2015-04-05 01:07:53 +00:00
|
|
|
package file
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"os"
|
2015-04-27 19:40:32 +00:00
|
|
|
"path/filepath"
|
2015-04-27 21:28:02 +00:00
|
|
|
"strconv"
|
2015-04-05 01:07:53 +00:00
|
|
|
"sync"
|
|
|
|
|
|
|
|
"github.com/hashicorp/vault/audit"
|
2015-09-18 16:18:37 +00:00
|
|
|
"github.com/hashicorp/vault/helper/salt"
|
2015-04-05 01:07:53 +00:00
|
|
|
"github.com/hashicorp/vault/logical"
|
2015-04-27 21:28:02 +00:00
|
|
|
"github.com/mitchellh/copystructure"
|
2015-04-05 01:07:53 +00:00
|
|
|
)
|
|
|
|
|
2015-09-18 21:36:42 +00:00
|
|
|
func Factory(conf *audit.BackendConfig) (audit.Backend, error) {
|
2015-09-18 16:18:37 +00:00
|
|
|
if conf.Salt == nil {
|
2016-03-12 00:28:06 +00:00
|
|
|
return nil, fmt.Errorf("nil salt")
|
2015-09-18 16:18:37 +00:00
|
|
|
}
|
|
|
|
|
2016-03-14 21:15:07 +00:00
|
|
|
path, ok := conf.Config["file_path"]
|
2015-04-05 01:07:53 +00:00
|
|
|
if !ok {
|
2016-03-16 00:05:51 +00:00
|
|
|
path, ok = conf.Config["path"]
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("file_path is required")
|
|
|
|
}
|
2015-04-05 01:07:53 +00:00
|
|
|
}
|
|
|
|
|
2016-03-12 00:28:06 +00:00
|
|
|
// Check if hashing of accessor is disabled
|
2016-03-14 18:52:29 +00:00
|
|
|
hmacAccessor := true
|
|
|
|
if hmacAccessorRaw, ok := conf.Config["hmac_accessor"]; ok {
|
|
|
|
value, err := strconv.ParseBool(hmacAccessorRaw)
|
2016-03-12 00:28:06 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-03-14 18:52:29 +00:00
|
|
|
hmacAccessor = value
|
2016-03-12 00:28:06 +00:00
|
|
|
}
|
|
|
|
|
2015-04-27 21:28:02 +00:00
|
|
|
// Check if raw logging is enabled
|
|
|
|
logRaw := false
|
2015-09-18 16:18:37 +00:00
|
|
|
if raw, ok := conf.Config["log_raw"]; ok {
|
2015-04-27 21:28:02 +00:00
|
|
|
b, err := strconv.ParseBool(raw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
logRaw = b
|
|
|
|
}
|
|
|
|
|
|
|
|
b := &Backend{
|
2016-03-12 00:28:06 +00:00
|
|
|
path: path,
|
|
|
|
logRaw: logRaw,
|
2016-03-14 18:52:29 +00:00
|
|
|
hmacAccessor: hmacAccessor,
|
2016-03-12 00:28:06 +00:00
|
|
|
salt: conf.Salt,
|
2015-04-27 21:28:02 +00:00
|
|
|
}
|
2015-08-26 16:13:10 +00:00
|
|
|
|
|
|
|
// Ensure that the file can be successfully opened for writing;
|
|
|
|
// otherwise it will be too late to catch later without problems
|
|
|
|
// (ref: https://github.com/hashicorp/vault/issues/550)
|
|
|
|
if err := b.open(); err != nil {
|
2015-10-30 18:30:21 +00:00
|
|
|
return nil, fmt.Errorf("sanity check failed; unable to open %s for writing", path)
|
2015-08-26 16:13:10 +00:00
|
|
|
}
|
|
|
|
|
2015-04-27 21:28:02 +00:00
|
|
|
return b, nil
|
2015-04-05 01:07:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Backend is the audit backend for the file-based audit store.
|
|
|
|
//
|
|
|
|
// NOTE: This audit backend is currently very simple: it appends to a file.
|
|
|
|
// It doesn't do anything more at the moment to assist with rotation
|
|
|
|
// or reset the write cursor, this should be done in the future.
