2015-03-20 16:59:48 +00:00
|
|
|
package aws
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
"github.com/hashicorp/vault/logical/framework"
|
|
|
|
)
|
|
|
|
|
2015-04-27 21:20:28 +00:00
|
|
|
func pathRoles() *framework.Path {
|
2015-03-20 16:59:48 +00:00
|
|
|
return &framework.Path{
|
2015-04-27 21:20:28 +00:00
|
|
|
Pattern: `roles/(?P<name>\w+)`,
|
2015-03-20 16:59:48 +00:00
|
|
|
Fields: map[string]*framework.FieldSchema{
|
|
|
|
"name": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "Name of the policy",
|
|
|
|
},
|
|
|
|
|
|
|
|
"policy": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
2015-04-04 04:15:59 +00:00
|
|
|
Description: "IAM policy document",
|
2015-03-20 16:59:48 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
|
|
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
2015-04-27 21:20:28 +00:00
|
|
|
logical.DeleteOperation: pathRolesDelete,
|
|
|
|
logical.ReadOperation: pathRolesRead,
|
|
|
|
logical.WriteOperation: pathRolesWrite,
|
2015-03-20 16:59:48 +00:00
|
|
|
},
|
2015-04-04 04:10:54 +00:00
|
|
|
|
2015-04-27 21:20:28 +00:00
|
|
|
HelpSynopsis: pathRolesHelpSyn,
|
|
|
|
HelpDescription: pathRolesHelpDesc,
|
2015-03-20 16:59:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-27 21:20:28 +00:00
|
|
|
func pathRolesDelete(
|
2015-04-19 05:13:12 +00:00
|
|
|
req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
|
|
err := req.Storage.Delete("policy/" + d.Get("name").(string))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2015-04-27 21:20:28 +00:00
|
|
|
func pathRolesRead(
|
2015-04-19 05:13:12 +00:00
|
|
|
req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
|
|
entry, err := req.Storage.Get("policy/" + d.Get("name").(string))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if entry == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return &logical.Response{
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"policy": string(entry.Value),
|
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2015-04-27 21:20:28 +00:00
|
|
|
func pathRolesWrite(
|
2015-03-20 16:59:48 +00:00
|
|
|
req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
2015-04-01 00:26:41 +00:00
|
|
|
var buf bytes.Buffer
|
|
|
|
if err := json.Compact(&buf, []byte(d.Get("policy").(string))); err != nil {
|
2015-03-20 16:59:48 +00:00
|
|
|
return logical.ErrorResponse(fmt.Sprintf(
|
|
|
|
"Error compacting policy: %s", err)), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write the policy into storage
|
2015-04-01 00:26:41 +00:00
|
|
|
err := req.Storage.Put(&logical.StorageEntry{
|
2015-03-20 16:59:48 +00:00
|
|
|
Key: "policy/" + d.Get("name").(string),
|
2015-04-01 00:26:41 +00:00
|
|
|
Value: buf.Bytes(),
|
2015-03-20 16:59:48 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil
|
|
|
|
}
|
2015-04-04 04:10:54 +00:00
|
|
|
|
2015-04-27 21:20:28 +00:00
|
|
|
const pathRolesHelpSyn = `
|
2015-04-04 04:10:54 +00:00
|
|
|
Read and write IAM policies that access keys can be made for.
|
|
|
|
`
|
|
|
|
|
2015-04-27 21:20:28 +00:00
|
|
|
const pathRolesHelpDesc = `
|
|
|
|
This path allows you to read and write roles that are used to
|
|
|
|
create access keys. These roles have IAM policies that map directly to the route to read the
|
2015-04-04 04:10:54 +00:00
|
|
|
access keys. For example, if the backend is mounted at "aws" and you
|
2015-04-27 21:20:28 +00:00
|
|
|
create a role at "aws/roles/deploy" then a user could request access
|
|
|
|
credentials at "aws/creds/deploy".
|
2015-04-04 04:10:54 +00:00
|
|
|
|
|
|
|
The policies written are normal IAM policies. Vault will not attempt to
|
|
|
|
parse these except to validate that they're basic JSON. To validate the
|
|
|
|
keys, attempt to read an access key after writing the policy.
|
|
|
|
`
|