mirror of https://github.com/status-im/consul.git
connect: update some function comments in CA manager
This commit is contained in:
parent
16e95f1d7b
commit
9be7c6401c
|
@ -95,7 +95,8 @@ func (c *CAManager) getPrimaryRoots() structs.IndexedCARoots {
|
||||||
}
|
}
|
||||||
|
|
||||||
// initializeCAConfig is used to initialize the CA config if necessary
|
// initializeCAConfig is used to initialize the CA config if necessary
|
||||||
// when setting up the CA during establishLeadership
|
// when setting up the CA during establishLeadership. The state should be set to
|
||||||
|
// non-ready before calling this.
|
||||||
func (c *CAManager) initializeCAConfig() (*structs.CAConfiguration, error) {
|
func (c *CAManager) initializeCAConfig() (*structs.CAConfiguration, error) {
|
||||||
state := c.srv.fsm.State()
|
state := c.srv.fsm.State()
|
||||||
_, config, err := state.CAConfig(nil)
|
_, config, err := state.CAConfig(nil)
|
||||||
|
@ -166,8 +167,8 @@ func parseCARoot(pemValue, provider, clusterID string) (*structs.CARoot, error)
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// getCAProvider is being called while holding caProviderReconfigurationLock
|
// getCAProvider returns the currently active instance of the CA Provider,
|
||||||
// which means it must never take that lock itself or call anything that does.
|
// as well as the active root.
|
||||||
func (c *CAManager) getCAProvider() (ca.Provider, *structs.CARoot) {
|
func (c *CAManager) getCAProvider() (ca.Provider, *structs.CARoot) {
|
||||||
retries := 0
|
retries := 0
|
||||||
var result ca.Provider
|
var result ca.Provider
|
||||||
|
@ -230,8 +231,12 @@ func (c *CAManager) InitializeCA() error {
|
||||||
|
|
||||||
c.setCAProvider(provider, nil)
|
c.setCAProvider(provider, nil)
|
||||||
|
|
||||||
|
// Run the root CA initialization if this is the primary DC.
|
||||||
|
if c.srv.config.PrimaryDatacenter == c.srv.config.Datacenter {
|
||||||
|
return c.initializeRootCA(provider, conf)
|
||||||
|
}
|
||||||
|
|
||||||
// If this isn't the primary DC, run the secondary DC routine if the primary has already been upgraded to at least 1.6.0
|
// If this isn't the primary DC, run the secondary DC routine if the primary has already been upgraded to at least 1.6.0
|
||||||
if c.srv.config.PrimaryDatacenter != c.srv.config.Datacenter {
|
|
||||||
versionOk, foundPrimary := ServersInDCMeetMinimumVersion(c.srv, c.srv.config.PrimaryDatacenter, minMultiDCConnectVersion)
|
versionOk, foundPrimary := ServersInDCMeetMinimumVersion(c.srv, c.srv.config.PrimaryDatacenter, minMultiDCConnectVersion)
|
||||||
if !foundPrimary {
|
if !foundPrimary {
|
||||||
c.logger.Warn("primary datacenter is configured but unreachable - deferring initialization of the secondary datacenter CA")
|
c.logger.Warn("primary datacenter is configured but unreachable - deferring initialization of the secondary datacenter CA")
|
||||||
|
@ -267,14 +272,10 @@ func (c *CAManager) InitializeCA() error {
|
||||||
|
|
||||||
c.logger.Info("initialized secondary datacenter CA with provider", "provider", conf.Provider)
|
c.logger.Info("initialized secondary datacenter CA with provider", "provider", conf.Provider)
|
||||||
return nil
|
return nil
|
||||||
}
|
|
||||||
|
|
||||||
return c.initializeRootCA(provider, conf)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// initializeRootCA runs the initialization logic for a root CA.
|
// initializeRootCA runs the initialization logic for a root CA. It should only
|
||||||
// It is being called while holding caProviderReconfigurationLock
|
// be called while the state lock is held by setting the state to non-ready.
|
||||||
// which means it must never take that lock itself or call anything that does.
