2016-05-30 18:30:01 +00:00
package approle
import (
"crypto/hmac"
"crypto/sha256"
"encoding/hex"
"fmt"
"strings"
"time"
"github.com/hashicorp/go-uuid"
2016-09-21 23:41:08 +00:00
"github.com/hashicorp/vault/helper/cidrutil"
2017-03-07 16:21:32 +00:00
"github.com/hashicorp/vault/helper/locksutil"
2016-09-21 23:41:08 +00:00
"github.com/hashicorp/vault/helper/strutil"
2016-05-30 18:30:01 +00:00
"github.com/hashicorp/vault/logical"
"github.com/hashicorp/vault/logical/framework"
)
// secretIDStorageEntry represents the information stored in storage
// when a SecretID is created. The structure of the SecretID storage
// entry is the same for all the types of SecretIDs generated.
type secretIDStorageEntry struct {
// Accessor for the SecretID. It is a random UUID serving as
// a secondary index for the SecretID. This uniquely identifies
// the SecretID it belongs to, and hence can be used for listing
// and deleting SecretIDs. Accessors cannot be used as valid
// SecretIDs during login.
SecretIDAccessor string ` json:"secret_id_accessor" structs:"secret_id_accessor" mapstructure:"secret_id_accessor" `
2016-09-21 23:41:08 +00:00
// Number of times this SecretID can be used to perform the login
// operation
2016-09-27 14:26:52 +00:00
SecretIDNumUses int ` json:"secret_id_num_uses" structs:"secret_id_num_uses" mapstructure:"secret_id_num_uses" `
2016-05-30 18:30:01 +00:00
2017-04-04 16:29:18 +00:00
// Duration after which this SecretID should expire. This is capped by
2016-09-21 23:41:08 +00:00
// the backend mount's max TTL value.
2016-05-30 18:30:01 +00:00
SecretIDTTL time . Duration ` json:"secret_id_ttl" structs:"secret_id_ttl" mapstructure:"secret_id_ttl" `
// The time when the SecretID was created
CreationTime time . Time ` json:"creation_time" structs:"creation_time" mapstructure:"creation_time" `
2016-09-21 23:41:08 +00:00
// The time when the SecretID becomes eligible for tidy operation.
// Tidying is performed by the PeriodicFunc of the backend which is 1
// minute apart.
2016-05-30 18:30:01 +00:00
ExpirationTime time . Time ` json:"expiration_time" structs:"expiration_time" mapstructure:"expiration_time" `
// The time representing the last time this storage entry was modified
LastUpdatedTime time . Time ` json:"last_updated_time" structs:"last_updated_time" mapstructure:"last_updated_time" `
2016-09-21 23:41:08 +00:00
// Metadata that belongs to the SecretID
2016-05-30 18:30:01 +00:00
Metadata map [ string ] string ` json:"metadata" structs:"metadata" mapstructure:"metadata" `
2016-09-21 23:41:08 +00:00
// CIDRList is a set of CIDR blocks that impose source address
// restrictions on the usage of SecretID
CIDRList [ ] string ` json:"cidr_list" structs:"cidr_list" mapstructure:"cidr_list" `
2016-09-28 16:01:16 +00:00
// This is a deprecated field
SecretIDNumUsesDeprecated int ` json:"SecretIDNumUses" structs:"SecretIDNumUses" mapstructure:"SecretIDNumUses" `
2016-05-30 18:30:01 +00:00
}
2016-09-21 23:41:08 +00:00
// Represents the payload of the storage entry of the accessor that maps to a
// unique SecretID. Note that SecretIDs should never be stored in plaintext
// anywhere in the backend. SecretIDHMAC will be used as an index to fetch the
// properties of the SecretID and to delete the SecretID.
2016-05-30 18:30:01 +00:00
type secretIDAccessorStorageEntry struct {
// Hash of the SecretID which can be used to find the storage index at which
// properties of SecretID is stored.
