2019-03-05 20:42:49 +00:00
|
|
|
package provisioner
|
|
|
|
|
|
|
|
import (
|
2019-07-29 22:54:07 +00:00
|
|
|
"context"
|
2019-03-06 22:54:56 +00:00
|
|
|
"crypto/x509"
|
2019-03-05 20:42:49 +00:00
|
|
|
"encoding/json"
|
2019-06-04 00:19:44 +00:00
|
|
|
"net/url"
|
2019-07-29 22:54:07 +00:00
|
|
|
"regexp"
|
2019-03-05 20:42:49 +00:00
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
2019-10-28 18:50:43 +00:00
|
|
|
"github.com/smallstep/certificates/db"
|
2019-12-20 21:30:05 +00:00
|
|
|
"github.com/smallstep/certificates/errs"
|
2019-10-28 18:50:43 +00:00
|
|
|
"golang.org/x/crypto/ssh"
|
2019-03-05 20:42:49 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Interface is the interface that all provisioner types must implement.
|
|
|
|
type Interface interface {
|
2019-03-06 22:54:56 +00:00
|
|
|
GetID() string
|
2019-03-05 08:07:13 +00:00
|
|
|
GetTokenID(token string) (string, error)
|
2019-03-06 22:54:56 +00:00
|
|
|
GetName() string
|
|
|
|
GetType() Type
|
2019-03-05 22:52:26 +00:00
|
|
|
GetEncryptedKey() (kid string, key string, ok bool)
|
2019-03-07 02:32:56 +00:00
|
|
|
Init(config Config) error
|
2019-07-29 22:54:07 +00:00
|
|
|
AuthorizeSign(ctx context.Context, token string) ([]SignOption, error)
|
2019-10-28 18:50:43 +00:00
|
|
|
AuthorizeRevoke(ctx context.Context, token string) error
|
|
|
|
AuthorizeRenew(ctx context.Context, cert *x509.Certificate) error
|
|
|
|
AuthorizeSSHSign(ctx context.Context, token string) ([]SignOption, error)
|
|
|
|
AuthorizeSSHRevoke(ctx context.Context, token string) error
|
|
|
|
AuthorizeSSHRenew(ctx context.Context, token string) (*ssh.Certificate, error)
|
|
|
|
AuthorizeSSHRekey(ctx context.Context, token string) (*ssh.Certificate, []SignOption, error)
|
2019-03-05 20:42:49 +00:00
|
|
|
}
|
|
|
|
|
2019-03-05 08:07:13 +00:00
|
|
|
// Audiences stores all supported audiences by request type.
|
|
|
|
type Audiences struct {
|
2019-10-28 18:50:43 +00:00
|
|
|
Sign []string
|
|
|
|
Revoke []string
|
|
|
|
SSHSign []string
|
|
|
|
SSHRevoke []string
|
|
|
|
SSHRenew []string
|
|
|
|
SSHRekey []string
|
2019-03-05 08:07:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// All returns all supported audiences across all request types in one list.
|
2019-10-28 18:50:43 +00:00
|
|
|
func (a Audiences) All() (auds []string) {
|
|
|
|
auds = a.Sign
|
|
|
|
auds = append(auds, a.Revoke...)
|
|
|
|
auds = append(auds, a.SSHSign...)
|
|
|
|
auds = append(auds, a.SSHRevoke...)
|
|
|
|
auds = append(auds, a.SSHRenew...)
|
|
|
|
auds = append(auds, a.SSHRekey...)
|
|
|
|
return
|
2019-03-05 08:07:13 +00:00
|
|
|
}
|
|
|
|
|
2019-06-04 00:19:44 +00:00
|
|
|
// WithFragment returns a copy of audiences where the url audiences contains the
|
|
|
|
// given fragment.