|
|
|
|
type Backend struct {
|
2016-03-12 00:28:06 +00:00
|
|
|
path string
|
|
|
|
logRaw bool
|
2016-03-14 18:52:29 +00:00
|
|
|
hmacAccessor bool
|
2016-03-12 00:28:06 +00:00
|
|
|
salt *salt.Salt
|
2015-04-05 01:07:53 +00:00
|
|
|
|
|
|
|
once sync.Once
|
|
|
|
f *os.File
|
|
|
|
}
|
|
|
|
|
2015-11-19 01:26:03 +00:00
|
|
|
func (b *Backend) GetHash(data string) string {
|
|
|
|
return audit.HashString(b.salt, data)
|
|
|
|
}
|
|
|
|
|
2015-06-19 01:30:18 +00:00
|
|
|
func (b *Backend) LogRequest(auth *logical.Auth, req *logical.Request, outerErr error) error {
|
2015-04-05 01:07:53 +00:00
|
|
|
if err := b.open(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-09-18 16:18:37 +00:00
|
|
|
if !b.logRaw {
|
2015-06-30 00:16:17 +00:00
|
|
|
// Before we copy the structure we must nil out some data
|
|
|
|
// otherwise we will cause reflection to panic and die
|
|
|
|
if req.Connection != nil && req.Connection.ConnState != nil {
|
2015-07-08 22:45:15 +00:00
|
|
|
origReq := req
|
2015-06-30 00:16:17 +00:00
|
|
|
origState := req.Connection.ConnState
|
|
|
|
req.Connection.ConnState = nil
|
|
|
|
defer func() {
|
2015-07-08 22:45:15 +00:00
|
|
|
origReq.Connection.ConnState = origState
|
2015-06-30 00:16:17 +00:00
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
2015-04-27 21:28:02 +00:00
|
|
|
// Copy the structures
|
|
|
|
cp, err := copystructure.Copy(auth)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
auth = cp.(*logical.Auth)
|
|
|
|
|
|
|
|
cp, err = copystructure.Copy(req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
req = cp.(*logical.Request)
|
|
|
|
|
|
|
|
// Hash any sensitive information
|
2015-09-18 16:18:37 +00:00
|
|
|
if err := audit.Hash(b.salt, auth); err != nil {
|
2015-04-27 21:28:02 +00:00
|
|
|
return err
|
|
|
|
}
|
2015-09-18 16:18:37 +00:00
|
|
|
if err := audit.Hash(b.salt, req); err != nil {
|
2015-04-27 21:28:02 +00:00
|
|
|
return err
|
|
|
|
}
|
2016-03-12 00:28:06 +00:00
|
|
|
|
2015-04-27 21:28:02 +00:00
|
|
|
}
|
2015-04-05 01:07:53 +00:00
|
|
|
|
2015-04-13 21:12:14 +00:00
|
|
|
var format audit.FormatJSON
|
2015-06-19 01:30:18 +00:00
|
|
|
return format.FormatRequest(b.f, auth, req, outerErr)
|
2015-04-05 01:07:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (b *Backend) LogResponse(
|
|
|
|
auth *logical.Auth,
|
|
|
|
req *logical.Request,
|
|
|
|
resp *logical.Response,
|
|
|
|
err error) error {
|
|
|
|
if err := b.open(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-09-18 16:18:37 +00:00
|
|
|
if !b.logRaw {
|
2015-06-30 00:16:17 +00:00
|
|
|
// Before we copy the structure we must nil out some data
|
|
|
|
// otherwise we will cause reflection to panic and die
|
|
|
|
if req.Connection != nil && req.Connection.ConnState != nil {
|
2015-07-08 22:45:15 +00:00
|
|
|
origReq := req
|
2015-06-30 00:16:17 +00:00
|
|
|
origState := req.Connection.ConnState
|
|
|
|
req.Connection.ConnState = nil
|
|
|
|
defer func() {
|
2015-07-08 22:45:15 +00:00
|
|
|
