backport of commit 547bff752e056ff81d4359267e0f8afa4629f505 (#23321)

This commit is contained in:
hc-github-team-secure-vault-core 2023-09-27 16:03:53 -04:00 committed by GitHub
parent fb88d3e4ec
commit d8d5e440fe
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 36 additions and 23 deletions

3
changelog/23282.txt Normal file
View File

@ -0,0 +1,3 @@
```release-note:bug
expiration: Prevent large lease loads from delaying state changes, e.g. becoming active or standby.
```

View File

@ -147,7 +147,7 @@ type ExpirationManager struct {
leaseCheckCounter *uint32 leaseCheckCounter *uint32
logLeaseExpirations bool logLeaseExpirations bool
expireFunc ExpireLeaseStrategy expireFunc atomic.Pointer[ExpireLeaseStrategy]
// testRegisterAuthFailure, if set to true, triggers an explicit failure on // testRegisterAuthFailure, if set to true, triggers an explicit failure on
// RegisterAuth to simulate a partial failure during a token creation // RegisterAuth to simulate a partial failure during a token creation
@ -360,11 +360,11 @@ func NewExpirationManager(c *Core, view *BarrierView, e ExpireLeaseStrategy, log
leaseCheckCounter: new(uint32), leaseCheckCounter: new(uint32),
logLeaseExpirations: os.Getenv("VAULT_SKIP_LOGGING_LEASE_EXPIRATIONS") == "", logLeaseExpirations: os.Getenv("VAULT_SKIP_LOGGING_LEASE_EXPIRATIONS") == "",
expireFunc: e,
jobManager: jobManager, jobManager: jobManager,
revokeRetryBase: c.expirationRevokeRetryBase, revokeRetryBase: c.expirationRevokeRetryBase,
} }
exp.expireFunc.Store(&e)
if exp.revokeRetryBase == 0 { if exp.revokeRetryBase == 0 {
exp.revokeRetryBase = revokeRetryBase exp.revokeRetryBase = revokeRetryBase
} }
@ -846,6 +846,8 @@ func (m *ExpirationManager) processRestore(ctx context.Context, leaseID string)
return nil return nil
} }
func expireNoop(ctx context.Context, manager *ExpirationManager, s string, n *namespace.Namespace) {}
// Stop is used to prevent further automatic revocations. // Stop is used to prevent further automatic revocations.
// This must be called before sealing the view. // This must be called before sealing the view.
func (m *ExpirationManager) Stop() error { func (m *ExpirationManager) Stop() error {
@ -860,27 +862,24 @@ func (m *ExpirationManager) Stop() error {
close(m.quitCh) close(m.quitCh)
m.pendingLock.Lock() m.pendingLock.Lock()
// Replacing the entire map would cause a race with // We don't want any lease timers that fire to do anything; they can wait
// a simultaneous WalkTokens, which doesn't hold pendingLock. // for the next ExpirationManager to handle them.
m.pending.Range(func(key, value interface{}) bool { newStrategy := ExpireLeaseStrategy(expireNoop)
info := value.(pendingInfo) m.expireFunc.Store(&newStrategy)
info.timer.Stop() oldPending := m.pending
m.pending.Delete(key) m.pending, m.nonexpiring, m.irrevocable = sync.Map{}, sync.Map{}, sync.Map{}
return true
})
m.leaseCount = 0 m.leaseCount = 0
m.nonexpiring.Range(func(key, value interface{}) bool {
m.nonexpiring.Delete(key)
return true
})
m.uniquePolicies = make(map[string][]string) m.uniquePolicies = make(map[string][]string)
m.irrevocable.Range(func(key, _ interface{}) bool {
m.irrevocable.Delete(key)
return true
})
m.irrevocableLeaseCount = 0 m.irrevocableLeaseCount = 0
m.pendingLock.Unlock() m.pendingLock.Unlock()
go oldPending.Range(func(key, value interface{}) bool {
info := value.(pendingInfo)
// We need to stop the timers to prevent memory leaks.
info.timer.Stop()
return true
})
if m.inRestoreMode() { if m.inRestoreMode() {
for { for {
if !m.inRestoreMode() { if !m.inRestoreMode() {
@ -1881,7 +1880,8 @@ func (m *ExpirationManager) updatePendingInternal(le *leaseEntry) {
leaseID, namespace := le.LeaseID, le.namespace leaseID, namespace := le.LeaseID, le.namespace
// Extend the timer by the lease total // Extend the timer by the lease total
timer := time.AfterFunc(leaseTotal, func() { timer := time.AfterFunc(leaseTotal, func() {
m.expireFunc(m.quitContext, m, leaseID, namespace) expFn := *m.expireFunc.Load() // Load and deref the pointer
expFn(m.quitContext, m, leaseID, namespace)
}) })
pending = pendingInfo{ pending = pendingInfo{
timer: timer, timer: timer,
@ -2471,8 +2471,13 @@ func (m *ExpirationManager) WalkTokens(walkFn ExpirationWalkFunction) error {
return true return true
} }
m.pending.Range(callback) m.pendingLock.RLock()
m.nonexpiring.Range(callback) toWalk := []sync.Map{m.pending, m.nonexpiring}
m.pendingLock.RUnlock()
for _, m := range toWalk {
m.Range(callback)
}
return nil return nil
} }
@ -2495,8 +2500,13 @@ func (m *ExpirationManager) walkLeases(walkFn leaseWalkFunction) error {
return walkFn(key.(string), expireTime) return walkFn(key.(string), expireTime)
} }
m.pending.Range(callback) m.pendingLock.RLock()
m.nonexpiring.Range(callback) toWalk := []sync.Map{m.pending, m.nonexpiring}
m.pendingLock.RUnlock()
for _, m := range toWalk {
m.Range(callback)
}
return nil return nil
} }