2015-06-16 20:58:54 +00:00
|
|
|
package ssh
|
|
|
|
|
|
|
|
import (
|
2015-06-30 20:30:13 +00:00
|
|
|
"fmt"
|
|
|
|
"strings"
|
2015-06-16 20:58:54 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
"github.com/hashicorp/vault/logical/framework"
|
|
|
|
)
|
|
|
|
|
2015-08-13 21:18:30 +00:00
|
|
|
const (
|
|
|
|
KeyTypeOTP = "otp"
|
|
|
|
KeyTypeDynamic = "dynamic"
|
|
|
|
)
|
|
|
|
|
2015-08-18 01:22:03 +00:00
|
|
|
// Structure that represents a role in SSH backend. This is a common role structure
|
|
|
|
// for both OTP and Dynamic roles. Not all the fields are mandatory for both type.
|
|
|
|
// Some are applicable for one and not for other. It doesn't matter.
|
2015-08-13 21:18:30 +00:00
|
|
|
type sshRole struct {
|
|
|
|
KeyType string `mapstructure:"key_type" json:"key_type"`
|
|
|
|
KeyName string `mapstructure:"key" json:"key"`
|
|
|
|
KeyBits int `mapstructure:"key_bits" json:"key_bits"`
|
|
|
|
AdminUser string `mapstructure:"admin_user" json:"admin_user"`
|
|
|
|
DefaultUser string `mapstructure:"default_user" json:"default_user"`
|
|
|
|
CIDRList string `mapstructure:"cidr_list" json:"cidr_list"`
|
|
|
|
Port int `mapstructure:"port" json:"port"`
|
|
|
|
InstallScript string `mapstructure:"install_script" json:"install_script"`
|
|
|
|
AllowedUsers string `mapstructure:"allowed_users" json:"allowed_users"`
|
|
|
|
}
|
2015-07-29 18:21:36 +00:00
|
|
|
|
2015-06-16 20:58:54 +00:00
|
|
|
func pathRoles(b *backend) *framework.Path {
|
|
|
|
return &framework.Path{
|
2015-08-13 00:36:27 +00:00
|
|
|
Pattern: "roles/(?P<role>[-\\w]+)",
|
2015-06-16 20:58:54 +00:00
|
|
|
Fields: map[string]*framework.FieldSchema{
|
2015-08-13 00:36:27 +00:00
|
|
|
"role": &framework.FieldSchema{
|
2015-08-13 17:36:31 +00:00
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: `
|
|
|
|
[Required for both types]
|
|
|
|
Name of the role being created.`,
|
2015-06-16 20:58:54 +00:00
|
|
|
},
|
2015-06-24 22:13:12 +00:00
|
|
|
"key": &framework.FieldSchema{
|
2015-08-13 17:36:31 +00:00
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: `
|
2015-08-19 02:00:27 +00:00
|
|
|
[Required for Dynamic type] [Not applicable for OTP type]
|
2015-08-13 17:36:31 +00:00
|
|
|
Name of the registered key in Vault. Before creating the role, use the
|
|
|
|
'keys/' endpoint to create a named key.`,
|
2015-06-24 22:13:12 +00:00
|
|
|
},
|
|
|
|
"admin_user": &framework.FieldSchema{
|
2015-08-13 17:36:31 +00:00
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: `
|
2015-08-19 02:00:27 +00:00
|
|
|
[Required for Dynamic type] [Not applicable for OTP type]
|
2015-08-13 17:36:31 +00:00
|
|
|
Admin user at remote host. The shared key being registered should be
|
|
|
|
for this user and should have root privileges. Everytime a dynamic
|
|
|
|
credential is being generated for other users, Vault uses this admin
|
|
|
|
username to login to remote host and install the generated credential
|
|
|
|
for the other user.`,
|
2015-06-24 22:13:12 +00:00
|
|
|
},
|
|
|
|
"default_user": &framework.FieldSchema{
|
2015-08-13 17:36:31 +00:00
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: `
|
|
|
|
[Required for both types]
|
|
|
|
Default username for which a credential will be generated.
