mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-03 20:17:59 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			322 lines
		
	
	
		
			8.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			322 lines
		
	
	
		
			8.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package api
 | 
						|
 | 
						|
import (
 | 
						|
	"bytes"
 | 
						|
	"fmt"
 | 
						|
	"io"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/hashicorp/errwrap"
 | 
						|
	"github.com/hashicorp/vault/sdk/helper/jsonutil"
 | 
						|
	"github.com/hashicorp/vault/sdk/helper/parseutil"
 | 
						|
)
 | 
						|
 | 
						|
// Secret is the structure returned for every secret within Vault.
 | 
						|
type Secret struct {
 | 
						|
	// The request ID that generated this response
 | 
						|
	RequestID string `json:"request_id"`
 | 
						|
 | 
						|
	LeaseID       string `json:"lease_id"`
 | 
						|
	LeaseDuration int    `json:"lease_duration"`
 | 
						|
	Renewable     bool   `json:"renewable"`
 | 
						|
 | 
						|
	// Data is the actual contents of the secret. The format of the data
 | 
						|
	// is arbitrary and up to the secret backend.
 | 
						|
	Data map[string]interface{} `json:"data"`
 | 
						|
 | 
						|
	// Warnings contains any warnings related to the operation. These
 | 
						|
	// are not issues that caused the command to fail, but that the
 | 
						|
	// client should be aware of.
 | 
						|
	Warnings []string `json:"warnings"`
 | 
						|
 | 
						|
	// Auth, if non-nil, means that there was authentication information
 | 
						|
	// attached to this response.
 | 
						|
	Auth *SecretAuth `json:"auth,omitempty"`
 | 
						|
 | 
						|
	// WrapInfo, if non-nil, means that the initial response was wrapped in the
 | 
						|
	// cubbyhole of the given token (which has a TTL of the given number of
 | 
						|
	// seconds)
 | 
						|
	WrapInfo *SecretWrapInfo `json:"wrap_info,omitempty"`
 | 
						|
}
 | 
						|
 | 
						|
// TokenID returns the standardized token ID (token) for the given secret.
 | 
						|
func (s *Secret) TokenID() (string, error) {
 | 
						|
	if s == nil {
 | 
						|
		return "", nil
 | 
						|
	}
 | 
						|
 | 
						|
	if s.Auth != nil && len(s.Auth.ClientToken) > 0 {
 | 
						|
		return s.Auth.ClientToken, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if s.Data == nil || s.Data["id"] == nil {
 | 
						|
		return "", nil
 | 
						|
	}
 | 
						|
 | 
						|
	id, ok := s.Data["id"].(string)
 | 
						|
	if !ok {
 | 
						|
		return "", fmt.Errorf("token found but in the wrong format")
 | 
						|
	}
 | 
						|
 | 
						|
	return id, nil
 | 
						|
}
 | 
						|
 | 
						|
// TokenAccessor returns the standardized token accessor for the given secret.
 | 
						|
// If the secret is nil or does not contain an accessor, this returns the empty
 | 
						|
// string.
 | 
						|
func (s *Secret) TokenAccessor() (string, error) {
 | 
						|
	if s == nil {
 | 
						|
		return "", nil
 | 
						|
	}
 | 
						|
 | 
						|
	if s.Auth != nil && len(s.Auth.Accessor) > 0 {
 | 
						|
		return s.Auth.Accessor, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if s.Data == nil || s.Data["accessor"] == nil {
 | 
						|
		return "", nil
 | 
						|
	}
 | 
						|
 | 
						|
	accessor, ok := s.Data["accessor"].(string)
 | 
						|
	if !ok {
 | 
						|
		return "", fmt.Errorf("token found but in the wrong format")
 | 
						|
	}
 | 
						|
 | 
						|
	return accessor, nil
 | 
						|
}
 | 
						|
 | 
						|
// TokenRemainingUses returns the standardized remaining uses for the given
 | 
						|
// secret. If the secret is nil or does not contain the "num_uses", this
 | 
						|
// returns -1. On error, this will return -1 and a non-nil error.
 | 
						|
func (s *Secret) TokenRemainingUses() (int, error) {
 | 
						|
	if s == nil || s.Data == nil || s.Data["num_uses"] == nil {
 | 
						|
		return -1, nil
 | 
						|
	}
 | 
						|
 | 
						|
	uses, err := parseutil.ParseInt(s.Data["num_uses"])
 | 
						|
	if err != nil {
 | 
						|
		return 0, err
 | 
						|
	}
 | 
						|
 | 
						|
	return int(uses), nil
 | 
						|
}
 | 
						|
 | 
						|
// TokenPolicies returns the standardized list of policies for the given secret.
