2015-06-17 16:39:49 +00:00
|
|
|
package ssh
|
|
|
|
|
|
|
|
import (
|
2015-06-18 00:33:03 +00:00
|
|
|
"fmt"
|
2015-06-26 01:47:32 +00:00
|
|
|
"net"
|
2015-08-13 00:10:35 +00:00
|
|
|
"time"
|
2015-06-17 16:39:49 +00:00
|
|
|
|
2015-07-22 18:15:19 +00:00
|
|
|
"github.com/hashicorp/vault/helper/uuid"
|
2015-06-17 16:39:49 +00:00
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
"github.com/hashicorp/vault/logical/framework"
|
|
|
|
)
|
|
|
|
|
2015-07-29 18:21:36 +00:00
|
|
|
type sshOTP struct {
|
|
|
|
Username string `json:"username"`
|
|
|
|
IP string `json:"ip"`
|
|
|
|
}
|
|
|
|
|
2015-07-24 16:13:26 +00:00
|
|
|
func pathCredsCreate(b *backend) *framework.Path {
|
2015-06-17 16:39:49 +00:00
|
|
|
return &framework.Path{
|
2015-08-13 00:36:27 +00:00
|
|
|
Pattern: "creds/(?P<role>[-\\w]+)",
|
2015-06-17 16:39:49 +00:00
|
|
|
Fields: map[string]*framework.FieldSchema{
|
2015-08-13 00:36:27 +00:00
|
|
|
"role": &framework.FieldSchema{
|
2015-06-24 22:13:12 +00:00
|
|
|
Type: framework.TypeString,
|
2015-08-13 00:36:27 +00:00
|
|
|
Description: "Name of the role",
|
2015-06-24 22:13:12 +00:00
|
|
|
},
|
2015-06-17 16:39:49 +00:00
|
|
|
"username": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
2015-08-13 00:36:27 +00:00
|
|
|
Description: "Username in target",
|
2015-06-17 16:39:49 +00:00
|
|
|
},
|
2015-06-24 22:13:12 +00:00
|
|
|
"ip": &framework.FieldSchema{
|
2015-06-17 16:39:49 +00:00
|
|
|
Type: framework.TypeString,
|
2015-06-24 22:13:12 +00:00
|
|
|
Description: "IP of the target machine",
|
2015-06-17 16:39:49 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
2015-07-27 17:02:31 +00:00
|
|
|
logical.WriteOperation: b.pathCredsCreateWrite,
|
2015-06-17 16:39:49 +00:00
|
|
|
},
|
2015-07-27 17:02:31 +00:00
|
|
|
HelpSynopsis: pathCredsCreateHelpSyn,
|
|
|
|
HelpDescription: pathCredsCreateHelpDesc,
|
2015-06-17 16:39:49 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-27 17:02:31 +00:00
|
|
|
func (b *backend) pathCredsCreateWrite(
|
2015-06-17 16:39:49 +00:00
|
|
|
req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
2015-08-13 00:36:27 +00:00
|
|
|
roleName := d.Get("role").(string)
|
2015-06-30 20:30:13 +00:00
|
|
|
if roleName == "" {
|
2015-08-13 00:36:27 +00:00
|
|
|
return logical.ErrorResponse("Missing role"), nil
|
2015-06-30 20:30:13 +00:00
|
|
|
}
|
2015-07-27 17:02:31 +00:00
|
|
|
|
|
|
|
username := d.Get("username").(string)
|
|
|
|
|
|
|
|
ipRaw := d.Get("ip").(string)
|
2015-06-30 20:30:13 +00:00
|
|
|
if ipRaw == "" {
|
2015-07-02 01:26:42 +00:00
|
|
|
return logical.ErrorResponse("Missing ip"), nil
|
2015-06-30 20:30:13 +00:00
|
|
|
}
|
2015-06-18 00:33:03 +00:00
|
|
|
|
2015-08-13 18:12:30 +00:00
|
|
|
role, err := b.getRole(req.Storage, roleName)
|
2015-06-19 00:48:41 +00:00
|
|
|
if err != nil {
|
2015-06-24 22:13:12 +00:00
|
|
|
return nil, fmt.Errorf("error retrieving role: %s", err)
|
|
|
|
}
|
2015-08-13 18:12:30 +00:00
|
|
|
if role == nil {
|
2015-06-24 22:13:12 +00:00
|
|
|
return logical.ErrorResponse(fmt.Sprintf("Role '%s' not found", roleName)), nil
|
|
|
|
}
|
2015-06-19 00:48:41 +00:00
|
|
|
|
2015-07-02 21:23:09 +00:00
|
|
|
// Set the default username
|
2015-06-30 20:30:13 +00:00
|
|
|
if username == "" {
|
2015-07-27 19:03:10 +00:00
|
|
|
if role.DefaultUser == "" {
|
|
|
|
return logical.ErrorResponse("No default username registered. Use 'username' option"), nil
|
|
|
|
}
|
2015-06-30 20:30:13 +00:00
|
|
|
username = role.DefaultUser
|
|
|
|
}
|
|
|
|
|
2015-07-02 21:23:09 +00:00
|
|
|
// Validate the IP address
|
2015-06-26 01:47:32 +00:00
|
|
|
ipAddr := net.ParseIP(ipRaw)
|
|
|
|
if ipAddr == nil {
|
|
|
|
return logical.ErrorResponse(fmt.Sprintf("Invalid IP '%s'", ipRaw)), nil
