Merge pull request #2379 from hashicorp/issue-2362
Compare headers case-insensitively for auditing
This commit is contained in:
commit
45e6e2e95f
|
@ -438,8 +438,10 @@ func TestAuditBroker_LogResponse(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestAuditBroker_AuditHeaders(t *testing.T) {
|
||||
l := logformat.NewVaultLogger(log.LevelTrace)
|
||||
b := NewAuditBroker(l)
|
||||
logger := logformat.NewVaultLogger(log.LevelTrace)
|
||||
b := NewAuditBroker(logger)
|
||||
_, barrier, _ := mockBarrier(t)
|
||||
view := NewBarrierView(barrier, "headers/")
|
||||
a1 := &NoopAudit{}
|
||||
a2 := &NoopAudit{}
|
||||
b.Register("foo", a1, nil)
|
||||
|
@ -472,11 +474,10 @@ func TestAuditBroker_AuditHeaders(t *testing.T) {
|
|||
reqCopy := reqCopyRaw.(*logical.Request)
|
||||
|
||||
headersConf := &AuditedHeadersConfig{
|
||||
Headers: map[string]*auditedHeaderSettings{
|
||||
"X-Test-Header": &auditedHeaderSettings{false},
|
||||
"X-Vault-Header": &auditedHeaderSettings{false},
|
||||
},
|
||||
view: view,
|
||||
}
|
||||
headersConf.add("X-Test-Header", false)
|
||||
headersConf.add("X-Vault-Header", false)
|
||||
|
||||
err = b.LogRequest(auth, reqCopy, headersConf, respErr)
|
||||
if err != nil {
|
||||
|
@ -484,8 +485,8 @@ func TestAuditBroker_AuditHeaders(t *testing.T) {
|
|||
}
|
||||
|
||||
expected := map[string][]string{
|
||||
"X-Test-Header": []string{"foo"},
|
||||
"X-Vault-Header": []string{"bar"},
|
||||
"x-test-header": []string{"foo"},
|
||||
"x-vault-header": []string{"bar"},
|
||||
}
|
||||
|
||||
for _, a := range []*NoopAudit{a1, a2} {
|
||||
|
|
|
@ -2,11 +2,15 @@ package vault
|
|||
|
||||
import (
|
||||
"fmt"
|
||||
"strings"
|
||||
"sync"
|
||||
|
||||
"github.com/hashicorp/vault/logical"
|
||||
)
|
||||
|
||||
// N.B.: While we could use textproto to get the canonical mime header, HTTP/2
|
||||
// requires all headers to be converted to lower case, so we just do that.
|
||||
|
||||
const (
|
||||
// Key used in the BarrierView to store and retrieve the header config
|
||||
auditedHeadersEntry = "audited-headers"
|
||||
|
@ -37,7 +41,11 @@ func (a *AuditedHeadersConfig) add(header string, hmac bool) error {
|
|||
a.Lock()
|
||||
defer a.Unlock()
|
||||
|
||||
a.Headers[header] = &auditedHeaderSettings{hmac}
|
||||
if a.Headers == nil {
|
||||
a.Headers = make(map[string]*auditedHeaderSettings, 1)
|
||||
}
|
||||
|
||||
a.Headers[strings.ToLower(header)] = &auditedHeaderSettings{hmac}
|
||||
entry, err := logical.StorageEntryJSON(auditedHeadersEntry, a.Headers)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to persist audited headers config: %v", err)
|
||||
|
@ -60,7 +68,12 @@ func (a *AuditedHeadersConfig) remove(header string) error {
|
|||
a.Lock()
|
||||
defer a.Unlock()
|
||||
|
||||
delete(a.Headers, header)
|
||||
// Nothing to delete
|
||||
if len(a.Headers) == 0 {
|
||||
return nil
|
||||
}
|
||||
|
||||
delete(a.Headers, strings.ToLower(header))
|
||||
entry, err := logical.StorageEntryJSON(auditedHeadersEntry, a.Headers)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to persist audited headers config: %v", err)
|
||||
|
@ -80,9 +93,16 @@ func (a *AuditedHeadersConfig) ApplyConfig(headers map[string][]string, hashFunc
|
|||
a.RLock()
|
||||
defer a.RUnlock()
|
||||
|
||||
// Make a copy of the incoming headers with everything lower so we can
|
||||
// case-insensitively compare
|
||||
lowerHeaders := make(map[string][]string, len(headers))
|
||||
for k, v := range headers {
|
||||
lowerHeaders[strings.ToLower(k)] = v
|
||||
}
|
||||
|
||||
result = make(map[string][]string, len(a.Headers))
|
||||
for key, settings := range a.Headers {
|
||||
if val, ok := headers[key]; ok {
|
||||
if val, ok := lowerHeaders[key]; ok {
|
||||
// copy the header values so we don't overwrite them
|
||||
hVals := make([]string, len(val))
|
||||
copy(hVals, val)
|
||||
|
@ -120,8 +140,15 @@ func (c *Core) setupAuditedHeadersConfig() error {
|
|||
}
|
||||
}
|
||||
|
||||
// Ensure that we are able to case-sensitively access the headers;
|
||||
// necessary for the upgrade case
|
||||
lowerHeaders := make(map[string]*auditedHeaderSettings, len(headers))
|
||||
for k, v := range headers {
|
||||
lowerHeaders[strings.ToLower(k)] = v
|
||||
}
|
||||
|
||||
c.auditedHeaders = &AuditedHeadersConfig{
|
||||
Headers: headers,
|
||||
Headers: lowerHeaders,
|
||||
view: view,
|
||||
}
|
||||
|
||||
|
|
|
@ -29,7 +29,7 @@ func testAuditedHeadersConfig_Add(t *testing.T, conf *AuditedHeadersConfig) {
|
|||
t.Fatalf("Error when adding header to config: %s", err)
|
||||
}
|
||||
|
||||
settings, ok := conf.Headers["X-Test-Header"]
|
||||
settings, ok := conf.Headers["x-test-header"]
|
||||
if !ok {
|
||||
t.Fatal("Expected header to be found in config")
|
||||
}
|
||||
|
@ -50,7 +50,7 @@ func testAuditedHeadersConfig_Add(t *testing.T, conf *AuditedHeadersConfig) {
|
|||
}
|
||||
|
||||
expected := map[string]*auditedHeaderSettings{
|
||||
"X-Test-Header": &auditedHeaderSettings{
|
||||
"x-test-header": &auditedHeaderSettings{
|
||||
HMAC: false,
|
||||
},
|
||||
}
|
||||
|
@ -64,7 +64,7 @@ func testAuditedHeadersConfig_Add(t *testing.T, conf *AuditedHeadersConfig) {
|
|||
t.Fatalf("Error when adding header to config: %s", err)
|
||||
}
|
||||
|
||||
settings, ok = conf.Headers["X-Vault-Header"]
|
||||
settings, ok = conf.Headers["x-vault-header"]
|
||||
if !ok {
|
||||
t.Fatal("Expected header to be found in config")
|
||||
}
|
||||
|
@ -84,7 +84,7 @@ func testAuditedHeadersConfig_Add(t *testing.T, conf *AuditedHeadersConfig) {
|
|||
t.Fatalf("Error decoding header view: %s", err)
|
||||
}
|
||||
|
||||
expected["X-Vault-Header"] = &auditedHeaderSettings{
|
||||
expected["x-vault-header"] = &auditedHeaderSettings{
|
||||
HMAC: true,
|
||||
}
|
||||
|
||||
|
@ -100,7 +100,7 @@ func testAuditedHeadersConfig_Remove(t *testing.T, conf *AuditedHeadersConfig) {
|
|||
t.Fatalf("Error when adding header to config: %s", err)
|
||||
}
|
||||
|
||||
_, ok := conf.Headers["X-Test-Header"]
|
||||
_, ok := conf.Headers["x-Test-HeAder"]
|
||||
if ok {
|
||||
t.Fatal("Expected header to not be found in config")
|
||||
}
|
||||
|
@ -117,7 +117,7 @@ func testAuditedHeadersConfig_Remove(t *testing.T, conf *AuditedHeadersConfig) {
|
|||
}
|
||||
|
||||
expected := map[string]*auditedHeaderSettings{
|
||||
"X-Vault-Header": &auditedHeaderSettings{
|
||||
"x-vault-header": &auditedHeaderSettings{
|
||||
HMAC: true,
|
||||
},
|
||||
}
|
||||
|
@ -126,12 +126,12 @@ func testAuditedHeadersConfig_Remove(t *testing.T, conf *AuditedHeadersConfig) {
|
|||
t.Fatalf("Expected config didn't match actual. Expected: %#v, Got: %#v", expected, headers)
|
||||
}
|
||||
|
||||
err = conf.remove("X-Vault-Header")
|
||||
err = conf.remove("x-VaulT-Header")
|
||||
if err != nil {
|
||||
t.Fatalf("Error when adding header to config: %s", err)
|
||||
}
|
||||
|
||||
_, ok = conf.Headers["X-Vault-Header"]
|
||||
_, ok = conf.Headers["x-vault-header"]
|
||||
if ok {
|
||||
t.Fatal("Expected header to not be found in config")
|
||||
}
|
||||
|
@ -157,10 +157,8 @@ func testAuditedHeadersConfig_Remove(t *testing.T, conf *AuditedHeadersConfig) {
|
|||
func TestAuditedHeadersConfig_ApplyConfig(t *testing.T) {
|
||||
conf := mockAuditedHeadersConfig(t)
|
||||
|
||||
conf.Headers = map[string]*auditedHeaderSettings{
|
||||
"X-Test-Header": &auditedHeaderSettings{false},
|
||||
"X-Vault-Header": &auditedHeaderSettings{true},
|
||||
}
|
||||
conf.add("X-TesT-Header", false)
|
||||
conf.add("X-Vault-HeAdEr", true)
|
||||
|
||||
reqHeaders := map[string][]string{
|
||||
"X-Test-Header": []string{"foo"},
|
||||
|
@ -173,8 +171,8 @@ func TestAuditedHeadersConfig_ApplyConfig(t *testing.T) {
|
|||
result := conf.ApplyConfig(reqHeaders, hashFunc)
|
||||
|
||||
expected := map[string][]string{
|
||||
"X-Test-Header": []string{"foo"},
|
||||
"X-Vault-Header": []string{"hashed", "hashed"},
|
||||
"x-test-header": []string{"foo"},
|
||||
"x-vault-header": []string{"hashed", "hashed"},
|
||||
}
|
||||
|
||||
if !reflect.DeepEqual(result, expected) {
|
||||
|
|
Loading…
Reference in a new issue