|
|
|
|
func (a Audiences) WithFragment(fragment string) Audiences {
|
|
|
|
ret := Audiences{
|
2019-10-28 18:50:43 +00:00
|
|
|
Sign: make([]string, len(a.Sign)),
|
|
|
|
Revoke: make([]string, len(a.Revoke)),
|
|
|
|
SSHSign: make([]string, len(a.SSHSign)),
|
|
|
|
SSHRevoke: make([]string, len(a.SSHRevoke)),
|
|
|
|
SSHRenew: make([]string, len(a.SSHRenew)),
|
|
|
|
SSHRekey: make([]string, len(a.SSHRekey)),
|
2019-06-04 00:19:44 +00:00
|
|
|
}
|
|
|
|
for i, s := range a.Sign {
|
|
|
|
if u, err := url.Parse(s); err == nil {
|
|
|
|
ret.Sign[i] = u.ResolveReference(&url.URL{Fragment: fragment}).String()
|
|
|
|
} else {
|
|
|
|
ret.Sign[i] = s
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for i, s := range a.Revoke {
|
|
|
|
if u, err := url.Parse(s); err == nil {
|
|
|
|
ret.Revoke[i] = u.ResolveReference(&url.URL{Fragment: fragment}).String()
|
|
|
|
} else {
|
|
|
|
ret.Revoke[i] = s
|
|
|
|
}
|
|
|
|
}
|
2019-10-28 18:50:43 +00:00
|
|
|
for i, s := range a.SSHSign {
|
|
|
|
if u, err := url.Parse(s); err == nil {
|
|
|
|
ret.SSHSign[i] = u.ResolveReference(&url.URL{Fragment: fragment}).String()
|
|
|
|
} else {
|
|
|
|
ret.SSHSign[i] = s
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for i, s := range a.SSHRevoke {
|
|
|
|
if u, err := url.Parse(s); err == nil {
|
|
|
|
ret.SSHRevoke[i] = u.ResolveReference(&url.URL{Fragment: fragment}).String()
|
|
|
|
} else {
|
|
|
|
ret.SSHRevoke[i] = s
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for i, s := range a.SSHRenew {
|
|
|
|
if u, err := url.Parse(s); err == nil {
|
|
|
|
ret.SSHRenew[i] = u.ResolveReference(&url.URL{Fragment: fragment}).String()
|
|
|
|
} else {
|
|
|
|
ret.SSHRenew[i] = s
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for i, s := range a.SSHRekey {
|
|
|
|
if u, err := url.Parse(s); err == nil {
|
|
|
|
ret.SSHRekey[i] = u.ResolveReference(&url.URL{Fragment: fragment}).String()
|
|
|
|
} else {
|
|
|
|
ret.SSHRekey[i] = s
|
|
|
|
}
|
|
|
|
}
|
2019-06-04 00:19:44 +00:00
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
|
|
|
// generateSignAudience generates a sign audience with the format
|
2019-06-07 18:24:56 +00:00
|
|
|
// https://<host>/1.0/sign#provisionerID
|
2019-06-04 00:19:44 +00:00
|
|
|
func generateSignAudience(caURL string, provisionerID string) (string, error) {
|
|
|
|
u, err := url.Parse(caURL)
|
|
|
|
if err != nil {
|
|
|
|
return "", errors.Wrapf(err, "error parsing %s", caURL)
|
|
|
|
}
|
|
|
|
return u.ResolveReference(&url.URL{Path: "/1.0/sign", Fragment: provisionerID}).String(), nil
|
|
|
|
}
|
|
|
|
|
2019-03-05 20:42:49 +00:00
|
|
|
// Type indicates the provisioner Type.
|
|
|
|
type Type int
|
|
|
|
|
|
|
|
const (
|
2019-03-08 00:04:29 +00:00
|
|
|
noopType Type = 0
|
2019-03-05 20:42:49 +00:00
|
|
|
// TypeJWK is used to indicate the JWK provisioners.
|
|
|
|
TypeJWK Type = 1
|
|
|
|
// TypeOIDC is used to indicate the OIDC provisioners.
|
|
|
|
TypeOIDC Type = 2
|
2019-04-18 00:28:21 +00:00
|
|
|
// TypeGCP is used to indicate the GCP provisioners.
|
|
|
|
TypeGCP Type = 3
|
2019-04-24 19:12:36 +00:00
|
|
|
// TypeAWS is used to indicate the AWS provisioners.
|
|
|
|
TypeAWS Type = 4
|
2019-04-24 21:26:37 +00:00
|
|
|
// TypeAzure is used to indicate the Azure provisioners.
|
2019-05-04 00:30:54 +00:00
|
|
|
TypeAzure Type = 5
|
2019-05-27 00:41:10 +00:00
|
|
|
// TypeACME is used to indicate the ACME provisioners.
|
|
|
|
TypeACME Type = 6
|
2019-09-05 01:31:09 +00:00
|
|
|
// TypeX5C is used to indicate the X5C provisioners.
