28 +00:00
2017-03-07 20:22:21 +00:00
le , err := m . loadEntry ( leaseID )
if err != nil {
tidyErrors = multierror . Append ( tidyErrors , fmt . Errorf ( "failed to load the lease ID %q: %v" , leaseID , err ) )
return
}
if le == nil {
tidyErrors = multierror . Append ( tidyErrors , fmt . Errorf ( "nil entry for lease ID %q: %v" , leaseID , err ) )
return
}
2017-05-02 21:11:35 +00:00
var isValid , ok bool
2017-04-26 19:48:28 +00:00
revokeLease := false
2017-03-07 20:22:21 +00:00
if le . ClientToken == "" {
2017-05-05 14:48:12 +00:00
m . logger . Trace ( "expiration: revoking lease which has an empty token" , "lease_id" , leaseID )
2017-04-26 19:48:28 +00:00
revokeLease = true
2017-05-03 14:54:07 +00:00
deletedCountEmptyToken ++
2017-05-02 20:53:41 +00:00
goto REVOKE_CHECK
2017-03-07 20:22:21 +00:00
}
2017-05-02 20:53:41 +00:00
isValid , ok = tokenCache [ le . ClientToken ]
2017-04-27 15:31:42 +00:00
if ! ok {
2018-03-08 19:21:11 +00:00
saltedID , err := m . tokenStore . SaltID ( m . quitContext , le . ClientToken )
2017-07-18 16:02:03 +00:00
if err != nil {
tidyErrors = multierror . Append ( tidyErrors , fmt . Errorf ( "failed to lookup salt id: %v" , err ) )
return
}
2017-04-27 15:31:42 +00:00
lock := locksutil . LockForKey ( m . tokenStore . tokenLocks , le . ClientToken )
lock . RLock ( )
2018-01-19 06:44:44 +00:00
te , err := m . tokenStore . lookupSalted ( m . quitContext , saltedID , true )
2017-04-27 15:31:42 +00:00
lock . RUnlock ( )
2017-04-26 20:54:48 +00:00
2017-04-27 15:31:42 +00:00
if err != nil {
tidyErrors = multierror . Append ( tidyErrors , fmt . Errorf ( "failed to lookup token: %v" , err ) )
return
}
2017-04-27 15:08:11 +00:00
2017-04-27 15:31:42 +00:00
if te == nil {
2017-05-05 14:48:12 +00:00
m . logger . Trace ( "expiration: revoking lease which holds an invalid token" , "lease_id" , leaseID )
2017-04-27 15:31:42 +00:00
revokeLease = true
2017-05-03 14:54:07 +00:00
deletedCountInvalidToken ++
2017-04-27 15:31:42 +00:00
tokenCache [ le . ClientToken ] = false
} else {
tokenCache [ le . ClientToken ] = true
}
2017-05-05 14:26:40 +00:00
goto REVOKE_CHECK
2017-04-27 15:08:11 +00:00
} else {
2017-04-27 15:31:42 +00:00
if isValid {
return
}
2017-09-05 15:09:00 +00:00
m . logger . Trace ( "expiration: revoking lease which contains an invalid token" , "lease_id" , leaseID )
revokeLease = true
deletedCountInvalidToken ++
2017-05-05 14:26:40 +00:00
goto REVOKE_CHECK
2017-04-26 19:48:28 +00:00
}
2017-05-02 20:53:41 +00:00
REVOKE_CHECK :
2017-04-26 19:48:28 +00:00
if revokeLease {
2017-03-07 20:22:21 +00:00
// Force the revocation and skip going through the token store
// again
err = m . revokeCommon ( leaseID , true , true )
if err != nil {
tidyErrors = multierror . Append ( tidyErrors , fmt . Errorf ( "failed to revoke an invalid lease with ID %q: %v" , leaseID , err ) )
return
}
2017-05-05 14:48:12 +00:00
revokedCount ++
2017-03-07 20:22:21 +00:00
}
}
2018-01-19 06:44:44 +00:00
if err := logical . ScanView ( m . quitContext , m . idView , tidyFunc ) ; err != nil {
2017-04-27 20:22:19 +00:00
return err
2017-03-07 20:22:21 +00:00
}
2017-05-05 14:48:12 +00:00
m . logger . Debug ( "expiration: number of leases scanned" , "count" , countLease )
m . logger . Debug ( "expiration: number of leases which had empty tokens" , "count" , deletedCountEmptyToken )
m . logger . Debug ( "expiration: number of leases which had invalid tokens" , "count" , deletedCountInvalidToken )
m . logger . Debug ( "expiration: number of leases successfully revoked" , "count" , revokedCount )
2017-05-03 14:54:07 +00:00
2017-04-27 17:48:29 +00:00
return tidyErrors . ErrorOrNil ( )
2017-03-07 20:22:21 +00:00
}
2015-03-13 18:20:36 +00:00
// Restore is used to recover the lease states when starting.
// This is used after starting the vault.
2017-09-11 18:49:08 +00:00
func ( m * ExpirationManager ) Restore ( errorFunc func ( ) ) ( retErr error ) {
2017-09-05 15:09:00 +00:00
defer func ( ) {
// Turn off restore mode. We can do this safely without the lock because
// if restore mode finished successfully, restore mode was already
// disabled with the lock. In an error state, this will allow the
// Stop() function to shut everything down.