SecretIDHMAC string ` json:"secret_id_hmac" structs:"secret_id_hmac" mapstructure:"secret_id_hmac" `
}
// Checks if the Role represented by the RoleID still exists
func ( b * backend ) validateRoleID ( s logical . Storage , roleID string ) ( * roleStorageEntry , string , error ) {
// Look for the storage entry that maps the roleID to role
roleIDIndex , err := b . roleIDEntry ( s , roleID )
if err != nil {
return nil , "" , err
}
if roleIDIndex == nil {
2016-09-28 16:01:16 +00:00
return nil , "" , fmt . Errorf ( "failed to find secondary index for role_id %q\n" , roleID )
2016-05-30 18:30:01 +00:00
}
role , err := b . roleEntry ( s , roleIDIndex . Name )
if err != nil {
return nil , "" , err
}
if role == nil {
2016-09-28 16:01:16 +00:00
return nil , "" , fmt . Errorf ( "role %q referred by the SecretID does not exist" , roleIDIndex . Name )
2016-05-30 18:30:01 +00:00
}
return role , roleIDIndex . Name , nil
}
// Validates the supplied RoleID and SecretID
2016-09-26 13:53:24 +00:00
func ( b * backend ) validateCredentials ( req * logical . Request , data * framework . FieldData ) ( * roleStorageEntry , string , map [ string ] string , error ) {
2017-07-28 11:18:26 +00:00
metadata := make ( map [ string ] string )
2016-05-30 18:30:01 +00:00
// RoleID must be supplied during every login
roleID := strings . TrimSpace ( data . Get ( "role_id" ) . ( string ) )
if roleID == "" {
return nil , "" , metadata , fmt . Errorf ( "missing role_id" )
}
// Validate the RoleID and get the Role entry
role , roleName , err := b . validateRoleID ( req . Storage , roleID )
if err != nil {
return nil , "" , metadata , err
}
if role == nil || roleName == "" {
return nil , "" , metadata , fmt . Errorf ( "failed to validate role_id" )
}
// Calculate the TTL boundaries since this reflects the properties of the token issued
if role . TokenTTL , role . TokenMaxTTL , err = b . SanitizeTTL ( role . TokenTTL , role . TokenMaxTTL ) ; err != nil {
return nil , "" , metadata , err
}
if role . BindSecretID {
// If 'bind_secret_id' was set on role, look for the field 'secret_id'
// to be specified and validate it.
secretID := strings . TrimSpace ( data . Get ( "secret_id" ) . ( string ) )
if secretID == "" {
return nil , "" , metadata , fmt . Errorf ( "missing secret_id" )
}
// Check if the SecretID supplied is valid. If use limit was specified
// on the SecretID, it will be decremented in this call.
var valid bool
2016-09-26 13:53:24 +00:00
valid , metadata , err = b . validateBindSecretID ( req , roleName , secretID , role . HMACKey , role . BoundCIDRList )
2016-05-30 18:30:01 +00:00
if err != nil {
return nil , "" , metadata , err
}
if ! valid {
2016-09-28 16:01:16 +00:00
return nil , "" , metadata , fmt . Errorf ( "invalid secret_id %q" , secretID )
2016-05-30 18:30:01 +00:00
}
}
if role . BoundCIDRList != "" {
// If 'bound_cidr_list' was set, verify the CIDR restrictions
2016-09-26 13:53:24 +00:00
if req . Connection == nil || req . Connection . RemoteAddr == "" {
return nil , "" , metadata , fmt . Errorf ( "failed to get connection information" )
}
belongs , err := cidrutil . IPBelongsToCIDRBlocksString ( req . Connection . RemoteAddr , role . BoundCIDRList , "," )
2016-09-21 23:41:08 +00:00
if err != nil {
return nil , "" , metadata , fmt . Errorf ( "failed to verify the CIDR restrictions set on the role: %v" , err )
}
if ! belongs {
2017-02-16 05:51:02 +00:00
return nil , "" , metadata , fmt . Errorf ( "source address %q unauthorized through CIDR restrictions on the role" , req . Connection . RemoteAddr )
2016-05-30 18:30:01 +00:00
}
}
return role , roleName , metadata , nil
}
// validateBindSecretID is used to determine if the given SecretID is a valid one.
