open-vault/builtin/logical/ssh/path_creds_create.go

325 lines
9.9 KiB
Go
Raw Normal View History

package ssh
import (
"fmt"
"net"
"strings"
"github.com/hashicorp/go-uuid"
"github.com/hashicorp/vault/logical"
"github.com/hashicorp/vault/logical/framework"
)
2015-07-29 18:21:36 +00:00
type sshOTP struct {
Username string `json:"username"`
IP string `json:"ip"`
}
2015-07-24 16:13:26 +00:00
func pathCredsCreate(b *backend) *framework.Path {
return &framework.Path{
Pattern: "creds/" + framework.GenericNameRegex("role"),
Fields: map[string]*framework.FieldSchema{
"role": &framework.FieldSchema{
Type: framework.TypeString,
Description: "[Required] Name of the role",
},
"username": &framework.FieldSchema{
Type: framework.TypeString,
Description: "[Optional] Username in remote host",
},
"ip": &framework.FieldSchema{
Type: framework.TypeString,
Description: "[Required] IP of the remote host",
},
},
Callbacks: map[logical.Operation]framework.OperationFunc{
2016-01-07 15:30:47 +00:00
logical.UpdateOperation: b.pathCredsCreateWrite,
},
2015-07-27 17:02:31 +00:00
HelpSynopsis: pathCredsCreateHelpSyn,
HelpDescription: pathCredsCreateHelpDesc,
}
}
2015-07-27 17:02:31 +00:00
func (b *backend) pathCredsCreateWrite(
req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
roleName := d.Get("role").(string)
if roleName == "" {
return logical.ErrorResponse("Missing role"), nil
}
2015-07-27 17:02:31 +00:00
ipRaw := d.Get("ip").(string)
if ipRaw == "" {
return logical.ErrorResponse("Missing ip"), nil
}
role, err := b.getRole(req.Storage, roleName)
if err != nil {
return nil, fmt.Errorf("error retrieving role: %s", err)
}
if role == nil {
return logical.ErrorResponse(fmt.Sprintf("Role '%s' not found", roleName)), nil
}
// username is an optional parameter.
username := d.Get("username").(string)
2015-07-02 21:23:09 +00:00
// Set the default username
if username == "" {
2015-07-27 19:03:10 +00:00
if role.DefaultUser == "" {
return logical.ErrorResponse("No default username registered. Use 'username' option"), nil
}
username = role.DefaultUser
}
if role.AllowedUsers != "" {
// Check if the username is present in allowed users list.
err := validateUsername(username, role.AllowedUsers)
// If username is not present in allowed users list, check if it
// is the default username in the role. If neither is true, then
// that username is not allowed to generate a credential.
if err != nil && username != role.DefaultUser {
return logical.ErrorResponse("Username is not present is allowed users list"), nil
}
} else if username != role.DefaultUser {
return logical.ErrorResponse("Username has to be either in allowed users list or has to be a default username"), nil
}
2015-07-02 21:23:09 +00:00
// Validate the IP address
ipAddr := net.ParseIP(ipRaw)
if ipAddr == nil {
return logical.ErrorResponse(fmt.Sprintf("Invalid IP '%s'", ipRaw)), nil
}
// Check if the IP belongs to the registered list of CIDR blocks under the role
ip := ipAddr.String()
zeroAddressEntry, err := b.getZeroAddressRoles(req.Storage)
if err != nil {
return nil, fmt.Errorf("error retrieving zero-address roles: %s", err)
}
var zeroAddressRoles []string
if zeroAddressEntry != nil {
zeroAddressRoles = zeroAddressEntry.Roles
}
err = validateIP(ip, roleName, role.CIDRList, role.ExcludeCIDRList, zeroAddressRoles)
2015-07-02 21:23:09 +00:00
if err != nil {
return logical.ErrorResponse(fmt.Sprintf("Error validating IP: %s", err)), nil
}
2015-07-22 18:15:19 +00:00
var result *logical.Response
if role.KeyType == KeyTypeOTP {
// Generate an OTP
2015-07-29 18:21:36 +00:00
otp, err := b.GenerateOTPCredential(req, username, ip)
2015-07-22 18:15:19 +00:00
if err != nil {
return nil, err
}
// Return the information relevant to user of OTP type and save
// the data required for later use in the internal section of secret.
