2015-03-27 21:00:38 +00:00
package vault
import (
2015-09-18 16:18:37 +00:00
"crypto/sha256"
2015-03-27 21:00:38 +00:00
"errors"
"fmt"
2015-03-31 22:26:03 +00:00
"strings"
"sync"
2015-04-08 23:43:17 +00:00
"time"
2015-03-27 21:00:38 +00:00
2016-08-19 20:45:17 +00:00
log "github.com/mgutz/logxi/v1"
2015-04-08 23:43:17 +00:00
"github.com/armon/go-metrics"
2016-07-24 01:46:28 +00:00
"github.com/hashicorp/go-multierror"
2015-12-16 17:56:20 +00:00
"github.com/hashicorp/go-uuid"
2015-03-27 21:00:38 +00:00
"github.com/hashicorp/vault/audit"
2016-07-06 16:25:40 +00:00
"github.com/hashicorp/vault/helper/jsonutil"
2015-09-18 16:18:37 +00:00
"github.com/hashicorp/vault/helper/salt"
2015-04-01 20:55:07 +00:00
"github.com/hashicorp/vault/logical"
2015-03-27 21:00:38 +00:00
)
const (
// coreAuditConfigPath is used to store the audit configuration.
// Audit configuration is protected within the Vault itself, which means it
// can only be viewed or modified after an unseal.
coreAuditConfigPath = "core/audit"
2015-03-31 22:26:03 +00:00
2017-02-17 01:13:19 +00:00
// coreLocalAuditConfigPath is used to store audit information for local
// (non-replicated) mounts
coreLocalAuditConfigPath = "core/local-audit"
2015-03-31 22:26:03 +00:00
// auditBarrierPrefix is the prefix to the UUID used in the
// barrier view for the audit backends.
auditBarrierPrefix = "audit/"
2016-05-26 17:38:51 +00:00
// auditTableType is the value we expect to find for the audit table and
// corresponding entries
auditTableType = "audit"
2015-03-27 21:00:38 +00:00
)
var (
// loadAuditFailed if loading audit tables encounters an error
2015-09-18 16:18:37 +00:00
errLoadAuditFailed = errors . New ( "failed to setup audit table" )
2015-03-27 21:00:38 +00:00
)
2015-03-31 22:26:03 +00:00
// enableAudit is used to enable a new audit backend
func ( c * Core ) enableAudit ( entry * MountEntry ) error {
2015-04-03 21:27:33 +00:00
// Ensure we end the path in a slash
if ! strings . HasSuffix ( entry . Path , "/" ) {
entry . Path += "/"
}
2015-03-31 22:26:03 +00:00
// Ensure there is a name
2015-04-03 21:27:33 +00:00
if entry . Path == "/" {
2015-03-31 22:26:03 +00:00
return fmt . Errorf ( "backend path must be specified" )
}
2015-11-11 16:44:07 +00:00
// Update the audit table
c . auditLock . Lock ( )
defer c . auditLock . Unlock ( )
2015-03-31 22:26:03 +00:00
// Look for matching name
for _ , ent := range c . audit . Entries {
2015-04-03 21:27:33 +00:00
switch {
// Existing is sql/mysql/ new is sql/ or
// existing is sql/ and new is sql/mysql/
case strings . HasPrefix ( ent . Path , entry . Path ) :
fallthrough
case strings . HasPrefix ( entry . Path , ent . Path ) :
2015-03-31 22:26:03 +00:00
return fmt . Errorf ( "path already in use" )
}
}
2015-09-18 16:18:37 +00:00
// Generate a new UUID and view
2017-02-17 01:13:19 +00:00
if entry . UUID == "" {
entryUUID , err := uuid . GenerateUUID ( )
if err != nil {
return err
}
entry . UUID = entryUUID
2016-01-13 18:40:08 +00:00
}
2017-06-26 17:14:36 +00:00
if entry . Accessor == "" {
accessor , err := c . generateMountAccessor ( "audit_" + entry . Type )
if err != nil {
return err
}
entry . Accessor = accessor
}
2017-02-17 01:13:19 +00:00
viewPath := auditBarrierPrefix + entry . UUID + "/"
view := NewBarrierView ( c . barrier , viewPath )
2015-09-18 16:18:37 +00:00
2015-03-31 22:26:03 +00:00
// Lookup the new backend
2016-09-30 19:04:50 +00:00
backend , err := c . newAuditBackend ( entry , view , entry . Options )
