-
Notifications
You must be signed in to change notification settings - Fork 4.3k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
145 changed files
with
48,685 additions
and
587 deletions.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,295 @@ | ||
package physical | ||
|
||
import ( | ||
"errors" | ||
"fmt" | ||
"os" | ||
"path" | ||
"strconv" | ||
"strings" | ||
"sync" | ||
"time" | ||
|
||
metrics "github.com/armon/go-metrics" | ||
"github.com/coreos/etcd/client" | ||
"github.com/coreos/etcd/clientv3" | ||
"github.com/coreos/etcd/clientv3/concurrency" | ||
"github.com/coreos/etcd/pkg/transport" | ||
log "github.com/mgutz/logxi/v1" | ||
"golang.org/x/net/context" | ||
) | ||
|
||
// EtcdBackend is a physical backend that stores data at specific | ||
// prefix within etcd. It is used for most production situations as | ||
// it allows Vault to run on multiple machines in a highly-available manner. | ||
type EtcdBackend struct { | ||
logger log.Logger | ||
path string | ||
haEnabled bool | ||
|
||
permitPool *PermitPool | ||
|
||
etcd *clientv3.Client | ||
} | ||
|
||
// newEtcd3Backend constructs a etcd3 backend. | ||
func newEtcd3Backend(conf map[string]string, logger log.Logger) (Backend, error) { | ||
// Get the etcd path form the configuration. | ||
path, ok := conf["path"] | ||
if !ok { | ||
path = "/vault" | ||
} | ||
|
||
// Ensure path is prefixed. | ||
if !strings.HasPrefix(path, "/") { | ||
path = "/" + path | ||
} | ||
|
||
// Set a default machines list and check for an overriding address value. | ||
endpoints := []string{"http://127.0.0.1:2379"} | ||
if address, ok := conf["address"]; ok { | ||
endpoints = strings.Split(address, ",") | ||
} | ||
|
||
cfg := clientv3.Config{ | ||
Endpoints: endpoints, | ||
} | ||
|
||
haEnabled := os.Getenv("ETCD_HA_ENABLED") | ||
if haEnabled == "" { | ||
haEnabled = conf["ha_enabled"] | ||
} | ||
haEnabledBool, _ := strconv.ParseBool(haEnabled) | ||
|
||
cert, hasCert := conf["tls_cert_file"] | ||
key, hasKey := conf["tls_key_file"] | ||
ca, hasCa := conf["tls_ca_file"] | ||
if (hasCert && hasKey) || hasCa { | ||
tls := transport.TLSInfo{ | ||
CAFile: ca, | ||
CertFile: cert, | ||
KeyFile: key, | ||
} | ||
|
||
tlscfg, err := tls.ClientConfig() | ||
if err != nil { | ||
return nil, err | ||
} | ||
cfg.TLS = tlscfg | ||
} | ||
|
||
// Set credentials. | ||
username := os.Getenv("ETCD_USERNAME") | ||
if username == "" { | ||
username, _ = conf["username"] | ||
} | ||
|
||
password := os.Getenv("ETCD_PASSWORD") | ||
if password == "" { | ||
password, _ = conf["password"] | ||
} | ||
|
||
if username != "" && password != "" { | ||
cfg.Username = username | ||
cfg.Password = password | ||
} | ||
|
||
etcd, err := clientv3.New(cfg) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
ssync, ok := conf["sync"] | ||
if !ok { | ||
ssync = "true" | ||
} | ||
sync, err := strconv.ParseBool(ssync) | ||
if err != nil { | ||
return nil, fmt.Errorf("value of 'sync' (%v) could not be understood", err) | ||
} | ||
|
||
if sync { | ||
ctx, cancel := context.WithTimeout(context.Background(), client.DefaultRequestTimeout) | ||
err := etcd.Sync(ctx) | ||
cancel() | ||
if err != nil { | ||
return nil, err | ||
} | ||
} | ||
|
||
return &EtcdBackend{ | ||
path: path, | ||
etcd: etcd, | ||
permitPool: NewPermitPool(DefaultParallelOperations), | ||
logger: logger, | ||
haEnabled: haEnabledBool, | ||
}, nil | ||
} | ||
|
||
func (c *EtcdBackend) Put(entry *Entry) error { | ||
defer metrics.MeasureSince([]string{"etcd", "put"}, time.Now()) | ||
|
||
c.permitPool.Acquire() | ||
defer c.permitPool.Release() | ||
|
||
_, err := c.etcd.Put(context.Background(), path.Join(c.path, entry.Key), string(entry.Value)) | ||
return err | ||
} | ||
|
||
func (c *EtcdBackend) Get(key string) (*Entry, error) { | ||
defer metrics.MeasureSince([]string{"etcd", "get"}, time.Now()) | ||
|
||
c.permitPool.Acquire() | ||
defer c.permitPool.Release() | ||
|
||
resp, err := c.etcd.Get(context.Background(), path.Join(c.path, key)) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
if len(resp.Kvs) == 0 { | ||
return nil, nil | ||
} | ||
if len(resp.Kvs) > 1 { | ||
return nil, errors.New("unexpected number of keys from a get request") | ||
} | ||
return &Entry{ | ||
Key: key, | ||
Value: resp.Kvs[0].Value, | ||
