mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 18:48:08 +00:00 
			
		
		
		
	 fe1f36a1dc
			
		
	
	fe1f36a1dc
	
	
	
		
			
			* Add SIGUSR2 pprof to agent * changelog * Update command/agent.go Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com> * Update command/agent.go Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com> * Add to proxy, update tests * Fix path * Changelog * dry * choose one error style --------- Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
		
			
				
	
	
		
			243 lines
		
	
	
		
			6.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			243 lines
		
	
	
		
			6.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright (c) HashiCorp, Inc.
 | |
| // SPDX-License-Identifier: BUSL-1.1
 | |
| 
 | |
| package command
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"net/http"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 	"runtime/pprof"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/fatih/color"
 | |
| 	"github.com/hashicorp/cli"
 | |
| 	"github.com/hashicorp/go-cleanhttp"
 | |
| 	"github.com/hashicorp/vault/api"
 | |
| 	"github.com/hashicorp/vault/api/cliconfig"
 | |
| 	"github.com/hashicorp/vault/api/tokenhelper"
 | |
| )
 | |
| 
 | |
| // DefaultTokenHelper returns the token helper that is configured for Vault.
 | |
| // This helper should only be used for non-server CLI commands.
 | |
| func DefaultTokenHelper() (tokenhelper.TokenHelper, error) {
 | |
| 	return cliconfig.DefaultTokenHelper()
 | |
| }
 | |
| 
 | |
| // RawField extracts the raw field from the given data and returns it as a
 | |
| // string for printing purposes.
 | |
| func RawField(secret *api.Secret, field string) interface{} {
 | |
| 	var val interface{}
 | |
| 	switch {
 | |
| 	case secret.Auth != nil:
 | |
| 		switch field {
 | |
| 		case "token":
 | |
| 			val = secret.Auth.ClientToken
 | |
| 		case "token_accessor":
 | |
| 			val = secret.Auth.Accessor
 | |
| 		case "token_duration":
 | |
| 			val = secret.Auth.LeaseDuration
 | |
| 		case "token_renewable":
 | |
| 			val = secret.Auth.Renewable
 | |
| 		case "token_policies":
 | |
| 			val = secret.Auth.TokenPolicies
 | |
| 		case "identity_policies":
 | |
| 			val = secret.Auth.IdentityPolicies
 | |
| 		case "policies":
 | |
| 			val = secret.Auth.Policies
 | |
| 		default:
 | |
| 			val = secret.Data[field]
 | |
| 		}
 | |
| 
 | |
| 	case secret.WrapInfo != nil:
 | |
| 		switch field {
 | |
| 		case "wrapping_token":
 | |
| 			val = secret.WrapInfo.Token
 | |
| 		case "wrapping_accessor":
 | |
| 			val = secret.WrapInfo.Accessor
 | |
| 		case "wrapping_token_ttl":
 | |
| 			val = secret.WrapInfo.TTL
 | |
| 		case "wrapping_token_creation_time":
 | |
| 			val = secret.WrapInfo.CreationTime.Format(time.RFC3339Nano)
 | |
| 		case "wrapping_token_creation_path":
 | |
| 			val = secret.WrapInfo.CreationPath
 | |
| 		case "wrapped_accessor":
 | |
| 			val = secret.WrapInfo.WrappedAccessor
 | |
| 		default:
 | |
| 			val = secret.Data[field]
 | |
| 		}
 | |
| 
 | |
| 	default:
 | |
| 		switch field {
 | |
| 		case "lease_duration":
 | |
| 			val = secret.LeaseDuration
 | |
| 		case "lease_id":
 | |
| 			val = secret.LeaseID
 | |
| 		case "request_id":
 | |
| 			val = secret.RequestID
 | |
| 		case "renewable":
 | |
| 			val = secret.Renewable
 | |
| 		case "refresh_interval":
 | |
| 			val = secret.LeaseDuration
 | |
| 		case "data":
 | |
| 			var ok bool
 | |
| 			val, ok = secret.Data["data"]
 | |
| 			if !ok {
 | |
| 				val = secret.Data
 | |
| 			}
 | |
| 		default:
 | |
| 			val = secret.Data[field]
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return val
 | |
| }
 | |
| 
 | |
| // PrintRawField prints raw field from the secret.
 | |
| func PrintRawField(ui cli.Ui, data interface{}, field string) int {
 | |
| 	var val interface{}
 | |
| 	switch data := data.(type) {
 | |
| 	case *api.Secret:
 | |
| 		val = RawField(data, field)
 | |
| 	case map[string]interface{}:
 | |
| 		val = data[field]
 | |
| 	}
 | |
| 
 | |
| 	if val == nil {
 | |
| 		ui.Error(fmt.Sprintf("Field %q not present in secret", field))
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	format := Format(ui)
 | |
| 	if format == "" || format == "table" || format == "raw" {
 | |
| 		return PrintRaw(ui, fmt.Sprintf("%v", val))