2015-03-31 22:26:03 +00:00
if err != nil {
return err
}
2017-03-04 21:35:41 +00:00
if backend == nil {
return fmt . Errorf ( "nil audit backend of type %q returned from factory" , entry . Type )
}
2015-03-31 22:26:03 +00:00
2016-09-13 15:50:14 +00:00
newTable := c . audit . shallowClone ( )
2015-03-31 22:26:03 +00:00
newTable . Entries = append ( newTable . Entries , entry )
2017-03-02 19:37:59 +00:00
if err := c . persistAudit ( newTable , entry . Local ) ; err != nil {
2015-03-31 22:26:03 +00:00
return errors . New ( "failed to update audit table" )
}
2015-11-11 16:44:07 +00:00
2015-03-31 22:26:03 +00:00
c . audit = newTable
// Register the backend
c . auditBroker . Register ( entry . Path , backend , view )
2016-08-19 20:45:17 +00:00
if c . logger . IsInfo ( ) {
c . logger . Info ( "core: enabled audit backend" , "path" , entry . Path , "type" , entry . Type )
}
2015-03-31 22:26:03 +00:00
return nil
}
// disableAudit is used to disable an existing audit backend
2016-09-19 17:02:25 +00:00
func ( c * Core ) disableAudit ( path string ) ( bool , error ) {
2015-04-03 21:27:33 +00:00
// Ensure we end the path in a slash
if ! strings . HasSuffix ( path , "/" ) {
path += "/"
}
2015-03-31 22:26:03 +00:00
// Remove the entry from the mount table
2015-11-11 16:44:07 +00:00
c . auditLock . Lock ( )
defer c . auditLock . Unlock ( )
2016-09-13 15:50:14 +00:00
newTable := c . audit . shallowClone ( )
2016-09-30 19:04:50 +00:00
entry := newTable . remove ( path )
2015-03-31 22:26:03 +00:00
// Ensure there was a match
2016-09-30 19:04:50 +00:00
if entry == nil {
2016-09-19 17:02:25 +00:00
return false , fmt . Errorf ( "no matching backend" )
2015-03-31 22:26:03 +00:00
}
2016-09-30 19:04:50 +00:00
c . removeAuditReloadFunc ( entry )
2017-02-17 01:13:19 +00:00
// When unmounting all entries the JSON code will load back up from storage
// as a nil slice, which kills tests...just set it nil explicitly
if len ( newTable . Entries ) == 0 {
newTable . Entries = nil
}
2015-03-31 22:26:03 +00:00
// Update the audit table
2017-03-02 19:37:59 +00:00
if err := c . persistAudit ( newTable , entry . Local ) ; err != nil {
2016-09-19 17:02:25 +00:00
return true , errors . New ( "failed to update audit table" )
2015-03-31 22:26:03 +00:00
}
2015-11-11 16:44:07 +00:00
2015-03-31 22:26:03 +00:00
c . audit = newTable
// Unmount the backend
c . auditBroker . Deregister ( path )
2016-08-19 20:45:17 +00:00
if c . logger . IsInfo ( ) {
c . logger . Info ( "core: disabled audit backend" , "path" , path )
}
2017-02-17 01:13:19 +00:00
2016-09-19 17:02:25 +00:00
return true , nil
2015-03-31 22:26:03 +00:00
}
2015-03-27 21:00:38 +00:00
// loadAudits is invoked as part of postUnseal to load the audit table
func ( c * Core ) loadAudits ( ) error {
2015-11-11 16:44:07 +00:00
auditTable := & MountTable { }
2017-02-17 01:13:19 +00:00
localAuditTable := & MountTable { }
2015-11-11 16:44:07 +00:00
2015-03-27 21:00:38 +00:00
// Load the existing audit table
raw , err := c . barrier . Get ( coreAuditConfigPath )
if err != nil {
2016-08-19 20:45:17 +00:00
c . logger . Error ( "core: failed to read audit table" , "error" , err )
2015-09-18 16:18:37 +00:00
return errLoadAuditFailed
2015-03-27 21:00:38 +00:00
}
2017-02-17 01:13:19 +00:00
rawLocal , err := c . barrier . Get ( coreLocalAuditConfigPath )
if err != nil {
c . logger . Error ( "core: failed to read local audit table" , "error" , err )
return errLoadAuditFailed
}
2015-11-11 16:44:07 +00:00
