ebf8e5308a
* port SSCT OSS * port header hmac key to ent and generate token proto without make command * remove extra nil check in request handling * add changelog * add comment to router.go * change test var to use length constants * remove local index is 0 check and extra defer which can be removed after use of ExternalID
155 lines
4.4 KiB
Go
155 lines
4.4 KiB
Go
package vault
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/hashicorp/vault/sdk/helper/consts"
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
)
|
|
|
|
const (
|
|
vaultVersionPath string = "core/versions/"
|
|
)
|
|
|
|
// storeVersionTimestamp will store the version and timestamp pair to storage
|
|
// only if no entry for that version already exists in storage. Version
|
|
// timestamps were initially stored in local time. UTC should be used. Existing
|
|
// entries can be overwritten via the force flag. A bool will be returned
|
|
// denoting whether the entry was updated
|
|
func (c *Core) storeVersionTimestamp(ctx context.Context, version string, timestampInstalled time.Time, force bool) (bool, error) {
|
|
key := vaultVersionPath + version
|
|
|
|
vaultVersion := VaultVersion{
|
|
TimestampInstalled: timestampInstalled.UTC(),
|
|
Version: version,
|
|
}
|
|
|
|
marshalledVaultVersion, err := json.Marshal(vaultVersion)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
newEntry := &logical.StorageEntry{
|
|
Key: key,
|
|
Value: marshalledVaultVersion,
|
|
}
|
|
|
|
if force {
|
|
// avoid storage lookup and write immediately
|
|
err = c.barrier.Put(ctx, newEntry)
|
|
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
return true, nil
|
|
}
|
|
|
|
existingEntry, err := c.barrier.Get(ctx, key)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
if existingEntry != nil {
|
|
return false, nil
|
|
}
|
|
|
|
err = c.barrier.Put(ctx, newEntry)
|
|
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
return true, nil
|
|
}
|
|
|
|
// FindOldestVersionTimestamp searches for the vault version with the oldest
|
|
// upgrade timestamp from storage. The earliest version this can be is 1.9.0.
|
|
func (c *Core) FindOldestVersionTimestamp() (string, time.Time, error) {
|
|
if c.versionTimestamps == nil || len(c.versionTimestamps) == 0 {
|
|
return "", time.Time{}, fmt.Errorf("version timestamps are not initialized")
|
|
}
|
|
|
|
oldestUpgradeTime := time.Now().UTC()
|
|
var oldestVersion string
|
|
|
|
for version, upgradeTime := range c.versionTimestamps {
|
|
if upgradeTime.Before(oldestUpgradeTime) {
|
|
oldestVersion = version
|
|
oldestUpgradeTime = upgradeTime
|
|
}
|
|
}
|
|
return oldestVersion, oldestUpgradeTime, nil
|
|
}
|
|
|
|
// loadVersionTimestamps loads all the vault versions and associated upgrade
|
|
// timestamps from storage. Version timestamps were originally stored in local
|
|
// time. A timestamp that is not in UTC will be rewritten to storage as UTC.
|
|
func (c *Core) loadVersionTimestamps(ctx context.Context) error {
|
|
vaultVersions, err := c.barrier.List(ctx, vaultVersionPath)
|
|
if err != nil {
|
|
return fmt.Errorf("unable to retrieve vault versions from storage: %w", err)
|
|
}
|
|
|
|
for _, versionPath := range vaultVersions {
|
|
version, err := c.barrier.Get(ctx, vaultVersionPath+versionPath)
|
|
if err != nil {
|
|
return fmt.Errorf("unable to read vault version at path %s: err %w", versionPath, err)
|
|
}
|
|
if version == nil {
|
|
return fmt.Errorf("nil version stored at path %s", versionPath)
|
|
}
|
|
var vaultVersion VaultVersion
|
|
err = json.Unmarshal(version.Value, &vaultVersion)
|
|
if err != nil {
|
|
return fmt.Errorf("unable to unmarshal vault version for path %s: err %w", versionPath, err)
|
|
}
|
|
if vaultVersion.Version == "" || vaultVersion.TimestampInstalled.IsZero() {
|
|
return fmt.Errorf("found empty serialized vault version at path %s", versionPath)
|
|
}
|
|
|
|
timestampInstalled := vaultVersion.TimestampInstalled
|
|
|
|
// self-heal entries that were not stored in UTC
|
|
if timestampInstalled.Location() != time.UTC {
|
|
timestampInstalled = timestampInstalled.UTC()
|
|
isUpdated, err := c.storeVersionTimestamp(ctx, vaultVersion.Version, timestampInstalled, true)
|
|
if err != nil {
|
|
c.logger.Warn("failed to rewrite vault version timestamp as UTC", "error", err)
|
|
}
|
|
|
|
if isUpdated {
|
|
c.logger.Info("self-healed pre-existing vault version in UTC",
|
|
"vault version", vaultVersion.Version, "UTC time", timestampInstalled)
|
|
}
|
|
}
|
|
|
|
c.versionTimestamps[vaultVersion.Version] = timestampInstalled
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func IsJWT(token string) bool {
|
|
return len(token) > 3 && strings.Count(token, ".") == 2 &&
|
|
(token[3] != '.' && token[1] != '.')
|
|
}
|
|
|
|
func IsSSCToken(token string) bool {
|
|
return len(token) > MaxNsIdLength+TokenLength+TokenPrefixLength &&
|
|
strings.HasPrefix(token, consts.ServiceTokenPrefix)
|
|
}
|
|
|
|
func IsServiceToken(token string) bool {
|
|
return strings.HasPrefix(token, consts.ServiceTokenPrefix) ||
|
|
strings.HasPrefix(token, consts.LegacyServiceTokenPrefix)
|
|
}
|
|
|
|
func IsBatchToken(token string) bool {
|
|
return strings.HasPrefix(token, consts.LegacyBatchTokenPrefix) ||
|
|
strings.HasPrefix(token, consts.BatchTokenPrefix)
|
|
}
|