|
|
||||||
func (c *CAManager) initializeRootCA(provider ca.Provider, conf *structs.CAConfiguration) error {
|
func (c *CAManager) initializeRootCA(provider ca.Provider, conf *structs.CAConfiguration) error {
|
||||||
pCfg := ca.ProviderConfig{
|
pCfg := ca.ProviderConfig{
|
||||||
ClusterID: conf.ClusterID,
|
ClusterID: conf.ClusterID,
|
||||||
|
@ -380,9 +381,8 @@ func (c *CAManager) initializeRootCA(provider ca.Provider, conf *structs.CAConfi
|
||||||
|
|
||||||
// initializeSecondaryCA runs the routine for generating an intermediate CA CSR and getting
|
// initializeSecondaryCA runs the routine for generating an intermediate CA CSR and getting
|
||||||
// it signed by the primary DC if the root CA of the primary DC has changed since the last
|
// it signed by the primary DC if the root CA of the primary DC has changed since the last
|
||||||
// intermediate.
|
// intermediate. It should only be called while the state lock is held by setting the state
|
||||||
// It is being called while holding caProviderReconfigurationLock
|
// to non-ready.
|
||||||
// which means it must never take that lock itself or call anything that does.
|
|
||||||
func (c *CAManager) initializeSecondaryCA(provider ca.Provider, config *structs.CAConfiguration) error {
|
func (c *CAManager) initializeSecondaryCA(provider ca.Provider, config *structs.CAConfiguration) error {
|
||||||
activeIntermediate, err := provider.ActiveIntermediate()
|
activeIntermediate, err := provider.ActiveIntermediate()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -493,8 +493,8 @@ func (c *CAManager) initializeSecondaryCA(provider ca.Provider, config *structs.
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// persistNewRootAndConfig is being called while holding caProviderReconfigurationLock
|
// persistNewRootAndConfig should only be called while the state lock is held
|
||||||
// which means it must never take that lock itself or call anything that does.
|
// by setting the state to non-ready.
|
||||||
// If newActiveRoot is non-nil, it will be appended to the current roots list.
|
// If newActiveRoot is non-nil, it will be appended to the current roots list.
|
||||||
// If config is non-nil, it will be used to overwrite the existing config.
|
// If config is non-nil, it will be used to overwrite the existing config.
|
||||||
func (c *CAManager) persistNewRootAndConfig(provider ca.Provider, newActiveRoot *structs.CARoot, config *structs.CAConfiguration) error {
|
func (c *CAManager) persistNewRootAndConfig(provider ca.Provider, newActiveRoot *structs.CARoot, config *structs.CAConfiguration) error {
|
||||||
|
@ -539,7 +539,7 @@ func (c *CAManager) persistNewRootAndConfig(provider ca.Provider, newActiveRoot
|
||||||
newRoot.RotatedOutAt = time.Now()
|
newRoot.RotatedOutAt = time.Now()
|
||||||
}
|
}
|
||||||
if newRoot.ExternalTrustDomain == "" {
|
if newRoot.ExternalTrustDomain == "" {
|
||||||
newRoot.ExternalTrustDomain = config.ClusterID
|
newRoot.ExternalTrustDomain = newConf.ClusterID
|
||||||
}
|
}
|
||||||
newRoots = append(newRoots, &newRoot)
|
newRoots = append(newRoots, &newRoot)
|
||||||
}
|
}
|
||||||
|
@ -798,8 +798,7 @@ func (c *CAManager) UpdateConfiguration(args *structs.CARequest) error {
|
||||||
|
|
||||||
// getIntermediateCAPrimary regenerates the intermediate cert in the primary datacenter.
|
// getIntermediateCAPrimary regenerates the intermediate cert in the primary datacenter.
|
||||||
// This is only run for CAs that require an intermediary in the primary DC, such as Vault.
|
// This is only run for CAs that require an intermediary in the primary DC, such as Vault.
|
||||||
// This function is being called while holding caProviderReconfigurationLock
|
// It should only be called while the state lock is held by setting the state to non-ready.
|
||||||
// which means it must never take that lock itself or call anything that does.
