mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-04 04:28:08 +00:00 
			
		
		
		
	* package api * package builtin/credential * package builtin/logical * package command * package helper * package http and logical * package physical * package shamir * package vault * package vault * address feedback * more fixes
		
			
				
	
	
		
			333 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			333 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package ssh
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"fmt"
 | 
						|
	"net"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/hashicorp/errwrap"
 | 
						|
	"github.com/hashicorp/go-uuid"
 | 
						|
	"github.com/hashicorp/vault/logical"
 | 
						|
	"github.com/hashicorp/vault/logical/framework"
 | 
						|
)
 | 
						|
 | 
						|
type sshOTP struct {
 | 
						|
	Username string `json:"username" structs:"username" mapstructure:"username"`
 | 
						|
	IP       string `json:"ip" structs:"ip" mapstructure:"ip"`
 | 
						|
	RoleName string `json:"role_name" structs:"role_name" mapstructure:"role_name"`
 | 
						|
}
 | 
						|
 | 
						|
func pathCredsCreate(b *backend) *framework.Path {
 | 
						|
	return &framework.Path{
 | 
						|
		Pattern: "creds/" + framework.GenericNameRegex("role"),
 | 
						|
		Fields: map[string]*framework.FieldSchema{
 | 
						|
			"role": &framework.FieldSchema{
 | 
						|
				Type:        framework.TypeString,
 | 
						|
				Description: "[Required] Name of the role",
 | 
						|
			},
 | 
						|
			"username": &framework.FieldSchema{
 | 
						|
				Type:        framework.TypeString,
 | 
						|
				Description: "[Optional] Username in remote host",
 | 
						|
			},
 | 
						|
			"ip": &framework.FieldSchema{
 | 
						|
				Type:        framework.TypeString,
 | 
						|
				Description: "[Required] IP of the remote host",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Callbacks: map[logical.Operation]framework.OperationFunc{
 | 
						|
			logical.UpdateOperation: b.pathCredsCreateWrite,
 | 
						|
		},
 | 
						|
		HelpSynopsis:    pathCredsCreateHelpSyn,
 | 
						|
		HelpDescription: pathCredsCreateHelpDesc,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (b *backend) pathCredsCreateWrite(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
 | 
						|
	roleName := d.Get("role").(string)
 | 
						|
	if roleName == "" {
 | 
						|
		return logical.ErrorResponse("Missing role"), nil
 | 
						|
	}
 | 
						|
 | 
						|
	ipRaw := d.Get("ip").(string)
 | 
						|
	if ipRaw == "" {
 | 
						|
		return logical.ErrorResponse("Missing ip"), nil
 | 
						|
	}
 | 
						|
 | 
						|
	role, err := b.getRole(ctx, req.Storage, roleName)
 | 
						|
	if err != nil {
 | 
						|
		return nil, errwrap.Wrapf("error retrieving role: {{err}}", err)
 | 
						|
	}
 | 
						|
	if role == nil {
 | 
						|
		return logical.ErrorResponse(fmt.Sprintf("Role %q not found", roleName)), nil
 | 
						|
	}
 | 
						|
 | 
						|
	// username is an optional parameter.
 | 
						|
	username := d.Get("username").(string)
 | 
						|
 | 
						|
	// Set the default username
 | 
						|
	if username == "" {
 | 
						|
		if role.DefaultUser == "" {
 | 
						|
			return logical.ErrorResponse("No default username registered. Use 'username' option"), nil
 | 
						|
		}
 | 
						|
		username = role.DefaultUser
 | 
						|
	}
 | 
						|
 | 
						|
	if role.AllowedUsers != "" {
 | 
						|
		// Check if the username is present in allowed users list.
 | 
						|
		err := validateUsername(username, role.AllowedUsers)
 | 
						|
 | 
						|
		// If username is not present in allowed users list, check if it
 | 
						|
		// is the default username in the role. If neither is true, then
 | 
						|
		// that username is not allowed to generate a credential.
