2015-06-17 16:39:49 +00:00
|
|
|
package ssh
|
|
|
|
|
|
|
|
import (
|
2015-06-18 00:33:03 +00:00
|
|
|
"bytes"
|
2015-06-26 01:47:32 +00:00
|
|
|
"encoding/json"
|
2015-06-18 00:33:03 +00:00
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
2015-06-17 16:39:49 +00:00
|
|
|
"log"
|
2015-06-26 01:47:32 +00:00
|
|
|
"net"
|
2015-06-19 00:48:41 +00:00
|
|
|
"strings"
|
2015-06-17 16:39:49 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
"github.com/hashicorp/vault/logical/framework"
|
|
|
|
)
|
|
|
|
|
2015-06-24 22:13:12 +00:00
|
|
|
func pathRoleCreate(b *backend) *framework.Path {
|
2015-06-17 16:39:49 +00:00
|
|
|
log.Printf("Vishal: ssh.sshConnect\n")
|
|
|
|
return &framework.Path{
|
2015-06-24 22:13:12 +00:00
|
|
|
Pattern: "creds/(?P<name>\\w+)",
|
2015-06-17 16:39:49 +00:00
|
|
|
Fields: map[string]*framework.FieldSchema{
|
2015-06-24 22:13:12 +00:00
|
|
|
"name": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "name of the policy",
|
|
|
|
},
|
2015-06-17 16:39:49 +00:00
|
|
|
"username": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
2015-06-24 22:13:12 +00:00
|
|
|
Description: "username in target",
|
2015-06-17 16:39:49 +00:00
|
|
|
},
|
2015-06-24 22:13:12 +00:00
|
|
|
"ip": &framework.FieldSchema{
|
2015-06-17 16:39:49 +00:00
|
|
|
Type: framework.TypeString,
|
2015-06-24 22:13:12 +00:00
|
|
|
Description: "IP of the target machine",
|
2015-06-17 16:39:49 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
2015-06-24 22:13:12 +00:00
|
|
|
logical.WriteOperation: b.pathRoleCreateWrite,
|
2015-06-17 16:39:49 +00:00
|
|
|
},
|
|
|
|
HelpSynopsis: sshConnectHelpSyn,
|
|
|
|
HelpDescription: sshConnectHelpDesc,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-24 22:13:12 +00:00
|
|
|
func (b *backend) pathRoleCreateWrite(
|
2015-06-17 16:39:49 +00:00
|
|
|
req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
2015-06-24 22:13:12 +00:00
|
|
|
log.Printf("Vishal: ssh.pathRoleCreateWrite\n")
|
|
|
|
|
2015-06-26 01:47:32 +00:00
|
|
|
//fetch the parameters
|
2015-06-24 22:13:12 +00:00
|
|
|
roleName := d.Get("name").(string)
|
2015-06-19 00:48:41 +00:00
|
|
|
username := d.Get("username").(string)
|
2015-06-26 01:47:32 +00:00
|
|
|
ipRaw := d.Get("ip").(string)
|
2015-06-18 00:33:03 +00:00
|
|
|
|
2015-06-26 01:47:32 +00:00
|
|
|
//find the role to be used for installing dynamic key
|
2015-06-24 22:13:12 +00:00
|
|
|
rolePath := "policy/" + roleName
|
|
|
|
roleEntry, err := req.Storage.Get(rolePath)
|
2015-06-19 00:48:41 +00:00
|
|
|
if err != nil {
|
2015-06-24 22:13:12 +00:00
|
|
|
return nil, fmt.Errorf("error retrieving role: %s", err)
|
|
|
|
}
|
|
|
|
if roleEntry == nil {
|
|
|
|
return logical.ErrorResponse(fmt.Sprintf("Role '%s' not found", roleName)), nil