2017-09-11 15:17:22 +00:00
atomic . StoreInt32 ( & m . restoreMode , 0 )
2017-09-05 15:09:00 +00:00
switch {
case retErr == nil :
case errwrap . Contains ( retErr , ErrBarrierSealed . Error ( ) ) :
// Don't run error func because we're likely already shutting down
m . logger . Warn ( "expiration: barrier sealed while restoring leases, stopping lease loading" )
retErr = nil
default :
m . logger . Error ( "expiration: error restoring leases" , "error" , retErr )
if errorFunc != nil {
errorFunc ( )
}
}
} ( )
2015-03-16 18:33:59 +00:00
// Accumulate existing leases
2017-02-06 23:30:13 +00:00
m . logger . Debug ( "expiration: collecting leases" )
2018-01-19 06:44:44 +00:00
existing , err := logical . CollectKeys ( m . quitContext , m . idView )
2015-03-18 19:03:33 +00:00
if err != nil {
2017-09-05 15:09:00 +00:00
return errwrap . Wrapf ( "failed to scan for leases: {{err}}" , err )
2015-03-16 18:33:59 +00:00
}
2017-02-06 23:30:13 +00:00
m . logger . Debug ( "expiration: leases collected" , "num_existing" , len ( existing ) )
2017-02-16 18:16:06 +00:00
// Make the channels used for the worker pool
broker := make ( chan string )
quit := make ( chan bool )
// Buffer these channels to prevent deadlocks
errs := make ( chan error , len ( existing ) )
2017-09-05 15:09:00 +00:00
result := make ( chan struct { } , len ( existing ) )
2017-02-16 18:16:06 +00:00
// Use a wait group
wg := & sync . WaitGroup { }
// Create 64 workers to distribute work to
for i := 0 ; i < consts . ExpirationRestoreWorkerCount ; i ++ {
wg . Add ( 1 )
go func ( ) {
defer wg . Done ( )
for {
select {
case leaseID , ok := <- broker :
// broker has been closed, we are done
if ! ok {
return
}
2017-09-11 18:49:08 +00:00
err := m . processRestore ( leaseID )
2017-02-16 18:16:06 +00:00
if err != nil {
errs <- err
continue
}
2017-09-05 15:09:00 +00:00
// Send message that lease is done
result <- struct { } { }
2017-02-16 18:16:06 +00:00
// quit early
case <- quit :
return
2017-09-05 15:09:00 +00:00
case <- m . quitCh :
return
2017-02-16 18:16:06 +00:00
}
}
} ( )
}
// Distribute the collected keys to the workers in a go routine
wg . Add ( 1 )
go func ( ) {
defer wg . Done ( )
for i , leaseID := range existing {
2017-09-05 15:09:00 +00:00
if i > 0 && i % 500 == 0 {
2017-02-16 18:16:06 +00:00
m . logger . Trace ( "expiration: leases loading" , "progress" , i )
}
select {
case <- quit :
return
2017-09-05 15:09:00 +00:00
case <- m . quitCh :
return
2017-02-16 18:16:06 +00:00
default :
broker <- leaseID
}
2017-02-06 23:30:13 +00:00
}
2017-02-16 18:16:06 +00:00
// Close the broker, causing worker routines to exit
close ( broker )
} ( )
2017-09-05 15:09:00 +00:00
// Ensure all keys on the chan are processed
2017-02-16 18:16:06 +00:00
for i := 0 ; i < len ( existing ) ; i ++ {
select {
case err := <- errs :
// Close all go routines
close ( quit )
2015-03-16 18:33:59 +00:00
return err
2017-09-05 15:09:00 +00:00
case <- m . quitCh :
close ( quit )
return nil
2017-02-16 18:16:06 +00:00
2017-09-05 15:09:00 +00:00
case <- result :
2017-02-16 18:16:06 +00:00
}
2015-03-16 18:33:59 +00:00
}
2017-02-16 18:16:06 +00:00
// Let all go routines finish
wg . Wait ( )
2017-09-05 15:09:00 +00:00
m . restoreModeLock . Lock ( )
m . restoreLoaded = sync . Map { }
m . restoreLocks = nil
2017-09-11 15:17:22 +00:00
atomic . StoreInt32 ( & m . restoreMode , 0 )
2017-09-05 15:09:00 +00:00
m . restoreModeLock . Unlock ( )
m . logger . Info ( "expiration: lease restore complete" )
return nil
}
// processRestore takes a lease and restores it in the expiration manager if it has
// not already been seen
2017-09-11 18:49:08 +00:00
func ( m * ExpirationManager ) processRestore ( leaseID string ) error {
2017-09-05 15:09:00 +00:00
m . restoreRequestLock . RLock ( )
defer m . restoreRequestLock . RUnlock ( )
// Check if the lease has been seen
if _ , ok := m . restoreLoaded . Load ( leaseID ) ; ok {
return nil
}
m . lockLease ( leaseID )
defer m . unlockLease ( leaseID )
// Check again with the lease locked
if _ , ok := m . restoreLoaded . Load ( leaseID ) ; ok {
return nil
2015-03-24 00:27:46 +00:00
}
2017-02-16 18:16:06 +00:00
2017-09-05 15:09:00 +00:00
// Load lease and restore expiration timer
_ , err := m . loadEntryInternal ( leaseID , true , false )
if err != nil {
return err
}
2015-03-13 18:20:36 +00:00
return nil
}
// Stop is used to prevent further automatic revocations.
// This must be called before sealing the view.
func ( m * ExpirationManager ) Stop ( ) error {
2015-03-16 01:06:19 +00:00
// Stop all the pending expiration timers
2017-09-05 15:09:00 +00:00
m . logger . Debug ( "expiration: stop triggered" )
defer m . logger . Debug ( "expiration: finished stopping" )
2017-12-01 22:08:38 +00:00
// Do this before stopping pending timers to avoid potential races with
// expiring timers
close ( m . quitCh )
2015-03-16 01:06:19 +00:00
m . pendingLock . Lock ( )
for _ , timer := range m . pending {
timer . Stop ( )
2015-03-13 18:31:43 +00:00
}
2015-03-16 01:06:19 +00:00
m . pending = make ( map [ string ] * time . Timer )
m . pendingLock . Unlock ( )
2017-09-05 15:09:00 +00:00
if m . inRestoreMode ( ) {
for {
if ! m . inRestoreMode ( ) {
break
}
time . Sleep ( 10 * time . Millisecond )
}
}
2015-03-12 19:44:22 +00:00
return nil
}
2015-03-13 01:38:15 +00:00
2015-04-08 20:35:32 +00:00
// Revoke is used to revoke a secret named by the given LeaseID
func ( m * ExpirationManager ) Revoke ( leaseID string ) error {
2015-04-08 23:43:17 +00:00
defer metrics . MeasureSince ( [ ] string { "expire" , "revoke" } , time . Now ( ) )
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
2016-03-31 19:10:25 +00:00
return m . revokeCommon ( leaseID , false , false )
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
}
// revokeCommon does the heavy lifting. If force is true, we ignore a problem
// during revocation and still remove entries/index/lease timers
2016-03-31 19:10:25 +00:00
func ( m * ExpirationManager ) revokeCommon ( leaseID string , force , skipToken bool ) error {
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
defer metrics . MeasureSince ( [ ] string { "expire" , "revoke-common" } , time . Now ( ) )
2017-09-05 15:09:00 +00:00
2015-03-16 18:33:59 +00:00
// Load the entry
2015-04-08 20:35:32 +00:00
le , err := m . loadEntry ( leaseID )
2015-03-16 18:33:59 +00:00
if err != nil {
return err
}
// If there is no entry, nothing to revoke
if le == nil {
return nil
}
// Revoke the entry
2016-03-31 19:10:25 +00:00
if ! skipToken || le . Auth == nil {
if err := m . revokeEntry ( le ) ; err != nil {
if ! force {
return err
2017-09-05 15:09:00 +00:00
}
if m . logger . IsWarn ( ) {
m . logger . Warn ( "revocation from the backend failed, but in force mode so ignoring" , "error" , err )
2016-03-31 19:10:25 +00:00
}
2016-03-08 16:05:46 +00:00
}
2015-03-16 18:33:59 +00:00
}
// Delete the entry
2015-04-08 20:35:32 +00:00
if err := m . deleteEntry ( leaseID ) ; err != nil {
2015-03-16 18:33:59 +00:00
return err
}
2016-12-16 18:11:55 +00:00
// Delete the secondary index, but only if it's a leased secret (not auth)
if le . Secret != nil {
if err := m . removeIndexByToken ( le . ClientToken , le . LeaseID ) ; err != nil {
return err
}
2015-04-10 21:48:08 +00:00
}
2015-03-16 18:33:59 +00:00
// Clear the expiration handler
m . pendingLock . Lock ( )
2015-04-08 20:35:32 +00:00
if timer , ok := m . pending [ leaseID ] ; ok {
2015-03-16 18:33:59 +00:00
timer . Stop ( )
2015-04-08 20:35:32 +00:00
delete ( m . pending , leaseID )
2015-03-16 18:33:59 +00:00
}
m . pendingLock . Unlock ( )
2018-03-20 15:46:27 +00:00
if m . logger . IsInfo ( ) {
m . logger . Info ( "expiration: revoked lease" , "lease_id" , leaseID )
}
2015-03-13 01:38:15 +00:00
return nil
}
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
// RevokeForce works similarly to RevokePrefix but continues in the case of a
// revocation error; this is mostly meant for recovery operations
func ( m * ExpirationManager ) RevokeForce ( prefix string ) error {
defer metrics . MeasureSince ( [ ] string { "expire" , "revoke-force" } , time . Now ( ) )
return m . revokePrefixCommon ( prefix , true )
}
2015-03-13 01:38:15 +00:00
// RevokePrefix is used to revoke all secrets with a given prefix.