|
|
|
|
TypeX5C Type = 7
|
2019-10-18 20:52:28 +00:00
|
|
|
// TypeK8sSA is used to indicate the X5C provisioners.
|
|
|
|
TypeK8sSA Type = 8
|
2019-10-27 00:40:43 +00:00
|
|
|
// TypeSSHPOP is used to indicate the SSHPOP provisioners.
|
|
|
|
TypeSSHPOP Type = 9
|
2019-03-05 20:42:49 +00:00
|
|
|
)
|
|
|
|
|
2019-06-06 00:52:29 +00:00
|
|
|
// String returns the string representation of the type.
|
|
|
|
func (t Type) String() string {
|
|
|
|
switch t {
|
|
|
|
case TypeJWK:
|
|
|
|
return "JWK"
|
|
|
|
case TypeOIDC:
|
|
|
|
return "OIDC"
|
|
|
|
case TypeGCP:
|
|
|
|
return "GCP"
|
|
|
|
case TypeAWS:
|
|
|
|
return "AWS"
|
|
|
|
case TypeAzure:
|
|
|
|
return "Azure"
|
2019-05-27 00:41:10 +00:00
|
|
|
case TypeACME:
|
|
|
|
return "ACME"
|
2019-09-05 01:31:09 +00:00
|
|
|
case TypeX5C:
|
|
|
|
return "X5C"
|
2019-10-18 20:52:28 +00:00
|
|
|
case TypeK8sSA:
|
|
|
|
return "K8sSA"
|
2019-10-27 00:40:43 +00:00
|
|
|
case TypeSSHPOP:
|
|
|
|
return "SSHPOP"
|
2019-06-06 00:52:29 +00:00
|
|
|
default:
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-28 18:50:43 +00:00
|
|
|
// SSHKeys represents the SSH User and Host public keys.
|
|
|
|
type SSHKeys struct {
|
|
|
|
UserKeys []ssh.PublicKey
|
|
|
|
HostKeys []ssh.PublicKey
|
|
|
|
}
|
|
|
|
|
2019-03-07 02:32:56 +00:00
|
|
|
// Config defines the default parameters used in the initialization of
|
|
|
|
// provisioners.
|
|
|
|
type Config struct {
|
|
|
|
// Claims are the default claims.
|
|
|
|
Claims Claims
|
|
|
|
// Audiences are the audiences used in the default provisioner, (JWK).
|
2019-03-05 08:07:13 +00:00
|
|
|
Audiences Audiences
|
2019-10-28 18:50:43 +00:00
|
|
|
// DB is the interface to the authority DB client.
|
|
|
|
DB db.AuthDB
|
|
|
|
// SSHKeys are the root SSH public keys
|
|
|
|
SSHKeys *SSHKeys
|
2019-11-16 00:57:51 +00:00
|
|
|
// GetIdentityFunc is a function that returns an identity that will be
|
|
|
|
// used by the provisioner to populate certificate attributes.
|
|
|
|
GetIdentityFunc GetIdentityFunc
|
2019-03-07 02:32:56 +00:00
|
|
|
}
|
|
|
|
|
2019-03-05 20:42:49 +00:00
|
|
|
type provisioner struct {
|
|
|
|
Type string `json:"type"`
|
|
|
|
}
|
|
|
|
|
2019-03-07 21:07:39 +00:00
|
|
|
// List represents a list of provisioners.
|
|
|
|
type List []Interface
|
|
|
|
|
|
|
|
// UnmarshalJSON implements json.Unmarshaler and allows to unmarshal a list of a
|
|
|
|
// interfaces into the right type.