2016-09-26 13:53:24 +00:00
func ( b * backend ) validateBindSecretID ( req * logical . Request , roleName , secretID ,
hmacKey , roleBoundCIDRList string ) ( bool , map [ string ] string , error ) {
2016-05-30 18:30:01 +00:00
secretIDHMAC , err := createHMAC ( hmacKey , secretID )
if err != nil {
2016-09-28 16:01:16 +00:00
return false , nil , fmt . Errorf ( "failed to create HMAC of secret_id: %v" , err )
2016-05-30 18:30:01 +00:00
}
roleNameHMAC , err := createHMAC ( hmacKey , roleName )
if err != nil {
2016-09-28 16:01:16 +00:00
return false , nil , fmt . Errorf ( "failed to create HMAC of role_name: %v" , err )
2016-05-30 18:30:01 +00:00
}
entryIndex := fmt . Sprintf ( "secret_id/%s/%s" , roleNameHMAC , secretIDHMAC )
// SecretID locks are always index based on secretIDHMACs. This helps
// acquiring the locks when the SecretIDs are listed. This allows grabbing
// the correct locks even if the SecretIDs are not known in plaintext.
lock := b . secretIDLock ( secretIDHMAC )
lock . RLock ( )
2016-09-28 16:01:16 +00:00
result , err := b . nonLockedSecretIDStorageEntry ( req . Storage , roleNameHMAC , secretIDHMAC )
if err != nil {
2016-05-30 18:30:01 +00:00
lock . RUnlock ( )
return false , nil , err
2016-09-28 16:01:16 +00:00
} else if result == nil {
2016-05-30 18:30:01 +00:00
lock . RUnlock ( )
return false , nil , nil
}
// SecretIDNumUses will be zero only if the usage limit was not set at all,
// in which case, the SecretID will remain to be valid as long as it is not
// expired.
if result . SecretIDNumUses == 0 {
2016-09-21 23:41:08 +00:00
// Ensure that the CIDRs on the secret ID are still a subset of that of
// role's
if err := verifyCIDRRoleSecretIDSubset ( result . CIDRList ,
roleBoundCIDRList ) ; err != nil {
return false , nil , err
}
// If CIDR restrictions are present on the secret ID, check if the
// source IP complies to it
if len ( result . CIDRList ) != 0 {
2016-09-26 13:53:24 +00:00
if req . Connection == nil || req . Connection . RemoteAddr == "" {
return false , nil , fmt . Errorf ( "failed to get connection information" )
}
if belongs , err := cidrutil . IPBelongsToCIDRBlocksSlice ( req . Connection . RemoteAddr , result . CIDRList ) ; ! belongs || err != nil {
2017-02-16 05:51:02 +00:00
return false , nil , fmt . Errorf ( "source address %q unauthorized through CIDR restrictions on the secret ID: %v" , req . Connection . RemoteAddr , err )
2016-09-21 23:41:08 +00:00
}
}
2016-05-30 18:30:01 +00:00
lock . RUnlock ( )
return true , result . Metadata , nil
}
// If the SecretIDNumUses is non-zero, it means that its use-count should be updated
// in the storage. Switch the lock from a `read` to a `write` and update
// the storage entry.
lock . RUnlock ( )
lock . Lock ( )
defer lock . Unlock ( )
// Lock switching may change the data. Refresh the contents.
2016-09-28 16:01:16 +00:00
result , err = b . nonLockedSecretIDStorageEntry ( req . Storage , roleNameHMAC , secretIDHMAC )
if err != nil {
2016-05-30 18:30:01 +00:00
return false , nil , err
2016-09-28 16:01:16 +00:00
}
if result == nil {
2016-05-30 18:30:01 +00:00
return false , nil , nil
}
// If there exists a single use left, delete the SecretID entry from
// the storage but do not fail the validation request. Subsequest
// requests to use the same SecretID will fail.
if result . SecretIDNumUses == 1 {
2016-09-15 21:49:14 +00:00
// Delete the secret IDs accessor first
2016-09-26 13:53:24 +00:00
if err := b . deleteSecretIDAccessorEntry ( req . Storage , result . SecretIDAccessor ) ; err != nil {
2016-09-15 21:49:14 +00:00
return false , nil , err
2016-05-30 18:30:01 +00:00
}
2016-09-26 13:53:24 +00:00
if err := req . Storage . Delete ( entryIndex ) ; err != nil {
2016-09-28 16:01:16 +00:00
return false , nil , fmt . Errorf ( "failed to delete secret ID: %v" , err )
2016-05-30 18:30:01 +00:00
}
} else {
// If the use count is greater than one, decrement it and update the last updated time.
