mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-02 11:38:02 +00:00
* VAULT-22481: Audit filter node (#24465) * Initial commit on adding filter nodes for audit * tests for audit filter * test: longer filter - more conditions * copywrite headers * Check interface for the right type * Add audit filtering feature (#24554) * Support filter nodes in backend factories and add some tests * More tests and cleanup * Attempt to move control of registration for nodes and pipelines to the audit broker (#24505) * invert control of the pipelines/nodes to the audit broker vs. within each backend * update noop audit test code to implement the pipeliner interface * noop mount path has trailing slash * attempting to make NoopAudit more friendly * NoopAudit uses known salt * Refactor audit.ProcessManual to support filter nodes * HasFiltering * rename the pipeliner * use exported AuditEvent in Filter * Add tests for registering and deregistering backends on the audit broker * Add missing licence header to one file, fix a typo in two tests --------- Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com> * Add changelog file * update bexpr datum to use a strong type * go docs updates * test path * PR review comments * handle scenarios/outcomes from broker.send * don't need to re-check the complete sinks * add extra check to deregister to ensure that re-registering non-filtered device sets sink threshold * Ensure that the multierror is appended before attempting to return it --------- Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
92 lines
2.3 KiB
Go
92 lines
2.3 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package audit
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/hashicorp/eventlogger"
|
|
"github.com/hashicorp/go-bexpr"
|
|
"github.com/hashicorp/vault/helper/namespace"
|
|
"github.com/hashicorp/vault/internal/observability/event"
|
|
)
|
|
|
|
var _ eventlogger.Node = (*EntryFilter)(nil)
|
|
|
|
// NewEntryFilter should be used to create an EntryFilter node.
|
|
// The filter supplied should be in bexpr format and reference fields from logical.LogInputBexpr.
|
|
func NewEntryFilter(filter string) (*EntryFilter, error) {
|
|
const op = "audit.NewEntryFilter"
|
|
|
|
filter = strings.TrimSpace(filter)
|
|
if filter == "" {
|
|
return nil, fmt.Errorf("%s: cannot create new audit filter with empty filter expression: %w", op, event.ErrInvalidParameter)
|
|
}
|
|
|
|
eval, err := bexpr.CreateEvaluator(filter)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("%s: cannot create new audit filter: %w", op, err)
|
|
}
|
|
|
|
return &EntryFilter{evaluator: eval}, nil
|
|
}
|
|
|
|
// Reopen is a no-op for the filter node.
|
|
func (*EntryFilter) Reopen() error {
|
|
return nil
|
|
}
|
|
|
|
// Type describes the type of this node (filter).
|
|
func (*EntryFilter) Type() eventlogger.NodeType {
|
|
return eventlogger.NodeTypeFilter
|
|
}
|
|
|
|
// Process will attempt to parse the incoming event data and decide whether it
|
|
// should be filtered or remain in the pipeline and passed to the next node.
|
|
func (f *EntryFilter) Process(ctx context.Context, e *eventlogger.Event) (*eventlogger.Event, error) {
|
|
const op = "audit.(EntryFilter).Process"
|
|
|
|
select {
|
|
case <-ctx.Done():
|
|
return nil, ctx.Err()
|
|
default:
|
|
}
|
|
|
|
if e == nil {
|
|
return nil, fmt.Errorf("%s: event is nil: %w", op, event.ErrInvalidParameter)
|
|
}
|
|
|
|
a, ok := e.Payload.(*AuditEvent)
|
|
if !ok {
|
|
return nil, fmt.Errorf("%s: cannot parse event payload: %w", op, event.ErrInvalidParameter)
|
|
}
|
|
|
|
// If we don't have data to process, then we're done.
|
|
if a.Data == nil {
|
|
return nil, nil
|
|
}
|
|
|
|
ns, err := namespace.FromContext(ctx)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("%s: cannot obtain namespace: %w", op, err)
|
|
}
|
|
|
|
datum := a.Data.BexprDatum(ns.Path)
|
|
|
|
result, err := f.evaluator.Evaluate(datum)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("%s: unable to evaluate filter: %w", op, err)
|
|
}
|
|
|
|
if result {
|
|
// Allow this event to carry on through the pipeline.
|
|
return e, nil
|
|
}
|
|
|
|
// End process of this pipeline.
|
|
return nil, nil
|
|
}
|