|
|
|
|
}
|
|
|
|
var role sshRole
|
|
|
|
if err := roleEntry.DecodeJSON(&role); err != nil {
|
2015-06-19 00:48:41 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-06-26 01:47:32 +00:00
|
|
|
//validate the IP address
|
|
|
|
ipAddr := net.ParseIP(ipRaw)
|
|
|
|
if ipAddr == nil {
|
|
|
|
return logical.ErrorResponse(fmt.Sprintf("Invalid IP '%s'", ipRaw)), nil
|
|
|
|
}
|
|
|
|
ip := ipAddr.String()
|
|
|
|
|
|
|
|
var cidrEntry sshCIDR
|
|
|
|
ipMatched := false
|
|
|
|
json.Unmarshal([]byte(role.CIDR), &cidrEntry)
|
|
|
|
for _, item := range cidrEntry.CIDR {
|
|
|
|
log.Println(item)
|
|
|
|
_, cidrIPNet, _ := net.ParseCIDR(item)
|
|
|
|
ipMatched = cidrIPNet.Contains(ipAddr)
|
|
|
|
if ipMatched {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !ipMatched {
|
|
|
|
return logical.ErrorResponse(fmt.Sprintf("IP[%s] does not belong to role[%s]", ip, roleName)), nil
|
|
|
|
}
|
2015-06-24 22:13:12 +00:00
|
|
|
|
2015-06-26 01:47:32 +00:00
|
|
|
//fetch the host key to be used for installation
|
2015-06-24 22:13:12 +00:00
|
|
|
keyPath := "keys/" + role.KeyName
|
|
|
|
keyEntry, err := req.Storage.Get(keyPath)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Key '%s' not found error:%s", role.KeyName, err)
|
2015-06-19 00:48:41 +00:00
|
|
|
}
|
|
|
|
var hostKey sshHostKey
|
2015-06-24 22:13:12 +00:00
|
|
|
if err := keyEntry.DecodeJSON(&hostKey); err != nil {
|
2015-06-19 00:48:41 +00:00
|
|
|
return nil, fmt.Errorf("Error reading the host key: %s", err)
|
|
|
|
}
|
|
|
|
|
2015-06-26 01:47:32 +00:00
|
|
|
//store the host key to file. Use it as parameter for scp command
|
|
|
|
hostKeyFileName := "./vault_ssh_" + username + "_" + ip + "_shared.pem"
|
2015-06-19 16:59:36 +00:00
|
|
|
err = ioutil.WriteFile(hostKeyFileName, []byte(hostKey.Key), 0400)
|
2015-06-19 00:48:41 +00:00
|
|
|
|
2015-06-26 01:47:32 +00:00
|
|
|
otkPrivateKeyFileName := "vault_ssh_" + username + "_" + ip + "_otk.pem"
|
2015-06-19 16:59:36 +00:00
|
|
|
otkPublicKeyFileName := otkPrivateKeyFileName + ".pub"
|
2015-06-26 01:47:32 +00:00
|
|
|
|
|
|
|
//commands to be run on vault server
|
2015-06-19 16:59:36 +00:00
|
|
|
rmCmd := "rm -f " + otkPrivateKeyFileName + " " + otkPublicKeyFileName + ";"
|
|
|
|
sshKeygenCmd := "ssh-keygen -f " + otkPrivateKeyFileName + " -t rsa -N ''" + ";"
|
|
|
|
chmodCmd := "chmod 400 " + otkPrivateKeyFileName + ";"
|
2015-06-26 01:47:32 +00:00
|
|
|
scpCmd := "scp -i " + hostKeyFileName + " " + otkPublicKeyFileName + " " + username + "@" + ip + ":~;"
|
2015-06-19 00:48:41 +00:00
|
|
|
localCmdString := strings.Join([]string{
|
|
|
|
rmCmd,
|
|
|
|
sshKeygenCmd,
|
|
|
|
chmodCmd,
|
|
|
|
scpCmd,
|
|
|
|
}, "")
|
2015-06-26 01:47:32 +00:00
