2015-03-20 16:59:48 +00:00
|
|
|
package aws
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
"github.com/hashicorp/vault/logical/framework"
|
|
|
|
)
|
|
|
|
|
|
|
|
func pathPolicy() *framework.Path {
|
|
|
|
return &framework.Path{
|
|
|
|
Pattern: `policy/(?P<name>\w+)`,
|
|
|
|
Fields: map[string]*framework.FieldSchema{
|
|
|
|
"name": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "Name of the policy",
|
|
|
|
},
|
|
|
|
|
|
|
|
"policy": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
2015-04-04 04:15:59 +00:00
|
|
|
Description: "IAM policy document",
|
2015-03-20 16:59:48 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
|
|
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
|
|
|
logical.WriteOperation: pathPolicyWrite,
|
|
|
|
},
|
2015-04-04 04:10:54 +00:00
|
|
|
|
|
|
|
HelpSynopsis: pathPolicyHelpSyn,
|
|
|
|
HelpDescription: pathPolicyHelpDesc,
|
2015-03-20 16:59:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func pathPolicyWrite(
|
|
|
|
req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
2015-04-01 00:26:41 +00:00
|
|
|
var buf bytes.Buffer
|
|
|
|
if err := json.Compact(&buf, []byte(d.Get("policy").(string))); err != nil {
|
2015-03-20 16:59:48 +00:00
|
|
|
return logical.ErrorResponse(fmt.Sprintf(
|
|
|
|
"Error compacting policy: %s", err)), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write the policy into storage
|
2015-04-01 00:26:41 +00:00
|
|
|
err := req.Storage.Put(&logical.StorageEntry{
|
2015-03-20 16:59:48 +00:00
|
|
|
Key: "policy/" + d.Get("name").(string),
|
2015-04-01 00:26:41 +00:00
|
|
|
Value: buf.Bytes(),
|
2015-03-20 16:59:48 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil
|
|
|
|
}
|
2015-04-04 04:10:54 +00:00
|
|
|
|
|
|
|
const pathPolicyHelpSyn = `
|
|
|
|
Read and write IAM policies that access keys can be made for.
|
|
|
|
`
|
|
|
|
|
|
|
|
const pathPolicyHelpDesc = `
|
|
|
|
This path allows you to read and write policies that are used to
|
|
|
|
create access keys. These policies map directly to the route to read the
|
|
|
|
access keys. For example, if the backend is mounted at "aws" and you
|
|
|
|
wrote a policy to "aws/policy/deploy" then a user could request access
|
|
|
|
credentials at "aws/deploy".
|
|
|
|
|
|
|
|
The policies written are normal IAM policies. Vault will not attempt to
|
|
|
|
parse these except to validate that they're basic JSON. To validate the
|
|
|
|
keys, attempt to read an access key after writing the policy.
|
|
|
|
`
|