mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-03 20:17:59 +00:00
* Adding explicit MPL license for sub-package. This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Adding explicit MPL license for sub-package. This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Updating the license from MPL to Business Source License. Going forward, this project will be licensed under the Business Source License v1.1. Please see our blog post for more details at https://hashi.co/bsl-blog, FAQ at www.hashicorp.com/licensing-faq, and details of the license at www.hashicorp.com/bsl. * add missing license headers * Update copyright file headers to BUS-1.1 * Fix test that expected exact offset on hcl file --------- Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com> Co-authored-by: Sarah Thompson <sthompson@hashicorp.com> Co-authored-by: Brian Kassouf <bkassouf@hashicorp.com>
268 lines
7.7 KiB
Go
268 lines
7.7 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package vault
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/hashicorp/go-secure-stdlib/parseutil"
|
|
"github.com/hashicorp/vault/sdk/framework"
|
|
"github.com/hashicorp/vault/sdk/helper/jsonutil"
|
|
"github.com/hashicorp/vault/sdk/helper/wrapping"
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
)
|
|
|
|
// PassthroughBackendFactory returns a PassthroughBackend
|
|
// with leases switched off
|
|
func PassthroughBackendFactory(ctx context.Context, conf *logical.BackendConfig) (logical.Backend, error) {
|
|
return LeaseSwitchedPassthroughBackend(ctx, conf, nil)
|
|
}
|
|
|
|
// LeasedPassthroughBackendFactory returns a PassthroughBackend
|
|
// with leases switched on
|
|
func LeasedPassthroughBackendFactory(ctx context.Context, conf *logical.BackendConfig) (logical.Backend, error) {
|
|
return LeaseSwitchedPassthroughBackend(ctx, conf, func(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
return nil, nil
|
|
})
|
|
}
|
|
|
|
type revokeFunc func(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error)
|
|
|
|
// LeaseSwitchedPassthroughBackend returns a PassthroughBackend
|
|
// with leases switched on or off
|
|
func LeaseSwitchedPassthroughBackend(ctx context.Context, conf *logical.BackendConfig, revoke revokeFunc) (logical.Backend, error) {
|
|
var b PassthroughBackend
|
|
if revoke == nil {
|
|
// We probably don't need this, since we should never have to handle revoke requests, but just in case...
|
|
b.revoke = func(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
return nil, nil
|
|
}
|
|
} else {
|
|
b.generateLeases = true
|
|
b.revoke = revoke
|
|
}
|
|
b.Backend = &framework.Backend{
|
|
Help: strings.TrimSpace(passthroughHelp),
|
|
|
|
PathsSpecial: &logical.Paths{
|
|
SealWrapStorage: []string{
|
|
"*",
|
|
},
|
|
},
|
|
|
|
Paths: []*framework.Path{
|
|
{
|
|
Pattern: ".*",
|
|
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
|
logical.ReadOperation: b.handleRead,
|
|
logical.CreateOperation: b.handleWrite,
|
|
logical.UpdateOperation: b.handleWrite,
|
|
logical.DeleteOperation: b.handleDelete,
|
|
logical.ListOperation: b.handleList,
|
|
},
|
|
|
|
ExistenceCheck: b.handleExistenceCheck,
|
|
|
|
HelpSynopsis: strings.TrimSpace(passthroughHelpSynopsis),
|
|
HelpDescription: strings.TrimSpace(passthroughHelpDescription),
|
|
},
|
|
},
|
|
BackendType: logical.TypeLogical,
|
|
}
|
|
|
|
b.Backend.Secrets = []*framework.Secret{
|
|
{
|
|
Type: "kv",
|
|
|
|
Renew: b.handleRead,
|
|
Revoke: b.revoke,
|
|
},
|
|
}
|
|
|
|
if conf == nil {
|
|
return nil, fmt.Errorf("configuration passed into backend is nil")
|
|
}
|
|
b.Backend.Setup(ctx, conf)
|
|
|
|
return &b, nil
|
|
}
|
|
|
|
// PassthroughBackend is used storing secrets directly into the physical
|
|
// backend. The secrets are encrypted in the durable storage and custom TTL
|
|
// information can be specified, but otherwise this backend doesn't do anything
|
|
// fancy.