 | 
						|
		if err != nil && username != role.DefaultUser {
 | 
						|
			return logical.ErrorResponse("Username is not present is allowed users list"), nil
 | 
						|
		}
 | 
						|
	} else if username != role.DefaultUser {
 | 
						|
		return logical.ErrorResponse("Username has to be either in allowed users list or has to be a default username"), nil
 | 
						|
	}
 | 
						|
 | 
						|
	// Validate the IP address
 | 
						|
	ipAddr := net.ParseIP(ipRaw)
 | 
						|
	if ipAddr == nil {
 | 
						|
		return logical.ErrorResponse(fmt.Sprintf("Invalid IP %q", ipRaw)), nil
 | 
						|
	}
 | 
						|
 | 
						|
	// Check if the IP belongs to the registered list of CIDR blocks under the role
 | 
						|
	ip := ipAddr.String()
 | 
						|
 | 
						|
	zeroAddressEntry, err := b.getZeroAddressRoles(ctx, req.Storage)
 | 
						|
	if err != nil {
 | 
						|
		return nil, errwrap.Wrapf("error retrieving zero-address roles: {{err}}", err)
 | 
						|
	}
 | 
						|
	var zeroAddressRoles []string
 | 
						|
	if zeroAddressEntry != nil {
 | 
						|
		zeroAddressRoles = zeroAddressEntry.Roles
 | 
						|
	}
 | 
						|
 | 
						|
	err = validateIP(ip, roleName, role.CIDRList, role.ExcludeCIDRList, zeroAddressRoles)
 | 
						|
	if err != nil {
 | 
						|
		return logical.ErrorResponse(fmt.Sprintf("Error validating IP: %v", err)), nil
 | 
						|
	}
 | 
						|
 | 
						|
	var result *logical.Response
 | 
						|
	if role.KeyType == KeyTypeOTP {
 | 
						|
		// Generate an OTP
 | 
						|
		otp, err := b.GenerateOTPCredential(ctx, req, &sshOTP{
 | 
						|
			Username: username,
 | 
						|
			IP:       ip,
 | 
						|
			RoleName: roleName,
 | 
						|
		})
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		// Return the information relevant to user of OTP type and save
 | 
						|
		// the data required for later use in the internal section of secret.
 | 
						|
		// In this case, saving just the OTP is sufficient since there is
 | 
						|
		// no need to establish connection with the remote host.
 | 
						|
		result = b.Secret(SecretOTPType).Response(map[string]interface{}{
 | 
						|
			"key_type": role.KeyType,
 | 
						|
			"key":      otp,
 | 
						|
			"username": username,
 | 
						|
			"ip":       ip,
 | 
						|
			"port":     role.Port,
 | 
						|
		}, map[string]interface{}{
 | 
						|
			"otp": otp,
 | 
						|
		})
 | 
						|
	} else if role.KeyType == KeyTypeDynamic {
 | 
						|
		// Generate an RSA key pair. This also installs the newly generated
 | 
						|
		// public key in the remote host.
 | 
						|
		dynamicPublicKey, dynamicPrivateKey, err := b.GenerateDynamicCredential(ctx, req, role, username, ip)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		// Return the information relevant to user of dynamic type and save
 | 
						|
		// information required for later use in internal section of secret.