origReq.Connection.ConnState = origState
|
2015-06-30 00:16:17 +00:00
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
2015-04-27 21:28:02 +00:00
|
|
|
// Copy the structure
|
|
|
|
cp, err := copystructure.Copy(auth)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
auth = cp.(*logical.Auth)
|
|
|
|
|
|
|
|
cp, err = copystructure.Copy(req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
req = cp.(*logical.Request)
|
|
|
|
|
|
|
|
cp, err = copystructure.Copy(resp)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
resp = cp.(*logical.Response)
|
|
|
|
|
|
|
|
// Hash any sensitive information
|
2016-03-12 00:28:06 +00:00
|
|
|
|
|
|
|
// Cache and restore accessor in the auth
|
2016-06-13 23:58:17 +00:00
|
|
|
var accessor, wrappedAccessor string
|
2016-03-14 18:52:29 +00:00
|
|
|
if !b.hmacAccessor && auth != nil && auth.Accessor != "" {
|
2016-03-12 00:28:06 +00:00
|
|
|
accessor = auth.Accessor
|
|
|
|
}
|
2015-09-18 16:18:37 +00:00
|
|
|
if err := audit.Hash(b.salt, auth); err != nil {
|
2015-04-27 21:28:02 +00:00
|
|
|
return err
|
|
|
|
}
|
2016-03-14 15:23:30 +00:00
|
|
|
if accessor != "" {
|
2016-03-12 00:28:06 +00:00
|
|
|
auth.Accessor = accessor
|
|
|
|
}
|
|
|
|
|
2015-09-18 16:18:37 +00:00
|
|
|
if err := audit.Hash(b.salt, req); err != nil {
|
2015-04-27 21:28:02 +00:00
|
|
|
return err
|
|
|
|
}
|
2016-03-12 00:28:06 +00:00
|
|
|
|
|
|
|
// Cache and restore accessor in the response
|
|
|
|
accessor = ""
|
2016-03-14 18:52:29 +00:00
|
|
|
if !b.hmacAccessor && resp != nil && resp.Auth != nil && resp.Auth.Accessor != "" {
|
2016-03-12 00:28:06 +00:00
|
|
|
accessor = resp.Auth.Accessor
|
|
|
|
}
|
2016-06-13 23:58:17 +00:00
|
|
|
if !b.hmacAccessor && resp != nil && resp.WrapInfo != nil && resp.WrapInfo.WrappedAccessor != "" {
|
|
|
|
wrappedAccessor = resp.WrapInfo.WrappedAccessor
|
|
|
|
}
|
2015-09-18 16:18:37 +00:00
|
|
|
if err := audit.Hash(b.salt, resp); err != nil {
|
2015-04-27 21:28:02 +00:00
|
|
|
return err
|
|
|
|
}
|
2016-03-14 15:23:30 +00:00
|
|
|
if accessor != "" {
|
2016-03-12 00:28:06 +00:00
|
|
|
resp.Auth.Accessor = accessor
|
|
|
|
}
|
2016-06-13 23:58:17 +00:00
|
|
|
if wrappedAccessor != "" {
|
|
|
|
resp.WrapInfo.WrappedAccessor = wrappedAccessor
|
|
|
|
}
|
2015-04-27 21:28:02 +00:00
|
|
|
}
|
2015-04-05 01:07:53 +00:00
|
|
|
|
2015-04-13 21:12:14 +00:00
|
|
|
var format audit.FormatJSON
|
|
|
|
return format.FormatResponse(b.f, auth, req, resp, err)
|
2015-04-05 01:07:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (b *Backend) open() error {
|
|
|
|
if b.f != nil {
|
|
|
|
return nil
|
|
|
|
}
|
2015-09-18 16:18:37 +00:00
|
|
|
if err := os.MkdirAll(filepath.Dir(b.path), 0600); err != nil {
|
2015-04-27 19:40:32 +00:00
|
|
|
return err
|
|
|
|
}
|
2015-04-05 01:07:53 +00:00
|
|
|
|
|
|
|
var err error
|
2015-09-18 16:18:37 +00:00
|
|
|
b.f, err = os.OpenFile(b.path, os.O_APPEND|os.O_WRONLY|os.O_CREATE, 0600)
|
2015-04-05 01:07:53 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|