|
|
|
|
When the endpoint 'creds/' is used without a username, this
|
|
|
|
value will be used as default username.`,
|
2015-06-24 22:13:12 +00:00
|
|
|
},
|
2015-08-13 15:46:55 +00:00
|
|
|
"cidr_list": &framework.FieldSchema{
|
2015-08-13 17:36:31 +00:00
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: `
|
|
|
|
[Required for both types]
|
|
|
|
Comma separated list of CIDR blocks for which the role is applicable for.
|
|
|
|
CIDR blocks can belong to more than one role.`,
|
2015-06-16 20:58:54 +00:00
|
|
|
},
|
2015-07-06 20:56:45 +00:00
|
|
|
"port": &framework.FieldSchema{
|
2015-08-13 17:36:31 +00:00
|
|
|
Type: framework.TypeInt,
|
|
|
|
Description: `
|
|
|
|
[Optional for both types]
|
2015-08-13 23:55:47 +00:00
|
|
|
Port number for SSH connection. Default is '22'. Port number does not
|
|
|
|
play any role in creation of OTP. For 'otp' type, this is just a way
|
|
|
|
to inform client about the port number to use. Port number will be
|
|
|
|
returned to client by Vault server along with OTP.`,
|
2015-07-06 20:56:45 +00:00
|
|
|
},
|
2015-07-22 18:15:19 +00:00
|
|
|
"key_type": &framework.FieldSchema{
|
2015-08-13 17:36:31 +00:00
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: `
|
|
|
|
[Required for both types]
|
|
|
|
Type of key used to login to hosts. It can be either 'otp' or 'dynamic'.
|
|
|
|
'otp' type requires agent to be installed in remote hosts.`,
|
2015-07-22 18:15:19 +00:00
|
|
|
},
|
2015-07-29 18:21:36 +00:00
|
|
|
"key_bits": &framework.FieldSchema{
|
2015-08-13 17:36:31 +00:00
|
|
|
Type: framework.TypeInt,
|
|
|
|
Description: `
|
2015-08-19 02:00:27 +00:00
|
|
|
[Optional for Dynamic type] [Not applicable for OTP type]
|
2015-08-13 17:36:31 +00:00
|
|
|
Length of the RSA dynamic key in bits. It can be one of 1024, 2048 or 4096.`,
|
2015-07-29 18:21:36 +00:00
|
|
|
},
|
2015-08-06 18:48:19 +00:00
|
|
|
"install_script": &framework.FieldSchema{
|
2015-08-13 17:36:31 +00:00
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: `
|
2015-08-19 02:00:27 +00:00
|
|
|
[Optional for Dynamic type][Not-applicable for OTP type]
|
2015-08-13 17:36:31 +00:00
|
|
|
Script used to install and uninstall public keys in the target machine.
|
|
|
|
The inbuilt default install script will be for Linux hosts. For sample
|
2015-08-14 19:41:26 +00:00
|
|
|
script, refer the project documentation website.`,
|
2015-08-06 18:48:19 +00:00
|
|
|
},
|
2015-08-13 21:18:30 +00:00
|
|
|
"allowed_users": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: `
|
|
|
|
[Optional for both types]
|
|
|
|
If this option is not specified, client can request for a credential for
|
|
|
|
any valid user at the remote host, including the admin user. If only certain
|
|
|
|
usernames are to be allowed, then this list enforces it. If this field is
|
|
|
|
set, then credentials can only be created for default_user and usernames
|
|
|
|
present in this list.
|
|
|
|
`,
|
|
|
|
},
|
2015-06-16 20:58:54 +00:00
|
|
|
},
|
|
|
|
|
|
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
|
|
|
logical.ReadOperation: b.pathRoleRead,
|
|
|
|
logical.WriteOperation: b.pathRoleWrite,
|
|
|
|
logical.DeleteOperation: b.pathRoleDelete,
|
|
|
|
},
|
|
|
|
|
|
|
|
HelpSynopsis: pathRoleHelpSyn,
|
|
|
|
HelpDescription: pathRoleHelpDesc,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-29 18:21:36 +00:00
|
|
|
func (b *backend) pathRoleWrite(req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
2015-08-13 00:36:27 +00:00
|
|
|
roleName := d.Get("role").(string)
|
2015-07-22 18:15:19 +00:00
|
|
|
if roleName == "" {
|
|
|
|
return logical.ErrorResponse("Missing role name"), nil
|
|
|
|
}
|
2015-07-27 17:02:31 +00:00
|
|
|
|
2015-08-19 02:00:27 +00:00
|
|
|
// Allowed users is an optional field, applicable for both OTP and Dynamic types.