}, nil | ||
} | ||
|
||
func (c *EtcdBackend) Delete(key string) error { | ||
defer metrics.MeasureSince([]string{"etcd", "delete"}, time.Now()) | ||
|
||
c.permitPool.Acquire() | ||
defer c.permitPool.Release() | ||
|
||
_, err := c.etcd.Delete(context.Background(), path.Join(c.path, key)) | ||
if err != nil { | ||
return err | ||
} | ||
return nil | ||
} | ||
|
||
func (c *EtcdBackend) List(prefix string) ([]string, error) { | ||
defer metrics.MeasureSince([]string{"etcd", "list"}, time.Now()) | ||
|
||
c.permitPool.Acquire() | ||
defer c.permitPool.Release() | ||
|
||
prefix = path.Join(c.path, prefix) | ||
resp, err := c.etcd.Get(context.Background(), prefix, clientv3.WithPrefix()) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
keys := []string{} | ||
for _, kv := range resp.Kvs { | ||
key := strings.TrimPrefix(string(kv.Key), prefix) | ||
key = strings.TrimPrefix(key, "/") | ||
|
||
if len(key) == 0 { | ||
continue | ||
} | ||
|
||
if i := strings.Index(key, "/"); i == -1 { | ||
keys = append(keys, key) | ||
} else if i != -1 { | ||
keys = appendIfMissing(keys, key[:i+1]) | ||
} | ||
} | ||
return keys, nil | ||
} | ||
|
||
func (e *EtcdBackend) HAEnabled() bool { | ||
return e.haEnabled | ||
} | ||
|
||
// EtcdLock emplements a lock using and etcd backend. | ||
type EtcdLock struct { | ||
lock sync.Mutex | ||
held bool | ||
|
||
etcdSession *concurrency.Session | ||
etcdMu *concurrency.Mutex | ||
|
||
prefix string | ||
value string | ||
|
||
etcd *clientv3.Client | ||
} | ||
|
||
// Lock is used for mutual exclusion based on the given key. | ||
func (c *EtcdBackend) LockWith(key, value string) (Lock, error) { | ||
session, err := concurrency.NewSession(c.etcd) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
p := path.Join(c.path, key) | ||
return &EtcdLock{ | ||
etcdSession: session, | ||
etcdMu: concurrency.NewMutex(session, p), | ||
prefix: p, | ||
value: value, | ||
etcd: c.etcd, | ||
}, nil | ||
} | ||
|
||
func (c *EtcdLock) Lock(stopCh <-chan struct{}) (<-chan struct{}, error) { | ||
c.lock.Lock() | ||
defer c.lock.Unlock() | ||
|
||
if c.held { | ||
return nil, EtcdLockHeldError | ||
} | ||
|
||
ctx, cancel := context.WithCancel(context.Background()) | ||
go func() { | ||
<-stopCh | ||
cancel() | ||
}() | ||
if err := c.etcdMu.Lock(ctx); err != nil { | ||
if err == context.Canceled { | ||
return nil, nil | ||
} | ||
return nil, err | ||
} | ||
if _, err := c.etcd.Put(ctx, c.etcdMu.Key(), c.value); err != nil { | ||
return nil, err | ||
} | ||
|
||
c.held = true | ||
|
||
return c.etcdSession.Done(), nil | ||
} | ||
|
||
func (c *EtcdLock) Unlock() error { | ||
c.lock.Lock() | ||
defer c.lock.Unlock() | ||
|
||
if !c.held { | ||
return EtcdLockNotHeldError | ||
} | ||
|
||
return c.etcdMu.Unlock(context.Background()) | ||
} | ||
|
||
func (c *EtcdLock) Value() (bool, string, error) { | ||
resp, err := c.etcd.Get(context.Background(), | ||
c.prefix, clientv3.WithPrefix(), | ||
clientv3.WithSort(clientv3.SortByCreateRevision, clientv3.SortAscend)) | ||
|
||
if err != nil { | ||
return false, "", err | ||
} | ||
if len(resp.Kvs) == 0 { | ||
return false, "", nil | ||
} | ||
if len(resp.Kvs) > 1 { | ||
return false, "", errors.New("unexpected number of keys from a get request") | ||
} | ||
|
||
return true, string(resp.Kvs[0].Value), nil | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
package physical | ||
|
||
import ( | ||
"fmt" | ||
"os" | ||
"testing" | ||
"time" | ||
|
||
"github.com/hashicorp/vault/helper/logformat" | ||
log "github.com/mgutz/logxi/v1" | ||
) | ||
|
||
func TestEtcd3Backend(t *testing.T) { | ||
addr := os.Getenv("ETCD_ADDR") | ||
if addr == "" { | ||
t.Skipf("Skipped. No etcd3 server found") | ||
} | ||
|
||
logger := logformat.NewVaultLogger(log.LevelTrace) | ||
|
||
b, err := NewBackend("etcd", logger, map[string]string{ | ||
"path": fmt.Sprintf("/vault-%d", time.Now().Unix()), | ||
"etcd_api": "3", | ||
}) | ||
if err != nil { | ||
t.Fatalf("err: %s", err) | ||
} | ||
|
||
testBackend(t, b) | ||
testBackend_ListPrefix(t, b) | ||
|
||
ha, ok := b.(HABackend) | ||
if !ok { | ||
t.Fatalf("etcd3 does not implement HABackend") | ||
} | ||
testHABackend(t, ha, ha) | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
Oops, something went wrong.