2019-03-05 01:58:20 +00:00
|
|
|
package provisioner
|
|
|
|
|
2019-03-06 22:51:12 +00:00
|
|
|
import (
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
2020-01-04 02:22:02 +00:00
|
|
|
"golang.org/x/crypto/ssh"
|
2019-03-06 22:51:12 +00:00
|
|
|
)
|
2019-03-05 01:58:20 +00:00
|
|
|
|
|
|
|
// Claims so that individual provisioners can override global claims.
|
|
|
|
type Claims struct {
|
2019-07-24 01:46:43 +00:00
|
|
|
// TLS CA properties
|
2022-03-10 02:39:09 +00:00
|
|
|
MinTLSDur *Duration `json:"minTLSCertDuration,omitempty"`
|
|
|
|
MaxTLSDur *Duration `json:"maxTLSCertDuration,omitempty"`
|
|
|
|
DefaultTLSDur *Duration `json:"defaultTLSCertDuration,omitempty"`
|
|
|
|
|
2019-07-24 01:46:43 +00:00
|
|
|
// SSH CA properties
|
|
|
|
MinUserSSHDur *Duration `json:"minUserSSHCertDuration,omitempty"`
|
|
|
|
MaxUserSSHDur *Duration `json:"maxUserSSHCertDuration,omitempty"`
|
|
|
|
DefaultUserSSHDur *Duration `json:"defaultUserSSHCertDuration,omitempty"`
|
|
|
|
MinHostSSHDur *Duration `json:"minHostSSHCertDuration,omitempty"`
|
|
|
|
MaxHostSSHDur *Duration `json:"maxHostSSHCertDuration,omitempty"`
|
|
|
|
DefaultHostSSHDur *Duration `json:"defaultHostSSHCertDuration,omitempty"`
|
2019-08-05 18:40:27 +00:00
|
|
|
EnableSSHCA *bool `json:"enableSSHCA,omitempty"`
|
2022-03-10 02:39:09 +00:00
|
|
|
|
|
|
|
// Renewal properties
|
2022-04-13 22:11:54 +00:00
|
|
|
DisableRenewal *bool `json:"disableRenewal,omitempty"`
|
|
|
|
AllowRenewalAfterExpiry *bool `json:"allowRenewalAfterExpiry,omitempty"`
|
2019-03-05 01:58:20 +00:00
|
|
|
}
|
|
|
|
|
2019-03-19 22:10:52 +00:00
|
|
|
// Claimer is the type that controls claims. It provides an interface around the
|
|
|
|
// current claim and the global one.
|
|
|
|
type Claimer struct {
|
|
|
|
global Claims
|
|
|
|
claims *Claims
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewClaimer initializes a new claimer with the given claims.
|
|
|
|
func NewClaimer(claims *Claims, global Claims) (*Claimer, error) {
|
|
|
|
c := &Claimer{global: global, claims: claims}
|
2022-08-24 04:35:11 +00:00
|
|
|
if err := c.Validate(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return c, nil
|
2019-03-19 22:10:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Claims returns the merge of the inner and global claims.
|
|
|
|
func (c *Claimer) Claims() Claims {
|
|
|
|
disableRenewal := c.IsDisableRenewal()
|
2022-04-13 22:11:54 +00:00
|
|
|
allowRenewalAfterExpiry := c.AllowRenewalAfterExpiry()
|
2019-08-05 18:40:27 +00:00
|
|
|
enableSSHCA := c.IsSSHCAEnabled()
|
2022-03-10 02:39:09 +00:00
|
|
|
|
2019-03-19 22:10:52 +00:00
|
|
|
return Claims{
|
2022-04-13 22:11:54 +00:00
|
|
|
MinTLSDur: &Duration{c.MinTLSCertDuration()},
|
|
|
|
MaxTLSDur: &Duration{c.MaxTLSCertDuration()},
|
|
|
|
DefaultTLSDur: &Duration{c.DefaultTLSCertDuration()},
|
|
|
|
MinUserSSHDur: &Duration{c.MinUserSSHCertDuration()},
|
|
|
|
MaxUserSSHDur: &Duration{c.MaxUserSSHCertDuration()},
|
|
|
|
DefaultUserSSHDur: &Duration{c.DefaultUserSSHCertDuration()},
|
|
|
|
MinHostSSHDur: &Duration{c.MinHostSSHCertDuration()},
|
|
|
|
MaxHostSSHDur: &Duration{c.MaxHostSSHCertDuration()},
|
|
|
|
DefaultHostSSHDur: &Duration{c.DefaultHostSSHCertDuration()},
|
|
|
|
EnableSSHCA: &enableSSHCA,
|
|
|
|
DisableRenewal: &disableRenewal,
|
|
|
|
AllowRenewalAfterExpiry: &allowRenewalAfterExpiry,
|
2019-03-06 22:51:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// DefaultTLSCertDuration returns the default TLS cert duration for the
|
|
|
|
// provisioner. If the default is not set within the provisioner, then the global
|
|
|
|
// default from the authority configuration will be used.
