views.py 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147
  1. from Crypto.PublicKey import RSA
  2. from django.shortcuts import get_object_or_404
  3. from rest_framework import generics
  4. from rest_framework import status
  5. from rest_framework.permissions import IsAuthenticated
  6. from rest_framework.response import Response
  7. from rest_framework.settings import api_settings
  8. from rest_framework.views import APIView
  9. from extras.api.renderers import FreeRADIUSClientsRenderer
  10. from secrets.filters import SecretFilter
  11. from secrets.models import Secret, SecretRole, UserKey
  12. from .serializers import SecretRoleSerializer, SecretSerializer
  13. ERR_USERKEY_MISSING = "No UserKey found for the current user."
  14. ERR_USERKEY_INACTIVE = "UserKey has not been activated for decryption."
  15. ERR_PRIVKEY_INVALID = "Invalid private key."
  16. class SecretRoleListView(generics.ListAPIView):
  17. """
  18. List all secret roles
  19. """
  20. queryset = SecretRole.objects.all()
  21. serializer_class = SecretRoleSerializer
  22. class SecretRoleDetailView(generics.RetrieveAPIView):
  23. """
  24. Retrieve a single secret role
  25. """
  26. queryset = SecretRole.objects.all()
  27. serializer_class = SecretRoleSerializer
  28. class SecretListView(generics.GenericAPIView):
  29. """
  30. List secrets (filterable). If a private key is provided in the GET body, attempt to decrypt each Secret.
  31. e.g. curl -X GET http://netbox/api/secrets/secrets/ --data-binary "@/path/to/private_key"
  32. """
  33. queryset = Secret.objects.select_related('device__primary_ip', 'role')\
  34. .prefetch_related('role__users', 'role__groups')
  35. serializer_class = SecretSerializer
  36. filter_class = SecretFilter
  37. renderer_classes = api_settings.DEFAULT_RENDERER_CLASSES + [FreeRADIUSClientsRenderer]
  38. def get(self, request, private_key=None, *args, **kwargs):
  39. queryset = self.filter_queryset(self.get_queryset())
  40. # Attempt to decrypt each Secret if a private key was provided.
  41. private_key = request.body or None
  42. if private_key is not None:
  43. try:
  44. uk = UserKey.objects.get(user=request.user)
  45. except UserKey.DoesNotExist:
  46. return Response(
  47. {'error': ERR_USERKEY_MISSING},
  48. status=status.HTTP_400_BAD_REQUEST
  49. )
  50. if not uk.is_active():
  51. return Response(
  52. {'error': ERR_USERKEY_INACTIVE},
  53. status=status.HTTP_400_BAD_REQUEST
  54. )
  55. master_key = uk.get_master_key(private_key)
  56. if master_key is not None:
  57. for s in queryset:
  58. if s.decryptable_by(request.user):
  59. s.decrypt(master_key)
  60. else:
  61. return Response(
  62. {'error': ERR_PRIVKEY_INVALID},
  63. status=status.HTTP_400_BAD_REQUEST
  64. )
  65. serializer = self.get_serializer(queryset, many=True)
  66. return Response(serializer.data)
  67. class SecretDetailView(generics.GenericAPIView):
  68. """
  69. Retrieve a single Secret. If a private key is provided in the GET body, attempt to decrypt the Secret.
  70. e.g. curl -X GET http://netbox/api/secrets/secrets/123/ --data-binary "@/path/to/private_key"
  71. """
  72. queryset = Secret.objects.select_related('device__primary_ip', 'role')\
  73. .prefetch_related('role__users', 'role__groups')
  74. serializer_class = SecretSerializer
  75. renderer_classes = api_settings.DEFAULT_RENDERER_CLASSES + [FreeRADIUSClientsRenderer]
  76. def get(self, request, pk, *args, **kwargs):
  77. secret = get_object_or_404(Secret, pk=pk)
  78. # Attempt to decrypt the Secret if a private key was provided.
  79. private_key = request.body or None
  80. if private_key is not None:
  81. try:
  82. uk = UserKey.objects.get(user=request.user)
  83. except UserKey.DoesNotExist:
  84. return Response(
  85. {'error': ERR_USERKEY_MISSING},
  86. status=status.HTTP_400_BAD_REQUEST
  87. )
  88. if not uk.is_active():
  89. return Response(
  90. {'error': ERR_USERKEY_INACTIVE},
  91. status=status.HTTP_400_BAD_REQUEST
  92. )
  93. if secret.decryptable_by(request.user):
  94. master_key = uk.get_master_key(private_key)
  95. if master_key is None:
  96. return Response(
  97. {'error': ERR_PRIVKEY_INVALID},
  98. status=status.HTTP_400_BAD_REQUEST
  99. )
  100. secret.decrypt(master_key)
  101. serializer = self.get_serializer(secret)
  102. return Response(serializer.data)
  103. class RSAKeyGeneratorView(APIView):
  104. """
  105. Generate a new RSA key pair for a user. Authenticated because it's a ripe avenue for DoS.
  106. """
  107. permission_classes = [IsAuthenticated]
  108. def get(self, request):
  109. # Determine what size key to generate
  110. key_size = request.GET.get('key_size', 2048)
  111. if key_size not in range(2048, 4097, 256):
  112. key_size = 2048
  113. # Export RSA private and public keys in PEM format
  114. key = RSA.generate(key_size)
  115. private_key = key.exportKey('PEM')
  116. public_key = key.publickey().exportKey('PEM')
  117. return Response({
  118. 'private_key': private_key,
  119. 'public_key': public_key,
  120. })