2017-04-04 00:52:29 +00:00
|
|
|
package vault
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"path/filepath"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
|
|
|
|
"github.com/hashicorp/vault/helper/jsonutil"
|
|
|
|
"github.com/hashicorp/vault/helper/pluginutil"
|
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
pluginCatalogPrefix = "plugin-catalog/"
|
|
|
|
)
|
|
|
|
|
|
|
|
type PluginCatalog struct {
|
2017-04-04 21:43:39 +00:00
|
|
|
catalogView *BarrierView
|
|
|
|
directory string
|
|
|
|
vaultCommand string
|
|
|
|
vaultSHA256 []byte
|
2017-04-04 00:52:29 +00:00
|
|
|
|
2017-04-05 00:12:02 +00:00
|
|
|
lock sync.RWMutex
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Core) setupPluginCatalog() error {
|
2017-04-04 21:43:39 +00:00
|
|
|
c.pluginCatalog = &PluginCatalog{
|
|
|
|
catalogView: c.systemBarrierView.SubView(pluginCatalogPrefix),
|
|
|
|
directory: c.pluginDirectory,
|
|
|
|
vaultCommand: c.vaultBinaryLocation,
|
|
|
|
vaultSHA256: c.vaultBinarySHA256,
|
|
|
|
}
|
2017-04-04 00:52:29 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PluginCatalog) Get(name string) (*pluginutil.PluginRunner, error) {
|
2017-04-04 21:43:39 +00:00
|
|
|
// Look for external plugins in the barrier
|
2017-04-04 00:52:29 +00:00
|
|
|
out, err := c.catalogView.Get(name)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to retrieve plugin \"%s\": %v", name, err)
|
|
|
|
}
|
2017-04-04 21:43:39 +00:00
|
|
|
if out != nil {
|
|
|
|
entry := new(pluginutil.PluginRunner)
|
|
|
|
if err := jsonutil.DecodeJSON(out.Value, entry); err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decode plugin entry: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return entry, nil
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
|
2017-04-04 21:43:39 +00:00
|
|
|
// Look for builtin plugins
|
2017-04-05 18:00:13 +00:00
|
|
|
if _, ok := pluginutil.BuiltinPlugins[name]; !ok {
|
2017-04-04 21:43:39 +00:00
|
|
|
return nil, fmt.Errorf("no plugin found with name: %s", name)
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
|
2017-04-04 21:43:39 +00:00
|
|
|
return &pluginutil.PluginRunner{
|
|
|
|
Name: name,
|
|
|
|
Command: c.vaultCommand,
|
|
|
|
Args: []string{"plugin-exec", name},
|
|
|
|
Sha256: c.vaultSHA256,
|
|
|
|
}, nil
|
2017-04-04 00:52:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PluginCatalog) Set(name, command string, sha256 []byte) error {
|
|
|
|
parts := strings.Split(command, " ")
|
|
|
|
command = parts[0]
|
|
|
|
args := parts[1:]
|
|
|
|
|
|
|
|
command = filepath.Join(c.directory, command)
|
|
|
|
|
|
|
|
// Best effort check to make sure the command isn't breaking out of the
|
|
|
|
// configured plugin directory.
|
|
|
|
sym, err := filepath.EvalSymlinks(command)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error while validating the command path: %v", err)
|
|
|
|
}
|
|
|
|
symAbs, err := filepath.Abs(filepath.Dir(sym))
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error while validating the command path: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if symAbs != c.directory {
|
|
|
|
return errors.New("can not execute files outside of configured plugin directory")
|
|
|
|
}
|
|
|
|
|
|
|
|
entry := &pluginutil.PluginRunner{
|
|
|
|
Name: name,
|
|
|
|
Command: command,
|
|
|
|
Args: args,
|
|
|
|
Sha256: sha256,
|
|
|
|
}
|
|
|
|
|
|
|
|
buf, err := json.Marshal(entry)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to encode plugin entry: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
logicalEntry := logical.StorageEntry{
|
|
|
|
Key: name,
|
|
|
|
Value: buf,
|
|
|
|
}
|
|
|
|
if err := c.catalogView.Put(&logicalEntry); err != nil {
|
|
|
|
return fmt.Errorf("failed to persist plugin entry: %v", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|