|
|
|
@ -2,6 +2,7 @@ package consul
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"github.com/hashicorp/consul/consul/structs"
|
|
|
|
|
"github.com/hashicorp/serf/serf"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
// Internal endpoint is used to query the miscellaneous info that
|
|
|
|
@ -63,6 +64,22 @@ func (m *Internal) EventFire(args *structs.EventFireRequest,
|
|
|
|
|
return m.srv.UserEvent(args.Name, args.Payload)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (m *Internal) ingestKeyringResponse(
|
|
|
|
|
resp *serf.KeyResponse,
|
|
|
|
|
reply *structs.KeyringResponses) {
|
|
|
|
|
|
|
|
|
|
reply.Responses = append(reply.Responses, &structs.KeyringResponse{
|
|
|
|
|
Datacenter: m.srv.config.Datacenter,
|
|
|
|
|
Messages: resp.Messages,
|
|
|
|
|
Keys: resp.Keys,
|
|
|
|
|
NumResp: resp.NumResp,
|
|
|
|
|
NumNodes: resp.NumNodes,
|
|
|
|
|
NumErr: resp.NumErr,
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// ListKeys will query the WAN and LAN gossip keyrings of all nodes, adding
|
|
|
|
|
// results into a collective response as we go.
|
|
|
|
|
func (m *Internal) ListKeys(
|
|
|
|
|
args *structs.KeyringRequest,
|
|
|
|
|
reply *structs.KeyringResponses) error {
|
|
|
|
@ -71,28 +88,14 @@ func (m *Internal) ListKeys(
|
|
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
reply.Responses = append(reply.Responses, &structs.KeyringResponse{
|
|
|
|
|
Datacenter: m.srv.config.Datacenter,
|
|
|
|
|
Messages: respLAN.Messages,
|
|
|
|
|
Keys: respLAN.Keys,
|
|
|
|
|
NumResp: respLAN.NumResp,
|
|
|
|
|
NumNodes: respLAN.NumNodes,
|
|
|
|
|
NumErr: respLAN.NumErr,
|
|
|
|
|
})
|
|
|
|
|
m.ingestKeyringResponse(respLAN, reply)
|
|
|
|
|
|
|
|
|
|
if !args.Forwarded {
|
|
|
|
|
respWAN, err := m.srv.KeyManagerWAN().ListKeys()
|
|
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
reply.Responses = append(reply.Responses, &structs.KeyringResponse{
|
|
|
|
|
Datacenter: m.srv.config.Datacenter,
|
|
|
|
|
Messages: respWAN.Messages,
|
|
|
|
|
Keys: respWAN.Keys,
|
|
|
|
|
NumResp: respWAN.NumResp,
|
|
|
|
|
NumNodes: respWAN.NumNodes,
|
|
|
|
|
NumErr: respWAN.NumErr,
|
|
|
|
|
})
|
|
|
|
|
m.ingestKeyringResponse(respWAN, reply)
|
|
|
|
|
|
|
|
|
|
// Mark key rotation as being already forwarded, then forward.
|
|
|
|
|
args.Forwarded = true
|
|
|
|
@ -102,32 +105,25 @@ func (m *Internal) ListKeys(
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// InstallKey broadcasts a new encryption key to all nodes. This involves
|
|
|
|
|
// installing a new key on every node across all datacenters.
|
|
|
|
|
func (m *Internal) InstallKey(
|
|
|
|
|
args *structs.KeyringRequest,
|
|
|
|
|
reply *structs.KeyringResponses) error {
|
|
|
|
|
|
|
|
|
|
respLAN, _ := m.srv.KeyManagerLAN().InstallKey(args.Key)
|
|
|
|
|
reply.Responses = append(reply.Responses, &structs.KeyringResponse{
|
|
|
|
|
Datacenter: m.srv.config.Datacenter,
|
|
|
|
|
Messages: respLAN.Messages,
|
|
|
|
|
Keys: respLAN.Keys,
|
|
|
|
|
NumResp: respLAN.NumResp,
|
|
|
|
|
NumNodes: respLAN.NumNodes,
|
|
|
|
|
NumErr: respLAN.NumErr,
|
|
|
|
|
})
|
|
|
|
|
respLAN, err := m.srv.KeyManagerLAN().InstallKey(args.Key)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
m.ingestKeyringResponse(respLAN, reply)
|
|
|
|
|
|
|
|
|
|
if !args.Forwarded {
|
|
|
|
|
respWAN, _ := m.srv.KeyManagerWAN().InstallKey(args.Key)
|
|
|
|
|
reply.Responses = append(reply.Responses, &structs.KeyringResponse{
|
|
|
|
|
Datacenter: m.srv.config.Datacenter,
|
|
|
|
|
Messages: respWAN.Messages,
|
|
|
|
|
Keys: respWAN.Keys,
|
|
|
|
|
NumResp: respWAN.NumResp,
|
|
|
|
|
NumNodes: respWAN.NumNodes,
|
|
|
|
|
NumErr: respWAN.NumErr,
|
|
|
|
|
})
|
|
|
|
|
respWAN, err := m.srv.KeyManagerWAN().InstallKey(args.Key)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
m.ingestKeyringResponse(respWAN, reply)
|
|
|
|
|
|
|
|
|
|
// Mark key rotation as being already forwarded, then forward.