|
2019-03-19 22:10:52 +00:00
|
|
|
func (c *Claimer) DefaultTLSCertDuration() time.Duration {
|
|
|
|
if c.claims == nil || c.claims.DefaultTLSDur == nil {
|
|
|
|
return c.global.DefaultTLSDur.Duration
|
2019-03-06 22:51:12 +00:00
|
|
|
}
|
2019-03-19 22:10:52 +00:00
|
|
|
return c.claims.DefaultTLSDur.Duration
|
2019-03-06 22:51:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// MinTLSCertDuration returns the minimum TLS cert duration for the provisioner.
|
|
|
|
// If the minimum is not set within the provisioner, then the global
|
|
|
|
// minimum from the authority configuration will be used.
|
2019-03-19 22:10:52 +00:00
|
|
|
func (c *Claimer) MinTLSCertDuration() time.Duration {
|
|
|
|
if c.claims == nil || c.claims.MinTLSDur == nil {
|
2021-05-03 19:48:20 +00:00
|
|
|
if c.claims != nil && c.claims.DefaultTLSDur != nil && c.claims.DefaultTLSDur.Duration < c.global.MinTLSDur.Duration {
|
|
|
|
return c.claims.DefaultTLSDur.Duration
|
|
|
|
}
|
2019-03-19 22:10:52 +00:00
|
|
|
return c.global.MinTLSDur.Duration
|
2019-03-06 22:51:12 +00:00
|
|
|
}
|
2019-03-19 22:10:52 +00:00
|
|
|
return c.claims.MinTLSDur.Duration
|
2019-03-06 22:51:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// MaxTLSCertDuration returns the maximum TLS cert duration for the provisioner.
|
|
|
|
// If the maximum is not set within the provisioner, then the global
|
|
|
|
// maximum from the authority configuration will be used.
|
2019-03-19 22:10:52 +00:00
|
|
|
func (c *Claimer) MaxTLSCertDuration() time.Duration {
|
|
|
|
if c.claims == nil || c.claims.MaxTLSDur == nil {
|
2021-05-03 19:48:20 +00:00
|
|
|
if c.claims != nil && c.claims.DefaultTLSDur != nil && c.claims.DefaultTLSDur.Duration > c.global.MaxTLSDur.Duration {
|
|
|
|
return c.claims.DefaultTLSDur.Duration
|
|
|
|
}
|
2019-03-19 22:10:52 +00:00
|
|
|
return c.global.MaxTLSDur.Duration
|
2019-03-06 22:51:12 +00:00
|
|
|
}
|
2019-03-19 22:10:52 +00:00
|
|
|
return c.claims.MaxTLSDur.Duration
|
2019-03-06 22:51:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// IsDisableRenewal returns if the renewal flow is disabled for the
|
|
|
|
// provisioner. If the property is not set within the provisioner, then the
|
|
|
|
// global value from the authority configuration will be used.
|
2019-03-19 22:10:52 +00:00
|
|
|
func (c *Claimer) IsDisableRenewal() bool {
|
|
|
|
if c.claims == nil || c.claims.DisableRenewal == nil {
|
|
|
|
return *c.global.DisableRenewal
|
2019-03-06 22:51:12 +00:00
|
|
|
}
|
2019-03-19 22:10:52 +00:00
|
|
|
return *c.claims.DisableRenewal
|
2019-03-06 22:51:12 +00:00
|
|
|
}
|
|
|
|
|
2022-04-13 22:11:54 +00:00
|
|
|
// AllowRenewalAfterExpiry returns if the renewal flow is authorized if the
|
2022-03-10 02:39:09 +00:00
|
|
|
// certificate is expired. If the property is not set within the provisioner
|
|
|
|
// then the global value from the authority configuration will be used.