|
|
type PassthroughBackend struct {
|
|
*framework.Backend
|
|
generateLeases bool
|
|
revoke func(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error)
|
|
}
|
|
|
|
func (b *PassthroughBackend) handleRevoke(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
// This is a no-op
|
|
return nil, nil
|
|
}
|
|
|
|
func (b *PassthroughBackend) handleExistenceCheck(ctx context.Context, req *logical.Request, data *framework.FieldData) (bool, error) {
|
|
out, err := req.Storage.Get(ctx, req.Path)
|
|
if err != nil {
|
|
return false, fmt.Errorf("existence check failed: %w", err)
|
|
}
|
|
|
|
return out != nil, nil
|
|
}
|
|
|
|
func (b *PassthroughBackend) handleRead(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
// Read the path
|
|
out, err := req.Storage.Get(ctx, req.Path)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("read failed: %w", err)
|
|
}
|
|
|
|
// Fast-path the no data case
|
|
if out == nil {
|
|
return nil, nil
|
|
}
|
|
|
|
// Decode the data
|
|
var rawData map[string]interface{}
|
|
|
|
if err := jsonutil.DecodeJSON(out.Value, &rawData); err != nil {
|
|
return nil, fmt.Errorf("json decoding failed: %w", err)
|
|
}
|
|
|
|
var resp *logical.Response
|
|
if b.generateLeases {
|
|
// Generate the response
|
|
resp = b.Secret("kv").Response(rawData, nil)
|
|
resp.Secret.Renewable = false
|
|
} else {
|
|
resp = &logical.Response{
|
|
Secret: &logical.Secret{},
|
|
Data: rawData,
|
|
}
|
|
}
|
|
|
|
// Ensure seal wrapping is carried through if the response is
|
|
// response-wrapped
|
|
if out.SealWrap {
|
|
if resp.WrapInfo == nil {
|
|
resp.WrapInfo = &wrapping.ResponseWrapInfo{}
|
|
}
|
|
resp.WrapInfo.SealWrap = out.SealWrap
|
|
}
|
|
|
|
// Check if there is a ttl key
|
|
ttlDuration := b.System().DefaultLeaseTTL()
|
|
ttlRaw, ok := rawData["ttl"]
|
|
if !ok {
|
|
ttlRaw, ok = rawData["lease"]
|
|
}
|
|
if ok {
|
|
dur, err := parseutil.ParseDurationSecond(ttlRaw)
|
|
if err == nil {
|
|
ttlDuration = dur
|
|
}
|
|
|
|
if b.generateLeases {
|
|
resp.Secret.Renewable = true
|
|
}
|
|
}
|
|
|
|
resp.Secret.TTL = ttlDuration
|
|
|
|
return resp, nil
|
|
}
|
|
|
|
func (b *PassthroughBackend) GeneratesLeases() bool {
|
|
return b.generateLeases
|
|
}
|
|
|
|
func (b *PassthroughBackend) handleWrite(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
if req.Path == "" {
|
|
return logical.ErrorResponse("missing path"), nil
|
|
}
|
|
|
|
// Check that some fields are given
|
|
if len(req.Data) == 0 {
|
|
return logical.ErrorResponse("missing data fields"), nil
|
|
}
|
|
|
|
// JSON encode the data
|
|
buf, err := json.Marshal(req.Data)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("json encoding failed: %w", err)
|
|
}
|
|
|
|
// Write out a new key
|
|
entry := &logical.StorageEntry{
|
|
Key: req.Path,
|
|
Value: buf,
|
|
}
|
|
if err := req.Storage.Put(ctx, entry); err != nil {
|
|
return nil, fmt.Errorf("failed to write: %w", err)
|
|
}
|
|
|
|
return nil, nil
|
|
}
|
|
|
|
func (b *PassthroughBackend) handleDelete(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
// Delete the key at the request path
|
|
if err := req.Storage.Delete(ctx, req.Path); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return nil, nil
|
|
}
|
|
|
|
func (b *PassthroughBackend) handleList(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
// Right now we only handle directories, so ensure it ends with /; however,
|
|
// some physical backends may not handle the "/" case properly, so only add
|
|
// it if we're not listing the root
|
|
path := req.Path
|
|
if path != "" && !strings.HasSuffix(path, "/") {
|
|
path = path + "/"
|
|
}
|
|
|
|
// List the keys at the prefix given by the request
|
|
keys, err := req.Storage.List(ctx, path)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Generate the response
|
|
return logical.ListResponse(keys), nil
|
|
}
|
|
|
|
const passthroughHelp = `
|
|
The kv backend reads and writes arbitrary secrets to the backend.
|
|
The secrets are encrypted/decrypted by Vault: they are never stored
|
|
unencrypted in the backend and the backend never has an opportunity to
|
|
see the unencrypted value.
|
|
|
|
TTLs can be set on a per-secret basis. These TTLs will be sent down
|
|
when that secret is read, and it is assumed that some outside process will
|
|
revoke and/or replace the secret at that path.
|
|
`
|
|
|
|
const passthroughHelpSynopsis = `
|
|
Pass-through secret storage to the storage backend, allowing you to
|
|
read/write arbitrary data into secret storage.
|
|
`
|
|
|
|
const passthroughHelpDescription = `
|
|
The pass-through backend reads and writes arbitrary data into secret storage,
|
|
encrypting it along the way.
|
|
|
|
A TTL can be specified when writing with the "ttl" field. If given, the
|
|
duration of leases returned by this backend will be set to this value. This
|
|
can be used as a hint from the writer of a secret to the consumer of a secret
|
|
that the consumer should re-read the value before the TTL has expired.
|
|
However, any revocation must be handled by the user of this backend; the lease
|
|
duration does not affect the provided data in any way.
|
|
`
|