 | 
						|
// If the secret is nil or does not contain any policies, this returns nil. It
 | 
						|
// also populates the secret's Auth info with identity/token policy info.
 | 
						|
func (s *Secret) TokenPolicies() ([]string, error) {
 | 
						|
	if s == nil {
 | 
						|
		return nil, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if s.Auth != nil && len(s.Auth.Policies) > 0 {
 | 
						|
		return s.Auth.Policies, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if s.Data == nil || s.Data["policies"] == nil {
 | 
						|
		return nil, nil
 | 
						|
	}
 | 
						|
 | 
						|
	var tokenPolicies []string
 | 
						|
 | 
						|
	// Token policies
 | 
						|
	{
 | 
						|
		_, ok := s.Data["policies"]
 | 
						|
		if !ok {
 | 
						|
			goto TOKEN_DONE
 | 
						|
		}
 | 
						|
 | 
						|
		sList, ok := s.Data["policies"].([]string)
 | 
						|
		if ok {
 | 
						|
			tokenPolicies = sList
 | 
						|
			goto TOKEN_DONE
 | 
						|
		}
 | 
						|
 | 
						|
		list, ok := s.Data["policies"].([]interface{})
 | 
						|
		if !ok {
 | 
						|
			return nil, fmt.Errorf("unable to convert token policies to expected format")
 | 
						|
		}
 | 
						|
		for _, v := range list {
 | 
						|
			p, ok := v.(string)
 | 
						|
			if !ok {
 | 
						|
				return nil, fmt.Errorf("unable to convert policy %v to string", v)
 | 
						|
			}
 | 
						|
			tokenPolicies = append(tokenPolicies, p)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
TOKEN_DONE:
 | 
						|
	var identityPolicies []string
 | 
						|
 | 
						|
	// Identity policies
 | 
						|
	{
 | 
						|
		_, ok := s.Data["identity_policies"]
 | 
						|
		if !ok {
 | 
						|
			goto DONE
 | 
						|
		}
 | 
						|
 | 
						|
		sList, ok := s.Data["identity_policies"].([]string)
 | 
						|
		if ok {
 | 
						|
			identityPolicies = sList
 | 
						|
			goto DONE
 | 
						|
		}
 | 
						|
 | 
						|
		list, ok := s.Data["identity_policies"].([]interface{})
 | 
						|
		if !ok {
 | 
						|
			return nil, fmt.Errorf("unable to convert identity policies to expected format")
 | 
						|
		}
 | 
						|
		for _, v := range list {
 | 
						|
			p, ok := v.(string)
 | 
						|
			if !ok {
 | 
						|
				return nil, fmt.Errorf("unable to convert policy %v to string", v)
 | 
						|
			}
 | 
						|
			identityPolicies = append(identityPolicies, p)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
DONE:
 | 
						|
 | 
						|
	if s.Auth == nil {
 | 
						|
		s.Auth = &SecretAuth{}
 | 
						|
	}
 | 
						|
 | 
						|
	policies := append(tokenPolicies, identityPolicies...)
 | 
						|
 | 
						|
	s.Auth.TokenPolicies = tokenPolicies
 | 
						|
	s.Auth.IdentityPolicies = identityPolicies
 | 
						|
	s.Auth.Policies = policies
 | 
						|
 | 
						|
	return policies, nil
 | 
						|
}
 | 
						|
 | 
						|
// TokenMetadata returns the map of metadata associated with this token, if any
 | 
						|
// exists. If the secret is nil or does not contain the "metadata" key, this
 | 
						|
// returns nil.
 | 
						|
func (s *Secret) TokenMetadata() (map[string]string, error) {
 | 
						|
	if s == nil {
 | 
						|
		return nil, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if s.Auth != nil && len(s.Auth.Metadata) > 0 {
 | 
						|
		return s.Auth.Metadata, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if s.Data == nil || (s.Data["metadata"] == nil && s.Data["meta"] == nil) {
 | 
						|
		return nil, nil
 | 
						|
	}
 | 
						|
 | 
						|
	data, ok := s.Data["metadata"].(map[string]interface{})
 | 
						|
	if !ok {
 | 
						|
		data, ok = s.Data["meta"].(map[string]interface{})
 | 
						|
		if !ok {
 | 
						|
			return nil, fmt.Errorf("unable to convert metadata field to expected format")
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	metadata := make(map[string]string, len(data))
 | 
						|
	for k, v := range data {
 | 
						|
		typed, ok := v.(string)
 | 
						|
		if !ok {
 | 
						|
			return nil, fmt.Errorf("unable to convert metadata value %v to string", v)
 | 
						|
		}
 | 
						|
		metadata[k] = typed
 | 
						|
	}
 | 
						|
 | 
						|
	return metadata, nil
 | 
						|
}
 | 
						|
 | 
						|
// TokenIsRenewable returns the standardized token renewability for the given
 | 
						|
// secret. If the secret is nil or does not contain the "renewable" key, this
 | 
						|
// returns false.
