235 lines
5.8 KiB
Go
235 lines
5.8 KiB
Go
package cert
|
|
|
|
import (
|
|
"crypto/x509"
|
|
"fmt"
|
|
"math/big"
|
|
"strings"
|
|
|
|
"github.com/fatih/structs"
|
|
"github.com/hashicorp/vault/helper/certutil"
|
|
"github.com/hashicorp/vault/logical"
|
|
"github.com/hashicorp/vault/logical/framework"
|
|
)
|
|
|
|
func pathCRLs(b *backend) *framework.Path {
|
|
return &framework.Path{
|
|
Pattern: "crls/" + framework.GenericNameRegex("name"),
|
|
Fields: map[string]*framework.FieldSchema{
|
|
"name": &framework.FieldSchema{
|
|
Type: framework.TypeString,
|
|
Description: "The name of the certificate",
|
|
},
|
|
|
|
"crl": &framework.FieldSchema{
|
|
Type: framework.TypeString,
|
|
Description: `The public certificate that should be trusted.
|
|
May be DER or PEM encoded. Note: the expiration time
|
|
is ignored; if the CRL is no longer valid, delete it
|
|
using the same name as specified here.`,
|
|
},
|
|
},
|
|
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
|
logical.DeleteOperation: b.pathCRLDelete,
|
|
logical.ReadOperation: b.pathCRLRead,
|
|
logical.UpdateOperation: b.pathCRLWrite,
|
|
},
|
|
|
|
HelpSynopsis: pathCRLsHelpSyn,
|
|
HelpDescription: pathCRLsHelpDesc,
|
|
}
|
|
}
|
|
|
|
func (b *backend) populateCRLs(storage logical.Storage) error {
|
|
b.crlUpdateMutex.Lock()
|
|
defer b.crlUpdateMutex.Unlock()
|
|
|
|
keys, err := storage.List("crls/")
|
|
if err != nil {
|
|
return fmt.Errorf("error listing CRLs: %v", err)
|
|
}
|
|
if keys == nil || len(keys) == 0 {
|
|
return nil
|
|
}
|
|
|
|
for _, key := range keys {
|
|
entry, err := storage.Get("crls/" + key)
|
|
if err != nil {
|
|
return fmt.Errorf("error loading CRL %s: %v", key, err)
|
|
}
|
|
if entry == nil {
|
|
continue
|
|
}
|
|
var crlInfo CRLInfo
|
|
err = entry.DecodeJSON(&crlInfo)
|
|
if err != nil {
|
|
return fmt.Errorf("error decoding CRL %s: %v", key, err)
|
|
}
|
|
b.crls[key] = crlInfo
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (b *backend) findSerialInCRLs(serial *big.Int) map[string]RevokedSerialInfo {
|
|
b.crlUpdateMutex.RLock()
|
|
defer b.crlUpdateMutex.RUnlock()
|
|
ret := map[string]RevokedSerialInfo{}
|
|
for key, crl := range b.crls {
|
|
if crl.Serials == nil {
|
|
continue
|
|
}
|
|
if info, ok := crl.Serials[serial.String()]; ok {
|
|
ret[key] = info
|
|
}
|
|
}
|
|
return ret
|
|
}
|
|
|
|
func parseSerialString(input string) (*big.Int, error) {
|
|
ret := &big.Int{}
|
|
|
|
switch {
|
|
case strings.Count(input, ":") > 0:
|
|
serialBytes := certutil.ParseHexFormatted(input, ":")
|
|
if serialBytes == nil {
|
|
return nil, fmt.Errorf("error parsing serial %s", input)
|
|
}
|
|
ret.SetBytes(serialBytes)
|
|
case strings.Count(input, "-") > 0:
|
|
serialBytes := certutil.ParseHexFormatted(input, "-")
|
|
if serialBytes == nil {
|
|
return nil, fmt.Errorf("error parsing serial %s", input)
|
|
}
|
|
ret.SetBytes(serialBytes)
|
|
default:
|
|
var success bool
|
|
ret, success = ret.SetString(input, 0)
|
|
if !success {
|
|
return nil, fmt.Errorf("error parsing serial %s", input)
|
|
}
|
|
}
|
|
|
|
return ret, nil
|
|
}
|
|
|
|
func (b *backend) pathCRLDelete(
|
|
req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
name := strings.ToLower(d.Get("name").(string))
|
|
if name == "" {
|
|