|
|
|
|
func (l *List) UnmarshalJSON(data []byte) error {
|
|
|
|
ps := []json.RawMessage{}
|
|
|
|
if err := json.Unmarshal(data, &ps); err != nil {
|
|
|
|
return errors.Wrap(err, "error unmarshaling provisioner list")
|
2019-03-06 22:54:56 +00:00
|
|
|
}
|
2019-03-05 22:28:32 +00:00
|
|
|
|
2019-03-08 00:04:29 +00:00
|
|
|
*l = List{}
|
2019-03-07 21:07:39 +00:00
|
|
|
for _, data := range ps {
|
|
|
|
var typ provisioner
|
|
|
|
if err := json.Unmarshal(data, &typ); err != nil {
|
|
|
|
return errors.Errorf("error unmarshaling provisioner")
|
|
|
|
}
|
|
|
|
var p Interface
|
|
|
|
switch strings.ToLower(typ.Type) {
|
|
|
|
case "jwk":
|
|
|
|
p = &JWK{}
|
|
|
|
case "oidc":
|
|
|
|
p = &OIDC{}
|
2019-04-18 00:28:21 +00:00
|
|
|
case "gcp":
|
|
|
|
p = &GCP{}
|
2019-04-24 19:12:36 +00:00
|
|
|
case "aws":
|
|
|
|
p = &AWS{}
|
2019-05-04 00:30:54 +00:00
|
|
|
case "azure":
|
|
|
|
p = &Azure{}
|
2019-05-27 00:41:10 +00:00
|
|
|
case "acme":
|
|
|
|
p = &ACME{}
|
2019-09-05 01:31:09 +00:00
|
|
|
case "x5c":
|
|
|
|
p = &X5C{}
|
2019-10-18 20:52:28 +00:00
|
|
|
case "k8ssa":
|
|
|
|
p = &K8sSA{}
|
2019-10-27 00:40:43 +00:00
|
|
|
case "sshpop":
|
|
|
|
p = &SSHPOP{}
|
2019-03-07 21:07:39 +00:00
|
|
|
default:
|
2019-08-29 00:28:03 +00:00
|
|
|
// Skip unsupported provisioners. A client using this method may be
|
|
|
|
// compiled with a version of smallstep/certificates that does not
|
|
|
|
// support a specific provisioner type. If we don't skip unknown
|
|
|
|
// provisioners, a client encountering an unknown provisioner will
|
2019-08-29 17:49:52 +00:00
|
|
|
// break. Rather than break the client, we skip the provisioner.
|
|
|
|
// TODO: accept a pluggable logger (depending on client) that can
|
2019-08-29 00:28:03 +00:00
|
|
|
// warn the user that an unknown provisioner was found and suggest
|
|
|
|
// that the user update their client's dependency on
|
|
|
|
// step/certificates and recompile.
|
2019-08-28 11:15:38 +00:00
|
|
|
continue
|
2019-03-07 21:07:39 +00:00
|
|
|
}
|
|
|
|
if err := json.Unmarshal(data, p); err != nil {
|
|
|
|
return errors.Errorf("error unmarshaling provisioner")
|
|
|
|
}
|
|
|
|
*l = append(*l, p)
|
2019-03-05 20:42:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2019-07-29 23:21:22 +00:00
|
|
|
|
|
|
|
var sshUserRegex = regexp.MustCompile("^[a-z][-a-z0-9_]*$")
|
|
|
|
|
2019-07-29 23:38:57 +00:00
|
|
|
// SanitizeSSHUserPrincipal grabs an email or a string with the format
|
|
|
|
// local@domain and returns a sanitized version of the local, valid to be used
|
|
|
|
// as a user name. If the email starts with a letter between a and z, the
|
|
|
|
// resulting string will match the regular expression `^[a-z][-a-z0-9_]*$`.
|
|
|
|
func SanitizeSSHUserPrincipal(email string) string {
|
2019-07-29 23:21:22 +00:00
|
|
|
if i := strings.LastIndex(email, "@"); i >= 0 {
|
|
|
|
email = email[:i]
|
|
|
|
}
|
|
|
|
return strings.Map(func(r rune) rune {
|
|
|
|
switch {
|
|
|
|
case r >= 'a' && r <= 'z':
|
|
|
|
return r
|
|
|
|
case r >= '0' && r <= '9':
|
|
|
|
return r
|
|
|
|
case r == '-':
|
|
|
|
return '-'
|
|
|
|
case r == '.': // drop dots
|
|
|
|
return -1
|
|
|
|
default:
|
|
|
|
return '_'
|
|
|
|
}
|
|
|
|
}, strings.ToLower(email))
|
|
|
|
}
|
2019-05-27 00:41:10 +00:00
|
|
|
|
2019-10-28 18:50:43 +00:00
|
|
|
type base struct{}
|
|
|
|
|
2020-02-27 18:48:16 +00:00
|
|
|
// AuthorizeSign returns an unimplemented error. Provisioners should overwrite
|
2019-10-28 18:50:43 +00:00
|
|
|
// this method if they will support authorizing tokens for signing x509 Certificates.