result . SecretIDNumUses -= 1
result . LastUpdatedTime = time . Now ( )
if entry , err := logical . StorageEntryJSON ( entryIndex , & result ) ; err != nil {
2016-09-28 16:01:16 +00:00
return false , nil , fmt . Errorf ( "failed to decrement the use count for secret ID %q" , secretID )
2016-09-26 13:53:24 +00:00
} else if err = req . Storage . Put ( entry ) ; err != nil {
2016-09-28 16:01:16 +00:00
return false , nil , fmt . Errorf ( "failed to decrement the use count for secret ID %q" , secretID )
2016-05-30 18:30:01 +00:00
}
}
2016-09-21 23:41:08 +00:00
// Ensure that the CIDRs on the secret ID are still a subset of that of
// role's
if err := verifyCIDRRoleSecretIDSubset ( result . CIDRList ,
roleBoundCIDRList ) ; err != nil {
return false , nil , err
}
// If CIDR restrictions are present on the secret ID, check if the
// source IP complies to it
if len ( result . CIDRList ) != 0 {
2016-09-26 13:53:24 +00:00
if req . Connection == nil || req . Connection . RemoteAddr == "" {
return false , nil , fmt . Errorf ( "failed to get connection information" )
}
if belongs , err := cidrutil . IPBelongsToCIDRBlocksSlice ( req . Connection . RemoteAddr , result . CIDRList ) ; ! belongs || err != nil {
2017-02-16 05:51:02 +00:00
return false , nil , fmt . Errorf ( "source address %q unauthorized through CIDR restrictions on the secret ID: %v" , req . Connection . RemoteAddr , err )
2016-09-21 23:41:08 +00:00
}
}
2016-05-30 18:30:01 +00:00
return true , result . Metadata , nil
}
2016-09-21 23:41:08 +00:00
// verifyCIDRRoleSecretIDSubset checks if the CIDR blocks set on the secret ID
// are a subset of CIDR blocks set on the role
func verifyCIDRRoleSecretIDSubset ( secretIDCIDRs [ ] string , roleBoundCIDRList string ) error {
if len ( secretIDCIDRs ) != 0 {
// Parse the CIDRs on role as a slice
2017-04-19 14:39:07 +00:00
roleCIDRs := strutil . ParseDedupLowercaseAndSortStrings ( roleBoundCIDRList , "," )
2016-09-21 23:41:08 +00:00
// If there are no CIDR blocks on the role, then the subset
// requirement would be satisfied
if len ( roleCIDRs ) != 0 {
subset , err := cidrutil . SubsetBlocks ( roleCIDRs , secretIDCIDRs )
if ! subset || err != nil {
return fmt . Errorf ( "failed to verify subset relationship between CIDR blocks on the role %q and CIDR blocks on the secret ID %q: %v" , roleCIDRs , secretIDCIDRs , err )
}
}
}
return nil
}
2016-09-15 21:49:14 +00:00
// Creates a SHA256 HMAC of the given 'value' using the given 'key' and returns
// a hex encoded string.
2016-05-30 18:30:01 +00:00
func createHMAC ( key , value string ) ( string , error ) {
if key == "" {
return "" , fmt . Errorf ( "invalid HMAC key" )
}
hm := hmac . New ( sha256 . New , [ ] byte ( key ) )
hm . Write ( [ ] byte ( value ) )
return hex . EncodeToString ( hm . Sum ( nil ) ) , nil
}
2017-03-07 16:21:32 +00:00
func ( b * backend ) secretIDLock ( secretIDHMAC string ) * locksutil . LockEntry {
return locksutil . LockForKey ( b . secretIDLocks , secretIDHMAC )
2016-05-30 18:30:01 +00:00
}
2017-03-07 16:21:32 +00:00
func ( b * backend ) secretIDAccessorLock ( secretIDAccessor string ) * locksutil . LockEntry {
return locksutil . LockForKey ( b . secretIDAccessorLocks , secretIDAccessor )
2016-09-15 21:49:14 +00:00
}
2016-09-28 16:01:16 +00:00
// nonLockedSecretIDStorageEntry fetches the secret ID properties from physical
// storage. The entry will be indexed based on the given HMACs of both role
// name and the secret ID. This method will not acquire secret ID lock to fetch
// the storage entry. Locks need to be acquired before calling this method.