|
|
|
|
}
|
|
|
|
ip := ipAddr.String()
|
2015-08-13 15:46:55 +00:00
|
|
|
ipMatched, err := cidrContainsIP(ip, role.CIDRList)
|
2015-07-02 21:23:09 +00:00
|
|
|
if err != nil {
|
|
|
|
return logical.ErrorResponse(fmt.Sprintf("Error validating IP: %s", err)), nil
|
2015-06-26 01:47:32 +00:00
|
|
|
}
|
|
|
|
if !ipMatched {
|
|
|
|
return logical.ErrorResponse(fmt.Sprintf("IP[%s] does not belong to role[%s]", ip, roleName)), nil
|
|
|
|
}
|
2015-06-24 22:13:12 +00:00
|
|
|
|
2015-07-22 18:15:19 +00:00
|
|
|
var result *logical.Response
|
|
|
|
if role.KeyType == KeyTypeOTP {
|
2015-07-29 18:21:36 +00:00
|
|
|
otp, err := b.GenerateOTPCredential(req, username, ip)
|
2015-07-22 18:15:19 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
result = b.Secret(SecretOTPType).Response(map[string]interface{}{
|
2015-07-23 21:20:28 +00:00
|
|
|
"key_type": role.KeyType,
|
|
|
|
"key": otp,
|
2015-07-22 18:15:19 +00:00
|
|
|
}, map[string]interface{}{
|
|
|
|
"otp": otp,
|
|
|
|
})
|
|
|
|
} else if role.KeyType == KeyTypeDynamic {
|
2015-08-13 18:12:30 +00:00
|
|
|
dynamicPublicKey, dynamicPrivateKey, err := b.GenerateDynamicCredential(req, role, username, ip)
|
2015-07-22 18:15:19 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
result = b.Secret(SecretDynamicKeyType).Response(map[string]interface{}{
|
2015-07-23 21:20:28 +00:00
|
|
|
"key": dynamicPrivateKey,
|
|
|
|
"key_type": role.KeyType,
|
2015-07-22 18:15:19 +00:00
|
|
|
}, map[string]interface{}{
|
2015-07-27 19:03:10 +00:00
|
|
|
"admin_user": role.AdminUser,
|
2015-07-22 18:15:19 +00:00
|
|
|
"username": username,
|
|
|
|
"ip": ip,
|
|
|
|
"host_key_name": role.KeyName,
|
|
|
|
"dynamic_public_key": dynamicPublicKey,
|
|
|
|
"port": role.Port,
|
2015-08-06 19:50:12 +00:00
|
|
|
"install_script": role.InstallScript,
|
2015-07-22 18:15:19 +00:00
|
|
|
})
|
|
|
|
} else {
|
|
|
|
return nil, fmt.Errorf("key type unknown")
|
2015-06-30 20:30:13 +00:00
|
|
|
}
|
2015-06-29 15:49:34 +00:00
|
|
|
|
2015-07-02 21:23:09 +00:00
|
|
|
// Change the lease information to reflect user's choice
|
2015-07-01 00:21:41 +00:00
|
|
|
lease, _ := b.Lease(req.Storage)
|
2015-07-31 17:24:23 +00:00
|
|
|
|
2015-07-01 00:21:41 +00:00
|
|
|
if lease != nil {
|
|
|
|
result.Secret.Lease = lease.Lease
|
|
|
|
result.Secret.LeaseGracePeriod = lease.LeaseMax
|
|
|
|
}
|
2015-07-31 17:24:23 +00:00
|
|
|
|
2015-08-13 00:10:35 +00:00
|
|
|
if lease == nil {
|
2015-08-13 15:46:55 +00:00
|
|
|
result.Secret.Lease = 10 * time.Minute
|
|
|
|
result.Secret.LeaseGracePeriod = 2 * time.Minute
|
2015-08-13 00:10:35 +00:00
|
|
|
}
|
|
|
|
|
2015-07-01 00:21:41 +00:00
|
|
|
return result, nil
|
2015-06-26 01:47:32 +00:00
|
|
|
}
|
|
|
|
|
2015-07-29 18:21:36 +00:00
|
|
|
// Generates a RSA key pair and installs it in the remote target
|
|
|
|
func (b *backend) GenerateDynamicCredential(req *logical.Request, role *sshRole, username, ip string) (string, string, error) {
|
|
|
|
// Fetch the host key to be used for dynamic key installation
|
|
|
|
keyEntry, err := req.Storage.Get(fmt.Sprintf("keys/%s", role.KeyName))
|
|
|
|
if err != nil {
|
|
|
|
return "", "", fmt.Errorf("key '%s' not found error:%s", role.KeyName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if keyEntry == nil {
|
|
|
|
return "", "", fmt.Errorf("key '%s' not found", role.KeyName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var hostKey sshHostKey
|
|
|
|
if err := keyEntry.DecodeJSON(&hostKey); err != nil {
|
|
|
|
return "", "", fmt.Errorf("error reading the host key: %s", err)
|
|
|
|
}
|
|
|
|
|
2015-08-13 17:36:31 +00:00
|
|
|
dynamicPublicKey, dynamicPrivateKey, err := generateRSAKeys(role.KeyBits)
|