|
|
||||||
func (c *CAManager) getIntermediateCAPrimary(provider ca.Provider, newActiveRoot *structs.CARoot) error {
|
func (c *CAManager) getIntermediateCAPrimary(provider ca.Provider, newActiveRoot *structs.CARoot) error {
|
||||||
// Generate and sign an intermediate cert using the root CA.
|
// Generate and sign an intermediate cert using the root CA.
|
||||||
intermediatePEM, err := provider.GenerateIntermediate()
|
intermediatePEM, err := provider.GenerateIntermediate()
|
||||||
|
@ -821,8 +820,8 @@ func (c *CAManager) getIntermediateCAPrimary(provider ca.Provider, newActiveRoot
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// getIntermediateCASigned is being called while holding caProviderReconfigurationLock
|
// getIntermediateCASigned should only be called while the state lock is held by
|
||||||
// which means it must never take that lock itself or call anything that does.
|
// setting the state to non-ready.
|
||||||
func (c *CAManager) getIntermediateCASigned(provider ca.Provider, newActiveRoot *structs.CARoot) error {
|
func (c *CAManager) getIntermediateCASigned(provider ca.Provider, newActiveRoot *structs.CARoot) error {
|
||||||
csr, err := provider.GenerateIntermediateCSR()
|
csr, err := provider.GenerateIntermediateCSR()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -897,10 +896,11 @@ func (c *CAManager) RenewIntermediate(isPrimary bool) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
state := c.srv.fsm.State()
|
state := c.srv.fsm.State()
|
||||||
_, activeRoot, err := state.CARootActive(nil)
|
_, root, err := state.CARootActive(nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
activeRoot := root.Clone()
|
||||||
|
|
||||||
// If this is the primary, check if this is a provider that uses an intermediate cert. If
|
// If this is the primary, check if this is a provider that uses an intermediate cert. If
|
||||||
// it isn't, we don't need to check for a renewal.
|
// it isn't, we don't need to check for a renewal.
|
||||||
|
@ -971,6 +971,13 @@ func (c *CAManager) secondaryCARootWatch(ctx context.Context) error {
|
||||||
return fmt.Errorf("Error retrieving the primary datacenter's roots: %v", err)
|
return fmt.Errorf("Error retrieving the primary datacenter's roots: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Return if the context has been canceled while waiting on the RPC.
|
||||||
|
select {
|
||||||
|
case <-ctx.Done():
|
||||||
|
return ctx.Err()
|
||||||
|
default:
|
||||||
|
}
|
||||||
|
|
||||||
// Attempt to update the roots using the returned data.
|
// Attempt to update the roots using the returned data.
|
||||||
if err := c.UpdateRoots(roots); err != nil {
|
if err := c.UpdateRoots(roots); err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -1033,8 +1040,6 @@ func (c *CAManager) UpdateRoots(roots structs.IndexedCARoots) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
// initializeSecondaryProvider configures the given provider for a secondary, non-root datacenter.
|
// initializeSecondaryProvider configures the given provider for a secondary, non-root datacenter.
|
||||||
// It is being called while holding the stateLock in order to update actingSecondaryCA, which means
|
|
||||||
// it must never take that lock itself or call anything that does.
|
|
||||||
func (c *CAManager) initializeSecondaryProvider(provider ca.Provider, roots structs.IndexedCARoots) error {
|
func (c *CAManager) initializeSecondaryProvider(provider ca.Provider, roots structs.IndexedCARoots) error {
|
||||||
if roots.TrustDomain == "" {
|
if roots.TrustDomain == "" {
|
||||||
return fmt.Errorf("trust domain from primary datacenter is not initialized")
|
return fmt.Errorf("trust domain from primary datacenter is not initialized")
|
||||||
|
|
|
@ -122,6 +122,16 @@ type CARoot struct {
|
||||||
RaftIndex
|
RaftIndex
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *CARoot) Clone() *CARoot {
|
||||||
|
if c == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
newCopy := *c
|
||||||
|
copy(c.IntermediateCerts, newCopy.IntermediateCerts)
|
||||||
|
return &newCopy
|
||||||
|
}
|
||||||
|
|
||||||
// CARoots is a list of CARoot structures.
|
// CARoots is a list of CARoot structures.
|
||||||
type CARoots []*CARoot
|
type CARoots []*CARoot
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue