open-vault/vault/auth.go

237 lines
6.2 KiB
Go
Raw Normal View History

2015-03-18 22:30:31 +00:00
package vault
import (
"encoding/json"
"errors"
"fmt"
"strings"
"github.com/hashicorp/vault/credential"
)
const (
// coreAuthConfigPath is used to store the auth configuration.
// Auth configuration is protected within the Vault itself, which means it
// can only be viewed or modified after an unseal.
coreAuthConfigPath = "core/auth"
// credentialBarrierPrefix is the prefix to the UUID used in the
// barrier view for the credential backends.
credentialBarrierPrefix = "auth/"
// credentialMountPrefix is the mount prefix used for the router
credentialMountPrefix = "auth/"
)
var (
// loadAuthFailed if loadCreddentials encounters an error
loadAuthFailed = errors.New("failed to setup auth table")
)
// enableCredential is used to enable a new credential backend
func (c *Core) enableCredential(entry *MountEntry) error {
c.auth.Lock()
defer c.auth.Unlock()
// Ensure there is a name
if entry.Path == "" {
return fmt.Errorf("backend path must be specified")
}
if strings.Contains(entry.Path, "/") {
return fmt.Errorf("backend path cannot have a forward slash")
}
// Look for matching name
for _, ent := range c.auth.Entries {
if ent.Path == entry.Path {
return fmt.Errorf("path already in use")
}
}
// Ensure the token backend is a singleton
if entry.Type == "token" {
return fmt.Errorf("token credential backend cannot be instantiated")
}
// Lookup the new backend
backend, err := c.newCredentialBackend(entry.Type, nil)
if err != nil {
return err
}
// Generate a new UUID and view
entry.UUID = generateUUID()
view := NewBarrierView(c.barrier, credentialBarrierPrefix+entry.UUID+"/")
// Update the auth table
newTable := c.auth.Clone()
newTable.Entries = append(newTable.Entries, entry)
if err := c.persistAuth(newTable); err != nil {
return errors.New("failed to update auth table")
}
c.auth = newTable
// Mount the backend
path := credentialMountPrefix + entry.Path + "/"
if err := c.router.Mount(backend, path, view); err != nil {
return err
}
c.logger.Printf("[INFO] core: enabled credential backend '%s' type: %s",
entry.Path, entry.Type)
return nil
}
// disableCredential is used to disable an existing credential backend
func (c *Core) disableCredential(path string) error {
c.auth.Lock()
defer c.auth.Unlock()
// Ensure the token backend is not affected
if path == "token" {
return fmt.Errorf("token credential backend cannot be disabled")
}
// Remove the entry from the mount table
found := false
newTable := c.auth.Clone()
n := len(newTable.Entries)
for i := 0; i < n; i++ {
if newTable.Entries[i].Path == path {
newTable.Entries[i], newTable.Entries[n-1] = newTable.Entries[n-1], nil
newTable.Entries = newTable.Entries[:n-1]
found = true
break
}
}
// Ensure there was a match
if !found {
return fmt.Errorf("no matching backend")
}
// Update the auth table
if err := c.persistAuth(newTable); err != nil {
return errors.New("failed to update auth table")
}
c.auth = newTable
// Unmount the backend
fullPath := credentialMountPrefix + path + "/"
if err := c.router.Unmount(fullPath); err != nil {
return err
}
c.logger.Printf("[INFO] core: disabled credential backend '%s'", path)
return nil
}
// loadCredentials is invoked as part of postUnseal to load the auth table
func (c *Core) loadCredentials() error {
// Load the existing mount table
raw, err := c.barrier.Get(coreAuthConfigPath)
if err != nil {
c.logger.Printf("[ERR] core: failed to read auth table: %v", err)
return loadAuthFailed
}
if raw != nil {
c.auth = &MountTable{}
if err := json.Unmarshal(raw.Value, c.auth); err != nil {
c.logger.Printf("[ERR] core: failed to decode auth table: %v", err)
return loadAuthFailed
}
}
// Done if we have restored the auth table
if c.auth != nil {
return nil
}
// Create and persist the default auth table
c.auth = defaultAuthTable()
if err := c.persistAuth(c.auth); err != nil {
return loadAuthFailed
}
return nil
}
// persistAuth is used to persist the auth table after modification
func (c *Core) persistAuth(table *MountTable) error {
// Marshal the table
raw, err := json.Marshal(table)
if err != nil {
c.logger.Printf("[ERR] core: failed to encode auth table: %v", err)
return err
}
// Create an entry
entry := &Entry{
Key: coreAuthConfigPath,
Value: raw,
}
// Write to the physical backend
if err := c.barrier.Put(entry); err != nil {
c.logger.Printf("[ERR] core: failed to persist auth table: %v", err)
return err
}
return nil
}
// setupCredentials is invoked after we've loaded the auth table to
2015-03-18 22:30:31 +00:00
// initialize the credential backends and setup the router
func (c *Core) setupCredentials() error {
var backend credential.Backend
var view *BarrierView
var err error
for _, entry := range c.auth.Entries {
// Initialize the backend
backend, err = c.newCredentialBackend(entry.Type, nil)
if err != nil {
c.logger.Printf(
"[ERR] core: failed to create credential entry %#v: %v",
entry, err)
return loadAuthFailed
}
// Create a barrier view using the UUID
view = NewBarrierView(c.barrier, credentialBarrierPrefix+entry.UUID+"/")
// Mount the backend
path := credentialMountPrefix + entry.Path + "/"
2015-03-18 22:48:14 +00:00
err = c.router.Mount(backend, path, view)
if err != nil {
c.logger.Printf("[ERR] core: failed to mount auth entry %#v: %v", entry, err)
return loadAuthFailed
}
}
2015-03-18 22:30:31 +00:00
return nil
}
// teardownCredentials is used before we seal the vault to reset the credential
// backends to their unloaded state. This is reversed by loadCredentials.
func (c *Core) teardownCredentials() error {
c.auth = nil
2015-03-18 22:30:31 +00:00
return nil
}
// newCredentialBackend is used to create and configure a new credential backend by name
func (c *Core) newCredentialBackend(t string, conf map[string]string) (credential.Backend, error) {
f, ok := c.credentialBackends[t]
if !ok {
return nil, fmt.Errorf("unknown backend type: %s", t)
}
return f(conf)
}
// defaultAuthTable creates a default auth table
func defaultAuthTable() *MountTable {
table := &MountTable{}
tokenAuth := &MountEntry{
Path: "token",
Type: "token",
Description: "token based credentials",
UUID: generateUUID(),
}
table.Entries = append(table.Entries, tokenAuth)
return table
}