2017-02-01 17:40:50 -05:00
|
|
|
import base64
|
2016-03-01 11:23:03 -05:00
|
|
|
from Crypto.PublicKey import RSA
|
|
|
|
|
2017-03-14 10:58:57 -04:00
|
|
|
from django.core.urlresolvers import reverse
|
2017-02-01 17:40:50 -05:00
|
|
|
from django.http import HttpResponseBadRequest
|
2016-03-01 11:23:03 -05:00
|
|
|
|
2017-02-01 16:21:33 -05:00
|
|
|
from rest_framework.authentication import BasicAuthentication, SessionAuthentication
|
2016-04-07 12:37:09 -04:00
|
|
|
from rest_framework.permissions import IsAuthenticated
|
2016-04-12 14:03:18 -04:00
|
|
|
from rest_framework.renderers import JSONRenderer
|
2016-03-01 11:23:03 -05:00
|
|
|
from rest_framework.response import Response
|
2017-03-08 17:57:51 -05:00
|
|
|
from rest_framework.viewsets import ViewSet, ModelViewSet
|
2016-03-01 11:23:03 -05:00
|
|
|
|
2016-04-12 14:03:18 -04:00
|
|
|
from extras.api.renderers import FormlessBrowsableAPIRenderer, FreeRADIUSClientsRenderer
|
2017-03-14 12:32:08 -04:00
|
|
|
from secrets.exceptions import InvalidSessionKey
|
2016-03-17 14:57:08 -04:00
|
|
|
from secrets.filters import SecretFilter
|
2017-02-03 12:49:32 -05:00
|
|
|
from secrets.models import Secret, SecretRole, SessionKey, UserKey
|
2017-02-01 16:21:33 -05:00
|
|
|
from utilities.api import WritableSerializerMixin
|
2016-05-18 16:35:35 -04:00
|
|
|
from . import serializers
|
2016-03-01 11:23:03 -05:00
|
|
|
|
|
|
|
|
2016-03-22 12:17:49 -04:00
|
|
|
ERR_USERKEY_MISSING = "No UserKey found for the current user."
|
|
|
|
ERR_USERKEY_INACTIVE = "UserKey has not been activated for decryption."
|
2017-02-02 21:26:51 -05:00
|
|
|
ERR_PRIVKEY_MISSING = "Private key was not provided."
|
2016-03-22 12:17:49 -04:00
|
|
|
ERR_PRIVKEY_INVALID = "Invalid private key."
|
|
|
|
|
|
|
|
|
2017-01-24 17:12:16 -05:00
|
|
|
#
|
|
|
|
# Secret Roles
|
|
|
|
#
|
2016-03-01 11:23:03 -05:00
|
|
|
|
2017-01-24 17:12:16 -05:00
|
|
|
class SecretRoleViewSet(ModelViewSet):
|
2016-03-01 11:23:03 -05:00
|
|
|
queryset = SecretRole.objects.all()
|
2016-05-18 16:35:35 -04:00
|
|
|
serializer_class = serializers.SecretRoleSerializer
|
2016-07-18 15:28:36 -04:00
|
|
|
permission_classes = [IsAuthenticated]
|
2016-03-01 11:23:03 -05:00
|
|
|
|
|
|
|
|
2017-01-24 17:12:16 -05:00
|
|
|
#
|
|
|
|
# Secrets
|
|
|
|
#
|
|
|
|
|
2017-02-01 17:40:50 -05:00
|
|
|
# TODO: Need to implement custom create() and update() methods to handle secret encryption.
|
2017-02-01 16:21:33 -05:00
|
|
|
class SecretViewSet(WritableSerializerMixin, ModelViewSet):
|
|
|
|
queryset = Secret.objects.select_related(
|
|
|
|
'device__primary_ip4', 'device__primary_ip6', 'role',
|
|
|
|
).prefetch_related(
|
|
|
|
'role__users', 'role__groups',
|
|
|
|
)
