package ssh import ( "fmt" "net" "time" "github.com/hashicorp/vault/helper/uuid" "github.com/hashicorp/vault/logical" "github.com/hashicorp/vault/logical/framework" ) type sshOTP struct { Username string `json:"username"` IP string `json:"ip"` } func pathCredsCreate(b *backend) *framework.Path { return &framework.Path{ Pattern: "creds/(?P[-\\w]+)", Fields: map[string]*framework.FieldSchema{ "role": &framework.FieldSchema{ Type: framework.TypeString, Description: "Name of the role", }, "username": &framework.FieldSchema{ Type: framework.TypeString, Description: "Username in target", }, "ip": &framework.FieldSchema{ Type: framework.TypeString, Description: "IP of the target machine", }, }, Callbacks: map[logical.Operation]framework.OperationFunc{ logical.WriteOperation: b.pathCredsCreateWrite, }, HelpSynopsis: pathCredsCreateHelpSyn, HelpDescription: pathCredsCreateHelpDesc, } } func (b *backend) pathCredsCreateWrite( req *logical.Request, d *framework.FieldData) (*logical.Response, error) { roleName := d.Get("role").(string) if roleName == "" { return logical.ErrorResponse("Missing role"), nil } username := d.Get("username").(string) ipRaw := d.Get("ip").(string) if ipRaw == "" { return logical.ErrorResponse("Missing ip"), nil } role, err := b.getRole(req.Storage, roleName) if err != nil { return nil, fmt.Errorf("error retrieving role: %s", err) } if role == nil { return logical.ErrorResponse(fmt.Sprintf("Role '%s' not found", roleName)), nil } // Set the default username if username == "" { if role.DefaultUser == "" { return logical.ErrorResponse("No default username registered. Use 'username' option"), nil } username = role.DefaultUser } // Validate the IP address ipAddr := net.ParseIP(ipRaw) if ipAddr == nil { return logical.ErrorResponse(fmt.Sprintf("Invalid IP '%s'", ipRaw)), nil } ip := ipAddr.String() ipMatched, err := cidrContainsIP(ip, role.CIDRList) if err != nil { return logical.ErrorResponse(fmt.Sprintf("Error validating IP: %s", err)), nil } if !ipMatched { return logical.ErrorResponse(fmt.Sprintf("IP[%s] does not belong to role[%s]", ip, roleName)), nil } var result *logical.Response if role.KeyType == KeyTypeOTP { otp, err := b.GenerateOTPCredential(req, username, ip) if err != nil { return nil, err } result = b.Secret(SecretOTPType).Response(map[string]interface{}{ "key_type": role.KeyType, "key": otp, }, map[string]interface{}{ "otp": otp, }) } else if role.KeyType == KeyTypeDynamic { dynamicPublicKey, dynamicPrivateKey, err := b.GenerateDynamicCredential(req, role, username, ip) if err != nil { return nil, err } result = b.Secret(SecretDynamicKeyType).Response(map[string]interface{}{ "key": dynamicPrivateKey, "key_type": role.KeyType, }, map[string]interface{}{ "admin_user": role.AdminUser, "username": username, "ip": ip, "host_key_name": role.KeyName, "dynamic_public_key": dynamicPublicKey, "port": role.Port, "install_script": role.InstallScript, }) } else { return nil, fmt.Errorf("key type unknown") } // Change the lease information to reflect user's choice lease, _ := b.Lease(req.Storage) if lease != nil { result.Secret.Lease = lease.Lease result.Secret.LeaseGracePeriod = lease.LeaseMax } if lease == nil { result.Secret.Lease = 10 * time.Minute result.Secret.LeaseGracePeriod = 2 * time.Minute } return result, nil } // Generates a RSA key pair and installs it in the remote target func (b *backend) GenerateDynamicCredential(req *logical.Request, role *sshRole, username, ip string) (string, string, error) { // Fetch the host key to be used for dynamic key installation keyEntry, err := req.Storage.Get(fmt.Sprintf("keys/%s", role.KeyName)) if err != nil { return "", "", fmt.Errorf("key '%s' not found error:%s", role.KeyName, err) } if keyEntry == nil { return "", "", fmt.Errorf("key '%s' not found", role.KeyName, err) } var hostKey sshHostKey if err := keyEntry.DecodeJSON(&hostKey); err != nil { return "", "", fmt.Errorf("error reading the host key: %s", err) } dynamicPublicKey, dynamicPrivateKey, err := generateRSAKeys(role.KeyBits) if err != nil { return "", "", fmt.Errorf("error generating key: %s", err) } // Transfer the public key to target machine _, publicKeyFileName := b.GenerateSaltedOTP() err = scpUpload(role.AdminUser, ip, role.Port, hostKey.Key, publicKeyFileName, dynamicPublicKey) if err != nil { return "", "", fmt.Errorf("error uploading public key: %s", err) } scriptFileName := fmt.Sprintf("%s.sh", publicKeyFileName) err = scpUpload(role.AdminUser, ip, role.Port, hostKey.Key, scriptFileName, role.InstallScript) if err != nil { return "", "", fmt.Errorf("error uploading install script: %s", err) } // Add the public key to authorized_keys file in target machine err = installPublicKeyInTarget(role.AdminUser, publicKeyFileName, username, ip, role.Port, hostKey.Key, true) if err != nil { return "", "", fmt.Errorf("error adding public key to authorized_keys file in target") } return dynamicPublicKey, dynamicPrivateKey, nil } // Generates a UUID OTP and its salted value based on the salt of the backend. func (b *backend) GenerateSaltedOTP() (string, string) { str := uuid.GenerateUUID() return str, b.salt.SaltID(str) } // Generates a salted OTP and creates an entry for the same in storage backend. func (b *backend) GenerateOTPCredential(req *logical.Request, username, ip string) (string, error) { otp, otpSalted := b.GenerateSaltedOTP() entry, err := req.Storage.Get("otp/" + otpSalted) // Make sure that new OTP is not replacing an existing one for err == nil && entry != nil { otp, otpSalted = b.GenerateSaltedOTP() entry, err = req.Storage.Get("otp/" + otpSalted) if err != nil { return "", err } } entry, err = logical.StorageEntryJSON("otp/"+otpSalted, sshOTP{ Username: username, IP: ip, }) if err != nil { return "", err } if err := req.Storage.Put(entry); err != nil { return "", err } return otp, nil } const pathCredsCreateHelpSyn = ` Creates a credential for establishing SSH connection with the remote host. ` const pathCredsCreateHelpDesc = ` This path will generate a new key for establishing SSH session with target host. The key can either be a long lived dynamic key or a One Time Password (OTP), using 'key_type' parameter being 'dynamic' or 'otp' respectively. For dynamic keys, a named key should be supplied. Create named key using the 'keys/' endpoint, and this represents the shared SSH key of target host. If this backend is mounted at 'ssh', then "ssh/creds/web" would generate a key for 'web' role. Keys will have a lease associated with them. The access keys can be revoked by using the lease ID. `