| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147 |
- from Crypto.PublicKey import RSA
- from django.shortcuts import get_object_or_404
- from rest_framework import generics
- from rest_framework import status
- from rest_framework.permissions import IsAuthenticated
- from rest_framework.response import Response
- from rest_framework.settings import api_settings
- from rest_framework.views import APIView
- from extras.api.renderers import FreeRADIUSClientsRenderer
- from secrets.filters import SecretFilter
- from secrets.models import Secret, SecretRole, UserKey
- from .serializers import SecretRoleSerializer, SecretSerializer
- ERR_USERKEY_MISSING = "No UserKey found for the current user."
- ERR_USERKEY_INACTIVE = "UserKey has not been activated for decryption."
- ERR_PRIVKEY_INVALID = "Invalid private key."
- class SecretRoleListView(generics.ListAPIView):
- """
- List all secret roles
- """
- queryset = SecretRole.objects.all()
- serializer_class = SecretRoleSerializer
- class SecretRoleDetailView(generics.RetrieveAPIView):
- """
- Retrieve a single secret role
- """
- queryset = SecretRole.objects.all()
- serializer_class = SecretRoleSerializer
- class SecretListView(generics.GenericAPIView):
- """
- List secrets (filterable). If a private key is provided in the GET body, attempt to decrypt each Secret.
- e.g. curl -X GET http://netbox/api/secrets/secrets/ --data-binary "@/path/to/private_key"
- """
- queryset = Secret.objects.select_related('device__primary_ip', 'role')\
- .prefetch_related('role__users', 'role__groups')
- serializer_class = SecretSerializer
- filter_class = SecretFilter
- renderer_classes = api_settings.DEFAULT_RENDERER_CLASSES + [FreeRADIUSClientsRenderer]
- def get(self, request, private_key=None, *args, **kwargs):
- queryset = self.filter_queryset(self.get_queryset())
- # Attempt to decrypt each Secret if a private key was provided.
- private_key = request.body or None
- if private_key is not None:
- try:
- uk = UserKey.objects.get(user=request.user)
- except UserKey.DoesNotExist:
- return Response(
- {'error': ERR_USERKEY_MISSING},
- status=status.HTTP_400_BAD_REQUEST
- )
- if not uk.is_active():
- return Response(
- {'error': ERR_USERKEY_INACTIVE},
- status=status.HTTP_400_BAD_REQUEST
- )
- master_key = uk.get_master_key(private_key)
- if master_key is not None:
- for s in queryset:
- if s.decryptable_by(request.user):
- s.decrypt(master_key)
- else:
- return Response(
- {'error': ERR_PRIVKEY_INVALID},
- status=status.HTTP_400_BAD_REQUEST
- )
- serializer = self.get_serializer(queryset, many=True)
- return Response(serializer.data)
- class SecretDetailView(generics.GenericAPIView):
- """
- Retrieve a single Secret. If a private key is provided in the GET body, attempt to decrypt the Secret.
- e.g. curl -X GET http://netbox/api/secrets/secrets/123/ --data-binary "@/path/to/private_key"
- """
- queryset = Secret.objects.select_related('device__primary_ip', 'role')\
- .prefetch_related('role__users', 'role__groups')
- serializer_class = SecretSerializer
- renderer_classes = api_settings.DEFAULT_RENDERER_CLASSES + [FreeRADIUSClientsRenderer]
- def get(self, request, pk, *args, **kwargs):
- secret = get_object_or_404(Secret, pk=pk)
- # Attempt to decrypt the Secret if a private key was provided.
- private_key = request.body or None
- if private_key is not None:
- try:
- uk = UserKey.objects.get(user=request.user)
- except UserKey.DoesNotExist:
- return Response(
- {'error': ERR_USERKEY_MISSING},
- status=status.HTTP_400_BAD_REQUEST
- )
- if not uk.is_active():
- return Response(
- {'error': ERR_USERKEY_INACTIVE},
- status=status.HTTP_400_BAD_REQUEST
- )
- if secret.decryptable_by(request.user):
- master_key = uk.get_master_key(private_key)
- if master_key is None:
- return Response(
- {'error': ERR_PRIVKEY_INVALID},
- status=status.HTTP_400_BAD_REQUEST
- )
- secret.decrypt(master_key)
- serializer = self.get_serializer(secret)
- return Response(serializer.data)
- class RSAKeyGeneratorView(APIView):
- """
- Generate a new RSA key pair for a user. Authenticated because it's a ripe avenue for DoS.
- """
- permission_classes = [IsAuthenticated]
- def get(self, request):
- # Determine what size key to generate
- key_size = request.GET.get('key_size', 2048)
- if key_size not in range(2048, 4097, 256):
- key_size = 2048
- # Export RSA private and public keys in PEM format
- key = RSA.generate(key_size)
- private_key = key.exportKey('PEM')
- public_key = key.publickey().exportKey('PEM')
- return Response({
- 'private_key': private_key,
- 'public_key': public_key,
- })
|