|
|
|
|
func (b *base) AuthorizeSign(ctx context.Context, token string) ([]SignOption, error) {
|
2020-01-24 06:04:34 +00:00
|
|
|
return nil, errs.Unauthorized("provisioner.AuthorizeSign not implemented")
|
2019-10-28 18:50:43 +00:00
|
|
|
}
|
|
|
|
|
2020-02-27 18:48:16 +00:00
|
|
|
// AuthorizeRevoke returns an unimplemented error. Provisioners should overwrite
|
2019-10-28 18:50:43 +00:00
|
|
|
// this method if they will support authorizing tokens for revoking x509 Certificates.
|
|
|
|
func (b *base) AuthorizeRevoke(ctx context.Context, token string) error {
|
2020-01-24 06:04:34 +00:00
|
|
|
return errs.Unauthorized("provisioner.AuthorizeRevoke not implemented")
|
2019-10-28 18:50:43 +00:00
|
|
|
}
|
|
|
|
|
2020-02-27 18:48:16 +00:00
|
|
|
// AuthorizeRenew returns an unimplemented error. Provisioners should overwrite
|
2019-10-28 18:50:43 +00:00
|
|
|
// this method if they will support authorizing tokens for renewing x509 Certificates.
|
|
|
|
func (b *base) AuthorizeRenew(ctx context.Context, cert *x509.Certificate) error {
|
2020-01-24 06:04:34 +00:00
|
|
|
return errs.Unauthorized("provisioner.AuthorizeRenew not implemented")
|
2019-10-28 18:50:43 +00:00
|
|
|
}
|
|
|
|
|
2020-02-27 18:48:16 +00:00
|
|
|
// AuthorizeSSHSign returns an unimplemented error. Provisioners should overwrite
|
2019-10-28 18:50:43 +00:00
|
|
|
// this method if they will support authorizing tokens for signing SSH Certificates.
|
|
|
|
func (b *base) AuthorizeSSHSign(ctx context.Context, token string) ([]SignOption, error) {
|
2020-01-24 06:04:34 +00:00
|
|
|
return nil, errs.Unauthorized("provisioner.AuthorizeSSHSign not implemented")
|
2019-10-28 18:50:43 +00:00
|
|
|
}
|
|
|
|
|
2020-02-27 18:48:16 +00:00
|
|
|
// AuthorizeRevoke returns an unimplemented error. Provisioners should overwrite
|
2019-10-28 18:50:43 +00:00
|
|
|
// this method if they will support authorizing tokens for revoking SSH Certificates.
|
|
|
|
func (b *base) AuthorizeSSHRevoke(ctx context.Context, token string) error {
|
2020-01-24 06:04:34 +00:00
|
|
|
return errs.Unauthorized("provisioner.AuthorizeSSHRevoke not implemented")
|
2019-10-28 18:50:43 +00:00
|
|
|
}
|
|
|
|
|
2020-02-27 18:48:16 +00:00
|
|
|
// AuthorizeSSHRenew returns an unimplemented error. Provisioners should overwrite
|
2019-10-28 18:50:43 +00:00
|
|
|
// this method if they will support authorizing tokens for renewing SSH Certificates.
|
|
|
|
func (b *base) AuthorizeSSHRenew(ctx context.Context, token string) (*ssh.Certificate, error) {
|
2020-01-24 06:04:34 +00:00
|
|
|
return nil, errs.Unauthorized("provisioner.AuthorizeSSHRenew not implemented")
|
2019-10-28 18:50:43 +00:00
|
|
|
}
|
|
|
|
|
2020-02-27 18:48:16 +00:00
|
|
|
// AuthorizeSSHRekey returns an unimplemented error. Provisioners should overwrite
|
2019-11-16 00:57:51 +00:00
|
|
|
// this method if they will support authorizing tokens for rekeying SSH Certificates.
|
2019-10-28 18:50:43 +00:00
|
|
|
func (b *base) AuthorizeSSHRekey(ctx context.Context, token string) (*ssh.Certificate, []SignOption, error) {
|
2020-01-24 06:04:34 +00:00
|
|
|
return nil, nil, errs.Unauthorized("provisioner.AuthorizeSSHRekey not implemented")
|
2019-10-28 18:50:43 +00:00
|
|
|
}
|
|
|
|
|
2019-11-15 04:38:07 +00:00
|
|
|
// Identity is the type representing an externally supplied identity that is used
|
|
|
|
// by provisioners to populate certificate fields.
