Skip to content

Commit

Permalink
Merge pull request #2275 from hashicorp/b-vault-race
Browse files Browse the repository at this point in the history
Fix race condition with Deriving vault tokens
  • Loading branch information
dadgar committed Feb 2, 2017
2 parents efc0602 + 4bf2401 commit 7bc9912
Showing 1 changed file with 17 additions and 7 deletions.
24 changes: 17 additions & 7 deletions client/vaultclient/vaultclient.go
Original file line number Diff line number Diff line change
Expand Up @@ -224,6 +224,13 @@ func (c *vaultClient) Stop() {
close(c.stopCh)
}

// unlockAndUnset is used to unset the vault token on the client and release the
// lock. Helper method for deferring a call that does both.
func (c *vaultClient) unlockAndUnset() {
c.client.SetToken("")
c.lock.Unlock()
}

// DeriveToken takes in an allocation and a set of tasks and for each of the
// task, it derives a vault token from nomad server and unwraps it using vault.
// The return value is a map containing all the unwrapped tokens indexed by the
Expand All @@ -236,6 +243,12 @@ func (c *vaultClient) DeriveToken(alloc *structs.Allocation, taskNames []string)
return nil, fmt.Errorf("vault client is not running")
}

c.lock.Lock()
defer c.unlockAndUnset()

// Use the token supplied to interact with vault
c.client.SetToken("")

return c.tokenDeriver(alloc, taskNames, c.client)
}

Expand All @@ -253,14 +266,11 @@ func (c *vaultClient) GetConsulACL(token, path string) (*vaultapi.Secret, error)
}

c.lock.Lock()
defer c.lock.Unlock()
defer c.unlockAndUnset()

// Use the token supplied to interact with vault
c.client.SetToken(token)

// Reset the token before returning
defer c.client.SetToken("")

// Read the consul ACL token and return the secret directly
return c.client.Logical().Read(path)
}
Expand Down Expand Up @@ -377,9 +387,6 @@ func (c *vaultClient) renew(req *vaultClientRenewalRequest) error {
var renewalErr error
leaseDuration := req.increment
if req.isToken {
// Reset the token in the API client before returning
defer c.client.SetToken("")

// Set the token in the API client to the one that needs
// renewal
c.client.SetToken(req.id)
Expand All @@ -394,6 +401,9 @@ func (c *vaultClient) renew(req *vaultClientRenewalRequest) error {
// Don't set this if renewal fails
leaseDuration = renewResp.Auth.LeaseDuration
}

// Reset the token in the API client before returning
c.client.SetToken("")
} else {
// Renew the secret
renewResp, err := c.client.Sys().Renew(req.id, req.increment)
Expand Down

0 comments on commit 7bc9912

Please sign in to comment.