func ( b * backend ) nonLockedSecretIDStorageEntry ( s logical . Storage , roleNameHMAC , secretIDHMAC string ) ( * secretIDStorageEntry , error ) {
if secretIDHMAC == "" {
return nil , fmt . Errorf ( "missing secret ID HMAC" )
}
if roleNameHMAC == "" {
return nil , fmt . Errorf ( "missing role name HMAC" )
}
// Prepare the storage index at which the secret ID will be stored
entryIndex := fmt . Sprintf ( "secret_id/%s/%s" , roleNameHMAC , secretIDHMAC )
entry , err := s . Get ( entryIndex )
if err != nil {
return nil , err
}
if entry == nil {
return nil , nil
}
result := secretIDStorageEntry { }
if err := entry . DecodeJSON ( & result ) ; err != nil {
return nil , err
}
2016-09-28 22:17:13 +00:00
// TODO: Remove this upgrade bit in future releases
2016-09-28 16:01:16 +00:00
persistNeeded := false
if result . SecretIDNumUsesDeprecated != 0 {
if result . SecretIDNumUses == 0 ||
result . SecretIDNumUsesDeprecated < result . SecretIDNumUses {
result . SecretIDNumUses = result . SecretIDNumUsesDeprecated
2016-09-28 19:24:19 +00:00
persistNeeded = true
}
if result . SecretIDNumUses < result . SecretIDNumUsesDeprecated {
result . SecretIDNumUsesDeprecated = result . SecretIDNumUses
persistNeeded = true
2016-09-28 16:01:16 +00:00
}
}
if persistNeeded {
if err := b . nonLockedSetSecretIDStorageEntry ( s , roleNameHMAC , secretIDHMAC , & result ) ; err != nil {
2017-05-02 03:34:10 +00:00
return nil , fmt . Errorf ( "failed to upgrade role storage entry %s" , err )
2016-09-28 16:01:16 +00:00
}
}
return & result , nil
}
// nonLockedSetSecretIDStorageEntry creates or updates a secret ID entry at the
// physical storage. The entry will be indexed based on the given HMACs of both
// role name and the secret ID. This method will not acquire secret ID lock to
// create/update the storage entry. Locks need to be acquired before calling
// this method.
func ( b * backend ) nonLockedSetSecretIDStorageEntry ( s logical . Storage , roleNameHMAC , secretIDHMAC string , secretEntry * secretIDStorageEntry ) error {
if secretIDHMAC == "" {
return fmt . Errorf ( "missing secret ID HMAC" )
}
if roleNameHMAC == "" {
return fmt . Errorf ( "missing role name HMAC" )
}
if secretEntry == nil {
return fmt . Errorf ( "nil secret entry" )
}
entryIndex := fmt . Sprintf ( "secret_id/%s/%s" , roleNameHMAC , secretIDHMAC )
if entry , err := logical . StorageEntryJSON ( entryIndex , secretEntry ) ; err != nil {
return err
} else if err = s . Put ( entry ) ; err != nil {
return err
}
return nil
}
2016-05-30 18:30:01 +00:00
// registerSecretIDEntry creates a new storage entry for the given SecretID.
func ( b * backend ) registerSecretIDEntry ( s logical . Storage , roleName , secretID , hmacKey string , secretEntry * secretIDStorageEntry ) ( * secretIDStorageEntry , error ) {
secretIDHMAC , err := createHMAC ( hmacKey , secretID )
if err != nil {
2016-09-28 16:01:16 +00:00
return nil , fmt . Errorf ( "failed to create HMAC of secret ID: %v" , err )
2016-05-30 18:30:01 +00:00
}
roleNameHMAC , err := createHMAC ( hmacKey , roleName )
if err != nil {
2016-09-28 16:01:16 +00:00
return nil , fmt . Errorf ( "failed to create HMAC of role_name: %v" , err )
2016-05-30 18:30:01 +00:00
}
lock := b . secretIDLock ( secretIDHMAC )
lock . RLock ( )
2016-09-28 16:01:16 +00:00
entry , err := b . nonLockedSecretIDStorageEntry ( s , roleNameHMAC , secretIDHMAC )
2016-05-30 18:30:01 +00:00
if err != nil {
lock . RUnlock ( )
return nil , err
}
if entry != nil {
lock . RUnlock ( )
return nil , fmt . Errorf ( "SecretID is already registered" )
}
// If there isn't an entry for the secretID already, switch the read lock
// with a write lock and create an entry.
lock . RUnlock ( )
lock . Lock ( )
defer lock . Unlock ( )
// But before saving a new entry, check if the secretID entry was created during the lock switch.
2016-09-28 16:01:16 +00:00
entry , err = b . nonLockedSecretIDStorageEntry ( s , roleNameHMAC , secretIDHMAC )
2016-05-30 18:30:01 +00:00
if err != nil {
return nil , err
}
if entry != nil {
return nil , fmt . Errorf ( "SecretID is already registered" )
}
2016-09-28 16:01:16 +00:00
//
2016-05-30 18:30:01 +00:00
// Create a new entry for the SecretID
2016-09-28 16:01:16 +00:00
//
2016-05-30 18:30:01 +00:00
// Set the creation time for the SecretID
currentTime := time . Now ( )
secretEntry . CreationTime = currentTime
secretEntry . LastUpdatedTime = currentTime
// If SecretIDTTL is not specified or if it crosses the backend mount's limit,
// cap the expiration to backend's max. Otherwise, use it to determine the
// expiration time.
if secretEntry . SecretIDTTL < time . Duration ( 0 ) || secretEntry . SecretIDTTL > b . System ( ) . MaxLeaseTTL ( ) {
secretEntry . ExpirationTime = currentTime . Add ( b . System ( ) . MaxLeaseTTL ( ) )
} else if secretEntry . SecretIDTTL != time . Duration ( 0 ) {
// Set the ExpirationTime only if SecretIDTTL was set. SecretIDs should not
// expire by default.
secretEntry . ExpirationTime = currentTime . Add ( secretEntry . SecretIDTTL )
}
// Before storing the SecretID, store its accessor.
2016-09-15 21:49:14 +00:00
if err := b . createSecretIDAccessorEntry ( s , secretEntry , secretIDHMAC ) ; err != nil {
2016-05-30 18:30:01 +00:00
return nil , err
}
2016-09-28 16:01:16 +00:00
if err := b . nonLockedSetSecretIDStorageEntry ( s , roleNameHMAC , secretIDHMAC , secretEntry ) ; err != nil {
2016-05-30 18:30:01 +00:00
return nil , err
}
return secretEntry , nil
}
// secretIDAccessorEntry is used to read the storage entry that maps an
2016-09-15 21:49:14 +00:00
// accessor to a secret_id.
2016-05-30 18:30:01 +00:00
func ( b * backend ) secretIDAccessorEntry ( s logical . Storage , secretIDAccessor string ) ( * secretIDAccessorStorageEntry , error ) {
if secretIDAccessor == "" {
return nil , fmt . Errorf ( "missing secretIDAccessor" )
}
var result secretIDAccessorStorageEntry
// Create index entry, mapping the accessor to the token ID
2017-05-09 21:51:09 +00:00
salt , err := b . Salt ( )
if err != nil {
return nil , err
}
entryIndex := "accessor/" + salt . SaltID ( secretIDAccessor )
2016-05-30 18:30:01 +00:00
2016-09-15 21:49:14 +00:00
accessorLock := b . secretIDAccessorLock ( secretIDAccessor )
accessorLock . RLock ( )
defer accessorLock . RUnlock ( )
2016-05-30 18:30:01 +00:00
if entry , err := s . Get ( entryIndex ) ; err != nil {
return nil , err
} else if entry == nil {
return nil , nil
} else if err := entry . DecodeJSON ( & result ) ; err != nil {
return nil , err
}
return & result , nil
}
2016-09-15 21:49:14 +00:00
// createSecretIDAccessorEntry creates an identifier for the SecretID. A storage index,
2016-05-30 18:30:01 +00:00
// mapping the accessor to the SecretID is also created. This method should
// be called when the lock for the corresponding SecretID is held.
