Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(vault): support array type config reference and multiple nginx subsystem #13855

Open
wants to merge 8 commits into
base: master
Choose a base branch
from
Open
4 changes: 4 additions & 0 deletions changelog/unreleased/kong/fix-vault-array-config.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
message: |
**Vault**: Fixed an issue where array-like configuration fields cannot contain vault reference.
type: bugfix
scope: Core
4 changes: 4 additions & 0 deletions changelog/unreleased/kong/fix-vault-stream-subsystem.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
message: |
**Vault**: Fixed an issue where vault reference in kong configuration cannot be dereferenced when both http and stream subsystems are enabled.
type: bugfix
scope: Core
2 changes: 1 addition & 1 deletion kong/cmd/stop.lua
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ local function execute(args, opts)
-- load <PREFIX>/kong.conf containing running node's config
local conf = assert(conf_loader(default_conf.kong_env, {
prefix = args.prefix
}))
}, { stopping = true }))
assert(nginx_signals.stop(conf))

if opts.quiet then
Expand Down
4 changes: 3 additions & 1 deletion kong/cmd/utils/inject_confs.lua
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,9 @@ local function load_conf(args)

if pl_path.exists(conf.kong_env) then
-- load <PREFIX>/kong.conf containing running node's config
conf = assert(conf_loader(conf.kong_env))
conf = assert(conf_loader(conf.kong_env, {
prefix = conf.prefix
}))
end

-- make sure necessary files like `.ca_combined` exist
Expand Down
13 changes: 12 additions & 1 deletion kong/cmd/utils/nginx_signals.lua
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,18 @@ local function set_process_secrets_env(kong_conf)
return nil, err
end

return C.setenv("KONG_PROCESS_SECRETS", secrets, 1) == 0
local ok_sub_http
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In unset_set_process_secrets_env, do we need to unset the two new envs correspondingly?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

fixed

if kong_conf.role == "control_plane" or #kong_conf.proxy_listeners > 0
or #kong_conf.admin_listeners > 0 or #kong_conf.status_listeners > 0 then
ok_sub_http = C.setenv("KONG_PROCESS_SECRETS_HTTP", secrets, 1) == 0
end

local ok_sub_stream
if #kong_conf.stream_listeners > 0 then
ok_sub_stream = C.setenv("KONG_PROCESS_SECRETS_STREAM", secrets, 1) == 0
end

return ok_sub_http or ok_sub_stream
end


Expand Down
108 changes: 71 additions & 37 deletions kong/cmd/utils/prefix_handler.lua
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ local nginx_signals = require "kong.cmd.utils.nginx_signals"

local strip = require("kong.tools.string").strip
local split = require("kong.tools.string").split
local shallow_copy = require("kong.tools.table").shallow_copy


local getmetatable = getmetatable
Expand Down Expand Up @@ -373,40 +374,62 @@ local function write_env_file(path, data)
return true
end

local function write_process_secrets_file(path, data)
os.remove(path)
local function write_process_secrets_file(kong_conf, data)
local path = kong_conf.kong_process_secrets

local flags = bit.bor(system_constants.O_RDONLY(),
system_constants.O_CREAT())
local function write_single_secret_file(path, data)
os.remove(path)

local mode = ffi.new("int", bit.bor(system_constants.S_IRUSR(),
system_constants.S_IWUSR()))
local flags = bit.bor(system_constants.O_RDONLY(),
system_constants.O_CREAT())

local fd = ffi.C.open(path, flags, mode)
if fd < 0 then
local errno = ffi.errno()
return nil, "unable to open process secrets path " .. path .. " (" ..
ffi.string(ffi.C.strerror(errno)) .. ")"
end
local mode = ffi.new("int", bit.bor(system_constants.S_IRUSR(),
system_constants.S_IWUSR()))