|
2015-08-13 21:18:30 +00:00
|
|
|
allowedUsers := d.Get("allowed_users").(string)
|
|
|
|
|
2015-08-13 17:36:31 +00:00
|
|
|
defaultUser := d.Get("default_user").(string)
|
|
|
|
if defaultUser == "" {
|
|
|
|
return logical.ErrorResponse("Missing default user"), nil
|
|
|
|
}
|
|
|
|
|
2015-08-13 15:46:55 +00:00
|
|
|
cidrList := d.Get("cidr_list").(string)
|
|
|
|
if cidrList == "" {
|
2015-08-13 00:36:27 +00:00
|
|
|
return logical.ErrorResponse("Missing CIDR blocks"), nil
|
2015-07-22 18:15:19 +00:00
|
|
|
}
|
2015-08-18 01:22:03 +00:00
|
|
|
|
|
|
|
// Check if all the CIDR entries are infact valid entries
|
|
|
|
err := validateCIDRList(cidrList)
|
|
|
|
if err != nil {
|
|
|
|
return logical.ErrorResponse(fmt.Sprintf("Invalid cidr_list entry. %s", err)), nil
|
2015-07-22 18:15:19 +00:00
|
|
|
}
|
2015-07-27 17:02:31 +00:00
|
|
|
|
2015-08-13 15:46:55 +00:00
|
|
|
port := d.Get("port").(int)
|
|
|
|
if port == 0 {
|
|
|
|
port = 22
|
2015-07-22 18:15:19 +00:00
|
|
|
}
|
2015-07-27 17:02:31 +00:00
|
|
|
|
2015-07-29 18:21:36 +00:00
|
|
|
keyType := d.Get("key_type").(string)
|
|
|
|
if keyType == "" {
|
|
|
|
return logical.ErrorResponse("Missing key type"), nil
|
2015-07-22 18:15:19 +00:00
|
|
|
}
|
2015-07-29 18:21:36 +00:00
|
|
|
keyType = strings.ToLower(keyType)
|
2015-07-22 18:15:19 +00:00
|
|
|
|
2015-08-13 17:36:31 +00:00
|
|
|
var roleEntry sshRole
|
2015-07-29 18:21:36 +00:00
|
|
|
if keyType == KeyTypeOTP {
|
2015-08-18 01:22:03 +00:00
|
|
|
// Admin user is not used if OTP key type is used because there is
|
|
|
|
// no need to login to remote machine.
|
2015-07-29 18:21:36 +00:00
|
|
|
adminUser := d.Get("admin_user").(string)
|
|
|
|
if adminUser != "" {
|
|
|
|
return logical.ErrorResponse("Admin user not required for OTP type"), nil
|
|
|
|
}
|
2015-07-22 18:15:19 +00:00
|
|
|
|
2015-08-18 01:22:03 +00:00
|
|
|
// Below are the only fields used from the role structure for OTP type.
|
2015-08-13 17:36:31 +00:00
|
|
|
roleEntry = sshRole{
|
2015-08-13 21:18:30 +00:00
|
|
|
DefaultUser: defaultUser,
|
|
|
|
CIDRList: cidrList,
|
|
|
|
KeyType: KeyTypeOTP,
|
|
|
|
Port: port,
|
|
|
|
AllowedUsers: allowedUsers,
|
2015-08-13 17:36:31 +00:00
|
|
|
}
|
2015-07-29 18:21:36 +00:00
|
|
|
} else if keyType == KeyTypeDynamic {
|
2015-08-18 01:22:03 +00:00
|
|
|
// Key name is required by dynamic type and not by OTP type.