 | |
| 	}
 | |
| 
 | |
| 	// Handle specific format flags as best as possible
 | |
| 	formatter, ok := Formatters[format]
 | |
| 	if !ok {
 | |
| 		ui.Error(fmt.Sprintf("Invalid output format: %s", format))
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	b, err := formatter.Format(val)
 | |
| 	if err != nil {
 | |
| 		ui.Error(fmt.Sprintf("Error formatting output: %s", err))
 | |
| 		return 1
 | |
| 	}
 | |
| 
 | |
| 	return PrintRaw(ui, string(b))
 | |
| }
 | |
| 
 | |
| // PrintRaw prints a raw value to the terminal. If the process is being "piped"
 | |
| // to something else, the "raw" value is printed without a newline character.
 | |
| // Otherwise the value is printed as normal.
 | |
| func PrintRaw(ui cli.Ui, str string) int {
 | |
| 	if !color.NoColor {
 | |
| 		ui.Output(str)
 | |
| 	} else {
 | |
| 		// The cli.Ui prints a CR, which is not wanted since the user probably wants
 | |
| 		// just the raw value.
 | |
| 		w := getWriterFromUI(ui)
 | |
| 		fmt.Fprint(w, str)
 | |
| 	}
 | |
| 	return 0
 | |
| }
 | |
| 
 | |
| // getWriterFromUI accepts a cli.Ui and returns the underlying io.Writer by
 | |
| // unwrapping as many wrapped Uis as necessary. If there is an unknown UI
 | |
| // type, this falls back to os.Stdout.
 | |
| func getWriterFromUI(ui cli.Ui) io.Writer {
 | |
| 	switch t := ui.(type) {
 | |
| 	case *VaultUI:
 | |
| 		return getWriterFromUI(t.Ui)
 | |
| 	case *cli.BasicUi:
 | |
| 		return t.Writer
 | |
| 	case *cli.ColoredUi:
 | |
| 		return getWriterFromUI(t.Ui)
 | |
| 	case *cli.ConcurrentUi:
 | |
| 		return getWriterFromUI(t.Ui)
 | |
| 	case *cli.MockUi:
 | |
| 		return t.OutputWriter
 | |
| 	default:
 | |
| 		return os.Stdout
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func mockClient(t *testing.T) (*api.Client, *recordingRoundTripper) {
 | |
| 	t.Helper()
 | |
| 
 | |
| 	config := api.DefaultConfig()
 | |
| 	httpClient := cleanhttp.DefaultClient()
 | |
| 	roundTripper := &recordingRoundTripper{}
 | |
| 	httpClient.Transport = roundTripper
 | |
| 	config.HttpClient = httpClient
 | |
| 	client, err := api.NewClient(config)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	return client, roundTripper
 | |
| }
 | |
| 
 | |
| var _ http.RoundTripper = (*recordingRoundTripper)(nil)
 | |
| 
 | |
| type recordingRoundTripper struct {
 | |
| 	path string
 | |
| 	body []byte
 | |
| }
 | |
| 
 | |
| func (r *recordingRoundTripper) RoundTrip(req *http.Request) (*http.Response, error) {
 | |
| 	r.path = req.URL.Path
 | |
| 	defer req.Body.Close()
 | |
| 	body, err := io.ReadAll(req.Body)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	r.body = body
 | |
| 	return &http.Response{
 | |
| 		StatusCode: 200,
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| // WritePprofToFile will create a temporary directory at the specified path
 | |
| // and generate pprof files at that location. CPU requires polling over a
 | |
| // duration. For most situations 1 second is enough.
 | |
| func WritePprofToFile(path string, cpuProfileDuration time.Duration) error {
 | |
| 	err := os.MkdirAll(path, os.ModePerm)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("could not create temporary directory for pprof: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	dumps := []string{"goroutine", "heap", "allocs", "threadcreate", "profile"}
 | |
| 	for _, dump := range dumps {
 | |
| 		pFile, err := os.Create(filepath.Join(path, dump))
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("error creating pprof file %s: %v", dump, err)
 | |
| 		}
 | |
| 
 | |
| 		if dump != "profile" {
 | |
| 			err = pprof.Lookup(dump).WriteTo(pFile, 0)
 | |
| 			if err != nil {
 | |
| 				pFile.Close()
 | |
| 				return fmt.Errorf("error generating pprof data for %s: %v", dump, err)
 | |
| 			}
 | |
| 		} else {
 | |
| 			// CPU profiles need to run for a duration so we're going to run it
 | |
| 			// just for one second to avoid blocking here.
 | |
| 			if err := pprof.StartCPUProfile(pFile); err != nil {
 | |
| 				pFile.Close()
 | |
| 				return fmt.Errorf("could not start CPU profile: %v", err)
 | |
| 			}
 | |
| 			time.Sleep(cpuProfileDuration)
 | |
| 			pprof.StopCPUProfile()
 | |
| 		}
 | |
| 		pFile.Close()
 | |
| 	}
 | |
| 	return nil
 | |
| }
 |