|
2022-04-13 22:11:54 +00:00
|
|
|
func (c *Claimer) AllowRenewalAfterExpiry() bool {
|
|
|
|
if c.claims == nil || c.claims.AllowRenewalAfterExpiry == nil {
|
|
|
|
return *c.global.AllowRenewalAfterExpiry
|
2022-03-10 02:39:09 +00:00
|
|
|
}
|
2022-04-13 22:11:54 +00:00
|
|
|
return *c.claims.AllowRenewalAfterExpiry
|
2022-03-10 02:39:09 +00:00
|
|
|
}
|
|
|
|
|
2020-01-04 02:22:02 +00:00
|
|
|
// DefaultSSHCertDuration returns the default SSH certificate duration for the
|
|
|
|
// given certificate type.
|
|
|
|
func (c *Claimer) DefaultSSHCertDuration(certType uint32) (time.Duration, error) {
|
|
|
|
switch certType {
|
|
|
|
case ssh.UserCert:
|
|
|
|
return c.DefaultUserSSHCertDuration(), nil
|
|
|
|
case ssh.HostCert:
|
|
|
|
return c.DefaultHostSSHCertDuration(), nil
|
|
|
|
case 0:
|
|
|
|
return 0, errors.New("ssh certificate type has not been set")
|
|
|
|
default:
|
|
|
|
return 0, errors.Errorf("ssh certificate has an unknown type: %d", certType)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-24 01:46:43 +00:00
|
|
|
// DefaultUserSSHCertDuration returns the default SSH user cert duration for the
|
|
|
|
// provisioner. If the default is not set within the provisioner, then the
|
|
|
|
// global default from the authority configuration will be used.
|
|
|
|
func (c *Claimer) DefaultUserSSHCertDuration() time.Duration {
|
|
|
|
if c.claims == nil || c.claims.DefaultUserSSHDur == nil {
|
|
|
|
return c.global.DefaultUserSSHDur.Duration
|
|
|
|
}
|
|
|
|
return c.claims.DefaultUserSSHDur.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
// MinUserSSHCertDuration returns the minimum SSH user cert duration for the
|
|
|
|
// provisioner. If the minimum is not set within the provisioner, then the
|
|
|
|
// global minimum from the authority configuration will be used.
|
|
|
|
func (c *Claimer) MinUserSSHCertDuration() time.Duration {
|
|
|
|
if c.claims == nil || c.claims.MinUserSSHDur == nil {
|
2021-05-03 19:48:20 +00:00
|
|
|
if c.claims != nil && c.claims.DefaultUserSSHDur != nil && c.claims.DefaultUserSSHDur.Duration < c.global.MinUserSSHDur.Duration {
|
|
|
|
return c.claims.DefaultUserSSHDur.Duration
|
|
|
|
}
|
2019-07-24 01:46:43 +00:00
|
|
|
return c.global.MinUserSSHDur.Duration
|
|
|
|
}
|
|
|
|
return c.claims.MinUserSSHDur.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
// MaxUserSSHCertDuration returns the maximum SSH user cert duration for the
|
|
|
|
// provisioner. If the maximum is not set within the provisioner, then the
|
|
|
|
// global maximum from the authority configuration will be used.
|
|
|
|
func (c *Claimer) MaxUserSSHCertDuration() time.Duration {
|
|
|
|
if c.claims == nil || c.claims.MaxUserSSHDur == nil {
|
2021-05-03 19:48:20 +00:00
|
|
|
if c.claims != nil && c.claims.DefaultUserSSHDur != nil && c.claims.DefaultUserSSHDur.Duration > c.global.MaxUserSSHDur.Duration {
|
|
|
|
return c.claims.DefaultUserSSHDur.Duration
|
|
|
|
}
|
2019-07-24 01:46:43 +00:00
|
|
|
return c.global.MaxUserSSHDur.Duration
|
|
|
|
}
|
|
|
|
return c.claims.MaxUserSSHDur.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
// DefaultHostSSHCertDuration returns the default SSH host cert duration for the
|
|
|
|
// provisioner. If the default is not set within the provisioner, then the
|
|
|
|
// global default from the authority configuration will be used.
|
|
|
|
func (c *Claimer) DefaultHostSSHCertDuration() time.Duration {
|
|
|
|
if c.claims == nil || c.claims.DefaultHostSSHDur == nil {
|
|
|
|
return c.global.DefaultHostSSHDur.Duration
|
|
|
|
}
|
|
|
|
return c.claims.DefaultHostSSHDur.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
// MinHostSSHCertDuration returns the minimum SSH host cert duration for the
|
|
|
|
// provisioner. If the minimum is not set within the provisioner, then the
|
|
|
|
// global minimum from the authority configuration will be used.