|
2015-07-29 18:21:36 +00:00
|
|
|
keyName := d.Get("key").(string)
|
|
|
|
if keyName == "" {
|
|
|
|
return logical.ErrorResponse("Missing key name"), nil
|
|
|
|
}
|
|
|
|
keyEntry, err := req.Storage.Get(fmt.Sprintf("keys/%s", keyName))
|
|
|
|
if err != nil || keyEntry == nil {
|
|
|
|
return logical.ErrorResponse(fmt.Sprintf("Invalid 'key': '%s'", keyName)), nil
|
|
|
|
}
|
2015-07-27 17:02:31 +00:00
|
|
|
|
2015-08-06 18:48:19 +00:00
|
|
|
installScript := d.Get("install_script").(string)
|
2015-08-18 01:22:03 +00:00
|
|
|
|
|
|
|
// Setting the default script here. The script will install the
|
|
|
|
// generated public key in the authorized_keys file of linux host.
|
2015-08-06 18:48:19 +00:00
|
|
|
if installScript == "" {
|
2015-08-18 01:22:03 +00:00
|
|
|
installScript = DefaultPublicKeyInstallScript
|
2015-08-06 18:48:19 +00:00
|
|
|
}
|
|
|
|
|
2015-07-29 18:21:36 +00:00
|
|
|
adminUser := d.Get("admin_user").(string)
|
|
|
|
if adminUser == "" {
|
|
|
|
return logical.ErrorResponse("Missing admin username"), nil
|
|
|
|
}
|
2015-07-27 17:02:31 +00:00
|
|
|
|
2015-08-18 01:22:03 +00:00
|
|
|
// Key bits can only be 1024, 2048 or 4096.
|
2015-08-13 17:36:31 +00:00
|
|
|
keyBits := d.Get("key_bits").(int)
|
|
|
|
if keyBits != 0 && keyBits != 1024 && keyBits != 2048 && keyBits != 4096 {
|
|
|
|
return logical.ErrorResponse("Invalid key_bits field"), nil
|
2015-06-30 20:30:13 +00:00
|
|
|
}
|
2015-08-18 01:22:03 +00:00
|
|
|
|
|
|
|
// If user has not set this field, default it to 2048
|
2015-08-13 17:36:31 +00:00
|
|
|
if keyBits == 0 {
|
|
|
|
keyBits = 2048
|
2015-07-29 18:21:36 +00:00
|
|
|
}
|
2015-07-27 17:02:31 +00:00
|
|
|
|
2015-08-18 01:22:03 +00:00
|
|
|
// Store all the fields required by dynamic key type
|
2015-08-13 17:36:31 +00:00
|
|
|
roleEntry = sshRole{
|
2015-08-06 18:48:19 +00:00
|
|
|
KeyName: keyName,
|
|
|
|
AdminUser: adminUser,
|
|
|
|
DefaultUser: defaultUser,
|
2015-08-13 15:46:55 +00:00
|
|
|
CIDRList: cidrList,
|
2015-08-06 18:48:19 +00:00
|
|
|
Port: port,
|
|
|
|
KeyType: KeyTypeDynamic,
|
|
|
|
KeyBits: keyBits,
|
|
|
|
InstallScript: installScript,
|
2015-08-13 21:18:30 +00:00
|
|
|
AllowedUsers: allowedUsers,
|
2015-08-13 17:36:31 +00:00
|
|
|
}
|
2015-07-29 18:21:36 +00:00
|
|
|
} else {
|
|
|
|
return logical.ErrorResponse("Invalid key type"), nil
|
2015-07-06 20:56:45 +00:00
|
|
|
}
|
2015-06-30 20:30:13 +00:00
|
|
|
|
2015-08-13 17:36:31 +00:00
|
|
|
entry, err := logical.StorageEntryJSON(fmt.Sprintf("roles/%s", roleName), roleEntry)
|
2015-06-24 22:13:12 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := req.Storage.Put(entry); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2015-08-13 18:12:30 +00:00
|
|
|
func (b *backend) getRole(s logical.Storage, n string) (*sshRole, error) {
|
|
|
|
entry, err := s.Get("roles/" + n)
|
2015-06-19 00:48:41 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-08-13 18:12:30 +00:00
|
|
|
if entry == nil {
|
2015-06-19 00:48:41 +00:00
|
|
|
return nil, nil
|
|
|
|
}
|
2015-07-27 17:02:31 +00:00
|
|
|
|
2015-08-13 18:12:30 +00:00
|
|
|
var result sshRole
|
|
|
|
if err := entry.DecodeJSON(&result); err != nil {
|
