open-vault/helper/mfa/mfa.go

89 lines
2.9 KiB
Go
Raw Normal View History

2015-07-31 00:16:53 +00:00
// Package mfa provides wrappers to add multi-factor authentication
// to any auth method.
2015-07-31 00:16:53 +00:00
//
// To add MFA to a backend, replace its login path with the
// paths returned by MFAPaths and add the additional root
// paths returned by MFARootPaths. The backend provides
// the username to the MFA wrapper in Auth.Metadata['username'].
//
// To add an additional MFA type, create a subpackage that
// implements [Type]Paths, [Type]RootPaths, and [Type]Handler
// functions and add them to MFAPaths, MFARootPaths, and
// handlers respectively.
package mfa
import (
"context"
"github.com/hashicorp/vault/helper/mfa/duo"
"github.com/hashicorp/vault/sdk/framework"
"github.com/hashicorp/vault/sdk/logical"
)
2015-07-31 00:16:53 +00:00
// MFAPaths returns paths to wrap the original login path and configure MFA.
// When adding MFA to a backend, these paths should be included instead of
// the login path in Backend.Paths.
func MFAPaths(originalBackend *framework.Backend, loginPath *framework.Path) []*framework.Path {
var b backend
b.Backend = originalBackend
return append(duo.DuoPaths(), pathMFAConfig(&b), wrapLoginPath(&b, loginPath))
}
2015-07-31 00:16:53 +00:00
// MFARootPaths returns path strings used to configure MFA. When adding MFA
// to a backend, these paths should be included in
// Backend.PathsSpecial.Root.
func MFARootPaths() []string {
return append(duo.DuoRootPaths(), "mfa_config")
}
2015-07-31 00:16:53 +00:00
// HandlerFunc is the callback called to handle MFA for a login request.
type HandlerFunc func(context.Context, *logical.Request, *framework.FieldData, *logical.Response) (*logical.Response, error)
2015-07-28 01:05:06 +00:00
2015-07-31 00:16:53 +00:00
// handlers maps each supported MFA type to its handler.
2015-07-28 01:05:06 +00:00
var handlers = map[string]HandlerFunc{
"duo": duo.DuoHandler,
}
type backend struct {
*framework.Backend
}
func wrapLoginPath(b *backend, loginPath *framework.Path) *framework.Path {
2015-07-28 01:05:06 +00:00
loginPath.Fields["passcode"] = &framework.FieldSchema{
Type: framework.TypeString,
Description: "One time passcode (optional)",
}
2015-07-28 01:05:06 +00:00
loginPath.Fields["method"] = &framework.FieldSchema{
2016-08-19 20:48:32 +00:00
Type: framework.TypeString,
Description: "Multi-factor auth method to use (optional)",
}
2015-07-31 00:16:53 +00:00
// wrap write callback to do MFA after auth
2016-01-07 15:30:47 +00:00
loginHandler := loginPath.Callbacks[logical.UpdateOperation]
loginPath.Callbacks[logical.UpdateOperation] = b.wrapLoginHandler(loginHandler)
return loginPath
}
func (b *backend) wrapLoginHandler(loginHandler framework.OperationFunc) framework.OperationFunc {
return func(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
// login with original login function first
resp, err := loginHandler(ctx, req, d)
if err != nil || resp.Auth == nil {
return resp, err
}
// check if multi-factor enabled
mfa_config, err := b.MFAConfig(ctx, req)
if err != nil || mfa_config == nil {
return resp, nil
}
2015-07-31 00:16:53 +00:00
// perform multi-factor authentication if type supported
2015-07-28 01:05:06 +00:00
handler, ok := handlers[mfa_config.Type]
if ok {
return handler(ctx, req, d, resp)
2015-07-28 01:05:06 +00:00
} else {
return resp, err
}
}
}