|
|
|
|
type Identity struct {
|
|
|
|
Usernames []string `json:"usernames"`
|
|
|
|
}
|
|
|
|
|
2019-11-16 00:57:51 +00:00
|
|
|
// GetIdentityFunc is a function that returns an identity.
|
2020-03-11 02:01:45 +00:00
|
|
|
type GetIdentityFunc func(ctx context.Context, p Interface, email string) (*Identity, error)
|
2019-11-16 00:57:51 +00:00
|
|
|
|
|
|
|
// DefaultIdentityFunc return a default identity depending on the provisioner type.
|
2020-03-11 02:01:45 +00:00
|
|
|
func DefaultIdentityFunc(ctx context.Context, p Interface, email string) (*Identity, error) {
|
2019-11-16 00:57:51 +00:00
|
|
|
switch k := p.(type) {
|
|
|
|
case *OIDC:
|
2020-05-21 19:09:11 +00:00
|
|
|
// OIDC principals would be:
|
|
|
|
// 1. Sanitized local.
|
|
|
|
// 2. Raw local (if different).
|
|
|
|
// 3. Email address.
|
2019-11-16 00:57:51 +00:00
|
|
|
name := SanitizeSSHUserPrincipal(email)
|
|
|
|
if !sshUserRegex.MatchString(name) {
|
|
|
|
return nil, errors.Errorf("invalid principal '%s' from email '%s'", name, email)
|
|
|
|
}
|
2020-05-21 19:09:11 +00:00
|
|
|
usernames := []string{name}
|
|
|
|
if i := strings.LastIndex(email, "@"); i >= 0 {
|
|
|
|
if local := email[:i]; !strings.EqualFold(local, name) {
|
|
|
|
usernames = append(usernames, local)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
usernames = append(usernames, email)
|
|
|
|
return &Identity{
|
|
|
|
Usernames: usernames,
|
|
|
|
}, nil
|
2019-11-16 00:57:51 +00:00
|
|
|
default:
|
|
|
|
return nil, errors.Errorf("provisioner type '%T' not supported by identity function", k)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-27 00:41:10 +00:00
|
|
|
// MockProvisioner for testing
|
|
|
|
type MockProvisioner struct {
|
|
|
|
Mret1, Mret2, Mret3 interface{}
|
|
|
|
Merr error
|
|
|
|
MgetID func() string
|
|
|
|
MgetTokenID func(string) (string, error)
|
|
|
|
MgetName func() string
|
|
|
|
MgetType func() Type
|
|
|
|
MgetEncryptedKey func() (string, string, bool)
|
|
|
|
Minit func(Config) error
|
|
|
|
MauthorizeSign func(ctx context.Context, ott string) ([]SignOption, error)
|
2019-11-16 00:57:51 +00:00
|
|
|
MauthorizeRenew func(ctx context.Context, cert *x509.Certificate) error
|
|
|
|
MauthorizeRevoke func(ctx context.Context, ott string) error
|
|
|
|
MauthorizeSSHSign func(ctx context.Context, ott string) ([]SignOption, error)
|
|
|
|
MauthorizeSSHRenew func(ctx context.Context, ott string) (*ssh.Certificate, error)
|
|
|
|
MauthorizeSSHRekey func(ctx context.Context, ott string) (*ssh.Certificate, []SignOption, error)
|
|
|
|
MauthorizeSSHRevoke func(ctx context.Context, ott string) error
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// GetID mock
|
|
|
|
func (m *MockProvisioner) GetID() string {
|
|
|
|
if m.MgetID != nil {
|
|
|
|
return m.MgetID()
|
|
|
|
}
|
|
|
|
return m.Mret1.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetTokenID mock
|
|
|
|
func (m *MockProvisioner) GetTokenID(token string) (string, error) {
|
|
|
|
if m.MgetTokenID != nil {
|
|
|
|
return m.MgetTokenID(token)
|
|
|
|
}
|
|
|
|
if m.Mret1 == nil {
|
|
|
|
return "", m.Merr
|
|
|
|
}
|
|
|
|
return m.Mret1.(string), m.Merr
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetName mock
