mirror of
https://github.com/netbox-community/netbox.git
synced 2024-05-10 07:54:54 +00:00
148 lines
5.2 KiB
Python
148 lines
5.2 KiB
Python
from Crypto.PublicKey import RSA
|
|
|
|
from django.shortcuts import get_object_or_404
|
|
|
|
from rest_framework import generics
|
|
from rest_framework import status
|
|
from rest_framework.permissions import IsAuthenticated
|
|
from rest_framework.response import Response
|
|
from rest_framework.settings import api_settings
|
|
from rest_framework.views import APIView
|
|
|
|
from extras.api.renderers import FreeRADIUSClientsRenderer
|
|
from secrets.filters import SecretFilter
|
|
from secrets.models import Secret, SecretRole, UserKey
|
|
from .serializers import SecretRoleSerializer, SecretSerializer
|
|
|
|
|
|
ERR_USERKEY_MISSING = "No UserKey found for the current user."
|
|
ERR_USERKEY_INACTIVE = "UserKey has not been activated for decryption."
|
|
ERR_PRIVKEY_INVALID = "Invalid private key."
|
|
|
|
|
|
class SecretRoleListView(generics.ListAPIView):
|
|
"""
|
|
List all secret roles
|
|
"""
|
|
queryset = SecretRole.objects.all()
|
|
serializer_class = SecretRoleSerializer
|
|
|
|
|
|
class SecretRoleDetailView(generics.RetrieveAPIView):
|
|
"""
|
|
Retrieve a single secret role
|
|
"""
|
|
queryset = SecretRole.objects.all()
|
|
serializer_class = SecretRoleSerializer
|
|
|
|
|
|
class SecretListView(generics.GenericAPIView):
|
|
"""
|
|
List secrets (filterable). If a private key is provided in the GET body, attempt to decrypt each Secret.
|
|
|
|
e.g. curl -X GET http://netbox/api/secrets/secrets/ --data-binary "@/path/to/private_key"
|
|
"""
|
|
queryset = Secret.objects.select_related('device__primary_ip', 'role')\
|
|
.prefetch_related('role__users', 'role__groups')
|
|
serializer_class = SecretSerializer
|
|
filter_class = SecretFilter
|
|
renderer_classes = api_settings.DEFAULT_RENDERER_CLASSES + [FreeRADIUSClientsRenderer]
|
|
|
|
def get(self, request, private_key=None, *args, **kwargs):
|
|
queryset = self.filter_queryset(self.get_queryset())
|
|
|
|
# Attempt to decrypt each Secret if a private key was provided.
|
|
private_key = request.body or None
|
|
if private_key is not None:
|
|
try:
|
|
uk = UserKey.objects.get(user=request.user)
|
|
except UserKey.DoesNotExist:
|
|
return Response(
|
|
{'error': ERR_USERKEY_MISSING},
|
|
status=status.HTTP_400_BAD_REQUEST
|
|
)
|
|
if not uk.is_active():
|
|
return Response(
|
|
{'error': ERR_USERKEY_INACTIVE},
|
|
status=status.HTTP_400_BAD_REQUEST
|
|
)
|
|
master_key = uk.get_master_key(private_key)
|
|
if master_key is not None:
|
|
for s in queryset:
|
|
if s.decryptable_by(request.user):
|
|
s.decrypt(master_key)
|
|
else:
|
|
return Response(
|
|
{'error': ERR_PRIVKEY_INVALID},
|
|
status=status.HTTP_400_BAD_REQUEST
|
|
)
|
|
|
|
serializer = self.get_serializer(queryset, many=True)
|
|
return Response(serializer.data)
|
|
|
|
|
|
class SecretDetailView(generics.GenericAPIView):
|
|
"""
|
|
Retrieve a single Secret. If a private key is provided in the GET body, attempt to decrypt the Secret.
|
|
|
|
e.g. curl -X GET http://netbox/api/secrets/secrets/123/ --data-binary "@/path/to/private_key"
|
|
"""
|
|
queryset = Secret.objects.select_related('device__primary_ip', 'role')\
|
|
.prefetch_related('role__users', 'role__groups')
|
|
serializer_class = SecretSerializer
|
|
renderer_classes = api_settings.DEFAULT_RENDERER_CLASSES + [FreeRADIUSClientsRenderer]
|
|
|
|
def get(self, request, pk, *args, **kwargs):
|
|
secret = get_object_or_404(Secret, pk=pk)
|
|
|
|
# Attempt to decrypt the Secret if a private key was provided.
|
|
private_key = request.body or None
|
|
if private_key is not None:
|
|
try:
|
|
uk = UserKey.objects.get(user=request.user)
|
|
except UserKey.DoesNotExist:
|
|
return Response(
|
|
{'error': ERR_USERKEY_MISSING},
|
|
status=status.HTTP_400_BAD_REQUEST
|
|
)
|
|
if not uk.is_active():
|
|
return Response(
|
|
{'error': ERR_USERKEY_INACTIVE},
|
|
status=status.HTTP_400_BAD_REQUEST
|
|
)
|
|
if secret.decryptable_by(request.user):
|
|
master_key = uk.get_master_key(private_key)
|
|
if master_key is None:
|
|
return Response(
|
|
{'error': ERR_PRIVKEY_INVALID},
|
|
status=status.HTTP_400_BAD_REQUEST
|
|
)
|
|
secret.decrypt(master_key)
|
|
|
|
serializer = self.get_serializer(secret)
|
|
return Response(serializer.data)
|
|
|
|
|
|
class RSAKeyGeneratorView(APIView):
|
|
"""
|
|
Generate a new RSA key pair for a user. Authenticated because it's a ripe avenue for DoS.
|
|
"""
|
|
permission_classes = [IsAuthenticated]
|
|
|
|
def get(self, request):
|
|
|
|
# Determine what size key to generate
|
|
key_size = request.GET.get('key_size', 2048)
|
|
if key_size not in range(2048, 4097, 256):
|
|
key_size = 2048
|
|
|
|
# Export RSA private and public keys in PEM format
|
|
key = RSA.generate(key_size)
|
|
private_key = key.exportKey('PEM')
|
|
public_key = key.publickey().exportKey('PEM')
|
|
|
|
return Response({
|
|
'private_key': private_key,
|
|
'public_key': public_key,
|
|
})
|