2016-09-15 21:49:14 +00:00
func ( b * backend ) createSecretIDAccessorEntry ( s logical . Storage , entry * secretIDStorageEntry , secretIDHMAC string ) error {
2016-05-30 18:30:01 +00:00
// Create a random accessor
accessorUUID , err := uuid . GenerateUUID ( )
if err != nil {
return err
}
entry . SecretIDAccessor = accessorUUID
// Create index entry, mapping the accessor to the token ID
2017-05-09 21:51:09 +00:00
salt , err := b . Salt ( )
if err != nil {
return err
}
entryIndex := "accessor/" + salt . SaltID ( entry . SecretIDAccessor )
2016-09-15 21:49:14 +00:00
accessorLock := b . secretIDAccessorLock ( accessorUUID )
accessorLock . Lock ( )
defer accessorLock . Unlock ( )
2016-05-30 18:30:01 +00:00
if entry , err := logical . StorageEntryJSON ( entryIndex , & secretIDAccessorStorageEntry {
SecretIDHMAC : secretIDHMAC ,
} ) ; err != nil {
return err
} else if err = s . Put ( entry ) ; err != nil {
2016-09-28 16:01:16 +00:00
return fmt . Errorf ( "failed to persist accessor index entry: %v" , err )
2016-05-30 18:30:01 +00:00
}
return nil
}
2016-09-15 21:49:14 +00:00
// deleteSecretIDAccessorEntry deletes the storage index mapping the accessor to a SecretID.
func ( b * backend ) deleteSecretIDAccessorEntry ( s logical . Storage , secretIDAccessor string ) error {
2017-05-09 21:51:09 +00:00
salt , err := b . Salt ( )
if err != nil {
return err
}
accessorEntryIndex := "accessor/" + salt . SaltID ( secretIDAccessor )
2016-09-15 21:49:14 +00:00
accessorLock := b . secretIDAccessorLock ( secretIDAccessor )
accessorLock . Lock ( )
defer accessorLock . Unlock ( )
// Delete the accessor of the SecretID first
if err := s . Delete ( accessorEntryIndex ) ; err != nil {
2016-09-28 16:01:16 +00:00
return fmt . Errorf ( "failed to delete accessor storage entry: %v" , err )
2016-09-15 21:49:14 +00:00
}
return nil
}
2016-05-30 18:30:01 +00:00
// flushRoleSecrets deletes all the SecretIDs that belong to the given
// RoleID.
func ( b * backend ) flushRoleSecrets ( s logical . Storage , roleName , hmacKey string ) error {
roleNameHMAC , err := createHMAC ( hmacKey , roleName )
if err != nil {
2016-09-28 16:01:16 +00:00
return fmt . Errorf ( "failed to create HMAC of role_name: %v" , err )
2016-05-30 18:30:01 +00:00
}
// Acquire the custom lock to perform listing of SecretIDs
2017-02-01 23:13:49 +00:00
b . secretIDListingLock . RLock ( )
defer b . secretIDListingLock . RUnlock ( )
2016-05-30 18:30:01 +00:00
secretIDHMACs , err := s . List ( fmt . Sprintf ( "secret_id/%s/" , roleNameHMAC ) )
if err != nil {
return err
}
for _ , secretIDHMAC := range secretIDHMACs {
// Acquire the lock belonging to the SecretID
lock := b . secretIDLock ( secretIDHMAC )
lock . Lock ( )
entryIndex := fmt . Sprintf ( "secret_id/%s/%s" , roleNameHMAC , secretIDHMAC )
if err := s . Delete ( entryIndex ) ; err != nil {
lock . Unlock ( )
2016-09-28 16:01:16 +00:00
return fmt . Errorf ( "error deleting SecretID %q from storage: %v" , secretIDHMAC , err )
2016-05-30 18:30:01 +00:00
}
lock . Unlock ( )
}
return nil
}