|
|
|
|
func (m *MockProvisioner) GetName() string {
|
|
|
|
if m.MgetName != nil {
|
|
|
|
return m.MgetName()
|
|
|
|
}
|
|
|
|
return m.Mret1.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetType mock
|
|
|
|
func (m *MockProvisioner) GetType() Type {
|
|
|
|
if m.MgetType != nil {
|
|
|
|
return m.MgetType()
|
|
|
|
}
|
|
|
|
return m.Mret1.(Type)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetEncryptedKey mock
|
|
|
|
func (m *MockProvisioner) GetEncryptedKey() (string, string, bool) {
|
|
|
|
if m.MgetEncryptedKey != nil {
|
|
|
|
return m.MgetEncryptedKey()
|
|
|
|
}
|
|
|
|
return m.Mret1.(string), m.Mret2.(string), m.Mret3.(bool)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Init mock
|
|
|
|
func (m *MockProvisioner) Init(c Config) error {
|
|
|
|
if m.Minit != nil {
|
|
|
|
return m.Minit(c)
|
|
|
|
}
|
|
|
|
return m.Merr
|
|
|
|
}
|
|
|
|
|
2019-11-16 00:57:51 +00:00
|
|
|
// AuthorizeSign mock
|
|
|
|
func (m *MockProvisioner) AuthorizeSign(ctx context.Context, ott string) ([]SignOption, error) {
|
|
|
|
if m.MauthorizeSign != nil {
|
|
|
|
return m.MauthorizeSign(ctx, ott)
|
|
|
|
}
|
|
|
|
return m.Mret1.([]SignOption), m.Merr
|
|
|
|
}
|
|
|
|
|
2019-05-27 00:41:10 +00:00
|
|
|
// AuthorizeRevoke mock
|
2019-11-16 00:57:51 +00:00
|
|
|
func (m *MockProvisioner) AuthorizeRevoke(ctx context.Context, ott string) error {
|
2019-05-27 00:41:10 +00:00
|
|
|
if m.MauthorizeRevoke != nil {
|
2019-11-16 00:57:51 +00:00
|
|
|
return m.MauthorizeRevoke(ctx, ott)
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
return m.Merr
|
|
|
|
}
|
|
|
|
|
2019-11-16 00:57:51 +00:00
|
|
|
// AuthorizeRenew mock
|
|
|
|
func (m *MockProvisioner) AuthorizeRenew(ctx context.Context, c *x509.Certificate) error {
|
|
|
|
if m.MauthorizeRenew != nil {
|
|
|
|
return m.MauthorizeRenew(ctx, c)
|
|
|
|
}
|
|
|
|
return m.Merr
|
|
|
|
}
|
|
|
|
|
|
|
|
// AuthorizeSSHSign mock
|
|
|
|
func (m *MockProvisioner) AuthorizeSSHSign(ctx context.Context, ott string) ([]SignOption, error) {
|
2019-05-27 00:41:10 +00:00
|
|
|
if m.MauthorizeSign != nil {
|
|
|
|
return m.MauthorizeSign(ctx, ott)
|
|
|
|
}
|
|
|
|
return m.Mret1.([]SignOption), m.Merr
|
|
|
|
}
|
|
|
|
|
2019-11-16 00:57:51 +00:00
|
|
|
// AuthorizeSSHRenew mock
|
|
|
|
func (m *MockProvisioner) AuthorizeSSHRenew(ctx context.Context, ott string) (*ssh.Certificate, error) {
|
|
|
|
if m.MauthorizeRenew != nil {
|
|
|
|
return m.MauthorizeSSHRenew(ctx, ott)
|
|
|
|
}
|
|
|
|
return m.Mret1.(*ssh.Certificate), m.Merr
|
|
|
|
}
|
|
|
|
|
|
|
|
// AuthorizeSSHRekey mock
|
|
|
|
func (m *MockProvisioner) AuthorizeSSHRekey(ctx context.Context, ott string) (*ssh.Certificate, []SignOption, error) {
|
|
|
|
if m.MauthorizeSSHRekey != nil {
|
|
|
|
return m.MauthorizeSSHRekey(ctx, ott)
|
|
|
|
}
|
|
|
|
return m.Mret1.(*ssh.Certificate), m.Mret2.([]SignOption), m.Merr
|
|
|
|
}
|
|
|
|
|
|
|
|
// AuthorizeSSHRevoke mock
|
|
|
|
func (m *MockProvisioner) AuthorizeSSHRevoke(ctx context.Context, ott string) error {
|
|
|
|
if m.MauthorizeSSHRevoke != nil {
|
|
|
|
return m.MauthorizeSSHRevoke(ctx, ott)
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
return m.Merr
|
|
|
|
}
|