return logical.ErrorResponse(`"name" parameter cannot be empty`), nil
|
|
}
|
|
|
|
b.crlUpdateMutex.Lock()
|
|
defer b.crlUpdateMutex.Unlock()
|
|
|
|
_, ok := b.crls[name]
|
|
if !ok {
|
|
return logical.ErrorResponse(fmt.Sprintf(
|
|
"no such CRL %s", name,
|
|
)), nil
|
|
}
|
|
|
|
err := req.Storage.Delete("crls/" + name)
|
|
if err != nil {
|
|
return logical.ErrorResponse(fmt.Sprintf(
|
|
"error deleting crl %s: %v", name, err),
|
|
), nil
|
|
}
|
|
|
|
delete(b.crls, name)
|
|
|
|
return nil, nil
|
|
}
|
|
|
|
func (b *backend) pathCRLRead(
|
|
req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
name := strings.ToLower(d.Get("name").(string))
|
|
if name == "" {
|
|
return logical.ErrorResponse(`"name" parameter must be set`), nil
|
|
}
|
|
|
|
b.crlUpdateMutex.RLock()
|
|
defer b.crlUpdateMutex.RUnlock()
|
|
|
|
var retData map[string]interface{}
|
|
|
|
crl, ok := b.crls[name]
|
|
if !ok {
|
|
return logical.ErrorResponse(fmt.Sprintf(
|
|
"no such CRL %s", name,
|
|
)), nil
|
|
}
|
|
|
|
retData = structs.New(&crl).Map()
|
|
|
|
return &logical.Response{
|
|
Data: retData,
|
|
}, nil
|
|
}
|
|
|
|
func (b *backend) pathCRLWrite(
|
|
req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
name := strings.ToLower(d.Get("name").(string))
|
|
if name == "" {
|
|
return logical.ErrorResponse(`"name" parameter cannot be empty`), nil
|
|
}
|
|
crl := d.Get("crl").(string)
|
|
|
|
certList, err := x509.ParseCRL([]byte(crl))
|
|
if err != nil {
|
|
return logical.ErrorResponse(fmt.Sprintf("failed to parse CRL: %v", err)), nil
|
|
}
|
|
if certList == nil {
|
|
return logical.ErrorResponse("parsed CRL is nil"), nil
|
|
}
|
|
|
|
b.crlUpdateMutex.Lock()
|
|
defer b.crlUpdateMutex.Unlock()
|
|
|
|
crlInfo := CRLInfo{
|
|
Serials: map[string]RevokedSerialInfo{},
|
|
}
|
|
for _, revokedCert := range certList.TBSCertList.RevokedCertificates {
|
|
crlInfo.Serials[revokedCert.SerialNumber.String()] = RevokedSerialInfo{}
|
|
}
|
|
|
|
entry, err := logical.StorageEntryJSON("crls/"+name, crlInfo)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err = req.Storage.Put(entry); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
b.crls[name] = crlInfo
|
|
|
|
return nil, nil
|
|
}
|
|
|
|
type CRLInfo struct {
|
|
Serials map[string]RevokedSerialInfo `json:"serials" structs:"serials" mapstructure:"serials"`
|
|
}
|
|
|
|
type RevokedSerialInfo struct {
|
|
}
|
|
|
|
const pathCRLsHelpSyn = `
|
|
Manage Certificate Revocation Lists checked during authentication.
|
|
`
|
|
|
|
const pathCRLsHelpDesc = `
|
|
This endpoint allows you to create, read, update, and delete the Certificate
|
|
Revocation Lists checked during authentication.
|
|
|
|
When any CRLs are in effect, any login will check the trust chains sent by a
|
|
client against the submitted CRLs. Any chain containing a serial number revoked
|
|
by one or more of the CRLs causes that chain to be marked as invalid for the
|
|
authentication attempt. Conversely, *any* valid chain -- that is, a chain
|
|
in which none of the serials are revoked by any CRL -- allows authentication.
|
|
This allows authentication to succeed when interim parts of one chain have been
|
|
revoked; for instance, if a certificate is signed by two intermediate CAs due to
|
|
one of them expiring.
|
|
`
|