 | 
						|
func (s *Secret) TokenIsRenewable() (bool, error) {
 | 
						|
	if s == nil {
 | 
						|
		return false, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if s.Auth != nil && s.Auth.Renewable {
 | 
						|
		return s.Auth.Renewable, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if s.Data == nil || s.Data["renewable"] == nil {
 | 
						|
		return false, nil
 | 
						|
	}
 | 
						|
 | 
						|
	renewable, err := parseutil.ParseBool(s.Data["renewable"])
 | 
						|
	if err != nil {
 | 
						|
		return false, errwrap.Wrapf("could not convert renewable value to a boolean: {{err}}", err)
 | 
						|
	}
 | 
						|
 | 
						|
	return renewable, nil
 | 
						|
}
 | 
						|
 | 
						|
// TokenTTL returns the standardized remaining token TTL for the given secret.
 | 
						|
// If the secret is nil or does not contain a TTL, this returns 0.
 | 
						|
func (s *Secret) TokenTTL() (time.Duration, error) {
 | 
						|
	if s == nil {
 | 
						|
		return 0, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if s.Auth != nil && s.Auth.LeaseDuration > 0 {
 | 
						|
		return time.Duration(s.Auth.LeaseDuration) * time.Second, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if s.Data == nil || s.Data["ttl"] == nil {
 | 
						|
		return 0, nil
 | 
						|
	}
 | 
						|
 | 
						|
	ttl, err := parseutil.ParseDurationSecond(s.Data["ttl"])
 | 
						|
	if err != nil {
 | 
						|
		return 0, err
 | 
						|
	}
 | 
						|
 | 
						|
	return ttl, nil
 | 
						|
}
 | 
						|
 | 
						|
// SecretWrapInfo contains wrapping information if we have it. If what is
 | 
						|
// contained is an authentication token, the accessor for the token will be
 | 
						|
// available in WrappedAccessor.
 | 
						|
type SecretWrapInfo struct {
 | 
						|
	Token           string    `json:"token"`
 | 
						|
	Accessor        string    `json:"accessor"`
 | 
						|
	TTL             int       `json:"ttl"`
 | 
						|
	CreationTime    time.Time `json:"creation_time"`
 | 
						|
	CreationPath    string    `json:"creation_path"`
 | 
						|
	WrappedAccessor string    `json:"wrapped_accessor"`
 | 
						|
}
 | 
						|
 | 
						|
// SecretAuth is the structure containing auth information if we have it.
 | 
						|
type SecretAuth struct {
 | 
						|
	ClientToken      string            `json:"client_token"`
 | 
						|
	Accessor         string            `json:"accessor"`
 | 
						|
	Policies         []string          `json:"policies"`
 | 
						|
	TokenPolicies    []string          `json:"token_policies"`
 | 
						|
	IdentityPolicies []string          `json:"identity_policies"`
 | 
						|
	Metadata         map[string]string `json:"metadata"`
 | 
						|
	Orphan           bool              `json:"orphan"`
 | 
						|
 | 
						|
	LeaseDuration int  `json:"lease_duration"`
 | 
						|
	Renewable     bool `json:"renewable"`
 | 
						|
}
 | 
						|
 | 
						|
// ParseSecret is used to parse a secret value from JSON from an io.Reader.
 | 
						|
func ParseSecret(r io.Reader) (*Secret, error) {
 | 
						|
	// First read the data into a buffer. Not super efficient but we want to
 | 
						|
	// know if we actually have a body or not.
 | 
						|
	var buf bytes.Buffer
 | 
						|
	_, err := buf.ReadFrom(r)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	if buf.Len() == 0 {
 | 
						|
		return nil, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// First decode the JSON into a map[string]interface{}
 | 
						|
	var secret Secret
 | 
						|
	if err := jsonutil.DecodeJSONFromReader(&buf, &secret); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	return &secret, nil
 | 
						|
}
 |