package physical import ( "fmt" "sync" log "github.com/mgutz/logxi/v1" ) const DefaultParallelOperations = 128 // ShutdownSignal type ShutdownChannel chan struct{} // Backend is the interface required for a physical // backend. A physical backend is used to durably store // data outside of Vault. As such, it is completely untrusted, // and is only accessed via a security barrier. The backends // must represent keys in a hierarchical manner. All methods // are expected to be thread safe. type Backend interface { // Put is used to insert or update an entry Put(entry *Entry) error // Get is used to fetch an entry Get(key string) (*Entry, error) // Delete is used to permanently delete an entry Delete(key string) error // List is used ot list all the keys under a given // prefix, up to the next prefix. List(prefix string) ([]string, error) } // HABackend is an extensions to the standard physical // backend to support high-availability. Vault only expects to // use mutual exclusion to allow multiple instances to act as a // hot standby for a leader that services all requests. type HABackend interface { // LockWith is used for mutual exclusion based on the given key. LockWith(key, value string) (Lock, error) // Whether or not HA functionality is enabled HAEnabled() bool } // Purgable is an optional interface for backends that support // purging of their caches. type Purgable interface { Purge() } // RedirectDetect is an optional interface that an HABackend // can implement. If they do, a redirect address can be automatically // detected. type RedirectDetect interface { // DetectHostAddr is used to detect the host address DetectHostAddr() (string, error) } // Callback signatures for RunServiceDiscovery type activeFunction func() bool type sealedFunction func() bool // ServiceDiscovery is an optional interface that an HABackend can implement. // If they do, the state of a backend is advertised to the service discovery // network. type ServiceDiscovery interface { // NotifyActiveStateChange is used by Core to notify a backend // capable of ServiceDiscovery that this Vault instance has changed // its status to active or standby. NotifyActiveStateChange() error // NotifySealedStateChange is used by Core to notify a backend // capable of ServiceDiscovery that Vault has changed its Sealed // status to sealed or unsealed. NotifySealedStateChange() error // Run executes any background service discovery tasks until the // shutdown channel is closed. RunServiceDiscovery(waitGroup *sync.WaitGroup, shutdownCh ShutdownChannel, redirectAddr string, activeFunc activeFunction, sealedFunc sealedFunction) error } type Lock interface { // Lock is used to acquire the given lock // The stopCh is optional and if closed should interrupt the lock // acquisition attempt. The return struct should be closed when // leadership is lost. Lock(stopCh <-chan struct{}) (<-chan struct{}, error) // Unlock is used to release the lock Unlock() error // Returns the value of the lock and if it is held Value() (bool, string, error) } // Entry is used to represent data stored by the physical backend type Entry struct { Key string Value []byte } // Factory is the factory function to create a physical backend. type Factory func(config map[string]string, logger log.Logger) (Backend, error) // NewBackend returns a new backend with the given type and configuration. // The backend is looked up in the builtinBackends variable. func NewBackend(t string, logger log.Logger, conf map[string]string) (Backend, error) { f, ok := builtinBackends[t] if !ok { return nil, fmt.Errorf("unknown physical backend type: %s", t) } return f(conf, logger) } // BuiltinBackends is the list of built-in physical backends that can // be used with NewBackend. var builtinBackends = map[string]Factory{ "inmem": func(_ map[string]string, logger log.Logger) (Backend, error) { return NewInmem(logger), nil }, "inmem_ha": func(_ map[string]string, logger log.Logger) (Backend, error) { return NewInmemHA(logger), nil }, "consul": newConsulBackend, "zookeeper": newZookeeperBackend, "file": newFileBackend, "s3": newS3Backend, "azure": newAzureBackend, "dynamodb": newDynamoDBBackend, "etcd": newEtcdBackend, "mysql": newMySQLBackend, "postgresql": newPostgreSQLBackend, "swift": newSwiftBackend, "gcs": newGCSBackend, } // PermitPool is used to limit maximum outstanding requests type PermitPool struct { sem chan int } // NewPermitPool returns a new permit pool with the provided // number of permits func NewPermitPool(permits int) *PermitPool { if permits < 1 { permits = DefaultParallelOperations } return &PermitPool{ sem: make(chan int, permits), } } // Acquire returns when a permit has been acquired func (c *PermitPool) Acquire() { c.sem <- 1 } // Release returns a permit to the pool func (c *PermitPool) Release() { <-c.sem }