c . auditLock . Lock ( )
defer c . auditLock . Unlock ( )
2015-03-27 21:00:38 +00:00
if raw != nil {
2016-07-06 16:25:40 +00:00
if err := jsonutil . DecodeJSON ( raw . Value , auditTable ) ; err != nil {
2016-08-19 20:45:17 +00:00
c . logger . Error ( "core: failed to decode audit table" , "error" , err )
2015-09-18 16:18:37 +00:00
return errLoadAuditFailed
2015-03-27 21:00:38 +00:00
}
2015-11-11 16:44:07 +00:00
c . audit = auditTable
2015-03-27 21:00:38 +00:00
}
2017-11-08 01:30:02 +00:00
var needPersist bool
if c . audit == nil {
c . audit = defaultAuditTable ( )
needPersist = true
}
2017-02-17 01:13:19 +00:00
if rawLocal != nil {
if err := jsonutil . DecodeJSON ( rawLocal . Value , localAuditTable ) ; err != nil {
c . logger . Error ( "core: failed to decode local audit table" , "error" , err )
return errLoadAuditFailed
}
2017-11-07 23:04:37 +00:00
if localAuditTable != nil && len ( localAuditTable . Entries ) > 0 {
c . audit . Entries = append ( c . audit . Entries , localAuditTable . Entries ... )
}
2017-02-17 01:13:19 +00:00
}
2015-03-27 21:00:38 +00:00
2017-11-08 01:30:02 +00:00
// Upgrade to typed auth table
if c . audit . Type == "" {
c . audit . Type = auditTableType
needPersist = true
}
2016-05-26 17:38:51 +00:00
2017-11-08 01:30:02 +00:00
// Upgrade to table-scoped entries
for _ , entry := range c . audit . Entries {
if entry . Table == "" {
entry . Table = c . audit . Type
2016-05-26 17:38:51 +00:00
needPersist = true
}
2017-11-08 01:30:02 +00:00
if entry . Accessor == "" {
accessor , err := c . generateMountAccessor ( "audit_" + entry . Type )
if err != nil {
return err
2017-06-26 17:14:36 +00:00
}
2017-11-08 01:30:02 +00:00
entry . Accessor = accessor
needPersist = true
2016-05-26 17:38:51 +00:00
}
2017-11-08 01:30:02 +00:00
}
2016-05-26 17:38:51 +00:00
2017-11-08 01:30:02 +00:00
if ! needPersist {
return nil
2015-03-27 21:00:38 +00:00
}
2017-03-02 19:37:59 +00:00
if err := c . persistAudit ( c . audit , false ) ; err != nil {
2015-09-18 16:18:37 +00:00
return errLoadAuditFailed
2015-03-27 21:00:38 +00:00
}
return nil
}
// persistAudit is used to persist the audit table after modification
2017-03-02 19:37:59 +00:00
func ( c * Core ) persistAudit ( table * MountTable , localOnly bool ) error {
2016-05-26 17:38:51 +00:00
if table . Type != auditTableType {
2016-08-19 20:45:17 +00:00
c . logger . Error ( "core: given table to persist has wrong type" , "actual_type" , table . Type , "expected_type" , auditTableType )
2016-05-26 17:38:51 +00:00
return fmt . Errorf ( "invalid table type given, not persisting" )
}
for _ , entry := range table . Entries {
if entry . Table != table . Type {
2016-08-19 20:45:17 +00:00
c . logger . Error ( "core: given entry to persist in audit table has wrong table value" , "path" , entry . Path , "entry_table_type" , entry . Table , "actual_type" , table . Type )
2016-05-26 17:38:51 +00:00
return fmt . Errorf ( "invalid audit entry found, not persisting" )
}
}
2017-02-17 01:13:19 +00:00
nonLocalAudit := & MountTable {
Type : auditTableType ,
}
localAudit := & MountTable {
Type : auditTableType ,
}
for _ , entry := range table . Entries {
if entry . Local {
localAudit . Entries = append ( localAudit . Entries , entry )
} else {
nonLocalAudit . Entries = append ( nonLocalAudit . Entries , entry )
}
}
2017-03-02 19:37:59 +00:00
if ! localOnly {
// Marshal the table
compressedBytes , err := jsonutil . EncodeJSONAndCompress ( nonLocalAudit , nil )
if err != nil {
