mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-04 04:28:08 +00:00 
			
		
		
		
	This endpoint causes the node it's hit to step down from active duty. It's a noop if the node isn't active or not running in HA mode. The node will wait one second before attempting to reacquire the lock, to give other nodes a chance to grab it. Fixes #1093
		
			
				
	
	
		
			168 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			168 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package http
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/hex"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"net/http"
 | 
						|
 | 
						|
	"github.com/hashicorp/errwrap"
 | 
						|
	"github.com/hashicorp/vault/logical"
 | 
						|
	"github.com/hashicorp/vault/vault"
 | 
						|
)
 | 
						|
 | 
						|
func handleSysSeal(core *vault.Core) http.Handler {
 | 
						|
	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
						|
		switch r.Method {
 | 
						|
		case "PUT":
 | 
						|
		case "POST":
 | 
						|
		default:
 | 
						|
			respondError(w, http.StatusMethodNotAllowed, nil)
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		// Get the auth for the request so we can access the token directly
 | 
						|
		req := requestAuth(r, &logical.Request{})
 | 
						|
 | 
						|
		// Seal with the token above
 | 
						|
		if err := core.Seal(req.ClientToken); err != nil {
 | 
						|
			respondError(w, http.StatusInternalServerError, err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		respondOk(w, nil)
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
func handleSysStepDown(core *vault.Core) http.Handler {
 | 
						|
	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
						|
		switch r.Method {
 | 
						|
		case "PUT":
 | 
						|
		case "POST":
 | 
						|
		default:
 | 
						|
			respondError(w, http.StatusMethodNotAllowed, nil)
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		// Get the auth for the request so we can access the token directly
 | 
						|
		req := requestAuth(r, &logical.Request{})
 | 
						|
 | 
						|
		// Seal with the token above
 | 
						|
		if err := core.StepDown(req.ClientToken); err != nil {
 | 
						|
			respondError(w, http.StatusInternalServerError, err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		respondOk(w, nil)
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
func handleSysUnseal(core *vault.Core) http.Handler {
 | 
						|
	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
						|
		switch r.Method {
 | 
						|
		case "PUT":
 | 
						|
		case "POST":
 | 
						|
		default:
 | 
						|
			respondError(w, http.StatusMethodNotAllowed, nil)
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		// Parse the request
 | 
						|
		var req UnsealRequest
 | 
						|
		if err := parseRequest(r, &req); err != nil {
 | 
						|
			respondError(w, http.StatusBadRequest, err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
		if !req.Reset && req.Key == "" {
 | 
						|
			respondError(
 | 
						|
				w, http.StatusBadRequest,
 | 
						|
				errors.New("'key' must specified in request body as JSON, or 'reset' set to true"))
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		if req.Reset {
 | 
						|
			sealed, err := core.Sealed()
 | 
						|
			if err != nil {
 | 
						|
				respondError(w, http.StatusInternalServerError, err)
 | 
						|
				return
 | 
						|
			}
 | 
						|
			if !sealed {
 | 
						|
				respondError(w, http.StatusBadRequest, errors.New("vault is unsealed"))
 | 
						|
				return
 | 
						|
			}
 | 
						|
			core.ResetUnsealProcess()
 | 
						|
		} else {
 | 
						|
			// Decode the key, which is hex encoded
 | 
						|
			key, err := hex.DecodeString(req.Key)
 | 
						|
			if err != nil {
 | 
						|
				respondError(
 | 
						|
					w, http.StatusBadRequest,
 | 
						|
					errors.New("'key' must be a valid hex-string"))
 | 
						|
				return
 | 
						|
			}
 | 
						|
 | 
						|
			// Attempt the unseal
 | 
						|
			if _, err := core.Unseal(key); err != nil {
 | 
						|
				// Ignore ErrInvalidKey because its a user error that we
 | 
						|
				// mask away. We just show them the seal status.
 | 
						|
				if !errwrap.ContainsType(err, new(vault.ErrInvalidKey)) {
 | 
						|
					respondError(w, http.StatusInternalServerError, err)
 | 
						|
					return
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		// Return the seal status
 | 
						|
		handleSysSealStatusRaw(core, w, r)
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
func handleSysSealStatus(core *vault.Core) http.Handler {
 | 
						|
	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
						|
		if r.Method != "GET" {
 | 
						|
			respondError(w, http.StatusMethodNotAllowed, nil)
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		handleSysSealStatusRaw(core, w, r)
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
func handleSysSealStatusRaw(core *vault.Core, w http.ResponseWriter, r *http.Request) {
 | 
						|
	sealed, err := core.Sealed()
 | 
						|
	if err != nil {
 | 
						|
		respondError(w, http.StatusInternalServerError, err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	sealConfig, err := core.SealConfig()
 | 
						|
	if err != nil {
 | 
						|
		respondError(w, http.StatusInternalServerError, err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	if sealConfig == nil {
 | 
						|
		respondError(w, http.StatusBadRequest, fmt.Errorf(
 | 
						|
			"server is not yet initialized"))
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	respondOk(w, &SealStatusResponse{
 | 
						|
		Sealed:   sealed,
 | 
						|
		T:        sealConfig.SecretThreshold,
 | 
						|
		N:        sealConfig.SecretShares,
 | 
						|
		Progress: core.SecretProgress(),
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
type SealStatusResponse struct {
 | 
						|
	Sealed   bool `json:"sealed"`
 | 
						|
	T        int  `json:"t"`
 | 
						|
	N        int  `json:"n"`
 | 
						|
	Progress int  `json:"progress"`
 | 
						|
}
 | 
						|
 | 
						|
type UnsealRequest struct {
 | 
						|
	Key   string
 | 
						|
	Reset bool
 | 
						|
}
 |