2015-07-29 18:21:36 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", "", fmt.Errorf("error generating key: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Transfer the public key to target machine
|
2015-08-13 18:12:30 +00:00
|
|
|
_, publicKeyFileName := b.GenerateSaltedOTP()
|
2015-08-06 18:48:19 +00:00
|
|
|
err = scpUpload(role.AdminUser, ip, role.Port, hostKey.Key, publicKeyFileName, dynamicPublicKey)
|
2015-07-29 18:21:36 +00:00
|
|
|
if err != nil {
|
2015-08-06 18:48:19 +00:00
|
|
|
return "", "", fmt.Errorf("error uploading public key: %s", err)
|
|
|
|
}
|
2015-08-06 19:50:12 +00:00
|
|
|
|
|
|
|
scriptFileName := fmt.Sprintf("%s.sh", publicKeyFileName)
|
2015-08-06 18:48:19 +00:00
|
|
|
err = scpUpload(role.AdminUser, ip, role.Port, hostKey.Key, scriptFileName, role.InstallScript)
|
|
|
|
if err != nil {
|
|
|
|
return "", "", fmt.Errorf("error uploading install script: %s", err)
|
2015-07-29 18:21:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Add the public key to authorized_keys file in target machine
|
2015-08-13 17:36:31 +00:00
|
|
|
err = installPublicKeyInTarget(role.AdminUser, publicKeyFileName, username, ip, role.Port, hostKey.Key, true)
|
2015-07-29 18:21:36 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", "", fmt.Errorf("error adding public key to authorized_keys file in target")
|
|
|
|
}
|
|
|
|
return dynamicPublicKey, dynamicPrivateKey, nil
|
2015-07-22 18:15:19 +00:00
|
|
|
}
|
|
|
|
|
2015-08-13 18:12:30 +00:00
|
|
|
// Generates a UUID OTP and its salted value based on the salt of the backend.
|
|
|
|
func (b *backend) GenerateSaltedOTP() (string, string) {
|
|
|
|
str := uuid.GenerateUUID()
|
|
|
|
return str, b.salt.SaltID(str)
|
|
|
|
}
|
|
|
|
|
2015-07-31 17:24:23 +00:00
|
|
|
// Generates a salted OTP and creates an entry for the same in storage backend.
|
2015-07-29 18:21:36 +00:00
|
|
|
func (b *backend) GenerateOTPCredential(req *logical.Request, username, ip string) (string, error) {
|
2015-08-13 18:12:30 +00:00
|
|
|
otp, otpSalted := b.GenerateSaltedOTP()
|
2015-07-29 18:21:36 +00:00
|
|
|
entry, err := req.Storage.Get("otp/" + otpSalted)
|
|
|
|
// Make sure that new OTP is not replacing an existing one
|
|
|
|
for err == nil && entry != nil {
|
2015-08-13 18:12:30 +00:00
|
|
|
otp, otpSalted = b.GenerateSaltedOTP()
|
2015-07-29 18:21:36 +00:00
|
|
|
entry, err = req.Storage.Get("otp/" + otpSalted)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
entry, err = logical.StorageEntryJSON("otp/"+otpSalted, sshOTP{
|
|
|
|
Username: username,
|
|
|
|
IP: ip,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
if err := req.Storage.Put(entry); err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return otp, nil
|
2015-06-17 16:39:49 +00:00
|
|
|
}
|
|
|
|
|
2015-07-27 17:02:31 +00:00
|
|
|
const pathCredsCreateHelpSyn = `
|
2015-08-13 00:36:27 +00:00
|
|
|
Creates a credential for establishing SSH connection with the remote host.
|
2015-06-17 16:39:49 +00:00
|
|
|
`
|
|
|
|
|
2015-07-27 17:02:31 +00:00
|
|
|
const pathCredsCreateHelpDesc = `
|
|
|
|
This path will generate a new key for establishing SSH session with
|
|
|
|
target host. The key can either be a long lived dynamic key or a One
|
|
|
|
Time Password (OTP), using 'key_type' parameter being 'dynamic' or
|
|
|
|
'otp' respectively. For dynamic keys, a named key should be supplied.
|
|
|
|
Create named key using the 'keys/' endpoint, and this represents the
|
|
|
|
shared SSH key of target host. If this backend is mounted at 'ssh',
|
|
|
|
then "ssh/creds/web" would generate a key for 'web' role.
|
|
|
|
|
|
|
|
Keys will have a lease associated with them. The access keys can be
|
|
|
|
revoked by using the lease ID.
|
2015-06-17 16:39:49 +00:00
|
|
|
`
|