c . logger . Error ( "core: failed to encode and/or compress audit table" , "error" , err )
return err
}
2015-03-27 21:00:38 +00:00
2017-03-02 19:37:59 +00:00
// Create an entry
entry := & Entry {
Key : coreAuditConfigPath ,
Value : compressedBytes ,
}
2015-03-27 21:00:38 +00:00
2017-03-02 19:37:59 +00:00
// Write to the physical backend
if err := c . barrier . Put ( entry ) ; err != nil {
c . logger . Error ( "core: failed to persist audit table" , "error" , err )
return err
}
2015-03-27 21:00:38 +00:00
}
2017-02-17 01:13:19 +00:00
// Repeat with local audit
2017-03-02 19:37:59 +00:00
compressedBytes , err := jsonutil . EncodeJSONAndCompress ( localAudit , nil )
2017-02-17 01:13:19 +00:00
if err != nil {
c . logger . Error ( "core: failed to encode and/or compress local audit table" , "error" , err )
return err
}
2017-03-02 19:37:59 +00:00
entry := & Entry {
2017-02-17 01:13:19 +00:00
Key : coreLocalAuditConfigPath ,
Value : compressedBytes ,
}
if err := c . barrier . Put ( entry ) ; err != nil {
c . logger . Error ( "core: failed to persist local audit table" , "error" , err )
return err
}
2015-03-27 21:00:38 +00:00
return nil
}
// setupAudit is invoked after we've loaded the audit able to
// initialize the audit backends
func ( c * Core ) setupAudits ( ) error {
2015-04-01 20:55:07 +00:00
broker := NewAuditBroker ( c . logger )
2015-11-11 16:44:07 +00:00
c . auditLock . Lock ( )
defer c . auditLock . Unlock ( )
2016-12-02 20:09:01 +00:00
var successCount int
2015-03-27 21:00:38 +00:00
for _ , entry := range c . audit . Entries {
2015-09-18 16:18:37 +00:00
// Create a barrier view using the UUID
2017-02-17 01:13:19 +00:00
viewPath := auditBarrierPrefix + entry . UUID + "/"
view := NewBarrierView ( c . barrier , viewPath )
2015-09-18 16:18:37 +00:00
2015-03-27 21:00:38 +00:00
// Initialize the backend
2017-03-04 21:35:41 +00:00
backend , err := c . newAuditBackend ( entry , view , entry . Options )
2015-03-27 21:00:38 +00:00
if err != nil {
2016-08-19 20:45:17 +00:00
c . logger . Error ( "core: failed to create audit entry" , "path" , entry . Path , "error" , err )
2016-12-02 20:09:01 +00:00
continue
2015-03-27 21:00:38 +00:00
}
2017-03-04 21:35:41 +00:00
if backend == nil {
c . logger . Error ( "core: created audit entry was nil" , "path" , entry . Path , "type" , entry . Type )
continue
}
2015-03-31 20:22:40 +00:00
2015-03-31 22:26:03 +00:00
// Mount the backend
2017-03-04 21:35:41 +00:00
broker . Register ( entry . Path , backend , view )
2016-12-02 20:09:01 +00:00
successCount += 1
2015-03-31 22:26:03 +00:00
}
2016-12-02 20:09:01 +00:00
if len ( c . audit . Entries ) > 0 && successCount == 0 {
return errLoadAuditFailed
}
2015-03-31 22:26:03 +00:00
c . auditBroker = broker
2015-03-27 21:00:38 +00:00
return nil
}
// teardownAudit is used before we seal the vault to reset the audit
// backends to their unloaded state. This is reversed by loadAudits.
func ( c * Core ) teardownAudits ( ) error {
2015-11-11 16:44:07 +00:00
c . auditLock . Lock ( )
defer c . auditLock . Unlock ( )
2016-10-28 19:32:32 +00:00
if c . audit != nil {
for _ , entry := range c . audit . Entries {
c . removeAuditReloadFunc ( entry )
}
2016-09-30 19:04:50 +00:00
}
2015-03-27 21:00:38 +00:00
c . audit = nil
2015-03-31 20:22:40 +00:00
c . auditBroker = nil
2015-03-27 21:00:38 +00:00
return nil
}
2016-09-30 19:04:50 +00:00
// removeAuditReloadFunc removes the reload func from the working set. The
// audit lock needs to be held before calling this.
func ( c * Core ) removeAuditReloadFunc ( entry * MountEntry ) {
switch entry . Type {
case "file" :
key := "audit_file|" + entry . Path
c . reloadFuncsLock . Lock ( )
if c . logger . IsDebug ( ) {
c . logger . Debug ( "audit: removing reload function" , "path" , entry . Path )
}
delete ( c . reloadFuncs , key )
c . reloadFuncsLock . Unlock ( )
}
}
2015-03-27 21:00:38 +00:00
// newAuditBackend is used to create and configure a new audit backend by name
2016-09-30 19:04:50 +00:00
func ( c * Core ) newAuditBackend ( entry * MountEntry , view logical . Storage , conf map [ string ] string ) ( audit . Backend , error ) {
f , ok := c . auditBackends [ entry . Type ]
2015-03-27 21:00:38 +00:00
if ! ok {
2016-09-30 19:04:50 +00:00
return nil , fmt . Errorf ( "unknown backend type: %s" , entry . Type )
2015-03-27 21:00:38 +00:00
}
2017-05-24 00:36:20 +00:00
saltConfig := & salt . Config {
2015-09-18 16:18:37 +00:00
HMAC : sha256 . New ,
2015-09-18 21:36:42 +00:00
HMACType : "hmac-sha256" ,
2017-05-24 00:36:20 +00:00
Location : salt . DefaultLocation ,
2015-09-18 16:18:37 +00:00
}
2016-09-30 19:04:50 +00:00
be , err := f ( & audit . BackendConfig {
2017-05-24 00:36:20 +00:00
SaltView : view ,
SaltConfig : saltConfig ,
Config : conf ,
2015-09-18 16:18:37 +00:00
} )
2016-09-30 19:04:50 +00:00
if err != nil {
return nil , err
}
2017-03-04 21:35:41 +00:00
if be == nil {
return nil , fmt . Errorf ( "nil backend returned from %q factory function" , entry . Type )
}
2016-09-30 19:04:50 +00:00
switch entry . Type {
case "file" :
key := "audit_file|" + entry . Path
c . reloadFuncsLock . Lock ( )
if c . logger . IsDebug ( ) {
c . logger . Debug ( "audit: adding reload function" , "path" , entry . Path )
}
2017-06-22 19:29:53 +00:00
c . reloadFuncs [ key ] = append ( c . reloadFuncs [ key ] , func ( map [ string ] interface { } ) error {
2016-09-30 19:04:50 +00:00
if c . logger . IsInfo ( ) {
c . logger . Info ( "audit: reloading file audit backend" , "path" , entry . Path )
}
return be . Reload ( )
} )
c . reloadFuncsLock . Unlock ( )
}
return be , err
2015-03-27 21:00:38 +00:00
}
// defaultAuditTable creates a default audit table
func defaultAuditTable ( ) * MountTable {
2016-05-26 17:38:51 +00:00
table := & MountTable {
Type : auditTableType ,
}
2015-03-27 21:00:38 +00:00
return table
}
2015-03-31 20:22:40 +00:00
2015-03-31 22:26:03 +00:00
type backendEntry struct {
backend audit . Backend
view * BarrierView
}
2015-03-31 20:22:40 +00:00
// AuditBroker is used to provide a single ingest interface to auditable
// events given that multiple backends may be configured.
type AuditBroker struct {
2016-09-30 19:04:50 +00:00
sync . RWMutex
2015-03-31 22:26:03 +00:00
backends map [ string ] backendEntry
2016-08-19 20:45:17 +00:00
logger log . Logger
2015-03-31 20:22:40 +00:00
}
2015-03-31 22:26:03 +00:00
// NewAuditBroker creates a new audit broker
2016-08-19 20:45:17 +00:00
func NewAuditBroker ( log log . Logger ) * AuditBroker {
2015-03-31 20:22:40 +00:00
b := & AuditBroker {
2015-03-31 22:26:03 +00:00
backends : make ( map [ string ] backendEntry ) ,
2015-04-01 20:55:07 +00:00
logger : log ,
2015-03-31 20:22:40 +00:00
}
return b
}
2015-03-31 22:26:03 +00:00
// Register is used to add new audit backend to the broker
func ( a * AuditBroker ) Register ( name string , b audit . Backend , v * BarrierView ) {
2016-09-30 19:04:50 +00:00
a . Lock ( )
defer a . Unlock ( )
2015-03-31 22:26:03 +00:00
a . backends [ name ] = backendEntry {
backend : b ,
view : v ,
}
}
// Deregister is used to remove an audit backend from the broker
func ( a * AuditBroker ) Deregister ( name string ) {
2016-09-30 19:04:50 +00:00
a . Lock ( )
defer a . Unlock ( )
2015-03-31 22:26:03 +00:00
delete ( a . backends , name )
}
// IsRegistered is used to check if a given audit backend is registered
func ( a * AuditBroker ) IsRegistered ( name string ) bool {
2016-09-30 19:04:50 +00:00
a . RLock ( )
defer a . RUnlock ( )
2015-03-31 22:26:03 +00:00
_ , ok := a . backends [ name ]
return ok
}
2015-04-01 20:55:07 +00:00
2015-11-19 01:26:03 +00:00
// GetHash returns a hash using the salt of the given backend
func ( a * AuditBroker ) GetHash ( name string , input string ) ( string , error ) {
2016-09-30 19:04:50 +00:00
a . RLock ( )
defer a . RUnlock ( )
2015-11-19 01:26:03 +00:00
be , ok := a . backends [ name ]
if ! ok {
return "" , fmt . Errorf ( "unknown audit backend %s" , name )
}
2017-05-24 00:36:20 +00:00
return be . backend . GetHash ( input )
2015-11-19 01:26:03 +00:00
}
2015-04-01 20:55:07 +00:00
// LogRequest is used to ensure all the audit backends have an opportunity to
// log the given request and that *at least one* succeeds.
2017-05-24 00:36:20 +00:00
func ( a * AuditBroker ) LogRequest ( auth * logical . Auth , req * logical . Request , headersConfig * AuditedHeadersConfig , outerErr error ) ( ret error ) {
2015-04-08 23:43:17 +00:00
defer metrics . MeasureSince ( [ ] string { "audit" , "log_request" } , time . Now ( ) )
2016-09-30 19:04:50 +00:00
a . RLock ( )
defer a . RUnlock ( )
2017-05-24 00:36:20 +00:00
var retErr * multierror . Error
2015-06-29 22:11:35 +00:00
defer func ( ) {
if r := recover ( ) ; r != nil {
2016-08-19 20:45:17 +00:00
a . logger . Error ( "audit: panic during logging" , "request_path" , req . Path , "error" , r )
2016-07-24 01:46:28 +00:00
retErr = multierror . Append ( retErr , fmt . Errorf ( "panic generating audit log" ) )
2015-06-29 22:11:35 +00:00
}
2017-05-24 00:36:20 +00:00
ret = retErr . ErrorOrNil ( )
2017-07-14 15:03:56 +00:00
if ret != nil {
metrics . IncrCounter ( [ ] string { "audit" , "log_request_failure" } , 1.0 )
}
2015-06-29 22:11:35 +00:00
} ( )
2015-04-01 20:55:07 +00:00
2016-07-24 01:46:28 +00:00
// All logged requests must have an identifier
2016-07-26 19:50:37 +00:00
//if req.ID == "" {
2016-08-19 20:45:17 +00:00
// a.logger.Error("audit: missing identifier in request object", "request_path", req.Path)
2016-07-26 19:50:37 +00:00
// retErr = multierror.Append(retErr, fmt.Errorf("missing identifier in request object: %s", req.Path))
// return
//}
2016-07-24 01:46:28 +00:00
2017-02-02 19:49:20 +00:00
headers := req . Headers
defer func ( ) {
req . Headers = headers
} ( )
2015-04-01 20:55:07 +00:00
// Ensure at least one backend logs
anyLogged := false
for name , be := range a . backends {
2017-02-02 19:49:20 +00:00
req . Headers = nil
2017-05-24 00:36:20 +00:00
transHeaders , thErr := headersConfig . ApplyConfig ( headers , be . backend . GetHash )
if thErr != nil {
a . logger . Error ( "audit: backend failed to include headers" , "backend" , name , "error" , thErr )
continue
}
req . Headers = transHeaders
2017-02-02 19:49:20 +00:00
2015-04-09 00:09:36 +00:00
start := time . Now ( )
2017-05-24 00:36:20 +00:00
lrErr := be . backend . LogRequest ( auth , req , outerErr )
2015-04-09 00:09:36 +00:00
metrics . MeasureSince ( [ ] string { "audit" , name , "log_request" } , start )
2017-05-24 00:36:20 +00:00
if lrErr != nil {
a . logger . Error ( "audit: backend failed to log request" , "backend" , name , "error" , lrErr )
2015-04-01 20:55:07 +00:00
} else {
anyLogged = true
}
}
if ! anyLogged && len ( a . backends ) > 0 {
2016-07-24 01:46:28 +00:00
retErr = multierror . Append ( retErr , fmt . Errorf ( "no audit backend succeeded in logging the request" ) )
2015-04-01 20:55:07 +00:00
}
2017-05-24 00:36:20 +00:00
return retErr . ErrorOrNil ( )
2015-04-01 20:55:07 +00:00
}
// LogResponse is used to ensure all the audit backends have an opportunity to
// log the given response and that *at least one* succeeds.
func ( a * AuditBroker ) LogResponse ( auth * logical . Auth , req * logical . Request ,
2017-05-24 00:36:20 +00:00
resp * logical . Response , headersConfig * AuditedHeadersConfig , err error ) ( ret error ) {
2015-04-08 23:43:17 +00:00
defer metrics . MeasureSince ( [ ] string { "audit" , "log_response" } , time . Now ( ) )
2016-09-30 19:04:50 +00:00
a . RLock ( )
defer a . RUnlock ( )
2017-05-24 00:36:20 +00:00
var retErr * multierror . Error
2015-06-29 22:11:35 +00:00
defer func ( ) {
if r := recover ( ) ; r != nil {
2016-08-19 20:45:17 +00:00
a . logger . Error ( "audit: panic during logging" , "request_path" , req . Path , "error" , r )
2017-05-24 00:36:20 +00:00
retErr = multierror . Append ( retErr , fmt . Errorf ( "panic generating audit log" ) )
2015-06-29 22:11:35 +00:00
}
2017-05-24 00:36:20 +00:00
ret = retErr . ErrorOrNil ( )
2017-07-14 15:03:56 +00:00
if ret != nil {
metrics . IncrCounter ( [ ] string { "audit" , "log_response_failure" } , 1.0 )
}
2015-06-29 22:11:35 +00:00
} ( )
2015-04-01 20:55:07 +00:00
2017-02-02 19:49:20 +00:00
headers := req . Headers
defer func ( ) {
req . Headers = headers
} ( )
2015-04-01 20:55:07 +00:00
// Ensure at least one backend logs
anyLogged := false
for name , be := range a . backends {
2017-02-02 19:49:20 +00:00
req . Headers = nil
2017-05-24 00:36:20 +00:00
transHeaders , thErr := headersConfig . ApplyConfig ( headers , be . backend . GetHash )
if thErr != nil {
a . logger . Error ( "audit: backend failed to include headers" , "backend" , name , "error" , thErr )
continue
}
req . Headers = transHeaders
2017-02-02 19:49:20 +00:00
2015-04-09 00:09:36 +00:00
start := time . Now ( )
2017-05-24 00:36:20 +00:00
lrErr := be . backend . LogResponse ( auth , req , resp , err )
2015-04-09 00:09:36 +00:00
metrics . MeasureSince ( [ ] string { "audit" , name , "log_response" } , start )
2017-05-24 00:36:20 +00:00
if lrErr != nil {
a . logger . Error ( "audit: backend failed to log response" , "backend" , name , "error" , lrErr )
2015-04-01 20:55:07 +00:00
} else {
anyLogged = true
}
}
if ! anyLogged && len ( a . backends ) > 0 {
2017-05-24 00:36:20 +00:00
retErr = multierror . Append ( retErr , fmt . Errorf ( "no audit backend succeeded in logging the response" ) )
}
return retErr . ErrorOrNil ( )
}
func ( a * AuditBroker ) Invalidate ( key string ) {
// For now we ignore the key as this would only apply to salts. We just
// sort of brute force it on each one.
a . Lock ( )
defer a . Unlock ( )
for _ , be := range a . backends {
be . backend . Invalidate ( )
2015-04-01 20:55:07 +00:00
}
}