 | 
						|
		result = b.Secret(SecretDynamicKeyType).Response(map[string]interface{}{
 | 
						|
			"key":      dynamicPrivateKey,
 | 
						|
			"key_type": role.KeyType,
 | 
						|
			"username": username,
 | 
						|
			"ip":       ip,
 | 
						|
			"port":     role.Port,
 | 
						|
		}, map[string]interface{}{
 | 
						|
			"admin_user":         role.AdminUser,
 | 
						|
			"username":           username,
 | 
						|
			"ip":                 ip,
 | 
						|
			"host_key_name":      role.KeyName,
 | 
						|
			"dynamic_public_key": dynamicPublicKey,
 | 
						|
			"port":               role.Port,
 | 
						|
			"install_script":     role.InstallScript,
 | 
						|
		})
 | 
						|
	} else {
 | 
						|
		return nil, fmt.Errorf("key type unknown")
 | 
						|
	}
 | 
						|
 | 
						|
	return result, nil
 | 
						|
}
 | 
						|
 | 
						|
// Generates a RSA key pair and installs it in the remote target
 | 
						|
func (b *backend) GenerateDynamicCredential(ctx context.Context, req *logical.Request, role *sshRole, username, ip string) (string, string, error) {
 | 
						|
	// Fetch the host key to be used for dynamic key installation
 | 
						|
	keyEntry, err := req.Storage.Get(ctx, fmt.Sprintf("keys/%s", role.KeyName))
 | 
						|
	if err != nil {
 | 
						|
		return "", "", errwrap.Wrapf(fmt.Sprintf("key %q not found: {{err}}", role.KeyName), err)
 | 
						|
	}
 | 
						|
 | 
						|
	if keyEntry == nil {
 | 
						|
		return "", "", fmt.Errorf("key %q not found", role.KeyName)
 | 
						|
	}
 | 
						|
 | 
						|
	var hostKey sshHostKey
 | 
						|
	if err := keyEntry.DecodeJSON(&hostKey); err != nil {
 | 
						|
		return "", "", errwrap.Wrapf("error reading the host key: {{err}}", err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Generate a new RSA key pair with the given key length.
 | 
						|
	dynamicPublicKey, dynamicPrivateKey, err := generateRSAKeys(role.KeyBits)
 | 
						|
	if err != nil {
 | 
						|
		return "", "", errwrap.Wrapf("error generating key: {{err}}", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if len(role.KeyOptionSpecs) != 0 {
 | 
						|
		dynamicPublicKey = fmt.Sprintf("%s %s", role.KeyOptionSpecs, dynamicPublicKey)
 | 
						|
	}
 | 
						|
 | 
						|
	// Add the public key to authorized_keys file in target machine
 | 
						|
	err = b.installPublicKeyInTarget(ctx, role.AdminUser, username, ip, role.Port, hostKey.Key, dynamicPublicKey, role.InstallScript, true)
 | 
						|
	if err != nil {
 | 
						|
		return "", "", errwrap.Wrapf("failed to add public key to authorized_keys file in target: {{err}}", err)
 | 
						|
	}
 | 
						|
	return dynamicPublicKey, dynamicPrivateKey, nil
 | 
						|
}
 | 
						|
 | 
						|
// Generates a UUID OTP and its salted value based on the salt of the backend.
 | 
						|
func (b *backend) GenerateSaltedOTP(ctx context.Context) (string, string, error) {
 | 
						|
	str, err := uuid.GenerateUUID()
 | 
						|
	if err != nil {
 | 
						|
		return "", "", err
 | 
						|
	}
 | 
						|
	salt, err := b.Salt(ctx)
 | 
						|
	if err != nil {
 | 
						|
		return "", "", err
 | 
						|
	}
 | 
						|
 | 
						|
	return str, salt.SaltID(str), nil
 | 
						|
}
 | 
						|
 | 
						|
// Generates an UUID OTP and creates an entry for the same in storage backend with its salted string.
 | 
						|
func (b *backend) GenerateOTPCredential(ctx context.Context, req *logical.Request, sshOTPEntry *sshOTP) (string, error) {
 | 
						|
	otp, otpSalted, err := b.GenerateSaltedOTP(ctx)
 | 
						|
	if err != nil {
 | 
						|
		return "", err
 | 
						|
	}
 | 
						|
 | 
						|
	// Check if there is an entry already created for the newly generated OTP.
 | 
						|
	entry, err := b.getOTP(ctx, req.Storage, otpSalted)
 | 
						|
 | 
						|
	// If entry already exists for the OTP, make sure that new OTP is not
 | 
						|
	// replacing an existing one by recreating new ones until an unused
 | 
						|
	// OTP is generated. It is very unlikely that this is the case and this
 | 
						|
	// code is just for safety.
