2017-02-07 21:04:27 +00:00
|
|
|
package radius
|
|
|
|
|
|
|
|
import (
|
2018-01-08 18:31:38 +00:00
|
|
|
"context"
|
2017-02-07 21:04:27 +00:00
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
"github.com/hashicorp/vault/logical/framework"
|
|
|
|
)
|
|
|
|
|
|
|
|
func pathConfig(b *backend) *framework.Path {
|
|
|
|
return &framework.Path{
|
|
|
|
Pattern: "config",
|
|
|
|
Fields: map[string]*framework.FieldSchema{
|
|
|
|
"host": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "RADIUS server host",
|
|
|
|
},
|
|
|
|
|
|
|
|
"port": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeInt,
|
|
|
|
Default: 1812,
|
|
|
|
Description: "RADIUS server port (default: 1812)",
|
|
|
|
},
|
|
|
|
"secret": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "Secret shared with the RADIUS server",
|
|
|
|
},
|
|
|
|
"unregistered_user_policies": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Default: "",
|
2017-02-07 21:06:27 +00:00
|
|
|
Description: "Comma-separated list of policies to grant upon successful RADIUS authentication of an unregisted user (default: emtpy)",
|
2017-02-07 21:04:27 +00:00
|
|
|
},
|
|
|
|
"dial_timeout": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeDurationSecond,
|
|
|
|
Default: 10,
|
2017-02-07 21:06:27 +00:00
|
|
|
Description: "Number of seconds before connect times out (default: 10)",
|
2017-02-07 21:04:27 +00:00
|
|
|
},
|
|
|
|
"read_timeout": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeDurationSecond,
|
|
|
|
Default: 10,
|
2017-12-01 15:18:26 +00:00
|
|
|
Description: "Number of seconds before response times out (default: 10)",
|
2017-02-07 21:04:27 +00:00
|
|
|
},
|
|
|
|
"nas_port": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeInt,
|
|
|
|
Default: 10,
|
|
|
|
Description: "RADIUS NAS port field (default: 10)",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
|
|
|
|
ExistenceCheck: b.configExistenceCheck,
|
|
|
|
|
|
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
|
|
|
logical.ReadOperation: b.pathConfigRead,
|
|
|
|
logical.CreateOperation: b.pathConfigCreateUpdate,
|
|
|
|
logical.UpdateOperation: b.pathConfigCreateUpdate,
|
|
|
|
},
|
|
|
|
|
|
|
|
HelpSynopsis: pathConfigHelpSyn,
|
|
|
|
HelpDescription: pathConfigHelpDesc,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Establishes dichotomy of request operation between CreateOperation and UpdateOperation.
|
|
|
|
// Returning 'true' forces an UpdateOperation, CreateOperation otherwise.
|
2018-01-08 18:31:38 +00:00
|
|
|
func (b *backend) configExistenceCheck(ctx context.Context, req *logical.Request, data *framework.FieldData) (bool, error) {
|
2018-01-19 06:44:44 +00:00
|
|
|
entry, err := b.Config(ctx, req)
|
2017-02-07 21:04:27 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
return entry != nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Construct ConfigEntry struct using stored configuration.
|
|
|
|
*/
|
2018-01-19 06:44:44 +00:00
|
|
|
func (b *backend) Config(ctx context.Context, req *logical.Request) (*ConfigEntry, error) {
|
|
|
|
storedConfig, err := req.Storage.Get(ctx, "config")
|
2017-02-07 21:04:27 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if storedConfig == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var result ConfigEntry
|
|
|
|
|
|
|
|
if err := storedConfig.DecodeJSON(&result); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &result, nil
|
|
|
|
}
|
|
|
|
|
2018-01-08 18:31:38 +00:00
|
|
|
func (b *backend) pathConfigRead(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
2018-01-19 06:44:44 +00:00
|
|
|
cfg, err := b.Config(ctx, req)
|
2017-02-07 21:04:27 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if cfg == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := &logical.Response{
|
2018-03-30 14:17:39 +00:00
|
|
|
Data: map[string]interface{}{
|
|
|
|
"host": cfg.Host,
|
|
|
|
"port": cfg.Port,
|
|
|
|
"unregistered_user_policies": cfg.UnregisteredUserPolicies,
|
|
|
|
"dial_timeout": cfg.DialTimeout,
|
|
|
|
"read_timeout": cfg.ReadTimeout,
|
|
|
|
"nas_port": cfg.NasPort,
|
|
|
|
},
|
2017-02-07 21:04:27 +00:00
|
|
|
}
|
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