|
|
|
|
serializer_class = serializers.SecretSerializer
|
|
|
|
write_serializer_class = serializers.WritableSecretSerializer
|
|
|
|
filter_class = SecretFilter
|
|
|
|
# DRF's BrowsableAPIRenderer can't support passing the secret key as a header, so we disable it.
|
|
|
|
renderer_classes = [FormlessBrowsableAPIRenderer, JSONRenderer, FreeRADIUSClientsRenderer]
|
|
|
|
# Enabled BasicAuthentication for testing (until we have TokenAuthentication implemented)
|
|
|
|
authentication_classes = [BasicAuthentication, SessionAuthentication]
|
|
|
|
permission_classes = [IsAuthenticated]
|
|
|
|
|
2017-03-14 12:32:08 -04:00
|
|
|
def _read_session_key(self, request):
|
2017-02-03 12:49:32 -05:00
|
|
|
|
|
|
|
# Check for a session key provided as a cookie or header
|
|
|
|
if 'session_key' in request.COOKIES:
|
2017-03-14 12:32:08 -04:00
|
|
|
return base64.b64decode(request.COOKIES['session_key'])
|
2017-02-03 12:49:32 -05:00
|
|
|
elif 'HTTP_X_SESSION_KEY' in request.META:
|
2017-03-14 12:32:08 -04:00
|
|
|
return base64.b64decode(request.META['HTTP_X_SESSION_KEY'])
|
|
|
|
return None
|
2016-03-22 12:17:49 -04:00
|
|
|
|
2017-02-02 21:26:51 -05:00
|
|
|
def retrieve(self, request, *args, **kwargs):
|
2017-03-14 12:32:08 -04:00
|
|
|
|
2017-02-02 21:26:51 -05:00
|
|
|
secret = self.get_object()
|
2017-03-14 12:32:08 -04:00
|
|
|
session_key = self._read_session_key(request)
|
2016-03-22 12:17:49 -04:00
|
|
|
|
2017-03-14 12:32:08 -04:00
|
|
|
# Retrieve session key cipher (if any) for the current user
|
|
|
|
if session_key is not None:
|
|
|
|
try:
|
|
|
|
sk = SessionKey.objects.get(user=request.user)
|
|
|
|
master_key = sk.get_master_key(session_key)
|
|
|
|
secret.decrypt(master_key)
|
|
|
|
except SessionKey.DoesNotExist:
|
|
|
|
return HttpResponseBadRequest("No active session key for current user.")
|
|
|
|
except InvalidSessionKey:
|
|
|
|
return HttpResponseBadRequest("Invalid session key.")
|
2016-04-12 14:03:18 -04:00
|
|
|
|
2017-02-01 17:40:50 -05:00
|
|
|
serializer = self.get_serializer(secret)
|
|
|
|
return Response(serializer.data)
|
2016-03-01 11:23:03 -05:00
|
|
|
|
2017-02-01 17:40:50 -05:00
|
|
|
def list(self, request, *args, **kwargs):
|
2017-03-14 12:32:08 -04:00
|
|
|
|
2017-02-01 17:40:50 -05:00
|
|
|
queryset = self.filter_queryset(self.get_queryset())
|
2016-03-01 11:23:03 -05:00
|
|
|
|
2017-03-14 12:32:08 -04:00
|
|
|
# Attempt to retrieve the master key for decryption
|
|
|
|
session_key = self._read_session_key(request)
|
|
|
|
master_key = None
|
|
|
|
if session_key is not None:
|
|
|
|
try:
|
|
|
|
sk = SessionKey.objects.get(user=request.user)
|
|
|
|
master_key = sk.get_master_key(session_key)
|
|
|
|
except SessionKey.DoesNotExist:
|
|
|
|
return HttpResponseBadRequest("No active session key for current user.")
|
|
|
|
except InvalidSessionKey:
|
|
|
|
return HttpResponseBadRequest("Invalid session key.")
|
|
|
|
|
2017-02-01 17:40:50 -05:00
|
|
|
# Pagination
|
|
|
|
page = self.paginate_queryset(queryset)
|
|
|
|
if page is not None:
|
|
|
|
secrets = []
|
|
|
|
if master_key is not None:
|
|
|
|
for secret in page:
|
|
|
|
secret.decrypt(master_key)
|
|
|
|
secrets.append(secret)
|
|
|
|
serializer = self.get_serializer(secrets, many=True)
|
|
|
|
else:
|
|
|
|
serializer = self.get_serializer(page, many=True)
|
|
|
|
return self.get_paginated_response(serializer.data)
|
2016-03-22 12:17:49 -04:00
|
|
|
|
2017-02-01 17:40:50 -05:00
|
|
|
serializer = self.get_serializer(queryset, many=True)
|
|
|
|
return Response(serializer.data)
|
2016-04-12 14:03:18 -04:00
|
|
|
|
2016-03-01 11:23:03 -05:00
|
|
|
|
2017-03-08 17:57:51 -05:00
|
|
|
class GetSessionKeyViewSet(ViewSet):