// The prefix maps to that of the mount table to make this simpler
// to reason about.
func ( m * ExpirationManager ) RevokePrefix ( prefix string ) error {
2015-04-08 23:43:17 +00:00
defer metrics . MeasureSince ( [ ] string { "expire" , "revoke-prefix" } , time . Now ( ) )
2015-03-16 21:59:37 +00:00
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
return m . revokePrefixCommon ( prefix , false )
}
2016-03-31 19:10:25 +00:00
// RevokeByToken is used to revoke all the secrets issued with a given token.
// This is done by using the secondary index. It also removes the lease entry
// for the token itself. As a result it should *ONLY* ever be called from the
// token store's revokeSalted function.
func ( m * ExpirationManager ) RevokeByToken ( te * TokenEntry ) error {
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
defer metrics . MeasureSince ( [ ] string { "expire" , "revoke-by-token" } , time . Now ( ) )
2017-09-05 15:09:00 +00:00
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
// Lookup the leases
2016-03-31 19:10:25 +00:00
existing , err := m . lookupByToken ( te . ID )
2015-03-18 19:03:33 +00:00
if err != nil {
2015-03-16 18:33:59 +00:00
return fmt . Errorf ( "failed to scan for leases: %v" , err )
}
// Revoke all the keys
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
for idx , leaseID := range existing {
2017-09-05 15:09:00 +00:00
if err := m . revokeCommon ( leaseID , false , false ) ; err != nil {
2015-03-16 18:33:59 +00:00
return fmt . Errorf ( "failed to revoke '%s' (%d / %d): %v" ,
2015-04-08 20:35:32 +00:00
leaseID , idx + 1 , len ( existing ) , err )
2015-03-16 18:33:59 +00:00
}
}
2016-03-31 19:10:25 +00:00
2016-12-16 20:29:27 +00:00
if te . Path != "" {
2018-03-08 19:21:11 +00:00
saltedID , err := m . tokenStore . SaltID ( m . quitContext , te . ID )
2017-07-18 16:02:03 +00:00
if err != nil {
return err
}
tokenLeaseID := path . Join ( te . Path , saltedID )
2016-12-16 20:29:27 +00:00
// We want to skip the revokeEntry call as that will call back into
// revocation logic in the token store, which is what is running this
// function in the first place -- it'd be a deadlock loop. Since the only
// place that this function is called is revokeSalted in the token store,
// we're already revoking the token, so we just want to clean up the lease.
// This avoids spurious revocations later in the log when the timer runs
// out, and eases up resource usage.
return m . revokeCommon ( tokenLeaseID , false , true )
}
2016-03-31 19:10:25 +00:00
2016-12-16 20:29:27 +00:00
return nil
2015-03-13 01:38:15 +00:00
}
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
func ( m * ExpirationManager ) revokePrefixCommon ( prefix string , force bool ) error {
2017-09-05 15:09:00 +00:00
if m . inRestoreMode ( ) {
m . restoreRequestLock . Lock ( )
defer m . restoreRequestLock . Unlock ( )
}
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
// Ensure there is a trailing slash
if ! strings . HasSuffix ( prefix , "/" ) {
prefix = prefix + "/"
}
// Accumulate existing leases
sub := m . idView . SubView ( prefix )
2018-01-19 06:44:44 +00:00
existing , err := logical . CollectKeys ( m . quitContext , sub )
2015-04-10 21:48:08 +00:00
if err != nil {
return fmt . Errorf ( "failed to scan for leases: %v" , err )
}
// Revoke all the keys
Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.
This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.
Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.
Fixes #1135
2016-03-03 01:26:38 +00:00
for idx , suffix := range existing {
leaseID := prefix + suffix
2016-03-31 19:10:25 +00:00
if err := m . revokeCommon ( leaseID , force , false ) ; err != nil {
2015-04-10 21:48:08 +00:00
return fmt . Errorf ( "failed to revoke '%s' (%d / %d): %v" ,
leaseID , idx + 1 , len ( existing ) , err )
}
}
return nil
}
2015-04-08 20:35:32 +00:00
// Renew is used to renew a secret using the given leaseID
2015-03-13 01:38:15 +00:00
// and a renew interval. The increment may be ignored.
2015-04-08 20:35:32 +00:00
func ( m * ExpirationManager ) Renew ( leaseID string , increment time . Duration ) ( * logical . Response , error ) {
2015-04-08 23:43:17 +00:00
defer metrics . MeasureSince ( [ ] string { "expire" , "renew" } , time . Now ( ) )
2017-09-05 15:09:00 +00:00
2015-03-16 18:33:59 +00:00
// Load the entry
2015-04-08 20:35:32 +00:00
le , err := m . loadEntry ( leaseID )
2015-03-16 18:33:59 +00:00
if err != nil {
return nil , err
}
2015-04-09 21:23:37 +00:00
// Check if the lease is renewable
2017-05-04 02:03:42 +00:00
if _ , err := le . renewable ( ) ; err != nil {
2015-04-09 21:23:37 +00:00
return nil , err
2015-04-09 00:03:46 +00:00
}
2017-06-21 15:00:39 +00:00
if le . Secret == nil {
if le . Auth != nil {
return logical . ErrorResponse ( "tokens cannot be renewed through this endpoint" ) , logical . ErrPermissionDenied
}
return logical . ErrorResponse ( "lease does not correspond to a secret" ) , nil
}
2015-03-16 20:29:51 +00:00
// Attempt to renew the entry
2015-03-16 21:59:37 +00:00
resp , err := m . renewEntry ( le , increment )
2015-03-16 20:29:51 +00:00
if err != nil {
return nil , err
2015-03-16 18:33:59 +00:00
}
2015-03-16 20:29:51 +00:00
// Fast-path if there is no lease
2015-04-09 19:29:13 +00:00
if resp == nil || resp . Secret == nil || ! resp . Secret . LeaseEnabled ( ) {
2015-03-16 20:29:51 +00:00
return resp , nil
2015-03-16 18:33:59 +00:00
}
2015-03-16 20:29:51 +00:00
// Validate the lease
2015-03-19 22:11:42 +00:00
if err := resp . Secret . Validate ( ) ; err != nil {
2015-03-16 20:29:51 +00:00
return nil , err
2015-03-16 18:33:59 +00:00
}
2015-04-08 20:35:32 +00:00
// Attach the LeaseID
resp . Secret . LeaseID = leaseID
2015-03-16 23:11:55 +00:00
2015-03-16 18:33:59 +00:00
// Update the lease entry
2015-03-16 20:29:51 +00:00
le . Data = resp . Data
2015-03-19 22:11:42 +00:00
le . Secret = resp . Secret
2015-04-09 19:29:13 +00:00
le . ExpireTime = resp . Secret . ExpirationTime ( )
2016-07-07 21:44:14 +00:00
le . LastRenewalTime = time . Now ( )
2015-03-16 18:33:59 +00:00
if err := m . persistEntry ( le ) ; err != nil {
return nil , err
}
// Update the expiration time
2015-04-09 19:39:12 +00:00
m . updatePending ( le , resp . Secret . LeaseTotal ( ) )
2015-03-16 18:33:59 +00:00
2015-03-16 20:29:51 +00:00
// Return the response
return resp , nil
2015-03-13 01:38:15 +00:00
}
2017-09-05 15:09:00 +00:00
// RestoreSaltedTokenCheck verifies that the token is not expired while running
// in restore mode. If we are not in restore mode, the lease has already been
// restored or the lease still has time left, it returns true.