|
2018-01-08 18:31:38 +00:00
|
|
|
func (b *backend) pathConfigCreateUpdate(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
2017-02-07 21:04:27 +00:00
|
|
|
// Build a ConfigEntry struct out of the supplied FieldData
|
2018-01-19 06:44:44 +00:00
|
|
|
cfg, err := b.Config(ctx, req)
|
2017-02-07 21:04:27 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if cfg == nil {
|
|
|
|
cfg = &ConfigEntry{}
|
|
|
|
}
|
|
|
|
|
|
|
|
host, ok := d.GetOk("host")
|
|
|
|
if ok {
|
|
|
|
cfg.Host = strings.ToLower(host.(string))
|
|
|
|
} else if req.Operation == logical.CreateOperation {
|
|
|
|
cfg.Host = strings.ToLower(d.Get("host").(string))
|
|
|
|
}
|
|
|
|
if cfg.Host == "" {
|
|
|
|
return logical.ErrorResponse("config parameter `host` cannot be empty"), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
port, ok := d.GetOk("port")
|
|
|
|
if ok {
|
|
|
|
cfg.Port = port.(int)
|
|
|
|
} else if req.Operation == logical.CreateOperation {
|
|
|
|
cfg.Port = d.Get("port").(int)
|
|
|
|
}
|
|
|
|
|
|
|
|
secret, ok := d.GetOk("secret")
|
|
|
|
if ok {
|
|
|
|
cfg.Secret = secret.(string)
|
|
|
|
} else if req.Operation == logical.CreateOperation {
|
|
|
|
cfg.Secret = d.Get("secret").(string)
|
|
|
|
}
|
|
|
|
if cfg.Secret == "" {
|
|
|
|
return logical.ErrorResponse("config parameter `secret` cannot be empty"), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
policies := make([]string, 0)
|
|
|
|
unregisteredUserPoliciesRaw, ok := d.GetOk("unregistered_user_policies")
|
|
|
|
if ok {
|
|
|
|
unregisteredUserPoliciesStr := unregisteredUserPoliciesRaw.(string)
|
|
|
|
if strings.TrimSpace(unregisteredUserPoliciesStr) != "" {
|
|
|
|
policies = strings.Split(unregisteredUserPoliciesStr, ",")
|
|
|
|
for _, policy := range policies {
|
|
|
|
if policy == "root" {
|
2017-09-13 01:48:52 +00:00
|
|
|
return logical.ErrorResponse("root policy cannot be granted by an auth method"), nil
|
2017-02-07 21:04:27 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
cfg.UnregisteredUserPolicies = policies
|
|
|
|
} else if req.Operation == logical.CreateOperation {
|
|
|
|
cfg.UnregisteredUserPolicies = policies
|
|
|
|
}
|
|
|
|
|
|
|
|
dialTimeout, ok := d.GetOk("dial_timeout")
|
|
|
|
if ok {
|
|
|
|
cfg.DialTimeout = dialTimeout.(int)
|
|
|
|
} else if req.Operation == logical.CreateOperation {
|
|
|
|
cfg.DialTimeout = d.Get("dial_timeout").(int)
|
|
|
|
}
|
|
|
|
|
|
|
|
readTimeout, ok := d.GetOk("read_timeout")
|
|
|
|
if ok {
|
|
|
|
cfg.ReadTimeout = readTimeout.(int)
|
|
|
|
} else if req.Operation == logical.CreateOperation {
|
|
|
|
cfg.ReadTimeout = d.Get("read_timeout").(int)
|
|
|
|
}
|
|
|
|
|
|
|
|
nasPort, ok := d.GetOk("nas_port")
|
|
|
|
if ok {
|
|
|
|
cfg.NasPort = nasPort.(int)
|
|
|
|
} else if req.Operation == logical.CreateOperation {
|
|
|
|
cfg.NasPort = d.Get("nas_port").(int)
|
|
|
|
}
|
|
|
|
|
|
|
|
entry, err := logical.StorageEntryJSON("config", cfg)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2018-01-19 06:44:44 +00:00
|
|
|
if err := req.Storage.Put(ctx, entry); err != nil {
|
2017-02-07 21:04:27 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type ConfigEntry struct {
|
|
|
|
Host string `json:"host" structs:"host" mapstructure:"host"`
|
|
|
|
Port int `json:"port" structs:"port" mapstructure:"port"`
|
|
|
|
Secret string `json:"secret" structs:"secret" mapstructure:"secret"`
|
|
|
|
UnregisteredUserPolicies []string `json:"unregistered_user_policies" structs:"unregistered_user_policies" mapstructure:"unregistered_user_policies"`
|
|
|
|
DialTimeout int `json:"dial_timeout" structs:"dial_timeout" mapstructure:"dial_timeout"`
|
|
|
|
ReadTimeout int `json:"read_timeout" structs:"read_timeout" mapstructure:"read_timeout"`
|
|
|
|
NasPort int `json:"nas_port" structs:"nas_port" mapstructure:"nas_port"`
|
|
|
|
}
|
|
|
|
|
|
|
|
const pathConfigHelpSyn = `
|
|
|
|
Configure the RADIUS server to connect to, along with its options.
|
|
|
|
`
|
|
|
|
|
|
|
|
const pathConfigHelpDesc = `
|
|
|
|
This endpoint allows you to configure the RADIUS server to connect to and its
|
|
|
|
configuration options.
|
|
|
|
`
|