forked from cretz/caddy-tlsconsul
-
-
Notifications
You must be signed in to change notification settings - Fork 17
/
storageconsul.go
302 lines (245 loc) 路 7.9 KB
/
storageconsul.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
package storageconsul
import (
"context"
"fmt"
"net"
"os"
"path"
"strings"
"sync"
"time"
"github.com/caddyserver/certmagic"
consul "github.com/hashicorp/consul/api"
)
const (
// DefaultPrefix defines the default prefix in KV store
DefaultPrefix = "caddytls"
// DefaultAESKey needs to be 32 bytes long
DefaultAESKey = "consultls-1234567890-caddytls-32"
// DefaultValuePrefix sets a prefix to KV values to check validation
DefaultValuePrefix = "caddy-storage-consul"
// EnvNameAESKey defines the env variable name to override AES key
EnvNameAESKey = "CADDY_CLUSTERING_CONSUL_AESKEY"
// EnvNamePrefix defines the env variable name to override KV key prefix
EnvNamePrefix = "CADDY_CLUSTERING_CONSUL_PREFIX"
// EnvValuePrefix defines the env variable name to override KV value prefix
EnvValuePrefix = "CADDY_CLUSTERING_CONSUL_VALUEPREFIX"
)
// dialContext to use for Consul connection
var dialContext = (&net.Dialer{
Timeout: 30 * time.Second,
KeepAlive: 15 * time.Second,
}).DialContext
// StorageData describes the data that is saved to KV
type StorageData struct {
Value []byte `json:"value"`
Modified time.Time `json:"modified"`
}
// ConsulStorage holds all parameters for the Consul connection
type ConsulStorage struct {
certmagic.Storage
ConsulClient *consul.Client
prefix string
valuePrefix string
aesKey []byte
locks map[string]*consul.Lock
}
// Implementation of certmagic.Waiter
type consulStorageWaiter struct {
key string
waitDuration time.Duration
wg *sync.WaitGroup
}
func (csw *consulStorageWaiter) Wait() {
csw.wg.Add(1)
go time.AfterFunc(csw.waitDuration, func() {
csw.wg.Done()
})
csw.wg.Wait()
}
// NewConsulStorage connects to Consul and returns a ConsulStorage
func NewConsulStorage() (*ConsulStorage, error) {
// get the default config
consulCfg := consul.DefaultConfig()
// set our special dialcontext to prevent default keepalive
consulCfg.Transport.DialContext = dialContext
// create the Consul API client
consulClient, err := consul.NewClient(consulCfg)
if err != nil {
return nil, fmt.Errorf("unable to create Consul client: %v", err)
}
if _, err := consulClient.Agent().NodeName(); err != nil {
return nil, fmt.Errorf("unable to ping Consul: %v", err)
}
// create ConsulStorage and pre-set values
cs := &ConsulStorage{
ConsulClient: consulClient,
prefix: DefaultPrefix,
aesKey: []byte(DefaultAESKey),
valuePrefix: DefaultValuePrefix,
locks: make(map[string]*consul.Lock),
}
// override default values from ENV
if aesKey := os.Getenv(EnvNameAESKey); aesKey != "" {
cs.aesKey = []byte(aesKey)
}
if prefix := os.Getenv(EnvNamePrefix); prefix != "" {
cs.prefix = prefix
}
if valueprefix := os.Getenv(EnvValuePrefix); valueprefix != "" {
cs.valuePrefix = valueprefix
}
return cs, nil
}
// helper function to prefix key
func (cs *ConsulStorage) prefixKey(key string) string {
return path.Join(cs.prefix, key)
}
// Lock aquires a lock for the given key or blocks until it gets it
func (cs ConsulStorage) Lock(ctx context.Context, key string) error {
// if we already hold the lock, return early
if _, exists := cs.locks[key]; exists {
return nil
}
// prepare the lock
lock, err := cs.ConsulClient.LockKey(cs.prefixKey(key))
if err != nil {
return fmt.Errorf("%s - could not create lock for %s", err.Error(), cs.prefixKey(key))
}
// aquire the lock and return a channel that is closed upon lost
lockActive, err := lock.Lock(ctx.Done())
if err != nil {
return fmt.Errorf("%s - could not get lock for %s", err.Error(), cs.prefixKey(key))
}
// auto-unlock and clean list of locks in case of lost
go func() {
<-lockActive
cs.Unlock(key)
}()
// save the lock
cs.locks[key] = lock
return nil
}
// Unlock releases a specific lock
func (cs ConsulStorage) Unlock(key string) error {
// check if we own it and unlock