|
|
|
//run the commands on vault server
|
2015-06-19 00:48:41 +00:00
|
|
|
err = exec_command(localCmdString)
|
2015-06-18 00:33:03 +00:00
|
|
|
if err != nil {
|
|
|
|
fmt.Errorf("Running command failed " + err.Error())
|
|
|
|
}
|
2015-06-26 01:47:32 +00:00
|
|
|
|
|
|
|
//connect to target machine
|
|
|
|
session := createSSHPublicKeysSession(username, ip, hostKey.Key)
|
2015-06-18 00:33:03 +00:00
|
|
|
var buf bytes.Buffer
|
|
|
|
session.Stdout = &buf
|
2015-06-26 01:47:32 +00:00
|
|
|
|
|
|
|
authKeysFileName := "~/.ssh/authorized_keys"
|
|
|
|
tempKeysFileName := "~/temp_authorized_keys"
|
|
|
|
|
|
|
|
//commands to be run on target machine
|
|
|
|
grepCmd := "grep -vFf " + otkPublicKeyFileName + " " + authKeysFileName + " > " + tempKeysFileName + ";"
|
|
|
|
catCmdRemoveDuplicate := "cat " + tempKeysFileName + " > " + authKeysFileName + ";"
|
|
|
|
catCmdAppendNew := "cat " + otkPublicKeyFileName + " >> " + authKeysFileName + ";"
|
|
|
|
removeCmd := "rm -f " + tempKeysFileName + " " + otkPublicKeyFileName + ";"
|
|
|
|
remoteCmdString := strings.Join([]string{
|
|
|
|
grepCmd,
|
|
|
|
catCmdRemoveDuplicate,
|
|
|
|
catCmdAppendNew,
|
|
|
|
removeCmd,
|
|
|
|
}, "")
|
|
|
|
|
|
|
|
//run the commands on target machine
|
|
|
|
if err := session.Run(remoteCmdString); err != nil {
|
|
|
|
return nil, err
|
2015-06-18 00:33:03 +00:00
|
|
|
}
|
|
|
|
session.Close()
|
|
|
|
fmt.Println(buf.String())
|
2015-06-26 01:47:32 +00:00
|
|
|
|
|
|
|
//preparing the secret
|
|
|
|
dynamicPrivateKeyBytes, err := ioutil.ReadFile(otkPrivateKeyFileName)
|
|
|
|
if err != nil {
|
|
|
|
fmt.Errorf("Failed to open '%s':%s", otkPrivateKeyFileName, err)
|
|
|
|
}
|
|
|
|
dynamicPrivateKey := string(dynamicPrivateKeyBytes)
|
|
|
|
|
|
|
|
dynamicPublicKeyBytes, err := ioutil.ReadFile(otkPublicKeyFileName)
|
|
|
|
if err != nil {
|
|
|
|
fmt.Errorf("Failed to open '%s':%s", otkPublicKeyFileName, err)
|
|
|
|
}
|
|
|
|
dynamicPublicKey := string(dynamicPublicKeyBytes)
|
2015-06-19 16:59:36 +00:00
|
|
|
return b.Secret(SecretOneTimeKeyType).Response(map[string]interface{}{
|
2015-06-26 01:47:32 +00:00
|
|
|
"key": dynamicPrivateKey,
|
|
|
|
}, map[string]interface{}{
|
|
|
|
"username": username,
|
|
|
|
"ip": ip,
|
|
|
|
"host_key_name": role.KeyName,
|
|
|
|
"dynamic_public_key": dynamicPublicKey,
|
|
|
|
}), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type sshCIDR struct {
|
|
|
|
CIDR []string
|
2015-06-17 16:39:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const sshConnectHelpSyn = `
|
|
|
|
sshConnectionHelpSyn
|
|
|
|
`
|
|
|
|
|
|
|
|
const sshConnectHelpDesc = `
|
2015-06-19 00:48:41 +00:00
|
|
|
rshConnectionHelpDesc
|
2015-06-17 16:39:49 +00:00
|
|
|
`
|