 | 
						|
	for err == nil && entry != nil {
 | 
						|
		otp, otpSalted, err = b.GenerateSaltedOTP(ctx)
 | 
						|
		if err != nil {
 | 
						|
			return "", err
 | 
						|
		}
 | 
						|
		entry, err = b.getOTP(ctx, req.Storage, otpSalted)
 | 
						|
		if err != nil {
 | 
						|
			return "", err
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Store an entry for the salt of OTP.
 | 
						|
	newEntry, err := logical.StorageEntryJSON("otp/"+otpSalted, sshOTPEntry)
 | 
						|
	if err != nil {
 | 
						|
		return "", err
 | 
						|
	}
 | 
						|
	if err := req.Storage.Put(ctx, newEntry); err != nil {
 | 
						|
		return "", err
 | 
						|
	}
 | 
						|
	return otp, nil
 | 
						|
}
 | 
						|
 | 
						|
// ValidateIP first checks if the role belongs to the list of privileged
 | 
						|
// roles that could allow any IP address and if there is a match, IP is
 | 
						|
// accepted immediately. If not, IP is searched in the allowed CIDR blocks
 | 
						|
// registered with the role. If there is a match, then it is searched in the
 | 
						|
// excluded CIDR blocks and if IP is found there as well, an error is returned.
 | 
						|
// IP is valid only if it is encompassed by allowed CIDR blocks and not by
 | 
						|
// excluded CIDR blocks.
 | 
						|
func validateIP(ip, roleName, cidrList, excludeCidrList string, zeroAddressRoles []string) error {
 | 
						|
	// Search IP in the zero-address list
 | 
						|
	for _, role := range zeroAddressRoles {
 | 
						|
		if roleName == role {
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Search IP in allowed CIDR blocks
 | 
						|
	ipMatched, err := cidrListContainsIP(ip, cidrList)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	if !ipMatched {
 | 
						|
		return fmt.Errorf("IP does not belong to role")
 | 
						|
	}
 | 
						|
 | 
						|
	if len(excludeCidrList) == 0 {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	// Search IP in exclude list
 | 
						|
	ipMatched, err = cidrListContainsIP(ip, excludeCidrList)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	if ipMatched {
 | 
						|
		return fmt.Errorf("IP does not belong to role")
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// Checks if the username supplied by the user is present in the list of
 | 
						|
// allowed users registered which creation of role.
 | 
						|
func validateUsername(username, allowedUsers string) error {
 | 
						|
	if allowedUsers == "" {
 | 
						|
		return fmt.Errorf("username not in allowed users list")
 | 
						|
	}
 | 
						|
 | 
						|
	// Role was explicitly configured to allow any username.
 | 
						|
	if allowedUsers == "*" {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	userList := strings.Split(allowedUsers, ",")
 | 
						|
	for _, user := range userList {
 | 
						|
		if strings.TrimSpace(user) == username {
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return fmt.Errorf("username not in allowed users list")
 | 
						|
}
 | 
						|
 | 
						|
const pathCredsCreateHelpSyn = `
 | 
						|
Creates a credential for establishing SSH connection with the remote host.
 | 
						|
`
 | 
						|
 | 
						|
const pathCredsCreateHelpDesc = `
 | 
						|
This path will generate a new key for establishing SSH session with
 | 
						|
target host. The key can either be a long lived dynamic key or a One
 | 
						|
Time Password (OTP), using 'key_type' parameter being 'dynamic' or
 | 
						|
'otp' respectively. For dynamic keys, a named key should be supplied.
 | 
						|
Create named key using the 'keys/' endpoint, and this represents the
 | 
						|
shared SSH key of target host. If this backend is mounted at 'ssh',
 | 
						|
then "ssh/creds/web" would generate a key for 'web' role.
 | 
						|
 | 
						|
Keys will have a lease associated with them. The access keys can be
 | 
						|
revoked by using the lease ID.
 | 
						|
`
 |