// In this case, saving just the OTP is sufficient since there is
// no need to establish connection with the remote host.
2015-07-22 18:15:19 +00:00
result = b.Secret(SecretOTPType).Response(map[string]interface{}{
"key_type": role.KeyType,
"key": otp,
2015-08-13 23:55:47 +00:00
"username": username,
"ip": ip,
"port": role.Port,
2015-07-22 18:15:19 +00:00
}, map[string]interface{}{
"otp": otp,
})
} else if role.KeyType == KeyTypeDynamic {
// Generate an RSA key pair. This also installs the newly generated
// public key in the remote host.
dynamicPublicKey, dynamicPrivateKey, err := b.GenerateDynamicCredential(req, role, username, ip)
2015-07-22 18:15:19 +00:00
if err != nil {
return nil, err
}
// Return the information relevant to user of dynamic type and save
// information required for later use in internal section of secret.
2015-07-22 18:15:19 +00:00
result = b.Secret(SecretDynamicKeyType).Response(map[string]interface{}{
"key": dynamicPrivateKey,
"key_type": role.KeyType,
2015-08-13 23:55:47 +00:00
"username": username,
"ip": ip,
"port": role.Port,
2015-07-22 18:15:19 +00:00
}, map[string]interface{}{
2015-07-27 19:03:10 +00:00
"admin_user": role.AdminUser,
2015-07-22 18:15:19 +00:00
"username": username,
"ip": ip,
"host_key_name": role.KeyName,
"dynamic_public_key": dynamicPublicKey,
"port": role.Port,
"install_script": role.InstallScript,
2015-07-22 18:15:19 +00:00
})
} else {
return nil, fmt.Errorf("key type unknown")
}
2015-06-29 15:49:34 +00:00
2015-07-01 00:21:41 +00:00
return result, nil
}
2015-07-29 18:21:36 +00:00
// Generates a RSA key pair and installs it in the remote target
func (b *backend) GenerateDynamicCredential(req *logical.Request, role *sshRole, username, ip string) (string, string, error) {
// Fetch the host key to be used for dynamic key installation
keyEntry, err := req.Storage.Get(fmt.Sprintf("keys/%s", role.KeyName))
if err != nil {
return "", "", fmt.Errorf("key '%s' not found. err:%s", role.KeyName, err)
2015-07-29 18:21:36 +00:00
}
if keyEntry == nil {
return "", "", fmt.Errorf("key '%s' not found", role.KeyName)
2015-07-29 18:21:36 +00:00
}
var hostKey sshHostKey
if err := keyEntry.DecodeJSON(&hostKey); err != nil {
return "", "", fmt.Errorf("error reading the host key: %s", err)
}
// Generate a new RSA key pair with the given key length.
dynamicPublicKey, dynamicPrivateKey, err := generateRSAKeys(role.KeyBits)
2015-07-29 18:21:36 +00:00
if err != nil {
return "", "", fmt.Errorf("error generating key: %s", err)
}
if len(role.KeyOptionSpecs) != 0 {
dynamicPublicKey = fmt.Sprintf("%s %s", role.KeyOptionSpecs, dynamicPublicKey)
}
2015-07-29 18:21:36 +00:00
// Add the public key to authorized_keys file in target machine
err = b.installPublicKeyInTarget(role.AdminUser, username, ip, role.Port, hostKey.Key, dynamicPublicKey, role.InstallScript, true)
2015-07-29 18:21:36 +00:00
if err != nil {
return "", "", fmt.Errorf("error adding public key to authorized_keys file in target")
}
return dynamicPublicKey, dynamicPrivateKey, nil
2015-07-22 18:15:19 +00:00
}
// Generates a UUID OTP and its salted value based on the salt of the backend.
func (b *backend) GenerateSaltedOTP() (string, string, error) {
str, err := uuid.GenerateUUID()
if err != nil {
return "", "", err
}
return str, b.salt.SaltID(str), nil
}
// Generates an UUID OTP and creates an entry for the same in storage backend with its salted string.
