2015-06-16 20:58:54 +00:00
|
|
|
package ssh
|
|
|
|
|
|
|
|
import (
|
2015-06-30 20:30:13 +00:00
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"strings"
|
2015-06-16 20:58:54 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
"github.com/hashicorp/vault/logical/framework"
|
|
|
|
)
|
|
|
|
|
|
|
|
func pathRoles(b *backend) *framework.Path {
|
|
|
|
return &framework.Path{
|
|
|
|
Pattern: "roles/(?P<name>\\w+)",
|
|
|
|
Fields: map[string]*framework.FieldSchema{
|
|
|
|
"name": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "Name of the role",
|
|
|
|
},
|
2015-06-24 22:13:12 +00:00
|
|
|
"key": &framework.FieldSchema{
|
2015-06-16 20:58:54 +00:00
|
|
|
Type: framework.TypeString,
|
2015-06-24 22:13:12 +00:00
|
|
|
Description: "Named key in Vault",
|
|
|
|
},
|
|
|
|
"admin_user": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "Admin user at target address",
|
|
|
|
},
|
|
|
|
"default_user": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "Default user to whom the dynamic key is installed",
|
|
|
|
},
|
|
|
|
"cidr": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "CIDR blocks and IP addresses",
|
2015-06-16 20:58:54 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
|
|
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
|
|
|
logical.ReadOperation: b.pathRoleRead,
|
|
|
|
logical.WriteOperation: b.pathRoleWrite,
|
|
|
|
logical.DeleteOperation: b.pathRoleDelete,
|
|
|
|
},
|
|
|
|
|
|
|
|
HelpSynopsis: pathRoleHelpSyn,
|
|
|
|
HelpDescription: pathRoleHelpDesc,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-24 22:13:12 +00:00
|
|
|
func (b *backend) pathRoleWrite(req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
|
|
roleName := d.Get("name").(string)
|
|
|
|
keyName := d.Get("key").(string)
|
|
|
|
adminUser := d.Get("admin_user").(string)
|
|
|
|
defaultUser := d.Get("default_user").(string)
|
|
|
|
cidr := d.Get("cidr").(string)
|
|
|
|
|
2015-06-30 20:30:13 +00:00
|
|
|
//input validations
|
|
|
|
if roleName == "" {
|
|
|
|
return logical.ErrorResponse("Invalid 'roleName'"), nil
|
|
|
|
}
|
|
|
|
if keyName == "" {
|
|
|
|
return logical.ErrorResponse("Invalid 'key'"), nil
|
|
|
|
}
|
|
|
|
if adminUser == "" {
|
|
|
|
return logical.ErrorResponse("Invalid 'admin_user'"), nil
|
|
|
|
}
|
|
|
|
if cidr == "" {
|
|
|
|
return logical.ErrorResponse("Invalid 'cidr'"), nil
|
|
|
|
}
|
|
|
|
for _, item := range strings.Split(cidr, ",") {
|
|
|
|
_, _, err := net.ParseCIDR(item)
|
|
|
|
if err != nil {
|
|
|
|
return logical.ErrorResponse(fmt.Sprintf("Invalid cidr entry '%s'", item)), nil
|
|
|
|
}
|
|
|
|
}
|
2015-06-24 22:13:12 +00:00
|
|
|
|
|
|
|
rolePath := "policy/" + roleName
|
|
|
|
|
2015-06-30 20:30:13 +00:00
|
|
|
if defaultUser == "" {
|
|
|
|
defaultUser = adminUser
|
|
|
|
}
|
|
|
|
|
2015-06-24 22:13:12 +00:00
|
|
|
entry, err := logical.StorageEntryJSON(rolePath, sshRole{
|
|
|
|
KeyName: keyName,
|
|
|
|
AdminUser: adminUser,
|
|
|
|
DefaultUser: defaultUser,
|
|
|
|
CIDR: cidr,
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := req.Storage.Put(entry); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2015-06-19 00:48:41 +00:00
|
|
|
func (b *backend) pathRoleRead(req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
2015-06-24 22:13:12 +00:00
|
|
|
roleName := d.Get("name").(string)
|
|
|
|
rolePath := "policy/" + roleName
|
|
|
|
entry, err := req.Storage.Get(rolePath)
|
2015-06-19 00:48:41 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if entry == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return &logical.Response{
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"policy": string(entry.Value),
|
|
|
|
},
|
|
|
|
}, nil
|
2015-06-16 20:58:54 +00:00
|
|
|
}
|
|
|
|
|
2015-06-19 00:48:41 +00:00
|
|
|
func (b *backend) pathRoleDelete(req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
2015-06-24 22:13:12 +00:00
|
|
|
roleName := d.Get("name").(string)
|
|
|
|
rolePath := "policy/" + roleName
|
|
|
|
err := req.Storage.Delete(rolePath)
|
2015-06-19 00:48:41 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-06-16 20:58:54 +00:00
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2015-06-24 22:13:12 +00:00
|
|
|
type sshRole struct {
|
|
|
|
KeyName string `json:"key"`
|
|
|
|
AdminUser string `json:"admin_user"`
|
|
|
|
DefaultUser string `json:"default_user"`
|
|
|
|
CIDR string `json: "cidr"`
|
|
|
|
}
|
|
|
|
|
2015-06-16 20:58:54 +00:00
|
|
|
const pathRoleHelpSyn = `
|
2015-06-30 20:30:13 +00:00
|
|
|
Manage the 'roles' that can be created with this backend.
|
2015-06-16 20:58:54 +00:00
|
|
|
`
|
|
|
|
|
|
|
|
const pathRoleHelpDesc = `
|
2015-06-30 20:30:13 +00:00
|
|
|
This path allows you to manage the roles that are used to create dynamic keys.
|
|
|
|
These roles will be having privileged access to all the hosts mentioned by CIDR blocks.
|
|
|
|
For example, if the backend is mounted at "ssh" and the role is created at "ssh/roles/web", then a user could request for a new key at "ssh/creds/web" for the supplied username and IP address.
|
|
|
|
|
|
|
|
The 'cidr' field takes comma seperated CIDR blocks. The 'admin_user' should have root access in all the hosts represented by the 'cidr' field. When the user requests key for an IP, the key will be installed for the user mentioned by 'default_user' field. The 'key' field takes a named key which can be configured by 'ssh/keys/' endpoint.
|
2015-06-16 20:58:54 +00:00
|
|
|
`
|