|
2017-02-02 21:26:51 -05:00
|
|
|
"""
|
2017-03-08 17:57:51 -05:00
|
|
|
Retrieve a temporary session key to use for encrypting and decrypting secrets via the API. The user's private RSA
|
|
|
|
key is POSTed with the name `private_key`. An example:
|
|
|
|
|
|
|
|
curl -v -X POST -H "Authorization: Token <token>" -H "Accept: application/json; indent=4" \\
|
|
|
|
--data-urlencode "private_key@<filename>" https://netbox/api/secrets/get-session-key/
|
|
|
|
|
2017-03-14 10:58:57 -04:00
|
|
|
This request will yield a base64-encoded session key to be included in an `X-Session-Key` header in future requests:
|
2017-03-08 17:57:51 -05:00
|
|
|
|
|
|
|
{
|
|
|
|
"session_key": "+8t4SI6XikgVmB5+/urhozx9O5qCQANyOk1MNe6taRf="
|
|
|
|
}
|
2017-02-02 21:26:51 -05:00
|
|
|
"""
|
|
|
|
permission_classes = [IsAuthenticated]
|
|
|
|
|
2017-03-08 17:57:51 -05:00
|
|
|
def create(self, request):
|
2017-02-02 21:26:51 -05:00
|
|
|
|
|
|
|
# Read private key
|
|
|
|
private_key = request.POST.get('private_key', None)
|
|
|
|
if private_key is None:
|
|
|
|
return HttpResponseBadRequest(ERR_PRIVKEY_MISSING)
|
|
|
|
|
|
|
|
# Validate user key
|
|
|
|
try:
|
|
|
|
user_key = UserKey.objects.get(user=request.user)
|
|
|
|
except UserKey.DoesNotExist:
|
|
|
|
return HttpResponseBadRequest(ERR_USERKEY_MISSING)
|
|
|
|
if not user_key.is_active():
|
|
|
|
return HttpResponseBadRequest(ERR_USERKEY_INACTIVE)
|
|
|
|
|
|
|
|
# Validate private key
|
|
|
|
master_key = user_key.get_master_key(private_key)
|
|
|
|
if master_key is None:
|
|
|
|
return HttpResponseBadRequest(ERR_PRIVKEY_INVALID)
|
|
|
|
|
2017-02-03 12:49:32 -05:00
|
|
|
# Delete the existing SessionKey for this user if one exists
|
|
|
|
SessionKey.objects.filter(user=request.user).delete()
|
2017-02-02 21:26:51 -05:00
|
|
|
|
2017-02-03 12:49:32 -05:00
|
|
|
# Create a new SessionKey
|
|
|
|
sk = SessionKey(user=request.user)
|
|
|
|
sk.save(master_key=master_key)
|
2017-03-14 10:58:57 -04:00
|
|
|
encoded_key = base64.b64encode(sk.key)
|
2017-02-02 21:26:51 -05:00
|
|
|
|
2017-03-14 10:58:57 -04:00
|
|
|
# Craft the response
|
2017-02-02 21:26:51 -05:00
|
|
|
response = Response({
|
2017-03-14 10:58:57 -04:00
|
|
|
'session_key': encoded_key,
|
2017-02-02 21:26:51 -05:00
|
|
|
})
|
2017-03-14 10:58:57 -04:00
|
|
|
|
|
|
|
# If token authentication is not in use, assign the session key as a cookie
|
|
|
|
if request.auth is None:
|
|
|
|
response.set_cookie('session_key', value=encoded_key, path=reverse('secrets-api:secret-list'))
|
|
|
|
|
2017-02-02 21:26:51 -05:00
|
|
|
return response
|
2017-02-03 12:49:32 -05:00
|
|
|
|
|
|
|
|
2017-03-08 17:57:51 -05:00
|
|
|
class GenerateRSAKeyPairViewSet(ViewSet):
|
2017-02-03 12:49:32 -05:00
|
|
|
"""
|
2017-03-08 17:57:51 -05:00
|
|
|
This endpoint can be used to generate a new RSA key pair. The keys are returned in PEM format.
|
|
|
|
|
|
|
|
{
|
|
|
|
"public_key": "<public key>",
|
|
|
|
"private_key": "<private key>"
|
|
|
|
}
|
2017-02-03 12:49:32 -05:00
|
|
|
"""
|
|
|
|
permission_classes = [IsAuthenticated]
|
|
|
|
|
2017-03-08 17:57:51 -05:00
|
|
|
def list(self, request):
|
2017-02-03 12:49:32 -05:00
|
|
|
|
|
|
|
# Determine what size key to generate
|
|
|
|
key_size = request.GET.get('key_size', 2048)
|
|
|
|
if key_size not in range(2048, 4097, 256):
|
|
|
|
key_size = 2048
|
|
|
|
|
|
|
|
# Export RSA private and public keys in PEM format
|
|
|
|
key = RSA.generate(key_size)
|
|
|
|
private_key = key.exportKey('PEM')
|
|
|
|
public_key = key.publickey().exportKey('PEM')
|
|
|
|
|
|
|
|
return Response({
|
|
|
|
'private_key': private_key,
|
|
|
|
'public_key': public_key,
|
|
|
|
})
|