func ( m * ExpirationManager ) RestoreSaltedTokenCheck ( source string , saltedID string ) ( bool , error ) {
defer metrics . MeasureSince ( [ ] string { "expire" , "restore-token-check" } , time . Now ( ) )
// Return immediately if we are not in restore mode, expiration manager is
// already loaded
if ! m . inRestoreMode ( ) {
return true , nil
}
m . restoreModeLock . RLock ( )
defer m . restoreModeLock . RUnlock ( )
// Check again after we obtain the lock
if ! m . inRestoreMode ( ) {
return true , nil
}
leaseID := path . Join ( source , saltedID )
m . lockLease ( leaseID )
defer m . unlockLease ( leaseID )
le , err := m . loadEntryInternal ( leaseID , true , true )
if err != nil {
return false , err
}
if le != nil && ! le . ExpireTime . IsZero ( ) {
expires := le . ExpireTime . Sub ( time . Now ( ) )
if expires <= 0 {
return false , nil
}
}
return true , nil
}
2015-04-03 18:58:10 +00:00
// RenewToken is used to renew a token which does not need to
// invoke a logical backend.
2016-02-18 16:22:04 +00:00
func ( m * ExpirationManager ) RenewToken ( req * logical . Request , source string , token string ,
2016-03-04 19:56:51 +00:00
increment time . Duration ) ( * logical . Response , error ) {
2015-04-08 23:43:17 +00:00
defer metrics . MeasureSince ( [ ] string { "expire" , "renew-token" } , time . Now ( ) )
2017-09-05 15:09:00 +00:00
2015-04-08 20:35:32 +00:00
// Compute the Lease ID
2018-03-08 19:21:11 +00:00
saltedID , err := m . tokenStore . SaltID ( m . quitContext , token )
2017-07-18 16:02:03 +00:00
if err != nil {
return nil , err
}
leaseID := path . Join ( source , saltedID )
2015-04-03 18:58:10 +00:00
// Load the entry
2015-04-08 20:35:32 +00:00
le , err := m . loadEntry ( leaseID )
2015-04-03 18:58:10 +00:00
if err != nil {
2015-04-06 23:35:39 +00:00
return nil , err
2015-04-03 18:58:10 +00:00
}
2016-03-01 17:33:35 +00:00
// Check if the lease is renewable. Note that this also checks for a nil
// lease and errors in that case as well.
2017-05-04 02:03:42 +00:00
if _ , err := le . renewable ( ) ; err != nil {
2016-07-06 20:42:34 +00:00
return logical . ErrorResponse ( err . Error ( ) ) , logical . ErrInvalidRequest
2015-04-03 18:58:10 +00:00
}
2015-04-09 21:23:37 +00:00
// Attempt to renew the auth entry
2016-02-18 16:22:04 +00:00
resp , err := m . renewAuthEntry ( req , le , increment )
2015-04-09 21:23:37 +00:00
if err != nil {
return nil , err
2015-04-03 18:58:10 +00:00
}
2015-04-09 21:23:37 +00:00
if resp == nil {
return nil , nil
}
2016-03-04 20:13:04 +00:00
if resp . IsError ( ) {
2016-03-04 20:35:58 +00:00
return & logical . Response {
Data : resp . Data ,
} , nil
2016-03-04 20:13:04 +00:00
}
2015-04-09 21:23:37 +00:00
if resp . Auth == nil || ! resp . Auth . LeaseEnabled ( ) {
2016-03-04 23:08:13 +00:00
return & logical . Response {
Auth : resp . Auth ,
} , nil
2015-04-09 00:03:46 +00:00
}
2017-12-15 18:30:05 +00:00
sysView := m . router . MatchingSystemView ( le . Path )
if sysView == nil {
return nil , fmt . Errorf ( "expiration: unable to retrieve system view from router" )
}
retResp := & logical . Response { }
switch {
case resp . Auth . Period > time . Duration ( 0 ) :
// If it resp.Period is non-zero, use that as the TTL and override backend's
// call on TTL modification, such as a TTL value determined by
// framework.LeaseExtend call against the request. Also, cap period value to
// the sys/mount max value.
if resp . Auth . Period > sysView . MaxLeaseTTL ( ) {
2018-03-09 15:53:04 +00:00
retResp . AddWarning ( fmt . Sprintf ( "Period of %d seconds is greater than current mount/system default of %d seconds, value will be truncated." , int64 ( resp . Auth . TTL . Seconds ( ) ) , int64 ( sysView . MaxLeaseTTL ( ) . Seconds ( ) ) ) )
2017-12-15 18:30:05 +00:00
resp . Auth . Period = sysView . MaxLeaseTTL ( )
}
resp . Auth . TTL = resp . Auth . Period
case resp . Auth . TTL > time . Duration ( 0 ) :
// Cap TTL value to the sys/mount max value
if resp . Auth . TTL > sysView . MaxLeaseTTL ( ) {
2018-03-09 15:53:04 +00:00
retResp . AddWarning ( fmt . Sprintf ( "TTL of %d seconds is greater than current mount/system default of %d seconds, value will be truncated." , int64 ( resp . Auth . TTL . Seconds ( ) ) , int64 ( sysView . MaxLeaseTTL ( ) . Seconds ( ) ) ) )
2017-12-15 18:30:05 +00:00
resp . Auth . TTL = sysView . MaxLeaseTTL ( )
}
}
2015-04-09 21:23:37 +00:00
// Attach the ClientToken
resp . Auth . ClientToken = token
2015-08-21 05:27:01 +00:00
resp . Auth . Increment = 0
2015-04-09 21:23:37 +00:00
2015-04-03 18:58:10 +00:00
// Update the lease entry
2015-04-09 21:23:37 +00:00
le . Auth = resp . Auth
le . ExpireTime = resp . Auth . ExpirationTime ( )
2016-07-07 21:44:14 +00:00
le . LastRenewalTime = time . Now ( )
2015-04-03 18:58:10 +00:00
if err := m . persistEntry ( le ) ; err != nil {
2015-04-06 23:35:39 +00:00
return nil , err
2015-04-03 18:58:10 +00:00
}
// Update the expiration time
2015-04-09 21:23:37 +00:00
m . updatePending ( le , resp . Auth . LeaseTotal ( ) )
2017-12-15 18:30:05 +00:00
retResp . Auth = resp . Auth
return retResp , nil
2015-04-03 18:58:10 +00:00
}
2015-03-13 01:38:15 +00:00
// Register is used to take a request and response with an associated
2015-04-08 20:35:32 +00:00
// lease. The secret gets assigned a LeaseID and the management of
2015-03-13 01:38:15 +00:00
// of lease is assumed by the expiration manager.
