2
0

get_credentials.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. //go:build ee
  2. // +build ee
  3. package credentials
  4. import (
  5. "fmt"
  6. "net/http"
  7. "strconv"
  8. "github.com/porter-dev/porter/api/server/handlers"
  9. "github.com/porter-dev/porter/api/server/shared"
  10. "github.com/porter-dev/porter/api/server/shared/apierrors"
  11. "github.com/porter-dev/porter/api/server/shared/config"
  12. "github.com/porter-dev/porter/ee/api/types"
  13. "github.com/porter-dev/porter/ee/integrations/vault"
  14. "github.com/porter-dev/porter/internal/models"
  15. "github.com/porter-dev/porter/internal/repository/credentials"
  16. "github.com/porter-dev/porter/internal/repository/gorm"
  17. "golang.org/x/crypto/bcrypt"
  18. )
  19. type CredentialsGetHandler struct {
  20. handlers.PorterHandlerReadWriter
  21. }
  22. func NewCredentialsGetHandler(
  23. config *config.Config,
  24. decoderValidator shared.RequestDecoderValidator,
  25. writer shared.ResultWriter,
  26. ) http.Handler {
  27. return &CredentialsGetHandler{
  28. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, nil, writer),
  29. }
  30. }
  31. func (c *CredentialsGetHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  32. // read the request to get the token id and hashed token
  33. req := &types.CredentialsExchangeRequest{}
  34. // populate the request from the headers
  35. req.CredExchangeToken = r.Header.Get("X-Porter-Token")
  36. tokID, err := strconv.ParseUint(r.Header.Get("X-Porter-Token-ID"), 10, 64)
  37. if err != nil {
  38. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  39. return
  40. }
  41. req.CredExchangeID = uint(tokID)
  42. req.VaultToken = r.Header.Get("X-Vault-Token")
  43. // read the access token in the header, check against DB
  44. ceToken, err := c.Repo().CredentialsExchangeToken().ReadCredentialsExchangeToken(req.CredExchangeID)
  45. if err != nil {
  46. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  47. return
  48. }
  49. // TODO: verify hashed token!!
  50. if valid, err := verifyToken(req.CredExchangeToken, ceToken); !valid {
  51. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  52. return
  53. }
  54. resp := &types.CredentialsExchangeResponse{}
  55. repo := c.Repo()
  56. // if the request contains a vault token, use that vault token to construct a new repository
  57. // that will query vault using the passed in token
  58. if req.VaultToken != "" {
  59. // read the vault token in the header, create new vault client with this token
  60. conf := c.Config().DBConf
  61. vaultClient := vault.NewClient(conf.VaultServerURL, req.VaultToken, conf.VaultPrefix)
  62. var key [32]byte
  63. for i, b := range []byte(conf.EncryptionKey) {
  64. key[i] = b
  65. }
  66. // use this vault client for the repo
  67. repo = gorm.NewRepository(c.Config().DB, &key, vaultClient)
  68. }
  69. if ceToken.DOCredentialID != 0 {
  70. doInt, err := repo.OAuthIntegration().ReadOAuthIntegration(ceToken.ProjectID, ceToken.DOCredentialID)
  71. if err != nil {
  72. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  73. return
  74. }
  75. resp.DO = &credentials.OAuthCredential{
  76. ClientID: doInt.ClientID,
  77. AccessToken: doInt.AccessToken,
  78. RefreshToken: doInt.RefreshToken,
  79. }
  80. } else if ceToken.GCPCredentialID != 0 {
  81. gcpInt, err := repo.GCPIntegration().ReadGCPIntegration(ceToken.ProjectID, ceToken.GCPCredentialID)
  82. if err != nil {
  83. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  84. return
  85. }
  86. resp.GCP = &credentials.GCPCredential{
  87. GCPKeyData: gcpInt.GCPKeyData,
  88. }
  89. } else if ceToken.AWSCredentialID != 0 {
  90. awsInt, err := repo.AWSIntegration().ReadAWSIntegration(ceToken.ProjectID, ceToken.AWSCredentialID)
  91. if err != nil {
  92. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  93. return
  94. }
  95. resp.AWS = &credentials.AWSCredential{
  96. AWSAccessKeyID: awsInt.AWSAccessKeyID,
  97. AWSClusterID: awsInt.AWSClusterID,
  98. AWSSecretAccessKey: awsInt.AWSSecretAccessKey,
  99. AWSSessionToken: awsInt.AWSSessionToken,
  100. AWSAssumeRoleArn: []byte(awsInt.AWSAssumeRoleArn),
  101. }
  102. }
  103. // return the decrypted credentials
  104. c.WriteResult(w, r, resp)
  105. }
  106. func verifyToken(reqToken string, ceToken *models.CredentialsExchangeToken) (bool, error) {
  107. // make sure the token is still valid and has not expired
  108. if ceToken.IsExpired() {
  109. return false, fmt.Errorf("token is expired")
  110. }
  111. // make sure the token is correct
  112. if err := bcrypt.CompareHashAndPassword([]byte(ceToken.Token), []byte(reqToken)); err != nil {
  113. return false, fmt.Errorf("verify token failed: %s", err)
  114. }
  115. return true, nil
  116. }