if lock, exists := cs.locks[key]; exists {
err := lock.Unlock()
if err != nil {
delete(cs.locks, key)
} else {
return err
}
}
return nil
}
// Store saves encrypted value at key in Consul KV
func (cs ConsulStorage) Store(key string, value []byte) error {
kv := &consul.KVPair{Key: cs.prefixKey(key)}
// prepare the stored data
consulData := &StorageData{
Value: value,
Modified: time.Now(),
}
encryptedValue, err := cs.EncryptStorageData(consulData)
if err != nil {
return fmt.Errorf("unable to encode data for %v: %v", key, err)
}
kv.Value = encryptedValue
if _, err = cs.ConsulClient.KV().Put(kv, nil); err != nil {
return fmt.Errorf("unable to store data for %v: %v", key, err)
}
return nil
}
// Load retrieves the value for key from Consul KV
func (cs ConsulStorage) Load(key string) ([]byte, error) {
kv, _, err := cs.ConsulClient.KV().Get(cs.prefixKey(key), &consul.QueryOptions{RequireConsistent: true})
if err != nil {
return nil, fmt.Errorf("unable to obtain data for %s: %v", key, err)
} else if kv == nil {
return nil, certmagic.ErrNotExist(fmt.Errorf("key %s does not exist", key))
}
contents, err := cs.DecryptStorageData(kv.Value)
if err != nil {
return nil, fmt.Errorf("unable to decrypt data for %s: %v", key, err)
}
return contents.Value, nil
}
// Delete a key
func (cs ConsulStorage) Delete(key string) error {
// first obtain existing keypair
kv, _, err := cs.ConsulClient.KV().Get(cs.prefixKey(key), &consul.QueryOptions{RequireConsistent: true})
if err != nil {
return fmt.Errorf("unable to obtain data for %s: %v", key, err)
} else if kv == nil {
return certmagic.ErrNotExist(err)
}
// no do a Check-And-Set operation to verify we really deleted the key
if success, _, err := cs.ConsulClient.KV().DeleteCAS(kv, nil); err != nil {
return fmt.Errorf("unable to delete data for %s: %v", key, err)
} else if !success {
return fmt.Errorf("failed to lock data delete for %s", key)
}
return nil
}
// Exists checks if a key exists
func (cs ConsulStorage) Exists(key string) bool {
kv, _, err := cs.ConsulClient.KV().Get(cs.prefixKey(key), &consul.QueryOptions{RequireConsistent: true})
if kv != nil && err == nil {
return true
}
return false
}
// List returns a list with all keys under a given prefix
func (cs ConsulStorage) List(prefix string, recursive bool) ([]string, error) {
var keysFound []string
// get a list of all keys at prefix
keys, _, err := cs.ConsulClient.KV().Keys(cs.prefixKey(prefix), "", &consul.QueryOptions{RequireConsistent: true})
if err != nil {
return keysFound, err
}
if len(keys) == 0 {
return keysFound, certmagic.ErrNotExist(fmt.Errorf("no keys at %s", prefix))
}
// remove default prefix from keys
for _, key := range keys {
if strings.HasPrefix(key, cs.prefixKey(prefix)) {
key = strings.TrimPrefix(key, cs.prefix+"/")
keysFound = append(keysFound, key)
}
}
// if recursive wanted, just return all keys
if recursive {
return keysFound, nil
}
// for non-recursive split path and look for unique keys just under given prefix
keysMap := make(map[string]bool)
for _, key := range keysFound {
dir := strings.Split(strings.TrimPrefix(key, prefix+"/"), "/")
keysMap[dir[0]] = true
}
keysFound = make([]string, 0)
for key := range keysMap {
keysFound = append(keysFound, path.Join(prefix, key))
}
return keysFound, nil
}
// Stat returns statistic data of a key
func (cs ConsulStorage) Stat(key string) (certmagic.KeyInfo, error) {
kv, _, err := cs.ConsulClient.KV().Get(cs.prefixKey(key), &consul.QueryOptions{RequireConsistent: true})
if err != nil {
return certmagic.KeyInfo{}, fmt.Errorf("unable to obtain data for %s: %v", key, err)
} else if kv == nil {
return certmagic.KeyInfo{}, certmagic.ErrNotExist(fmt.Errorf("key %s does not exist", key))
}
contents, err := cs.DecryptStorageData(kv.Value)
if err != nil {
return certmagic.KeyInfo{}, fmt.Errorf("unable to decrypt data for %s: %v", key, err)
}
return certmagic.KeyInfo{
Key: key,
Modified: contents.Modified,
Size: int64(len(contents.Value)),
IsTerminal: false,
}, nil
}