2017-05-03 18:29:57 +00:00
func ( m * ExpirationManager ) Register ( req * logical . Request , resp * logical . Response ) ( id string , retErr error ) {
2015-04-08 23:43:17 +00:00
defer metrics . MeasureSince ( [ ] string { "expire" , "register" } , time . Now ( ) )
2017-05-04 16:45:57 +00:00
if req . ClientToken == "" {
return "" , fmt . Errorf ( "expiration: cannot register a lease with an empty client token" )
}
2015-03-19 22:11:42 +00:00
// Ignore if there is no leased secret
2015-04-01 04:04:10 +00:00
if resp == nil || resp . Secret == nil {
2015-03-13 17:55:54 +00:00
return "" , nil
}
2015-03-19 22:11:42 +00:00
// Validate the secret
if err := resp . Secret . Validate ( ) ; err != nil {
2015-03-13 17:55:54 +00:00
return "" , err
}
2017-05-03 18:29:57 +00:00
// Create a lease entry
leaseUUID , err := uuid . GenerateUUID ( )
if err != nil {
return "" , err
}
leaseID := path . Join ( req . Path , leaseUUID )
2017-05-03 16:17:09 +00:00
defer func ( ) {
2017-05-04 15:54:57 +00:00
// If there is an error we want to rollback as much as possible (note
// that errors here are ignored to do as much cleanup as we can). We
// want to revoke a generated secret (since an error means we may not
// be successfully tracking it), remove indexes, and delete the entry.
2017-05-03 16:17:09 +00:00
if retErr != nil {
2018-01-08 18:31:38 +00:00
revResp , err := m . router . Route ( m . quitContext , logical . RevokeRequest ( req . Path , resp . Secret , resp . Data ) )
2017-05-03 16:17:09 +00:00
if err != nil {
2017-05-04 16:44:31 +00:00
retErr = multierror . Append ( retErr , errwrap . Wrapf ( "an additional internal error was encountered revoking the newly-generated secret: {{err}}" , err ) )
2017-05-03 16:36:10 +00:00
} else if revResp != nil && revResp . IsError ( ) {
retErr = multierror . Append ( retErr , errwrap . Wrapf ( "an additional error was encountered revoking the newly-generated secret: {{err}}" , revResp . Error ( ) ) )
2017-05-03 16:17:09 +00:00
}
2017-05-03 18:29:57 +00:00
if err := m . deleteEntry ( leaseID ) ; err != nil {
2017-05-04 16:44:31 +00:00
retErr = multierror . Append ( retErr , errwrap . Wrapf ( "an additional error was encountered deleting any lease associated with the newly-generated secret: {{err}}" , err ) )
2017-05-03 18:29:57 +00:00
}
if err := m . removeIndexByToken ( req . ClientToken , leaseID ) ; err != nil {
2017-05-04 16:44:31 +00:00
retErr = multierror . Append ( retErr , errwrap . Wrapf ( "an additional error was encountered removing lease indexes associated with the newly-generated secret: {{err}}" , err ) )
2017-05-03 18:29:57 +00:00
}
2017-05-03 16:17:09 +00:00
}
} ( )
2015-03-13 17:55:54 +00:00
le := leaseEntry {
2017-05-03 18:29:57 +00:00
LeaseID : leaseID ,
2015-04-10 21:48:08 +00:00
ClientToken : req . ClientToken ,
Path : req . Path ,
Data : resp . Data ,
Secret : resp . Secret ,
2016-07-07 21:44:14 +00:00
IssueTime : time . Now ( ) ,
2015-04-10 21:48:08 +00:00
ExpireTime : resp . Secret . ExpirationTime ( ) ,
2015-03-13 17:55:54 +00:00
}
2015-03-16 01:06:19 +00:00
// Encode the entry
if err := m . persistEntry ( & le ) ; err != nil {
return "" , err
}
2015-04-10 21:48:08 +00:00
// Maintain secondary index by token
2015-11-04 15:48:44 +00:00
if err := m . createIndexByToken ( le . ClientToken , le . LeaseID ) ; err != nil {
2015-04-10 21:48:08 +00:00
return "" , err
}
2015-04-01 04:01:12 +00:00
// Setup revocation timer if there is a lease
2015-04-09 19:39:12 +00:00
m . updatePending ( & le , resp . Secret . LeaseTotal ( ) )
2015-03-16 01:06:19 +00:00
// Done
2015-04-08 20:35:32 +00:00
return le . LeaseID , nil
2015-03-16 01:06:19 +00:00
}
2015-04-03 00:45:42 +00:00
// RegisterAuth is used to take an Auth response with an associated lease.
2015-04-08 20:35:32 +00:00
// The token does not get a LeaseID, but the lease management is handled by
2015-04-03 00:45:42 +00:00
// the expiration manager.
func ( m * ExpirationManager ) RegisterAuth ( source string , auth * logical . Auth ) error {
2015-04-08 23:43:17 +00:00
defer metrics . MeasureSince ( [ ] string { "expire" , "register-auth" } , time . Now ( ) )
2015-04-11 04:21:06 +00:00
2017-05-03 16:17:09 +00:00
if auth . ClientToken == "" {
return fmt . Errorf ( "expiration: cannot register an auth lease with an empty token" )
}
2017-05-12 17:52:33 +00:00
if strings . Contains ( source , ".." ) {
return fmt . Errorf ( "expiration: %s" , consts . ErrPathContainsParentReferences )
}
2018-03-08 19:21:11 +00:00
saltedID , err := m . tokenStore . SaltID ( m . quitContext , auth . ClientToken )
2017-07-18 16:02:03 +00:00
if err != nil {
return err
}
2017-12-15 18:30:05 +00:00
// If it resp.Period is non-zero, override the TTL value determined
// by the backend.