2015-07-02 21:23:09 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2015-07-27 17:02:31 +00:00
|
|
|
|
2015-08-13 18:12:30 +00:00
|
|
|
return &result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *backend) pathRoleRead(req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
|
|
role, err := b.getRole(req.Storage, d.Get("role").(string))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if role == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2015-08-18 01:22:03 +00:00
|
|
|
// Return information should be based on the key type of the role
|
2015-07-31 17:24:23 +00:00
|
|
|
if role.KeyType == KeyTypeOTP {
|
|
|
|
return &logical.Response{
|
|
|
|
Data: map[string]interface{}{
|
2015-08-18 01:22:03 +00:00
|
|
|
"default_user": role.DefaultUser,
|
|
|
|
"cidr_list": role.CIDRList,
|
|
|
|
"key_type": role.KeyType,
|
|
|
|
"port": role.Port,
|
|
|
|
"allowed_users": role.AllowedUsers,
|
2015-07-31 17:24:23 +00:00
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
} else {
|
|
|
|
return &logical.Response{
|
|
|
|
Data: map[string]interface{}{
|
2015-08-18 01:22:03 +00:00
|
|
|
"key": role.KeyName,
|
|
|
|
"admin_user": role.AdminUser,
|
|
|
|
"default_user": role.DefaultUser,
|
|
|
|
"cidr_list": role.CIDRList,
|
|
|
|
"port": role.Port,
|
|
|
|
"key_type": role.KeyType,
|
|
|
|
"key_bits": role.KeyBits,
|
|
|
|
"allowed_users": role.AllowedUsers,
|
|
|
|
// Returning install script will make the output look messy.
|
|
|
|
// But this is one way for clients to see the script that is
|
|
|
|
// being used to install the key. If there is some problem,
|
|
|
|
// the script can be modified and configured by clients.
|
|
|
|
"install_script": role.InstallScript,
|
2015-07-31 17:24:23 +00:00
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
}
|
2015-06-16 20:58:54 +00:00
|
|
|
}
|
|
|
|
|
2015-06-19 00:48:41 +00:00
|
|
|
func (b *backend) pathRoleDelete(req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
2015-08-13 00:36:27 +00:00
|
|
|
roleName := d.Get("role").(string)
|
|
|
|
err := req.Storage.Delete(fmt.Sprintf("roles/%s", roleName))
|
2015-06-19 00:48:41 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-06-16 20:58:54 +00:00
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
const pathRoleHelpSyn = `
|
2015-06-30 20:30:13 +00:00
|
|
|
Manage the 'roles' that can be created with this backend.
|
2015-06-16 20:58:54 +00:00
|
|
|
`
|
|
|
|
|
|
|
|
const pathRoleHelpDesc = `
|
2015-08-18 01:22:03 +00:00
|
|
|
This path allows you to manage the roles that are used to generate credentials.
|
|
|
|
|
|
|
|
Role takes a 'key_type' parameter that decides what type of credential this role
|
|
|
|
can generate. If remote hosts have Vault SSH Agent installed, an 'otp' type can
|
|
|
|
be used, otherwise 'dynamic' type can be used.
|
|
|
|
|
|
|
|
If the backend is mounted at "ssh" and the role is created at "ssh/roles/web",
|
|
|
|
then a user could request for a credential at "ssh/creds/web" for an IP that
|
|
|
|
belongs to the role. The credential will be for the 'default_user' registered
|
|
|
|
with the role. There is also an optional parameter 'username' for 'creds/' endpoint.
|
2015-06-16 20:58:54 +00:00
|
|
|
`
|