1
0
mirror of https://github.com/netbox-community/netbox.git synced 2024-05-10 07:54:54 +00:00

Reworked secrets API to allow optional decryption by POSTing a private key

This commit is contained in:
Jeremy Stretch
2016-03-22 12:17:49 -04:00
parent b78caba1ca
commit 6ce2cf9db0
4 changed files with 86 additions and 43 deletions

View File

@ -71,7 +71,7 @@ $(document).ready(function() {
function unlock_secret(secret_id, private_key) { function unlock_secret(secret_id, private_key) {
var csrf_token = $('input[name=csrfmiddlewaretoken]').val(); var csrf_token = $('input[name=csrfmiddlewaretoken]').val();
$.ajax({ $.ajax({
url: '/api/secrets/secrets/' + secret_id + '/decrypt/', url: '/api/secrets/secrets/' + secret_id + '/',
type: 'POST', type: 'POST',
data: { data: {
private_key: private_key private_key: private_key

View File

@ -31,7 +31,7 @@ class SecretSerializer(serializers.ModelSerializer):
class Meta: class Meta:
model = Secret model = Secret
fields = ['id', 'device', 'role', 'name', 'hash', 'created', 'last_modified'] fields = ['id', 'device', 'role', 'name', 'plaintext', 'hash', 'created', 'last_modified']
class SecretNestedSerializer(SecretSerializer): class SecretNestedSerializer(SecretSerializer):

View File

@ -8,7 +8,6 @@ urlpatterns = [
# Secrets # Secrets
url(r'^secrets/$', SecretListView.as_view(), name='secret_list'), url(r'^secrets/$', SecretListView.as_view(), name='secret_list'),
url(r'^secrets/(?P<pk>\d+)/$', SecretDetailView.as_view(), name='secret_detail'), url(r'^secrets/(?P<pk>\d+)/$', SecretDetailView.as_view(), name='secret_detail'),
url(r'^secrets/(?P<pk>\d+)/decrypt/$', SecretDecryptView.as_view(), name='secret_decrypt'),
# Secret roles # Secret roles
url(r'^secret-roles/$', SecretRoleListView.as_view(), name='secretrole_list'), url(r'^secret-roles/$', SecretRoleListView.as_view(), name='secretrole_list'),

