mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-04 04:28:08 +00:00 
			
		
		
		
	* VAULT-6613 add DetermineRoleFromLoginRequest function to Core * Fix body handling * Role resolution for rate limit quotas * VAULT-6613 update precedence test * Add changelog * VAULT-6614 start of changes for roles in LCQs * Expiration changes for leases * Add role information to RequestAuth * VAULT-6614 Test updates * VAULT-6614 Add expiration test with roles * VAULT-6614 fix comment * VAULT-6614 Protobuf on OSS * VAULT-6614 Add rlock to determine role code * VAULT-6614 Try lock instead of rlock * VAULT-6614 back to rlock while I think about this more * VAULT-6614 Additional safety for nil dereference * VAULT-6614 Use %q over %s * VAULT-6614 Add overloading to plugin backends * VAULT-6614 RLocks instead * VAULT-6614 Fix return for backend factory
		
			
				
	
	
		
			123 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			123 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package http
 | 
						|
 | 
						|
import (
 | 
						|
	"bytes"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"io/ioutil"
 | 
						|
	"net"
 | 
						|
	"net/http"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/hashicorp/vault/sdk/logical"
 | 
						|
 | 
						|
	"github.com/hashicorp/vault/helper/namespace"
 | 
						|
	"github.com/hashicorp/vault/vault"
 | 
						|
	"github.com/hashicorp/vault/vault/quotas"
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	adjustRequest = func(c *vault.Core, r *http.Request) (*http.Request, int) {
 | 
						|
		return r, 0
 | 
						|
	}
 | 
						|
 | 
						|
	genericWrapping = func(core *vault.Core, in http.Handler, props *vault.HandlerProperties) http.Handler {
 | 
						|
		// Wrap the help wrapped handler with another layer with a generic
 | 
						|
		// handler
 | 
						|
		return wrapGenericHandler(core, in, props)
 | 
						|
	}
 | 
						|
 | 
						|
	additionalRoutes = func(mux *http.ServeMux, core *vault.Core) {}
 | 
						|
 | 
						|
	nonVotersAllowed = false
 | 
						|
 | 
						|
	adjustResponse = func(core *vault.Core, w http.ResponseWriter, req *logical.Request) {}
 | 
						|
)
 | 
						|
 | 
						|
func rateLimitQuotaWrapping(handler http.Handler, core *vault.Core) http.Handler {
 | 
						|
	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
						|
		ns, err := namespace.FromContext(r.Context())
 | 
						|
		if err != nil {
 | 
						|
			respondError(w, http.StatusInternalServerError, err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		// We don't want to do buildLogicalRequestNoAuth here because, if the
 | 
						|
		// request gets allowed by the quota, the same function will get called
 | 
						|
		// again, which is not desired.
 | 
						|
		path, status, err := buildLogicalPath(r)
 | 
						|
		if err != nil || status != 0 {
 | 
						|
			respondError(w, status, err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
		mountPath := strings.TrimPrefix(core.MatchingMount(r.Context(), path), ns.Path)
 | 
						|
 | 
						|
		// Clone body, so we do not close the request body reader
 | 
						|
		bodyBytes, err := ioutil.ReadAll(r.Body)
 | 
						|
		if err != nil {
 | 
						|
			respondError(w, http.StatusInternalServerError, errors.New("failed to read request body"))
 | 
						|
			return
 | 
						|
		}
 | 
						|
		r.Body = ioutil.NopCloser(bytes.NewBuffer(bodyBytes))
 | 
						|
 | 
						|
		quotaResp, err := core.ApplyRateLimitQuota(r.Context(), "as.Request{
 | 
						|
			Type:          quotas.TypeRateLimit,
 | 
						|
			Path:          path,
 | 
						|
			MountPath:     mountPath,
 | 
						|
			Role:          core.DetermineRoleFromLoginRequestFromBytes(mountPath, bodyBytes, r.Context()),
 | 
						|
			NamespacePath: ns.Path,
 | 
						|
			ClientAddress: parseRemoteIPAddress(r),
 | 
						|
		})
 | 
						|
		if err != nil {
 | 
						|
			core.Logger().Error("failed to apply quota", "path", path, "error", err)
 | 
						|
			respondError(w, http.StatusUnprocessableEntity, err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		if core.RateLimitResponseHeadersEnabled() {
 | 
						|
			for h, v := range quotaResp.Headers {
 | 
						|
				w.Header().Set(h, v)
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		if !quotaResp.Allowed {
 | 
						|
			quotaErr := fmt.Errorf("request path %q: %w", path, quotas.ErrRateLimitQuotaExceeded)
 | 
						|
			respondError(w, http.StatusTooManyRequests, quotaErr)
 | 
						|
 | 
						|
			if core.Logger().IsTrace() {
 | 
						|
				core.Logger().Trace("request rejected due to rate limit quota violation", "request_path", path)
 | 
						|
			}
 | 
						|
 | 
						|
			if core.RateLimitAuditLoggingEnabled() {
 | 
						|
				req, _, status, err := buildLogicalRequestNoAuth(core.PerfStandby(), w, r)
 | 
						|
				if err != nil || status != 0 {
 | 
						|
					respondError(w, status, err)
 | 
						|
					return
 | 
						|
				}
 | 
						|
 | 
						|
				err = core.AuditLogger().AuditRequest(r.Context(), &logical.LogInput{
 | 
						|
					Request:  req,
 | 
						|
					OuterErr: quotaErr,
 | 
						|
				})
 | 
						|
				if err != nil {
 | 
						|
					core.Logger().Warn("failed to audit log request rejection caused by rate limit quota violation", "error", err)
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		handler.ServeHTTP(w, r)
 | 
						|
		return
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
func parseRemoteIPAddress(r *http.Request) string {
 | 
						|
	ip, _, err := net.SplitHostPort(r.RemoteAddr)
 | 
						|
	if err != nil {
 | 
						|
		return ""
 | 
						|
	}
 | 
						|
 | 
						|
	return ip
 | 
						|
}
 |