if auth . Period > time . Duration ( 0 ) {
auth . TTL = auth . Period
}
2015-03-24 01:11:15 +00:00
// Create a lease entry
le := leaseEntry {
2017-07-18 16:02:03 +00:00
LeaseID : path . Join ( source , saltedID ) ,
2015-04-10 21:48:08 +00:00
ClientToken : auth . ClientToken ,
Auth : auth ,
Path : source ,
2016-07-07 21:44:14 +00:00
IssueTime : time . Now ( ) ,
2015-04-10 21:48:08 +00:00
ExpireTime : auth . ExpirationTime ( ) ,
2015-03-24 01:11:15 +00:00
}
// Encode the entry
if err := m . persistEntry ( & le ) ; err != nil {
2015-04-03 00:45:42 +00:00
return err
2015-03-24 01:11:15 +00:00
}
// Setup revocation timer
2015-04-09 19:39:12 +00:00
m . updatePending ( & le , auth . LeaseTotal ( ) )
return nil
}
2016-01-04 21:43:07 +00:00
// FetchLeaseTimesByToken is a helper function to use token values to compute
// the leaseID, rather than pushing that logic back into the token store.
func ( m * ExpirationManager ) FetchLeaseTimesByToken ( source , token string ) ( * leaseEntry , error ) {
defer metrics . MeasureSince ( [ ] string { "expire" , "fetch-lease-times-by-token" } , time . Now ( ) )
// Compute the Lease ID
2018-03-08 19:21:11 +00:00
saltedID , err := m . tokenStore . SaltID ( m . quitContext , token )
2017-07-18 16:02:03 +00:00
if err != nil {
return nil , err
}
leaseID := path . Join ( source , saltedID )
2016-01-04 21:43:07 +00:00
return m . FetchLeaseTimes ( leaseID )
}
// FetchLeaseTimes is used to fetch the issue time, expiration time, and last
// renewed time of a lease entry. It returns a leaseEntry itself, but with only
// those values copied over.
func ( m * ExpirationManager ) FetchLeaseTimes ( leaseID string ) ( * leaseEntry , error ) {
defer metrics . MeasureSince ( [ ] string { "expire" , "fetch-lease-times" } , time . Now ( ) )
// Load the entry
le , err := m . loadEntry ( leaseID )
if err != nil {
return nil , err
}
if le == nil {
return nil , nil
}
ret := & leaseEntry {
IssueTime : le . IssueTime ,
ExpireTime : le . ExpireTime ,
LastRenewalTime : le . LastRenewalTime ,
}
2016-06-08 13:19:39 +00:00
if le . Secret != nil {
ret . Secret = & logical . Secret { }
ret . Secret . Renewable = le . Secret . Renewable
ret . Secret . TTL = le . Secret . TTL
}
if le . Auth != nil {
ret . Auth = & logical . Auth { }
ret . Auth . Renewable = le . Auth . Renewable
ret . Auth . TTL = le . Auth . TTL
}
2016-01-04 21:43:07 +00:00
return ret , nil
}
2015-04-09 19:39:12 +00:00
// updatePending is used to update a pending invocation for a lease
func ( m * ExpirationManager ) updatePending ( le * leaseEntry , leaseTotal time . Duration ) {
m . pendingLock . Lock ( )
defer m . pendingLock . Unlock ( )
// Check for an existing timer
timer , ok := m . pending [ le . LeaseID ]
2017-09-05 15:09:00 +00:00
// If there is no expiry time, don't do anything
if le . ExpireTime . IsZero ( ) {
// if the timer happened to exist, stop the time and delete it from the
// pending timers.
if ok {
timer . Stop ( )
delete ( m . pending , le . LeaseID )
}
return
}
2015-04-09 19:39:12 +00:00
// Create entry if it does not exist
2017-09-05 15:09:00 +00:00
if ! ok {
2015-04-09 19:39:12 +00:00
timer := time . AfterFunc ( leaseTotal , func ( ) {
2015-04-08 22:43:26 +00:00
m . expireID ( le . LeaseID )
} )
2015-04-09 19:39:12 +00:00
m . pending [ le . LeaseID ] = timer
return
}
// Extend the timer by the lease total
2017-09-05 15:09:00 +00:00
timer . Reset ( leaseTotal )
2015-03-24 01:11:15 +00:00
}
2015-03-16 01:06:19 +00:00
// expireID is invoked when a given ID is expired
2015-04-08 20:35:32 +00:00
func ( m * ExpirationManager ) expireID ( leaseID string ) {
2015-03-16 01:06:19 +00:00
// Clear from the pending expiration
m . pendingLock . Lock ( )
2015-04-08 20:35:32 +00:00
delete ( m . pending , leaseID )
2015-03-16 01:06:19 +00:00
m . pendingLock . Unlock ( )
2015-03-16 18:33:59 +00:00
for attempt := uint ( 0 ) ; attempt < maxRevokeAttempts ; attempt ++ {
2017-09-05 15:09:00 +00:00
select {
case <- m . quitCh :
m . logger . Error ( "expiration: shutting down, not attempting further revocation of lease" , "lease_id" , leaseID )
return
default :
}
2017-12-01 22:08:38 +00:00
m . coreStateLock . RLock ( )
if m . quitContext . Err ( ) == context . Canceled {
m . logger . Error ( "expiration: core context canceled, not attempting further revocation of lease" , "lease_id" , leaseID )
m . coreStateLock . RUnlock ( )
return
}
2015-04-08 20:35:32 +00:00
err := m . Revoke ( leaseID )
2015-03-16 18:33:59 +00:00
if err == nil {
2017-12-01 22:08:38 +00:00
m . coreStateLock . RUnlock ( )
2015-03-16 18:33:59 +00:00
return
}
2017-12-01 22:08:38 +00:00
m . coreStateLock . RUnlock ( )
2017-09-05 15:09:00 +00:00
m . logger . Error ( "expiration: failed to revoke lease" , "lease_id" , leaseID , "error" , err )
2015-03-16 18:33:59 +00:00
time . Sleep ( ( 1 << attempt ) * revokeRetryBase )
2015-03-16 01:06:19 +00:00
}
2017-09-05 15:09:00 +00:00
m . logger . Error ( "expiration: maximum revoke attempts reached" , "lease_id" , leaseID )
2015-03-16 01:06:19 +00:00
}
// revokeEntry is used to attempt revocation of an internal entry
func ( m * ExpirationManager ) revokeEntry ( le * leaseEntry ) error {
2015-03-24 01:11:15 +00:00
// Revocation of login tokens is special since we can by-pass the
// backend and directly interact with the token store
2015-04-03 18:58:10 +00:00
if le . Auth != nil {
2018-01-19 06:44:44 +00:00
if err := m . tokenStore . RevokeTree ( m . quitContext , le . ClientToken ) ; err != nil {
2015-03-24 01:11:15 +00:00
return fmt . Errorf ( "failed to revoke token: %v" , err )
}
2015-09-10 01:58:09 +00:00
2015-03-24 01:11:15 +00:00
return nil
}
// Handle standard revocation via backends
2018-01-08 18:31:38 +00:00
resp , err := m . router . Route ( m . quitContext , logical . RevokeRequest ( le . Path , le . Secret , le . Data ) )
2016-05-26 03:24:10 +00:00
if err != nil || ( resp != nil && resp . IsError ( ) ) {
return fmt . Errorf ( "failed to revoke entry: resp:%#v err:%s" , resp , err )
2015-03-16 18:33:59 +00:00
}
return nil
2015-03-16 01:06:19 +00:00
}
2015-03-16 20:29:51 +00:00
// renewEntry is used to attempt renew of an internal entry
2015-03-16 21:59:37 +00:00
func ( m * ExpirationManager ) renewEntry ( le * leaseEntry , increment time . Duration ) ( * logical . Response , error ) {
2015-03-19 22:11:42 +00:00
secret := * le . Secret
2015-08-21 05:27:01 +00:00
secret . IssueTime = le . IssueTime
secret . Increment = increment
2015-04-08 20:35:32 +00:00
secret . LeaseID = ""
2015-03-19 22:11:42 +00:00
2015-04-09 21:23:37 +00:00
req := logical . RenewRequest ( le . Path , & secret , le . Data )
2018-01-08 18:31:38 +00:00
resp , err := m . router . Route ( m . quitContext , req )
2016-05-26 03:24:10 +00:00
if err != nil || ( resp != nil && resp . IsError ( ) ) {
return nil , fmt . Errorf ( "failed to renew entry: resp:%#v err:%s" , resp , err )
2015-04-09 21:23:37 +00:00
}
return resp , nil
}
2016-03-09 16:07:13 +00:00
// renewAuthEntry is used to attempt renew of an auth entry. Only the token
// store should get the actual token ID intact.
