get_credentials.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142
  1. // +build ee
  2. package credentials
  3. import (
  4. "fmt"
  5. "net/http"
  6. "strconv"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/ee/api/types"
  12. "github.com/porter-dev/porter/ee/integrations/vault"
  13. "github.com/porter-dev/porter/internal/models"
  14. "github.com/porter-dev/porter/internal/repository/credentials"
  15. "github.com/porter-dev/porter/internal/repository/gorm"
  16. "golang.org/x/crypto/bcrypt"
  17. )
  18. type CredentialsGetHandler struct {
  19. handlers.PorterHandlerReadWriter
  20. }
  21. func NewCredentialsGetHandler(
  22. config *config.Config,
  23. decoderValidator shared.RequestDecoderValidator,
  24. writer shared.ResultWriter,
  25. ) http.Handler {
  26. return &CredentialsGetHandler{
  27. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, nil, writer),
  28. }
  29. }
  30. func (c *CredentialsGetHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  31. // read the request to get the token id and hashed token
  32. req := &types.CredentialsExchangeRequest{}
  33. // populate the request from the headers
  34. req.CredExchangeToken = r.Header.Get("X-Porter-Token")
  35. tokID, err := strconv.ParseUint(r.Header.Get("X-Porter-Token-ID"), 10, 64)
  36. if err != nil {
  37. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  38. return
  39. }
  40. req.CredExchangeID = uint(tokID)
  41. req.VaultToken = r.Header.Get("X-Vault-Token")
  42. // read the access token in the header, check against DB
  43. ceToken, err := c.Repo().CredentialsExchangeToken().ReadCredentialsExchangeToken(req.CredExchangeID)
  44. if err != nil {
  45. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  46. return
  47. }
  48. // TODO: verify hashed token!!
  49. if valid, err := verifyToken(req.CredExchangeToken, ceToken); !valid {
  50. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  51. return
  52. }
  53. resp := &types.CredentialsExchangeResponse{}
  54. repo := c.Repo()
  55. // if the request contains a vault token, use that vault token to construct a new repository
  56. // that will query vault using the passed in token
  57. if req.VaultToken != "" {
  58. // read the vault token in the header, create new vault client with this token
  59. conf := c.Config().DBConf
  60. vaultClient := vault.NewClient(conf.VaultServerURL, req.VaultToken, conf.VaultPrefix)
  61. var key [32]byte
  62. for i, b := range []byte(conf.EncryptionKey) {
  63. key[i] = b
  64. }
  65. // use this vault client for the repo
  66. repo = gorm.NewRepository(c.Config().DB, &key, vaultClient)
  67. }
  68. if ceToken.DOCredentialID != 0 {
  69. doInt, err := repo.OAuthIntegration().ReadOAuthIntegration(ceToken.ProjectID, ceToken.DOCredentialID)
  70. if err != nil {
  71. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  72. return
  73. }
  74. resp.DO = &credentials.OAuthCredential{
  75. ClientID: doInt.ClientID,
  76. AccessToken: doInt.AccessToken,
  77. RefreshToken: doInt.RefreshToken,
  78. }
  79. } else if ceToken.GCPCredentialID != 0 {
  80. gcpInt, err := repo.GCPIntegration().ReadGCPIntegration(ceToken.ProjectID, ceToken.GCPCredentialID)
  81. if err != nil {
  82. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  83. return
  84. }
  85. resp.GCP = &credentials.GCPCredential{
  86. GCPKeyData: gcpInt.GCPKeyData,
  87. }
  88. } else if ceToken.AWSCredentialID != 0 {
  89. awsInt, err := repo.AWSIntegration().ReadAWSIntegration(ceToken.ProjectID, ceToken.AWSCredentialID)
  90. if err != nil {
  91. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  92. return
  93. }
  94. resp.AWS = &credentials.AWSCredential{
  95. AWSAccessKeyID: awsInt.AWSAccessKeyID,
  96. AWSClusterID: awsInt.AWSClusterID,
  97. AWSSecretAccessKey: awsInt.AWSSecretAccessKey,
  98. AWSSessionToken: awsInt.AWSSessionToken,
  99. }
  100. }
  101. // return the decrypted credentials
  102. c.WriteResult(w, r, resp)
  103. }
  104. func verifyToken(reqToken string, ceToken *models.CredentialsExchangeToken) (bool, error) {
  105. // make sure the token is still valid and has not expired
  106. if ceToken.IsExpired() {
  107. return false, fmt.Errorf("token is expired")
  108. }
  109. // make sure the token is correct
  110. if err := bcrypt.CompareHashAndPassword([]byte(ceToken.Token), []byte(reqToken)); err != nil {
  111. return false, fmt.Errorf("verify token failed: %s", err)
  112. }
  113. return true, nil
  114. }