|
|
|
|
func (c *Claimer) MinHostSSHCertDuration() time.Duration {
|
|
|
|
if c.claims == nil || c.claims.MinHostSSHDur == nil {
|
2021-05-03 19:48:20 +00:00
|
|
|
if c.claims != nil && c.claims.DefaultHostSSHDur != nil && c.claims.DefaultHostSSHDur.Duration < c.global.MinHostSSHDur.Duration {
|
|
|
|
return c.claims.DefaultHostSSHDur.Duration
|
|
|
|
}
|
2019-07-24 01:46:43 +00:00
|
|
|
return c.global.MinHostSSHDur.Duration
|
|
|
|
}
|
|
|
|
return c.claims.MinHostSSHDur.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
// MaxHostSSHCertDuration returns the maximum SSH Host cert duration for the
|
|
|
|
// provisioner. If the maximum is not set within the provisioner, then the
|
|
|
|
// global maximum from the authority configuration will be used.
|
|
|
|
func (c *Claimer) MaxHostSSHCertDuration() time.Duration {
|
|
|
|
if c.claims == nil || c.claims.MaxHostSSHDur == nil {
|
2021-05-03 19:48:20 +00:00
|
|
|
if c.claims != nil && c.claims.DefaultHostSSHDur != nil && c.claims.DefaultHostSSHDur.Duration > c.global.MaxHostSSHDur.Duration {
|
|
|
|
return c.claims.DefaultHostSSHDur.Duration
|
|
|
|
}
|
2019-07-24 01:46:43 +00:00
|
|
|
return c.global.MaxHostSSHDur.Duration
|
|
|
|
}
|
|
|
|
return c.claims.MaxHostSSHDur.Duration
|
|
|
|
}
|
|
|
|
|
2019-08-05 18:40:27 +00:00
|
|
|
// IsSSHCAEnabled returns if the SSH CA is enabled for the provisioner. If the
|
|
|
|
// property is not set within the provisioner, then the global value from the
|
|
|
|
// authority configuration will be used.
|
|
|
|
func (c *Claimer) IsSSHCAEnabled() bool {
|
|
|
|
if c.claims == nil || c.claims.EnableSSHCA == nil {
|
|
|
|
return *c.global.EnableSSHCA
|
|
|
|
}
|
|
|
|
return *c.claims.EnableSSHCA
|
|
|
|
}
|
|
|
|
|
2019-03-06 22:51:12 +00:00
|
|
|
// Validate validates and modifies the Claims with default values.
|
2019-03-19 22:10:52 +00:00
|
|
|
func (c *Claimer) Validate() error {
|
2019-03-06 22:51:12 +00:00
|
|
|
var (
|
2019-03-19 22:10:52 +00:00
|
|
|
min = c.MinTLSCertDuration()
|
|
|
|
max = c.MaxTLSCertDuration()
|
|
|
|
def = c.DefaultTLSCertDuration()
|
2019-03-06 22:51:12 +00:00
|
|
|
)
|
|
|
|
switch {
|
2019-03-19 22:10:52 +00:00
|
|
|
case min <= 0:
|
|
|
|
return errors.Errorf("claims: MinTLSCertDuration must be greater than 0")
|
|
|
|
case max <= 0:
|
|
|
|
return errors.Errorf("claims: MaxTLSCertDuration must be greater than 0")
|
|
|
|
case def <= 0:
|
|
|
|
return errors.Errorf("claims: DefaultTLSCertDuration must be greater than 0")
|
2019-03-06 22:51:12 +00:00
|
|
|
case max < min:
|
|
|
|
return errors.Errorf("claims: MaxCertDuration cannot be less "+
|
|
|
|
"than MinCertDuration: MaxCertDuration - %v, MinCertDuration - %v", max, min)
|
|
|
|
case def < min:
|
|
|
|
return errors.Errorf("claims: DefaultCertDuration cannot be less than MinCertDuration: DefaultCertDuration - %v, MinCertDuration - %v", def, min)
|
|
|
|
case max < def:
|
|
|
|
return errors.Errorf("claims: MaxCertDuration cannot be less than DefaultCertDuration: MaxCertDuration - %v, DefaultCertDuration - %v", max, def)
|
|
|
|
default:
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|