2016-02-18 16:22:04 +00:00
func ( m * ExpirationManager ) renewAuthEntry ( req * logical . Request , le * leaseEntry , increment time . Duration ) ( * logical . Response , error ) {
2015-04-09 21:23:37 +00:00
auth := * le . Auth
2015-08-21 05:27:01 +00:00
auth . IssueTime = le . IssueTime
auth . Increment = increment
2016-03-09 16:07:13 +00:00
if strings . HasPrefix ( le . Path , "auth/token/" ) {
auth . ClientToken = le . ClientToken
} else {
auth . ClientToken = ""
}
2015-04-09 21:23:37 +00:00
2016-02-18 16:22:04 +00:00
authReq := logical . RenewAuthRequest ( le . Path , & auth , nil )
authReq . Connection = req . Connection
2018-01-08 18:31:38 +00:00
resp , err := m . router . Route ( m . quitContext , authReq )
2015-03-16 20:29:51 +00:00
if err != nil {
return nil , fmt . Errorf ( "failed to renew entry: %v" , err )
}
return resp , nil
}
2015-03-16 01:06:19 +00:00
// loadEntry is used to read a lease entry
2015-04-08 20:35:32 +00:00
func ( m * ExpirationManager ) loadEntry ( leaseID string ) ( * leaseEntry , error ) {
2017-09-05 15:09:00 +00:00
// Take out the lease locks after we ensure we are in restore mode
restoreMode := m . inRestoreMode ( )
if restoreMode {
m . restoreModeLock . RLock ( )
defer m . restoreModeLock . RUnlock ( )
restoreMode = m . inRestoreMode ( )
if restoreMode {
m . lockLease ( leaseID )
defer m . unlockLease ( leaseID )
}
}
return m . loadEntryInternal ( leaseID , restoreMode , true )
}
// loadEntryInternal is used when you need to load an entry but also need to
// control the lifecycle of the restoreLock
func ( m * ExpirationManager ) loadEntryInternal ( leaseID string , restoreMode bool , checkRestored bool ) ( * leaseEntry , error ) {
2018-01-19 06:44:44 +00:00
out , err := m . idView . Get ( m . quitContext , leaseID )
2015-03-16 01:06:19 +00:00
if err != nil {
return nil , fmt . Errorf ( "failed to read lease entry: %v" , err )
}
if out == nil {
return nil , nil
}
le , err := decodeLeaseEntry ( out . Value )
if err != nil {
return nil , fmt . Errorf ( "failed to decode lease entry: %v" , err )
}
2017-09-05 15:09:00 +00:00
if restoreMode {
if checkRestored {
// If we have already loaded this lease, we don't need to update on
// load. In the case of renewal and revocation, updatePending will be
// done after making the appropriate modifications to the lease.
if _ , ok := m . restoreLoaded . Load ( leaseID ) ; ok {
return le , nil
}
}
// Update the cache of restored leases, either synchronously or through
// the lazy loaded restore process
m . restoreLoaded . Store ( le . LeaseID , struct { } { } )
// Setup revocation timer
m . updatePending ( le , le . ExpireTime . Sub ( time . Now ( ) ) )
}
2015-03-16 01:06:19 +00:00
return le , nil
}
// persistEntry is used to persist a lease entry
func ( m * ExpirationManager ) persistEntry ( le * leaseEntry ) error {
2015-03-13 17:55:54 +00:00
// Encode the entry
buf , err := le . encode ( )
if err != nil {
2015-03-16 01:06:19 +00:00
return fmt . Errorf ( "failed to encode lease entry: %v" , err )
2015-03-13 17:55:54 +00:00
}
// Write out to the view
2015-03-15 20:52:43 +00:00
ent := logical . StorageEntry {
2015-04-08 20:35:32 +00:00
Key : le . LeaseID ,
2015-03-13 17:55:54 +00:00
Value : buf ,
}
2017-11-06 18:10:36 +00:00
if le . Auth != nil && len ( le . Auth . Policies ) == 1 && le . Auth . Policies [ 0 ] == "root" {
ent . SealWrap = true
}
2018-01-19 06:44:44 +00:00
if err := m . idView . Put ( m . quitContext , & ent ) ; err != nil {
2015-03-16 01:06:19 +00:00
return fmt . Errorf ( "failed to persist lease entry: %v" , err )
2015-03-13 17:55:54 +00:00
}
2015-03-16 01:06:19 +00:00
return nil
}
2015-03-13 17:55:54 +00:00
2015-03-16 01:06:19 +00:00
// deleteEntry is used to delete a lease entry
2015-04-08 20:35:32 +00:00
func ( m * ExpirationManager ) deleteEntry ( leaseID string ) error {
2018-01-19 06:44:44 +00:00
if err := m . idView . Delete ( m . quitContext , leaseID ) ; err != nil {
2015-03-16 01:06:19 +00:00
return fmt . Errorf ( "failed to delete lease entry: %v" , err )
}
return nil
2015-03-13 17:55:54 +00:00
}
2015-11-04 15:48:44 +00:00
// createIndexByToken creates a secondary index from the token to a lease entry
func ( m * ExpirationManager ) createIndexByToken ( token , leaseID string ) error {
2018-03-08 19:21:11 +00:00
saltedID , err := m . tokenStore . SaltID ( m . quitContext , token )
2017-07-18 16:02:03 +00:00
if err != nil {
return err
}
2018-03-08 19:21:11 +00:00
leaseSaltedID , err := m . tokenStore . SaltID ( m . quitContext , leaseID )
2017-07-18 16:02:03 +00:00
if err != nil {
return err
}
2015-04-10 21:48:08 +00:00
ent := logical . StorageEntry {
2017-07-18 16:02:03 +00:00
Key : saltedID + "/" + leaseSaltedID ,
2015-04-10 21:48:08 +00:00
Value : [ ] byte ( leaseID ) ,
}
2018-01-19 06:44:44 +00:00
if err := m . tokenView . Put ( m . quitContext , & ent ) ; err != nil {
2015-04-10 21:48:08 +00:00
return fmt . Errorf ( "failed to persist lease index entry: %v" , err )
}
return nil
}
2015-11-04 15:48:44 +00:00
// indexByToken looks up the secondary index from the token to a lease entry
func ( m * ExpirationManager ) indexByToken ( token , leaseID string ) ( * logical . StorageEntry , error ) {
2018-03-08 19:21:11 +00:00
saltedID , err := m . tokenStore . SaltID ( m . quitContext , token )
2017-07-18 16:02:03 +00:00