2015-07-29 18:21:36 +00:00
func (b *backend) GenerateOTPCredential(req *logical.Request, username, ip string) (string, error) {
otp, otpSalted, err := b.GenerateSaltedOTP()
if err != nil {
return "", err
}
// Check if there is an entry already created for the newly generated OTP.
entry, err := b.getOTP(req.Storage, otpSalted)
// If entry already exists for the OTP, make sure that new OTP is not
// replacing an existing one by recreating new ones until an unused
// OTP is generated. It is very unlikely that this is the case and this
// code is just for safety.
2015-07-29 18:21:36 +00:00
for err == nil && entry != nil {
otp, otpSalted, err = b.GenerateSaltedOTP()
if err != nil {
return "", err
}
entry, err = b.getOTP(req.Storage, otpSalted)
2015-07-29 18:21:36 +00:00
if err != nil {
return "", err
}
}
// Store an entry for the salt of OTP.
newEntry, err := logical.StorageEntryJSON("otp/"+otpSalted, sshOTP{
2015-07-29 18:21:36 +00:00
Username: username,
IP: ip,
})
if err != nil {
return "", err
}
if err := req.Storage.Put(newEntry); err != nil {
2015-07-29 18:21:36 +00:00
return "", err
}
return otp, nil
}
// ValidateIP first checks if the role belongs to the list of privileged
// roles that could allow any IP address and if there is a match, IP is
// accepted immediately. If not, IP is searched in the allowed CIDR blocks
// registered with the role. If there is a match, then it is searched in the
// excluded CIDR blocks and if IP is found there as well, an error is returned.
// IP is valid only if it is encompassed by allowed CIDR blocks and not by
// excluded CIDR blocks.
func validateIP(ip, roleName, cidrList, excludeCidrList string, zeroAddressRoles []string) error {
// Search IP in the zero-address list
for _, role := range zeroAddressRoles {
if roleName == role {
return nil
}
}
// Search IP in allowed CIDR blocks
ipMatched, err := cidrListContainsIP(ip, cidrList)
if err != nil {
return err
}
if !ipMatched {
return fmt.Errorf("IP does not belong to role")
}
if len(excludeCidrList) == 0 {
return nil
}
// Search IP in exclude list
ipMatched, err = cidrListContainsIP(ip, excludeCidrList)
if err != nil {
return err
}
if ipMatched {
return fmt.Errorf("IP does not belong to role")
}
return nil
}
// Checks if the username supplied by the user is present in the list of
// allowed users registered which creation of role.
func validateUsername(username, allowedUsers string) error {
2016-05-30 07:12:43 +00:00
if allowedUsers == "" {
return fmt.Errorf("username not in allowed users list")
}
// Role was explicitly configured to allow any username.
if allowedUsers == "*" {
return nil
}
userList := strings.Split(allowedUsers, ",")
for _, user := range userList {
2016-05-30 07:12:43 +00:00
if strings.TrimSpace(user) == username {
return nil
}
}
2016-05-30 07:12:43 +00:00
return fmt.Errorf("username not in allowed users list")
}
2015-07-27 17:02:31 +00:00
const pathCredsCreateHelpSyn = `
Creates a credential for establishing SSH connection with the remote host.
`
2015-07-27 17:02:31 +00:00
const pathCredsCreateHelpDesc = `
This path will generate a new key for establishing SSH session with
target host. The key can either be a long lived dynamic key or a One
Time Password (OTP), using 'key_type' parameter being 'dynamic' or
2015-07-27 17:02:31 +00:00
'otp' respectively. For dynamic keys, a named key should be supplied.
Create named key using the 'keys/' endpoint, and this represents the
shared SSH key of target host. If this backend is mounted at 'ssh',
then "ssh/creds/web" would generate a key for 'web' role.
Keys will have a lease associated with them. The access keys can be
revoked by using the lease ID.
`