View File

@ -1,11 +1,10 @@
from Crypto.PublicKey import RSA from Crypto.PublicKey import RSA
from django.http import HttpResponseForbidden
from django.shortcuts import get_object_or_404 from django.shortcuts import get_object_or_404
from rest_framework import generics from rest_framework import generics
from rest_framework.exceptions import ValidationError from rest_framework import status
from rest_framework.permissions import IsAuthenticated from rest_framework.permissions import IsAuthenticated, BasePermission
from rest_framework.response import Response from rest_framework.response import Response
from rest_framework.views import APIView from rest_framework.views import APIView
@ -14,6 +13,16 @@ from secrets.models import Secret, SecretRole, UserKey
from .serializers import SecretRoleSerializer, SecretSerializer from .serializers import SecretRoleSerializer, SecretSerializer
ERR_USERKEY_MISSING = "No UserKey found for the current user."
ERR_USERKEY_INACTIVE = "UserKey has not been activated for decryption."
ERR_PRIVKEY_INVALID = "Invalid private key."
class SecretViewPermission(BasePermission):
def has_permission(self, request, view):
return request.user.has_perm('secrets.view_secret')
class SecretRoleListView(generics.ListAPIView): class SecretRoleListView(generics.ListAPIView):
""" """
List all secret roles List all secret roles
@ -30,55 +39,90 @@ class SecretRoleDetailView(generics.RetrieveAPIView):
serializer_class = SecretRoleSerializer serializer_class = SecretRoleSerializer
class SecretListView(generics.ListAPIView): class SecretListView(generics.GenericAPIView):
""" """
List secrets (filterable) List secrets (filterable). If a private key is POSTed, attempt to decrypt each Secret.
""" """
queryset = Secret.objects.select_related('role') queryset = Secret.objects.select_related('device', 'role')
serializer_class = SecretSerializer serializer_class = SecretSerializer
filter_class = SecretFilter filter_class = SecretFilter
permission_classes = [IsAuthenticated] permission_classes = [SecretViewPermission]
def get(self, request, private_key=None, *args, **kwargs):
queryset = self.filter_queryset(self.get_queryset())
class SecretDetailView(generics.RetrieveAPIView): # Attempt to decrypt each Secret if a private key was provided.
""" if private_key is not None:
Retrieve a single Secret try:
""" uk = UserKey.objects.get(user=request.user)
queryset = Secret.objects.select_related('role') except UserKey.DoesNotExist:
serializer_class = SecretSerializer return Response(
permission_classes = [IsAuthenticated] {'error': ERR_USERKEY_MISSING},
status=status.HTTP_400_BAD_REQUEST
)
if not uk.is_active():
return Response(
{'error': ERR_USERKEY_INACTIVE},
status=status.HTTP_400_BAD_REQUEST
)
master_key = uk.get_master_key(private_key)
if master_key is not None:
for s in queryset:
s.decrypt(master_key)
else:
return Response(
{'error': ERR_PRIVKEY_INVALID},
status=status.HTTP_400_BAD_REQUEST
)
serializer = self.get_serializer(queryset, many=True)
return Response(serializer.data)
class SecretDecryptView(APIView): def post(self, request, *args, **kwargs):
"""
Retrieve the plaintext from a stored Secret. The request must include a valid private key.
"""
permission_classes = [IsAuthenticated]
def post(self, request, pk):
secret = get_object_or_404(Secret, pk=pk)
private_key = request.POST.get('private_key') private_key = request.POST.get('private_key')
if not private_key: return self.get(request, private_key=private_key)
raise ValidationError("Private key is missing from request.")
# Retrieve the Secret's plaintext with the user's private key
try:
uk = UserKey.objects.get(user=request.user)
except UserKey.DoesNotExist:
return HttpResponseForbidden(reason="No UserKey found.")
if not uk.is_active():
return HttpResponseForbidden(reason="UserKey is inactive.")
# Attempt to decrypt the Secret. class SecretDetailView(generics.GenericAPIView):
master_key = uk.get_master_key(private_key) """
if master_key is None: Retrieve a single Secret. If a private key is POSTed, attempt to decrypt the Secret.
raise ValidationError("Invalid secret key.") """
secret.decrypt(master_key) queryset = Secret.objects.select_related('device', 'role')
serializer_class = SecretSerializer
permission_classes = [SecretViewPermission]
return Response({ def get(self, request, pk, private_key=None, *args, **kwargs):
'plaintext': secret.plaintext, secret = get_object_or_404(Secret, pk=pk)
})
# Attempt to decrypt the Secret if a private key was provided.
if private_key is not None:
try:
uk = UserKey.objects.get(user=request.user)
except UserKey.DoesNotExist:
return Response(
{'error': ERR_USERKEY_MISSING},
status=status.HTTP_400_BAD_REQUEST
)
if not uk.is_active():
return Response(
{'error': ERR_USERKEY_INACTIVE},
status=status.HTTP_400_BAD_REQUEST
)
master_key = uk.get_master_key(private_key)
if master_key is not None:
secret.decrypt(master_key)
else:
return Response(
{'error': ERR_PRIVKEY_INVALID},
status=status.HTTP_400_BAD_REQUEST
)
serializer = self.get_serializer(secret)
return Response(serializer.data)
def post(self, request, pk, *args, **kwargs):
private_key = request.POST.get('private_key')
return self.get(request, pk, private_key=private_key)
class RSAKeyGeneratorView(APIView): class RSAKeyGeneratorView(APIView):