|
|
|
|
|
args.Forwarded = true
|
|
|
|
|
return m.srv.forwardAll("Internal.InstallKey", args, reply)
|
|
|
|
|
}
|
|
|
|
@ -135,32 +131,25 @@ func (m *Internal) InstallKey(
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// UseKey instructs all nodes to change the key they are using to
|
|
|
|
|
// encrypt gossip messages.
|
|
|
|
|
func (m *Internal) UseKey(
|
|
|
|
|
args *structs.KeyringRequest,
|
|
|
|
|
reply *structs.KeyringResponses) error {
|
|
|
|
|
|
|
|
|
|
respLAN, _ := m.srv.KeyManagerLAN().UseKey(args.Key)
|
|
|
|
|
reply.Responses = append(reply.Responses, &structs.KeyringResponse{
|
|
|
|
|
Datacenter: m.srv.config.Datacenter,
|
|
|
|
|
Messages: respLAN.Messages,
|
|
|
|
|
Keys: respLAN.Keys,
|
|
|
|
|
NumResp: respLAN.NumResp,
|
|
|
|
|
NumNodes: respLAN.NumNodes,
|
|
|
|
|
NumErr: respLAN.NumErr,
|
|
|
|
|
})
|
|
|
|
|
respLAN, err := m.srv.KeyManagerLAN().UseKey(args.Key)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
m.ingestKeyringResponse(respLAN, reply)
|
|
|
|
|
|
|
|
|
|
if !args.Forwarded {
|
|
|
|
|
respWAN, _ := m.srv.KeyManagerWAN().UseKey(args.Key)
|
|
|
|
|
reply.Responses = append(reply.Responses, &structs.KeyringResponse{
|
|
|
|
|
Datacenter: m.srv.config.Datacenter,
|
|
|
|
|
Messages: respWAN.Messages,
|
|
|
|
|
Keys: respWAN.Keys,
|
|
|
|
|
NumResp: respWAN.NumResp,
|
|
|
|
|
NumNodes: respWAN.NumNodes,
|
|
|
|
|
NumErr: respWAN.NumErr,
|
|
|
|
|
})
|
|
|
|
|
respWAN, err := m.srv.KeyManagerWAN().UseKey(args.Key)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
m.ingestKeyringResponse(respWAN, reply)
|
|
|
|
|
|
|
|
|
|
// Mark key rotation as being already forwarded, then forward.
|
|
|
|
|
args.Forwarded = true
|
|
|
|
|
return m.srv.forwardAll("Internal.UseKey", args, reply)
|
|
|
|
|
}
|
|
|
|
@ -168,32 +157,24 @@ func (m *Internal) UseKey(
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// RemoveKey instructs all nodes to drop the specified key from the keyring.
|
|
|
|
|
func (m *Internal) RemoveKey(
|
|
|
|
|
args *structs.KeyringRequest,
|
|
|
|
|
reply *structs.KeyringResponses) error {
|
|
|
|
|
|
|
|
|
|
respLAN, _ := m.srv.KeyManagerLAN().RemoveKey(args.Key)
|
|
|
|
|
reply.Responses = append(reply.Responses, &structs.KeyringResponse{
|
|
|
|
|
Datacenter: m.srv.config.Datacenter,
|
|
|
|
|
Messages: respLAN.Messages,
|
|
|
|
|
Keys: respLAN.Keys,
|
|
|
|
|
NumResp: respLAN.NumResp,
|
|
|
|
|
NumNodes: respLAN.NumNodes,
|
|
|
|
|
NumErr: respLAN.NumErr,
|
|
|
|
|
})
|
|
|
|
|
respLAN, err := m.srv.KeyManagerLAN().RemoveKey(args.Key)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
m.ingestKeyringResponse(respLAN, reply)
|
|
|
|
|
|
|
|
|
|
if !args.Forwarded {
|
|
|
|
|
respWAN, _ := m.srv.KeyManagerWAN().RemoveKey(args.Key)
|
|
|
|
|
reply.Responses = append(reply.Responses, &structs.KeyringResponse{
|
|
|
|
|
Datacenter: m.srv.config.Datacenter,
|
|
|
|
|
Messages: respWAN.Messages,
|
|
|
|
|
Keys: respWAN.Keys,
|
|
|
|
|
NumResp: respWAN.NumResp,
|
|
|
|
|
NumNodes: respWAN.NumNodes,
|
|
|
|
|
NumErr: respWAN.NumErr,
|
|
|
|
|
})
|
|
|
|
|
respWAN, err := m.srv.KeyManagerWAN().RemoveKey(args.Key)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
m.ingestKeyringResponse(respWAN, reply)
|
|
|
|
|
|
|
|
|
|
// Mark key rotation as being already forwarded, then forward.
|
|
|
|
|
args.Forwarded = true
|
|
|
|
|
return m.srv.forwardAll("Internal.RemoveKey", args, reply)
|
|
|
|
|
}
|
|
|
|
|