local ok = ffi.C.close(fd)
if ok ~= 0 then
local errno = ffi.errno()
return nil, "failed to close fd (" ..
ffi.string(ffi.C.strerror(errno)) .. ")"
end
local fd = ffi.C.open(path, flags, mode)
if fd < 0 then
local errno = ffi.errno()
return nil, "unable to open process secrets path " .. path .. " (" ..
ffi.string(ffi.C.strerror(errno)) .. ")"
end

local file, err = io.open(path, "w+b")
if not file then
return nil, "unable to open process secrets path " .. path .. " (" .. err .. ")"
end
local ok = ffi.C.close(fd)
if ok ~= 0 then
local errno = ffi.errno()
return nil, "failed to close fd (" ..
ffi.string(ffi.C.strerror(errno)) .. ")"
end

local ok, err = file:write(data)
local file, err = io.open(path, "w+b")
if not file then
return nil, "unable to open process secrets path " .. path .. " (" .. err .. ")"
end

file:close()
local ok, err = file:write(data)

if not ok then
return nil, "unable to write process secrets path " .. path .. " (" .. err .. ")"
file:close()

if not ok then
return nil, "unable to write process secrets path " .. path .. " (" .. err .. ")"
end

return true

end

if kong_conf.role == "control_plane" or #kong_conf.proxy_listeners > 0
or #kong_conf.admin_listeners > 0 or #kong_conf.status_listeners > 0 then
local ok, err = write_single_secret_file(path .. "_http", data)
if not ok then
return nil, err
end
end

if #kong_conf.stream_listeners > 0 then
local ok, err = write_single_secret_file(path .. "_stream", data)
if not ok then
return nil, err
end
end

return true
Expand Down Expand Up @@ -829,21 +852,32 @@ local function prepare_prefix(kong_config, nginx_custom_template_path, skip_writ
"",
}

local refs = kong_config["$refs"]
local has_refs = refs and type(refs) == "table"

local secrets
if write_process_secrets and has_refs then
secrets = process_secrets.extract(kong_config)
end

local function quote_hash(s)
return s:gsub("#", "\\#")
end

local refs = kong_config["$refs"]
local has_refs = refs and type(refs) == "table"
local secrets = process_secrets.extract(kong_config)

for k, v in pairs(kong_config) do
-- do not output secrets in .kong_env
if has_refs and refs[k] then
v = refs[k]
local ref = refs[k]
if type(ref) == "table" then
if type(v) ~= "table" then
v = { v }
else
v = shallow_copy(v)
end

for i, r in pairs(ref) do
v[i] = r
end

elseif ref then
v = ref
end
end

if type(v) == "table" then
Expand All @@ -869,13 +903,13 @@ local function prepare_prefix(kong_config, nginx_custom_template_path, skip_writ
prepare_prefixed_interface_dir("/usr/local/kong", "gui", kong_config)
end

if secrets then
if secrets and write_process_secrets then
secrets, err = process_secrets.serialize(secrets, kong_config.kong_env)
if not secrets then
return nil, err
end

ok, err = write_process_secrets_file(kong_config.kong_process_secrets, secrets)
ok, err = write_process_secrets_file(kong_config, secrets)
if not ok then
return nil, err
end
Expand Down
3 changes: 2 additions & 1 deletion kong/cmd/utils/process_secrets.lua
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ local fmt = string.format
local sub = string.sub
local type = type
local pairs = pairs
local shallow_copy = require("kong.tools.table").shallow_copy


local CIPHER_ALG = "aes-256-gcm"
Expand Down Expand Up @@ -64,7 +65,7 @@ local function extract(conf)

local secrets = {}
for k in pairs(refs) do
secrets[k] = conf[k]
secrets[k] = shallow_copy(conf[k])
end

return secrets
Expand Down
1 change: 1 addition & 0 deletions kong/conf_loader/constants.lua
Original file line number Diff line number Diff line change
Expand Up @@ -591,6 +591,7 @@ local CONF_SENSITIVE = {
admin_gui_ssl_cert_key = true,
status_ssl_cert_key = true,
debug_ssl_cert_key = true,
["$refs"] = true, -- for internal use only, no need to log
}


Expand Down
Loading
Loading