if err != nil {
return nil , err
}
2018-03-08 19:21:11 +00:00
leaseSaltedID , err := m . tokenStore . SaltID ( m . quitContext , leaseID )
2017-07-18 16:02:03 +00:00
if err != nil {
return nil , err
}
key := saltedID + "/" + leaseSaltedID
2018-01-19 06:44:44 +00:00
entry , err := m . tokenView . Get ( m . quitContext , key )
2015-11-04 15:48:44 +00:00
if err != nil {
return nil , fmt . Errorf ( "failed to look up secondary index entry" )
}
return entry , nil
}
2015-04-10 21:48:08 +00:00
// removeIndexByToken removes the secondary index from the token to a lease entry
func ( m * ExpirationManager ) removeIndexByToken ( token , leaseID string ) error {
2018-03-08 19:21:11 +00:00
saltedID , err := m . tokenStore . SaltID ( m . quitContext , token )
2017-07-18 16:02:03 +00:00
if err != nil {
return err
}
2018-03-08 19:21:11 +00:00
leaseSaltedID , err := m . tokenStore . SaltID ( m . quitContext , leaseID )
2017-07-18 16:02:03 +00:00
if err != nil {
return err
}
key := saltedID + "/" + leaseSaltedID
2018-01-19 06:44:44 +00:00
if err := m . tokenView . Delete ( m . quitContext , key ) ; err != nil {
2015-04-10 21:48:08 +00:00
return fmt . Errorf ( "failed to delete lease index entry: %v" , err )
}
return nil
}
// lookupByToken is used to lookup all the leaseID's via the
func ( m * ExpirationManager ) lookupByToken ( token string ) ( [ ] string , error ) {
2018-03-08 19:21:11 +00:00
saltedID , err := m . tokenStore . SaltID ( m . quitContext , token )
2017-07-18 16:02:03 +00:00
if err != nil {
return nil , err
}
2015-04-10 21:48:08 +00:00
// Scan via the index for sub-leases
2017-07-18 16:02:03 +00:00
prefix := saltedID + "/"
2018-01-19 06:44:44 +00:00
subKeys , err := m . tokenView . List ( m . quitContext , prefix )
2015-04-10 21:48:08 +00:00
if err != nil {
return nil , fmt . Errorf ( "failed to list leases: %v" , err )
}
// Read each index entry
leaseIDs := make ( [ ] string , 0 , len ( subKeys ) )
for _ , sub := range subKeys {
2018-01-19 06:44:44 +00:00
out , err := m . tokenView . Get ( m . quitContext , prefix + sub )
2015-04-10 21:48:08 +00:00
if err != nil {
return nil , fmt . Errorf ( "failed to read lease index: %v" , err )
}
if out == nil {
continue
}
leaseIDs = append ( leaseIDs , string ( out . Value ) )
}
return leaseIDs , nil
}
2015-04-08 23:43:17 +00:00
// emitMetrics is invoked periodically to emit statistics
func ( m * ExpirationManager ) emitMetrics ( ) {
2017-09-05 15:09:00 +00:00
m . pendingLock . RLock ( )
2015-04-08 23:43:17 +00:00
num := len ( m . pending )
2017-09-05 15:09:00 +00:00
m . pendingLock . RUnlock ( )
2015-04-08 23:43:17 +00:00
metrics . SetGauge ( [ ] string { "expire" , "num_leases" } , float32 ( num ) )
2018-02-14 14:22:46 +00:00
// Check if lease count is greater than the threshold
if num > maxLeaseThreshold {
if atomic . LoadUint32 ( & m . leaseCheckCounter ) > 59 {
m . logger . Warn ( "expiration: lease count exceeds warning lease threshold" )
atomic . StoreUint32 ( & m . leaseCheckCounter , 0 )
} else {
atomic . AddUint32 ( & m . leaseCheckCounter , 1 )
}
}
2015-04-08 23:43:17 +00:00
}
2015-03-13 17:55:54 +00:00
// leaseEntry is used to structure the values the expiration
// manager stores. This is used to handle renew and revocation.
type leaseEntry struct {
2016-01-04 21:43:07 +00:00
LeaseID string ` json:"lease_id" `
ClientToken string ` json:"client_token" `
Path string ` json:"path" `
Data map [ string ] interface { } ` json:"data" `
Secret * logical . Secret ` json:"secret" `
Auth * logical . Auth ` json:"auth" `
IssueTime time . Time ` json:"issue_time" `
ExpireTime time . Time ` json:"expire_time" `
LastRenewalTime time . Time ` json:"last_renewal_time" `
2015-03-13 17:55:54 +00:00
}
// encode is used to JSON encode the lease entry
2017-05-04 02:03:42 +00:00
func ( le * leaseEntry ) encode ( ) ( [ ] byte , error ) {
return json . Marshal ( le )
2015-03-13 17:55:54 +00:00
}
2017-05-04 02:03:42 +00:00
func ( le * leaseEntry ) renewable ( ) ( bool , error ) {
var err error
switch {
2015-04-09 21:23:37 +00:00
// If there is no entry, cannot review
2017-05-04 02:03:42 +00:00
case le == nil || le . ExpireTime . IsZero ( ) :
err = fmt . Errorf ( "lease not found or lease is not renewable" )
2015-04-09 21:23:37 +00:00
// Determine if the lease is expired
2017-05-04 02:03:42 +00:00
case le . ExpireTime . Before ( time . Now ( ) ) :
err = fmt . Errorf ( "lease expired" )
2015-04-09 21:23:37 +00:00
// Determine if the lease is renewable
2017-05-04 02:03:42 +00:00
case le . Secret != nil && ! le . Secret . Renewable :
err = fmt . Errorf ( "lease is not renewable" )
case le . Auth != nil && ! le . Auth . Renewable :
err = fmt . Errorf ( "lease is not renewable" )
2015-04-09 21:23:37 +00:00
}
2017-05-04 02:03:42 +00:00
if err != nil {
return false , err
2015-04-09 21:23:37 +00:00
}
2017-05-04 02:03:42 +00:00
return true , nil
}
func ( le * leaseEntry ) ttl ( ) int64 {
return int64 ( le . ExpireTime . Sub ( time . Now ( ) . Round ( time . Second ) ) . Seconds ( ) )
2015-04-09 21:23:37 +00:00
}
2015-03-13 17:55:54 +00:00
// decodeLeaseEntry is used to reverse encode and return a new entry
func decodeLeaseEntry ( buf [ ] byte ) ( * leaseEntry , error ) {
out := new ( leaseEntry )
2016-07-06 16:25:40 +00:00
return out , jsonutil . DecodeJSON ( buf , out )
2015-03-13 01:38:15 +00:00
}