mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-15 02:57:04 +02:00
* Adding explicit MPL license for sub-package. This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Adding explicit MPL license for sub-package. This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Updating the license from MPL to Business Source License. Going forward, this project will be licensed under the Business Source License v1.1. Please see our blog post for more details at https://hashi.co/bsl-blog, FAQ at www.hashicorp.com/licensing-faq, and details of the license at www.hashicorp.com/bsl. * add missing license headers * Update copyright file headers to BUS-1.1 * Fix test that expected exact offset on hcl file --------- Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com> Co-authored-by: Sarah Thompson <sthompson@hashicorp.com> Co-authored-by: Brian Kassouf <bkassouf@hashicorp.com>
178 lines
4.4 KiB
Go
178 lines
4.4 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package radius
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/hashicorp/vault/sdk/framework"
|
|
"github.com/hashicorp/vault/sdk/helper/policyutil"
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
)
|
|
|
|
func pathUsersList(b *backend) *framework.Path {
|
|
return &framework.Path{
|
|
Pattern: "users/?$",
|
|
|
|
DisplayAttrs: &framework.DisplayAttributes{
|
|
OperationPrefix: operationPrefixRadius,
|
|
OperationSuffix: "users",
|
|
Navigation: true,
|
|
ItemType: "User",
|
|
},
|
|
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
|
logical.ListOperation: b.pathUserList,
|
|
},
|
|
|
|
HelpSynopsis: pathUserHelpSyn,
|
|
HelpDescription: pathUserHelpDesc,
|
|
}
|
|
}
|
|
|
|
func pathUsers(b *backend) *framework.Path {
|
|
return &framework.Path{
|
|
Pattern: `users/(?P<name>.+)`,
|
|
|
|
DisplayAttrs: &framework.DisplayAttributes{
|
|
OperationPrefix: operationPrefixRadius,
|
|
OperationSuffix: "user",
|
|
Action: "Create",
|
|
ItemType: "User",
|
|
},
|
|
|
|
Fields: map[string]*framework.FieldSchema{
|
|
"name": {
|
|
Type: framework.TypeString,
|
|
Description: "Name of the RADIUS user.",
|
|
},
|
|
|
|
"policies": {
|
|
Type: framework.TypeCommaStringSlice,
|
|
Description: "Comma-separated list of policies associated to the user.",
|
|
DisplayAttrs: &framework.DisplayAttributes{
|
|
Description: "A list of policies associated to the user.",
|
|
},
|
|
},
|
|
},
|
|
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
|
logical.DeleteOperation: b.pathUserDelete,
|
|
logical.ReadOperation: b.pathUserRead,
|
|
logical.UpdateOperation: b.pathUserWrite,
|
|
logical.CreateOperation: b.pathUserWrite,
|
|
},
|
|
|
|
ExistenceCheck: b.userExistenceCheck,
|
|
|
|
HelpSynopsis: pathUserHelpSyn,
|
|
HelpDescription: pathUserHelpDesc,
|
|
}
|
|
}
|
|
|
|
func (b *backend) userExistenceCheck(ctx context.Context, req *logical.Request, data *framework.FieldData) (bool, error) {
|
|
userEntry, err := b.user(ctx, req.Storage, data.Get("name").(string))
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
return userEntry != nil, nil
|
|
}
|
|
|
|
func (b *backend) user(ctx context.Context, s logical.Storage, username string) (*UserEntry, error) {
|
|
if username == "" {
|
|
return nil, fmt.Errorf("missing username")
|
|
}
|
|
|
|
entry, err := s.Get(ctx, "user/"+strings.ToLower(username))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if entry == nil {
|
|
return nil, nil
|
|
}
|
|
|
|
var result UserEntry
|
|
if err := entry.DecodeJSON(&result); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &result, nil
|
|
}
|
|
|
|
func (b *backend) pathUserDelete(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
err := req.Storage.Delete(ctx, "user/"+d.Get("name").(string))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return nil, nil
|
|
}
|
|
|
|
func (b *backend) pathUserRead(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
user, err := b.user(ctx, req.Storage, d.Get("name").(string))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if user == nil {
|
|
return nil, nil
|
|
}
|
|
|
|
return &logical.Response{
|
|
Data: map[string]interface{}{
|
|
"policies": user.Policies,
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
func (b *backend) pathUserWrite(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
policies := policyutil.ParsePolicies(d.Get("policies"))
|
|
for _, policy := range policies {
|
|
if policy == "root" {
|
|
return logical.ErrorResponse("root policy cannot be granted by an auth method"), nil
|
|
}
|
|
}
|
|
|
|
// Store it
|
|
entry, err := logical.StorageEntryJSON("user/"+d.Get("name").(string), &UserEntry{
|
|
Policies: policies,
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err := req.Storage.Put(ctx, entry); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return nil, nil
|
|
}
|
|
|
|
func (b *backend) pathUserList(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
users, err := req.Storage.List(ctx, "user/")
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return logical.ListResponse(users), nil
|
|
}
|
|
|
|
type UserEntry struct {
|
|
Policies []string
|
|
}
|
|
|
|
const pathUserHelpSyn = `
|
|
Manage users allowed to authenticate.
|
|
`
|
|
|
|
const pathUserHelpDesc = `
|
|
This endpoint allows you to create, read, update, and delete configuration
|
|
for RADIUS users that are allowed to authenticate, and associate policies to
|
|
them.
|
|
|
|
Deleting a user will not revoke auth for prior authenticated users.
|
|
To do this, do a revoke token by path on "auth/radius/login/<username>"
|
|
for the usernames you want revoked.
|
|
`
|